Analysis

  • max time kernel
    141s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    29/03/2024, 04:23

General

  • Target

    184e024ff0ff1a595873aa16ea3d3409_JaffaCakes118.exe

  • Size

    284KB

  • MD5

    184e024ff0ff1a595873aa16ea3d3409

  • SHA1

    f0abec9fb2765526534aec6c40d86ac5f799f52f

  • SHA256

    028373482f8fb85608f611ead291cbc731060ba32ad8ff03c48e9ac18ce36da8

  • SHA512

    8efcca36d99bc97bcd8a48fdce67e59070a40e0715ffaac5ba787f6e9740eef92e58ff1adc3b40348fe764e5cb1dfacf91067c1830327ed64fe412e961d81221

  • SSDEEP

    6144:/HhuGh2c5WoEHcm2rFSTWZH9UoNLrKcPPjWtrvZ:/HwhI4qrFbZdDprVjSrR

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\184e024ff0ff1a595873aa16ea3d3409_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\184e024ff0ff1a595873aa16ea3d3409_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3048
    • C:\Windows\CTS.exe
      "C:\Windows\CTS.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:668

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\EznFUNnm6fghZlw.exe

    Filesize

    284KB

    MD5

    6c2930661e50bd530483fff41e4096fc

    SHA1

    efe8e32e8717167e66aa4b0f38d689e6ecf6693f

    SHA256

    f0692483d0e08f88b4ebe6a68ba94f6c575a778651f8dbe00249feb6ad9652ed

    SHA512

    2aa1f1f4e9925082211caf90aef7035486bfce359a8834720c464eafabba4fe13922eaf5ddbb292f4697b57c2b065e0e946b9485a35180a9dd3533cb5160643d

  • C:\Windows\CTS.exe

    Filesize

    284KB

    MD5

    ad0a5986cbed3fb2174202c110d1d02a

    SHA1

    9bf27fa8438345fba75d62c9a5b645c2ab09b0ce

    SHA256

    b99af97b0ce2484d678954d732442efe4f2bdc5c88fd01071afdc7903297a29e

    SHA512

    dcb43113d7d8e2b826ed292b35d85a80811b808641b4331ed883038e3158001e4e947970a9e1bf62a97cea93be82694b3968cf918900b690c6428fe7c3d63008

  • memory/668-12-0x00000000011B0000-0x00000000011C7000-memory.dmp

    Filesize

    92KB

  • memory/3048-0-0x00000000012A0000-0x00000000012B7000-memory.dmp

    Filesize

    92KB

  • memory/3048-8-0x00000000012A0000-0x00000000012B7000-memory.dmp

    Filesize

    92KB

  • memory/3048-11-0x00000000011B0000-0x00000000011C7000-memory.dmp

    Filesize

    92KB

  • memory/3048-19-0x00000000011B0000-0x00000000011C7000-memory.dmp

    Filesize

    92KB