Analysis

  • max time kernel
    141s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    23-08-2024 10:09

General

  • Target

    bb4c7940fc8640194da79e3c98ed6152_JaffaCakes118.exe

  • Size

    283KB

  • MD5

    bb4c7940fc8640194da79e3c98ed6152

  • SHA1

    e606e8fc0faa5149c58001b359731a7d20a8f73a

  • SHA256

    1a6100333c4411a58027c7a1fbce702eb0fbe8e9484db8ac4c164655f01278f7

  • SHA512

    25d4e2eb86c9436a694b9634a52b149a6c193cdcff7fcb46c7dc575e3b4b365ac8ae4fe7f37eba7712b23b7d388aa6f5db771b4ce589c1bc96090a02154efac4

  • SSDEEP

    6144:NzUaLBfbOf45YAbsQEGWLBmf9cv6THdssf6MOoGEZIf:RVbOf4vo/1BmCCHWsyMOoG

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 16 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bb4c7940fc8640194da79e3c98ed6152_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\bb4c7940fc8640194da79e3c98ed6152_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:2300

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\isdlq.ini

    Filesize

    67B

    MD5

    a9fa6df0b2618070043abcd94a1a8a42

    SHA1

    99e60004044f5703a112708bca06d455a05c4764

    SHA256

    7c1963d068233894d66ed0587a687dbac95939a07c2720dabf7887f415fc144e

    SHA512

    04326bfaafb92bf633fa2fa2e3624ae6895fd546a153f712314656e6b430b27f17aa27533f8560c3006c0f446c4d96939e3c283b1e17f68bc70b115cc1df66fc

  • memory/2300-12-0x0000000000400000-0x00000000004E0000-memory.dmp

    Filesize

    896KB

  • memory/2300-11-0x0000000000400000-0x00000000004E0000-memory.dmp

    Filesize

    896KB

  • memory/2300-3-0x0000000000400000-0x00000000004E0000-memory.dmp

    Filesize

    896KB

  • memory/2300-8-0x0000000000400000-0x00000000004E0000-memory.dmp

    Filesize

    896KB

  • memory/2300-13-0x0000000000400000-0x00000000004E0000-memory.dmp

    Filesize

    896KB

  • memory/2300-10-0x0000000000400000-0x00000000004E0000-memory.dmp

    Filesize

    896KB

  • memory/2300-2-0x0000000000400000-0x00000000004E0000-memory.dmp

    Filesize

    896KB

  • memory/2300-0-0x0000000000400000-0x00000000004E0000-memory.dmp

    Filesize

    896KB

  • memory/2300-9-0x0000000000400000-0x00000000004E0000-memory.dmp

    Filesize

    896KB

  • memory/2300-14-0x0000000000400000-0x00000000004E0000-memory.dmp

    Filesize

    896KB

  • memory/2300-15-0x0000000000400000-0x00000000004E0000-memory.dmp

    Filesize

    896KB

  • memory/2300-16-0x0000000000400000-0x00000000004E0000-memory.dmp

    Filesize

    896KB

  • memory/2300-17-0x0000000000400000-0x00000000004E0000-memory.dmp

    Filesize

    896KB

  • memory/2300-18-0x0000000000400000-0x00000000004E0000-memory.dmp

    Filesize

    896KB

  • memory/2300-19-0x0000000000400000-0x00000000004E0000-memory.dmp

    Filesize

    896KB

  • memory/2300-20-0x0000000000400000-0x00000000004E0000-memory.dmp

    Filesize

    896KB