Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-10-2024 02:56
Static task
static1
Behavioral task
behavioral1
Sample
15e3d638b0e83ef0ab3db5a2565f4321_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
15e3d638b0e83ef0ab3db5a2565f4321_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
15e3d638b0e83ef0ab3db5a2565f4321_JaffaCakes118.exe
-
Size
111KB
-
MD5
15e3d638b0e83ef0ab3db5a2565f4321
-
SHA1
43d7c7bf6b87451c2b19101f3955a2a5fa6c3837
-
SHA256
d287b5089aaebfa8bc0ebeb3cf0e13b22758fba9cfadf153b62077e1caf96a3f
-
SHA512
971411037b5dcd134f617ca0979c11a8a4d7bdedba22c4af07d5cc2fe655cb5eb3fdf83905d052914395f100ffdc250739c75b951070397183f681e6dfc8614a
-
SSDEEP
3072:TQKqExR2Ch/ZJ27K7MbDR8GoY5/QMd0IvtcToHytctNg9JRVKd:IEbVzsbDRfN3vKToZkV
Malware Config
Signatures
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\svchost.exe" 15e3d638b0e83ef0ab3db5a2565f4321_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/1724-2-0x0000000000400000-0x000000000042C000-memory.dmp upx behavioral1/memory/2172-6-0x0000000000400000-0x000000000042C000-memory.dmp upx behavioral1/memory/2172-8-0x0000000000400000-0x000000000042C000-memory.dmp upx behavioral1/memory/1724-9-0x0000000000400000-0x000000000042C000-memory.dmp upx behavioral1/memory/1724-11-0x0000000000400000-0x000000000042C000-memory.dmp upx behavioral1/memory/2440-13-0x0000000000400000-0x000000000042C000-memory.dmp upx behavioral1/memory/1724-192-0x0000000000400000-0x000000000042C000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 15e3d638b0e83ef0ab3db5a2565f4321_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 15e3d638b0e83ef0ab3db5a2565f4321_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 15e3d638b0e83ef0ab3db5a2565f4321_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1724 wrote to memory of 2172 1724 15e3d638b0e83ef0ab3db5a2565f4321_JaffaCakes118.exe 30 PID 1724 wrote to memory of 2172 1724 15e3d638b0e83ef0ab3db5a2565f4321_JaffaCakes118.exe 30 PID 1724 wrote to memory of 2172 1724 15e3d638b0e83ef0ab3db5a2565f4321_JaffaCakes118.exe 30 PID 1724 wrote to memory of 2172 1724 15e3d638b0e83ef0ab3db5a2565f4321_JaffaCakes118.exe 30 PID 1724 wrote to memory of 2440 1724 15e3d638b0e83ef0ab3db5a2565f4321_JaffaCakes118.exe 33 PID 1724 wrote to memory of 2440 1724 15e3d638b0e83ef0ab3db5a2565f4321_JaffaCakes118.exe 33 PID 1724 wrote to memory of 2440 1724 15e3d638b0e83ef0ab3db5a2565f4321_JaffaCakes118.exe 33 PID 1724 wrote to memory of 2440 1724 15e3d638b0e83ef0ab3db5a2565f4321_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\15e3d638b0e83ef0ab3db5a2565f4321_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\15e3d638b0e83ef0ab3db5a2565f4321_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\15e3d638b0e83ef0ab3db5a2565f4321_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\15e3d638b0e83ef0ab3db5a2565f4321_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\Windows\shell.exe%C:\Users\Admin\AppData\Roaming\Microsoft\Windows2⤵
- System Location Discovery: System Language Discovery
PID:2172
-
-
C:\Users\Admin\AppData\Local\Temp\15e3d638b0e83ef0ab3db5a2565f4321_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\15e3d638b0e83ef0ab3db5a2565f4321_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\dwm.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:2440
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD53f6887b481532c3f8ef4dd79827e16ea
SHA178b546ce003c2d807e7177c2b95d3b7e0eae7797
SHA25650e96525b5be4e14da5f919b63f54ba7712caab2bf16b85f0cb737c231c0a319
SHA51218bb5ccc7dd3c339935b75633d0a18545ae0bdd4ab87719f5e576c805a9d4f9d5744cedce98890f4e70491b0086c95e6742ea47f365750450677ff4f942457b2
-
Filesize
396B
MD5848480020eaf2d8e7c5bae6296076532
SHA1c588398e1516bfc4e4cd67fcaf53cb7e1628ae98
SHA2563cfaf68d6ee2be0c6980c37914eac11798a605ee4386156ffa0df959828b34ea
SHA5129953383f7066b161a6deb2ea567b2662265c22a84dbe4d076068750cebc2e09d4b8c267ff0151455de5288d37195bf2159c9e6f363d15670e7466be18d51ae76
-
Filesize
792B
MD553dd6a72dfdf6300666847ed22d2c393
SHA1407a06e37b00a3b8fdd55fe540729af94f0686fd
SHA2561ff3d32f47961551c4bba5a3469cd70c7088990dc0dce2fd53ac67ee78aba415
SHA5120d91a255c2340966e95ce6c297fc4986341d8a85940fd01e1d1f6aa3a456e090685294cee0a8f8d6c37fd51a6f20bf985537b63c45acfb109c417739d484ff01