Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    04-05-2024 08:05

General

  • Target

    11cf5ca49a6c354eb005fb24bdf6b1f0_JaffaCakes118.exe

  • Size

    768KB

  • MD5

    11cf5ca49a6c354eb005fb24bdf6b1f0

  • SHA1

    c37b9b9fea73c95de363e8746ff305f4b23f0c28

  • SHA256

    4e87a0794bf73d06ac1ce4a37e33eb832ff4c89fb9e4266490c7cef9229d27a7

  • SHA512

    ac91cb1e00db5eab4dd2253f745703d95ea4fe086c4289da62088f40ea727e4b54205d230b4282d38df006c3aebb2522058e2737c90d426abf900368c9c6dbba

  • SSDEEP

    6144:jLPkIupKPUWqUzHwlyLqZucfo/4dQSP8AEcmqRYn/nCrK8cI1WaWQ0vOKO5DBHQp:3kXoDOUAuao/Kl9a9bQ+ZE1Qyu9

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 33 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 7 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\11cf5ca49a6c354eb005fb24bdf6b1f0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\11cf5ca49a6c354eb005fb24bdf6b1f0_JaffaCakes118.exe"
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2220
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /TN "Eburin" /TR "\"C:\ProgramData\Kip1.exe\""
      2⤵
      • Creates scheduled task(s)
      PID:1252
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /run /tn "Eburin"
      2⤵
        PID:2968
    • C:\Windows\system32\taskeng.exe
      taskeng.exe {12CBAE45-4B90-4963-8EF6-EE60FC548DE2} S-1-5-21-2721934792-624042501-2768869379-1000:BISMIZHX\Admin:Interactive:[1]
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:2580
      • C:\ProgramData\Kip1.exe
        C:\ProgramData\Kip1.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2644
        • C:\ProgramData\Kip1.exe
          C:\ProgramData\Kip1.exe
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          PID:2628
      • C:\ProgramData\Kip1.exe
        C:\ProgramData\Kip1.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:992
        • C:\ProgramData\Kip1.exe
          C:\ProgramData\Kip1.exe
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1648
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c timeout 1 && del "C:\ProgramData\Kip1.exe" >> NUL
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1624
            • C:\Windows\SysWOW64\timeout.exe
              timeout 1
              5⤵
              • Delays execution with timeout.exe
              PID:2784
    • C:\Program Files (x86)\Internet Explorer\ielowutil.exe
      "C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding
      1⤵
        PID:2572
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
        1⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2808
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2808 CREDAT:275457 /prefetch:2
          2⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2604

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\Kip1.exe

        Filesize

        768KB

        MD5

        b211348f8784ea450e1364c053046a6c

        SHA1

        70df9df1ffe20e7eac54e424c2e76242696904d2

        SHA256

        ca11b8ffbc782df697f34a26df930970b1ced2efbf89a34c506ae80a1cdc43bf

        SHA512

        b69d29cb50fbc3872a0e372c28747d56c94c094af7fe80168dfa48656e309aba32a7e9c7f26df6b5d2f2420592e6b079fc3df517298f2456e40aec2d8e36573a

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

        Filesize

        68KB

        MD5

        29f65ba8e88c063813cc50a4ea544e93

        SHA1

        05a7040d5c127e68c25d81cc51271ffb8bef3568

        SHA256

        1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

        SHA512

        e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        75e14720b9b9283a038972924c550af3

        SHA1

        3b7791916a19dbe3c1afa48f5b7a60be4156d34a

        SHA256

        2f16036c44ef5c784a89fe363e6244f0943a3d4f410ed794498e4efeb9fa0c23

        SHA512

        339c8e75a9006ae0f59241cf679d6dd998b6677c6be58bca06c689ba0645c63d925ae38d69cf565fe7585c3f8fe608f35515190002cb1ee22fe097fc5565615c

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        edae6bb0da77a25c63278d20ae0f880b

