Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09/09/2024, 20:05

General

  • Target

    d7031465a617ab89e36bbcbcf9ddcbd8_JaffaCakes118.exe

  • Size

    388KB

  • MD5

    d7031465a617ab89e36bbcbcf9ddcbd8

  • SHA1

    09968c00ce574009116f0a370e31925010de9725

  • SHA256

    cea5b80e3c83d243e290b7a955e0a414cbf10825d4233a03bb8aad3e19ff29e7

  • SHA512

    5c475c947814147805896e57f794381d12b602ce05a734281227239e9a0fa922b6cba5add07208f0dbcf29cc0890622b1fc70bfd1ca0e5ce1e75b3eee7a28b74

  • SSDEEP

    6144:+805yHbwOUo6RwLfurlHiIsmyh5yCuCak3vSGo4cFpdc/eekNpoSHzeei:L05OyrfRHiXhquv7Ypdc/eeqpoSTeei

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d7031465a617ab89e36bbcbcf9ddcbd8_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d7031465a617ab89e36bbcbcf9ddcbd8_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1260
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\475.bat
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2880

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\43489.exe

    Filesize

    388KB

    MD5

    d7031465a617ab89e36bbcbcf9ddcbd8

    SHA1

    09968c00ce574009116f0a370e31925010de9725

    SHA256

    cea5b80e3c83d243e290b7a955e0a414cbf10825d4233a03bb8aad3e19ff29e7

    SHA512

    5c475c947814147805896e57f794381d12b602ce05a734281227239e9a0fa922b6cba5add07208f0dbcf29cc0890622b1fc70bfd1ca0e5ce1e75b3eee7a28b74

  • C:\Users\Admin\AppData\Local\Temp\475.bat

    Filesize

    175B

    MD5

    8b41ea8a3e6f5c5f6f95db1af46d155d

    SHA1

    cec9611195f645e61ddf28eeebe9b8ba43dab4c9

    SHA256

    b29aafeee8c3c34f60a732f19b2224bd41d201080b8bbc56797eb53cf7e731a7

    SHA512

    f54927b05e5b8216db397e6000efe8ae25871ab9c1bb43578527aefaf51098e0d6732b1bf938b6a7639b046e6146a5cf50a3cc675b169772fdf1e14431bd57dc

  • memory/1260-0-0x0000000001170000-0x00000000012C0000-memory.dmp

    Filesize

    1.3MB

  • memory/1260-11-0x0000000001170000-0x00000000012C0000-memory.dmp

    Filesize

    1.3MB