Analysis

  • max time kernel
    93s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/09/2024, 00:55

General

  • Target

    df342c979e62ee7b100ccb3ba10e9d9f_JaffaCakes118.exe

  • Size

    1.6MB

  • MD5

    df342c979e62ee7b100ccb3ba10e9d9f

  • SHA1

    9bfa05ce410e1891ccc53bd8b73c9ec9946d93bc

  • SHA256

    4f94d38441cf9bd444cb87f2d1a9cfa24d14179626896bb1295b5248f224c39b

  • SHA512

    a777e90dca737c2775c795e374888e308994d403ffb68246b5536e273bb5fc460dc00ea44c8324b09ea49e5101c763d460b3a6c12d1acd610fad6c1d3b2c8096

  • SSDEEP

    49152:b/fwUdLfGiPTStHxNtKgEAhK1kfqtOZ2Tw1ri:bwUdCi7KHs19tc8

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\df342c979e62ee7b100ccb3ba10e9d9f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\df342c979e62ee7b100ccb3ba10e9d9f_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1036
    • C:\Users\Admin\AppData\Local\Temp\df342c979e62ee7b100ccb3ba10e9d9f_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\df342c979e62ee7b100ccb3ba10e9d9f_JaffaCakes118.exe" /wrapper /dir="C:\Users\Admin\AppData\Local\Temp\pkg_03801ee0"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2408

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\pkg_03801ee0\autorun.txt

          Filesize

          94B

          MD5

          962d60d18e3a066135aacbeecd69c184

          SHA1

          df94f423b79c84d96851c657225affa8ee79fdfc

          SHA256

          e0d5170cb3733763be23c126eafc8af8a4507464b7c7001e23dd28202ddfeb32

          SHA512

          004db82aecb42822c2eb7ad44a21e953f5a886c772becb56ec0d509560d6a26c9e2813d8ba14b7491e55457f7c8afc535451d07d5950b8919a053b552ee22f61

        • C:\Users\Admin\AppData\Local\Temp\pkg_03801ee0\wrapper.xml

          Filesize

          798B

          MD5

          1d45a29e3511b982a1f91b33c70e964f

          SHA1

          176a47b489be3f27dc354a2b9dd0b580bb2f3904

          SHA256

          0a69c29fe16727b18425df8ded1cfe9d07a380b9f23f1beb32f60fefc000b3dc

          SHA512

          c574719f56a9cc0a3c393001f0774a5826afa5972906d9d9d214a183724a9f7226483a7181a0030e0f801b481a19957761efc170a10850aec786623eb939eb69