Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-09-2024 12:45
Static task
static1
Behavioral task
behavioral1
Sample
fc543ba74b16b61766b773a6d959bce3_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
fc543ba74b16b61766b773a6d959bce3_JaffaCakes118.exe
-
Size
380KB
-
MD5
fc543ba74b16b61766b773a6d959bce3
-
SHA1
73b6afdc7f01ac3e902faddeea97fe0c7687d1fc
-
SHA256
8b572cb42288d11850d39a85649c31cc440626e2c80403a261eb7f9affbaa9d0
-
SHA512
1db8cbe508a8f4f09204e3ccf57a0c2b714a5813aa0303f2bced44b441c7d536bfb8c406ea5a680764369d14d65a93fb10386c281da6bb10bc6002968d58177a
-
SSDEEP
6144:+BUIa/9sgTC0yFRQy6gntOtq7mjfYQqbJoCulex5BuqZ1CfejtUtwXJ+UgsVrHZz:+Na/NTdgCqazYQeoCSEZZ2tGJngsVr1f
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 372 cmd.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc543ba74b16b61766b773a6d959bce3_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2948 wrote to memory of 372 2948 fc543ba74b16b61766b773a6d959bce3_JaffaCakes118.exe 31 PID 2948 wrote to memory of 372 2948 fc543ba74b16b61766b773a6d959bce3_JaffaCakes118.exe 31 PID 2948 wrote to memory of 372 2948 fc543ba74b16b61766b773a6d959bce3_JaffaCakes118.exe 31 PID 2948 wrote to memory of 372 2948 fc543ba74b16b61766b773a6d959bce3_JaffaCakes118.exe 31 PID 372 wrote to memory of 2960 372 cmd.exe 33 PID 372 wrote to memory of 2960 372 cmd.exe 33 PID 372 wrote to memory of 2960 372 cmd.exe 33 PID 372 wrote to memory of 2960 372 cmd.exe 33 PID 372 wrote to memory of 2972 372 cmd.exe 34 PID 372 wrote to memory of 2972 372 cmd.exe 34 PID 372 wrote to memory of 2972 372 cmd.exe 34 PID 372 wrote to memory of 2972 372 cmd.exe 34 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 2960 attrib.exe 2972 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc543ba74b16b61766b773a6d959bce3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fc543ba74b16b61766b773a6d959bce3_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Adobe\FLASHP~1\E16ATM~1.BAT2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Windows\SysWOW64\attrib.exeattrib -R -S -H "C:\Users\Admin\AppData\Local\Temp\fc543ba74b16b61766b773a6d959bce3_JaffaCakes118.exe"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2960
-
-
C:\Windows\SysWOW64\attrib.exeattrib -R -S -H "C:\Users\Admin\AppData\Roaming\Adobe\Flash Player\E16A.tmp.bat"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2972
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
484B
MD526f53e2b5372935cb1b81748c08ee175
SHA12b2a3e94a1c9bb226e9347ca3d65138833348402
SHA256eadecfbe0523739574f4a8baddf7965af9c9e638b45a1a041885a852a01cae3c
SHA512fb52d3db35c45576a1354e07e519ba13cbd38a00f39a3adfae0979fdb52379b44b1030c0d05da30c378dbda6a5e768c2970135852b045fdfeac11e336a90a88d