Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-04-2024 02:01

General

  • Target

    fbae53e539c388e11c4f330ba6e2010f_JaffaCakes118.exe

  • Size

    2.0MB

  • MD5

    fbae53e539c388e11c4f330ba6e2010f

  • SHA1

    2d16711a395bd0f27756fab2f4f744a4f3a9f4c4

  • SHA256

    d70954b2e608f3d2f4561364035d3c4958743a668db083f21a7b216a820ca539

  • SHA512

    b0ff9c987c836da8ac5df7dda796bd70509112e25fa3cd1eda895964b15ad211eecc159c9910925a4f001cec2d691c42c542c922660a3149393d05eb398c4e54

  • SSDEEP

    24576:X0a/3paargPZtr1msdlDTtcSqxSrj8X27aBRmFMA9MxlCZ/W5DUulT777fcS:h3p9gLrIydqxy8Xf/m+Auxuy577

Malware Config

Extracted

Family

mercurialgrabber

C2

https://discord.com/api/webhooks/879456588325355560/3tZf_QDFmZ6QGOe8DwHiYbH3_1NLE4daVz3SuCc7otWv_q4f9i1UIPgEu_CjqmgzPeix

Extracted

Family

njrat

Version

v2.0

Botnet

clean

C2

lola111222.ddns.net:6611

Mutex

Windows

Attributes
  • reg_key

    Windows

  • splitter

    |-F-|

Signatures

  • Detect ZGRat V1 1 IoCs
  • Mercurial Grabber Stealer

    Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.

  • ZGRat

    ZGRat is remote access trojan written in C#.

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
  • Looks for VMWare Tools registry key 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 1 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 32 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs
  • Views/modifies file attributes 1 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fbae53e539c388e11c4f330ba6e2010f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fbae53e539c388e11c4f330ba6e2010f_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:4864
    • C:\Windows\Fonts\hack.exe
      "C:\Windows\Fonts\hack.exe"
      2⤵
      • Looks for VirtualBox Guest Additions in registry
      • Looks for VMWare Tools registry key
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Maps connected drives based on registry
      • Checks SCSI registry key(s)
      • Checks processor information in registry
      • Enumerates system info in registry
      • Modifies system certificate store
      • Suspicious use of AdjustPrivilegeToken
      PID:4972
    • C:\Windows\Fonts\nyzak.exe
      "C:\Windows\Fonts\nyzak.exe"
      2⤵
      • Checks computer location settings
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3080
      • C:\Users\Admin\AppData\Roaming\clean.bat
        "C:\Users\Admin\AppData\Roaming\clean.bat"
        3⤵
        • Drops startup file
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3212
        • C:\Windows\SysWOW64\attrib.exe
          attrib +h +r +s "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.exe"
          4⤵
          • Views/modifies file attributes
          PID:1464
        • C:\Windows\SysWOW64\attrib.exe
          attrib +h +r +s "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\Windows.exe"
          4⤵
          • Views/modifies file attributes
          PID:3140
      • C:\Windows\SysWOW64\attrib.exe
        attrib +h +r +s "C:\Users\Admin\AppData\Roaming\clean.bat"
        3⤵
        • Views/modifies file attributes
        PID:4268

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk

    Filesize

    1KB

    MD5

    c35635a89b868ebc17e1791d250939d0

    SHA1

    f3d54874dc46824397bf6bffbb6145faf88697fe

    SHA256

    dae51fa1916f886629be098fcc43ef8bd01f48ba0d9ed0845896b4549d1ffc15

    SHA512

    c70305fc944414f5ce1f364d5be4c4384735fa50c1c72127a4bcfbec185a84bec5bee9957397c6c942db41ee4f0f7c74a78b180e3cdc5fdf02ea3445673fcafe

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\Windows.lnk

    Filesize

    1KB

    MD5

    93ac17be8e1500431214ea6871db414d

    SHA1

    ed5cd467c3eb565912531aebe19995cbb3371982

    SHA256

    8f29bd6e883401f08a311fb2b39ca9dc13a82f30798e1e92e2fbdb54157a7d3e

    SHA512

    e9f19c7eca5f088bd4b025d9cecc0d18b886bfe454e4fa8d014c2a475ac9d5503581ba527c949283c9626d07e114446cf3b08acfb11158552db02a1fbf851b16

