Analysis
-
max time kernel
157s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
07-05-2024 22:43
Static task
static1
Behavioral task
behavioral1
Sample
220bef6290003075596e35fe85beeb8e_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
220bef6290003075596e35fe85beeb8e_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
220bef6290003075596e35fe85beeb8e_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
220bef6290003075596e35fe85beeb8e
-
SHA1
1dcc2276cf97faaa04c99eb848245c671e507628
-
SHA256
b596492810bc82030250565b4b501e2b54b99660c6d378141b2abd953456172a
-
SHA512
4c65357a10e9cac6a8d27cd53803584b49e838db4c6d8411595f27461cd1638b568248361b4e43f3a7b7d65bb0561bb388c2d60694036bdf6bc1d38e5b90cfef
-
SSDEEP
24576:HlqccSRWucE/XKA7Y52htSoHEEWZEOZtzB9+5T6eWRaefD:F+UXYYSoHEEWZ7tzxeWRa
Malware Config
Signatures
-
DarkTrack payload 16 IoCs
Processes:
resource yara_rule behavioral2/memory/4748-3-0x0000000000400000-0x00000000004D3000-memory.dmp family_darktrack behavioral2/memory/4748-5-0x0000000000400000-0x00000000004D3000-memory.dmp family_darktrack behavioral2/memory/4748-8-0x0000000000400000-0x00000000004D3000-memory.dmp family_darktrack C:\Users\Admin\AppData\Local\Temp\windows.exe family_darktrack behavioral2/memory/4748-28-0x0000000000400000-0x00000000004D3000-memory.dmp family_darktrack behavioral2/memory/2016-37-0x0000000000400000-0x00000000004A8000-memory.dmp family_darktrack behavioral2/memory/4396-42-0x0000000000400000-0x00000000004A8000-memory.dmp family_darktrack behavioral2/memory/4396-45-0x0000000000400000-0x00000000004A8000-memory.dmp family_darktrack behavioral2/memory/4396-59-0x0000000000400000-0x00000000004A8000-memory.dmp family_darktrack behavioral2/memory/4396-60-0x0000000000400000-0x00000000004A8000-memory.dmp family_darktrack behavioral2/memory/4396-61-0x0000000000400000-0x00000000004A8000-memory.dmp family_darktrack behavioral2/memory/4396-62-0x0000000000400000-0x00000000004A8000-memory.dmp family_darktrack behavioral2/memory/4396-63-0x0000000000400000-0x00000000004A8000-memory.dmp family_darktrack behavioral2/memory/4396-64-0x0000000000400000-0x00000000004A8000-memory.dmp family_darktrack behavioral2/memory/4396-65-0x0000000000400000-0x00000000004A8000-memory.dmp family_darktrack behavioral2/memory/4396-66-0x0000000000400000-0x00000000004A8000-memory.dmp family_darktrack -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
220bef6290003075596e35fe85beeb8e_JaffaCakes118.exewindows.execsrss.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 220bef6290003075596e35fe85beeb8e_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation windows.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation csrss.exe -
Executes dropped EXE 4 IoCs
Processes:
csrss.exewindows.exeexplorer.exeGT7.exepid process 5012 csrss.exe 2016 windows.exe 4396 explorer.exe 3836 GT7.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
csrss.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 csrss.exe Key opened \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 csrss.exe Key opened \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 csrss.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
notepad.execsrss.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\explorer.exe = "C:\\Users\\Admin\\AppData\\Roaming\\explorer.exe" notepad.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OM Group Inc = "C:\\Users\\Admin\\AppData\\Roaming\\OM Group Inc\\OM Group Inc.exe" csrss.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 31 checkip.dyndns.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
220bef6290003075596e35fe85beeb8e_JaffaCakes118.exedescription pid process target process PID 1280 set thread context of 4748 1280 220bef6290003075596e35fe85beeb8e_JaffaCakes118.exe 220bef6290003075596e35fe85beeb8e_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
