Analysis
-
max time kernel
125s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
17-06-2024 09:28
Static task
static1
Behavioral task
behavioral1
Sample
b7e49368d6a41595b15d2fdd243f340a_JaffaCakes118.exe
Resource
win7-20240220-en
General
-
Target
b7e49368d6a41595b15d2fdd243f340a_JaffaCakes118.exe
-
Size
170KB
-
MD5
b7e49368d6a41595b15d2fdd243f340a
-
SHA1
bc8fe33e90071dc4ef36cee9e343f83bf53a79c0
-
SHA256
2d62a05252267644342eb53d955c1828fa467ea857869cbedea8b737a570a896
-
SHA512
989207e797f975c05a021b2ef09db62512a5f1728ef917d0b97f5f421572ce5f51ecc30ba1c3ca98c7adca692fa478fd68142558e64d63744c2defd3e887e95e
-
SSDEEP
3072:+5ERKdsNSE8jWf+FnGevgjFA+WzmLpJhJ4RpS:+wB8qonGeoFA0lyp
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 3416 lrunner.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA lrunner.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini lrunner.exe File opened for modification C:\Windows\System32\GroupPolicy lrunner.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 3416 lrunner.exe 3416 lrunner.exe 3416 lrunner.exe 3416 lrunner.exe 3416 lrunner.exe 3416 lrunner.exe 3416 lrunner.exe 3416 lrunner.exe 3416 lrunner.exe 3416 lrunner.exe 3416 lrunner.exe 3416 lrunner.exe 3416 lrunner.exe 3416 lrunner.exe 3416 lrunner.exe 3416 lrunner.exe 3416 lrunner.exe 3416 lrunner.exe 3416 lrunner.exe 3416 lrunner.exe 3416 lrunner.exe 3416 lrunner.exe 3416 lrunner.exe 3416 lrunner.exe 3416 lrunner.exe 3416 lrunner.exe 3416 lrunner.exe 3416 lrunner.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2872 wrote to memory of 3416 2872 b7e49368d6a41595b15d2fdd243f340a_JaffaCakes118.exe 95 PID 2872 wrote to memory of 3416 2872 b7e49368d6a41595b15d2fdd243f340a_JaffaCakes118.exe 95 PID 2872 wrote to memory of 3416 2872 b7e49368d6a41595b15d2fdd243f340a_JaffaCakes118.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\b7e49368d6a41595b15d2fdd243f340a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b7e49368d6a41595b15d2fdd243f340a_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\ln240648218\lrunner.exe"C:\Users\Admin\AppData\Local\Temp\\ln240648218\lrunner.exe" --bpl="eyJjbGlfdmVyIjogMiwgImluc3RhbGxfdXJsIjogImh0dHBzOi8vZ29zb2Z0ZGwubWFpbC5ydS9zd2l0Y2hlcl9wZF8zXzkuZXhlIiwgImxvY2F0aW9uX2lkIjogImxhbmRfZGV4cCIsICJxdWVyeV9zdHJpbmciOiAiYW1pZ29faW5zdGFsbD0xJnBhcnRuZXJpZD04MTc5NjAmZXh0X3BhcnRuZXJpZD1ocCUzQTgxNzk2MSUyQ2RzZSUzQTgxNzk2MiUyQ3B1bHQlM0E4MTc5NjMlMkNhbnklM0E4MTc5NjQmYW1fZGVmYXVsdD0xJmRzZV9pbnN0YWxsPTEmaHBfaW5zdGFsbD0xJnZibV9pbnN0YWxsPTEmYXR0cj05MDAzMDljaCZyZnI9OTAwMzA5JmV4dF9wYXJhbXM9b2xkX21yMWxhZCUzRDVlNGMxMjhmYWY2NTY1My0wLTAtIiwgInRzIjogMTU4NDYwMjYzOX0="2⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:3416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4156,i,7869973516895866428,11647313872437892197,262144 --variations-seed-version --mojo-platform-channel-handle=4160 /prefetch:81⤵PID:1900
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38B
MD5c8049359c557e4bd3a2c241b83c68572
SHA120ba5406f44bb19c4a250cbf58041925f9f5ff49
SHA256365ccca2f698133f32bcd28f8ed7f7dc4bfcce4857958a7607ef6733e26a61d3
SHA5129608b6f57429d5063d62643b32bbd55eab17a8ce14b69acf887ab11738115f64fc19d60df256d362e57668e1a8426e4ac336bd02789d116e98fb9b197803ad20
-
Filesize
1.9MB
MD559ec4314e2a54053778d3862368d639c
SHA1a6e7e4383d2a49460f90f46d81bf31260fb71a50
SHA2568dca302c817de6eab1783ed87139cbe2c0da2be2ccc077cabac12ac3237dab91
SHA51248ec36e24c66df5951a35ff366aa80b70aef005119438e1a97dcc81b21e726a4f1eb7e9000026a75811e1fd7ef51255df28647b30140d136af223acf4e968834