Analysis

  • max time kernel
    150s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/06/2024, 23:03

General

  • Target

    0b233b4bc57d558fde9358ea7e0a1de0_JaffaCakes118.exe

  • Size

    95KB

  • MD5

    0b233b4bc57d558fde9358ea7e0a1de0

  • SHA1

    381943f2d1ade962bdda80c185510335a8c6cf46

  • SHA256

    70f3521618bdfa654a4f8f5c8b27fd85e4cf50390f7c3ee904362e00704d0c6b

  • SHA512

    8160296e81f833203f5929050bd9b22cd4d7d28bcd66bb7d0d1a43f0e1832db2b6c81a19e4d97cfab96195e6a1ab0bcda45304d07ea6363045f37bf858c39ca8

  • SSDEEP

    1536:9Awe/fNJPDur8D1HNd7GN5dZRWrfxZCS02fevLIi7tQpQwNjXHukQlWlAonouy8P:fcvhhHNy5HopZCS02eLN7BwJuGoutP

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Modifies Internet Explorer Phishing Filter 1 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0b233b4bc57d558fde9358ea7e0a1de0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0b233b4bc57d558fde9358ea7e0a1de0_JaffaCakes118.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3708
    • C:\Recycle.Bin\B6232F3AEA5.exe
      "C:\Recycle.Bin\B6232F3AEA5.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1408
      • C:\Users\Admin\AppData\Local\Temp\FNB1028.exe
        "C:\Users\Admin\AppData\Local\Temp\FNB1028.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Modifies Internet Explorer Phishing Filter
        • Modifies Internet Explorer settings
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2584
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4028,i,11746347647270949551,7786733067759450703,262144 --variations-seed-version --mojo-platform-channel-handle=3772 /prefetch:8
    1⤵
      PID:2804

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Recycle.Bin\4A55317553874FA

      Filesize

      4KB

      MD5

      bb65f08bb56765683bf2cbb90e077d8e

      SHA1

      f33455675434cad9f4bb0c8a1827062eefb007c9

      SHA256

      20b62991eb1011b268ea99c69abf22082993d7a376b3d7197012004afc65d583

      SHA512

      7b4c21a6a6b12fc59c1a37124e9ee1ddc13fc1cd1e34ff82f04ae5bb8d81f20c523f704e91f953235e5b5ae1fee58087773c41aed38ce57b91566b3bd3c660c6

    • C:\Recycle.Bin\B6232F3AEA5.exe

      Filesize

      95KB

      MD5

      0b233b4bc57d558fde9358ea7e0a1de0

      SHA1

      381943f2d1ade962bdda80c185510335a8c6cf46

      SHA256

      70f3521618bdfa654a4f8f5c8b27fd85e4cf50390f7c3ee904362e00704d0c6b

      SHA512

      8160296e81f833203f5929050bd9b22cd4d7d28bcd66bb7d0d1a43f0e1832db2b6c81a19e4d97cfab96195e6a1ab0bcda45304d07ea6363045f37bf858c39ca8

    • C:\Users\Admin\AppData\Local\Temp\FNB1028.exe

      Filesize

      3KB

      MD5

      29090b6b4d6605a97ac760d06436ac2d

      SHA1

      d929d3389642e52bae5ad8512293c9c4d3e4fab5

      SHA256

      98a24f0caf5b578e230e6f1103a5fba6aecb28a9128cad5520fcde546d643272

      SHA512

      9121ec42fa66e14a4fc3932c8dbcc8fb1a93ab9de00da57a82e176faa70b73f6992f8c5e2ab52c02fc28c8f0c59aee73b6fbbd39107db7d15105054f4390e9be

