Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/04/2024, 09:52
Behavioral task
behavioral1
Sample
d0662614f5e16db952e76910d1cc305e_JaffaCakes118.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
d0662614f5e16db952e76910d1cc305e_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
d0662614f5e16db952e76910d1cc305e_JaffaCakes118.exe
-
Size
692KB
-
MD5
d0662614f5e16db952e76910d1cc305e
-
SHA1
959b9a35fd871eb91c76da3133c20fe6023b0418
-
SHA256
3bf8c5076c5c4b62a88a5ea7dfccd4bc7874abc187a68135c1287c6203895ef6
-
SHA512
0d94daa0673929d02fba197a3ff056811b07a7895b9b4d7c4b22cff18316338c35a426303e125f79df673abae3b205b1265138a19fe6b26830a21d982dc383db
-
SSDEEP
12288:smJyVADu7+UY7eaPAGjY6Wz8/lHKmH8QyAaVunCM094qGoBhkFGd+pg:hpH73AG8r8/lqmH8QyAggg4qGmhkVpg
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4336 JFFLd5G7JZiSzCT.exe 1124 CTS.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/1596-0-0x0000000000BA0000-0x0000000000BB9000-memory.dmp upx behavioral2/files/0x00090000000231eb-7.dat upx behavioral2/memory/1596-9-0x0000000000BA0000-0x0000000000BB9000-memory.dmp upx behavioral2/memory/1124-10-0x0000000000BA0000-0x0000000000BB9000-memory.dmp upx behavioral2/files/0x0003000000022744-13.dat upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" d0662614f5e16db952e76910d1cc305e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" CTS.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\CTS.exe d0662614f5e16db952e76910d1cc305e_JaffaCakes118.exe File created C:\Windows\CTS.exe CTS.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1596 d0662614f5e16db952e76910d1cc305e_JaffaCakes118.exe Token: SeDebugPrivilege 1124 CTS.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1596 wrote to memory of 4336 1596 d0662614f5e16db952e76910d1cc305e_JaffaCakes118.exe 85 PID 1596 wrote to memory of 4336 1596 d0662614f5e16db952e76910d1cc305e_JaffaCakes118.exe 85 PID 1596 wrote to memory of 1124 1596 d0662614f5e16db952e76910d1cc305e_JaffaCakes118.exe 86 PID 1596 wrote to memory of 1124 1596 d0662614f5e16db952e76910d1cc305e_JaffaCakes118.exe 86 PID 1596 wrote to memory of 1124 1596 d0662614f5e16db952e76910d1cc305e_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\d0662614f5e16db952e76910d1cc305e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d0662614f5e16db952e76910d1cc305e_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\JFFLd5G7JZiSzCT.exeC:\Users\Admin\AppData\Local\Temp\JFFLd5G7JZiSzCT.exe2⤵
- Executes dropped EXE
PID:4336
-
-
C:\Windows\CTS.exe"C:\Windows\CTS.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1124
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
439KB
MD5b08742f63edcb6883a4f4b39c49d36d5
SHA127794336ed264d47a170c7f07dbd7c8fc1882590
SHA256655d7514299adaa876451da86690e14838bc49366cf7801c4a0ac0d2a9584a83
SHA51249a4fab14b71ca96a00f4d58c96798c03adb15ec7da6b6a06f8a5894251af0154c0bc4548d1cc56baac8ad4346e2a9b6e969357ec85e3e30b4dc514df40bf113
-
Filesize
574KB
MD56503efe0a01c2d50c97be27f3cb10a43
SHA1a0cb3708603a18f02352d01ec672020e5bad5073
SHA2560cf9864ae3a8679ed503f954a453452c93fa44f99ca6f39bbc5860abde7fd35e
SHA512ebdbc553ba4348676fd3f2ca12e48af53a229b449a36e653dbfca90efb34d21033e41d1157dcca28c2b1e5f91368c0839298992247cf7d2e8feca5feab8ecea4
-
Filesize
118KB
MD5f3a5f1a9498a80d37ad51a465a73bbbe
SHA1cf0373fb9837de6a67e18f1896258cb99005037b
SHA256c77cd8b176021d3c9c3c2822691ed40dbda40a9cecb64b4db0cf3630af6cbbc0
SHA512bdbd9334784577ac625375c1a5f1974ae68040b42d5b09e399c58bc531112d272a9d799747183e9d5704b5a59c2e39e37c3ed887ad84b73f89c51835afecb7cc