Analysis
-
max time kernel
93s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04-10-2024 22:07
Static task
static1
Behavioral task
behavioral1
Sample
15153dfcc77cdbab6de8262c2de086e4_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
15153dfcc77cdbab6de8262c2de086e4_JaffaCakes118.exe
-
Size
1.0MB
-
MD5
15153dfcc77cdbab6de8262c2de086e4
-
SHA1
aeadbd0809e6ac37468f1abf65d8bd79b890a7eb
-
SHA256
3288e59c9b7f0d3b6d5edf59088b5c8e68cc78b10afead230f7fddf5c7a5aa32
-
SHA512
52bdc69156b14561434487dd3cd3854f8277851edabc9d6d7382e609343ac4d2b510badb4896dc678da84c8c1c48cb2e7f1fccb5a45ae7a63e7df18494a47bdf
-
SSDEEP
12288:m9cnu4Rfl55oUIJM8jo8F7ZPjQZpodiRQYTaMWMJMsgivxl5IbpNm:CcnuktIJM8jjtjMoo+MXJMsgir5IHm
Malware Config
Signatures
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4152 set thread context of 1984 4152 15153dfcc77cdbab6de8262c2de086e4_JaffaCakes118.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 15153dfcc77cdbab6de8262c2de086e4_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 15153dfcc77cdbab6de8262c2de086e4_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1984 15153dfcc77cdbab6de8262c2de086e4_JaffaCakes118.exe 1984 15153dfcc77cdbab6de8262c2de086e4_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1984 15153dfcc77cdbab6de8262c2de086e4_JaffaCakes118.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1984 15153dfcc77cdbab6de8262c2de086e4_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1984 15153dfcc77cdbab6de8262c2de086e4_JaffaCakes118.exe 1984 15153dfcc77cdbab6de8262c2de086e4_JaffaCakes118.exe 1984 15153dfcc77cdbab6de8262c2de086e4_JaffaCakes118.exe 1984 15153dfcc77cdbab6de8262c2de086e4_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4152 wrote to memory of 1984 4152 15153dfcc77cdbab6de8262c2de086e4_JaffaCakes118.exe 82 PID 4152 wrote to memory of 1984 4152 15153dfcc77cdbab6de8262c2de086e4_JaffaCakes118.exe 82 PID 4152 wrote to memory of 1984 4152 15153dfcc77cdbab6de8262c2de086e4_JaffaCakes118.exe 82 PID 4152 wrote to memory of 1984 4152 15153dfcc77cdbab6de8262c2de086e4_JaffaCakes118.exe 82 PID 4152 wrote to memory of 1984 4152 15153dfcc77cdbab6de8262c2de086e4_JaffaCakes118.exe 82 PID 4152 wrote to memory of 1984 4152 15153dfcc77cdbab6de8262c2de086e4_JaffaCakes118.exe 82 PID 4152 wrote to memory of 1984 4152 15153dfcc77cdbab6de8262c2de086e4_JaffaCakes118.exe 82 PID 4152 wrote to memory of 1984 4152 15153dfcc77cdbab6de8262c2de086e4_JaffaCakes118.exe 82 PID 4152 wrote to memory of 1984 4152 15153dfcc77cdbab6de8262c2de086e4_JaffaCakes118.exe 82 PID 4152 wrote to memory of 1984 4152 15153dfcc77cdbab6de8262c2de086e4_JaffaCakes118.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\15153dfcc77cdbab6de8262c2de086e4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\15153dfcc77cdbab6de8262c2de086e4_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Users\Admin\AppData\Local\Temp\15153dfcc77cdbab6de8262c2de086e4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\15153dfcc77cdbab6de8262c2de086e4_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1984
-