Analysis

  • max time kernel
    150s
  • max time network
    88s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-04-2024 03:08

General

  • Target

    043eaede991f0babf38e2e17937e4e99_JaffaCakes118.exe

  • Size

    437KB

  • MD5

    043eaede991f0babf38e2e17937e4e99

  • SHA1

    3308775eebfae7d12cce6f7154c5add1217c13d4

  • SHA256

    0e5cb83def6333b13ab36fcf301145537f565800e768aaa5c40c2378b27ec5da

  • SHA512

    2be4062e9519978bf82d2b36934b6d6e9e2971741827acae56c2dbb708220f0f685423fc0c3f150fd4eda8128348f0640ce6a58f9140713168947e177b8c1685

  • SSDEEP

    6144:O2qVEWmw4UhfrXi2jyLhxT5Ahv4go96AO2wZTOfmu4pilruhQfEQLOp8/Oe113ea:dqVHmw4Uh2ayHx9mTOfColruOf5jOe1H

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\043eaede991f0babf38e2e17937e4e99_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\043eaede991f0babf38e2e17937e4e99_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4640
    • C:\Users\Admin\AppData\Roaming\Microsoft\Search\SearchHelper.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Search\SearchHelper.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:4468
    • C:\Users\Admin\AppData\Local\Temp\WER9mso.dir00\com3.exe
      "\\.\C:\Users\Admin\AppData\Local\Temp\WER9mso.dir00\com3.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3972
      • C:\Windows\SysWOW64\reg.exe
        "C:\Windows\System32\reg.exe" ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /f /t REG_SZ /v "Intel GPU" /d "F:\Program Files\Intel GPU\GfxUI.exe"
        3⤵
        • Adds Run key to start application
        • Modifies registry key
        PID:4440
    • C:\Users\Admin\AppData\Local\Temp\043eaede991f0babf38e2e17937e4e99_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\043eaede991f0babf38e2e17937e4e99_JaffaCakes118.exe" silent pause
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4504
      • C:\Users\Admin\AppData\Roaming\Microsoft\Search\SearchHelper.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Search\SearchHelper.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:3392
      • C:\Users\Admin\AppData\Local\Temp\WER9mso.dir00\com3.exe
        "\\.\C:\Users\Admin\AppData\Local\Temp\WER9mso.dir00\com3.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:3952

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\WER9mso.dir00\com3.exe
    Filesize

    440KB

    MD5

    9dedf0ec45da5b76026b0a8aa9e7f7bd

    SHA1

    25742fa3d06b057b2c1ca25adb139c6e9b067d37

    SHA256

    38a8a29b971a732130123de99c0333347522e673d2b39a5d37c8f424046545e8

    SHA512

    68fd8a18418ec9ba6186e598a20ea9316f30ff151d959c6e8720810609bc3c8a8f74c1a1f146b54261cdc33a6556860f3874789fa1f09113de42572bc41cd32e

  • C:\Users\Admin\AppData\Roaming\Microsoft\Search\SearchHelper.exe
    Filesize

    440KB

    MD5

    2d181055c7420b001cfe8fe597f1ee2b

    SHA1

    11d2752e9e38561470e7b5d33f567f589ca81bdb

    SHA256

    52ad4e90bbf94f034141ff1ad6574866f6c55f66b0a6e69735f0a8aae45fad43

    SHA512

    482aae8475159ffbea638f731a3b1f32647afa60166e15b7163d573d079c55bf7af719ae71ccc373d5294afe120604e0d50c19ea5eee0e13a71b15f169ddab5f

  • C:\Users\Admin\AppData\Roaming\Microsoft\persist.dat
    Filesize

    10B

    MD5

    bc62f40c0a6a4929df7e775e738a416e

    SHA1

    0643661f9e0858f4d77e2b831fab91573a081930

    SHA256

    ef766d89e40b511b7bbea6fe8997fd635daf8ee90d64b3918a186b2a9b087fc4

    SHA512

    376389145c35b22d0f46a3e6b79bf9a9fb5c30f6492e790b03f1006da12fee025bcce9f444d650f9671e0085e3a0e4c04cefa3a8938d81511231be66d9c76642

  • memory/3392-66-0x0000000063080000-0x00000000631EC000-memory.dmp
    Filesize

    1.4MB

  • memory/3392-77-0x0000000000400000-0x0000000000468000-memory.dmp
    Filesize

    416KB

  • memory/3952-56-0x0000000063080000-0x00000000631EC000-memory.dmp
    Filesize

    1.4MB

  • memory/3952-76-0x0000000000400000-0x0000000000468000-memory.dmp
    Filesize

    416KB

  • memory/4468-16-0x0000000063080000-0x00000000631EC000-memory.dmp
    Filesize

    1.4MB

  • memory/4468-78-0x0000000000400000-0x0000000000468000-memory.dmp
    Filesize

    416KB

  • memory/4504-45-0x0000000063080000-0x00000000631EC000-memory.dmp
    Filesize

    1.4MB

  • memory/4640-0-0x0000000063080000-0x00000000631EC000-memory.dmp
    Filesize

    1.4MB

  • memory/4640-43-0x0000000000400000-0x0000000000468000-memory.dmp
    Filesize

    416KB