Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20/09/2024, 09:40
Static task
static1
Behavioral task
behavioral1
Sample
ed51777d92665bb45ac892160984cd5c_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ed51777d92665bb45ac892160984cd5c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ed51777d92665bb45ac892160984cd5c_JaffaCakes118.exe
-
Size
164KB
-
MD5
ed51777d92665bb45ac892160984cd5c
-
SHA1
223f0ac840afdfa4bde34cbfbe0d362d9fa91fe6
-
SHA256
3fa4297a33559e7a7c5676bd3f955a38148ee5820e58ed3cf13483ae5ed4abd7
-
SHA512
721b0503e23ea81943d4ba8b46f9dc0c606c0ad724a10015039841b02821fd8de646cad555202f7e328244aecb5f11cd6722d8e45193b6122dbd2f122ca0e51d
-
SSDEEP
3072:ktOmSp7U9vDIZ0/zR8nLlnEXz83L60aaHm+gPMWZdvb:f+v6c6LlnEXE/g0gv
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\B4D94\\E6DDF.exe" ed51777d92665bb45ac892160984cd5c_JaffaCakes118.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2292-2-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral1/memory/1768-14-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral1/memory/1768-12-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral1/memory/1768-15-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral1/memory/2292-16-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral1/memory/2292-17-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral1/memory/1696-120-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral1/memory/1696-121-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral1/memory/2292-122-0x0000000000400000-0x0000000000490000-memory.dmp upx behavioral1/memory/2292-292-0x0000000000400000-0x0000000000490000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ed51777d92665bb45ac892160984cd5c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ed51777d92665bb45ac892160984cd5c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ed51777d92665bb45ac892160984cd5c_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2292 wrote to memory of 1768 2292 ed51777d92665bb45ac892160984cd5c_JaffaCakes118.exe 28 PID 2292 wrote to memory of 1768 2292 ed51777d92665bb45ac892160984cd5c_JaffaCakes118.exe 28 PID 2292 wrote to memory of 1768 2292 ed51777d92665bb45ac892160984cd5c_JaffaCakes118.exe 28 PID 2292 wrote to memory of 1768 2292 ed51777d92665bb45ac892160984cd5c_JaffaCakes118.exe 28 PID 2292 wrote to memory of 1696 2292 ed51777d92665bb45ac892160984cd5c_JaffaCakes118.exe 30 PID 2292 wrote to memory of 1696 2292 ed51777d92665bb45ac892160984cd5c_JaffaCakes118.exe 30 PID 2292 wrote to memory of 1696 2292 ed51777d92665bb45ac892160984cd5c_JaffaCakes118.exe 30 PID 2292 wrote to memory of 1696 2292 ed51777d92665bb45ac892160984cd5c_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed51777d92665bb45ac892160984cd5c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ed51777d92665bb45ac892160984cd5c_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\ed51777d92665bb45ac892160984cd5c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\ed51777d92665bb45ac892160984cd5c_JaffaCakes118.exe startC:\Program Files (x86)\LP\DF6B\5F4.exe%C:\Program Files (x86)\LP\DF6B2⤵
- System Location Discovery: System Language Discovery
PID:1768
-
-
C:\Users\Admin\AppData\Local\Temp\ed51777d92665bb45ac892160984cd5c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\ed51777d92665bb45ac892160984cd5c_JaffaCakes118.exe startC:\Program Files (x86)\943B9\lvvm.exe%C:\Program Files (x86)\943B92⤵
- System Location Discovery: System Language Discovery
PID:1696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD5233e962253b6ba6c975b675ec3375ed8
SHA14a1b98497da8b06d9b07857ce06df617e3cc3630
SHA2562410341aa3f0d9bb9e642e992280bd280b9c8cd84b2352d5fa3d580b727da56a
SHA5128eff6e69789cc4b0aed8103c2cd06add76607e2102e2d34b457847559bf66796a48b3c78632010d8abb1cf59ce2ddb4cf89bd1fac8c1e673e026ad8438152c2d
-
Filesize
600B
MD5ab790be2f054b2c0421d1cdf82425253
SHA173c5a11c79fd5afee72860820d4c52b1a536bd0d
SHA2562b7c92f35660d3894f8cf04b86658cd5c28be06c262be939c19718d5b5a3f94e
SHA5120945f17def80f23952c8884f6ce9c0f54ef3188cab9195e15f58c5c2ba5a5c83023e5065bf07ace21572da38055aaddc9d93f161b9fce3ccfb87dfc9c63d08d2
-
Filesize
1KB
MD5e01df728e790e6110705bf8d946ad31c
SHA1ddc7e274067ce76d4ca0975a7f44a53ebcb379f1
SHA2562d3a299f611668a3a165bf855689c40050044bb443ff5436e41bda3642a8b688
SHA51202282568199444b342c69512c916846547ab7e4261b80d53640b7c77f4017e82da2cf09e3647b339e01c5dfa0707498bec8061bc5c1685fd06dcadebdaa05fa9