Analysis
-
max time kernel
141s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/03/2024, 04:23
Behavioral task
behavioral1
Sample
184e024ff0ff1a595873aa16ea3d3409_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
184e024ff0ff1a595873aa16ea3d3409_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
184e024ff0ff1a595873aa16ea3d3409_JaffaCakes118.exe
-
Size
284KB
-
MD5
184e024ff0ff1a595873aa16ea3d3409
-
SHA1
f0abec9fb2765526534aec6c40d86ac5f799f52f
-
SHA256
028373482f8fb85608f611ead291cbc731060ba32ad8ff03c48e9ac18ce36da8
-
SHA512
8efcca36d99bc97bcd8a48fdce67e59070a40e0715ffaac5ba787f6e9740eef92e58ff1adc3b40348fe764e5cb1dfacf91067c1830327ed64fe412e961d81221
-
SSDEEP
6144:/HhuGh2c5WoEHcm2rFSTWZH9UoNLrKcPPjWtrvZ:/HwhI4qrFbZdDprVjSrR
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 668 CTS.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/3048-0-0x00000000012A0000-0x00000000012B7000-memory.dmp upx behavioral1/memory/3048-8-0x00000000012A0000-0x00000000012B7000-memory.dmp upx behavioral1/memory/668-12-0x00000000011B0000-0x00000000011C7000-memory.dmp upx behavioral1/files/0x000d0000000122b8-10.dat upx behavioral1/files/0x000d00000000e655-15.dat upx behavioral1/memory/3048-19-0x00000000011B0000-0x00000000011C7000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" 184e024ff0ff1a595873aa16ea3d3409_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" CTS.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\CTS.exe 184e024ff0ff1a595873aa16ea3d3409_JaffaCakes118.exe File created C:\Windows\CTS.exe CTS.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3048 184e024ff0ff1a595873aa16ea3d3409_JaffaCakes118.exe Token: SeDebugPrivilege 668 CTS.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3048 wrote to memory of 668 3048 184e024ff0ff1a595873aa16ea3d3409_JaffaCakes118.exe 28 PID 3048 wrote to memory of 668 3048 184e024ff0ff1a595873aa16ea3d3409_JaffaCakes118.exe 28 PID 3048 wrote to memory of 668 3048 184e024ff0ff1a595873aa16ea3d3409_JaffaCakes118.exe 28 PID 3048 wrote to memory of 668 3048 184e024ff0ff1a595873aa16ea3d3409_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\184e024ff0ff1a595873aa16ea3d3409_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\184e024ff0ff1a595873aa16ea3d3409_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\CTS.exe"C:\Windows\CTS.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
284KB
MD56c2930661e50bd530483fff41e4096fc
SHA1efe8e32e8717167e66aa4b0f38d689e6ecf6693f
SHA256f0692483d0e08f88b4ebe6a68ba94f6c575a778651f8dbe00249feb6ad9652ed
SHA5122aa1f1f4e9925082211caf90aef7035486bfce359a8834720c464eafabba4fe13922eaf5ddbb292f4697b57c2b065e0e946b9485a35180a9dd3533cb5160643d
-
Filesize
284KB
MD5ad0a5986cbed3fb2174202c110d1d02a
SHA19bf27fa8438345fba75d62c9a5b645c2ab09b0ce
SHA256b99af97b0ce2484d678954d732442efe4f2bdc5c88fd01071afdc7903297a29e
SHA512dcb43113d7d8e2b826ed292b35d85a80811b808641b4331ed883038e3158001e4e947970a9e1bf62a97cea93be82694b3968cf918900b690c6428fe7c3d63008