Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
30/05/2024, 22:39
Static task
static1
Behavioral task
behavioral1
Sample
852646191db6768157a7fddcc13afed2_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
852646191db6768157a7fddcc13afed2_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
852646191db6768157a7fddcc13afed2_JaffaCakes118.exe
-
Size
1.5MB
-
MD5
852646191db6768157a7fddcc13afed2
-
SHA1
0343b740682726b0e26ebb12725545a3cd7528fb
-
SHA256
f9f9b147e1f262190e4409693cdc0e472b92ef6d47af97058f27e77a0b74a1a4
-
SHA512
1669b0704ffc00817570fa5f1aeaee556f3973574c30178ed2f61b6f967a5ba84a6488a8858d4c75a6d0d276fe56bdd929ab53838eadb14d3fbb3da5e1f1e808
-
SSDEEP
24576:IAOcZwXYIyflIMxAvV5k6WWzJHpi2MQ5g/t9Q2KpveI4oWpRb/PHIXfTtr:mQdIMxsVaWzJHpZMQ0tpx9sTB
Malware Config
Signatures
-
UnicornStealer
UnicornStealer is a modular infostealer written in C++.
-
Unicorn Stealer payload 20 IoCs
resource yara_rule behavioral2/memory/2340-32-0x0000000008470000-0x000000000857B000-memory.dmp unicorn behavioral2/memory/3904-33-0x0000000000400000-0x00000000004F9000-memory.dmp unicorn behavioral2/memory/3904-39-0x0000000000400000-0x00000000004F9000-memory.dmp unicorn behavioral2/memory/3904-42-0x0000000000400000-0x00000000004F9000-memory.dmp unicorn behavioral2/memory/3904-43-0x0000000000400000-0x00000000004F9000-memory.dmp unicorn behavioral2/memory/3904-41-0x0000000000400000-0x00000000004F9000-memory.dmp unicorn behavioral2/memory/3904-45-0x0000000000400000-0x00000000004F9000-memory.dmp unicorn behavioral2/memory/3904-47-0x0000000000400000-0x00000000004F9000-memory.dmp unicorn behavioral2/memory/3904-46-0x0000000000400000-0x00000000004F9000-memory.dmp unicorn behavioral2/memory/3904-40-0x0000000000400000-0x00000000004F9000-memory.dmp unicorn behavioral2/memory/3904-52-0x0000000000400000-0x00000000004F9000-memory.dmp unicorn behavioral2/memory/3904-62-0x0000000000400000-0x00000000004F9000-memory.dmp unicorn behavioral2/memory/3904-68-0x0000000000400000-0x00000000004F9000-memory.dmp unicorn behavioral2/memory/3904-74-0x0000000000400000-0x00000000004F9000-memory.dmp unicorn behavioral2/memory/3904-81-0x0000000000400000-0x00000000004F9000-memory.dmp unicorn behavioral2/memory/3904-87-0x0000000000400000-0x00000000004F9000-memory.dmp unicorn behavioral2/memory/3904-91-0x0000000000400000-0x00000000004F9000-memory.dmp unicorn behavioral2/memory/3904-92-0x0000000000400000-0x00000000004F9000-memory.dmp unicorn behavioral2/memory/3904-94-0x0000000000400000-0x00000000004F9000-memory.dmp unicorn behavioral2/memory/3904-97-0x0000000000400000-0x00000000004F9000-memory.dmp unicorn -
Blocklisted process makes network request 20 IoCs
