Analysis

  • max time kernel
    149s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    29-09-2024 10:03

General

  • Target

    fe4baf0161dd5b7408dd2d41e64843fe_JaffaCakes118.exe

  • Size

    36KB

  • MD5

    fe4baf0161dd5b7408dd2d41e64843fe

  • SHA1

    75db56ae6754bbc97845ba470e80bc779685cde1

  • SHA256

    638b91a6a31f885370ec2bf325e66683050cc675ebbfab6e7b726e18e3a4070b

  • SHA512

    f9f2f510545418ff38b33cfb517fc276da81415abfa38015af074037106dea722ad7a39a59301e25fd6d5ee19bfd32aecfe0bc89631b3dcf4d45c02da07f7644

  • SSDEEP

    384:/TlCPkepDT6x0121Uc4rcGgiB7bwCrp/Ovw5ITvmPWvvDWSyWN:/B+kepkmrcDIbwCrRITvmPWTRZ

Malware Config

Signatures

  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 10 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fe4baf0161dd5b7408dd2d41e64843fe_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fe4baf0161dd5b7408dd2d41e64843fe_JaffaCakes118.exe"
    1⤵
    • Event Triggered Execution: Image File Execution Options Injection
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:2504

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.PPT.exe

    Filesize

    36KB

    MD5

    fe4baf0161dd5b7408dd2d41e64843fe

    SHA1

    75db56ae6754bbc97845ba470e80bc779685cde1

    SHA256

    638b91a6a31f885370ec2bf325e66683050cc675ebbfab6e7b726e18e3a4070b

    SHA512

    f9f2f510545418ff38b33cfb517fc276da81415abfa38015af074037106dea722ad7a39a59301e25fd6d5ee19bfd32aecfe0bc89631b3dcf4d45c02da07f7644

  • C:\Windows\p4kl3k.html

    Filesize

    160B

    MD5

    bea6c6dd1eb3f3277b4a68731f9abd23

    SHA1

    0cfe5c88ec54540b8a0602f5e6e8ae789ede7291

    SHA256

    570e8068e5a57a90f916b8d2a8e5aeaa39dd962f11d569ccd7302a83673635aa

    SHA512

    4c7d5c49943d8c4831be23cdf32cf9ee571f0e48ee4d12ef1af104ecfdc25dabe96afab8211948c6dd24c4092678d7d3f505722183be5ad3a740cbcbc56de731

  • memory/2504-0-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2504-698-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB