Analysis
-
max time kernel
18s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 17:12
Static task
static1
Behavioral task
behavioral1
Sample
0fca29f7ac8e9d4150a9d618f3ba2d12_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0fca29f7ac8e9d4150a9d618f3ba2d12_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0fca29f7ac8e9d4150a9d618f3ba2d12_JaffaCakes118.exe
-
Size
36KB
-
MD5
0fca29f7ac8e9d4150a9d618f3ba2d12
-
SHA1
f4fd5358bfa1e506704b63d42547c2c84ba58738
-
SHA256
0db25c58d7e5ba120001e946c0b49d3cde121452a7a5133dbf2f4090d4c73202
-
SHA512
d05600ceee9e1e231348db4a711c14f31cd969534ef9d1191a404112e3f7ac23ecec344e9c529ce4c63de0ed5d7ec110458cc5bee6f21fa516742acc290969b1
-
SSDEEP
768:0++jvgacEj862pdUupHCquylm7XI8/N0XpW9o:0bnyyupiquyg/l9o
Malware Config
Extracted
Protocol: ftp- Host:
ftp.drivehq.com - Port:
21 - Username:
mama2009 - Password:
ACET6rkC
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2948 2.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2712 timeout.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 396 wrote to memory of 2948 396 0fca29f7ac8e9d4150a9d618f3ba2d12_JaffaCakes118.exe 31 PID 396 wrote to memory of 2948 396 0fca29f7ac8e9d4150a9d618f3ba2d12_JaffaCakes118.exe 31 PID 396 wrote to memory of 2948 396 0fca29f7ac8e9d4150a9d618f3ba2d12_JaffaCakes118.exe 31 PID 396 wrote to memory of 2948 396 0fca29f7ac8e9d4150a9d618f3ba2d12_JaffaCakes118.exe 31 PID 2948 wrote to memory of 2648 2948 2.exe 32 PID 2948 wrote to memory of 2648 2948 2.exe 32 PID 2948 wrote to memory of 2648 2948 2.exe 32 PID 2948 wrote to memory of 2648 2948 2.exe 32 PID 2648 wrote to memory of 2712 2648 cmd.exe 34 PID 2648 wrote to memory of 2712 2648 cmd.exe 34 PID 2648 wrote to memory of 2712 2648 cmd.exe 34 PID 2648 wrote to memory of 2712 2648 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\0fca29f7ac8e9d4150a9d618f3ba2d12_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0fca29f7ac8e9d4150a9d618f3ba2d12_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Users\Admin\AppData\Local\Temp\2.exe"C:\Users\Admin\AppData\Local\Temp\2.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 5 && del C:\Users\Admin\AppData\Local\Temp\2.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\timeout.exetimeout 54⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2712
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
18KB
MD50989d614ddf96428cae80b9f74d13d0f
SHA1dda579611db8d0d6f83c178371dda3f5b7b34205
SHA256adced6fc85e7255c5d427237b19b31c1b4f3d1d51f16c1908ef3b768d8f3d8f4
SHA51272890f8d82b30899474db025280bdfea4f960000a782b30749535abfff0fa129565ee16a40dcfb00274e4ece5058ed843f3db7289956eb91cc9071c07c5f01f3