Analysis
-
max time kernel
140s -
max time network
66s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29-09-2024 03:18
Static task
static1
Behavioral task
behavioral1
Sample
fdb27374252ddd49e388a5ee1ab465b4_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fdb27374252ddd49e388a5ee1ab465b4_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fdb27374252ddd49e388a5ee1ab465b4_JaffaCakes118.exe
-
Size
160KB
-
MD5
fdb27374252ddd49e388a5ee1ab465b4
-
SHA1
9f67f0d1b68ddcbe1595a1a5b52a68549c3ffc97
-
SHA256
de92d75e7695e2f74cc5ca2066aa4a583f3c8d5a0133b35c7f0856aef26b2324
-
SHA512
b890a0bd46e8da3e17d109ab5162fccfd2ed3737beb30102965445af62f9acda082cbc9de72575d593e8be4036d74a5e0b1f9197ba01e6d674b3996c361755af
-
SSDEEP
3072:WVY0KBbbvSCYoOKUcS4P/KEAZUBhZgGkDP5PKOsOeknOciAnqviLT:Wm0KBvDzOKtDPSEAZkhZgngaBiA
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\E2E47\\27265.exe" fdb27374252ddd49e388a5ee1ab465b4_JaffaCakes118.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2560-4-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2036-16-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2036-14-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2560-17-0x0000000000400000-0x000000000048E000-memory.dmp upx behavioral1/memory/2560-18-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/1516-146-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/1516-147-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2560-148-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/2560-310-0x0000000000400000-0x0000000000491000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fdb27374252ddd49e388a5ee1ab465b4_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2560 wrote to memory of 2036 2560 fdb27374252ddd49e388a5ee1ab465b4_JaffaCakes118.exe 30 PID 2560 wrote to memory of 2036 2560 fdb27374252ddd49e388a5ee1ab465b4_JaffaCakes118.exe 30 PID 2560 wrote to memory of 2036 2560 fdb27374252ddd49e388a5ee1ab465b4_JaffaCakes118.exe 30 PID 2560 wrote to memory of 2036 2560 fdb27374252ddd49e388a5ee1ab465b4_JaffaCakes118.exe 30 PID 2560 wrote to memory of 1516 2560 fdb27374252ddd49e388a5ee1ab465b4_JaffaCakes118.exe 32 PID 2560 wrote to memory of 1516 2560 fdb27374252ddd49e388a5ee1ab465b4_JaffaCakes118.exe 32 PID 2560 wrote to memory of 1516 2560 fdb27374252ddd49e388a5ee1ab465b4_JaffaCakes118.exe 32 PID 2560 wrote to memory of 1516 2560 fdb27374252ddd49e388a5ee1ab465b4_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\fdb27374252ddd49e388a5ee1ab465b4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fdb27374252ddd49e388a5ee1ab465b4_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\fdb27374252ddd49e388a5ee1ab465b4_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\fdb27374252ddd49e388a5ee1ab465b4_JaffaCakes118.exe startC:\Program Files (x86)\LP\658E\AD4.exe%C:\Program Files (x86)\LP\658E2⤵PID:2036
-
-
C:\Users\Admin\AppData\Local\Temp\fdb27374252ddd49e388a5ee1ab465b4_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\fdb27374252ddd49e388a5ee1ab465b4_JaffaCakes118.exe startC:\Program Files (x86)\47975\lvvm.exe%C:\Program Files (x86)\479752⤵PID:1516
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD58ad2af6d71f2353fb6aa96956230f222
SHA1ae8d81ae5961e949775e7984fc2aca5a4ed6396d
SHA25649c0c71cef18ebdecad74b9c4dde890fe39481ec17b9cbe8e8b6cd0e8eb89793
SHA51254489d2c81b5d6afbe82da2817848f572afa98f8b357d6214f9eebd5887295ba3ca1b0ee98e1e0d81c68585f6301c510efe95e407a5f98d0a38dec7c5a09a4a9
-
Filesize
600B
MD53391d8e09e21d33f794087488ee9b8e1
SHA1c495e48d4aa5e6f251f67235a90548e03c25daf3
SHA2561c749e3dc38c535a562ddb11214706b1feaf7777391974cb2a2762fc2b2bbefd
SHA5125174ac51d642f24cbe06dff90c06f9aeec5016f9c0d20c833bab1e4c44c2fc42acd1c5d99b7207218dda8ed3969e2e9c0bda5cb5cdbe5b140534791a3aa807dd
-
Filesize
1KB
MD589ed436125496e59cefeb42287ad18ff
SHA1fbf65b35c0830b4fe7b84bbe6262c57fa9bb957d
SHA2561b30d0d05e083d414b06417872c036677bb8cf48fcb3f4119704cb5dff8731a1
SHA5127f4043927b42626f55e05db7cc8f27174fe975a661fe41a09cacc01259072e9efd20e7474ccb35b910c004c9f47203f887142e4b7878b145097f334148d68134