Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 05:33
Static task
static1
Behavioral task
behavioral1
Sample
bdfb220961b10bfa8ed3f0c1759b1a9a_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
bdfb220961b10bfa8ed3f0c1759b1a9a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bdfb220961b10bfa8ed3f0c1759b1a9a_JaffaCakes118.exe
-
Size
164KB
-
MD5
bdfb220961b10bfa8ed3f0c1759b1a9a
-
SHA1
9fa8dbc1a7100ee61ccd7d5337ff30e7ac860ac7
-
SHA256
3c0c4af1397f5a221b2021fd3317b53eaa209192e9e66f08c6a0aeae95b0f070
-
SHA512
3d2343589bdd1ea00cab7d39f5087be52dca5eebdb858db8db11e4531e54913786865d88731cf5c2a60906e462627d1156486566be6f0ea62cfc2d143b19dbec
-
SSDEEP
3072:YcBYy7lBrgq+gOcT23pjhjt/YSN+CuZkP0MaTxm37+ZCi/peoE0:Yvy7lBrg7D+2Fhx/Y4PuZOaTxm3g/pJV
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1992-2-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2292-12-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2292-13-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/1992-14-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/1992-79-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/468-81-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/1992-192-0x0000000000400000-0x0000000000445000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\conhost.exe" bdfb220961b10bfa8ed3f0c1759b1a9a_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bdfb220961b10bfa8ed3f0c1759b1a9a_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1992 wrote to memory of 2292 1992 bdfb220961b10bfa8ed3f0c1759b1a9a_JaffaCakes118.exe 30 PID 1992 wrote to memory of 2292 1992 bdfb220961b10bfa8ed3f0c1759b1a9a_JaffaCakes118.exe 30 PID 1992 wrote to memory of 2292 1992 bdfb220961b10bfa8ed3f0c1759b1a9a_JaffaCakes118.exe 30 PID 1992 wrote to memory of 2292 1992 bdfb220961b10bfa8ed3f0c1759b1a9a_JaffaCakes118.exe 30 PID 1992 wrote to memory of 468 1992 bdfb220961b10bfa8ed3f0c1759b1a9a_JaffaCakes118.exe 33 PID 1992 wrote to memory of 468 1992 bdfb220961b10bfa8ed3f0c1759b1a9a_JaffaCakes118.exe 33 PID 1992 wrote to memory of 468 1992 bdfb220961b10bfa8ed3f0c1759b1a9a_JaffaCakes118.exe 33 PID 1992 wrote to memory of 468 1992 bdfb220961b10bfa8ed3f0c1759b1a9a_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\bdfb220961b10bfa8ed3f0c1759b1a9a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bdfb220961b10bfa8ed3f0c1759b1a9a_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\bdfb220961b10bfa8ed3f0c1759b1a9a_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\bdfb220961b10bfa8ed3f0c1759b1a9a_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵PID:2292
-
-
C:\Users\Admin\AppData\Local\Temp\bdfb220961b10bfa8ed3f0c1759b1a9a_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\bdfb220961b10bfa8ed3f0c1759b1a9a_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵PID:468
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD595c0b7964906afb8f112d7806a4fea19
SHA114ca56a76b9baaf9b068b537ddce3fed6098bb67
SHA256b976fd1b843e1d43fbbc503630e2b4b2fae103c605f1fe88e4cf2a448c8e9ab9
SHA5123b6016ddb0bb9582621cc95ced80a243466d3793c06b6814ac134d5a89016d910c4ca6c12693e97574ad90aa23529a7bce440e1077a428c174ff12a2714191fb
-
Filesize
600B
MD5d5d8e81be8b00db119b0fd3a37d5b796
SHA179f1cf8b9d03d178a38ab9542993a9ccf05aacf8
SHA256065e290525ca734dae23400b15a2a5cd9d02d042c6ebf622da9c81fd50ee7aeb
SHA512ae34e6795d15c84df53541a430a8fa2651370a119fb2b351a8bcdda084f2568415a9d3ee4f60ff019f2b175466024b703496320d04305c0fa0510e1910ef5650
-
Filesize
996B
MD5efe3f81869bf882debf96f8f98a29be6
SHA1559011daec7077ebe710e97037f2733ac944d85c
SHA256655b66504d494c54e9b0ebb1e7b5e954ddd5d0ac421d0267474b154bb9e9d49f
SHA5121ed4bfae02bc8ae450745f0e793b44ee1ebcec97a57cce4b25ff0f568918a29979261f309f4921a2bedf7d443908e11bc4ebc4ab485ca36fd63ef6c5c59a2e88