        SHA1

        eaac6ea1a03b20ffc0b429668511502677b374b8

        SHA256

        29b0f58f09327ac863f0a0723301da5e5f0e6063a885d9a78f28b6b12d487427

        SHA512

        9359fa398ebe802d8396a8e0dcec5bcd20dd206524ac44edc43db6812b99e44281cad1c6db3c0c688322f83e68af734a1e5aec639d41350f57fef675ed78bc8b

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        07a5e5f6a8a7ddf48d37178721a0bb0c

        SHA1

        f501300f784a14507bc55654849d1cfa6920ef9b

        SHA256

        88f240c7d1d70fd9fa89075254be8a5897b82d9eb2820334fb926998b7bfe807

        SHA512

        26e2fff4c3dfe9630f11d3fa1739ed5497924cec9c3373ffac38bae32d185ac397ea98b15b763c4011a5bb00192ab6752e37d6678245cefccb98826d46bd8d75

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        c576a68b671a5098c97bcdbdd17ecbab

        SHA1

        2279f9c3239cde9532bee6ff4a5d6288082a903d

        SHA256

        a0bc8ffd84154f0d4fd730eddff8f7e0315e6b7c74795b1a6ae3c6edd3767b58

        SHA512

        f5bfbd0cd46f860e6ece74fe0b3297ecce524c43595d57ef4c326f0dc07762d7cefef216ad245d6a38ebec8b74170f06370fdb6a58b794327df2d0b7c37f1137

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        3a450b533fc7778ec7be702f85cce3ba

        SHA1

        638650d6a887ec371167e5c9019f4c2282dc888b

        SHA256

        def10cbd3f23ae57563ab105e177a8fe73da6d7dd76811b4396c8aad1b4508e4

        SHA512

        f4565e03c2db1d5ab0cbb91771c42464956478d76b80e91101824847fac0c13ccd4adc411fdd8a700c2b9d259fe48ccf979d0aea889cfd48329aa5003fcd726e

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        3f5259f913693d63bf6ef413db38cb30

        SHA1

        6224079148c60985b0538f300bb9867f5ff17869

        SHA256

        5b50fec17d4a02dc480f3545eebfd5bfecf0b021def1268a972f5e410c49099b

        SHA512

        d1d4dd6660d0ec2d201b716be5d81c2a782e65d2814841f8ed1b28f1e9ddadebb9d36287b1a40c9e209ecd2e1f16c288ac0f0f0f56e889da9382c67b49570d95

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        0db286c6717d5b727a5d9f48704b389c

        SHA1

        71b62d816d4ef0b1fc0d9bb4fdfff5ff28740af8

        SHA256

        d93ed9af366c5a75e215d2eb0b5e3b248c59370c69d9816fff1064044c2d345b

        SHA512

        ee0ff5518557404b386f2ec26eb87ee5e8ba55239da2f18a9be0cc515897aa44c86d2d12fb11f18319b19d8be5fb1af57c7c31871e60c46bb2bacb8baab64779

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        98a127c68a33dd7c1d9c70c6a55a13cd

        SHA1

        a40b2c68d566160e15bde92d56df41460cd43fe6

        SHA256

        799f8c9275408702686a9f0f72ce53ff0a4d845e800f10d22d514c7445d6d69a

        SHA512

        f75b19367bbd61ca42ec466c71676bb79f9b6dcd85c19a68e8306752dab9233d38f3823c847320156b9514921f84db8eab58ae56cb4cc89b3edcb5aea1793edf

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        4b73622eeb8dd1274341241672904602

        SHA1

        dcede740e6cc10fdd6dbfa7b89e6cff79712e2bb

        SHA256

        0ef8d7e4cf823be7e47e528a6b1b1984be9c6dd71aefe467e7d1dee85da18d0b

        SHA512

        0d8c9c77210a80e81e45d07612d335bde39202e8bb6ae3b5722d7da59ebd798025381c0bcba89481f36e294106c79cad07b0e7a08c9cb3dd7f49d8cf23f67d5f

