Analysis

  • max time kernel
    126s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    14-05-2024 21:11

General

  • Target

    43174ec3f7028cf2226d4e8b393aa056_JaffaCakes118.exe

  • Size

    1.1MB

  • MD5

    43174ec3f7028cf2226d4e8b393aa056

  • SHA1

    d1fee62f8e0c5e0c0dc7f0db5c8c16da2bf9b7f0

  • SHA256

    8e04e0705156c53871f3a4f34b4fbd483cf079194b4156a87fcfd961d1ab70d0

  • SHA512

    66bb560373d4ae177b16cb775054beed4d702e49ab4fe9e2202234292fe549911fbbf07b96568cc16b1f2c86c1c988573c78f43a6813b976df2774c3436d9cf8

  • SSDEEP

    24576:1UMlwweHinUSkvgVzRB2wanhLnTADpNlb:NBeHMEANB2wahLncD3lb

Malware Config

Signatures

  • Detect ZGRat V1 5 IoCs
  • MassLogger

    Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.

  • MassLogger Main payload 5 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 35 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\43174ec3f7028cf2226d4e8b393aa056_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\43174ec3f7028cf2226d4e8b393aa056_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2416
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ZkQBwXU" /XML "C:\Users\Admin\AppData\Local\Temp\tmp54E.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:2980
    • C:\Users\Admin\AppData\Local\Temp\43174ec3f7028cf2226d4e8b393aa056_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\43174ec3f7028cf2226d4e8b393aa056_JaffaCakes118.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2564
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\YUUxHkHNWyka" /XML "C:\Users\Admin\AppData\Local\Temp\tmpE022.tmp"
        3⤵
        • Creates scheduled task(s)
        PID:1612
      • C:\Users\Admin\AppData\Local\Temp\43174ec3f7028cf2226d4e8b393aa056_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\43174ec3f7028cf2226d4e8b393aa056_JaffaCakes118.exe"
        3⤵
        • Checks computer location settings
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • outlook_office_path
        • outlook_win_path
        PID:1544

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmp54E.tmp

    Filesize

    1KB

    MD5

    daf3d02d640801851459f7dccfc428d4

    SHA1

    3603e7ce7be8fd7119ff67c79fee962cac019017

    SHA256

    ea472e3d98774955af7eebc01ee3bd4512956f9958ceb9bfcf42634149fc1358

    SHA512

    188ec0232fd6a0e74bf0909d386f688b1ebfc4fc2d8b5e108eb21dd2d5028d34bdddb50b0bddeb6c97b589432b3a32ff706e4e59d9d73e350414c06ec519bc73

  • C:\Users\Admin\AppData\Local\Temp\tmpE022.tmp

    Filesize

    1KB

    MD5

    432d7d00a03b26c20f1e8da155dfd26d

    SHA1

    49403843a001da57d3cad61b73c53b6b7a3adbbd

    SHA256

    b7fc20e4dfa5b4c01a33ef9bf9a6ce2f6ed425e9fe932e851ceed4ab6a1e4fe0

    SHA512

    67367950dc279364b7f29fde1aa26fddb071cc32ca8a1027329dccea8e6e8cf579e453df8ded606d4b9036774272043c4b08684bef5e6ef62b08f7fb80adc689

  • C:\Users\Admin\AppData\Roaming\YUUxHkHNWyka.exe

    Filesize

    1.1MB

    MD5

    43174ec3f7028cf2226d4e8b393aa056

    SHA1

    d1fee62f8e0c5e0c0dc7f0db5c8c16da2bf9b7f0

    SHA256

    8e04e0705156c53871f3a4f34b4fbd483cf079194b4156a87fcfd961d1ab70d0

    SHA512

    66bb560373d4ae177b16cb775054beed4d702e49ab4fe9e2202234292fe549911fbbf07b96568cc16b1f2c86c1c988573c78f43a6813b976df2774c3436d9cf8

  • memory/1544-48-0x0000000000400000-0x000000000049A000-memory.dmp

    Filesize

    616KB

  • memory/1544-38-0x0000000000400000-0x000000000049A000-memory.dmp

    Filesize

    616KB

  • memory/1544-53-0x0000000000F20000-0x0000000000F34000-memory.dmp

    Filesize

    80KB

  • memory/1544-51-0x00000000007A0000-0x00000000007E4000-memory.dmp

    Filesize

    272KB

  • memory/1544-47-0x0000000000400000-0x000000000049A000-memory.dmp

    Filesize

    616KB

  • memory/1544-50-0x0000000000400000-0x000000000049A000-memory.dmp

    Filesize

    616KB

  • memory/1544-44-0x0000000000400000-0x000000000049A000-memory.dmp

    Filesize

    616KB

  • memory/1544-40-0x0000000000400000-0x000000000049A000-memory.dmp

    Filesize

    616KB

  • memory/1544-42-0x0000000000400000-0x000000000049A000-memory.dmp

    Filesize

    616KB

  • memory/2416-7-0x0000000005FC0000-0x000000000609A000-memory.dmp

    Filesize

    872KB

  • memory/2416-2-0x0000000073EB0000-0x000000007459E000-memory.dmp

    Filesize

    6.9MB

  • memory/2416-6-0x0000000005CB0000-0x0000000005DAA000-memory.dmp

    Filesize

    1000KB

  • memory/2416-30-0x0000000073EB0000-0x000000007459E000-memory.dmp

    Filesize

    6.9MB

  • memory/2416-3-0x00000000003F0000-0x00000000003FA000-memory.dmp

    Filesize

    40KB

  • memory/2416-5-0x0000000073EB0000-0x000000007459E000-memory.dmp

    Filesize

    6.9MB

  • memory/2416-4-0x0000000073EBE000-0x0000000073EBF000-memory.dmp

    Filesize

    4KB

  • memory/2416-0-0x0000000073EBE000-0x0000000073EBF000-memory.dmp

    Filesize

    4KB

  • memory/2416-1-0x00000000011C0000-0x00000000012DA000-memory.dmp

    Filesize

    1.1MB

  • memory/2564-21-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2564-32-0x0000000005630000-0x00000000056CC000-memory.dmp

    Filesize

    624KB

  • memory/2564-23-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB

  • memory/2564-17-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB

  • memory/2564-28-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB

  • memory/2564-25-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB

  • memory/2564-19-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB

  • memory/2564-13-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB

  • memory/2564-15-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB

  • memory/2564-31-0x0000000005B50000-0x0000000005C0C000-memory.dmp

    Filesize

    752KB

  • memory/2564-29-0x00000000003F0000-0x00000000003F8000-memory.dmp

    Filesize

    32KB