Analysis
-
max time kernel
141s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12-10-2024 00:58
Static task
static1
Behavioral task
behavioral1
Sample
37add54baa4b54abb71c5b2efabdef43_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
37add54baa4b54abb71c5b2efabdef43_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
37add54baa4b54abb71c5b2efabdef43_JaffaCakes118.exe
-
Size
109KB
-
MD5
37add54baa4b54abb71c5b2efabdef43
-
SHA1
774b6ce162b9adf860de3366f3a27cc466808520
-
SHA256
e53c5944155189e31ca3ffe3a7d246dbb3c28ac35c72967df0e362d25074e01e
-
SHA512
11862131f72252a5c32580c2198ad14dd987db52310f038d511bab26fecec0f4c191ac580e25722c35c27da34e4ea4c3ca46d995eeb8ca4e58544ff05e4af267
-
SSDEEP
1536:rYPH+nxyQrtjljAOhi0OSTqVwSwpMMeXqpusBi0G5V4Dm1TXGDwOFUmV0LQUfMjV:rYP+nb5jlAOwvwSwpzeNsWVl7I+LQ4/
Malware Config
Signatures
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 37add54baa4b54abb71c5b2efabdef43_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 37add54baa4b54abb71c5b2efabdef43_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 37add54baa4b54abb71c5b2efabdef43_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2860 wrote to memory of 2776 2860 37add54baa4b54abb71c5b2efabdef43_JaffaCakes118.exe 30 PID 2860 wrote to memory of 2776 2860 37add54baa4b54abb71c5b2efabdef43_JaffaCakes118.exe 30 PID 2860 wrote to memory of 2776 2860 37add54baa4b54abb71c5b2efabdef43_JaffaCakes118.exe 30 PID 2860 wrote to memory of 2776 2860 37add54baa4b54abb71c5b2efabdef43_JaffaCakes118.exe 30 PID 2860 wrote to memory of 2684 2860 37add54baa4b54abb71c5b2efabdef43_JaffaCakes118.exe 32 PID 2860 wrote to memory of 2684 2860 37add54baa4b54abb71c5b2efabdef43_JaffaCakes118.exe 32 PID 2860 wrote to memory of 2684 2860 37add54baa4b54abb71c5b2efabdef43_JaffaCakes118.exe 32 PID 2860 wrote to memory of 2684 2860 37add54baa4b54abb71c5b2efabdef43_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\37add54baa4b54abb71c5b2efabdef43_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\37add54baa4b54abb71c5b2efabdef43_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\37add54baa4b54abb71c5b2efabdef43_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\37add54baa4b54abb71c5b2efabdef43_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:2776
-
-
C:\Users\Admin\AppData\Local\Temp\37add54baa4b54abb71c5b2efabdef43_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\37add54baa4b54abb71c5b2efabdef43_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\Windows\shell.exe%C:\Users\Admin\AppData\Roaming\Microsoft\Windows2⤵
- System Location Discovery: System Language Discovery
PID:2684
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5ac2caedc20eb796aef8421a8a88a8429
SHA1449d7f2da4dc4bf9f7aa6e697b74758f2070894d
SHA256c419c90860a31358e911fd05fc12216847f702aa67e880e750788f8b262cce1a
SHA512ed92fbbe4193bd38c2b57ec149a46cfe23164d43d166443ca38eaa1aeddd526069daff84a8f466b6f145e4edc3030cf8dbc63753984801b087b7c733836cc37f
-
Filesize
396B
MD59f21044c571b004175db80579964b8b8
SHA16f937100e406ee6dc6ec121ee36418e47f15936c
SHA25697fada9a356c8447243f8002f9068422f6df645f495f1074c729150d8217b202
SHA51288ed3c21d7c927930ae7b389f444d1113726011e9196e33691335eacc91f1e8957ed2acb521873670616964254920d3f181150da05c6be6ecb54d2849b7f20c9
-
Filesize
792B
MD5da3421444fca01a155f3092055d7c9ff
SHA14f4bf08f78b9494b5f18a22ed11a260d70686dda
SHA256b685fcf570290f18cbbaaf72003bf6e3acd5364a7d00d5c58f56da6d32f6cd64
SHA512c6a2ee5ad5b7022100dfd2132317fe80129bc786a6a4218c687333c5206a2d0880dd99517af01c09b3bf9394249d93d7404c2a636b4466d0f85540cad2c339e5