Analysis

  • max time kernel
    149s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-05-2024 12:14

General

  • Target

    6e7bc49b91419790ae05bb2892f87481_JaffaCakes118.exe

  • Size

    3.1MB

  • MD5

    6e7bc49b91419790ae05bb2892f87481

  • SHA1

    5332c21a808a432bb118a19b8f5123e70ba313c0

  • SHA256

    78c3e8ab0454feee3413e08cfe00a7349e058e3432e2ad2c5927f441a78ac3d7

  • SHA512

    7f4530a7f52f9d7bc67e5919f8c4da500d13465e09a9e46936b835709af91e1fe7cab7a63a5f62f13d6882bb93b9ea897193e886c74a3e50b6bf1efd757efd87

  • SSDEEP

    49152:G7lHuYZXHgB6dk6agmUWUpChfWUTr/n85q7YV7crwIr2BioEm63QiKvyGaLKOQ:G7lO63g8DagSUMhOUTj8YIAVr2LAMuuX

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops autorun.inf file 1 TTPs 2 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6e7bc49b91419790ae05bb2892f87481_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\6e7bc49b91419790ae05bb2892f87481_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops autorun.inf file
    • Suspicious use of WriteProcessMemory
    PID:4560
    • C:\TeamViewer\TeamViewer.exe
      "C:\TeamViewer\TeamViewer.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3104

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\TeamViewer\TV_w32.dll

    Filesize

    49KB

    MD5

    7a436c16696c3851ffc0cdb3f97f362b

    SHA1

    6f98563299871755f06912ddcd11b032fa896ec8

    SHA256

    cfd60cadf622518448860a0874d8d252a755d9f8a23fd3f4bb5273af193e5c58

    SHA512

    29b2a53b28bbe6c518a8d647e8b958f4710862aa1cfe815a8460e718c20edd9a55f3d33239169f6ddeef561cbd19dc47f855aead92fe79a2c0bd26c827740fbb

  • C:\TeamViewer\TV_w32.exe

    Filesize

    105KB

    MD5

    d7d7adf4f9b04255bcdf693670f6ef96

    SHA1

    017ef943805c383479fd5c381ba351386d7d0115

    SHA256

    06c1216a98c190d11909a7635ae9d831484c2f8b7a3d5a3e376dc7122868500b

    SHA512

    3c38fc755fd2287eea0ec9487540890b51ae3afa5d5493e05450e174a92fa753f7d9ea30267c67b8ea479c40b66db37b876a79d84376dc3f3d2e59034f68c86a

  • C:\TeamViewer\TV_x64.dll

    Filesize

    51KB

    MD5

    87d3dd705238cd08d885f93905fd0e13

    SHA1

    911bbbd4996125916bc7e849e37f9b3fce282477

    SHA256

    4e9645d407285a9cc2926ac9b40b76f5e03b98995c5bd52ae710e42d9b8eb9db

    SHA512

    01f903edc55c574b7e29ea7426d853a0a5cbfd80f2c3657df46cf09ac616622e0a13dd8adab8aba14b685181f2b6a8cca4101810951832c5117c39d0a4e12cd0

  • C:\TeamViewer\TV_x64.exe

    Filesize

    140KB

    MD5

    4cf9fd8a34fafe2b553bbb4a79e097d9

    SHA1

    77784c0a51cba79cceb1ae3bdca80ee03161f5fa

    SHA256

    3e5ef714899c41879f418fc6859623b3636c34e3fd01ea18571cb439e38582fd

    SHA512

    52a7f166b71f755d44f6e5acbc134a005458f491493891d478de7548c608919108763a002eaec3a2acae47ba477cbefc7a3dd879f5199f274efcab4a58b9fb63

  • C:\TeamViewer\TeamViewer.exe

    Filesize

    7.3MB

    MD5

    3dc242d675e2bacdb3b22bff000ca13a

    SHA1

    ceabce83a4a3dd0ca587cce9cd54052e90d0bdb7

    SHA256

    fb59de15670fa0254939ff20764157a5cd96d1fcb2ce73a73697e6a051387d6d

    SHA512

    a8f66c0e7d05280ba9d56beb6748a0f90bcd1ab41af9578308cc67a9703a297b7f0f64a396563c745b0a2ba5cdc59400f8718b27d7aff5e7127683176fe978f1

  • C:\TeamViewer\TeamViewer.ini

    Filesize

    130B

    MD5

    84fa078491baecf73c525d1aa793a495

    SHA1

    b4988c98a93f03747c31bde14d3c1f31462d37fc

    SHA256

    26d13ecbbe00b12cb09ea518d98014ae1c2cb0a32f0969e17e2e902a2288657a

    SHA512

    85c0127a368268a1f31e58ccbd6b763d2894612e35fad092d8fe57cf2cbfc6fd8065ff1e8229202802c9eb7eef8c77705b8bc0b3cc33dad3b4df37cf1599f3eb

  • C:\TeamViewer\TeamViewer_Resource_de.dll

    Filesize

    1.3MB

    MD5

    5e191a58a4ab6d9b490073bb361419d8

    SHA1

    bffd7676b6206ba248705fc816b4dcacc18d3260

    SHA256

    b23ee4fc714f73fc2c8b55bf3e4bad341e033b6b56a320cf1171f3f3c68de043

    SHA512

    6b58c0025694d0ac705987faa7a2ffd090c522d5c2773c51f8c80eff772498a363a84c764e12a1e16fb2f5df5fb644780e1748ad65111d5e0affadbab4e7506c

  • C:\TeamViewer\TeamViewer_Resource_en.dll

    Filesize

    1.3MB

    MD5

    bb97158f484d5630978188c6520beac6

    SHA1

    120a74126752f3ae0c371174004c40219fad6e96

    SHA256

    84e121bc9938dd70a5b1c9c950d829e1a36766cf87b040eced0d2b7d136e04b9

    SHA512

    2fa09f46770a330e7bcf1714b958ff696c8ffbb0549fd7f431bd1367db634573aef6d4071efa86a4269aac477d3d0fd6842a9647671c1c5960621ea4df676d28

  • memory/3104-99-0x0000000001370000-0x0000000001371000-memory.dmp

    Filesize

    4KB

  • memory/3104-106-0x00000000039B0000-0x00000000039D7000-memory.dmp

    Filesize

    156KB

  • memory/3104-107-0x0000000001370000-0x0000000001371000-memory.dmp

    Filesize

    4KB