Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 00:23
Static task
static1
Behavioral task
behavioral1
Sample
1111768988ab81d82d3501263a4f28cb_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1111768988ab81d82d3501263a4f28cb_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
1111768988ab81d82d3501263a4f28cb_JaffaCakes118.exe
-
Size
765KB
-
MD5
1111768988ab81d82d3501263a4f28cb
-
SHA1
47f4b12d5a5ee9eb5e714797a97815706160daaa
-
SHA256
69fd75439221125659bbddaeaa350b6af6efeb7e3b7169854d06afbe75360c61
-
SHA512
8da1220a58b3c70d34c3a10951ab264b87b1eb07effaa4df211b2f3f6780eabb42f216b78daeb0ad4a2c71d3f20b81e1e163ad402c148362483af7a153eab82b
-
SSDEEP
12288:1TGFUwLP4BBwMNLzPhw5+CRUs0WqDKPVy6yuDR4AMbphRXQp73br/WXFJZYU:pIUswBB/NLzPA2shqDI29fSrk
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2384 real.exe 2896 Error.exe -
Loads dropped DLL 3 IoCs
pid Process 2748 1111768988ab81d82d3501263a4f28cb_JaffaCakes118.exe 2748 1111768988ab81d82d3501263a4f28cb_JaffaCakes118.exe 2384 real.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language real.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Error.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1111768988ab81d82d3501263a4f28cb_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2748 1111768988ab81d82d3501263a4f28cb_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2748 wrote to memory of 2384 2748 1111768988ab81d82d3501263a4f28cb_JaffaCakes118.exe 30 PID 2748 wrote to memory of 2384 2748 1111768988ab81d82d3501263a4f28cb_JaffaCakes118.exe 30 PID 2748 wrote to memory of 2384 2748 1111768988ab81d82d3501263a4f28cb_JaffaCakes118.exe 30 PID 2748 wrote to memory of 2384 2748 1111768988ab81d82d3501263a4f28cb_JaffaCakes118.exe 30 PID 2384 wrote to memory of 2896 2384 real.exe 31 PID 2384 wrote to memory of 2896 2384 real.exe 31 PID 2384 wrote to memory of 2896 2384 real.exe 31 PID 2384 wrote to memory of 2896 2384 real.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\1111768988ab81d82d3501263a4f28cb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1111768988ab81d82d3501263a4f28cb_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\real.exe"C:\Users\Admin\AppData\Local\Temp\real.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Roaming\Error.exe"C:\Users\Admin\AppData\Roaming\Error.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2896
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5af6464d0173f1ca8a4fbb55386a47bad
SHA139a3a3a44506f9ccdbece2313de141b3408df59a
SHA25658a6c0af0fb937bc2c3cfda353078f6d38f5a95284ca41c943667b3c8d3ae704
SHA51206503f59b33a12cde8c80ad327ff08c4276c7e0e973b4cfc767d894bd9ca3b222707cd813304254ae0f91db33506468fc968e07e7715809628ca20031be3785e
-
Filesize
368KB
MD57ba41e775fb5becae69f8db95a3abc31
SHA1ed517cede5096fcc9c52e8242fc09151ce5f77d9
SHA2565c8f9477bdcfec12fc98391e76d28b8c633113cc71edf236c42deec593d641f3
SHA512a3546c63eefa5fd151378757ca4a2296844e68ab4c1b90ede2795da62ce25d9a01f3f48ad6bbb26ba55396285130f12608d12bded0e3d6f24df4cedd021348b6