Analysis
-
max time kernel
93s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/09/2024, 00:55
Static task
static1
Behavioral task
behavioral1
Sample
df342c979e62ee7b100ccb3ba10e9d9f_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
df342c979e62ee7b100ccb3ba10e9d9f_JaffaCakes118.exe
-
Size
1.6MB
-
MD5
df342c979e62ee7b100ccb3ba10e9d9f
-
SHA1
9bfa05ce410e1891ccc53bd8b73c9ec9946d93bc
-
SHA256
4f94d38441cf9bd444cb87f2d1a9cfa24d14179626896bb1295b5248f224c39b
-
SHA512
a777e90dca737c2775c795e374888e308994d403ffb68246b5536e273bb5fc460dc00ea44c8324b09ea49e5101c763d460b3a6c12d1acd610fad6c1d3b2c8096
-
SSDEEP
49152:b/fwUdLfGiPTStHxNtKgEAhK1kfqtOZ2Tw1ri:bwUdCi7KHs19tc8
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language df342c979e62ee7b100ccb3ba10e9d9f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language df342c979e62ee7b100ccb3ba10e9d9f_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1036 df342c979e62ee7b100ccb3ba10e9d9f_JaffaCakes118.exe 1036 df342c979e62ee7b100ccb3ba10e9d9f_JaffaCakes118.exe 1036 df342c979e62ee7b100ccb3ba10e9d9f_JaffaCakes118.exe 1036 df342c979e62ee7b100ccb3ba10e9d9f_JaffaCakes118.exe 2408 df342c979e62ee7b100ccb3ba10e9d9f_JaffaCakes118.exe 2408 df342c979e62ee7b100ccb3ba10e9d9f_JaffaCakes118.exe 2408 df342c979e62ee7b100ccb3ba10e9d9f_JaffaCakes118.exe 2408 df342c979e62ee7b100ccb3ba10e9d9f_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2408 df342c979e62ee7b100ccb3ba10e9d9f_JaffaCakes118.exe 2408 df342c979e62ee7b100ccb3ba10e9d9f_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1036 wrote to memory of 2408 1036 df342c979e62ee7b100ccb3ba10e9d9f_JaffaCakes118.exe 84 PID 1036 wrote to memory of 2408 1036 df342c979e62ee7b100ccb3ba10e9d9f_JaffaCakes118.exe 84 PID 1036 wrote to memory of 2408 1036 df342c979e62ee7b100ccb3ba10e9d9f_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\df342c979e62ee7b100ccb3ba10e9d9f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\df342c979e62ee7b100ccb3ba10e9d9f_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Users\Admin\AppData\Local\Temp\df342c979e62ee7b100ccb3ba10e9d9f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\df342c979e62ee7b100ccb3ba10e9d9f_JaffaCakes118.exe" /wrapper /dir="C:\Users\Admin\AppData\Local\Temp\pkg_03801ee0"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2408
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
94B
MD5962d60d18e3a066135aacbeecd69c184
SHA1df94f423b79c84d96851c657225affa8ee79fdfc
SHA256e0d5170cb3733763be23c126eafc8af8a4507464b7c7001e23dd28202ddfeb32
SHA512004db82aecb42822c2eb7ad44a21e953f5a886c772becb56ec0d509560d6a26c9e2813d8ba14b7491e55457f7c8afc535451d07d5950b8919a053b552ee22f61
-
Filesize
798B
MD51d45a29e3511b982a1f91b33c70e964f
SHA1176a47b489be3f27dc354a2b9dd0b580bb2f3904
SHA2560a69c29fe16727b18425df8ded1cfe9d07a380b9f23f1beb32f60fefc000b3dc
SHA512c574719f56a9cc0a3c393001f0774a5826afa5972906d9d9d214a183724a9f7226483a7181a0030e0f801b481a19957761efc170a10850aec786623eb939eb69