Analysis

  • max time kernel
    140s
  • max time network
    113s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/05/2024, 19:43

General

  • Target

    21722a110bb1e6b58669826818f86cda_JaffaCakes118.exe

  • Size

    1.2MB

  • MD5

    21722a110bb1e6b58669826818f86cda

  • SHA1

    314fb1740ce849295e5c34f71671cf631853872f

  • SHA256

    b157fd3064fc77b986f5333b9f0b898c5ea3677f1434fb8ca2369e18b43af166

  • SHA512

    4b30a12909ed2149e7a076d4b287d19b0fa012365decfe8aef989f330157d8505d1cd0e639127d1a977e8e3a361bd33300662a3ebb0edc8cc23dbd62e7180b5e

  • SSDEEP

    24576:oDX2vzptbfKL1oX1Y5wrrRsrW7RdYxMn4iuKbQaqfQN+Qfsqo:QGvz5Xa0Nsr4Qx64qfqqB0qo

Score
7/10

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Executes dropped EXE 33 IoCs
  • Loads dropped DLL 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\21722a110bb1e6b58669826818f86cda_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\21722a110bb1e6b58669826818f86cda_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2508
    • C:\Users\Admin\AppData\Local\Temp\SDM143\Free Ride Games.exe
      "C:\Users\Admin\AppData\Local\Temp\SDM143\Free Ride Games.exe" "u 'http://www.freeridegames.com/spdo/feeds/sdmConfig?camp=%s&serviceId=143&gameId=%d' p '143' c '681950' m 'playfincpa003' t '0' l 'Default'"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3484
      • C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe
        UHR
        3⤵
        • Executes dropped EXE
        PID:2840
      • C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe
        UPR
        3⤵
        • Executes dropped EXE
        PID:2496
      • C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe
        ER
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4384
        • C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe
          R
          4⤵
          • Executes dropped EXE
          • Modifies registry class
          PID:1652
      • C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe
        UHW
        3⤵
        • Executes dropped EXE
        PID:3736
      • C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe
        UPW
        3⤵
        • Executes dropped EXE
        PID:4332
      • C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe
        EW
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1940
        • C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe
          W
          4⤵
          • Executes dropped EXE
          PID:4424
      • C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe
        UHW
        3⤵
        • Executes dropped EXE
        PID:4376
      • C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe
        UPW
        3⤵
        • Executes dropped EXE
        PID:1556
      • C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe
        EW
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2640
        • C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe
          W
          4⤵
          • Executes dropped EXE
          PID:2864
      • C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe
        UHW
        3⤵
        • Executes dropped EXE
        PID:3224
      • C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe
        UPW
        3⤵
        • Executes dropped EXE
        PID:4208
      • C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe
        EW
        3⤵
        • Executes dropped EXE
        PID:3076
        • C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe
          W
          4⤵
          • Executes dropped EXE
          PID:2448
  • C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe
    "C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe" HR
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:996
    • C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe
      R
      2⤵
      • Executes dropped EXE
      • Modifies registry class
      PID:1196
  • C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe
    "C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe" PR
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:3444
    • C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe
      R
      2⤵
      • Executes dropped EXE
      PID:3688
  • C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe
    "C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe" HW
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:2020
    • C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe
      W
      2⤵
      • Executes dropped EXE
      PID:4620
  • C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe
    "C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe" PW
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:3316
    • C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe
      W
      2⤵
      • Executes dropped EXE
      PID:3160
  • C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe
    "C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe" HW
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:3764
    • C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe
      W
      2⤵
      • Executes dropped EXE
      PID:400
  • C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe
    "C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe" PW
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:4632
    • C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe
      W
      2⤵
      • Executes dropped EXE
      PID:4820
  • C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe
    "C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe" HW
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:4452
    • C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe
      W
      2⤵
      • Executes dropped EXE
      PID:216
  • C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe
    "C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe" PW
    1⤵
    • Executes dropped EXE
    PID:2716
    • C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe
      W
      2⤵
      • Executes dropped EXE
      PID:1424

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Temp\ietemp1.dat

          Filesize

          124B

          MD5

          b4bd8456e5c3829efbf1741d8cc3df24

          SHA1

          fb7c3247e02db31c977d4d01720d7f8e7c36eb0b

          SHA256

          e0b7c31385011f507a948a755a49fefe1fd267bbefda462d0bf9a29c2a0f54b7

          SHA512

          9e6c4ad2858af2e84d3d98486482cd67140edee9f6bc667228b11a88a0248b484c8681bd03799885b56824fd2de9a7b416844c39512505dcf0156a4894d75b85

