Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02-10-2024 01:26

General

  • Target

    083f96c88c4cca378204ec120009edf1_JaffaCakes118.exe

  • Size

    430KB

  • MD5

    083f96c88c4cca378204ec120009edf1

  • SHA1

    0a9d745b2e9a3f00608ddc1e9d33b267ae54607b

  • SHA256

    3804dda68537ff8a5436dc878c8617f3b38f083d157d0411cf78bde506d74abc

  • SHA512

    efb60f23284971c761ea2e5a5126367642078ab9660c21a2b98b3f705cde3d6cf06ec7e5047a0ef600b29dac99304ad161ecc8476894a7d0e11bd0f7974f9ee8

  • SSDEEP

    6144:CndkxR6wxuayDWfLSwIgzIAkxzkkMPDJxs3bjrB5NA1A1xYQYUuyeiObMUIgJA4b:idsEwxQt/kkxoDJWPrDii9e8UvgLFY/F

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\083f96c88c4cca378204ec120009edf1_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\083f96c88c4cca378204ec120009edf1_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1980
    • C:\Users\Admin\AppData\Local\Temp\n1s\nchsetup.exe
      "C:\Users\Admin\AppData\Local\Temp\n1s\nchsetup.exe" -installer "C:\Users\Admin\AppData\Local\Temp\083f96c88c4cca378204ec120009edf1_JaffaCakes118.exe" -instdata "C:\Users\Admin\AppData\Local\Temp\n1s\nchdata.dat"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2964

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\n1s\nchsetup.exe

    Filesize

    1.0MB

    MD5

    1ca8c772f3d62871def06a1e0d4275f7

    SHA1

    ea4e9fe0024c313efc9d58bc6f4db0022efe662b

    SHA256

    cb758537d9f3a38901b8b05c3d1644653a1ac71aabdfd09416f0041a6f2453f3

    SHA512

    a6f6eec3a1cea508b3de16fc80dedd7fe83b13b80f8882458fc16e1e59a0ff20dc846fb13b3d696ee7cad6cc7992271fe0e8dc71ab3b32e53e12f3290cbf18a5

  • memory/2964-23-0x0000000000300000-0x0000000000301000-memory.dmp

    Filesize

    4KB