Analysis

  • max time kernel
    14s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    07-01-2025 18:37

General

  • Target

    JaffaCakes118_7319d5f565a479b81be5ad569e1d28ad.exe

  • Size

    841KB

  • MD5

    7319d5f565a479b81be5ad569e1d28ad

  • SHA1

    f1bb910247d8c574282f721226f36c2261c2ba39

  • SHA256

    48ca62cc6c30606d251c4854994fc2ab4291b2397f8909c78bca81c236dd0d21

  • SHA512

    6dd06e8813b9438a7b961c915732f292ef08005e7635c3db083a8c827346ff3b1be949040ea7d0194bd69cf4012892c5386f9a7f756b6dba12dc346865da9f2b

  • SSDEEP

    12288:TU29hEYJ3bupD50ay4/hEKkFk/SosM5a1vt+PiCKBikzUtA0skzI2Dx4e4VhHeRT:vEYspD50al7cdc5a1VbIJwq

Malware Config

Signatures

  • 44Caliber

    An open source infostealer written in C#.

  • 44Caliber family
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7319d5f565a479b81be5ad569e1d28ad.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7319d5f565a479b81be5ad569e1d28ad.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2220

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\44\Process.txt

    Filesize

    442B

    MD5

    93f7e73da84b10e292c16b9d6c417e7e

    SHA1

    69a542e840da7774a8cec7be27924cda70f93d0f

    SHA256

    7940d61caa210596c44183b85c06099503fca75b0447f5ca0a424b8d5d77e4da

    SHA512

    d754a30a75699150d54191daf707a1c898da6c66bb5bf29876b7fc4939c6e9a86b9ebfcd5399dce561d0cab5f8a9b0af0cf04b4fc26fae086f535740299ca9d6

  • memory/2220-0-0x000007FEF64B3000-0x000007FEF64B4000-memory.dmp

    Filesize

    4KB

  • memory/2220-1-0x0000000000E60000-0x0000000000F3A000-memory.dmp

    Filesize

    872KB

  • memory/2220-2-0x0000000000130000-0x0000000000136000-memory.dmp

    Filesize

    24KB

  • memory/2220-3-0x000007FEF64B0000-0x000007FEF6E9C000-memory.dmp

    Filesize

    9.9MB

  • memory/2220-52-0x000007FEF64B0000-0x000007FEF6E9C000-memory.dmp

    Filesize

    9.9MB