flow pid Process 55 3904 cmd.exe 56 3904 cmd.exe 58 3904 cmd.exe 62 3904 cmd.exe 64 3904 cmd.exe 65 3904 cmd.exe 68 3904 cmd.exe 69 3904 cmd.exe 71 3904 cmd.exe 73 3904 cmd.exe 75 3904 cmd.exe 76 3904 cmd.exe 80 3904 cmd.exe 85 3904 cmd.exe 86 3904 cmd.exe 88 3904 cmd.exe 89 3904 cmd.exe 99 3904 cmd.exe 101 3904 cmd.exe 102 3904 cmd.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 852646191db6768157a7fddcc13afed2_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 1324 openvpn-gui.exe -
Loads dropped DLL 1 IoCs
pid Process 1324 openvpn-gui.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\openvpn-gui.job cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1324 openvpn-gui.exe 2340 extrac32.exe 2340 extrac32.exe 3904 cmd.exe 3904 cmd.exe 3904 cmd.exe 3904 cmd.exe 3904 cmd.exe 3904 cmd.exe 3904 cmd.exe 3904 cmd.exe 3904 cmd.exe 3904 cmd.exe 3904 cmd.exe 3904 cmd.exe 3904 cmd.exe 3904 cmd.exe 3904 cmd.exe 3904 cmd.exe 3904 cmd.exe 3904 cmd.exe 3904 cmd.exe 3904 cmd.exe 3904 cmd.exe 3904 cmd.exe 3904 cmd.exe 3904 cmd.exe 3904 cmd.exe 3904 cmd.exe 3904 cmd.exe 3904 cmd.exe 3904 cmd.exe 3904 cmd.exe 3904 cmd.exe 3904 cmd.exe 3904 cmd.exe 3904 cmd.exe 3904 cmd.exe 3904 cmd.exe 3904 cmd.exe 3904 cmd.exe 3904 cmd.exe 3904 cmd.exe 3904 cmd.exe 3904 cmd.exe 3904 cmd.exe 3904 cmd.exe 3904 cmd.exe 3904 cmd.exe 3904 cmd.exe 3904 cmd.exe 3904 cmd.exe 3904 cmd.exe 3904 cmd.exe 3904 cmd.exe 3904 cmd.exe 3904 cmd.exe 3904 cmd.exe 3904 cmd.exe 3904 cmd.exe 3904 cmd.exe 3904 cmd.exe 3904 cmd.exe 3904 cmd.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 2340 extrac32.exe 2340 extrac32.exe 3904 cmd.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1324 openvpn-gui.exe 3904 cmd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2652 wrote to memory of 1324 2652 852646191db6768157a7fddcc13afed2_JaffaCakes118.exe 83 PID 2652 wrote to memory of 1324 2652 852646191db6768157a7fddcc13afed2_JaffaCakes118.exe 83 PID 2652 wrote to memory of 1324 2652 852646191db6768157a7fddcc13afed2_JaffaCakes118.exe 83 PID 1324 wrote to memory of 2340 1324 openvpn-gui.exe 85 PID 1324 wrote to memory of 2340 1324 openvpn-gui.exe 85 PID 1324 wrote to memory of 2340 1324 openvpn-gui.exe 85 PID 1324 wrote to memory of 2340 1324 openvpn-gui.exe 85 PID 1324 wrote to memory of 2340 1324 openvpn-gui.exe 85 PID 1324 wrote to memory of 2340 1324 openvpn-gui.exe 85 PID 1324 wrote to memory of 2340 1324 openvpn-gui.exe 85 PID 1324 wrote to memory of 2340 1324 openvpn-gui.exe 85 PID 1324 wrote to memory of 2340 1324 openvpn-gui.exe 85 PID 1324 wrote to memory of 2340 1324 openvpn-gui.exe 85 PID 1324 wrote to memory of 2340 1324 openvpn-gui.exe 85 PID 1324 wrote to memory of 2340 1324 openvpn-gui.exe 85 PID 1324 wrote to memory of 2340 1324 openvpn-gui.exe 85 PID 1324 wrote to memory of 2340 1324 openvpn-gui.exe 85 PID 1324 wrote to memory of 2340 1324 openvpn-gui.exe 85 PID 1324 wrote to memory of 2340 1324 openvpn-gui.exe 85 PID 1324 wrote to memory of 2340 1324 openvpn-gui.exe 85 PID 1324 wrote to memory of 2340 1324 openvpn-gui.exe 85 PID 1324 wrote to memory of 2340 1324 openvpn-gui.exe 85 PID 1324 