Analysis

  • max time kernel
    94s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-10-2024 19:03

General

  • Target

    0705372942260f038effdd3c214b05e4_JaffaCakes118.exe

  • Size

    274KB

  • MD5

    0705372942260f038effdd3c214b05e4

  • SHA1

    f89347d61eebced6dc58d55911888c2420664189

  • SHA256

    a5e4dd7de1e8bf05278812d02e812b4f238f86bc73fe87fa6f4db54dec34e30a

  • SHA512

    3407f8a2da1ecc9ae55c819cce07740ed1a913fbd162d9f8ae1fb69e67cfdc33347032b9be28777b4f83824ccb02172014248cccb628e48558a9f1fb555efeea

  • SSDEEP

    6144:Hf+BLtABPD9FBWKXsSlrVWdmQ41V6GIeydDRA1D049X:pFsSlrVWjY69eyd21DFX

Malware Config

Signatures

  • 44Caliber

    An open source infostealer written in C#.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0705372942260f038effdd3c214b05e4_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0705372942260f038effdd3c214b05e4_JaffaCakes118.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3704

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\44\Process.txt

    Filesize

    931B

    MD5

    32241b0c9dcb72a23ce809361dd3502d

    SHA1

    88b755490d3eba92fb54f496742304684f247ae4

    SHA256

    7dcaf0e5e8e9466dd3206cfd4bc8b03f7b2be53264e9f76fd26363f310957719

    SHA512

    1871e3bc39e99d3f882cd5ac001504f4a87138d6c95122a4e13a0a1937fb229b44544b4e67ed9ed9f40fc200f2bebfff06ddbc80a522d7a85e40cb20ecfcf237

  • C:\Users\Admin\AppData\Roaming\44\Process.txt

    Filesize

    1KB

    MD5

    4227723901e13e4a8f9aa1e3bb96913a

    SHA1

    8d387979f0413b0729894464461a21fb48e5a716

    SHA256

    c7c67e7f53ab0fbfb4faca11ffee01d743c7b22534fe102d6c57ebdce2dd8e39

    SHA512

    054849445d53ffe795104ea062073ea4f737df2a5fe18ec743ba16f17de6059f0d36fa99e18679fcb08334a01ad1606b3e1f9d3c4033dc9e4e2b05ac6d7f8220

  • memory/3704-0-0x00007FF965A33000-0x00007FF965A35000-memory.dmp

    Filesize

    8KB

  • memory/3704-1-0x0000000000770000-0x00000000007BA000-memory.dmp

    Filesize

    296KB

  • memory/3704-31-0x00007FF965A30000-0x00007FF9664F1000-memory.dmp

    Filesize

    10.8MB

  • memory/3704-116-0x00007FF965A30000-0x00007FF9664F1000-memory.dmp

    Filesize

    10.8MB