Analysis

  • max time kernel
    135s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-05-2024 21:11

General

  • Target

    43174ec3f7028cf2226d4e8b393aa056_JaffaCakes118.exe

  • Size

    1.1MB

  • MD5

    43174ec3f7028cf2226d4e8b393aa056

  • SHA1

    d1fee62f8e0c5e0c0dc7f0db5c8c16da2bf9b7f0

  • SHA256

    8e04e0705156c53871f3a4f34b4fbd483cf079194b4156a87fcfd961d1ab70d0

  • SHA512

    66bb560373d4ae177b16cb775054beed4d702e49ab4fe9e2202234292fe549911fbbf07b96568cc16b1f2c86c1c988573c78f43a6813b976df2774c3436d9cf8

  • SSDEEP

    24576:1UMlwweHinUSkvgVzRB2wanhLnTADpNlb:NBeHMEANB2wahLncD3lb

Malware Config

Signatures

  • Detect ZGRat V1 1 IoCs
  • MassLogger

    Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.

  • MassLogger Main payload 1 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 42 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\43174ec3f7028cf2226d4e8b393aa056_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\43174ec3f7028cf2226d4e8b393aa056_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3996
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ZkQBwXU" /XML "C:\Users\Admin\AppData\Local\Temp\tmp145E.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:3196
    • C:\Users\Admin\AppData\Local\Temp\43174ec3f7028cf2226d4e8b393aa056_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\43174ec3f7028cf2226d4e8b393aa056_JaffaCakes118.exe"
      2⤵
        PID:3776
      • C:\Users\Admin\AppData\Local\Temp\43174ec3f7028cf2226d4e8b393aa056_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\43174ec3f7028cf2226d4e8b393aa056_JaffaCakes118.exe"
        2⤵
        • Checks computer location settings
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4636
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\YUUxHkHNWyka" /XML "C:\Users\Admin\AppData\Local\Temp\tmpE9A0.tmp"
          3⤵
          • Creates scheduled task(s)
          PID:1100
        • C:\Users\Admin\AppData\Local\Temp\43174ec3f7028cf2226d4e8b393aa056_JaffaCakes118.exe
          "C:\Users\Admin\AppData\Local\Temp\43174ec3f7028cf2226d4e8b393aa056_JaffaCakes118.exe"
          3⤵
          • Checks computer location settings
          • Accesses Microsoft Outlook profiles
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • outlook_office_path
          • outlook_win_path
          PID:2524

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\43174ec3f7028cf2226d4e8b393aa056_JaffaCakes118.exe.log

      Filesize

      1KB

      MD5

      17573558c4e714f606f997e5157afaac

      SHA1

      13e16e9415ceef429aaf124139671ebeca09ed23

      SHA256

      c18db6aecad2436da4a63ff26af4e3a337cca48f01c21b8db494fe5ccc60e553

      SHA512

      f4edf13f05a0d142e4dd42802098c8c44988ee8869621a62c2b565a77c9a95857f636583ff8d6d9baa366603d98b9bfbf1fc75bc6f9f8f83c80cb1215b2941cc

    • C:\Users\Admin\AppData\Local\Temp\tmp145E.tmp

      Filesize

      1KB

      MD5

      e8aeff0934a6df397d37640a800b2df1

      SHA1

      9ba81e5a81e6348c7b92fe1e53cbfdb596f88ae2

      SHA256

      9859a49fa1f9140e1fe796ebbe5a9443506437b44bbad74c30b306b03562b737

      SHA512

      9fb9a8c801fcad645157c1dba223bcb64073c909effb52a4ca7ae412ad4429adbd28e67dbf8acc285a6cd85d5c75de89208c0c02da84ef2ae52a39294e3e540f

    • C:\Users\Admin\AppData\Local\Temp\tmpE9A0.tmp

      Filesize

      1KB

      MD5

      ae0862db411ab544c4cffadac7a3fb48

      SHA1

      e9fe8f1ab6d6ebb3a4a63a9b1455110d070ad6f8

      SHA256

      0b10d94e41d3d25601d4bec2e38942925a5ad40027f0ea52d5780997fee157a8

      SHA512

      c1321da618f2d83b3afbfa82b3ac7f9f12dc68411ba3c25885c8e353ddd0474b2071a9b6ec71476163bec1e9a6a68aa18628a5cf819862758544c894f7fcaa6f

