Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/10/2024, 19:21
Static task
static1
Behavioral task
behavioral1
Sample
07159846b125cc2ed630965f08131b39_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
07159846b125cc2ed630965f08131b39_JaffaCakes118.exe
-
Size
181KB
-
MD5
07159846b125cc2ed630965f08131b39
-
SHA1
58f9daefda4768c33c04a5dfbf92abd877c05d31
-
SHA256
e6ff2232a84f551491ca4342b49a8cd260fa5615b26e4d54d0a5f7386adab162
-
SHA512
08acd83de2f18bd1a4ced8d46327f994ce743ea85cd05b68d68e25e3ef6dcd78e2e687626b7e55db1b4385d6614c056074ad4939eaaa46009b11ed42c4979a9e
-
SSDEEP
3072:oFU88rTSCEEkBmwOVYrPBlGRg9t7TbQxkfOGdI/SAuU:oF/8sx+6iRgPDfR6SAuU
Malware Config
Signatures
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2100-1-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/3024-9-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/3024-7-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/2100-14-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/2360-82-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/2360-80-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/2100-198-0x0000000000400000-0x000000000044E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 07159846b125cc2ed630965f08131b39_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 07159846b125cc2ed630965f08131b39_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 07159846b125cc2ed630965f08131b39_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2100 wrote to memory of 3024 2100 07159846b125cc2ed630965f08131b39_JaffaCakes118.exe 30 PID 2100 wrote to memory of 3024 2100 07159846b125cc2ed630965f08131b39_JaffaCakes118.exe 30 PID 2100 wrote to memory of 3024 2100 07159846b125cc2ed630965f08131b39_JaffaCakes118.exe 30 PID 2100 wrote to memory of 3024 2100 07159846b125cc2ed630965f08131b39_JaffaCakes118.exe 30 PID 2100 wrote to memory of 2360 2100 07159846b125cc2ed630965f08131b39_JaffaCakes118.exe 33 PID 2100 wrote to memory of 2360 2100 07159846b125cc2ed630965f08131b39_JaffaCakes118.exe 33 PID 2100 wrote to memory of 2360 2100 07159846b125cc2ed630965f08131b39_JaffaCakes118.exe 33 PID 2100 wrote to memory of 2360 2100 07159846b125cc2ed630965f08131b39_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\07159846b125cc2ed630965f08131b39_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\07159846b125cc2ed630965f08131b39_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\07159846b125cc2ed630965f08131b39_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\07159846b125cc2ed630965f08131b39_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:3024
-
-
C:\Users\Admin\AppData\Local\Temp\07159846b125cc2ed630965f08131b39_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\07159846b125cc2ed630965f08131b39_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵
- System Location Discovery: System Language Discovery
PID:2360
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
600B
MD565242bbe92ccea49f3b2297aec43265d
SHA184511ac129c385a900c82fee7758b21a83eecf4f
SHA2565df4f440cee8c3e105112d45170810ff4ea63326935509c324c72b2bab0a789f
SHA5120cb066c1dc6a3e9fd77eb4d21a6a7382e84cb3219688786d7557d5954ccba08e0e7f9c37f4c78471aa825e161ed77a0a278462a287eea63043b0f36523603bd1
-
Filesize
1KB
MD511004ddc68d3389f7cbc8a8f0b5c0add
SHA18fee645812154c3f2a1ce5c32e59b3eba57441d7
SHA2562968b338d83c5abb01e777db2c95ac9f55a0b2b40558132b24e259f2b4471be0
SHA512be6b45aa405f28465f9564983658e3ac238031962db870db78f85d8acaa9bdbdfbacdf5b2e64a9ed2654acc1ada8957d48cd9850557d9053c2d05f5f0149b91e
-
Filesize
996B
MD5f90d7e91da413654216e88a311881553
SHA18e4756365da6639c0b7a3ba24efc950c68605657
SHA256bb772d162759bb65b0f5bf75db090365229ba0a373e893d78a9e2ee3b4e3e460
SHA512996b34986a460d76ba3bb893e7d4b17f8e5b71d9775754605a2f30414e9526c79d69404a1f54925cb36d49332cedb837e722e1141b9513cce2d40f2c1e9419b9