Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-09-2024 20:50
Static task
static1
Behavioral task
behavioral1
Sample
dee0a1b3cb409433301f4fc9d112c85b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dee0a1b3cb409433301f4fc9d112c85b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dee0a1b3cb409433301f4fc9d112c85b_JaffaCakes118.exe
-
Size
189KB
-
MD5
dee0a1b3cb409433301f4fc9d112c85b
-
SHA1
7b252ca61e697409c1e51ad4d18ce4a3890c2b01
-
SHA256
f4cb229f2af77da399bd8bd1bbd60333d2249cd9de6b5b486fdb073eae01e3de
-
SHA512
830266e5024d9b832d65c46e34f2bfafd048d88a11ccb7b366b9aef6161d0b3b5221efe1951006251a911bd2fbd95829f7a1f3bc169db716be5f197af74b03d1
-
SSDEEP
3072:mJWrUa15ebgwib2MJDJ8s0qWm6vRa6B82DiN2ZHqscUQWAL4y5nIIWG:35eswibBDJ8s0qZ6Zv821HTQWvI
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2640-2-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/2804-13-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/2640-14-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/2640-83-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/2408-85-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/2408-86-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/2640-199-0x0000000000400000-0x000000000044B000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\conhost.exe" dee0a1b3cb409433301f4fc9d112c85b_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dee0a1b3cb409433301f4fc9d112c85b_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2640 wrote to memory of 2804 2640 dee0a1b3cb409433301f4fc9d112c85b_JaffaCakes118.exe 31 PID 2640 wrote to memory of 2804 2640 dee0a1b3cb409433301f4fc9d112c85b_JaffaCakes118.exe 31 PID 2640 wrote to memory of 2804 2640 dee0a1b3cb409433301f4fc9d112c85b_JaffaCakes118.exe 31 PID 2640 wrote to memory of 2804 2640 dee0a1b3cb409433301f4fc9d112c85b_JaffaCakes118.exe 31 PID 2640 wrote to memory of 2408 2640 dee0a1b3cb409433301f4fc9d112c85b_JaffaCakes118.exe 33 PID 2640 wrote to memory of 2408 2640 dee0a1b3cb409433301f4fc9d112c85b_JaffaCakes118.exe 33 PID 2640 wrote to memory of 2408 2640 dee0a1b3cb409433301f4fc9d112c85b_JaffaCakes118.exe 33 PID 2640 wrote to memory of 2408 2640 dee0a1b3cb409433301f4fc9d112c85b_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\dee0a1b3cb409433301f4fc9d112c85b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dee0a1b3cb409433301f4fc9d112c85b_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\dee0a1b3cb409433301f4fc9d112c85b_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\dee0a1b3cb409433301f4fc9d112c85b_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵PID:2804
-
-
C:\Users\Admin\AppData\Local\Temp\dee0a1b3cb409433301f4fc9d112c85b_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\dee0a1b3cb409433301f4fc9d112c85b_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵PID:2408
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD59a6965782e60e940943209329fe40fb1
SHA1745a650c237fff332440e936efb8818d94d88ddf
SHA2567bbd5caa8be22141cf53defcaa2fa9e03541691aee05e9b2d80aabcb95bf9ae4
SHA51237776bceaeee9f0fab92b0e7abee46526abd0ed4483b04606370207573f61cdf7017dc011ce4e1eb45c9f14a062f5eb4e1597012de7824ddbce3798155af45d1
-
Filesize
600B
MD55a655061346cf7322f4313e9257b0e9c
SHA16f9fd9ac00abf45cab7ba0189805d7ffa65f51b0
SHA256dc7ad3656ae914afb3a50e9883979a48d9281e0c52e79d519ea3d10746339ab7
SHA512d7021261af50358e973503d4c3568f2b86a004ae03bd2a2a8e38b1766db264cd7de12191d6065ad3530588a27b786d836d5e22806aa30ef763a6112116330c0d
-
Filesize
1KB
MD518c15aebd467e886c1fee16d1822bc8d
SHA1c33f2464a0cd7872dad7046b8040e3d04bf9d73f
SHA2561212636f470f5aeaaa04910316d71178b7dfe6984c8a09ab8a0d4ad6344eac34
SHA51273f65e0c995d08464c9b7040523eb07cf2e86121ae9d2f69a7d3552b70463cc9949b897edcb1d030038923a36c7f7ffe5a44739c8c3385a239c29ee97523fb51
-
Filesize
996B
MD51ad3c5791ec91db9e26b122d71d3277a
SHA138be9e375282850c36782a04ab18436493fe29b0
SHA256f04f1a8bbe3ec27bdfb3d3c874ab0e33017840b0df6fc49f3fd9d9436ee159e5
SHA5128473cf67fbafbfd78792ec3034dbea10a0c8c755ed58a722f68e3d356d9440d1b852a01fe9bf7093a0c92006717fbdaf4d44dc551e0ad7c9c90bb2b959913277