Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/03/2025, 07:45
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_8a75d3b8be12f3330764e6b7d2fe48d3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_8a75d3b8be12f3330764e6b7d2fe48d3.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_8a75d3b8be12f3330764e6b7d2fe48d3.exe
-
Size
524KB
-
MD5
8a75d3b8be12f3330764e6b7d2fe48d3
-
SHA1
112e28415594145951228c76d56472fb246a9c5e
-
SHA256
8877d5eea948b9902679b3669ab27829525ccc96b63ca6e3d966d16ec68bb4f2
-
SHA512
95b1141285ac9da4e34315e5485c22b85ece8463bee45c1ff70afb29120b484c1a5172c819c4319dc3a1acdbae198c8f3a0c6912964dc443082255eb46e8309c
-
SSDEEP
6144:WWNLVSFZA3yR8zEYOqyjcGXC/pfuD+6B+PlnAeutg1+Q3gGRo+2dmHdI:lrgCFOnAp50fwWecgUqD32k2
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2340 cmd.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2984 set thread context of 3004 2984 JaffaCakes118_8a75d3b8be12f3330764e6b7d2fe48d3.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_8a75d3b8be12f3330764e6b7d2fe48d3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_8a75d3b8be12f3330764e6b7d2fe48d3.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2880 timeout.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2984 wrote to memory of 3004 2984 JaffaCakes118_8a75d3b8be12f3330764e6b7d2fe48d3.exe 30 PID 2984 wrote to memory of 3004 2984 JaffaCakes118_8a75d3b8be12f3330764e6b7d2fe48d3.exe 30 PID 2984 wrote to memory of 3004 2984 JaffaCakes118_8a75d3b8be12f3330764e6b7d2fe48d3.exe 30 PID 2984 wrote to memory of 3004 2984 JaffaCakes118_8a75d3b8be12f3330764e6b7d2fe48d3.exe 30 PID 2984 wrote to memory of 3004 2984 JaffaCakes118_8a75d3b8be12f3330764e6b7d2fe48d3.exe 30 PID 2984 wrote to memory of 3004 2984 JaffaCakes118_8a75d3b8be12f3330764e6b7d2fe48d3.exe 30 PID 2984 wrote to memory of 3004 2984 JaffaCakes118_8a75d3b8be12f3330764e6b7d2fe48d3.exe 30 PID 2984 wrote to memory of 3004 2984 JaffaCakes118_8a75d3b8be12f3330764e6b7d2fe48d3.exe 30 PID 2984 wrote to memory of 3004 2984 JaffaCakes118_8a75d3b8be12f3330764e6b7d2fe48d3.exe 30 PID 2984 wrote to memory of 3004 2984 JaffaCakes118_8a75d3b8be12f3330764e6b7d2fe48d3.exe 30 PID 3004 wrote to memory of 2340 3004 JaffaCakes118_8a75d3b8be12f3330764e6b7d2fe48d3.exe 31 PID 3004 wrote to memory of 2340 3004 JaffaCakes118_8a75d3b8be12f3330764e6b7d2fe48d3.exe 31 PID 3004 wrote to memory of 2340 3004 JaffaCakes118_8a75d3b8be12f3330764e6b7d2fe48d3.exe 31 PID 3004 wrote to memory of 2340 3004 JaffaCakes118_8a75d3b8be12f3330764e6b7d2fe48d3.exe 31 PID 2340 wrote to memory of 2880 2340 cmd.exe 33 PID 2340 wrote to memory of 2880 2340 cmd.exe 33 PID 2340 wrote to memory of 2880 2340 cmd.exe 33 PID 2340 wrote to memory of 2880 2340 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8a75d3b8be12f3330764e6b7d2fe48d3.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8a75d3b8be12f3330764e6b7d2fe48d3.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8a75d3b8be12f3330764e6b7d2fe48d3.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8a75d3b8be12f3330764e6b7d2fe48d3.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 5 && del C:\Users\Admin\AppData\Local\Temp\JAFFAC~1.EXE3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\SysWOW64\timeout.exetimeout 54⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2880
-
-
-