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        66cbb5dbf138b67773e831326a575c53

        SHA1

        9477b62450d24da60c9d9cccecede5f8e04b63fb

        SHA256

        ad4e9d2fd92e0633e06f3381bb3d8f3fd4803494d836bddda9fe265691d45234

        SHA512

        0106ad353a1d19cb8f5ab2ae7a0f7f2d0abcb11c10e12a6b2cb0aa1455795e8433d7861d57a6ba1721b904568a4a430ee7e6dbbb01b37642cc0cd73eb8dc1df6

      • C:\Users\Admin\AppData\Local\Temp\0772817871

        Filesize

        372KB

        MD5

        c4b773c6619e1d79f8d5d75014b2ca98

        SHA1

        969884cf4f5bf3b205ce24cf4693a988f8b98b5b

        SHA256

        b9174d22d68df4b1f8bd5e00f9fafd06b1ff3a7afe05b92c81177191b15ac5fd

        SHA512

        639cce3d50ea30d054cb3a21fc441d7e8be45ef2c0433a08f6895ce282d305b9c82cd4a8efa1ea8a6bf8fa64b64f140bbbe78618ca311c7630fb45be256fd6dd

      • C:\Users\Admin\AppData\Local\Temp\9689164991

        Filesize

        92KB

        MD5

        18e04095708297d6889a6962f81e8d8f

        SHA1

        9a25645db1da0217092c06579599b04982192124

        SHA256

        4ed16c019fe50bb4ab1c9dcedf0e52f93454b5dbaf18615d60761e7927b69fb7

        SHA512

        45ec57bddeeb8bca05babcf8da83bf9db630819b23076a1cf79f2e54b3e88e14cd7db650332554026ab5e8634061dd699f322bcba6683765063e67ac47ea1caf

      • C:\Users\Admin\AppData\Local\Temp\Cab3141.tmp

        Filesize

        65KB

        MD5

        ac05d27423a85adc1622c714f2cb6184

        SHA1

        b0fe2b1abddb97837ea0195be70ab2ff14d43198

        SHA256

        c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

        SHA512

        6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

      • C:\Users\Admin\AppData\Local\Temp\Tar3140.tmp

        Filesize

        171KB

        MD5

        9c0c641c06238516f27941aa1166d427

        SHA1

        64cd549fb8cf014fcd9312aa7a5b023847b6c977

        SHA256

        4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

        SHA512

        936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

      • C:\Users\Admin\AppData\Local\Temp\Tar3212.tmp

        Filesize

        177KB

        MD5

        435a9ac180383f9fa094131b173a2f7b

        SHA1

        76944ea657a9db94f9a4bef38f88c46ed4166983

        SHA256

        67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

        SHA512

        1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

      • memory/1648-559-0x0000000000400000-0x000000000041A000-memory.dmp

        Filesize

        104KB

      • memory/1648-609-0x0000000000400000-0x000000000041A000-memory.dmp

        Filesize

        104KB

      • memory/1648-560-0x0000000000400000-0x000000000041A000-memory.dmp

        Filesize

        104KB

      • memory/2220-2-0x0000000077A70000-0x0000000077B46000-memory.dmp

        Filesize

        856KB

      • memory/2628-75-0x0000000000400000-0x000000000041A000-memory.dmp

        Filesize

        104KB

      • memory/2628-8-0x0000000000400000-0x000000000041A000-memory.dmp

        Filesize

        104KB

      • memory/2628-10-0x0000000000400000-0x000000000041A000-memory.dmp

        Filesize

        104KB

      • memory/2628-11-0x0000000000400000-0x000000000041A000-memory.dmp

        Filesize

        104KB

      • memory/2628-13-0x00000000003C0000-0x00000000003C2000-memory.dmp

        Filesize

        8KB