csrss.exeGT7.exepid process 5012 csrss.exe 5012 csrss.exe 5012 csrss.exe 5012 csrss.exe 5012 csrss.exe 3836 GT7.exe 3836 GT7.exe 5012 csrss.exe 5012 csrss.exe 3836 GT7.exe 3836 GT7.exe 5012 csrss.exe 5012 csrss.exe 3836 GT7.exe 3836 GT7.exe 5012 csrss.exe 5012 csrss.exe 3836 GT7.exe 3836 GT7.exe 5012 csrss.exe 5012 csrss.exe 3836 GT7.exe 3836 GT7.exe 5012 csrss.exe 5012 csrss.exe 3836 GT7.exe 3836 GT7.exe 5012 csrss.exe 5012 csrss.exe 3836 GT7.exe 3836 GT7.exe 5012 csrss.exe 5012 csrss.exe 3836 GT7.exe 3836 GT7.exe 5012 csrss.exe 5012 csrss.exe 5012 csrss.exe 5012 csrss.exe 3836 GT7.exe 3836 GT7.exe 5012 csrss.exe 5012 csrss.exe 3836 GT7.exe 3836 GT7.exe 5012 csrss.exe 5012 csrss.exe 3836 GT7.exe 3836 GT7.exe 5012 csrss.exe 5012 csrss.exe 3836 GT7.exe 3836 GT7.exe 5012 csrss.exe 5012 csrss.exe 3836 GT7.exe 3836 GT7.exe 5012 csrss.exe 5012 csrss.exe 3836 GT7.exe 3836 GT7.exe 5012 csrss.exe 5012 csrss.exe 3836 GT7.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
explorer.exepid process 4396 explorer.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
csrss.exeGT7.exedescription pid process Token: SeDebugPrivilege 5012 csrss.exe Token: SeDebugPrivilege 3836 GT7.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
csrss.exepid process 5012 csrss.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
220bef6290003075596e35fe85beeb8e_JaffaCakes118.exe220bef6290003075596e35fe85beeb8e_JaffaCakes118.exewindows.exeexplorer.exedescription pid process target process PID 1280 wrote to memory of 4748 1280 220bef6290003075596e35fe85beeb8e_JaffaCakes118.exe 220bef6290003075596e35fe85beeb8e_JaffaCakes118.exe PID 1280 wrote to memory of 4748 1280 220bef6290003075596e35fe85beeb8e_JaffaCakes118.exe 220bef6290003075596e35fe85beeb8e_JaffaCakes118.exe PID 1280 wrote to memory of 4748 1280 220bef6290003075596e35fe85beeb8e_JaffaCakes118.exe 220bef6290003075596e35fe85beeb8e_JaffaCakes118.exe PID 1280 wrote to memory of 4748 1280 220bef6290003075596e35fe85beeb8e_JaffaCakes118.exe 220bef6290003075596e35fe85beeb8e_JaffaCakes118.exe PID 1280 wrote to memory of 4748 1280 220bef6290003075596e35fe85beeb8e_JaffaCakes118.exe 220bef6290003075596e35fe85beeb8e_JaffaCakes118.exe PID 1280 wrote to memory of 4748 1280 220bef6290003075596e35fe85beeb8e_JaffaCakes118.exe 220bef6290003075596e35fe85beeb8e_JaffaCakes118.exe PID 1280 wrote to memory of 4748 1280 220bef6290003075596e35fe85beeb8e_JaffaCakes118.exe 220bef6290003075596e35fe85beeb8e_JaffaCakes118.exe PID 1280 wrote to memory of 4748 1280 220bef6290003075596e35fe85beeb8e_JaffaCakes118.exe 220bef6290003075596e35fe85beeb8e_JaffaCakes118.exe PID 4748 wrote to memory of 5012 4748 220bef6290003075596e35fe85beeb8e_JaffaCakes118.exe csrss.exe PID 4748 wrote to memory of 5012 4748 220bef6290003075596e35fe85beeb8e_JaffaCakes118.exe csrss.exe PID 4748 wrote to memory of 5012 4748 220bef6290003075596e35fe85beeb8e_JaffaCakes118.exe csrss.exe PID 4748 wrote to memory of 2016 4748 220bef6290003075596e35fe85beeb8e_JaffaCakes118.exe windows.exe PID 4748 wrote to memory of 2016 4748 220bef6290003075596e35fe85beeb8e_JaffaCakes118.exe windows.exe PID 4748 wrote to memory of 2016 4748 220bef6290003075596e35fe85beeb8e_JaffaCakes118.exe windows.exe PID 2016 wrote to memory of 2432 2016 windows.exe notepad.exe PID 2016 wrote to memory of 2432 2016 windows.exe notepad.exe PID 2016 wrote to memory of 2432 2016 windows.exe notepad.exe PID 2016 wrote to memory of 2432 2016 windows.exe notepad.exe PID 2016 wrote to memory of 2432 2016 windows.exe notepad.exe PID 2016 wrote to memory of 2432 2016 windows.exe notepad.exe PID 2016 wrote to memory of 2432 2016 windows.exe notepad.exe PID 2016 wrote to memory of 2432 2016 windows.exe notepad.exe PID 2016 wrote to memory of 2432 2016 windows.exe notepad.exe PID 2016 wrote to memory of 2432 2016 windows.exe notepad.exe PID 2016 wrote to memory of 2432 2016 windows.exe notepad.exe PID 2016 wrote to memory of 2432 2016 windows.exe notepad.exe PID 2016 wrote to memory of 2432 2016 windows.exe notepad.exe PID 2016 wrote to memory of 2432 2016 windows.exe notepad.exe PID 2016 wrote to memory of 2432 2016 windows.exe notepad.exe PID 2016 wrote to memory of 2432 2016 windows.exe notepad.exe PID 2016 wrote to memory of 2432 2016 windows.exe notepad.exe PID 2016 wrote to memory of 2432 2016 windows.exe notepad.exe PID 2016 wrote to memory of 2432 2016 windows.exe notepad.exe PID 2016 wrote to memory of 2432 2016 windows.exe notepad.exe PID 2016 wrote to memory of 2432 2016 windows.exe notepad.exe PID 2016 wrote to memory of 2432 2016 windows.exe notepad.exe PID 2016 wrote to memory of 2040 2016 windows.exe cmd.exe PID 2016 wrote to memory of 2040 2016 windows.exe cmd.exe PID 