Analysis

  • max time kernel
    93s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/04/2024, 02:18

General

  • Target

    069a94015a4d79c923546096804df1f6_JaffaCakes118.exe

  • Size

    809KB

  • MD5

    069a94015a4d79c923546096804df1f6

  • SHA1

    03d607ee44c1dcfb0500bd161072ad67ab22b310

  • SHA256

    a3c0fd421875bbbf349d4eb8d09f003258a676668782ef1717c529d69483c56b

  • SHA512

    9292756495405f9a70acf8e52b6cbe2c3c19be06fdf20cea00c9e54913cb4cd3aa1970cdd873e50cdb4b7400cf440e28367f9746616e5e77d74bb97a35c56b35

  • SSDEEP

    12288:LEhB9nyhHP9PdfuByEMPxlDdCHs3l2lTI9HqXvrvHqB5zxJBhpZfYFvv:L+B9neHa+xCX0UvHej7W

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\069a94015a4d79c923546096804df1f6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\069a94015a4d79c923546096804df1f6_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    PID:1448
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1448 -s 3824
      2⤵
      • Program crash
      PID:5076
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1448 -ip 1448
    1⤵
      PID:4512

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\nsi4170.tmp\FDMClient.dll

            Filesize

            222KB

            MD5

            b8d9503e3c0ac31fae05382a2cc6197b

            SHA1

            f6085be74247af30c2aa79a63e8bd1f9667951df

            SHA256

            e57ec829e42342a1a0826c45a52e76b5cf038d3074f88b64b41dd75a367979c0

            SHA512

            8b926afbd47b42541e51e3eed65eaa7dffab3295d0ee1350174b187995e0d232e2c5b76e426407577c590d6a2418ef12e37bddc15438c1eeaed1e134feda8f6d

          • C:\Users\Admin\AppData\Local\Temp\nsi4170.tmp\System.dll

            Filesize

            17KB

            MD5

            62008374a494afeea2ee2ae9eee4c8c0

            SHA1

            94808fcf0748c437f4d7ffa4d540e054cb014fab

            SHA256

            9c4affddfa97b268b07c00ac28a2fe617dda806bf55088ccf348da149ee76c1a

            SHA512

            f584ed647b69ff8ff80450be8f0b267ebb3c97826dbf01d078165ea94b43afd1f00fc58b91d9e8f4d78465d70312c1b1a6ac66583ebdc009b0ce471a6cf149a0

          • C:\Users\Admin\AppData\Local\Temp\nsi4170.tmp\webapphost.dll

            Filesize

            1.4MB

            MD5

            502644b41549622acc7c5116620a22e6

            SHA1

            a7ce72ea70457478f244a3b9e04c5c61e72d6bee

            SHA256

            4653dcd1cd888e0ee00f9f5312523354384f7aa2b3cdd1fd4ebb7a1300faaf51

            SHA512

            cb236405d280e67262202d0f18acb5eee93ad5f0dbcb7207a267f6f8d8efd7042bb73b0f2ce8385c8f066976cc604830184ab645f09f9b930e31ad95c0e977f0