Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/03/2024, 04:23

General

  • Target

    184e024ff0ff1a595873aa16ea3d3409_JaffaCakes118.exe

  • Size

    284KB

  • MD5

    184e024ff0ff1a595873aa16ea3d3409

  • SHA1

    f0abec9fb2765526534aec6c40d86ac5f799f52f

  • SHA256

    028373482f8fb85608f611ead291cbc731060ba32ad8ff03c48e9ac18ce36da8

  • SHA512

    8efcca36d99bc97bcd8a48fdce67e59070a40e0715ffaac5ba787f6e9740eef92e58ff1adc3b40348fe764e5cb1dfacf91067c1830327ed64fe412e961d81221

  • SSDEEP

    6144:/HhuGh2c5WoEHcm2rFSTWZH9UoNLrKcPPjWtrvZ:/HwhI4qrFbZdDprVjSrR

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\184e024ff0ff1a595873aa16ea3d3409_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\184e024ff0ff1a595873aa16ea3d3409_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4160
    • C:\Windows\CTS.exe
      "C:\Windows\CTS.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:2432

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\excel.exe_Rules.xml

    Filesize

    606KB

    MD5

    48fc27b613334110ce1c6eb4ff6d0832

    SHA1

    72ec710cbfa7e64e30e746662a8819ac194e8740

    SHA256

    3084a7c742f7fd79a171d8e0f2f5540c18d31c0965b97a59cafd5baf131bf3d2

    SHA512

    83459ec93449a0f4d3fe5ed047b5d074c4df05badc32b71a1a316307662b5667d2de67c6c5f35a23e06f4e2169eac6609477ee34da572577c15d637716720b5f

  • C:\Users\Admin\AppData\Local\Temp\wmy0APee7UBbUJl.exe

    Filesize

    284KB

    MD5

    5dbf46dbb15a75be4feadfe9f13ce897

    SHA1

    3102f253b75a9d22eb58ac1b33b2e0447172ff02

    SHA256

    b868d396e9a8482740da065051a52d8f2e5ae69714bb079383d8221c48a0c822

    SHA512

    c92010f63162e6b29db784fa18c7e20475e5dfe13843284f34e937703542217dc7d7abec0c4a7ab8e392acfe572aebfb901bd8b59815bdc758244441a5b6228d

  • C:\Windows\CTS.exe

    Filesize

    284KB

    MD5

    ad0a5986cbed3fb2174202c110d1d02a

    SHA1

    9bf27fa8438345fba75d62c9a5b645c2ab09b0ce

    SHA256

    b99af97b0ce2484d678954d732442efe4f2bdc5c88fd01071afdc7903297a29e

    SHA512

    dcb43113d7d8e2b826ed292b35d85a80811b808641b4331ed883038e3158001e4e947970a9e1bf62a97cea93be82694b3968cf918900b690c6428fe7c3d63008

  • memory/2432-9-0x0000000000480000-0x0000000000497000-memory.dmp

    Filesize

    92KB

  • memory/4160-0-0x0000000000040000-0x0000000000057000-memory.dmp

    Filesize

    92KB

  • memory/4160-7-0x0000000000040000-0x0000000000057000-memory.dmp

    Filesize

    92KB