wrote to memory of 2340 1324 openvpn-gui.exe 85 PID 1324 wrote to memory of 2340 1324 openvpn-gui.exe 85 PID 1324 wrote to memory of 2340 1324 openvpn-gui.exe 85 PID 1324 wrote to memory of 2340 1324 openvpn-gui.exe 85 PID 1324 wrote to memory of 2340 1324 openvpn-gui.exe 85 PID 1324 wrote to memory of 2340 1324 openvpn-gui.exe 85 PID 1324 wrote to memory of 2340 1324 openvpn-gui.exe 85 PID 1324 wrote to memory of 2340 1324 openvpn-gui.exe 85 PID 1324 wrote to memory of 2340 1324 openvpn-gui.exe 85 PID 1324 wrote to memory of 2340 1324 openvpn-gui.exe 85 PID 1324 wrote to memory of 2340 1324 openvpn-gui.exe 85 PID 1324 wrote to memory of 2340 1324 openvpn-gui.exe 85 PID 1324 wrote to memory of 2340 1324 openvpn-gui.exe 85 PID 1324 wrote to memory of 2340 1324 openvpn-gui.exe 85 PID 1324 wrote to memory of 2340 1324 openvpn-gui.exe 85 PID 1324 wrote to memory of 2340 1324 openvpn-gui.exe 85 PID 1324 wrote to memory of 2340 1324 openvpn-gui.exe 85 PID 1324 wrote to memory of 2340 1324 openvpn-gui.exe 85 PID 1324 wrote to memory of 2340 1324 openvpn-gui.exe 85 PID 1324 wrote to memory of 2340 1324 openvpn-gui.exe 85 PID 1324 wrote to memory of 2340 1324 openvpn-gui.exe 85 PID 1324 wrote to memory of 2340 1324 openvpn-gui.exe 85 PID 1324 wrote to memory of 2340 1324 openvpn-gui.exe 85 PID 1324 wrote to memory of 2340 1324 openvpn-gui.exe 85 PID 1324 wrote to memory of 2340 1324 openvpn-gui.exe 85 PID 1324 wrote to memory of 2340 1324 openvpn-gui.exe 85 PID 1324 wrote to memory of 2340 1324 openvpn-gui.exe 85 PID 1324 wrote to memory of 2340 1324 openvpn-gui.exe 85 PID 1324 wrote to memory of 2340 1324 openvpn-gui.exe 85 PID 1324 wrote to memory of 2340 1324 openvpn-gui.exe 85 PID 1324 wrote to memory of 2340 1324 openvpn-gui.exe 85 PID 1324 wrote to memory of 2340 1324 openvpn-gui.exe 85 PID 1324 wrote to memory of 2340 1324 openvpn-gui.exe 85 PID 1324 wrote to memory of 2340 1324 openvpn-gui.exe 85 PID 1324 wrote to memory of 2340 1324 openvpn-gui.exe 85 PID 1324 wrote to memory of 2340 1324 openvpn-gui.exe 85 PID 1324 wrote to memory of 2340 1324 openvpn-gui.exe 85 PID 1324 wrote to memory of 2340 1324 openvpn-gui.exe 85 PID 1324 wrote to memory of 2340 1324 openvpn-gui.exe 85 PID 1324 wrote to memory of 2340 1324 openvpn-gui.exe 85 PID 1324 wrote to memory of 2340 1324 openvpn-gui.exe 85 PID 1324 wrote to memory of 2340 1324 openvpn-gui.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\852646191db6768157a7fddcc13afed2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\852646191db6768157a7fddcc13afed2_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Users\Admin\AppData\Roaming\Sun\openvpn-gui.exe"C:\Users\Admin\AppData\Roaming\Sun\openvpn-gui.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Windows\SysWOW64\extrac32.exe"C:\Windows\system32\extrac32.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2340 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"4⤵PID:5084
