Overview
overview
10Static
static
362a3384531...18.exe
windows7-x64
1062a3384531...18.exe
windows10-2004-x64
7$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3Analysis
-
max time kernel
145s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 08:20
Static task
static1
Behavioral task
behavioral1
Sample
62a3384531a6f4d2c74980833b8f01c0_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
62a3384531a6f4d2c74980833b8f01c0_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
Uninstall.exe
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
Uninstall.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240426-en
General
-
Target
62a3384531a6f4d2c74980833b8f01c0_JaffaCakes118.exe
-
Size
940KB
-
MD5
62a3384531a6f4d2c74980833b8f01c0
-
SHA1
98fbbb1b64e627b7eb312469a89b221ba2be07ae
-
SHA256
9f76bdf33649d6e035eddd507a6d6826283ef450a3055320806ce3053523a2aa
-
SHA512
d789bfc8dd7436fc0f4c5912cc71d546e8230f3ac51ca3e226154e05f7f3b2a4e43b91249080f031d6cd2b6d8215bb3b68de617bf0dcd569142c856fda568675
-
SSDEEP
24576:Mrx+v0kJ7zGWSuGMuJov3rsM7ok8XWv2bz09Wvfr1Yoz:m+v0kB6WLGMu+zsM7ok8XWv2vuWHC8
Malware Config
Signatures
-
Troldesh, Shade, Encoder.858
Troldesh is a ransomware spread by malspam.
-
Loads dropped DLL 1 IoCs
pid Process 2368 62a3384531a6f4d2c74980833b8f01c0_JaffaCakes118.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2116-7-0x0000000000400000-0x0000000000607000-memory.dmp upx behavioral1/memory/2116-11-0x0000000000400000-0x0000000000607000-memory.dmp upx behavioral1/memory/2116-10-0x0000000000400000-0x0000000000607000-memory.dmp upx behavioral1/memory/2116-9-0x0000000000400000-0x0000000000607000-memory.dmp upx behavioral1/memory/2116-8-0x0000000000400000-0x0000000000607000-memory.dmp upx behavioral1/memory/2116-12-0x0000000000400000-0x0000000000607000-memory.dmp upx behavioral1/memory/2116-15-0x0000000000400000-0x0000000000607000-memory.dmp upx behavioral1/memory/2116-13-0x0000000000400000-0x0000000000607000-memory.dmp upx behavioral1/memory/2116-14-0x0000000000400000-0x0000000000607000-memory.dmp upx behavioral1/memory/2116-21-0x0000000000400000-0x0000000000607000-memory.dmp upx behavioral1/memory/2116-22-0x0000000000400000-0x0000000000607000-memory.dmp upx behavioral1/memory/2116-23-0x0000000000400000-0x0000000000607000-memory.dmp upx behavioral1/memory/2116-24-0x0000000000400000-0x0000000000607000-memory.dmp upx behavioral1/memory/2116-25-0x0000000000400000-0x0000000000607000-memory.dmp upx behavioral1/memory/2116-26-0x0000000000400000-0x0000000000607000-memory.dmp upx behavioral1/memory/2116-29-0x0000000000400000-0x0000000000607000-memory.dmp upx behavioral1/memory/2116-30-0x0000000000400000-0x0000000000607000-memory.dmp upx behavioral1/memory/2116-31-0x0000000000400000-0x0000000000607000-memory.dmp upx behavioral1/memory/2116-32-0x0000000000400000-0x0000000000607000-memory.dmp upx behavioral1/memory/2116-33-0x0000000000400000-0x0000000000607000-memory.dmp upx behavioral1/memory/2116-34-0x0000000000400000-0x0000000000607000-memory.dmp upx behavioral1/memory/2116-35-0x0000000000400000-0x0000000000607000-memory.dmp upx behavioral1/memory/2116-36-0x0000000000400000-0x0000000000607000-memory.dmp upx behavioral1/memory/2116-37-0x0000000000400000-0x0000000000607000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" 62a3384531a6f4d2c74980833b8f01c0_JaffaCakes118.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2368 set thread context of 2116 2368 62a3384531a6f4d2c74980833b8f01c0_JaffaCakes118.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2116 62a3384531a6f4d2c74980833b8f01c0_JaffaCakes118.exe 2116 62a3384531a6f4d2c74980833b8f01c0_JaffaCakes118.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2368 62a3384531a6f4d2c74980833b8f01c0_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2116 2368 62a3384531a6f4d2c74980833b8f01c0_JaffaCakes118.exe 28 PID 2368 wrote to memory of 2116 2368 62a3384531a6f4d2c74980833b8f01c0_JaffaCakes118.exe 28 PID 2368 wrote to memory of 2116 2368 62a3384531a6f4d2c74980833b8f01c0_JaffaCakes118.exe 28 PID 2368 wrote to memory of 2116 2368 62a3384531a6f4d2c74980833b8f01c0_JaffaCakes118.exe 28 PID 2368 wrote to memory of 2116 2368 62a3384531a6f4d2c74980833b8f01c0_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\62a3384531a6f4d2c74980833b8f01c0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\62a3384531a6f4d2c74980833b8f01c0_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\62a3384531a6f4d2c74980833b8f01c0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\62a3384531a6f4d2c74980833b8f01c0_JaffaCakes118.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:2116
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD53f176d1ee13b0d7d6bd92e1c7a0b9bae
SHA1fe582246792774c2c9dd15639ffa0aca90d6fd0b
SHA256fa4ab1d6f79fd677433a31ada7806373a789d34328da46ccb0449bbf347bd73e
SHA5120a69124819b7568d0dea4e9e85ce8fe61c7ba697c934e3a95e2dcfb9f252b1d9da7faf8774b6e8efd614885507acc94987733eba09a2f5e7098b774dfc8524b6