Analysis

  • max time kernel
    103s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250313-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/04/2025, 16:24

General

  • Target

    JaffaCakes118_9a59826dd40bd1f0b99d17f491c9edf0.exe

  • Size

    72KB

  • MD5

    9a59826dd40bd1f0b99d17f491c9edf0

  • SHA1

    ca7c4cf0cd68cdfc554f85eae3458d41c30803ae

  • SHA256

    1cf2d64cec52ea1623a6c2bf2e4307447c2e55c907987e75d61ed67518931639

  • SHA512

    54ee814da1fca0f4dfd7a3701682b3e8579c634ce49106475ea001e41af375e2009c66321eadc9b199ec8869f68316adaa4c45cd8fea6c75432671d707077385

  • SSDEEP

    1536:d6BZmQUwMI6Wf7CiIeeRvOtOfilxsXZ/3VmYhu:d6rmQUwMI72iiR4l+XfXhu

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.gmail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    tomas123456789

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9a59826dd40bd1f0b99d17f491c9edf0.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9a59826dd40bd1f0b99d17f491c9edf0.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: RenamesItself
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5552
    • C:\Users\Admin\AppData\Roaming\Microsoft\WinUpdater.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\WinUpdater.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:5316

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/5316-13-0x00007FFA9EE00000-0x00007FFA9F7A1000-memory.dmp

    Filesize

    9.6MB

  • memory/5316-14-0x00007FFA9EE00000-0x00007FFA9F7A1000-memory.dmp

    Filesize

    9.6MB

  • memory/5316-17-0x00007FFA9EE00000-0x00007FFA9F7A1000-memory.dmp

    Filesize

    9.6MB

  • memory/5316-16-0x00007FFA9EE00000-0x00007FFA9F7A1000-memory.dmp

    Filesize

    9.6MB

  • memory/5316-15-0x00007FFA9EE00000-0x00007FFA9F7A1000-memory.dmp

    Filesize

    9.6MB

  • memory/5316-10-0x00000000012B0000-0x00000000012B8000-memory.dmp

    Filesize

    32KB

  • memory/5316-12-0x00007FFA9EE00000-0x00007FFA9F7A1000-memory.dmp

    Filesize

    9.6MB

  • memory/5316-8-0x00007FFA9EE00000-0x00007FFA9F7A1000-memory.dmp

    Filesize

    9.6MB

  • memory/5316-9-0x00007FFA9EE00000-0x00007FFA9F7A1000-memory.dmp

    Filesize

    9.6MB

  • memory/5316-11-0x00007FFA9EE00000-0x00007FFA9F7A1000-memory.dmp

    Filesize

    9.6MB

  • memory/5552-1-0x000000001BE40000-0x000000001BEE6000-memory.dmp

    Filesize

    664KB

  • memory/5552-7-0x00007FFA9EE00000-0x00007FFA9F7A1000-memory.dmp

    Filesize

    9.6MB

  • memory/5552-0-0x00007FFA9F0B5000-0x00007FFA9F0B6000-memory.dmp

    Filesize

    4KB

  • memory/5552-5-0x000000001CBA0000-0x000000001CC3C000-memory.dmp

    Filesize

    624KB

  • memory/5552-4-0x00007FFA9EE00000-0x00007FFA9F7A1000-memory.dmp

    Filesize

    9.6MB

  • memory/5552-3-0x000000001C3C0000-0x000000001C88E000-memory.dmp

    Filesize

    4.8MB

  • memory/5552-2-0x00007FFA9EE00000-0x00007FFA9F7A1000-memory.dmp

    Filesize

    9.6MB