Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-01-2025 01:04
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_44a5c905d738a570bf4bc0fdc7fcb2f5.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_44a5c905d738a570bf4bc0fdc7fcb2f5.exe
-
Size
533KB
-
MD5
44a5c905d738a570bf4bc0fdc7fcb2f5
-
SHA1
e8c719c5db68ac5f4a54d15a08b630eabc80b160
-
SHA256
4f075208c4a73e0233240f7ed3bb26f4bb750167d5b419d4ed619eeb449254ec
-
SHA512
1dcd4ccab7ecd31d109f195d1e902d9457ffdccc476d7156f817446eab33368b5e294d10e33b7028eee0d53bcdb8e47f7e4f2bf7cf9ab2d57e56c3a2038795af
-
SSDEEP
12288:E93uV1kGdQ97QDQh0KnRmAdGi00OFDXBSEOHnMLB2fdY0:GC15wkkhvYAdH0brMplfd
Malware Config
Signatures
-
44Caliber family
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 freegeoip.app 2 freegeoip.app -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 JaffaCakes118_44a5c905d738a570bf4bc0fdc7fcb2f5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier JaffaCakes118_44a5c905d738a570bf4bc0fdc7fcb2f5.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3620 JaffaCakes118_44a5c905d738a570bf4bc0fdc7fcb2f5.exe 3620 JaffaCakes118_44a5c905d738a570bf4bc0fdc7fcb2f5.exe 3620 JaffaCakes118_44a5c905d738a570bf4bc0fdc7fcb2f5.exe 3620 JaffaCakes118_44a5c905d738a570bf4bc0fdc7fcb2f5.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3620 JaffaCakes118_44a5c905d738a570bf4bc0fdc7fcb2f5.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_44a5c905d738a570bf4bc0fdc7fcb2f5.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_44a5c905d738a570bf4bc0fdc7fcb2f5.exe"1⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3620
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD57701674464647dadafe10e8c827137aa
SHA1ad1ad23c6b2b7704a999f76cd92d17ba8f14479b
SHA256c9aa63f4b973f1cd3c48fd54643234efca3e70dfe2db64db9abcac294569cfb3
SHA512268017898d7a79c5536df5f23e0ce4d7988a1a72d6bcf2efc2343130af5491d60671310ed212cdd03fa8dfcefb21bf6c91ea0436b350a1cc1aac404283d540f4
-
Filesize
744B
MD500ab374d4d573a7d947c3a45d632038b
SHA12d7c3a1bc94d04abe53a6628afa774f11b1d455f
SHA2562cb33ca47dd9d65a3278b28e825b652e42f5b7d0cc5b13d8d20c49becc0e133f
SHA51229b267aeb039cf20092e6d96c4aa72f6d3cbbc839e800b2ad1dcbd07cbcc18144b439910fb7b47cd660f27dc8eb0d4e54f077614d9abeb2fc9df5a0bf73ea7dc
-
Filesize
1KB
MD51b82d7938183cb64f03daf72ee5cc6dc
SHA1ed91f5f60251174c9ca1a04ebe05d5c374683f47
SHA2569808337d8db70ef562ee490dee2b3c17067144cf3673484f9a89aec3f9984373
SHA512e96eb46498df906ede249b76af0468886ff428c530cc00070953ced7e6830ce6907e716f2d6f6e2212ff391fb586144199cdbce29a2f68084b89278dcf70dfd0