Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/09/2024, 11:17
Static task
static1
Behavioral task
behavioral1
Sample
efacf8f271540a7531936e51f57d2631_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
efacf8f271540a7531936e51f57d2631_JaffaCakes118.exe
-
Size
1.5MB
-
MD5
efacf8f271540a7531936e51f57d2631
-
SHA1
7e6783b3aee4191ce61201df5dae984cc4201ea2
-
SHA256
e606fa5f9dea376722c0ee573bf2d2d8323f484f7c2f7e78091a2b05264757b4
-
SHA512
b869bfab03fe462d788debadcbcf9b71794d00e7dcba0ae3b5713f12ad31fb3945b83e3539607b6006bfd19e8b1a5fab34980b94b683bc8784d6e90c93052272
-
SSDEEP
24576:W2RtsxfT5Ecc6hwjZhWlkPzYiPnoIs9WoyZpGeWJkRUndufH5NTQ9cjnOAJIsb:rkfTNEfWlQzBPnoIs9WoynWaaAfXTYcj
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language efacf8f271540a7531936e51f57d2631_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language efacf8f271540a7531936e51f57d2631_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3548 efacf8f271540a7531936e51f57d2631_JaffaCakes118.exe 3548 efacf8f271540a7531936e51f57d2631_JaffaCakes118.exe 3548 efacf8f271540a7531936e51f57d2631_JaffaCakes118.exe 3548 efacf8f271540a7531936e51f57d2631_JaffaCakes118.exe 4584 efacf8f271540a7531936e51f57d2631_JaffaCakes118.exe 4584 efacf8f271540a7531936e51f57d2631_JaffaCakes118.exe 4584 efacf8f271540a7531936e51f57d2631_JaffaCakes118.exe 4584 efacf8f271540a7531936e51f57d2631_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4584 efacf8f271540a7531936e51f57d2631_JaffaCakes118.exe 4584 efacf8f271540a7531936e51f57d2631_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3548 wrote to memory of 4584 3548 efacf8f271540a7531936e51f57d2631_JaffaCakes118.exe 82 PID 3548 wrote to memory of 4584 3548 efacf8f271540a7531936e51f57d2631_JaffaCakes118.exe 82 PID 3548 wrote to memory of 4584 3548 efacf8f271540a7531936e51f57d2631_JaffaCakes118.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\efacf8f271540a7531936e51f57d2631_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\efacf8f271540a7531936e51f57d2631_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Users\Admin\AppData\Local\Temp\efacf8f271540a7531936e51f57d2631_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\efacf8f271540a7531936e51f57d2631_JaffaCakes118.exe" /wrapper /dir="C:\Users\Admin\AppData\Local\Temp\pkg_b112a1a90"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4584
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
121B
MD5ad2a6d0856c6c5f9829c32e5eb5a9ce6
SHA145c02b559a0186263d6676a9eb8af8d43fad4ab1
SHA256f7b57f3acfa68d5a5f6cacd464d451a0e47f17c6873fea1a830501ceda5142b5
SHA512d834e56cbc4d61be97a20a832e24eafa3b390c9cfedf6ad2b79c00dcffba60f4b4a4c5f947bcfa8eb80e1c07245064f88c55200bd8d69c19d8bd3581fb307d0f
-
Filesize
798B
MD51d45a29e3511b982a1f91b33c70e964f
SHA1176a47b489be3f27dc354a2b9dd0b580bb2f3904
SHA2560a69c29fe16727b18425df8ded1cfe9d07a380b9f23f1beb32f60fefc000b3dc
SHA512c574719f56a9cc0a3c393001f0774a5826afa5972906d9d9d214a183724a9f7226483a7181a0030e0f801b481a19957761efc170a10850aec786623eb939eb69