Resubmissions

07-01-2025 16:37

250107-t48jqayqhx 10

07-01-2025 03:09

250107-dnnava1paw 10

Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    07-01-2025 03:09

General

  • Target

    JaffaCakes118_4a214f6d4b7e901a5971625216309d97.exe

  • Size

    606KB

  • MD5

    4a214f6d4b7e901a5971625216309d97

  • SHA1

    539ca0a658f41d1b8451c31bd6d1f1b57a95856b

  • SHA256

    86433799d988249d068f359d031290b2b2fafec2a1934326badb0d2c9b68c7ee

  • SHA512

    7b692770f61122f055015c9ee2265f17e9fd7dfc01ba909b1109b62b5719febc7281bbf0871270b8e9416759a608b552703e808ddeddcebd7ccc6af219f54be0

  • SSDEEP

    12288:QZo9wqaX9lAytIcWlkhfMZVJt3uITOI7RxKPgcMQolSIBxzQQUpCW31:ZaX9lAytIclhEJkIT7igcNjIB5Qg

Malware Config

Signatures

  • 44Caliber

    An open source infostealer written in C#.

  • 44Caliber family
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4a214f6d4b7e901a5971625216309d97.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4a214f6d4b7e901a5971625216309d97.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2024

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\44\Process.txt

    Filesize

    457B

    MD5

    e9c56d109d0a198ed773ddd4292a2d54

    SHA1

    9b07328216ce26278f44454ce73a542c96e2bbaf

    SHA256

    bbb815f652d7c609dc1097e722907b37f77f1e1f33a7b0097f1cbae8501bff0e

    SHA512

    a92597bc7a41231e494d2d5373f5639e2e94f997af048a90b0bf45a2fd8214d93363006e7ccb1a9de02fa57968c3c41ca4e7fc704f761314780b955d06d6f0cb

  • memory/2024-0-0x000007FEF54B3000-0x000007FEF54B4000-memory.dmp

    Filesize

    4KB

  • memory/2024-1-0x00000000013A0000-0x000000000143E000-memory.dmp

    Filesize

    632KB

  • memory/2024-2-0x000000001AB10000-0x000000001ABFA000-memory.dmp

    Filesize

    936KB

  • memory/2024-3-0x0000000000430000-0x0000000000436000-memory.dmp

    Filesize

    24KB

  • memory/2024-4-0x000007FEF54B0000-0x000007FEF5E9C000-memory.dmp

    Filesize

    9.9MB

  • memory/2024-24-0x000007FEF54B3000-0x000007FEF54B4000-memory.dmp

    Filesize

    4KB

  • memory/2024-25-0x000007FEF54B0000-0x000007FEF5E9C000-memory.dmp

    Filesize

    9.9MB

  • memory/2024-57-0x000007FEF54B0000-0x000007FEF5E9C000-memory.dmp

    Filesize

    9.9MB