Analysis

  • max time kernel
    97s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    19-04-2024 23:57

General

  • Target

    fb749b67e3b3e6bfdc9cb2467a2c9acb_JaffaCakes118.exe

  • Size

    173KB

  • MD5

    fb749b67e3b3e6bfdc9cb2467a2c9acb

  • SHA1

    13748074e2b2386de82cfb967487cee2d82a2908

  • SHA256

    e64c44186ebe9b3ccebb55b94b83e0074347d29d5b3fff36c7f17fa40e40d9ed

  • SHA512

    847d724a8a9584f0a7fac2199b9d67acdee97a6a7432b7091f0468cf3d047029172089f9fbe2a23579dd0914bbdb94eb72db43f25bf007759e8073652a38e238

  • SSDEEP

    3072:fhpZNAUncfuKz/Vy3ApP1pqvpkBrMxPSrCHw9SI+VFZfOVmehXvSRkRehfoebNZ:fhzNAZPNBpPnypxNArZSnhAM

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 13 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Windows security modification 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 42 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 36 IoCs
  • Drops file in Program Files directory 59 IoCs
  • Drops file in Windows directory 27 IoCs
  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fb749b67e3b3e6bfdc9cb2467a2c9acb_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fb749b67e3b3e6bfdc9cb2467a2c9acb_JaffaCakes118.exe"
    1⤵
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:856
  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    PID:2532
  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    PID:2568
  • C:\Windows\system32\dllhost.exe
    C:\Windows\system32\dllhost.exe /Processid:{02D4B3F1-FD88-11D1-960D-00805FC79235}
    1⤵
    • Drops file in Windows directory
    PID:2936
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2440
  • C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"
    1⤵
    • Executes dropped EXE
    • Windows security modification
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2892

Network

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Impair Defenses

1
T1562

Disable or Modify Tools

1
T1562.001

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\ose.vir
    Filesize

    284KB

    MD5

    7ffeb68eb174c10b3f48898548a2f2a0

    SHA1

    6a02857cd6c936fe1566969450996e8d2d6af707

    SHA256

    9f120500f86cd50bcfefd660dd2ddd192b7ec6909ec6d910978ed0b7c2d53269

    SHA512

    3a7ee1ab3addb35746241579ab3713520900c8cc3d852532ae26c252b0821351158a0f2b97c8b37197351935c1e284b627912f675fffd0c8c8e5eee30a41627c

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\setup.exe
    Filesize

    1.2MB

    MD5

    81c19480abd4ea36763852ec1ee742d4

    SHA1

    5b9469f27c40c96d6a74de59ed6c4eafcaa1a08a

    SHA256

    bdfe435ad5d00e55ea05332e2de62bd2aafc8bab6ec8925dbc0036226db700cd

    SHA512

    3b71d6dc9d0f8c5d652b75db80078fee37c5e6b71cf1ad744b1b38c4ed553681ad50e6e6aaee8570cfef7c0b831e85b5156b44cb6c3f6d0a79c2ed1a7d1cbe58

  • C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\OSE.EXE
    Filesize

    284KB

    MD5

    3defb5b8b9ed4bf769b3588a9704e265

    SHA1

    3f4efef36e2dcd5b951ae5e3e326a66a8f4104d7

    SHA256

    14a30ae50d0d6608e08c93614cd4f8fd30b34e462bcc63176b1d3f9743fcc786

    SHA512

    7f8570f5084472778df1c55116e79f47a5011448771fa47902a855960d0889370bb50e2140fe34a4de7e7b6b0f433b8b2f67a36437b56745e5054f1f2884acf1

  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
    Filesize

    203KB

    MD5

    e73e9a9ded77ee2133e482b1d871c759

    SHA1

    3797296cb892d7b8aa404b6085f42cdf26e6897e

    SHA256

    163eea33c1c12a523e2a299bd40e1694e3a88e2bde5b628297202d0ded2c18b1

    SHA512

    7511fa6e8b3d92ae4aa219a68dbfdddc49429f216ff480490d01feab3b9624b8acece54bfe4657471236541c35b0e2df7d7f1dc86198f3999b1a70db08b7f000

  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.log
    Filesize

    1003KB

    MD5

    dbfd03d2482bbcb0daedc6b3ef1d9bf6

    SHA1

    013ac923daf4fa9def9356a135a41fe6701ae41d

    SHA256

    042c5fd2f3f53d9e06e43247b5896143b1f00160af12cc38deeace4fe9974f25

    SHA512

    bde889a74083528df10322381a12ac858027ba8d2775d3829a50085ce3283136ec046ff14062fc49b7da2dfe591c035950d85c8c3354ccf6450d872cecc66eaa

  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    Filesize

    234KB

    MD5

    40661e382d722e14e4f91d63e8f251f3

    SHA1

    b44fa16d4213591cea1f9365e92a20a6d1658096

    SHA256

    75b4efc59c848770f1e91f6326612618cc8333bf6981c45040aab260676424cb

    SHA512

    7f947fbb5bf98c99ea799d23af2e6985d849a95fb0885db2c629a29cb0304db6f17a767df398f004fc578c38728bb518cde1561d66a68810d6c220e4301b7158

  • \??\c:\program files (x86)\microsoft office\office14\groove.exe
    Filesize

    29.7MB

    MD5

    aded9254ac7f0cbf3b9489f50d01dcb4

    SHA1

    0d86c664a70b38989cb28f8ff51e663837904cfa

    SHA256

    ef2fd3f07ca207272ac7ac5fb4edcaf82f59d3c43f4419b1428bb94068361409

    SHA512

    0c301ecd54d20bde64cb721fc27d5156a7754cbc6a6d4552966dafa7518248196d22364633cb8ba4a11ac043eac81259a0694d9fc31db80b06151c60181eab4f

  • \??\c:\windows\SysWOW64\searchindexer.exe
    Filesize

    562KB

    MD5

    47bbce2e5948c054237d0911ce5caea6

    SHA1

    e21047574c35666f4a6e928280d602611f6549e9

    SHA256

    57b7cbaccf4de610312eb46c011e50500f15236176fcdeae5120c690d1f45b48

    SHA512

    36d12c4dc49615427034ea290d9826aee8fb6a6fc5363329d2f90c8ab347293a02638617b498c6ee05798460d318ee38ae78772f76feaf25a6bc1c451bf4a986

  • \??\c:\windows\SysWOW64\svchost.exe
    Filesize

    164KB

    MD5

    47c7f11ad5651fd51572ae361c58d387

    SHA1

    f29513531051454fd71bd601b1b0900cb9621d4e

    SHA256

    adb11e2ab43089c9894e0ebabafec21ca09c30cdd487c8b74b563805184fd1b2

    SHA512

    e211d2a99a4e8cbed8601fad2cb05e57203374a314c4566a0221d80df8e283097e86c91d242fa65c8b8cad1026da2b0c42698c14a69fed991133959008eb4482

  • memory/856-0-0x0000000001000000-0x0000000001069000-memory.dmp
    Filesize

    420KB

  • memory/2532-28-0x0000000010000000-0x0000000010070000-memory.dmp
    Filesize

    448KB

  • memory/2532-11-0x0000000010000000-0x0000000010070000-memory.dmp
    Filesize

    448KB

  • memory/2568-22-0x0000000000400000-0x0000000000479000-memory.dmp
    Filesize

    484KB

  • memory/2892-42-0x000000002E000000-0x000000002E086000-memory.dmp
    Filesize

    536KB