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"4⤵
- Blocklisted process makes network request
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:3904 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"5⤵PID:4904
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
Filesize2KB
MD5969b3e7ee6ba2ebf542724aa7bbfcbb9
SHA1cdbb612a0faf94c9cb62ed299e3c750ec88cdf5b
SHA2565bc633f2e1f0f1239d3d4252e3bcf9c736116a744d1cf612c2dfa5a45b201a03
SHA51256db86f2d7548d99bb66e63ab2d8ab129304be7bc86e78ca58f55270f28f33600c37ff180cc0073053b7c51d365b5b440f986eb40921da76ff0be391b76d76c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize1KB
MD5d8ccf258f1e7a12df56d59b3ed62ae03
SHA1efc3df6aa5560209c00bf43a001271343dc31162
SHA256046f98c5955af4fa041daa6cd505c896b878f578fa24c2273a50a6bda8c8ce4f
SHA512826468d4982d34628c06bb13efe48019b0d6f5aa540a9ee63fd0f9c31c98f135b192d724afaefcfedbd66eb0c0639326456df52f1ad170668b3f268f34cb6de3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
Filesize488B
MD5b21708a1ee26d1ae06b3a08adefac0ca
SHA1cbbe5c97656f5862c089a8780559bbe3d9fbee5b
SHA256b46403a6c2e2f71e556e3d1f64ae0baf72633e645461ad611c15fbb9f1fe8b23
SHA5129d390119b5689bbcd72a88af85849f95d6d46b64d49a3eac22c62a89cb56d3f55c7a6738201c112022e1bee1c30f83a8b0646aa4d6418bd781b1e5d85c9fcf14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize482B
MD5eabc0ae6bc15bcdbb8d24fc30f1f24f3
SHA184a2cd6e89711ce14f13eebfc2f29dd7a937ebe8
SHA256de7c75ac8481d07ba54eb7aecab37abd1055424458b84b6b41c20dbd596932a7
SHA512571ef8bf63a1007d3b806ad321b89f55a70c2dd11086cec6f455e32552c264df99427bdb2bed1cf8690a4b18aa63ac6a159fd04c0c6d5e15a753972fecaccb02
-
Filesize
13B
MD5863d8795cac22ca62a64cad56a03a8de
SHA170899248b28c51a99195d664c8e51514547f28a8
SHA256bbbfefa1b6cf50a15c9265b32e345f1d4a5981e74118c1e294ca34a486125203
SHA512ecf904eca244110b938771d66c4a653eabd5322de40e8204641c79b216f182a7ae98cfa23ceb54f286606451b3895dbe50f6d45303ef13b4ef1e43719685d3d5
-
Filesize
659KB
MD5a9cda7795caf2ebca4c77b22b57cc299
SHA1d1f7c5bb75b30c85b392cc96b216f443851d8a6e
SHA256f6d33675fccd9f444c67c37ecd2bc30063d37be4f69c073b7ec5cc6b297cd65e
SHA5122aca238344d1da1d5749065d9ecfe395c108e6d3526fba114866bf7f7bcaed21bba4ac87371cc97609e846f857657edf382312391ab12ab39cd37cf04cafe32d
-
Filesize
3.6MB
MD50ac3fc4f05de029062fc2832abb45e73
SHA1802b8a1278952c550f5957b6eaa441ba36bb21dd
SHA2564a8affeb7789d62eb5f84ba237c3a3613f63632a09d97d4c514f1445c2b36092
SHA512a1c25553fccc44b00c6870f3d8b75fe73f394ea793f3b0c3eb9b6d96443bda7ff179cce528f3d9bd7cb4ba00d7cba0a81d884c0d31169fadbb1f87fc17e17985
-
Filesize
630KB
MD57215c1b9693b1394aaa7c86dcd741ad7
SHA1290dda9a0f85cf5f119cb726e4f5d86696672bbc
SHA2561d2914c04b213029550eba1e0c0b40e36a32b443a76efc9c2f779e8b9448bdd5
SHA512e79b8a8ffbf75a17ab8b16752d3da68be9c6f7c50fedf4a6049da2393ff8b1b43e1f9cd9b9bfdc06c8b62764031d959962cfc11898bd81bf22a9970d6c63b945