Analysis
-
max time kernel
140s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2024, 17:04
Behavioral task
behavioral1
Sample
434065b3843230d2435d9097b5fb0e1d_JaffaCakes118.exe
Resource
win7-20241010-en
General
-
Target
434065b3843230d2435d9097b5fb0e1d_JaffaCakes118.exe
-
Size
379KB
-
MD5
434065b3843230d2435d9097b5fb0e1d
-
SHA1
6de32d193ed5f77b4f5059d3d10f867b361ac7be
-
SHA256
a062eda79e58ba1908f063c7916514cc7bc54d1fe232d54830393fdfe2c8ab14
-
SHA512
277e8219373406ebf1403e5e010f679c0a8065077b764eb56cb1a608280e94ab32180896b87163e5a9237c947b0c290261296d4fdd57c4052938d33f6f4d4045
-
SSDEEP
6144:U+qn/00gA1pJzXsWuTHgU9xGJRKeOGDykNwS1F8kqslg92YAoS0LE8:is03z8tgkGJRxpw4osO2JoS0LE8
Malware Config
Signatures
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/5052-0-0x0000000000E90000-0x0000000000FCB000-memory.dmp upx behavioral2/memory/5052-5-0x0000000000E90000-0x0000000000FCB000-memory.dmp upx behavioral2/files/0x0007000000023ca1-7.dat upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 434065b3843230d2435d9097b5fb0e1d_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5052 wrote to memory of 1912 5052 434065b3843230d2435d9097b5fb0e1d_JaffaCakes118.exe 93 PID 5052 wrote to memory of 1912 5052 434065b3843230d2435d9097b5fb0e1d_JaffaCakes118.exe 93 PID 5052 wrote to memory of 1912 5052 434065b3843230d2435d9097b5fb0e1d_JaffaCakes118.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\434065b3843230d2435d9097b5fb0e1d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\434065b3843230d2435d9097b5fb0e1d_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\62.bat2⤵
- System Location Discovery: System Language Discovery
PID:1912
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
174B
MD5d9484d314d5d6834ab08413e1f43ae83
SHA187eb82a9d762d128301e0beeeb349767988c2277
SHA256768108e6e702bf298774675913c0df20e25117d6135b79264ba7cbb63285dc1a
SHA51207720ff60ee628fa12aba432384c7344dc02a3c4faa218832902ecda832a97efd07e4dcb17b284be945ab493dfc6c793ac0e7303f8c5e29f974ec28711e49761
-
Filesize
379KB
MD5434065b3843230d2435d9097b5fb0e1d
SHA16de32d193ed5f77b4f5059d3d10f867b361ac7be
SHA256a062eda79e58ba1908f063c7916514cc7bc54d1fe232d54830393fdfe2c8ab14
SHA512277e8219373406ebf1403e5e010f679c0a8065077b764eb56cb1a608280e94ab32180896b87163e5a9237c947b0c290261296d4fdd57c4052938d33f6f4d4045