Analysis

  • max time kernel
    157s
  • max time network
    164s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-05-2024 22:43

General

  • Target

    220bef6290003075596e35fe85beeb8e_JaffaCakes118.exe

  • Size

    1.1MB

  • MD5

    220bef6290003075596e35fe85beeb8e

  • SHA1

    1dcc2276cf97faaa04c99eb848245c671e507628

  • SHA256

    b596492810bc82030250565b4b501e2b54b99660c6d378141b2abd953456172a

  • SHA512

    4c65357a10e9cac6a8d27cd53803584b49e838db4c6d8411595f27461cd1638b568248361b4e43f3a7b7d65bb0561bb388c2d60694036bdf6bc1d38e5b90cfef

  • SSDEEP

    24576:HlqccSRWucE/XKA7Y52htSoHEEWZEOZtzB9+5T6eWRaefD:F+UXYYSoHEEWZ7tzxeWRa

Malware Config

Signatures

  • DarkTrack

    DarkTrack is a remote administration tool written in delphi.

  • DarkTrack payload 16 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\220bef6290003075596e35fe85beeb8e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\220bef6290003075596e35fe85beeb8e_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1280
    • C:\Users\Admin\AppData\Local\Temp\220bef6290003075596e35fe85beeb8e_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\220bef6290003075596e35fe85beeb8e_JaffaCakes118.exe"
      2⤵
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:4748
      • C:\Users\Admin\AppData\Local\Temp\csrss.exe
        "C:\Users\Admin\AppData\Local\Temp\csrss.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Accesses Microsoft Outlook profiles
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • outlook_office_path
        • outlook_win_path
        PID:5012
        • C:\Users\Admin\AppData\Local\Temp\GT7.exe
          "C:\Users\Admin\AppData\Local\Temp\GT7.exe" C:\Users\Admin\AppData\Local\Temp\csrss.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3836
      • C:\Users\Admin\AppData\Local\Temp\windows.exe
        "C:\Users\Admin\AppData\Local\Temp\windows.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2016
        • C:\Windows\SysWOW64\notepad.exe
          notepad
          4⤵
            PID:2432
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\windows.exe >> NUL
            4⤵
              PID:2040
            • C:\Users\Admin\AppData\Roaming\explorer.exe
              "C:\Users\Admin\AppData\Roaming\explorer.exe"
              4⤵
              • Executes dropped EXE
              • Suspicious behavior: GetForegroundWindowSpam
              • Suspicious use of WriteProcessMemory
              PID:4396
              • C:\Windows\SysWOW64\notepad.exe
                notepad
                5⤵
                  PID:2204
                • C:\Windows\SysWOW64\notepad.exe
                  notepad
                  5⤵
                  • Adds Run key to start application
                  PID:4120
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1424 --field-trial-handle=1928,i,13242902252791919845,10377620236057253993,262144 --variations-seed-version /prefetch:8
          1⤵
            PID:3672

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\GT7.exe

            Filesize

            10KB

            MD5

            f683769b947501b5a98376619d5938bb

            SHA1

            6a38e4acd9ade0d85697d10683ec84fa0daed11c

            SHA256

            c2cae82e01d954e3a50feaebcd3f75de7416a851ea855d6f0e8aaac84a507ca3

            SHA512

            dbd7a26139c5ef6a409fb247b08eb54c62328edace9a047aac3ca75b8e552572428dbda4efc7836398fa4d2d9e68075e10e2436efcf1f9fc138d69ac440bd556

          • C:\Users\Admin\AppData\Local\Temp\csrss.exe

            Filesize

            201KB

            MD5

            360a77caa4e85637a13173866c2ca681

            SHA1

            86f0fb1e5f0d7d458a5e4e8194d59fb1b8f9c6b8

            SHA256

            f6eae0b8115d503db5cf7a0976447c318025d0fda676fbf920074c55f703bef9

            SHA512

            64c638b1928919cd9dbf46844ad7bc4d6591735b6ef5f145091f422e5afd2d3c7b08a255f33e194dfa62b94aef88acf5e837aa8b3092747b7e41d27628bc1d15

          • C:\Users\Admin\AppData\Local\Temp\windows.exe

            Filesize

            627KB

            MD5

            5a3c8b2bd32eb513c201eb96458926be

            SHA1

            2b8c448fc81c79ac76c91c039db57e539be96901

            SHA256

            7bb4430e8570531f43e83a3de282dda02f9d1ef6e59e58dc4c75f51a0f8ca40a

            SHA512

            9345caa77a64199476f07ba457d56ae551eddd9f06741400a7d4a8f3f9a6832605352c31716b86c6977fba042c72c971e5258245fb1b169d176a5e5727be4614

          • memory/1280-1-0x0000000075120000-0x00000000756D1000-memory.dmp

            Filesize

            5.7MB

          • memory/1280-2-0x0000000075120000-0x00000000756D1000-memory.dmp

            Filesize

            5.7MB

          • memory/1280-0-0x0000000075122000-0x0000000075123000-memory.dmp

            Filesize

            4KB

          • memory/1280-9-0x0000000075120000-0x00000000756D1000-memory.dmp

            Filesize

            5.7MB

          • memory/1280-10-0x0000000075120000-0x00000000756D1000-memory.dmp

            Filesize

            5.7MB

          • memory/2016-37-0x0000000000400000-0x00000000004A8000-memory.dmp

            Filesize

            672KB

          • memory/2432-29-0x0000000000690000-0x0000000000691000-memory.dmp

            Filesize

            4KB

          • memory/4120-41-0x00000000022F0000-0x00000000022F1000-memory.dmp

            Filesize

            4KB

          • memory/4396-62-0x0000000000400000-0x00000000004A8000-memory.dmp

            Filesize

            672KB

          • memory/4396-59-0x0000000000400000-0x00000000004A8000-memory.dmp

            Filesize

            672KB

          • memory/4396-66-0x0000000000400000-0x00000000004A8000-memory.dmp

            Filesize

            672KB

          • memory/4396-65-0x0000000000400000-0x00000000004A8000-memory.dmp

            Filesize

            672KB

          • memory/4396-64-0x0000000000400000-0x00000000004A8000-memory.dmp

            Filesize

            672KB

          • memory/4396-42-0x0000000000400000-0x00000000004A8000-memory.dmp

            Filesize

            672KB

          • memory/4396-63-0x0000000000400000-0x00000000004A8000-memory.dmp

            Filesize

            672KB

          • memory/4396-61-0x0000000000400000-0x00000000004A8000-memory.dmp

            Filesize

            672KB

          • memory/4396-45-0x0000000000400000-0x00000000004A8000-memory.dmp

            Filesize

            672KB

          • memory/4396-60-0x0000000000400000-0x00000000004A8000-memory.dmp

            Filesize

            672KB

          • memory/4748-3-0x0000000000400000-0x00000000004D3000-memory.dmp

            Filesize

            844KB

          • memory/4748-28-0x0000000000400000-0x00000000004D3000-memory.dmp

            Filesize

            844KB

          • memory/4748-8-0x0000000000400000-0x00000000004D3000-memory.dmp

            Filesize

            844KB

          • memory/4748-5-0x0000000000400000-0x00000000004D3000-memory.dmp

            Filesize

            844KB

          • memory/5012-44-0x0000000073FA0000-0x0000000074551000-memory.dmp

            Filesize

            5.7MB

          • memory/5012-43-0x0000000073FA2000-0x0000000073FA3000-memory.dmp

            Filesize

            4KB

          • memory/5012-26-0x0000000073FA2000-0x0000000073FA3000-memory.dmp

            Filesize

            4KB

          • memory/5012-27-0x0000000073FA0000-0x0000000074551000-memory.dmp

            Filesize

            5.7MB