Analysis

  • max time kernel
    141s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    28/06/2024, 03:24

General

  • Target

    189b23c28725bffbb2cf1c047918914d_JaffaCakes118.exe

  • Size

    2.0MB

  • MD5

    189b23c28725bffbb2cf1c047918914d

  • SHA1

    89bd409a76a892c404c3cb6961bef9763da34d02

  • SHA256

    cc447c1468d6ceab348ff7d5b1c38749d85455b74820ff892f4c0575d6ae16a3

  • SHA512

    408817019ee634a14daa74eaf21ce94ccfbe5cf7f97c1b1075aea4c6ee3603fb6bb4c1b741aefdba77d409a674ef98682246b96851879e93da4abf1b41e705af

  • SSDEEP

    3072:QUXUBCQBePBY37DOkY3ABh8Nj4NNka/kF:QzBCQBeZYL2ABOm

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 8 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 3 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 14 IoCs
  • Modifies registry class 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\189b23c28725bffbb2cf1c047918914d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\189b23c28725bffbb2cf1c047918914d_JaffaCakes118.exe"
    1⤵
    • Adds policy Run key to start application
    • Boot or Logon Autostart Execution: Active Setup
    • Adds Run key to start application
    • Installs/modifies Browser Helper Object
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2432

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\cplpdbnet.exe

    Filesize

    2.0MB

    MD5

    c51877d0f4f06bf0a920c745983a9049

    SHA1

    f5ab59c38c3392f856eae7063a0d63ef5e840fb9

    SHA256

    69754ef37c8e01f451a9d2b19b6657c150bb7f036a40b98029942451423b5c85

    SHA512

    64ccc36b5b2613c035ec155b2594420ede1cbac1017228fd1919ebb6d838ac7535951e991bc6f2e358359909e22bd9c561c75dde0ac9e29f35f0546983e23296

  • C:\Windows\SysWOW64\wdmudfnet.ocx

    Filesize

    4KB

    MD5

    3adea70969f52d365c119b3d25619de9

    SHA1

    d303a6ddd63ce993a8432f4daab5132732748843

    SHA256

    c9f5a19c7b11fd866483adc93aa5bc4bd3515bd995ca79297b227e3e5ef1a665

    SHA512

    c4d836fcbdab4c859a6fc0f849d1e41e98c7e23fc0fe0fe0a09cb68e9a57d60b2ae9ad46762d7a5e05db28d6179bd431ef179ee1f9ff016db74cc3b1d74ed7f8

  • memory/2432-0-0x0000000000400000-0x0000000000449000-memory.dmp

    Filesize

    292KB

  • memory/2432-22-0x0000000000400000-0x0000000000449000-memory.dmp

    Filesize

    292KB