Analysis
-
max time kernel
140s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-10-2024 03:48
Behavioral task
behavioral1
Sample
55525f14ebed72b19af685dcee1fbd1f_JaffaCakes118.exe
Resource
win7-20241010-en
General
-
Target
55525f14ebed72b19af685dcee1fbd1f_JaffaCakes118.exe
-
Size
227KB
-
MD5
55525f14ebed72b19af685dcee1fbd1f
-
SHA1
94f60449e5c263b735e902c70b6445278078fbfa
-
SHA256
7bc9e5d320d637a15820794bc8a60e77335acdf9eacc732770bff176497469a0
-
SHA512
0df7cbb560333e36ce2d8c970968b265b967dcc7ef36869e67fc4344de4328bbded70198691dbd4e6fe6ec7f3da26d5bfc052df9a534e5789f832887634f2aa4
-
SSDEEP
3072:GJ4XVGdpymGdSh1A8t+YjsIC2jVa2dVZdAJqImRClqMHaSbjxy6zgPM7cUsP3DN:GalaGQUYowpJdyFmclTHaSJfzgFxL
Malware Config
Signatures
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/1800-0-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral2/memory/1800-1-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral2/memory/1800-3-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral2/memory/1800-5-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral2/memory/1800-7-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral2/memory/1800-9-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral2/memory/1800-12-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral2/memory/1800-14-0x0000000000400000-0x0000000000482000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 55525f14ebed72b19af685dcee1fbd1f_JaffaCakes118.exe