Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    29-09-2024 04:54

General

  • Target

    fdd689adb03ff451f05983e1015f25d5_JaffaCakes118.exe

  • Size

    963KB

  • MD5

    fdd689adb03ff451f05983e1015f25d5

  • SHA1

    7bb3f7a976b078b47c9536bb01df68ab9c42d57f

  • SHA256

    91bf8e16c9b8c1c9a508222eb8fcc25c1fd33d74eb60a3551e8efc5a557ae704

  • SHA512

    eb3fbfcb938229b5dcf8e21dd06c62fbcdfd4d4095eeec618623c3bf2223dfd500fbb80d076beba9e20b6a4bc88980be3a7e272012700eef235350351d4e18a3

  • SSDEEP

    24576:YGJoyxOsGnS6tg3k2FORO5AvDwlk0hhHF1dZQAihacSpyqBc2:YUlOsGnSa2FORO5A90DndZ4hxac2

Malware Config

Signatures

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fdd689adb03ff451f05983e1015f25d5_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fdd689adb03ff451f05983e1015f25d5_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:1788

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\bottom.jpg

    Filesize

    1KB

    MD5

    2a02f5cfb8ab6ef8da96cb6319199ec1

    SHA1

    e835817901cae81eb1a88cd76b08dc00b2e27111

    SHA256

    24f374f557014d78b3a19a6595caabedc7e9c496bcbfca3a84f0f4ff17196225

    SHA512

    05313d9c0d5af986f90c3b000074037bf8399fa5d9a29b8e7c9093dd748fb8ea8d66e51d443e0a8c2aa908f59e37d6ddc49b2f62141d15cc4f1fad1aa897fa3d

  • C:\Users\Admin\AppData\Local\Temp\header.jpg

    Filesize

    3KB

    MD5

    1fffd38bcbcddd52c8f171812c897e14

    SHA1

    753f8226acab4970537358973d3aa9cff789617a

    SHA256

    e065105abe1d41c492e6097958e497cbf120589122d15c04a0791c30f63a770f

    SHA512

    b092d5e2ca6623a2875b8e9005a27c189cc2ac6cdf7815f4da179d253ac0419a7ae16e96f9357b09655b843d9d71842a94d9faa62415d74df3b2bc0b643e7a8d

  • C:\Users\Admin\AppData\Local\Temp\side.jpg

    Filesize

    27KB

    MD5

    60f34e6b09d2244e5576131dc91e1631

    SHA1

    144183bb0d4de6ced00d2c0c0fe32bb51f744fe6

    SHA256

    317ccb762831c8cd4e64e45a5368ab53e34eb64b0fc09fb6cf68ddde97119c1a

    SHA512

    b544b05e8486e8faa581a7874a7084ed7331e499b8c68110ff2b816516c62c10b87afc01d5e782b9e534c3f209a738e13d75b94c81426830a93b6f2c18b357cd