Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-10-2024 01:06
Static task
static1
Behavioral task
behavioral1
Sample
2830127daab146b954d4ff09454b515c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2830127daab146b954d4ff09454b515c_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2830127daab146b954d4ff09454b515c_JaffaCakes118.exe
-
Size
524KB
-
MD5
2830127daab146b954d4ff09454b515c
-
SHA1
c09dd712c459b271d1cec52e47069d747751b993
-
SHA256
c9a8913fecb51bcd2b17572e2cf9ed0d678ee4f73fe26d8f3211c9b3c2d34493
-
SHA512
c5ca06bb9e5384b3d4f9e4d6844d5834477428f8d5b458da638eb3a2d284bd6b711b58be5e0fab610ed6e5883bcb4e0b0c6f15c271c4267db8814d749fc0c243
-
SSDEEP
6144:VSrwtsEV9sc4SfNsQp/1xJXaopZx9DeocBHSFZeMfQg+PtjORc/U59y:VNV9wSfh1xJXHtACZepg+PtjyOo9
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2576 cmd.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2688 set thread context of 2756 2688 2830127daab146b954d4ff09454b515c_JaffaCakes118.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2830127daab146b954d4ff09454b515c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2830127daab146b954d4ff09454b515c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2720 timeout.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2688 wrote to memory of 2756 2688 2830127daab146b954d4ff09454b515c_JaffaCakes118.exe 30 PID 2688 wrote to memory of 2756 2688 2830127daab146b954d4ff09454b515c_JaffaCakes118.exe 30 PID 2688 wrote to memory of 2756 2688 2830127daab146b954d4ff09454b515c_JaffaCakes118.exe 30 PID 2688 wrote to memory of 2756 2688 2830127daab146b954d4ff09454b515c_JaffaCakes118.exe 30 PID 2688 wrote to memory of 2756 2688 2830127daab146b954d4ff09454b515c_JaffaCakes118.exe 30 PID 2688 wrote to memory of 2756 2688 2830127daab146b954d4ff09454b515c_JaffaCakes118.exe 30 PID 2688 wrote to memory of 2756 2688 2830127daab146b954d4ff09454b515c_JaffaCakes118.exe 30 PID 2688 wrote to memory of 2756 2688 2830127daab146b954d4ff09454b515c_JaffaCakes118.exe 30 PID 2688 wrote to memory of 2756 2688 2830127daab146b954d4ff09454b515c_JaffaCakes118.exe 30 PID 2688 wrote to memory of 2756 2688 2830127daab146b954d4ff09454b515c_JaffaCakes118.exe 30 PID 2756 wrote to memory of 2576 2756 2830127daab146b954d4ff09454b515c_JaffaCakes118.exe 31 PID 2756 wrote to memory of 2576 2756 2830127daab146b954d4ff09454b515c_JaffaCakes118.exe 31 PID 2756 wrote to memory of 2576 2756 2830127daab146b954d4ff09454b515c_JaffaCakes118.exe 31 PID 2756 wrote to memory of 2576 2756 2830127daab146b954d4ff09454b515c_JaffaCakes118.exe 31 PID 2576 wrote to memory of 2720 2576 cmd.exe 33 PID 2576 wrote to memory of 2720 2576 cmd.exe 33 PID 2576 wrote to memory of 2720 2576 cmd.exe 33 PID 2576 wrote to memory of 2720 2576 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\2830127daab146b954d4ff09454b515c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2830127daab146b954d4ff09454b515c_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\2830127daab146b954d4ff09454b515c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\2830127daab146b954d4ff09454b515c_JaffaCakes118.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 5 && del C:\Users\Admin\AppData\Local\Temp\283012~1.EXE3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\SysWOW64\timeout.exetimeout 54⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2720
-
-
-