Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    25/08/2024, 11:31

General

  • Target

    c0a74fd8cb87db299999ff37d2204ae0_JaffaCakes118.exe

  • Size

    288KB

  • MD5

    c0a74fd8cb87db299999ff37d2204ae0

  • SHA1

    522ffd0b2bf642b60b06f427385a43f2758891ae

  • SHA256

    abab5ed23b9ac382a9d276379b4499372d0eaa4fe37092917343be4817b080ee

  • SHA512

    d7464924edac7b97e9a8b3960d2ac8542e79b77ab2fa2e6cf07415039c1d4768b6672d87703bd77203373e5970139afff8c5927bf49110223ac237df988e6e96

  • SSDEEP

    6144:XLT/U5Eq8Vie3MYfBdv1foGwgPxTxi7OxC66bhmFym:f9ZQKVvuaPxTxLxCPCym

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c0a74fd8cb87db299999ff37d2204ae0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\c0a74fd8cb87db299999ff37d2204ae0_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2692
    • C:\Users\Admin\AppData\Local\Temp\uninstall.exe
      "C:\Users\Admin\AppData\Local\Temp\uninstall.exe" /remove
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2772

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\uninstall.exe

    Filesize

    288KB

    MD5

    c0a74fd8cb87db299999ff37d2204ae0

    SHA1

    522ffd0b2bf642b60b06f427385a43f2758891ae

    SHA256

    abab5ed23b9ac382a9d276379b4499372d0eaa4fe37092917343be4817b080ee

    SHA512

    d7464924edac7b97e9a8b3960d2ac8542e79b77ab2fa2e6cf07415039c1d4768b6672d87703bd77203373e5970139afff8c5927bf49110223ac237df988e6e96