Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/05/2024, 03:00

General

  • Target

    4444c931de8190ce8463cd4a296683bc_JaffaCakes118.exe

  • Size

    1.2MB

  • MD5

    4444c931de8190ce8463cd4a296683bc

  • SHA1

    105ca60574cad4b42d4570cc787b3584c9bb87f7

  • SHA256

    235284fedabfe48b5a2ff0abdc351a3d088ce1bdcf05c8a6ea4b64c9796abb54

  • SHA512

    6bf9355605e8f261ed9aefe5ccbd52792edf0eaa3473a13585041edff1c52e6f74b3b15bd178dc4fae49f5dcd1f11d7ad6e2c6fa7fd65e85af0c7143f5659773

  • SSDEEP

    24576:j0ff/Atv+i1kU9tEG8B4nZDr4x59YUtETgvk2c+fFF78f2yirk:QAtv/fyGDnl8z9YUWwBhr89

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies registry class 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4444c931de8190ce8463cd4a296683bc_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\4444c931de8190ce8463cd4a296683bc_JaffaCakes118.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:412
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 412 -s 2504
      2⤵
      • Program crash
      PID:2904
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 412 -ip 412
    1⤵
      PID:4280

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\TempDir\Chrome7468_Local State

            Filesize

            130KB

            MD5

            21b378e2391f279730a2738dd96d0e61

            SHA1

            e2a700881720e136b491165e81ee1fb2bd9dae89

            SHA256

            cdafd8acd6710705c7178890e03beab8a7c6e894372e3b8943fb05d5a929c314

            SHA512

            5f0794d62875902bd7a26d97ee55614c7201eef1974a0245ad7e6ffa2a46c6cf2d9d69262b78a21851da38bd9c5a50da61c3b331c81bd72b943b0ae40589fc7f

          • C:\Users\Admin\AppData\Local\Temp\TempDir\Firefox7375_profiles.ini

            Filesize

            301B

            MD5

            13a1e975699338b90ddd3b9311d042d5

            SHA1

            77a769b1342c000e5347ac58e99bb676f4e9aca2

            SHA256

            36217d8a8ac8073bf060c04475d3b88f2eafe76dce2e25be35ee715357d79323

            SHA512

            fb1594104f7bf9033cff66b7c85a545d3beeca3e213476285995b39731b7289e8e90b2b58f99985cc3d207c7d6fba542fb844e0a9ab1bfabdf15e49fd39e706f

          • memory/412-0-0x0000000000800000-0x0000000000B10000-memory.dmp

            Filesize

            3.1MB

          • memory/412-35-0x0000000000800000-0x0000000000B10000-memory.dmp

            Filesize

            3.1MB