Analysis

  • max time kernel
    140s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05-10-2024 02:56

General

  • Target

    15e3d638b0e83ef0ab3db5a2565f4321_JaffaCakes118.exe

  • Size

    111KB

  • MD5

    15e3d638b0e83ef0ab3db5a2565f4321

  • SHA1

    43d7c7bf6b87451c2b19101f3955a2a5fa6c3837

  • SHA256

    d287b5089aaebfa8bc0ebeb3cf0e13b22758fba9cfadf153b62077e1caf96a3f

  • SHA512

    971411037b5dcd134f617ca0979c11a8a4d7bdedba22c4af07d5cc2fe655cb5eb3fdf83905d052914395f100ffdc250739c75b951070397183f681e6dfc8614a

  • SSDEEP

    3072:TQKqExR2Ch/ZJ27K7MbDR8GoY5/QMd0IvtcToHytctNg9JRVKd:IEbVzsbDRfN3vKToZkV

Malware Config

Signatures

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\15e3d638b0e83ef0ab3db5a2565f4321_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\15e3d638b0e83ef0ab3db5a2565f4321_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1724
    • C:\Users\Admin\AppData\Local\Temp\15e3d638b0e83ef0ab3db5a2565f4321_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\15e3d638b0e83ef0ab3db5a2565f4321_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\Windows\shell.exe%C:\Users\Admin\AppData\Roaming\Microsoft\Windows
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2172
    • C:\Users\Admin\AppData\Local\Temp\15e3d638b0e83ef0ab3db5a2565f4321_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\15e3d638b0e83ef0ab3db5a2565f4321_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\dwm.exe%C:\Users\Admin\AppData\Local\Temp
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2440

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\stor.cfg

    Filesize

    1KB

    MD5

    3f6887b481532c3f8ef4dd79827e16ea

    SHA1

    78b546ce003c2d807e7177c2b95d3b7e0eae7797

    SHA256

    50e96525b5be4e14da5f919b63f54ba7712caab2bf16b85f0cb737c231c0a319

    SHA512

    18bb5ccc7dd3c339935b75633d0a18545ae0bdd4ab87719f5e576c805a9d4f9d5744cedce98890f4e70491b0086c95e6742ea47f365750450677ff4f942457b2

  • C:\Users\Admin\AppData\Roaming\Microsoft\stor.cfg

    Filesize

    396B

    MD5

    848480020eaf2d8e7c5bae6296076532

    SHA1

    c588398e1516bfc4e4cd67fcaf53cb7e1628ae98

    SHA256

    3cfaf68d6ee2be0c6980c37914eac11798a605ee4386156ffa0df959828b34ea

    SHA512

    9953383f7066b161a6deb2ea567b2662265c22a84dbe4d076068750cebc2e09d4b8c267ff0151455de5288d37195bf2159c9e6f363d15670e7466be18d51ae76

  • C:\Users\Admin\AppData\Roaming\Microsoft\stor.cfg

    Filesize

    792B

    MD5

    53dd6a72dfdf6300666847ed22d2c393

    SHA1

    407a06e37b00a3b8fdd55fe540729af94f0686fd

    SHA256

    1ff3d32f47961551c4bba5a3469cd70c7088990dc0dce2fd53ac67ee78aba415

    SHA512

    0d91a255c2340966e95ce6c297fc4986341d8a85940fd01e1d1f6aa3a456e090685294cee0a8f8d6c37fd51a6f20bf985537b63c45acfb109c417739d484ff01

  • memory/1724-1-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/1724-2-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/1724-9-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/1724-11-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/1724-192-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2172-6-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2172-8-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2440-13-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB