Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2024 01:19
Static task
static1
Behavioral task
behavioral1
Sample
0838e61dd73478a3543717c09f8f91e5_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
0838e61dd73478a3543717c09f8f91e5_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
0838e61dd73478a3543717c09f8f91e5
-
SHA1
e48355f708c62e45183d7b0ba442c3b0b47d9a14
-
SHA256
b29cb62b58b44ca0515f66629277058dcd2b87426a319f343818540294b355e6
-
SHA512
b316cbf548775a04adec2ffd70f754316e001abceb3a247f701614cf9421b2186930f55e111784465e0209a231b110ae22baa365a715529e579a35ddf1dd9530
-
SSDEEP
24576:rADw37P6j9OQGAi2tLZ0EeLNXSaLIYJV6Ns142NrQw:ccLyxHiKZ0DiaLIaV6Ns14YrQ
Malware Config
Signatures
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~2\is240632578.log 0838e61dd73478a3543717c09f8f91e5_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0838e61dd73478a3543717c09f8f91e5_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3368 0838e61dd73478a3543717c09f8f91e5_JaffaCakes118.exe 3368 0838e61dd73478a3543717c09f8f91e5_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0838e61dd73478a3543717c09f8f91e5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0838e61dd73478a3543717c09f8f91e5_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3368
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
156B
MD51ea9e5b417811379e874ad4870d5c51a
SHA1a4bd01f828454f3619a815dbe5423b181ec4051c
SHA256f076773a6e3ae0f1cee3c69232779a1aaaf05202db472040c0c8ea4a70af173a
SHA512965c10d2aa5312602153338da873e8866d2782e0cf633befe5a552b770e08abf47a4d2e007cdef7010c212ebcb9fefea5610c41c7ed1553440eaeab7ddd72daa
-
Filesize
1KB
MD563e5607b6ca179f4022438b4c1ebb8cd
SHA13a51b4c95b4210058242ec0f3025cc28cec16cf6
SHA25686c77fbf9666fae956c11a2711fe2596a03443aeb935bdc430509741cf43e530
SHA51247d51c36a0482c0359282a9c42c3f3380fbcdbd4ce904b0bd3edcd43cbcbf4e694e6ae4ed513f4aabb4d21063bb7e54fbc1953874bd18cde2aec5477f80da502
-
Filesize
3KB
MD598f9b28b30fbfa06b35e880caec410f5
SHA1b9c5ebca5f9b4fd1a02b40be1d89561b0bda1c76
SHA2560aa4af275722cf97ac03536dd5296c0999e34d31ba82a5bf8c4fe5aec57a8f02
SHA512039c38574348b914a18918a445a0be8c03d7f1d02fa23a12d04c735e1694d46ccadf955d07f82fece33ec744aad464e9ca448c363c454d929e263458b135482a
-
Filesize
458B
MD5f047788b88f4dace0e828635437e565f
SHA1159d7a6b7563e4e4756796a83a4c019b3862d86d
SHA2562264c4f20115e93ea2d609e7bc088cb82f0947bc41e65c6cf546e2cabf5f48d7
SHA512a61be4cbeb5ce48263b60d75a07c4614973203b76918d0489f31dd147c8b1a57340189f12a92b98b2ab7365849b12d31f694a6931c90b55b8a336a5990a34790
-
Filesize
991B
MD58a99e16e48ab5bfd0084ccd49281b036
SHA1ab40545bb33ab2bad0891d3b71c3f618a916cb1d
SHA256e44a2c233a1b29a6cb3bdd5955dece4ddd1e7497d3529bb55add8da124ad3fef
SHA512f8b5fd65300cfd1f7554e381d0a3313ce8611aa092b44322c1b59ebc145e915707825f0fcf8e2e979ef6464df713db4d3897f4624f5ab9d777d4f8c4c5ef95cb
-
Filesize
63KB
MD5674ebeb11c056b0cdf01802020b8b41a
SHA116fba8a46be739be737fcce768021a83142dc7eb
SHA256b2f6875b12c8d4d583f93380c34babc18bb027cb15ed4e8a39bfbb5d9848f0b7
SHA51271a826aca996b7db61a23e3011d4b3d9e61469f82620e6c0b08b1c85492d81da0d151d4c9aac6b3c168b53f0e4314bc2af6d5949c1e579f062f2697ae86be40b
-
Filesize
1KB
MD560e7a3f760637dd125a1150474e7f6bb
SHA146e4b53480dd7b3db532e3511a7ad3b9e99b2f48
SHA256d244e6d623fb3706340ead5491bb61663e5d53a3f7d96d4b613175c875c42184
SHA512d279b197d330c4fe7de5e891b45e60273b603d58c84a502461ba2edf008ed51e6bcfd8768a74ee95bc9558bcbe8294f9f759c188327f7c54b1483d1072b32268
-
Filesize
5KB
MD545d8e7f1e721db59eca3dc36e932bf8b
SHA1974fbb730c8c1ae66c6187f99d887f44d8a77a56
SHA256f8cfaea0b23c976a4e7a67ffe79dd82210c5fea7d6eba2383a3cc33f8802ae05
SHA51285b671dc81758977e5f807af91333573e1733ce8ca6721100dbe8538a481d8811d6d36754517948ff6a5ad984bb5ed0724790f43ba30dafdafb8c94735e249bc
-
Filesize
1KB
MD5a4987c1267f6e8361800aa3d2dc840a2
SHA16d428d5e9333f78ffb65f8ac3aab06c8915078a3
SHA2561b7fffc6ecbde629472f7e1b534243f7f7da06a6f2fed082cf1c62b6b002e9d5
SHA5125fc4a1619851dddb8e689cbb342570f3004a7e4c030c593ac361b55584cda6178b3ce6a4baeed810467e569c07587affde5180420d793eb380782f440b23660a