Analysis
-
max time kernel
141s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
23-08-2024 10:09
Behavioral task
behavioral1
Sample
bb4c7940fc8640194da79e3c98ed6152_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
bb4c7940fc8640194da79e3c98ed6152_JaffaCakes118.exe
-
Size
283KB
-
MD5
bb4c7940fc8640194da79e3c98ed6152
-
SHA1
e606e8fc0faa5149c58001b359731a7d20a8f73a
-
SHA256
1a6100333c4411a58027c7a1fbce702eb0fbe8e9484db8ac4c164655f01278f7
-
SHA512
25d4e2eb86c9436a694b9634a52b149a6c193cdcff7fcb46c7dc575e3b4b365ac8ae4fe7f37eba7712b23b7d388aa6f5db771b4ce589c1bc96090a02154efac4
-
SSDEEP
6144:NzUaLBfbOf45YAbsQEGWLBmf9cv6THdssf6MOoGEZIf:RVbOf4vo/1BmCCHWsyMOoG
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2300-0-0x0000000000400000-0x00000000004E0000-memory.dmp upx behavioral1/memory/2300-3-0x0000000000400000-0x00000000004E0000-memory.dmp upx behavioral1/memory/2300-2-0x0000000000400000-0x00000000004E0000-memory.dmp upx behavioral1/memory/2300-8-0x0000000000400000-0x00000000004E0000-memory.dmp upx behavioral1/memory/2300-9-0x0000000000400000-0x00000000004E0000-memory.dmp upx behavioral1/memory/2300-10-0x0000000000400000-0x00000000004E0000-memory.dmp upx behavioral1/memory/2300-11-0x0000000000400000-0x00000000004E0000-memory.dmp upx behavioral1/memory/2300-12-0x0000000000400000-0x00000000004E0000-memory.dmp upx behavioral1/memory/2300-13-0x0000000000400000-0x00000000004E0000-memory.dmp upx behavioral1/memory/2300-14-0x0000000000400000-0x00000000004E0000-memory.dmp upx behavioral1/memory/2300-15-0x0000000000400000-0x00000000004E0000-memory.dmp upx behavioral1/memory/2300-16-0x0000000000400000-0x00000000004E0000-memory.dmp upx behavioral1/memory/2300-17-0x0000000000400000-0x00000000004E0000-memory.dmp upx behavioral1/memory/2300-18-0x0000000000400000-0x00000000004E0000-memory.dmp upx behavioral1/memory/2300-19-0x0000000000400000-0x00000000004E0000-memory.dmp upx behavioral1/memory/2300-20-0x0000000000400000-0x00000000004E0000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bb4c7940fc8640194da79e3c98ed6152_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2300 bb4c7940fc8640194da79e3c98ed6152_JaffaCakes118.exe 2300 bb4c7940fc8640194da79e3c98ed6152_JaffaCakes118.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67B
MD5a9fa6df0b2618070043abcd94a1a8a42
SHA199e60004044f5703a112708bca06d455a05c4764
SHA2567c1963d068233894d66ed0587a687dbac95939a07c2720dabf7887f415fc144e
SHA51204326bfaafb92bf633fa2fa2e3624ae6895fd546a153f712314656e6b430b27f17aa27533f8560c3006c0f446c4d96939e3c283b1e17f68bc70b115cc1df66fc