Analysis
-
max time kernel
140s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 02:50
Static task
static1
Behavioral task
behavioral1
Sample
3819c18cd28edac122fc4e59c7b2b01a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3819c18cd28edac122fc4e59c7b2b01a_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3819c18cd28edac122fc4e59c7b2b01a_JaffaCakes118.exe
-
Size
133KB
-
MD5
3819c18cd28edac122fc4e59c7b2b01a
-
SHA1
d2aac049a8d0f4e2876d7d91289adf29cc364c52
-
SHA256
7f7faf9cfa416e669f99e8f229b8bb47c2e625bce1f0244576d98239d6140957
-
SHA512
df78940de3125c6f08d6e871d1a94edcfa6dad5b293c2521449a1d604ebf8241507a9f578ea431f62b1a7053b4209082f7c80a7bb62acbd670ad2779924f1873
-
SSDEEP
3072:OiENx/emSB0Qjf38w18dLNqgjvhxWQK3kOApPLZohTnG6C:h4mKQj0wkLrvhxWl3GjZ+Y
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\dwm.exe" 3819c18cd28edac122fc4e59c7b2b01a_JaffaCakes118.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2404-2-0x0000000000400000-0x000000000047C000-memory.dmp upx behavioral1/memory/3044-6-0x0000000000400000-0x000000000047C000-memory.dmp upx behavioral1/memory/3044-5-0x0000000000400000-0x000000000047C000-memory.dmp upx behavioral1/memory/2404-9-0x0000000000400000-0x000000000047C000-memory.dmp upx behavioral1/memory/2404-61-0x0000000000400000-0x000000000047C000-memory.dmp upx behavioral1/memory/2612-63-0x0000000000400000-0x000000000047C000-memory.dmp upx behavioral1/memory/2404-144-0x0000000000400000-0x000000000047C000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3819c18cd28edac122fc4e59c7b2b01a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3819c18cd28edac122fc4e59c7b2b01a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3819c18cd28edac122fc4e59c7b2b01a_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2404 wrote to memory of 3044 2404 3819c18cd28edac122fc4e59c7b2b01a_JaffaCakes118.exe 30 PID 2404 wrote to memory of 3044 2404 3819c18cd28edac122fc4e59c7b2b01a_JaffaCakes118.exe 30 PID 2404 wrote to memory of 3044 2404 3819c18cd28edac122fc4e59c7b2b01a_JaffaCakes118.exe 30 PID 2404 wrote to memory of 3044 2404 3819c18cd28edac122fc4e59c7b2b01a_JaffaCakes118.exe 30 PID 2404 wrote to memory of 2612 2404 3819c18cd28edac122fc4e59c7b2b01a_JaffaCakes118.exe 33 PID 2404 wrote to memory of 2612 2404 3819c18cd28edac122fc4e59c7b2b01a_JaffaCakes118.exe 33 PID 2404 wrote to memory of 2612 2404 3819c18cd28edac122fc4e59c7b2b01a_JaffaCakes118.exe 33 PID 2404 wrote to memory of 2612 2404 3819c18cd28edac122fc4e59c7b2b01a_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\3819c18cd28edac122fc4e59c7b2b01a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3819c18cd28edac122fc4e59c7b2b01a_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\3819c18cd28edac122fc4e59c7b2b01a_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\3819c18cd28edac122fc4e59c7b2b01a_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵
- System Location Discovery: System Language Discovery
PID:3044
-
-
C:\Users\Admin\AppData\Local\Temp\3819c18cd28edac122fc4e59c7b2b01a_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\3819c18cd28edac122fc4e59c7b2b01a_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵
- System Location Discovery: System Language Discovery
PID:2612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD53cd2aba1131eb7887d70bd157f291f2d
SHA1f3b12767e519f876b7832584ae6ef6f2d920ea64
SHA2560ebef53140a07577a63afed5ca32f80adabcf4de5378a3925d92696942237edb
SHA5124baa3b82dc741131f3934563cad8da96815a15153d0a6079323a76da84c3c84d32127f095f1a561ef9660366c1495d9fe6005cf2957adcdcc448a824c4a91a22
-
Filesize
300B
MD5cec4d73f7debc680eeb1a4abd2e5092a
SHA1629cccf72d9a28bcd14e9e14540a81a57fdddd0f
SHA2567e34ac7f3223d6b1b0c54c772291b3fbc9255ccae42958425ed01b4ffc737c0a
SHA512f635f1f777e36deded2b66ec8952b8e8ed89aa63e4010e32379af75c175c7b6d07776fc44f52ad6868ba5d9263609abc5b710625ffef5900ead7f7933ee6379a
-
Filesize
696B
MD51722510e37583852721f177dbc983664
SHA1a680f39af793cbae82dbf56c3f4aba9a94d339b9
SHA2564d7d2bc4b988786bc1005236146eedef7430170852eacf6125ac451452937571
SHA512a2e283dfd6782bd91c197a8de3e4d52f38cc7832fcf45ae3e16d51c764e073958011dc097e7e39ad3b08d2645b4ba2dd38faff246a2dcba07a96d20c3c1de1bb