Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17/10/2024, 21:44
Static task
static1
Behavioral task
behavioral1
Sample
53e2ba476c8711cc76f2ed60c9c9e5ff_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
53e2ba476c8711cc76f2ed60c9c9e5ff_JaffaCakes118.exe
-
Size
656KB
-
MD5
53e2ba476c8711cc76f2ed60c9c9e5ff
-
SHA1
df701dcddc914d53931c888da736b13ac3be5ce5
-
SHA256
63889b4c0b857f84b7040d90ad392ff8e063d47bc9e37a414fb60cd4607de070
-
SHA512
827c554eacfbb44d029073c262f3b898a025293eb671f99b50f82adb0030713f206c532727eaeeaf14c63d27dc3a427a4c89eb7c01ecd1cc8d70636586a844ae
-
SSDEEP
12288:hzyMJfsziYA0PARKzG6JG8mrTOR3cZUACciqSvEqRZrAcFIUzU64GvKmUioPu0DT:JyMJfs2d0YRKJG84fdCcjSvEqLrZ38z1
Malware Config
Signatures
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/864-4-0x00000000023C0000-0x00000000024FA000-memory.dmp upx behavioral2/memory/864-5-0x00000000023C0000-0x00000000024FA000-memory.dmp upx behavioral2/memory/864-1-0x00000000023C0000-0x00000000024FA000-memory.dmp upx behavioral2/memory/864-88-0x00000000023C0000-0x00000000024FA000-memory.dmp upx behavioral2/memory/864-91-0x00000000023C0000-0x00000000024FA000-memory.dmp upx behavioral2/memory/864-89-0x00000000023C0000-0x00000000024FA000-memory.dmp upx behavioral2/memory/864-90-0x00000000023C0000-0x00000000024FA000-memory.dmp upx behavioral2/memory/864-92-0x00000000023C0000-0x00000000024FA000-memory.dmp upx behavioral2/memory/864-108-0x00000000023C0000-0x00000000024FA000-memory.dmp upx behavioral2/memory/864-115-0x00000000023C0000-0x00000000024FA000-memory.dmp upx behavioral2/memory/864-129-0x00000000023C0000-0x00000000024FA000-memory.dmp upx behavioral2/memory/864-135-0x00000000023C0000-0x00000000024FA000-memory.dmp upx behavioral2/memory/864-151-0x00000000023C0000-0x00000000024FA000-memory.dmp upx behavioral2/memory/864-133-0x00000000023C0000-0x00000000024FA000-memory.dmp upx behavioral2/memory/864-132-0x00000000023C0000-0x00000000024FA000-memory.dmp upx behavioral2/memory/864-131-0x00000000023C0000-0x00000000024FA000-memory.dmp upx behavioral2/memory/864-130-0x00000000023C0000-0x00000000024FA000-memory.dmp upx behavioral2/memory/864-128-0x00000000023C0000-0x00000000024FA000-memory.dmp upx behavioral2/memory/864-142-0x00000000023C0000-0x00000000024FA000-memory.dmp upx behavioral2/memory/864-127-0x00000000023C0000-0x00000000024FA000-memory.dmp upx behavioral2/memory/864-123-0x00000000023C0000-0x00000000024FA000-memory.dmp upx behavioral2/memory/864-124-0x00000000023C0000-0x00000000024FA000-memory.dmp upx behavioral2/memory/864-157-0x00000000023C0000-0x00000000024FA000-memory.dmp upx behavioral2/memory/864-160-0x00000000023C0000-0x00000000024FA000-memory.dmp upx behavioral2/memory/864-155-0x00000000023C0000-0x00000000024FA000-memory.dmp upx behavioral2/memory/864-161-0x00000000023C0000-0x00000000024FA000-memory.dmp upx behavioral2/memory/864-163-0x00000000023C0000-0x00000000024FA000-memory.dmp upx behavioral2/memory/864-165-0x00000000023C0000-0x00000000024FA000-memory.dmp upx behavioral2/memory/864-164-0x00000000023C0000-0x00000000024FA000-memory.dmp upx behavioral2/memory/864-166-0x00000000023C0000-0x00000000024FA000-memory.dmp upx behavioral2/memory/864-167-0x00000000023C0000-0x00000000024FA000-memory.dmp upx behavioral2/memory/864-168-0x00000000023C0000-0x00000000024FA000-memory.dmp upx behavioral2/memory/864-170-0x00000000023C0000-0x00000000024FA000-memory.dmp upx behavioral2/memory/864-172-0x00000000023C0000-0x00000000024FA000-memory.dmp upx behavioral2/memory/864-173-0x00000000023C0000-0x00000000024FA000-memory.dmp upx behavioral2/memory/864-174-0x00000000023C0000-0x00000000024FA000-memory.dmp upx behavioral2/memory/864-175-0x00000000023C0000-0x00000000024FA000-memory.dmp upx behavioral2/memory/864-176-0x00000000023C0000-0x00000000024FA000-memory.dmp