  • C:\Windows\Fonts\hack.exe

    Filesize

    94KB

    MD5

    0eb478968a02b1e539dce5c1220686a6

    SHA1

    5fadfb381012443c776049d4d874ed6f458e4bfa

    SHA256

    08d95e6a8355f0e4234f69f5d109fff301edbf0884a96ef606d4b0907d6bbe53

    SHA512

    a80ff14e8d9aa4bbd3ecb0c5425335df1d6cdedd9761d94a49692f9112241a517c45af9ca96e0209091e500a172f530d534005e96dda91da79057b5ef900ef5d

  • C:\Windows\Fonts\nyzak.exe

    Filesize

    26KB

    MD5

    a448fdbddc4a0b9749b84ec16da8640f

    SHA1

    da9c25f5eaaaedbf9f72a413d84cb7286a436e14

    SHA256

    904376d60004beac24841314bf8abdd084869acf056032330561f4ca4fabebc6

    SHA512

    3015279874358e88d6513b6bdd445c21daf056874a0f11ea09b09f0b0204b0be10b63e3a742cf2f6bbf0db22f820a496b457c42bb1d244a9e18459cbcec1a18e

  • memory/3080-44-0x000000006F430000-0x000000006F9E1000-memory.dmp

    Filesize

    5.7MB

  • memory/3080-28-0x000000006F430000-0x000000006F9E1000-memory.dmp

    Filesize

    5.7MB

  • memory/3080-26-0x00000000013D0000-0x00000000013E0000-memory.dmp

    Filesize

    64KB

  • memory/3080-25-0x000000006F430000-0x000000006F9E1000-memory.dmp

    Filesize

    5.7MB

  • memory/3212-45-0x0000000000B60000-0x0000000000B70000-memory.dmp

    Filesize

    64KB

  • memory/3212-43-0x000000006F430000-0x000000006F9E1000-memory.dmp

    Filesize

    5.7MB

  • memory/3212-57-0x0000000000B60000-0x0000000000B70000-memory.dmp

    Filesize

    64KB

  • memory/3212-56-0x000000006F430000-0x000000006F9E1000-memory.dmp

    Filesize

    5.7MB

  • memory/3212-46-0x000000006F430000-0x000000006F9E1000-memory.dmp

    Filesize

    5.7MB

  • memory/4864-0-0x0000000000EE0000-0x00000000010EC000-memory.dmp

    Filesize

    2.0MB

  • memory/4864-34-0x00000000749E0000-0x0000000075190000-memory.dmp

    Filesize

    7.7MB

  • memory/4864-3-0x0000000005B20000-0x0000000005BB2000-memory.dmp

    Filesize

    584KB

  • memory/4864-1-0x00000000749E0000-0x0000000075190000-memory.dmp

    Filesize

    7.7MB

  • memory/4864-4-0x0000000005D10000-0x0000000005D20000-memory.dmp

    Filesize

    64KB

  • memory/4864-2-0x00000000060D0000-0x0000000006674000-memory.dmp

    Filesize

    5.6MB

  • memory/4864-7-0x0000000005D10000-0x0000000005D20000-memory.dmp

    Filesize

    64KB

  • memory/4864-54-0x0000000005D10000-0x0000000005D20000-memory.dmp

    Filesize

    64KB

  • memory/4864-5-0x0000000005AF0000-0x0000000005AFA000-memory.dmp

    Filesize

    40KB

  • memory/4972-33-0x00000000027A0000-0x00000000027B0000-memory.dmp

    Filesize

    64KB

  • memory/4972-32-0x00007FFDD0B50000-0x00007FFDD1611000-memory.dmp

    Filesize

    10.8MB

  • memory/4972-55-0x00007FFDD0B50000-0x00007FFDD1611000-memory.dmp

    Filesize

    10.8MB

  • memory/4972-29-0x0000000000550000-0x000000000056C000-memory.dmp

    Filesize

    112KB