    • memory/1408-18-0x00000000001F0000-0x00000000001F1000-memory.dmp

      Filesize

      4KB

    • memory/1408-17-0x0000000000A5B000-0x0000000000A5C000-memory.dmp

      Filesize

      4KB

    • memory/1408-113-0x0000000000A40000-0x0000000000B40000-memory.dmp

      Filesize

      1024KB

    • memory/1408-26-0x00000000007A0000-0x00000000007E6000-memory.dmp

      Filesize

      280KB

    • memory/1408-28-0x0000000000A40000-0x0000000000B40000-memory.dmp

      Filesize

      1024KB

    • memory/1408-29-0x0000000000700000-0x0000000000758000-memory.dmp

      Filesize

      352KB

    • memory/1408-19-0x0000000000A5B000-0x0000000000A5C000-memory.dmp

      Filesize

      4KB

    • memory/1408-15-0x0000000000700000-0x0000000000758000-memory.dmp

      Filesize

      352KB

    • memory/1408-16-0x0000000000A5B000-0x0000000000A5C000-memory.dmp

      Filesize

      4KB

    • memory/1408-31-0x0000000000A40000-0x0000000000B40000-memory.dmp

      Filesize

      1024KB

    • memory/2584-46-0x000000000BAD0000-0x000000000BB16000-memory.dmp

      Filesize

      280KB

    • memory/2584-34-0x00000000007A0000-0x00000000007E6000-memory.dmp

      Filesize

      280KB

    • memory/2584-33-0x00000000007A0000-0x00000000007E6000-memory.dmp

      Filesize

      280KB

    • memory/2584-40-0x0000000001000000-0x0000000001004000-memory.dmp

      Filesize

      16KB

    • memory/2584-45-0x000000000BAD0000-0x000000000BB16000-memory.dmp

      Filesize

      280KB

    • memory/2584-53-0x000000000BAD0000-0x000000000BB16000-memory.dmp

      Filesize

      280KB

    • memory/2584-70-0x000000000BAD0000-0x000000000BB16000-memory.dmp

      Filesize

      280KB

    • memory/2584-71-0x000000000BAD0000-0x000000000BB16000-memory.dmp

      Filesize

      280KB

    • memory/2584-68-0x000000000BAD0000-0x000000000BB16000-memory.dmp

      Filesize

      280KB

    • memory/2584-67-0x000000000BAD0000-0x000000000BB16000-memory.dmp

      Filesize

      280KB

    • memory/2584-66-0x000000000BAD0000-0x000000000BB16000-memory.dmp

      Filesize

      280KB

    • memory/2584-65-0x000000000BAD0000-0x000000000BB16000-memory.dmp

      Filesize

      280KB

    • memory/2584-64-0x000000000BAD0000-0x000000000BB16000-memory.dmp

      Filesize

      280KB

    • memory/2584-73-0x000000000BAD0000-0x000000000BB16000-memory.dmp

      Filesize

      280KB

    • memory/2584-63-0x000000000BAD0000-0x000000000BB16000-memory.dmp

      Filesize

      280KB

    • memory/2584-62-0x000000000BAD0000-0x000000000BB16000-memory.dmp

      Filesize

      280KB

    • memory/2584-61-0x000000000BAD0000-0x000000000BB16000-memory.dmp

      Filesize

      280KB

    • memory/2584-60-0x000000000BAD0000-0x000000000BB16000-memory.dmp

      Filesize

      280KB

    • memory/2584-59-0x000000000BAD0000-0x000000000BB16000-memory.dmp

      Filesize

      280KB

    • memory/2584-58-0x000000000BAD0000-0x000000000BB16000-memory.dmp

      Filesize

      280KB

    • memory/2584-57-0x000000000BAD0000-0x000000000BB16000-memory.dmp

      Filesize

      280KB

    • memory/2584-56-0x000000000BAD0000-0x000000000BB16000-memory.dmp

      Filesize

      280KB

    • memory/2584-55-0x000000000BAD0000-0x000000000BB16000-memory.dmp

      Filesize

      280KB

    • memory/2584-54-0x000000000BAD0000-0x000000000BB16000-memory.dmp

      Filesize

      280KB

    • memory/2584-51-0x000000000BAD0000-0x000000000BB16000-memory.dmp

      Filesize

      280KB

    • memory/2584-50-0x000000000BAD0000-0x000000000BB16000-memory.dmp

      Filesize

      280KB

    • memory/2584-49-0x000000000BAD0000-0x000000000BB16000-memory.dmp

      Filesize

      280KB

    • memory/2584-48-0x000000000BAD0000-0x000000000BB16000-memory.dmp

      Filesize

      280KB

    • memory/2584-47-0x000000000BAD0000-0x000000000BB16000-memory.dmp

      Filesize

      280KB

    • memory/2584-24-0x00000000007A0000-0x00000000007E6000-memory.dmp

      Filesize

      280KB

    • memory/2584-52-0x000000000BAD0000-0x000000000BB16000-memory.dmp

      Filesize

      280KB

    • memory/2584-42-0x00000000007A0000-0x00000000007E6000-memory.dmp

