Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-04-2024 09:58

General

  • Target

    f7c1e09b6a2ea2f32904d085db69a463_JaffaCakes118.exe

  • Size

    470KB

  • MD5

    f7c1e09b6a2ea2f32904d085db69a463

  • SHA1

    7f85783d57a71e360701e9299f51ab019b855cdb

  • SHA256

    fff3107b5ae7015539e6b73f7ae155b59ec43d52eb6c1b8080a6edba4a627e33

  • SHA512

    ad83abd23853a611503acc6abe65a480aca37186e0527c145d8157534ad75f24c4df0b6eb164d1bf90176912d68aac10c042e5f7cc32d62d53e59b61a2132fcd

  • SSDEEP

    6144:hHxibYuPAzbU2/74ATayGNdU3R/aO6+gyae2joMXl0HB9WNHWMv2:hcYXs2T4m0W3R/aO6+F5CXlkB6Pv2

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Delays execution with timeout.exe 1 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f7c1e09b6a2ea2f32904d085db69a463_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f7c1e09b6a2ea2f32904d085db69a463_JaffaCakes118.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Suspicious use of SetThreadContext
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4724
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe"
      2⤵
      • NTFS ADS
      • Suspicious use of WriteProcessMemory
      PID:4508
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\FolderN\name.exe.lnk" /f
        3⤵
          PID:4156
      • C:\Users\Admin\AppData\Local\Temp\svhost.exe
        "C:\Users\Admin\AppData\Local\Temp\svhost.exe"
        2⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3828
        • C:\Users\Admin\AppData\Local\Temp\svhost.exe
          "C:\Users\Admin\AppData\Local\Temp\svhost.exe"
          3⤵
          • Executes dropped EXE
          • Accesses Microsoft Outlook profiles
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • outlook_office_path
          • outlook_win_path
          PID:952
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\FolderN\name.exe.bat
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4720
        • C:\Windows\SysWOW64\timeout.exe
          timeout /t 300
          3⤵
          • Delays execution with timeout.exe
          PID:512

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\svhost.exe.log

      Filesize

      313B

      MD5

      181f8ee43a58681f752dbbd9784192b2

      SHA1

      0f8f8bf12da0aba71899eb027d20c374d3c863af

      SHA256

      b87a19bc9d31616efc3ee1b3a5f8db72888ec82a9fd9cdc3b5d642f1de345e77

      SHA512

      42f7d9a88f003a3f6629648c120db7600dbd175c4b1bdb0240f6e76619566177c7a750a89ae38c97d746f13ee4bc5a6b39b7ab7f6d78fa4567e4a0b6b1a7f88d

    • C:\Users\Admin\AppData\Local\Temp\FolderN\name.exe.bat

      Filesize

      204B

      MD5

      bfcbf382f036462e63f307ca4ae280c7

      SHA1

      ffe98d15fa5ea205220d6bc105e317253a6ea003

      SHA256

      2c3dd84c3ce3e529117e611d8caf4fc7f5a902840350f4ca524c251a2152c727

      SHA512

      1b912652cc989541b396df5fd6bf207a4cf4ed891dc6e3223b8d0497c19a2589cb644c4c96ca01d882a7643f240c566966d84e46d77e9ad33e05214f8f553d16

    • C:\Users\Admin\AppData\Local\Temp\FolderN\name.exe.jpg

      Filesize

      470KB

      MD5

      f7c1e09b6a2ea2f32904d085db69a463

      SHA1

      7f85783d57a71e360701e9299f51ab019b855cdb

      SHA256

      fff3107b5ae7015539e6b73f7ae155b59ec43d52eb6c1b8080a6edba4a627e33

      SHA512

      ad83abd23853a611503acc6abe65a480aca37186e0527c145d8157534ad75f24c4df0b6eb164d1bf90176912d68aac10c042e5f7cc32d62d53e59b61a2132fcd

    • C:\Users\Admin\AppData\Local\Temp\svhost.exe

      Filesize

      89KB

      MD5

      84c42d0f2c1ae761bef884638bc1eacd

      SHA1

      4353881e7f4e9c7610f4e0489183b55bb58bb574

      SHA256

      331487446653875bf1e628b797a5283e40056654f7ff328eafbe39b0304480d3

      SHA512

      43c307a38faa3a4b311597034cf75035a4434a1024d2a54e867e6a94b53b677898d71a858438d119000e872a7a6e92c5b31d277a8c207a94375ed4fd3c7beb87

    • memory/952-26-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/952-31-0x0000000074AD0000-0x0000000075081000-memory.dmp

      Filesize

      5.7MB

    • memory/952-37-0x0000000001600000-0x0000000001610000-memory.dmp

      Filesize

      64KB

    • memory/952-36-0x0000000074AD0000-0x0000000075081000-memory.dmp

      Filesize

      5.7MB

    • memory/952-34-0x0000000001600000-0x0000000001610000-memory.dmp

      Filesize

      64KB

    • memory/952-32-0x0000000001600000-0x0000000001610000-memory.dmp

      Filesize

      64KB

    • memory/952-33-0x0000000074AD0000-0x0000000075081000-memory.dmp

      Filesize

      5.7MB

    • memory/3828-22-0x0000000074AD0000-0x0000000075081000-memory.dmp

      Filesize

      5.7MB

    • memory/3828-30-0x0000000074AD0000-0x0000000075081000-memory.dmp

      Filesize

      5.7MB

    • memory/3828-15-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB

    • memory/3828-21-0x0000000001590000-0x00000000015A0000-memory.dmp

      Filesize

      64KB

    • memory/3828-20-0x0000000074AD0000-0x0000000075081000-memory.dmp

      Filesize

      5.7MB

    • memory/4724-1-0x0000000074AD0000-0x0000000075081000-memory.dmp

      Filesize

      5.7MB

    • memory/4724-0-0x0000000074AD0000-0x0000000075081000-memory.dmp

      Filesize

      5.7MB

    • memory/4724-2-0x0000000001990000-0x00000000019A0000-memory.dmp

      Filesize

      64KB

    • memory/4724-35-0x0000000074AD0000-0x0000000075081000-memory.dmp

      Filesize

      5.7MB