Resubmissions

07-01-2025 16:37

250107-t48jqayqhx 10

07-01-2025 03:09

250107-dnnava1paw 10

Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-01-2025 03:09

General

  • Target

    JaffaCakes118_4a214f6d4b7e901a5971625216309d97.exe

  • Size

    606KB

  • MD5

    4a214f6d4b7e901a5971625216309d97

  • SHA1

    539ca0a658f41d1b8451c31bd6d1f1b57a95856b

  • SHA256

    86433799d988249d068f359d031290b2b2fafec2a1934326badb0d2c9b68c7ee

  • SHA512

    7b692770f61122f055015c9ee2265f17e9fd7dfc01ba909b1109b62b5719febc7281bbf0871270b8e9416759a608b552703e808ddeddcebd7ccc6af219f54be0

  • SSDEEP

    12288:QZo9wqaX9lAytIcWlkhfMZVJt3uITOI7RxKPgcMQolSIBxzQQUpCW31:ZaX9lAytIclhEJkIT7igcNjIB5Qg

Malware Config

Signatures

  • 44Caliber

    An open source infostealer written in C#.

  • 44Caliber family
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4a214f6d4b7e901a5971625216309d97.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4a214f6d4b7e901a5971625216309d97.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1724

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\44\Process.txt

    Filesize

    1KB

    MD5

    9e3c31e4b2ee2ddb88026e46e11c3466

    SHA1

    2e204dad1214d664496f8a9e2382fcf73538239b

    SHA256

    2e4f7e59d42ad4f34ce60ccf1fe692bb3b486a0abc2bbeb8d41d0aaf410a6ddc

    SHA512

    06aa361289400525275ee3a241b4adac82267f7a680d8f341f5e830beafa89735eaaaa5bb35fe57546def85bcc74c77fc42e7fdbfe7e90ac33bf106334d84286

  • C:\ProgramData\44\Process.txt

    Filesize

    735B

    MD5

    d585be9a0cea7366ec496a3203917c90

    SHA1

    4b062e87989dd9af639ddc154a3f7d11e34d66dd

    SHA256

    9ecfd0e8490998ec037d33c0856eede77156f2351df07b73f6a67ae91d2f1859

    SHA512

    e2b0399461ff497204d2768fdcdea17c762cd1b5e8f99dc10d5c23280f2f5445b2f3150511a59d8f1e5e7b1979902da387a7b4b7099e242d288daa2fa3411a6b

  • memory/1724-0-0x00007FFB28113000-0x00007FFB28115000-memory.dmp

    Filesize

    8KB

  • memory/1724-1-0x00000000003E0000-0x000000000047E000-memory.dmp

    Filesize

    632KB

  • memory/1724-2-0x000000001B2B0000-0x000000001B39A000-memory.dmp

    Filesize

    936KB

  • memory/1724-3-0x0000000000C00000-0x0000000000C06000-memory.dmp

    Filesize

    24KB

  • memory/1724-15-0x00007FFB28110000-0x00007FFB28BD1000-memory.dmp

    Filesize

    10.8MB

  • memory/1724-36-0x00007FFB28113000-0x00007FFB28115000-memory.dmp

    Filesize

    8KB

  • memory/1724-37-0x00007FFB28110000-0x00007FFB28BD1000-memory.dmp

    Filesize

    10.8MB

  • memory/1724-126-0x00007FFB28110000-0x00007FFB28BD1000-memory.dmp

    Filesize

    10.8MB