Analysis
-
max time kernel
140s -
max time network
24s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 19:15
Static task
static1
Behavioral task
behavioral1
Sample
02e1ed70586b3b78ae3ea693cfb7cf81_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
02e1ed70586b3b78ae3ea693cfb7cf81_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
02e1ed70586b3b78ae3ea693cfb7cf81_JaffaCakes118.exe
-
Size
186KB
-
MD5
02e1ed70586b3b78ae3ea693cfb7cf81
-
SHA1
c6c616fa72bde5966221ed019229c8d940b5e775
-
SHA256
d2c98beb3871d9b2712f57658a83f02672b8f17073c16ba42f357fd3018fb356
-
SHA512
199e940831c17071beb3ddbf4a36a13d51a3843c07cd4ca5a0453c24a20b3bd61c47f33a9f07397757c3b9b820d83ac74d45c4e903a91bb3783ad059fd082fc6
-
SSDEEP
3072:vp2WaGMt0vyWerC9Bz6yEx3vqfdfHQGWkyC0IMBgqFgV4Mam221evY:v4KMUyCh6yW3ydfHQLkuIYFgV4sh1
Malware Config
Signatures
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1756-2-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2800-5-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2800-7-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/1756-10-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2328-74-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2328-75-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/1756-159-0x0000000000400000-0x0000000000445000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 02e1ed70586b3b78ae3ea693cfb7cf81_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 02e1ed70586b3b78ae3ea693cfb7cf81_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 02e1ed70586b3b78ae3ea693cfb7cf81_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1756 wrote to memory of 2800 1756 02e1ed70586b3b78ae3ea693cfb7cf81_JaffaCakes118.exe 29 PID 1756 wrote to memory of 2800 1756 02e1ed70586b3b78ae3ea693cfb7cf81_JaffaCakes118.exe 29 PID 1756 wrote to memory of 2800 1756 02e1ed70586b3b78ae3ea693cfb7cf81_JaffaCakes118.exe 29 PID 1756 wrote to memory of 2800 1756 02e1ed70586b3b78ae3ea693cfb7cf81_JaffaCakes118.exe 29 PID 1756 wrote to memory of 2328 1756 02e1ed70586b3b78ae3ea693cfb7cf81_JaffaCakes118.exe 31 PID 1756 wrote to memory of 2328 1756 02e1ed70586b3b78ae3ea693cfb7cf81_JaffaCakes118.exe 31 PID 1756 wrote to memory of 2328 1756 02e1ed70586b3b78ae3ea693cfb7cf81_JaffaCakes118.exe 31 PID 1756 wrote to memory of 2328 1756 02e1ed70586b3b78ae3ea693cfb7cf81_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\02e1ed70586b3b78ae3ea693cfb7cf81_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\02e1ed70586b3b78ae3ea693cfb7cf81_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\02e1ed70586b3b78ae3ea693cfb7cf81_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\02e1ed70586b3b78ae3ea693cfb7cf81_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2800
-
-
C:\Users\Admin\AppData\Local\Temp\02e1ed70586b3b78ae3ea693cfb7cf81_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\02e1ed70586b3b78ae3ea693cfb7cf81_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2328
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5dc3aa9bff1d4ecff59790bf5bf75f722
SHA1a4ee6c8978dc9b902e0b6fae63c13c2cf31ab132
SHA25678f0706388b78afed6f7cf7b2cf24e304258a61c977e8bb99cbdbd09f3bb06ab
SHA512fe2f63859e15790be43494de716fa22934ad1954aa0d27cc35a581905b8f841d882037b792393da58463558de6e7c6da73289346c746ec5a1617424a45c70031
-
Filesize
300B
MD528de31d63c65302807a8eeaebfdd1abf
SHA170b97fccd052f08703504ec9788822b5796972e8
SHA2565a87bbb1ea5ad8165a2df08e4f2a2a2d8700c1abb3e35a52a7d1205ad82ec33c
SHA5123e75a91e8610b3747e91260b7d7aab56df1205b9a0885302ed8c5e0d659e177ce255a03d8dfdb8935d44f332c5206e79a8878ecc0549a1a302178d861533f0a1
-
Filesize
696B
MD5fb2bf5497d5961aed999894b97b358a5
SHA1c22fa46f1c1486871783f3d23167c04700244572
SHA256b8febd49893e8fa00bceef5d8a295edad342926cc7593545b8b0e4ad05f0bdc9
SHA51267829ba54244a348d978746234716abe2417981818454443a39f1a3698cc62e1ba32d6cc2fc209b8eea1c16c09f084406a68055b3435e2f1f9a163a044e9eb67