    • C:\Users\Admin\AppData\Roaming\YUUxHkHNWyka.exe

      Filesize

      1.1MB

      MD5

      43174ec3f7028cf2226d4e8b393aa056

      SHA1

      d1fee62f8e0c5e0c0dc7f0db5c8c16da2bf9b7f0

      SHA256

      8e04e0705156c53871f3a4f34b4fbd483cf079194b4156a87fcfd961d1ab70d0

      SHA512

      66bb560373d4ae177b16cb775054beed4d702e49ab4fe9e2202234292fe549911fbbf07b96568cc16b1f2c86c1c988573c78f43a6813b976df2774c3436d9cf8

    • memory/2524-32-0x0000000000400000-0x000000000049A000-memory.dmp

      Filesize

      616KB

    • memory/2524-35-0x0000000005370000-0x00000000053B4000-memory.dmp

      Filesize

      272KB

    • memory/2524-36-0x0000000005420000-0x0000000005486000-memory.dmp

      Filesize

      408KB

    • memory/2524-38-0x0000000007DB0000-0x0000000007E00000-memory.dmp

      Filesize

      320KB

    • memory/2524-39-0x0000000006E60000-0x0000000006E74000-memory.dmp

      Filesize

      80KB

    • memory/3996-5-0x0000000004CC0000-0x0000000004CCA000-memory.dmp

      Filesize

      40KB

    • memory/3996-21-0x0000000074F80000-0x0000000075730000-memory.dmp

      Filesize

      7.7MB

    • memory/3996-11-0x0000000005FA0000-0x000000000609A000-memory.dmp

      Filesize

      1000KB

    • memory/3996-12-0x0000000006200000-0x00000000062DA000-memory.dmp

      Filesize

      872KB

    • memory/3996-9-0x0000000074F8E000-0x0000000074F8F000-memory.dmp

      Filesize

      4KB

    • memory/3996-0-0x0000000074F8E000-0x0000000074F8F000-memory.dmp

      Filesize

      4KB

    • memory/3996-8-0x0000000004FA0000-0x0000000004FAA000-memory.dmp

      Filesize

      40KB

    • memory/3996-10-0x0000000074F80000-0x0000000075730000-memory.dmp

      Filesize

      7.7MB

    • memory/3996-7-0x0000000074F80000-0x0000000075730000-memory.dmp

      Filesize

      7.7MB

    • memory/3996-6-0x0000000004EC0000-0x0000000004F16000-memory.dmp

      Filesize

      344KB

    • memory/3996-4-0x0000000004DC0000-0x0000000004E52000-memory.dmp

      Filesize

      584KB

    • memory/3996-3-0x0000000005370000-0x0000000005914000-memory.dmp

      Filesize

      5.6MB

    • memory/3996-2-0x0000000004D20000-0x0000000004DBC000-memory.dmp

      Filesize

      624KB

    • memory/3996-1-0x0000000000330000-0x000000000044A000-memory.dmp

      Filesize

      1.1MB

    • memory/4636-18-0x0000000000400000-0x00000000004D8000-memory.dmp

      Filesize

      864KB

    • memory/4636-26-0x00000000064C0000-0x000000000655C000-memory.dmp

      Filesize

      624KB

    • memory/4636-25-0x0000000006400000-0x00000000064BC000-memory.dmp

      Filesize

      752KB

    • memory/4636-24-0x0000000074F80000-0x0000000075730000-memory.dmp

      Filesize

      7.7MB

    • memory/4636-34-0x0000000074F80000-0x0000000075730000-memory.dmp

      Filesize

      7.7MB

    • memory/4636-23-0x00000000053F0000-0x00000000053F8000-memory.dmp

      Filesize

      32KB

    • memory/4636-22-0x0000000074F80000-0x0000000075730000-memory.dmp

      Filesize

      7.7MB

    • memory/4636-20-0x0000000074F80000-0x0000000075730000-memory.dmp

      Filesize

      7.7MB