Analysis

  • max time kernel
    119s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    04-04-2024 04:09

General

  • Target

    af382cfb9632dde6f7de3f2d0a76e103_JaffaCakes118.exe

  • Size

    426KB

  • MD5

    af382cfb9632dde6f7de3f2d0a76e103

  • SHA1

    2ace18dcd993145b4367dbb13cc1b5e99c3eeaf0

  • SHA256

    44d150b890d0d9440e430d47f2b5aeb2c6b5148bbe8cfabf83dcb4f89abdef2e

  • SHA512

    4987935c732c974760b0de0d54bdef75ce0a75cf88d698e3014b974828f2d370576aa7dd79ac661f14141fd36b41e844f581a9808ea2f6eabfbc3ab5b7fba0cf

  • SSDEEP

    6144:tYvr7D1PE/3BcL9l5bUsgFxvJqBIeAZtvHLPKKzAI17JY0H+kK1e:tGPD549FRaSkT1e

Malware Config

Signatures

  • Growtopia

    Growtopa is an opensource modular stealer written in C#.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Modifies registry class 7 IoCs
  • Modifies system certificate store 2 TTPs 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\af382cfb9632dde6f7de3f2d0a76e103_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\af382cfb9632dde6f7de3f2d0a76e103_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2852
    • C:\Users\Admin\AppData\Local\Temp\Exafarm Loader.exe
      "C:\Users\Admin\AppData\Local\Temp\Exafarm Loader.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Modifies system certificate store
      • Suspicious use of WriteProcessMemory
      PID:2912
      • C:\Windows\system32\cmd.exe
        cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\UAC.bat"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2464
        • C:\Windows\system32\reg.exe
          REG ADD "HKCU\SOFTWARE\Classes\ms-settings\shell\open\command" /t REG_SZ /d "C:\windows\system32\cmd.exe /c REG ADD HKLM\software\microsoft\windows\currentversion\policies\system /v ConsentPromptBehaviorAdmin /t REG_DWORD /d 0 /f" /f
          4⤵
          • Modifies registry class
          PID:2516
        • C:\Windows\system32\reg.exe
          REG ADD "hkcu\software\classes\ms-settings\shell\open\command" /v DelegateExecute /t REG_SZ /d " " /f
          4⤵
          • Modifies registry class
          PID:2536
      • C:\Windows\system32\cmd.exe
        cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\DC.exe" /D
        3⤵
          PID:1064
        • C:\Windows\system32\cmd.exe
          cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\MAC.bat"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1892
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell get-NetAdapter
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2664
        • C:\Windows\system32\cmd.exe
          cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\GenReg.exe" [29549]--[140496283]--[14774,14774c,14774w,14774wc]--[105372212,105372212c]
          3⤵
            PID:1764
          • C:\Windows\system32\cmd.exe
            cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\WBPVBat.bat"
            3⤵
              PID:1116
            • C:\Windows\system32\cmd.exe
              cmd.exe /c Powershell.exe -NoProfile -ExecutionPolicy unrestricted -file "C:\Users\Admin\AppData\Local\Temp\ZBRecoveredFolder\RecoverFiles.ps1"
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:2412
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                Powershell.exe -NoProfile -ExecutionPolicy unrestricted -file "C:\Users\Admin\AppData\Local\Temp\ZBRecoveredFolder\RecoverFiles.ps1"
                4⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2148
            • C:\Windows\system32\cmd.exe
              cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ScanPC.bat"
              3⤵
                PID:2784
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2912 -s 1512
                3⤵
                • Loads dropped DLL
                • Program crash
                PID:1836

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

            Filesize

            68KB

            MD5

            29f65ba8e88c063813cc50a4ea544e93

            SHA1

            05a7040d5c127e68c25d81cc51271ffb8bef3568

            SHA256

            1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

            SHA512

            e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

          • C:\Users\Admin\AppData\Local\Temp\Exafarm Loader.exe

            Filesize

            151KB

            MD5

            a5649742d25bd68b1db70b70b3012d50

            SHA1

            469f0f58b70db096c8e0ecc30252d26fe274ff76

            SHA256

            f2adef7d44afd81ae29ff66853f7db11c5959d22439cd623291638dc657fca38

            SHA512

            b5db014aab517a28959562bde768c375805cdff9a1f241460da849e0637dfafe88d4c7dc9129e7c63b651a3a8bbd6b9721d47c8a53182f1151893f419aac0a71

          • C:\Users\Admin\AppData\Local\Temp\MAC.bat

            Filesize

            42B

            MD5

            56120ea7d97e691243935b98d32f4b65

            SHA1

            f89f6249a946882410de06765ec07e11f2608177

            SHA256

            1d6a29ec8b4f624b3246450c2a34ae1a8b3e35cdc7f3fa86a680e14169e01a67

            SHA512

            4cda70d6283fc48105a64c157c50fbe61bc5c77aa0f28e8c1176943cfdfa4345df77f09573d49ff896830cfc8315547a453a7bcbe68c00dd140b99ead94c8b5b

          • C:\Users\Admin\AppData\Local\Temp\MAC.zb

            Filesize

            423B

            MD5

            dfd4ca0036d729b95ec5a67081801628

            SHA1

            d213288411a38c9b60b606321e5617180805a7c3

            SHA256

            663431f49b93a7cc72370896bb20920edae4764b1fac6da2c31717c0ebdfd1e4

            SHA512

            c844edabab2dac76b0ee6f3203dca97a9009443df3466621616e2536570c1be04177e5080d83330440d2e4b6b58de604d93f040fb49cd109e4849fcc383a5316

