Analysis
-
max time kernel
140s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-10-2024 01:32
Static task
static1
Behavioral task
behavioral1
Sample
03e6fa84e4ab6243671f14563aad7b51_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
03e6fa84e4ab6243671f14563aad7b51_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
03e6fa84e4ab6243671f14563aad7b51_JaffaCakes118.exe
-
Size
156KB
-
MD5
03e6fa84e4ab6243671f14563aad7b51
-
SHA1
8e25bf8717f007832ec54a82060ef6a16e748044
-
SHA256
6da5b6896b3181ad14991340d6886cae627aae9bbee58ef2cded692267c1f7ca
-
SHA512
40d014b72f9eb47637d78156bd73bfa884dc7d7e22a243f9b4218c6124e687ac3d685a56b30121c772f8d618f1fffa009c9992fd7d93736e9d90545df8bff5a0
-
SSDEEP
3072:CYiYqa4rWYd3HANohGG6QvXhRAzj8qtDak0ZQRYrKBvevjG2D:CnaA3gNsh6Q3AX8C2/QRYqvqf
Malware Config
Signatures
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\conhost.exe" 03e6fa84e4ab6243671f14563aad7b51_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2956-1-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/2884-8-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/2956-19-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/2956-76-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/1060-78-0x0000000000400000-0x0000000000442000-memory.dmp upx behavioral1/memory/2956-185-0x0000000000400000-0x0000000000442000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 03e6fa84e4ab6243671f14563aad7b51_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 03e6fa84e4ab6243671f14563aad7b51_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 03e6fa84e4ab6243671f14563aad7b51_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2956 wrote to memory of 2884 2956 03e6fa84e4ab6243671f14563aad7b51_JaffaCakes118.exe 31 PID 2956 wrote to memory of 2884 2956 03e6fa84e4ab6243671f14563aad7b51_JaffaCakes118.exe 31 PID 2956 wrote to memory of 2884 2956 03e6fa84e4ab6243671f14563aad7b51_JaffaCakes118.exe 31 PID 2956 wrote to memory of 2884 2956 03e6fa84e4ab6243671f14563aad7b51_JaffaCakes118.exe 31 PID 2956 wrote to memory of 1060 2956 03e6fa84e4ab6243671f14563aad7b51_JaffaCakes118.exe 33 PID 2956 wrote to memory of 1060 2956 03e6fa84e4ab6243671f14563aad7b51_JaffaCakes118.exe 33 PID 2956 wrote to memory of 1060 2956 03e6fa84e4ab6243671f14563aad7b51_JaffaCakes118.exe 33 PID 2956 wrote to memory of 1060 2956 03e6fa84e4ab6243671f14563aad7b51_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\03e6fa84e4ab6243671f14563aad7b51_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\03e6fa84e4ab6243671f14563aad7b51_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Users\Admin\AppData\Local\Temp\03e6fa84e4ab6243671f14563aad7b51_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\03e6fa84e4ab6243671f14563aad7b51_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2884
-
-
C:\Users\Admin\AppData\Local\Temp\03e6fa84e4ab6243671f14563aad7b51_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\03e6fa84e4ab6243671f14563aad7b51_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:1060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5dfb81914aab277b0e157eaa14c2d2d96
SHA1b35ef8fbc73093255cc36ca5f59bd899a58991b8
SHA2568cac2058698c58c99400b36ec711ca9e5fee3d49715eecb23e525ef84afbda76
SHA512fb8dd3670e349d63ee006b7937ef4e57c1675477393d3bc3ab3ff07634553f6f18ed6b939d62d2a2ac58cb9aa95599f55b970606426b98a9d5e18b07b27735c4
-
Filesize
597B
MD5308efb4c1537bbdb2796de17174f3c32
SHA188e12f2287a575ee328835324fbff1a86adb4ebc
SHA256433de5283479c8781ddf5c3c3ab5c53c35ab6dfd03494083ad27039256277684
SHA512707af4544e8d7eb5568efa116adfd853b1a9dffc763835aa654079bd77335e4259520db0458710d76c484ea85c1978df5dea09c90ab1a408469ff89622f86f0e
-
Filesize
897B
MD58af7fc4be54e2218b7f878750f0c333f
SHA127e6105f21810de27a3a53facf0ee79edfa1f2a2
SHA256e6bab52d7cac49c2cba1fb225b4ae1118cf076bb4ffde8ad39f830cec55a67f9
SHA51270fd24eb88f762cc100863671a55f3fa8fba20f02556ac11410aa072928d9145e8d9580741e4b952e5d6c775370829ff8aa7440f7bed2ae331fd3d2ea8a80f13
-
Filesize
1KB
MD583fcfaf3f21373392f8d2d6805d2a657
SHA15e916d0a6a9d9acebf55cae351dc895c2a699e33
SHA2563d8abf131ed570e7b5d72f65f0ac8b20a59ed8cadc555699017c753cc6edd034
SHA512c76ca78062366b9509ed50a3b5e6bd5d87cced4cedf57c5ad846f43509a77c4e4880b7b1d8531dc1afa9d35187fb77258768e4924d3d6c6c3de658a3342b5483