Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/09/2024, 11:17

General

  • Target

    efacf8f271540a7531936e51f57d2631_JaffaCakes118.exe

  • Size

    1.5MB

  • MD5

    efacf8f271540a7531936e51f57d2631

  • SHA1

    7e6783b3aee4191ce61201df5dae984cc4201ea2

  • SHA256

    e606fa5f9dea376722c0ee573bf2d2d8323f484f7c2f7e78091a2b05264757b4

  • SHA512

    b869bfab03fe462d788debadcbcf9b71794d00e7dcba0ae3b5713f12ad31fb3945b83e3539607b6006bfd19e8b1a5fab34980b94b683bc8784d6e90c93052272

  • SSDEEP

    24576:W2RtsxfT5Ecc6hwjZhWlkPzYiPnoIs9WoyZpGeWJkRUndufH5NTQ9cjnOAJIsb:rkfTNEfWlQzBPnoIs9WoynWaaAfXTYcj

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\efacf8f271540a7531936e51f57d2631_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\efacf8f271540a7531936e51f57d2631_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3548
    • C:\Users\Admin\AppData\Local\Temp\efacf8f271540a7531936e51f57d2631_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\efacf8f271540a7531936e51f57d2631_JaffaCakes118.exe" /wrapper /dir="C:\Users\Admin\AppData\Local\Temp\pkg_b112a1a90"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4584

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\pkg_b112a1a90\autorun.txt

          Filesize

          121B

          MD5

          ad2a6d0856c6c5f9829c32e5eb5a9ce6

          SHA1

          45c02b559a0186263d6676a9eb8af8d43fad4ab1

          SHA256

          f7b57f3acfa68d5a5f6cacd464d451a0e47f17c6873fea1a830501ceda5142b5

          SHA512

          d834e56cbc4d61be97a20a832e24eafa3b390c9cfedf6ad2b79c00dcffba60f4b4a4c5f947bcfa8eb80e1c07245064f88c55200bd8d69c19d8bd3581fb307d0f

        • C:\Users\Admin\AppData\Local\Temp\pkg_b112a1a90\wrapper.xml

          Filesize

          798B

          MD5

          1d45a29e3511b982a1f91b33c70e964f

          SHA1

          176a47b489be3f27dc354a2b9dd0b580bb2f3904

          SHA256

          0a69c29fe16727b18425df8ded1cfe9d07a380b9f23f1beb32f60fefc000b3dc

          SHA512

          c574719f56a9cc0a3c393001f0774a5826afa5972906d9d9d214a183724a9f7226483a7181a0030e0f801b481a19957761efc170a10850aec786623eb939eb69