Analysis

  • max time kernel
    125s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-06-2024 09:28

General

  • Target

    b7e49368d6a41595b15d2fdd243f340a_JaffaCakes118.exe

  • Size

    170KB

  • MD5

    b7e49368d6a41595b15d2fdd243f340a

  • SHA1

    bc8fe33e90071dc4ef36cee9e343f83bf53a79c0

  • SHA256

    2d62a05252267644342eb53d955c1828fa467ea857869cbedea8b737a570a896

  • SHA512

    989207e797f975c05a021b2ef09db62512a5f1728ef917d0b97f5f421572ce5f51ecc30ba1c3ca98c7adca692fa478fd68142558e64d63744c2defd3e887e95e

  • SSDEEP

    3072:+5ERKdsNSE8jWf+FnGevgjFA+WzmLpJhJ4RpS:+wB8qonGeoFA0lyp

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b7e49368d6a41595b15d2fdd243f340a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b7e49368d6a41595b15d2fdd243f340a_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2872
    • C:\Users\Admin\AppData\Local\Temp\ln240648218\lrunner.exe
      "C:\Users\Admin\AppData\Local\Temp\\ln240648218\lrunner.exe" --bpl="eyJjbGlfdmVyIjogMiwgImluc3RhbGxfdXJsIjogImh0dHBzOi8vZ29zb2Z0ZGwubWFpbC5ydS9zd2l0Y2hlcl9wZF8zXzkuZXhlIiwgImxvY2F0aW9uX2lkIjogImxhbmRfZGV4cCIsICJxdWVyeV9zdHJpbmciOiAiYW1pZ29faW5zdGFsbD0xJnBhcnRuZXJpZD04MTc5NjAmZXh0X3BhcnRuZXJpZD1ocCUzQTgxNzk2MSUyQ2RzZSUzQTgxNzk2MiUyQ3B1bHQlM0E4MTc5NjMlMkNhbnklM0E4MTc5NjQmYW1fZGVmYXVsdD0xJmRzZV9pbnN0YWxsPTEmaHBfaW5zdGFsbD0xJnZibV9pbnN0YWxsPTEmYXR0cj05MDAzMDljaCZyZnI9OTAwMzA5JmV4dF9wYXJhbXM9b2xkX21yMWxhZCUzRDVlNGMxMjhmYWY2NTY1My0wLTAtIiwgInRzIjogMTU4NDYwMjYzOX0="
      2⤵
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      PID:3416
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4156,i,7869973516895866428,11647313872437892197,262144 --variations-seed-version --mojo-platform-channel-handle=4160 /prefetch:8
    1⤵
      PID:1900

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\Mail.Ru\Id

      Filesize

      38B

      MD5

      c8049359c557e4bd3a2c241b83c68572

      SHA1

      20ba5406f44bb19c4a250cbf58041925f9f5ff49

      SHA256

      365ccca2f698133f32bcd28f8ed7f7dc4bfcce4857958a7607ef6733e26a61d3

      SHA512

      9608b6f57429d5063d62643b32bbd55eab17a8ce14b69acf887ab11738115f64fc19d60df256d362e57668e1a8426e4ac336bd02789d116e98fb9b197803ad20

    • C:\Users\Admin\AppData\Local\Temp\ln240648218\lrunner.exe

      Filesize

      1.9MB

      MD5

      59ec4314e2a54053778d3862368d639c

      SHA1

      a6e7e4383d2a49460f90f46d81bf31260fb71a50

      SHA256

      8dca302c817de6eab1783ed87139cbe2c0da2be2ccc077cabac12ac3237dab91

      SHA512

      48ec36e24c66df5951a35ff366aa80b70aef005119438e1a97dcc81b21e726a4f1eb7e9000026a75811e1fd7ef51255df28647b30140d136af223acf4e968834