Analysis

  • max time kernel
    94s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-01-2025 18:37

General

  • Target

    JaffaCakes118_7319d5f565a479b81be5ad569e1d28ad.exe

  • Size

    841KB

  • MD5

    7319d5f565a479b81be5ad569e1d28ad

  • SHA1

    f1bb910247d8c574282f721226f36c2261c2ba39

  • SHA256

    48ca62cc6c30606d251c4854994fc2ab4291b2397f8909c78bca81c236dd0d21

  • SHA512

    6dd06e8813b9438a7b961c915732f292ef08005e7635c3db083a8c827346ff3b1be949040ea7d0194bd69cf4012892c5386f9a7f756b6dba12dc346865da9f2b

  • SSDEEP

    12288:TU29hEYJ3bupD50ay4/hEKkFk/SosM5a1vt+PiCKBikzUtA0skzI2Dx4e4VhHeRT:vEYspD50al7cdc5a1VbIJwq

Malware Config

Signatures

  • 44Caliber

    An open source infostealer written in C#.

  • 44Caliber family
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7319d5f565a479b81be5ad569e1d28ad.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7319d5f565a479b81be5ad569e1d28ad.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1596

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\44\Process.txt

    Filesize

    736B

    MD5

    a251bc293ab8876123332151f5d132c7

    SHA1

    b41172282d2efe24de24c656d41b1386faca28b2

    SHA256

    dbcd479fc0aa8274a02d828742a953eaeddf65876467422de152420703b96d02

    SHA512

    e3ccce772d6950c724bb97f7b018d410b99331d6e5ec2e43367f95b8381473380c1c0ee152ccfa64d519b3081959fdf17d7fbc7ec80cb8862201c156ef0b0af3

  • C:\Users\Admin\AppData\Local\44\Process.txt

    Filesize

    1KB

    MD5

    6d9995d06a003867989d3d8586757d0d

    SHA1

    59f07ed30e7f836a67cd2cbfabb441b875be88ad

    SHA256

    0f5f8ddb651d5a48c29b798be9779a2d51a4b5495204ae20b938dd9632da5fa6

    SHA512

    753f4defa5cf8f9a486a7dd44c81879462860500992f93392f90c8b945ae0f9325205c5f67c1b403dd888d3c2bdb98e28e097fa9f5a7d0f97c6da47ad7151815

  • memory/1596-0-0x00007FFD99B73000-0x00007FFD99B75000-memory.dmp

    Filesize

    8KB

  • memory/1596-1-0x0000000000C20000-0x0000000000CFA000-memory.dmp

    Filesize

    872KB

  • memory/1596-2-0x0000000001480000-0x0000000001486000-memory.dmp

    Filesize

    24KB

  • memory/1596-32-0x00007FFD99B70000-0x00007FFD9A631000-memory.dmp

    Filesize

    10.8MB

  • memory/1596-117-0x00007FFD99B70000-0x00007FFD9A631000-memory.dmp

    Filesize

    10.8MB