Analysis

  • max time kernel
    94s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2024, 17:30

General

  • Target

    3b3d1388caae66a76f9b0b0fd750395f_JaffaCakes118.exe

  • Size

    338KB

  • MD5

    3b3d1388caae66a76f9b0b0fd750395f

  • SHA1

    63f0fd44c2c41ec0f42ffa059725f5b36ad7b717

  • SHA256

    f6d2efb89787765b52c97b25a0c333e1a3c46fccecc56be743846d714e9dd0f4

  • SHA512

    9d897b7b8d64cda84bdcadfd049173cf1385a17b8e44b875af6e7d72fd08a079b6d05d1f5f5513898a7f441eb44f84d916300e44686c41046d637c10c335a110

  • SSDEEP

    6144:VFJ0/onZ1KIqfF5edUJb1tg5pIWnALVO6S3xEgfyaomfMCp3TPOUEw:YoZ1KIKp9Jg60Lf7omfj4Ux

Malware Config

Signatures

  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3b3d1388caae66a76f9b0b0fd750395f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3b3d1388caae66a76f9b0b0fd750395f_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:3864

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\nsn9982.tmp\System.dll

          Filesize

          11KB

          MD5

          c17103ae9072a06da581dec998343fc1

          SHA1

          b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

          SHA256

          dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

          SHA512

          d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

        • C:\Users\Admin\AppData\Local\Temp\nsn9982.tmp\inetc.dll

          Filesize

          24KB

          MD5

          ef630cf1898c257df36b1037bd1e5392

          SHA1

          b2c47d9a741d2b5391387059552b37f2daddade2

          SHA256

          41776a77b4e3bba1c3e70d10b9f560248148b8f2c45d39d4cd8683754112860f

          SHA512

          986b405d723294ff5b3649f899bc048c5693bd386dc3f489b390ccb1d56e8e65a9dbe6d0863d553525ce93d505a162eaa087faf4b4c5133345c3330d01327211

        • C:\Users\Admin\AppData\Local\Temp\nsn9982.tmp\nsJSON.dll

          Filesize

          11KB

          MD5

          0638d89d86f0c6681c9e2a111e7210a2

          SHA1

          cdf327be02264e2cea454cc308281116f81d7e3c

          SHA256

          c101e7786d8a79596c2b89ebddf7dc8852734cde7a6bacd5f53b43e37c723c06

          SHA512

          0580084dd572c9129ed5befdd3e271229dfbe0fc0e41ffbefcee210ab841b21c94ae17277d21867204777096bc558c5d970ee995a3d073eb406f29e0cd8611f3

        • C:\Users\Admin\AppData\Local\Temp\nsn9982.tmp\nsisSqlPlugin.dll

          Filesize

          481KB

          MD5

          c7f047508c558cfe9555eef15bbd18e8

          SHA1

          b61463d3e7d5f4c8cdc47f1ed3472ba8aa4e4cd5

          SHA256

          c9fa33cdd8b840d030fb68debcb389a6acfb93c793af7cb96209ca089067fe51

          SHA512

          d53ba1a1f8cc4fd678c56517a5e8a018b45ef7f57419bcf08c1ff13691af5ca094d5772dd1ab4333b845f96bcdba4b61e1673235ebdfdcb2ef4fc7496a1d4f16