Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23-08-2024 18:23
Static task
static1
Behavioral task
behavioral1
Sample
bcb060beab7eaf92ec1db7d6a5fc2b4f_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
bcb060beab7eaf92ec1db7d6a5fc2b4f_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
bcb060beab7eaf92ec1db7d6a5fc2b4f
-
SHA1
6672eda1e319bdf5e22c80df88110be5faab53ef
-
SHA256
61e80e0f79dab157a7efed07e3b4d1c1f5b79f1aaa3cef08d15d917a3c79f4ef
-
SHA512
8d20a1e3b358c100a31ac8b765a1424ed215d4ccc471fb621da9cebee1795d4e1a265ab6d4055d58c31414c0be74b771a42a2f03130be61295043ba13aa42875
-
SSDEEP
24576:RUp9ToJ9BTh+rrDP4KkhnjCkCDFRTSEXoTj7g1o:WpKT+HDgKkhjXWfT5XQ7
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~2\is240618093.log bcb060beab7eaf92ec1db7d6a5fc2b4f_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bcb060beab7eaf92ec1db7d6a5fc2b4f_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4520 bcb060beab7eaf92ec1db7d6a5fc2b4f_JaffaCakes118.exe 4520 bcb060beab7eaf92ec1db7d6a5fc2b4f_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bcb060beab7eaf92ec1db7d6a5fc2b4f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bcb060beab7eaf92ec1db7d6a5fc2b4f_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4520
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
156B
MD51ea9e5b417811379e874ad4870d5c51a
SHA1a4bd01f828454f3619a815dbe5423b181ec4051c
SHA256f076773a6e3ae0f1cee3c69232779a1aaaf05202db472040c0c8ea4a70af173a
SHA512965c10d2aa5312602153338da873e8866d2782e0cf633befe5a552b770e08abf47a4d2e007cdef7010c212ebcb9fefea5610c41c7ed1553440eaeab7ddd72daa
-
Filesize
1KB
MD563e5607b6ca179f4022438b4c1ebb8cd
SHA13a51b4c95b4210058242ec0f3025cc28cec16cf6
SHA25686c77fbf9666fae956c11a2711fe2596a03443aeb935bdc430509741cf43e530
SHA51247d51c36a0482c0359282a9c42c3f3380fbcdbd4ce904b0bd3edcd43cbcbf4e694e6ae4ed513f4aabb4d21063bb7e54fbc1953874bd18cde2aec5477f80da502
-
Filesize
3KB
MD536d758d229dfe18de95fa25465c89d18
SHA1bd7b2561987bad2e273d85061c22d5d1206d4335
SHA256769684e8dfc949d912dd47920781eb055e077453298103a2ebf3e93b2eb38e38
SHA512f1e4653cbde2654479ad1ef322d9a3f6bda956f6d74918513bd377f997fe4b80d81a5fe594e1e7d94aae52b613f74a2451b09ecf6465654b2641828b7645133b
-
Filesize
318B
MD510c359bc980927bb66b215407ece3e66
SHA14a2fc034bf7b4e84d832b6bbd9413d2055b9ec62
SHA2565b12769a75d1c755a284a73e1b8422f73d6223c23b72e5bce698c17f50185aa8
SHA512ed707c6bbf5023aa147571d9d186e8348b11da6fb462de69e4135480f2e10081c416c80745411752797401660221e2040e624b5a6d3e1a57ba59cdcc009eb16c
-
Filesize
417B
MD537e1ff96e084ec201f0d95feef4d5e94
SHA14ec405f2668d5d93260525ad916abafa2414cb72
SHA2568e806f5b94fc294e918503c8053ef1284e4f4b1e02c7da4f4635e33ec33e0534
SHA5121a8a27a92abe35edaa2c950b130579c92f0d0d87b09971843c39569cf06d407b8e896751e73452676bfad45a363f0b6dd00cb6c5faf33966880539e106b19f94
-
Filesize
190B
MD564773c6b0e3413c81aebc46cce8c9318
SHA150f84ef8331341b48981af82313b146863eba526
SHA256b09504c1bf0486d3ec46500592b178a3a6c39284672af8815c3687cc3d29560d
SHA51203e96bef74c0b3a31124c3d3c1bb78af1053a8719ca373c6b9316d63bac9545c1f4ecc2d747eb64341d8da31bc0f23da094e19c3e07ed46f65c28dc88e13bd3a
-
Filesize
458B
MD5f047788b88f4dace0e828635437e565f
SHA1159d7a6b7563e4e4756796a83a4c019b3862d86d
SHA2562264c4f20115e93ea2d609e7bc088cb82f0947bc41e65c6cf546e2cabf5f48d7
SHA512a61be4cbeb5ce48263b60d75a07c4614973203b76918d0489f31dd147c8b1a57340189f12a92b98b2ab7365849b12d31f694a6931c90b55b8a336a5990a34790
-
Filesize
991B
MD58a99e16e48ab5bfd0084ccd49281b036
SHA1ab40545bb33ab2bad0891d3b71c3f618a916cb1d
SHA256e44a2c233a1b29a6cb3bdd5955dece4ddd1e7497d3529bb55add8da124ad3fef
SHA512f8b5fd65300cfd1f7554e381d0a3313ce8611aa092b44322c1b59ebc145e915707825f0fcf8e2e979ef6464df713db4d3897f4624f5ab9d777d4f8c4c5ef95cb
-
Filesize
63KB
MD5674ebeb11c056b0cdf01802020b8b41a
SHA116fba8a46be739be737fcce768021a83142dc7eb
SHA256b2f6875b12c8d4d583f93380c34babc18bb027cb15ed4e8a39bfbb5d9848f0b7
SHA51271a826aca996b7db61a23e3011d4b3d9e61469f82620e6c0b08b1c85492d81da0d151d4c9aac6b3c168b53f0e4314bc2af6d5949c1e579f062f2697ae86be40b
-
Filesize
1KB
MD560e7a3f760637dd125a1150474e7f6bb
SHA146e4b53480dd7b3db532e3511a7ad3b9e99b2f48
SHA256d244e6d623fb3706340ead5491bb61663e5d53a3f7d96d4b613175c875c42184
SHA512d279b197d330c4fe7de5e891b45e60273b603d58c84a502461ba2edf008ed51e6bcfd8768a74ee95bc9558bcbe8294f9f759c188327f7c54b1483d1072b32268
-
Filesize
5KB
MD545d8e7f1e721db59eca3dc36e932bf8b
SHA1974fbb730c8c1ae66c6187f99d887f44d8a77a56
SHA256f8cfaea0b23c976a4e7a67ffe79dd82210c5fea7d6eba2383a3cc33f8802ae05
SHA51285b671dc81758977e5f807af91333573e1733ce8ca6721100dbe8538a481d8811d6d36754517948ff6a5ad984bb5ed0724790f43ba30dafdafb8c94735e249bc
-
Filesize
1KB
MD5a4987c1267f6e8361800aa3d2dc840a2
SHA16d428d5e9333f78ffb65f8ac3aab06c8915078a3
SHA2561b7fffc6ecbde629472f7e1b534243f7f7da06a6f2fed082cf1c62b6b002e9d5
SHA5125fc4a1619851dddb8e689cbb342570f3004a7e4c030c593ac361b55584cda6178b3ce6a4baeed810467e569c07587affde5180420d793eb380782f440b23660a