Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-09-2024 08:55

General

  • Target

    dc237d83f3b87591794d7fe40280562f_JaffaCakes118.exe

  • Size

    48KB

  • MD5

    dc237d83f3b87591794d7fe40280562f

  • SHA1

    6541a524f9ccd0ba6c2e7b80ab0ea9860394825d

  • SHA256

    96eea7a18bac190101188cf3acfeb8d56096ab385c7a0d3ec4adb978e557024e

  • SHA512

    979f2d44ea3ee56d33062f20f97112332ac0ac51311b7dfc1452d729856ba672527ee33c407e4e427cfbfa6113ad0ea0ef197230c59c6e5667a55f95d2535fcf

  • SSDEEP

    768:VeX+mfbTGJxqbHnkhTXz/aDN76SO5Nlm:VeOmXGJxqTnEXzSN76Sai

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dc237d83f3b87591794d7fe40280562f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\dc237d83f3b87591794d7fe40280562f_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:4324

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\v6rlcu3a.Admin\prefs.js

    Filesize

    108B

    MD5

    aafee873e4e958931627ce70d1f0a8b0

    SHA1

    53cb7dd1635b97d56a6fa6ae7622031667714c5a

    SHA256

    bd9c0aa84e1fb26b4c5b25d3b1cddf33cafbf1f5b1b3a9376f8b3a26ac2f0f52

    SHA512

    13e50945331c259a1eceddfd2b3ac1f651ee5ba7147bef15389f68db70fc8fa6d6714b8d077568ca8dfa18fc375bd6a630b0f96eefe4369d77e7c965db34cc36