Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 07:46
Static task
static1
Behavioral task
behavioral1
Sample
bae3318f4755a06022d4f28f46878794_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bae3318f4755a06022d4f28f46878794_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bae3318f4755a06022d4f28f46878794_JaffaCakes118.exe
-
Size
185KB
-
MD5
bae3318f4755a06022d4f28f46878794
-
SHA1
d2daff850f93a5495436768e8f333f60727fe641
-
SHA256
8cb7febbf0ca9f33304fa10eb529f7fd7a6105b4fa6af676aa0e2138c10a8068
-
SHA512
5f71775658eb7d5d0d21c1b3c222e958b96cd5d553328737f87a7d243c2b95a493a7566ca9dd81ed623a62fbb14e7ebf90678fb7c9720cc4d2ff2a6851fbbbc3
-
SSDEEP
3072:4NAvjiyMk96bj+ReNPpD8O5oo+g9hPp0dMqHdl7lmk/AqFYGfLGOvv1Q6hfN:4NAvjiyr9EUeNPhooz9hHqLh//vSoHQy
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2084-2-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2404-5-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2404-7-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2084-15-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2868-75-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2868-76-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2084-77-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2084-168-0x0000000000400000-0x0000000000445000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\conhost.exe" bae3318f4755a06022d4f28f46878794_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bae3318f4755a06022d4f28f46878794_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bae3318f4755a06022d4f28f46878794_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bae3318f4755a06022d4f28f46878794_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2404 2084 bae3318f4755a06022d4f28f46878794_JaffaCakes118.exe 30 PID 2084 wrote to memory of 2404 2084 bae3318f4755a06022d4f28f46878794_JaffaCakes118.exe 30 PID 2084 wrote to memory of 2404 2084 bae3318f4755a06022d4f28f46878794_JaffaCakes118.exe 30 PID 2084 wrote to memory of 2404 2084 bae3318f4755a06022d4f28f46878794_JaffaCakes118.exe 30 PID 2084 wrote to memory of 2868 2084 bae3318f4755a06022d4f28f46878794_JaffaCakes118.exe 32 PID 2084 wrote to memory of 2868 2084 bae3318f4755a06022d4f28f46878794_JaffaCakes118.exe 32 PID 2084 wrote to memory of 2868 2084 bae3318f4755a06022d4f28f46878794_JaffaCakes118.exe 32 PID 2084 wrote to memory of 2868 2084 bae3318f4755a06022d4f28f46878794_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\bae3318f4755a06022d4f28f46878794_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bae3318f4755a06022d4f28f46878794_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\bae3318f4755a06022d4f28f46878794_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\bae3318f4755a06022d4f28f46878794_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2404
-
-
C:\Users\Admin\AppData\Local\Temp\bae3318f4755a06022d4f28f46878794_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\bae3318f4755a06022d4f28f46878794_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:2868
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5163b50e0cc8370b6a3b7eda7c4e0e9d5
SHA125c07473c7e9e354d54429f56a72b519730a09dc
SHA25677384d985ee1447caab5b70c67bca2d0f8fa44ae721bf63d5341d496e5b45593
SHA5127577f1abc32d84d2dbab0003db4ea8b8f5324f1df8c4606f84f1930552af5d726236693fc0052ea8f4cb3c8ca6c979afbddecf7dda6786ef2f1fadd9f812c691
-
Filesize
600B
MD5b10466a747e127d81eb965af64febe7d
SHA1de56d237cd2043487eca2e386031d9240234f012
SHA2565669956a7c5e74f6218cef85403871651100c8326221cddf6ccc1ca380e94fc0
SHA512b98b4003db44e9c7adafa21ff4d0937fcce36863154f7d5dfb5a58eb1fa006c4f644260e25d014403e13bd6477711534eed620318d670936dc2fbad1d6880db8
-
Filesize
996B
MD5a8b264fa1bff4286ad8518fa99f8ce76
SHA1bc8cf9a31a167b0b29f99f1686b1b390fd495d1c
SHA256c02cdb2fbc7407db191ef45d90461e9ce0ba2f8b61dd6983b6370a4c62c3361d
SHA51270f2e3d8529a8897965c715ba33ba7a64391e703f2b02d894f82db66991dad6dd61ec8a3acd663913e325874f445c2211c455d2c69ceb539cce21dcacaeb0194