Analysis

  • max time kernel
    149s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    10/04/2024, 23:59

General

  • Target

    ec43f40c31a889034b6c31588da5c64c_JaffaCakes118.exe

  • Size

    82KB

  • MD5

    ec43f40c31a889034b6c31588da5c64c

  • SHA1

    acd4d746dce75ae97c3aae8e741b88d1f9d06c5a

  • SHA256

    e1878830854fcc655a72c96084615920a820480cf69127943494ea0a7b248373

  • SHA512

    384b05dbdd493a419fab3a07229f17944714815d64216f863c6fc1d0f2569acf013156a3ddcf133dc49660a2d7fa2b15e379253567b8b2a58c61545960013f29

  • SSDEEP

    1536:p4q8Q1xZtffrb8sjPFNhTYsFFrzckH2fmitD+Xue9hwn0Bt5io:qKtfDwsjPThTYszDH2fle9hwn8v

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1132
      • C:\Users\Admin\AppData\Local\Temp\ec43f40c31a889034b6c31588da5c64c_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\ec43f40c31a889034b6c31588da5c64c_JaffaCakes118.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2252
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$a27EB.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2516
          • C:\Users\Admin\AppData\Local\Temp\ec43f40c31a889034b6c31588da5c64c_JaffaCakes118.exe
            "C:\Users\Admin\AppData\Local\Temp\ec43f40c31a889034b6c31588da5c64c_JaffaCakes118.exe"
            4⤵
            • Executes dropped EXE
            PID:2580
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2748

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\$$a27EB.bat

            Filesize

            614B

            MD5

            b955222b7fa222806f9cef4538dc7c1e

            SHA1

            1485ff11337d9fbd6ae7c91f857faa426a86cffd

            SHA256

            ab872be78bbe1948538fcaad909e0f5aa5794f81e2002504a5f5904dd06d3250

            SHA512

            bacd3ec458d28b03f34ab4cf76d1e3103e7e24e9f1cc2c992a1a386f7f7fbbe53ed66972762e683cace3d0f2fc2ec74f2fb8b6944cdb4563149dc1c70ef78105

          • C:\Users\Admin\AppData\Local\Temp\ec43f40c31a889034b6c31588da5c64c_JaffaCakes118.exe.exe

            Filesize

            23KB

            MD5

            4f7133b1963be15aba28474f280a96ed

            SHA1

            6d55b874085219c6564d986b6bf17c6d1e55e95c

            SHA256

            c15341115908fdda3bdae7021930a088b1652a2fbaa992da7471fc315d1c0c03

            SHA512

            9f36e21c823eefe52cd11c69a847d394b135c4de02fcc27b4365fd98bc4236ba8252c688753b2499cb14900dd67f22e894248c2ee0ce5ebb817c8d2b4c4e66cd

          • C:\Windows\Logo1_.exe

            Filesize

            58KB

            MD5

            d0d61c67293a445db5948849adae35ab

            SHA1

            bfba28b28f49d507a45565c957ba09f7473a44bb

            SHA256

            7bf80d6f1f51ba8dd4658d5c902d648d94fbba8e8e7fac8f4df4dbe29293f6e6

            SHA512

            46c1c4025bf8f616be76c9a5cc2ec8cc96ea095923a1665905cc847c9dfcbfaba12570eab765cdc0954069492c3098a5113abfcb0888376ddf19ce6ce7c7f786

          • memory/1132-19-0x00000000024E0000-0x00000000024E1000-memory.dmp

            Filesize

            4KB

          • memory/2252-14-0x0000000000400000-0x0000000000422000-memory.dmp

            Filesize

            136KB

          • memory/2748-243-0x0000000000400000-0x0000000000422000-memory.dmp

            Filesize

            136KB