2016 wrote to memory of 2040 2016 windows.exe cmd.exe PID 2016 wrote to memory of 4396 2016 windows.exe explorer.exe PID 2016 wrote to memory of 4396 2016 windows.exe explorer.exe PID 2016 wrote to memory of 4396 2016 windows.exe explorer.exe PID 4396 wrote to memory of 2204 4396 explorer.exe notepad.exe PID 4396 wrote to memory of 2204 4396 explorer.exe notepad.exe PID 4396 wrote to memory of 2204 4396 explorer.exe notepad.exe PID 4396 wrote to memory of 2204 4396 explorer.exe notepad.exe PID 4396 wrote to memory of 2204 4396 explorer.exe notepad.exe PID 4396 wrote to memory of 2204 4396 explorer.exe notepad.exe PID 4396 wrote to memory of 2204 4396 explorer.exe notepad.exe PID 4396 wrote to memory of 2204 4396 explorer.exe notepad.exe PID 4396 wrote to memory of 2204 4396 explorer.exe notepad.exe PID 4396 wrote to memory of 2204 4396 explorer.exe notepad.exe PID 4396 wrote to memory of 2204 4396 explorer.exe notepad.exe PID 4396 wrote to memory of 2204 4396 explorer.exe notepad.exe PID 4396 wrote to memory of 2204 4396 explorer.exe notepad.exe PID 4396 wrote to memory of 2204 4396 explorer.exe notepad.exe PID 4396 wrote to memory of 2204 4396 explorer.exe notepad.exe PID 4396 wrote to memory of 2204 4396 explorer.exe notepad.exe PID 4396 wrote to memory of 2204 4396 explorer.exe notepad.exe PID 4396 wrote to memory of 2204 4396 explorer.exe notepad.exe PID 4396 wrote to memory of 2204 4396 explorer.exe notepad.exe PID 4396 wrote to memory of 2204 4396 explorer.exe notepad.exe PID 4396 wrote to memory of 2204 4396 explorer.exe notepad.exe PID 4396 wrote to memory of 2204 4396 explorer.exe notepad.exe -
outlook_office_path 1 IoCs
Processes:
csrss.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 csrss.exe -
outlook_win_path 1 IoCs
Processes:
csrss.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 csrss.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\220bef6290003075596e35fe85beeb8e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\220bef6290003075596e35fe85beeb8e_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Users\Admin\AppData\Local\Temp\220bef6290003075596e35fe85beeb8e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\220bef6290003075596e35fe85beeb8e_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Users\Admin\AppData\Local\Temp\csrss.exe"C:\Users\Admin\AppData\Local\Temp\csrss.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:5012 -
C:\Users\Admin\AppData\Local\Temp\GT7.exe"C:\Users\Admin\AppData\Local\Temp\GT7.exe" C:\Users\Admin\AppData\Local\Temp\csrss.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3836
-
-
-
C:\Users\Admin\AppData\Local\Temp\windows.exe"C:\Users\Admin\AppData\Local\Temp\windows.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\notepad.exenotepad4⤵PID:2432
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\windows.exe >> NUL4⤵PID:2040
-
-
C:\Users\Admin\AppData\Roaming\explorer.exe"C:\Users\Admin\AppData\Roaming\explorer.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Windows\SysWOW64\notepad.exenotepad5⤵PID:2204
-
-
C:\Windows\SysWOW64\notepad.exenotepad5⤵
- Adds Run key to start application
PID:4120
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1424 --field-trial-handle=1928,i,13242902252791919845,10377620236057253993,262144 --variations-seed-version /prefetch:81⤵PID:3672
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD5f683769b947501b5a98376619d5938bb
SHA16a38e4acd9ade0d85697d10683ec84fa0daed11c
SHA256c2cae82e01d954e3a50feaebcd3f75de7416a851ea855d6f0e8aaac84a507ca3
SHA512dbd7a26139c5ef6a409fb247b08eb54c62328edace9a047aac3ca75b8e552572428dbda4efc7836398fa4d2d9e68075e10e2436efcf1f9fc138d69ac440bd556
-
Filesize
201KB
MD5360a77caa4e85637a13173866c2ca681
SHA186f0fb1e5f0d7d458a5e4e8194d59fb1b8f9c6b8
SHA256f6eae0b8115d503db5cf7a0976447c318025d0fda676fbf920074c55f703bef9
SHA51264c638b1928919cd9dbf46844ad7bc4d6591735b6ef5f145091f422e5afd2d3c7b08a255f33e194dfa62b94aef88acf5e837aa8b3092747b7e41d27628bc1d15
-
Filesize
627KB
MD55a3c8b2bd32eb513c201eb96458926be
SHA12b8c448fc81c79ac76c91c039db57e539be96901
SHA2567bb4430e8570531f43e83a3de282dda02f9d1ef6e59e58dc4c75f51a0f8ca40a
SHA5129345caa77a64199476f07ba457d56ae551eddd9f06741400a7d4a8f3f9a6832605352c31716b86c6977fba042c72c971e5258245fb1b169d176a5e5727be4614