Analysis
-
max time kernel
135s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
31-08-2024 09:52
Behavioral task
behavioral1
Sample
cc9720fe2882a3f7cc54f0f9afb1f335_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
cc9720fe2882a3f7cc54f0f9afb1f335_JaffaCakes118.exe
-
Size
487KB
-
MD5
cc9720fe2882a3f7cc54f0f9afb1f335
-
SHA1
aea59caec4ed3bfbbee2b8cd94c516ae45848a69
-
SHA256
7e0afbcc7487f74ef4d2dc400812b48542b95dfecad63fe356231065fa10a3db
-
SHA512
c310106ae8e37c7b85e9355b0852fe87ee73f03cbd23d68c7ac236a2548bb46b7b4a20dfcc973ee836ac415f1dedef5c53a4ade365e90be0dc7e11ef7641e1fa
-
SSDEEP
12288:xNgW6anyJNH+RCBRITavKrn7xcCCKAUQXWfWv1K6lghoS:zWJNeRReSlcCAUQmQng
Malware Config
Extracted
ffdroider
http://101.36.107.74
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/436-0-0x0000000000400000-0x0000000000522000-memory.dmp upx behavioral2/memory/436-3-0x0000000000400000-0x0000000000522000-memory.dmp upx behavioral2/memory/436-100-0x0000000000400000-0x0000000000522000-memory.dmp upx -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cc9720fe2882a3f7cc54f0f9afb1f335_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 936 436 WerFault.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cc9720fe2882a3f7cc54f0f9afb1f335_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 436 cc9720fe2882a3f7cc54f0f9afb1f335_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc9720fe2882a3f7cc54f0f9afb1f335_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cc9720fe2882a3f7cc54f0f9afb1f335_JaffaCakes118.exe"1⤵
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:436 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 436 -s 15042⤵
- Program crash
PID:936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4356,i,16316361669272684588,6171287487746154806,262144 --variations-seed-version --mojo-platform-channel-handle=1044 /prefetch:81⤵PID:1704
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 436 -ip 4361⤵PID:4036
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD5e1c35d3aae0063ea6b1b117d5c5dcd17
SHA112eafa6a1106833568748c3f86394d0631a2c3db
SHA256501cf69c4bde4489f7142d3314df7095168e934e6d591d3943069cb22e421b63
SHA512055931198d74bfce1fc67ee2a0b5b95f40940945e72008c5a7298cfe3c16b0cbda7bac834d2d32dcc7ef0c304e68ea3a4af85289b7906b3c0e79ea8655b960c6
-
Filesize
16KB
MD5842699bce131289bccab8465a0fe10d7
SHA11ab0dd541ba9521e5db1eee86f9add93ae2d4c71
SHA2569e14c17c6448130adbf89dcd655f8f51cdf56fc70500a55a09d0ff96c994e263
SHA512a4a4b2ad01010da8514781a0050da8c05402082a42573f019e1f87b9a08e4c154556916814fb40d1e6c998d5e56cbf5949cd88d8bc4ef468d8b0619497c0d839
-
Filesize
16KB
MD5067d3a5c6749d4fac5d5e0abfd09dc82
SHA15c0bc51ef94cfd1f7aa75723c377dbbdf5bfb10b
SHA25626c1d85f372c0cce2fb11989a21e2316c28d4c3e9dd43808b4cc38ec13ee18bd
SHA5125ed8a4dbfad38a11cd845bd77cdafe201e47da89b427869a73fc465f31b89a6534c5a5dc07f3d20b4bdabd2059c5d3721f5c7284339bba381ffc7bf8371958bd
-
Filesize
16KB
MD53e763d1f41b1e41d3dbbccdb235366be
SHA18cf60b9eeb973993a6b88891f6930118d277beb7
SHA256cff44e9a6d0d2ffd69e730eb9c208350c9a2e9150172f16eaf34eb2ece938a65
SHA5124a01d261989c6b08597989a36cdda2ba13fac1755874fea7698847b11ca3b2dc47fb4d9384e6a905d66f3f225545226de26eeb93014124fcf207ba561e99e81b
-
Filesize
16KB
MD5ee5e2c9c6643ff74f6ec32cd6b56f6c7
SHA154e6b61d8152bacdc9911cf624434a573cd89ce3
SHA2565b953f3fe5f9bf95213d3a0698cc31cd1c373e370784a1474dd728fe1ebc244a
SHA512014068581383308bac7d287b94708ba7d24789f28705b6a862d4f6b7ba32233e591637c011ff2aa5234f71b6ea4224efc55383797f2c473748beb211326a30be