upx behavioral2/memory/864-177-0x00000000023C0000-0x00000000024FA000-memory.dmp upx behavioral2/memory/864-178-0x00000000023C0000-0x00000000024FA000-memory.dmp upx behavioral2/memory/864-179-0x00000000023C0000-0x00000000024FA000-memory.dmp upx behavioral2/memory/864-180-0x00000000023C0000-0x00000000024FA000-memory.dmp upx behavioral2/memory/864-181-0x00000000023C0000-0x00000000024FA000-memory.dmp upx behavioral2/memory/864-182-0x00000000023C0000-0x00000000024FA000-memory.dmp upx behavioral2/memory/864-184-0x00000000023C0000-0x00000000024FA000-memory.dmp upx -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~2\is240628468.log 53e2ba476c8711cc76f2ed60c9c9e5ff_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 53e2ba476c8711cc76f2ed60c9c9e5ff_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 864 53e2ba476c8711cc76f2ed60c9c9e5ff_JaffaCakes118.exe 864 53e2ba476c8711cc76f2ed60c9c9e5ff_JaffaCakes118.exe 864 53e2ba476c8711cc76f2ed60c9c9e5ff_JaffaCakes118.exe 864 53e2ba476c8711cc76f2ed60c9c9e5ff_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 864 53e2ba476c8711cc76f2ed60c9c9e5ff_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 864 53e2ba476c8711cc76f2ed60c9c9e5ff_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 864 53e2ba476c8711cc76f2ed60c9c9e5ff_JaffaCakes118.exe 864 53e2ba476c8711cc76f2ed60c9c9e5ff_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\53e2ba476c8711cc76f2ed60c9c9e5ff_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\53e2ba476c8711cc76f2ed60c9c9e5ff_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:864
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
156B
MD51ea9e5b417811379e874ad4870d5c51a
SHA1a4bd01f828454f3619a815dbe5423b181ec4051c
SHA256f076773a6e3ae0f1cee3c69232779a1aaaf05202db472040c0c8ea4a70af173a
SHA512965c10d2aa5312602153338da873e8866d2782e0cf633befe5a552b770e08abf47a4d2e007cdef7010c212ebcb9fefea5610c41c7ed1553440eaeab7ddd72daa
-
Filesize
5KB
MD550b090b3d4090ea1d984e62d2bc4ebd9
SHA1da159c590907b671404f79a4bd8ff1480761aee0
SHA2566e27027ffd9af638069e5eba5aaa43053a62be21a9f00c3861f56e31710dfdb7
SHA51224515c50f8b0f37a8b99f187a73beb8876b42bd3a7300bf49b087b8f943211441ba2f46d819f2250084e05fc5902689866f80ee6f0dca3a9afd2fa3630a53e77
-
Filesize
506B
MD55335f1c12201b5f7cf5f8b4f5692e3d1
SHA113807a10369f7ff9ab3f9aba18135bccb98bec2d
SHA256974cd89e64bdaa85bf36ed2a50af266d245d781a8139f5b45d7c55a0b0841dda
SHA5120d4e54d2ffe96ccf548097f7812e3608537b4dae9687816983fddfb73223c196159cc6a39fcdc000784c79b2ced878efbc7a5b5f6e057973bf25b128124510df
-
Filesize
29KB
MD54540d627f2024ae3337745c1068c4c28
SHA1ba0301b24bba70bbf174c7fc8a8c272cf303985a
SHA25699755a3cb1dd892749d70b2f22d817586f1b5418dbec20a2e0ac582f992bdc69
SHA512fa0614efa938b7a544951c3a10ec81809b715b7f223da10d65aeb44ac03876f9d1793b3bf1111469c9a007e16bde6002e4b5f27989b095bc212f618b03dcb0a6
-
Filesize
1KB
MD560e7a3f760637dd125a1150474e7f6bb
SHA146e4b53480dd7b3db532e3511a7ad3b9e99b2f48
SHA256d244e6d623fb3706340ead5491bb61663e5d53a3f7d96d4b613175c875c42184
SHA512d279b197d330c4fe7de5e891b45e60273b603d58c84a502461ba2edf008ed51e6bcfd8768a74ee95bc9558bcbe8294f9f759c188327f7c54b1483d1072b32268
-
Filesize
2KB
MD5ad3b142304c6edd3aa818610b6f52b6e
SHA1d6e2d7437c7bfeb5a268b76219d8a1232e93c0a5
SHA25679801f4e8d8037f112ee1d10cf2f6b6a24b4b3f289f72a76054343dc294a2c2d
SHA5120c8619de4e2df5511878fa1a7eddf77f486e1d42a12bec6e238e4a767e2574d401ebfb1e751be3a27913fa703448ddc96f4af60e6332b51a12c4c945f4201ceb
-
Filesize
2KB
MD59497f998e7fdd2113f14e82d45b55d0f
SHA16e2c1fd3fcd17ec4f97b747a7bdf2c35723de465
SHA25613f12da31e302899a18ad6f2881778b7f9e2734eaf6583fa9cafae5fd2f96ec4
SHA5122c139cf10200216952062035e058be750b1e154cfbb389c3080731e5d6d1c28509911767ff68fa01aec0b7c18bbf02d9cd6676c03b980f8d863d30757797a078