Analysis

  • max time kernel
    135s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/08/2024, 08:42

General

  • Target

    c05d61f8e09dce38db6fba619b714b98_JaffaCakes118.exe

  • Size

    158KB

  • MD5

    c05d61f8e09dce38db6fba619b714b98

  • SHA1

    d87c04792899cca54457b660fe7d04dd684ed56b

  • SHA256

    583ba7b20da6acc1c2e501d2a2e32d533650bdd8a5f9f1d94b5c8382e7ad9c9b

  • SHA512

    b2c5e3b5a97d435a0f019a242f9d45c8216825c78bdd3337fbcd72f4b9ef0c9a17a4530eae4776f25a8e6c529113c9642bf8902ebc4c34e058903e19caf58c5c

  • SSDEEP

    3072:uBjoafTJvJ6RsMHdnV5QJscpl1zlsRgLhLy1eQY3noVQvoArT:efTJROJnV5QJscpl1zlsRgLty1eQY3nB

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Modifies WinLogon 2 TTPs 6 IoCs
  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c05d61f8e09dce38db6fba619b714b98_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\c05d61f8e09dce38db6fba619b714b98_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Modifies WinLogon
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    PID:1292

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe

          Filesize

          2.1MB

          MD5

          3501e1143afdfac59c9659876e6fe961

          SHA1

          69d496bd5bf3623f335dcfcfdbfc185e386bd62a

          SHA256

          019960a09d2d72980e86634d8c8e319b07442bd5b5b5cfff2d51394bab43a431

          SHA512

          fd553053195eae99b1face910ab5855e35002aef352e9b4c6b68cf098c7625bdf658066eb2a60129b4fbd69e4562f8984f1857bb024c123b73b2388045070850

        • C:\Users\Admin\AppData\Local\Temp\_c05d61f8e09dce38db6fba619b714b98_JaffaCakes118.exe

          Filesize

          138KB

          MD5

          c4d77f566bd7b2e5e86ca968c762d7a0

          SHA1

          19bf978aaa08b277d541cec6e8f9c644fb95fd5c

          SHA256

          7e23b525a3f8566f9b187dfda0aaaefd4bb8fa2ea1d25e56a4f827c1ba5b44b0

          SHA512

          3ff3521fa54419bac366ada327d7d23cda009fd41a539440caf1775424d6c074f93a73394734473a7cf5406a48c6e5642702db555e42078d4046b0a9e813dbbb

        • memory/1292-201-0x0000000000400000-0x000000000040D000-memory.dmp

          Filesize

          52KB

        • memory/1292-203-0x0000000000400000-0x000000000040D000-memory.dmp

          Filesize

          52KB

        • memory/1292-204-0x0000000000400000-0x000000000040D000-memory.dmp

          Filesize

          52KB

        • memory/1292-209-0x0000000000400000-0x000000000040D000-memory.dmp

          Filesize

          52KB

        • memory/1292-210-0x0000000000400000-0x000000000040D000-memory.dmp

          Filesize

          52KB