      Filesize

      280KB

    • memory/2584-41-0x0000000000520000-0x0000000000525000-memory.dmp

      Filesize

      20KB

    • memory/2584-39-0x0000000001001000-0x0000000001002000-memory.dmp

      Filesize

      4KB

    • memory/2584-38-0x00000000007A0000-0x00000000007E6000-memory.dmp

      Filesize

      280KB

    • memory/2584-37-0x00000000007A0000-0x00000000007E6000-memory.dmp

      Filesize

      280KB

    • memory/2584-35-0x00000000007A0000-0x00000000007E6000-memory.dmp

      Filesize

      280KB

    • memory/3708-95-0x000000000BAD0000-0x000000000BB16000-memory.dmp

      Filesize

      280KB

    • memory/3708-5-0x00000000001F0000-0x00000000001F1000-memory.dmp

      Filesize

      4KB

    • memory/3708-3-0x00000000001E0000-0x00000000001E1000-memory.dmp

      Filesize

      4KB

    • memory/3708-4-0x0000000000980000-0x0000000000A80000-memory.dmp

      Filesize

      1024KB

    • memory/3708-1-0x0000000000980000-0x0000000000A80000-memory.dmp

      Filesize

      1024KB

    • memory/3708-6-0x00000000001F0000-0x00000000001F1000-memory.dmp

      Filesize

      4KB

    • memory/3708-13-0x00000000001E0000-0x00000000001E2000-memory.dmp

      Filesize

      8KB

    • memory/3708-12-0x0000000077092000-0x0000000077094000-memory.dmp

      Filesize

      8KB

    • memory/3708-74-0x0000000000DE0000-0x0000000000E38000-memory.dmp

      Filesize

      352KB

    • memory/3708-75-0x00000000004D0000-0x00000000004D1000-memory.dmp

      Filesize

      4KB

    • memory/3708-76-0x00000000004D0000-0x00000000004D1000-memory.dmp

      Filesize

      4KB

    • memory/3708-78-0x0000000000980000-0x0000000000A80000-memory.dmp

      Filesize

      1024KB

    • memory/3708-101-0x000000000BAD0000-0x000000000BB16000-memory.dmp

      Filesize

      280KB

    • memory/3708-100-0x000000000BAD0000-0x000000000BB16000-memory.dmp

      Filesize

      280KB

    • memory/3708-99-0x000000000BAD0000-0x000000000BB16000-memory.dmp

      Filesize

      280KB

    • memory/3708-98-0x000000000BAD0000-0x000000000BB16000-memory.dmp

      Filesize

      280KB

    • memory/3708-96-0x000000000BAD0000-0x000000000BB16000-memory.dmp

      Filesize

      280KB

    • memory/3708-97-0x0000000077092000-0x0000000077094000-memory.dmp

      Filesize

      8KB

    • memory/3708-83-0x000000000BAD0000-0x000000000BB16000-memory.dmp

      Filesize

      280KB

    • memory/3708-94-0x0000000000980000-0x0000000000A80000-memory.dmp

      Filesize

      1024KB

    • memory/3708-93-0x000000000BAD0000-0x000000000BB16000-memory.dmp

      Filesize

      280KB

    • memory/3708-92-0x000000000BAD0000-0x000000000BB16000-memory.dmp

      Filesize

      280KB

    • memory/3708-91-0x000000000BAD0000-0x000000000BB16000-memory.dmp

      Filesize

      280KB

    • memory/3708-88-0x000000000BAD0000-0x000000000BB16000-memory.dmp

      Filesize

      280KB

    • memory/3708-87-0x000000000BAD0000-0x000000000BB16000-memory.dmp

      Filesize

      280KB

    • memory/3708-86-0x000000000BAD0000-0x000000000BB16000-memory.dmp

      Filesize

      280KB

    • memory/3708-85-0x000000000BAD0000-0x000000000BB16000-memory.dmp

      Filesize

      280KB

    • memory/3708-84-0x000000000BAD0000-0x000000000BB16000-memory.dmp

      Filesize

      280KB

    • memory/3708-2-0x0000000000980000-0x0000000000A80000-memory.dmp

      Filesize

      1024KB

    • memory/3708-81-0x000000000BAD0000-0x000000000BB16000-memory.dmp

      Filesize

      280KB

    • memory/3708-80-0x00000000001E0000-0x00000000001E1000-memory.dmp

      Filesize

      4KB

    • memory/3708-79-0x0000000000980000-0x0000000000A80000-memory.dmp

      Filesize

      1024KB

    • memory/3708-90-0x000000000BAD0000-0x000000000BB16000-memory.dmp

      Filesize

      280KB

    • memory/3708-89-0x000000000BAD0000-0x000000000BB16000-memory.dmp

      Filesize

      280KB

    • memory/3708-82-0x000000000BAD0000-0x000000000BB16000-memory.dmp

      Filesize

      280KB

    • memory/3708-0-0x0000000000DE0000-0x0000000000E38000-memory.dmp

      Filesize

      352KB