        • C:\Users\Admin\AppData\LocalLow\Temp\ietemp1.dat

          Filesize

          242B

          MD5

          54ce08c068e7c170a919162ff0c97f85

          SHA1

          9bc74bb59d7b3ccfd90316707c4c4feda92544e8

          SHA256

          bca8e3028edf5e381a19c12660f4df44790bb69d4e4aa894a645680594556c73

          SHA512

          e23203a4a6ff57eca3b613bd48a17799fadde761cc7b91ee58f8e0678a77743a6c329457e140a90b3d52690b3f25a79185c8f03612db9d18ba34fe7b66878ef3

        • C:\Users\Admin\AppData\LocalLow\Temp\ietemp1.dat

          Filesize

          358B

          MD5

          5e42ec0e0f845f5c44fc388ae9457ed3

          SHA1

          4d334907f2e1ec7831529f2bed2943a6084b3846

          SHA256

          f8a136160dec9615eade2e28f65cd8aaa02ef5fa5f7b171c10b0295807d51f68

          SHA512

          fe55a26315032d578917875991693bd53235f78cacbce7814b97c1f906e13a7eebeba23dc31d466a855d46167acce3f069ab7b26d66cdeeced53f63d6e6f0d53

        • C:\Users\Admin\AppData\Local\Packages\windows_ie_ac_001\AC\Temp\ietemp1.dat

          Filesize

          108B

          MD5

          35b3a1ab323e8adc11436dbe8e4b5ab4

          SHA1

          15709d7e77c2bc835f4cfef43eb82b19b8e3da6f

          SHA256

          28ce0ce19c6029739c84422584aa5eb65c4e1dffa1cff9cf4516993be972b6a2

          SHA512

          a5fcc3be674c07cfd1f6172f482bfb7fb3830838a12faead1bc80cb56ec8f925667d828cfcc4461c1c7ba559d727bb9b1b677fdfb6906b922d43a9585deac8f3

        • C:\Users\Admin\AppData\Local\Packages\windows_ie_ac_001\AC\Temp\ietemp1.dat

          Filesize

          210B

          MD5

          8a7f0b331e6b2c8942520bac3206a0fe

          SHA1

          1c7d3ed84664a71a8c8203ac2fa78efab9ffadcd

          SHA256

          0e749ac8554ab9506887255f6f50a6d2137986146f0c498faa69ebf055cd7df6

          SHA512

          e70095e291ee5ad03b9cd5fc263daac734b9f48ff16de5a6919dc2802c880274e624977940515ec7b46589951547355d1fe996d54c36f321b267613dba506f1c

        • C:\Users\Admin\AppData\Local\Packages\windows_ie_ac_001\AC\Temp\ietemp1.dat

          Filesize

          310B

          MD5

          d73371d6407332ed7ab32191f9131002

          SHA1

          122a52f10ac4b6b2229487eea1b2614e5f01022d

          SHA256

          f62b9abff1d761ec07bc32b266b1cac5e6af29644f863dc64549f5dd395c23a3

          SHA512

          64c395d3715ae548091df95df1bd21729a12f2fc91d2f5a69190b6285f17d70bf4e73bd95775da6715c6d15231782a211e7c54af0974247665896375459801eb

        • C:\Users\Admin\AppData\Local\Packages\windows_ie_ac_001\AC\Temp\ietemp1.dat

          Filesize

          23B

          MD5

          4174cb800274e3c271f7e53ae1b9ae35

          SHA1

          6ac0ca77eef3b68c8db3349f1ceb0c8083450642

          SHA256

          d5e0a12b015868fdafdbdcef807fee6bf17e326db04c64079833e829bf34112e

          SHA512

          c73823299a4706ad1feec4497c1e01c598beebe5679a1bbae2cfa6305b282f719c5c14c1fbc3d982db111cda6cdcc7721f22880391155ae9112f6b5f1cdb7cdd

        • C:\Users\Admin\AppData\Local\Temp\SDM143\Free Ride Games.exe

          Filesize

          504KB

          MD5

          23cad4075e1fd5d47c0434fef549efde

          SHA1

          d7cdc7cb933466474986ae37fc7ebefdad601aaf

          SHA256

          18f4519d20252bf579b887adec25554ac412bd79604547cca12f9f589549f952

          SHA512

          e4176411caac89db8dd073f2b47b7970168dacad4cdecc6edae310591e279149430b10ab1f956a7722ab22677ca893bfc4eb3fe17009b9b73a95e288c12c89b1

        • C:\Users\Admin\AppData\Local\Temp\SDM143\Splasher.dll

          Filesize

          475KB

          MD5

          41d94c8eb8cb17e04f8ec6e14132f9ca

          SHA1

          add92b031eb36b26335763780df88bca58636ed7

          SHA256

          2e522a4da2c291ebcde484b4a04a6ef0691a732b9db454f12399d3e577327c96

          SHA512

          0561594d671cc64717463d59e2f076453614584ccdd47b4a39cd347e9999ba63463233c75dd9972102a2634b1abfe6c97fa8f682d944bc5cf129724b7595faa7

        • C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe

          Filesize

          234KB

          MD5

          3a9774028e1e3968b8c202fd199d0084

          SHA1

          6e19763c3f42c8d6596135a7566bef07a0cbeadd

          SHA256

          93a63465ea363661a141043c404f5b94ab9ac6cfeee3fd158bdf4e1fc50e3af5

          SHA512

          ea7e67887d7b8fd3e6049ee1ba7a786bb895158279e464c5c7a35e323aefac34e81e5515e493acf447953a08f13b94024c4a460ebc77f03ef0d305feb8b81d06

        • C:\Users\Admin\AppData\Local\Temp\SDM143\resourceDll.dll

          Filesize

          171KB

          MD5

          5cf0fba9e8775382233c8e63e52c838a

          SHA1

          b2a092f71eff0f6916652d7f3bfde9204eda5636

          SHA256

          7d940af8950b106227539cd4bdfb62f2d37a4abeaf568ebe2275fd31058c2ca5

          SHA512

          73489e3638b98ffd7bd516bfed519cfd48758aaaedc11cb202d11822cad609caf9af95e9e864bd8a992be826945e6d018ce081f3970511fd49d7757ca6affd25

        • C:\Users\Admin\AppData\Local\Temp\nsu38A5.tmp\System.dll

          Filesize

          11KB

          MD5

          a436db0c473a087eb61ff5c53c34ba27

          SHA1

          65ea67e424e75f5065132b539c8b2eda88aa0506

          SHA256

          75ed40311875312617d6711baed0be29fcaee71031ca27a8d308a72b15a51e49

          SHA512

          908f46a855480af6eacb2fb64de0e60b1e04bbb10b23992e2cf38a4cbebdcd7d3928c4c022d7ad9f7479265a8f426b93eef580afec95570e654c360d62f5e08d

        • memory/216-114-0x0000000000760000-0x000000000079A000-memory.dmp

          Filesize

          232KB

        • memory/400-96-0x0000000000980000-0x00000000009BA000-memory.dmp

          Filesize

          232KB

        • memory/1196-60-0x0000000000630000-0x000000000066A000-memory.dmp

          Filesize

          232KB

        • memory/1652-71-0x0000000000F60000-0x0000000000F9A000-memory.dmp

          Filesize

          232KB

        • memory/2448-127-0x00000000002F0000-0x000000000032A000-memory.dmp

          Filesize

          232KB

        • memory/2864-107-0x00000000008F0000-0x000000000092A000-memory.dmp

          Filesize

          232KB

        • memory/3484-50-0x0000000010000000-0x000000001009F000-memory.dmp

          Filesize

          636KB

        • memory/3484-52-0x0000000010000000-0x000000001009F000-memory.dmp

          Filesize

          636KB

        • memory/3484-47-0x0000000010000000-0x000000001009F000-memory.dmp

          Filesize

          636KB

        • memory/3484-44-0x0000000000400000-0x0000000000553000-memory.dmp

          Filesize

          1.3MB

        • memory/3484-153-0x0000000000400000-0x0000000000553000-memory.dmp

          Filesize

          1.3MB

        • memory/4424-89-0x0000000000620000-0x000000000065A000-memory.dmp

          Filesize

          232KB

        • memory/4620-78-0x00000000000D0000-0x000000000010A000-memory.dmp

          Filesize

          232KB