Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29/03/2024, 04:23
Behavioral task
behavioral1
Sample
184e024ff0ff1a595873aa16ea3d3409_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
184e024ff0ff1a595873aa16ea3d3409_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
184e024ff0ff1a595873aa16ea3d3409_JaffaCakes118.exe
-
Size
284KB
-
MD5
184e024ff0ff1a595873aa16ea3d3409
-
SHA1
f0abec9fb2765526534aec6c40d86ac5f799f52f
-
SHA256
028373482f8fb85608f611ead291cbc731060ba32ad8ff03c48e9ac18ce36da8
-
SHA512
8efcca36d99bc97bcd8a48fdce67e59070a40e0715ffaac5ba787f6e9740eef92e58ff1adc3b40348fe764e5cb1dfacf91067c1830327ed64fe412e961d81221
-
SSDEEP
6144:/HhuGh2c5WoEHcm2rFSTWZH9UoNLrKcPPjWtrvZ:/HwhI4qrFbZdDprVjSrR
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2432 CTS.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/4160-0-0x0000000000040000-0x0000000000057000-memory.dmp upx behavioral2/files/0x000a0000000231ac-6.dat upx behavioral2/memory/4160-7-0x0000000000040000-0x0000000000057000-memory.dmp upx behavioral2/memory/2432-9-0x0000000000480000-0x0000000000497000-memory.dmp upx behavioral2/files/0x00030000000227c3-12.dat upx behavioral2/files/0x000e000000023139-30.dat upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" CTS.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" 184e024ff0ff1a595873aa16ea3d3409_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\CTS.exe 184e024ff0ff1a595873aa16ea3d3409_JaffaCakes118.exe File created C:\Windows\CTS.exe CTS.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4160 184e024ff0ff1a595873aa16ea3d3409_JaffaCakes118.exe Token: SeDebugPrivilege 2432 CTS.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4160 wrote to memory of 2432 4160 184e024ff0ff1a595873aa16ea3d3409_JaffaCakes118.exe 87 PID 4160 wrote to memory of 2432 4160 184e024ff0ff1a595873aa16ea3d3409_JaffaCakes118.exe 87 PID 4160 wrote to memory of 2432 4160 184e024ff0ff1a595873aa16ea3d3409_JaffaCakes118.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\184e024ff0ff1a595873aa16ea3d3409_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\184e024ff0ff1a595873aa16ea3d3409_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Windows\CTS.exe"C:\Windows\CTS.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2432
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
606KB
MD548fc27b613334110ce1c6eb4ff6d0832
SHA172ec710cbfa7e64e30e746662a8819ac194e8740
SHA2563084a7c742f7fd79a171d8e0f2f5540c18d31c0965b97a59cafd5baf131bf3d2
SHA51283459ec93449a0f4d3fe5ed047b5d074c4df05badc32b71a1a316307662b5667d2de67c6c5f35a23e06f4e2169eac6609477ee34da572577c15d637716720b5f
-
Filesize
284KB
MD55dbf46dbb15a75be4feadfe9f13ce897
SHA13102f253b75a9d22eb58ac1b33b2e0447172ff02
SHA256b868d396e9a8482740da065051a52d8f2e5ae69714bb079383d8221c48a0c822
SHA512c92010f63162e6b29db784fa18c7e20475e5dfe13843284f34e937703542217dc7d7abec0c4a7ab8e392acfe572aebfb901bd8b59815bdc758244441a5b6228d
-
Filesize
284KB
MD5ad0a5986cbed3fb2174202c110d1d02a
SHA19bf27fa8438345fba75d62c9a5b645c2ab09b0ce
SHA256b99af97b0ce2484d678954d732442efe4f2bdc5c88fd01071afdc7903297a29e
SHA512dcb43113d7d8e2b826ed292b35d85a80811b808641b4331ed883038e3158001e4e947970a9e1bf62a97cea93be82694b3968cf918900b690c6428fe7c3d63008