Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
09-10-2024 09:32
Static task
static1
Behavioral task
behavioral1
Sample
2ebaa765ee57140e04174bf3b363d7b9_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2ebaa765ee57140e04174bf3b363d7b9_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2ebaa765ee57140e04174bf3b363d7b9_JaffaCakes118.exe
-
Size
15KB
-
MD5
2ebaa765ee57140e04174bf3b363d7b9
-
SHA1
d74590f6fb274500401a0d3b5b4dc0102b3e814c
-
SHA256
62a05a2ee38a77602c355b0ec58fcabc1b5e4e7733f03a701a47829790117c9e
-
SHA512
b3705689d8355fa096b8355d623b5114a795b67f6e0bd32d3207f72f4057d684ef6a62bee2e2c03c16133a1dbac0a6872e828d3b1946eedf424e6943a6decbb7
-
SSDEEP
384:n0PaAUXesQsHemGaLfLZ7v+J+74fAR84u+k:0PayAe6l25fAR8
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2692 cmd.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2ebaa765ee57140e04174bf3b363d7b9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2ebaa765ee57140e04174bf3b363d7b9_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 2ebaa765ee57140e04174bf3b363d7b9_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 2ebaa765ee57140e04174bf3b363d7b9_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2432 2ebaa765ee57140e04174bf3b363d7b9_JaffaCakes118.exe 2432 2ebaa765ee57140e04174bf3b363d7b9_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2432 wrote to memory of 2692 2432 2ebaa765ee57140e04174bf3b363d7b9_JaffaCakes118.exe 30 PID 2432 wrote to memory of 2692 2432 2ebaa765ee57140e04174bf3b363d7b9_JaffaCakes118.exe 30 PID 2432 wrote to memory of 2692 2432 2ebaa765ee57140e04174bf3b363d7b9_JaffaCakes118.exe 30 PID 2432 wrote to memory of 2692 2432 2ebaa765ee57140e04174bf3b363d7b9_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ebaa765ee57140e04174bf3b363d7b9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ebaa765ee57140e04174bf3b363d7b9_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Users\Admin\AppData\Local\Temp\2ebaa765ee57140e04174bf3b363d7b9_JaffaCakes118.exe" >> NUL2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD53eaba9676e64a87f6cbb54139e34e186
SHA106b63390c1b58518ffb3facb151acb8e23bf9454
SHA256e55bdb7fe62fa12d44424ab06b9d0a45959e70817a243a8079bfe4e4ae93f213
SHA512c642445aefd269eb99bcb7037d481e6b72aa5b2b6b0146e462042022cb3cf23641fdc643aea18b0948320101c2060d8a0787bbd75743e22ce287a44fbc61ece7