Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    05/04/2024, 16:46

General

  • Target

    d9320f2b15249a2aa4a0b2bb59a1a27d_JaffaCakes118.exe

  • Size

    87KB

  • MD5

    d9320f2b15249a2aa4a0b2bb59a1a27d

  • SHA1

    85094a1c32f1d4ad7718e62ced07603ff77a277d

  • SHA256

    80122c05054b4808c9590ec127a21875670c64aef8992054db4ff1959911146d

  • SHA512

    445e5b29e869ea8c2c63279cd9ce1e9bf26f0a5127b8d9332c58b5e883fcb7dad4ef760eedc9980254e195ed1630d119750ce4aa39007b355eed99d2bbfbef3a

  • SSDEEP

    1536:p4q8Q1xZtffrb8sjPFNhTYsFFrzckH2fmitUwmDwV342OJor8LadCo:qKtfDwsjPThTYszDH2fOJ242OJor7f

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1208
      • C:\Users\Admin\AppData\Local\Temp\d9320f2b15249a2aa4a0b2bb59a1a27d_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\d9320f2b15249a2aa4a0b2bb59a1a27d_JaffaCakes118.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:1708
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$aA1E.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1296
          • C:\Users\Admin\AppData\Local\Temp\d9320f2b15249a2aa4a0b2bb59a1a27d_JaffaCakes118.exe
            "C:\Users\Admin\AppData\Local\Temp\d9320f2b15249a2aa4a0b2bb59a1a27d_JaffaCakes118.exe"
            4⤵
            • Executes dropped EXE
            PID:2532
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2540

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\$$aA1E.bat

      Filesize

      613B

      MD5

      52af58e4ab3c9b503af07104aaa5bc20

      SHA1

      2c0601a549eef45c857044081219bfaaab8074fe

      SHA256

      eed22e335e64eea2800c0f24bad11d7ffe7c73d4363e77d720a31a39b261a252

      SHA512

      cb998b9a747b7afda3faf250500f935ba69fe2889397c1ccad77c6e351c7b45574f899149fb79365c9300fbe55b5de7460ad44a39d5c09492667e2bdc09f3596

    • C:\Users\Admin\AppData\Local\Temp\d9320f2b15249a2aa4a0b2bb59a1a27d_JaffaCakes118.exe.exe

      Filesize

      29KB

      MD5

      5ee51a71335a02d839e4c9e644476ffb

      SHA1

      1417dfa69cddb1fabc6ae92b0154a2ede73e658c

      SHA256

      2d3a4cef5eb707592afd3c39d9fcc6dd5b0bf80fbaacd348c2f1908346661aaf

      SHA512

      b5ac870859e7120adcad90d6f8cab7e9057b38083b3d47181e8f4298a31a8097533d7695e17eb6927edb1012ad5533e4b8dcba702c9c8f4875627bb268caee39

    • C:\Windows\Logo1_.exe

      Filesize

      58KB

      MD5

      787cc9bf2bb04a2053349ec941f4b492

      SHA1

      13f3b359d0466c5a76b4c0c658c53b310f992c12

      SHA256

      af2bca9b3a2d5d812d10abda7c5d433456e38cb9c3f40846fc7c1457cc54765f

      SHA512

      db4a59639b304fc0e282a45e659846eadd7f9708ed4ad96ae84a8b5521a89d47871f6b18876e8c94d9326107f5de6baf7aa16a1e09a0b312effd9addf709a1ee

    • memory/1208-19-0x0000000002D40000-0x0000000002D41000-memory.dmp

      Filesize

      4KB

    • memory/1708-13-0x0000000000400000-0x0000000000422000-memory.dmp

      Filesize

      136KB

    • memory/2540-241-0x0000000000400000-0x0000000000422000-memory.dmp

      Filesize

      136KB