Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    24-06-2024 13:17

General

  • Target

    08bcd418aeb3d497538fd90d77b1a748_JaffaCakes118.exe

  • Size

    211KB

  • MD5

    08bcd418aeb3d497538fd90d77b1a748

  • SHA1

    4e357e4b803fa5aca6df682fddb3664d5fe1fa7e

  • SHA256

    31aabd84716f6d792dec4dadf15675e94b79e6673bda4e39a1a21e43f5fdbd63

  • SHA512

    640350e132f794c76d71011e819bb8b4785a059be396ef330676c5f5b3914c9c57b02936f9f22653325bb14894d698c49204924ba4af38adde1b4d3b7ed88277

  • SSDEEP

    3072:0MnRoDWThRG0Jw0tqS+53QhMuQOnxXpExCtHXL7FT2s6hPpJqQmUjixwXg9FClZ:0MBTzqv3O9pExCtdt6hPbYoixww9FuZ

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\08bcd418aeb3d497538fd90d77b1a748_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\08bcd418aeb3d497538fd90d77b1a748_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2436
    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\92983.exe
      "C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\92983.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1280
      • C:\Users\Admin\AppData\Local\Temp\iStealer5.1.1.exe
        "C:\Users\Admin\AppData\Local\Temp\iStealer5.1.1.exe"
        3⤵
        • Executes dropped EXE
        PID:2780
      • C:\Users\Admin\AppData\Local\Temp\iStealer 5.0.1.exe
        "C:\Users\Admin\AppData\Local\Temp\iStealer 5.0.1.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2624

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\92983.exe

    Filesize

    196KB

    MD5

    fe8a779657baca133d80b072c28a900f

    SHA1

    d7b53c8b63fc359b396be56567c46d995bfbb6b2

    SHA256

    5a510070541a2b9e634299bf77387dc452140eac5b3a8db2f6389f1d34367fc0

    SHA512

    37322fdbbbf8f1fbcedf2e8624830a5f6d0290abaed1784de1227c48b1ba4d8ecaa4881500ac29f73458fb46a52ee65dd33efb973dd4288d6ab3e3b41bf31954

  • C:\Users\Admin\AppData\Local\Temp\iStealer 5.0.1.exe

    Filesize

    156KB

    MD5

    2ae0fba00b72ab198056eaa88e9e52c6

    SHA1

    534cb347eea783767ce41a699fcd340e6e25704b

    SHA256

    e06217c0b32ce258dbfc3e8a87844122c9bec88ddfef55b2b53a13e5b33bcade

    SHA512

    092a01e025b64bbfc5c263e70c2398a3c03c2a1101d4f4d34db60d737e539bbbf032aea845ca193228d0a727549668e6647c54a9b1e5cf7b1a6d0bf4bfefa304

  • C:\Users\Admin\AppData\Local\Temp\iStealer5.1.1.exe

    Filesize

    20KB

    MD5

    01ddc7d91fdfe41c7c762cdebdc62fb3

    SHA1

    97bdf3f267dada212c5e73019e41df74646954ee

    SHA256

    55e0235deff17b893b2ee229b382ce7fa67fe8ee8d0b3bde556e1801c81607fc

    SHA512

    76a4a7d8938edfa577af4f965010e0d2f358a7d33b26df12e7d0dea4ac09e34c9af28c7e3c2ab3bb57e73364de1224556d753b6dd5c1a258a3425f14143284d6

  • memory/1280-9-0x000007FEF57E0000-0x000007FEF617D000-memory.dmp

    Filesize

    9.6MB

  • memory/1280-7-0x000007FEF57E0000-0x000007FEF617D000-memory.dmp

    Filesize

    9.6MB

  • memory/1280-8-0x000007FEF57E0000-0x000007FEF617D000-memory.dmp

    Filesize

    9.6MB

  • memory/1280-11-0x000007FEF57E0000-0x000007FEF617D000-memory.dmp

    Filesize

    9.6MB

  • memory/1280-27-0x000007FEF57E0000-0x000007FEF617D000-memory.dmp

    Filesize

    9.6MB

  • memory/2436-0-0x000007FEF5A9E000-0x000007FEF5A9F000-memory.dmp

    Filesize

    4KB

  • memory/2436-10-0x000007FEF57E0000-0x000007FEF617D000-memory.dmp

    Filesize

    9.6MB

  • memory/2436-6-0x000007FEF57E0000-0x000007FEF617D000-memory.dmp

    Filesize

    9.6MB

  • memory/2436-2-0x000007FEF57E0000-0x000007FEF617D000-memory.dmp

    Filesize

    9.6MB

  • memory/2624-26-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/2624-30-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB