Analysis
-
max time kernel
141s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
01/10/2024, 01:15
Static task
static1
Behavioral task
behavioral1
Sample
03dcf19a3f28e2ca9b4a0d5fafa67ee6_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
03dcf19a3f28e2ca9b4a0d5fafa67ee6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$TEMP/HTxvid.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$TEMP/HTxvid.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Uninstall.exe
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
Uninstall.exe
Resource
win10v2004-20240802-en
General
-
Target
03dcf19a3f28e2ca9b4a0d5fafa67ee6_JaffaCakes118.exe
-
Size
100KB
-
MD5
03dcf19a3f28e2ca9b4a0d5fafa67ee6
-
SHA1
6c5959c9e86cfabf10549d0f2030884beff04de2
-
SHA256
19a01dfe0fded4aa14ae198d6771ff259ee50bf1c17cb936f980bf124db2d41b
-
SHA512
dee1f6ee2c5f68ecd601e753463def541a14cc874c038896e5a5a7f823736cd9d2f8f457d1ef2aef742ba37e0bb4f89478d32d6acb82b2d0ca216e3a5d575fd2
-
SSDEEP
1536:Wdb/vBxIdFlU0AfLhANuIj7Aw6RKEkLLHwU84ivB3Hd8aDCDU/CO1J8qrg:WnilMfONuXw6RdiHwoUBNWY9g
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2840 HTxvid.exe -
Loads dropped DLL 6 IoCs
pid Process 2460 03dcf19a3f28e2ca9b4a0d5fafa67ee6_JaffaCakes118.exe 2460 03dcf19a3f28e2ca9b4a0d5fafa67ee6_JaffaCakes118.exe 3008 WerFault.exe 3008 WerFault.exe 3008 WerFault.exe 3008 WerFault.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3008 2840 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 03dcf19a3f28e2ca9b4a0d5fafa67ee6_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HTxvid.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2460 wrote to memory of 2840 2460 03dcf19a3f28e2ca9b4a0d5fafa67ee6_JaffaCakes118.exe 31 PID 2460 wrote to memory of 2840 2460 03dcf19a3f28e2ca9b4a0d5fafa67ee6_JaffaCakes118.exe 31 PID 2460 wrote to memory of 2840 2460 03dcf19a3f28e2ca9b4a0d5fafa67ee6_JaffaCakes118.exe 31 PID 2460 wrote to memory of 2840 2460 03dcf19a3f28e2ca9b4a0d5fafa67ee6_JaffaCakes118.exe 31 PID 2840 wrote to memory of 3008 2840 HTxvid.exe 32 PID 2840 wrote to memory of 3008 2840 HTxvid.exe 32 PID 2840 wrote to memory of 3008 2840 HTxvid.exe 32 PID 2840 wrote to memory of 3008 2840 HTxvid.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\03dcf19a3f28e2ca9b4a0d5fafa67ee6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\03dcf19a3f28e2ca9b4a0d5fafa67ee6_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\HTxvid.exeC:\Users\Admin\AppData\Local\Temp\HTxvid.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2840 -s 3883⤵
- Loads dropped DLL
- Program crash
PID:3008
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD52462aea139793ce13a3115a5651e75bf
SHA19a61fa2166c8dd8a3dbe905ec92816b6cd497f4e
SHA256767bb70613fc7d1d21b05f666a87f34cc07ae0f6062d26838e52c2d68ee4a7bb
SHA51292dd428b4485d3e8b304fca0e1b57dad66c30dd39f85c55bab652469af79ea6084d5c9d774c61b71c80704bdb8313c0d8053755a8d3ccb6a8a6d00efa95d53bc