          • C:\Users\Admin\AppData\Local\Temp\ScanPC.bat

            Filesize

            65B

            MD5

            fe76c9e647f358368eaf4e222e204dc6

            SHA1

            c94ea01f006620f2adedf56a377ad452b30be98a

            SHA256

            46aa77e7b80cab973f35033380be8dd8924bc7a5f43990037359809baf628244

            SHA512

            fd1b4fe5bc64813614a847d9552d4e29a9ec9957f4e7a94176d65298293412213f0255400bf55d188a4a159575d611a072fce999e2253adf0be8f382af977daa

          • C:\Users\Admin\AppData\Local\Temp\Tar4CD0.tmp

            Filesize

            177KB

            MD5

            435a9ac180383f9fa094131b173a2f7b

            SHA1

            76944ea657a9db94f9a4bef38f88c46ed4166983

            SHA256

            67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

            SHA512

            1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

          • C:\Users\Admin\AppData\Local\Temp\UAC.bat

            Filesize

            351B

            MD5

            84e809c3854f97339e11bb74129f69d1

            SHA1

            63e45ca731eeb00cbbd89b8870c1cdeeaf6c8ef0

            SHA256

            c9db5db63e80c488a96460c775e88a7208e6ca278f14128a1267d4d6f3f3187c

            SHA512

            e8d313fc47f247770e3c346c7a9fe13902e80f1e2a37e08a46a7c0a3026cc3939a84a321f90d09b5aa9f6e7aa0dc799d86bc58e417e8bd4e197d5b62d23dacc5

          • C:\Users\Admin\AppData\Local\Temp\WBPVBat.bat

            Filesize

            45B

            MD5

            8f6fe19e0609ab1352a0789cc2f26930

            SHA1

            0e03b9c99795d0edece5b885211d142e21df56bc

            SHA256

            390d8088e112cd92ed0f9be3ac1cc127e6cdf482d0b7546ec869c73d85a6d682

            SHA512

            d4fce506abdb0c25564a99b1d49e067197d61b2fc43fcc7bb063d1fc084cc1591162ae8a3c20c78558bb0543ea892323aacc4d609658ea1593f936f1ff13b17a

          • C:\Users\Admin\AppData\Local\Temp\ZBRecoveredFolder\RecoverFiles.ps1

            Filesize

            253B

            MD5

            c2a812a536121ead50a97e6dca817b19

            SHA1

            d56a1b38c4161f03e01bc95e3d5172c1b54b6143

            SHA256

            e73f61c7505305910b75d1794b43b1d3030034459e2cb0e723d4f3b16384554e

            SHA512

            bab9271abc4e6da9c7c3aba74ec59e98d4325888235d1e364045ddaeef5aec42342ef4683a4541019f7190af160f555d673e9924ab8daf09b8816350b4d2ce46

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\IVEBWD5ZTERRU74IY2C6.temp

            Filesize

            7KB

            MD5

            40a059135793a499dafbfe46c38b4449

            SHA1

            34d92d7cfca78c1b971300a0fbfa796994c73362

            SHA256

            19703af169da7e8e8edc3e2d8daa206a6305fe8f4ca60ee8c8e61920c7b7f9a5

            SHA512

            c82e8e0382bf909a838f21bda850cdefcc13cf7846c1284cb9d265cd1f766a1d4c07657ff30a5e7536c88564118cdb3346456d40d37189fa74187e8425335ead

          • memory/2148-142-0x000007FEF4F80000-0x000007FEF591D000-memory.dmp

            Filesize

            9.6MB

          • memory/2148-140-0x000000001B2D0000-0x000000001B5B2000-memory.dmp

            Filesize

            2.9MB

          • memory/2148-148-0x000007FEF4F80000-0x000007FEF591D000-memory.dmp

            Filesize

            9.6MB

          • memory/2148-147-0x0000000002830000-0x00000000028B0000-memory.dmp

            Filesize

            512KB

          • memory/2148-144-0x000007FEF4F80000-0x000007FEF591D000-memory.dmp

            Filesize

            9.6MB

          • memory/2148-145-0x0000000002830000-0x00000000028B0000-memory.dmp

            Filesize

            512KB

          • memory/2148-141-0x0000000002490000-0x0000000002498000-memory.dmp

            Filesize

            32KB

          • memory/2148-143-0x0000000002830000-0x00000000028B0000-memory.dmp

            Filesize

            512KB

          • memory/2664-127-0x0000000002310000-0x0000000002390000-memory.dmp

            Filesize

            512KB

          • memory/2664-120-0x000000001B230000-0x000000001B512000-memory.dmp

            Filesize

            2.9MB

          • memory/2664-121-0x000007FEF5920000-0x000007FEF62BD000-memory.dmp

            Filesize

            9.6MB

          • memory/2664-123-0x0000000002310000-0x0000000002390000-memory.dmp

            Filesize

            512KB

          • memory/2664-128-0x000007FEF5920000-0x000007FEF62BD000-memory.dmp

            Filesize

            9.6MB

          • memory/2664-122-0x0000000002390000-0x0000000002398000-memory.dmp

            Filesize

            32KB

          • memory/2664-126-0x000007FEF5920000-0x000007FEF62BD000-memory.dmp

            Filesize

            9.6MB

          • memory/2664-125-0x0000000002310000-0x0000000002390000-memory.dmp

            Filesize

            512KB

          • memory/2664-124-0x0000000002310000-0x0000000002390000-memory.dmp

            Filesize

            512KB

          • memory/2852-0-0x0000000000080000-0x00000000000F0000-memory.dmp

            Filesize

            448KB

          • memory/2852-7-0x000007FEF58D0000-0x000007FEF62BC000-memory.dmp

            Filesize

            9.9MB

          • memory/2852-2-0x000007FEF58D0000-0x000007FEF62BC000-memory.dmp

            Filesize

            9.9MB