Analysis

  • max time kernel
    149s
  • max time network
    49s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/07/2024, 08:11

General

  • Target

    1a8d14612eb50ba085a4bdfe7114739b_JaffaCakes118.exe

  • Size

    816KB

  • MD5

    1a8d14612eb50ba085a4bdfe7114739b

  • SHA1

    47782eedbd2c766052da4a80e8618f4c4992edac

  • SHA256

    a759a7890339539e919244c1e2f438ee64efa29523722b98eaa862e4760f2e65

  • SHA512

    d8d42c5ade0beb7e36477b977b8f6e94601314930485aa3a97c153e7b5d3d3a9c216a71a739f1fefc4b3086f36f29b8cc12b603140b6f18ff0fabcbf3c6c173f

  • SSDEEP

    12288:cPl+qkZDtg2uQzG3XdBLO4U6AqSl5ciBqnFV+:ctl4g2nz+X3i4UvlqiAF

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1a8d14612eb50ba085a4bdfe7114739b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\1a8d14612eb50ba085a4bdfe7114739b_JaffaCakes118.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:4352
  • C:\Windows\system32\rundll32.exe
    "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.Windows.Search_cw5n1h2txyewy
    1⤵
      PID:4016
    • C:\Windows\System32\svchost.exe
      C:\Windows\System32\svchost.exe -k UnistackSvcGroup
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2728
    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
      1⤵
      • Suspicious use of SetWindowsHookEx
      PID:4160
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.Windows.Search_cw5n1h2txyewy
      1⤵
        PID:4164
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.Windows.Search_cw5n1h2txyewy
        1⤵
          PID:3964
        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
          1⤵
          • Enumerates system info in registry
          • Modifies Internet Explorer settings
          • Modifies registry class
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:3748
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.AAD.BrokerPlugin_cw5n1h2txyewy
          1⤵
            PID:4004

          Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Comms\UnistoreDB\USS.jcp

                  Filesize

                  8KB

                  MD5

                  2a064e35cff16be0b710bcc54e1e0ac3

                  SHA1

                  e7adb4ba45fbedffa61fedc5dc21742c070f812a

                  SHA256

                  d22074e50f51b30c944ca9e7e8f995fab5b77350fe11f09a5f9882f3528a197d

                  SHA512

                  f3175d8d87ccf3bc19db7d4f61af72a55b09f134cb9f00b9b6701015823ff58a1dcf81264fd2530bc3cf6d6b72a1b4f3aee8eb5d8953cec81f7850d6df683d51

                • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\F1I8M0RI\microsoft.windows[1].xml

                  Filesize

                  97B

                  MD5

                  5bc2f1e161a7206c65dc5d208b184523

                  SHA1

                  5205351764be33c7bb45f69c90bca91693cb2715

                  SHA256

                  1d6aeab007dd83091cd3b465f3c408296701b5dc41218076003036e0c3447e36

                  SHA512

                  733205945bbc6414115f18717fa66304cf458f1c995009a21538cb3d85726c0a26baf01722a335e776a3f423a5bfe653645244147242344c8dccca7591d7a69a

                • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{288f055f-3f29-4580-9d04-e48d8f6010c9}\0.0.filtertrie.intermediate.txt

                  Filesize

                  1KB

                  MD5

                  9913dee3ab28ad6ebd60b930d6ee8da3

                  SHA1

                  6e6327df9f85d9037d83a4f537f32541f46a1dbc

                  SHA256

                  3bfac338a56813338b62dba88261ff9b1aa7e505af5f7a50ab9960a35f6ed5e4

                  SHA512

                  e7dead4ccbd7468e7d3d1cc930be40bc5fa0a881b406318bd56346b27651c3a58611c086b369de641f058af5748fa02eb5e02b9f482ff2443d2fbf442c04188d

                • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{288f055f-3f29-4580-9d04-e48d8f6010c9}\0.1.filtertrie.intermediate.txt

                  Filesize

                  5B

                  MD5

                  34bd1dfb9f72cf4f86e6df6da0a9e49a

                  SHA1

                  5f96d66f33c81c0b10df2128d3860e3cb7e89563

                  SHA256

                  8e1e6a3d56796a245d0c7b0849548932fee803bbdb03f6e289495830e017f14c

                  SHA512

                  e3787de7c4bc70ca62234d9a4cdc6bd665bffa66debe3851ee3e8e49e7498b9f1cbc01294bf5e9f75de13fb78d05879e82fa4b89ee45623fe5bf7ac7e48eda96

                • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{288f055f-3f29-4580-9d04-e48d8f6010c9}\0.2.filtertrie.intermediate.txt

                  Filesize

                  5B

                  MD5

                  c204e9faaf8565ad333828beff2d786e

                  SHA1

                  7d23864f5e2a12c1a5f93b555d2d3e7c8f78eec1

                  SHA256

                  d65b6a3bf11a27a1ced1f7e98082246e40cf01289fd47fe4a5ed46c221f2f73f

                  SHA512

                  e72f4f79a4ae2e5e40a41b322bc0408a6dec282f90e01e0a8aaedf9fb9d6f04a60f45a844595727539c1643328e9c1b989b90785271cc30a6550bbda6b1909f8

                • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{288f055f-3f29-4580-9d04-e48d8f6010c9}\Apps.ft

                  Filesize

                  2KB

                  MD5

                  ae92d8e34c6863d31010632e1472cd7e

                  SHA1

                  b6a286b8bc20d4b8fa1b29d234d71a89d696de9a

                  SHA256

                  ed6fdb649852ae050e65b42f4b2f0151f06aeb57f58aee36818fd6925ce1e217

                  SHA512

                  589e9ee259b2efe4cd4d94307075850274d324ba4232d2870ba4bf8fc570ad0b2d9b9ba1ea31f9aa81615b144c61418c6d09d6b24200a5d16b01eb36450e5eab

                • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{288f055f-3f29-4580-9d04-e48d8f6010c9}\Apps.index

                  Filesize

                  881KB

                  MD5

                  832fb9cd22b122f6c9d68f9f4fcc3424

                  SHA1

                  d398a299d12f6aeb005c724d1abd62edebabbac3

                  SHA256

                  e439f475eb0b32c6dfc9fc485c979b3e15126b54995e2ff9719bc4aa1910339a

                  SHA512

                  ba9e934a0880d09c4675d012215001feb282beca68d6c9885caaaabb31d6d3ef32bfb0d48cc9132bb977eee64ade2245fba29c6d5878e9dc9d3c740268d47922

                • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Input_{740e3a06-c6ed-4cd9-a56d-3af5d908e0fc}\apps.csg

                  Filesize

                  444B

                  MD5

                  5475132f1c603298967f332dc9ffb864

                  SHA1

                  4749174f29f34c7d75979c25f31d79774a49ea46

                  SHA256

                  0b0af873ef116a51fc2a2329dc9102817ce923f32a989c7a6846b4329abd62cd

                  SHA512

                  54433a284a6b7185c5f2131928b636d6850babebc09acc5ee6a747832f9e37945a60a7192f857a2f6b4dd20433ca38f24b8e438ba1424cc5c73f0aa2d8c946ff

                • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Input_{740e3a06-c6ed-4cd9-a56d-3af5d908e0fc}\apps.schema

                  Filesize

                  150B

                  MD5

                  1659677c45c49a78f33551da43494005

                  SHA1

                  ae588ef3c9ea7839be032ab4323e04bc260d9387

                  SHA256

                  5af0fc2a0b5ccecdc04e54b3c60f28e3ff5c7d4e1809c6d7c8469f0567c090bb

                  SHA512

                  740a1b6fd80508f29f0f080a8daddec802aabed467d8c5394468b0cf79d7628c1cb5b93cf69ed785999e8d4e2b0f86776b428d4fa0d1afcdf3cbf305615e5030

                • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Input_{740e3a06-c6ed-4cd9-a56d-3af5d908e0fc}\appsconversions.txt

                  Filesize

                  1.4MB

                  MD5

                  2bef0e21ceb249ffb5f123c1e5bd0292

                  SHA1

                  86877a464a0739114e45242b9d427e368ebcc02c

                  SHA256

                  8b9fae5ea9dd21c2313022e151788b276d995c8b9115ee46832b804a914e6307

                  SHA512

                  f5b49f08b44a23f81198b6716195b868e76b2a23a388449356b73f8261107733f05baa027f8cdb8e469086a9869f4a64983c76da0dc978beb4ec1cb257532c6b

                • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Input_{740e3a06-c6ed-4cd9-a56d-3af5d908e0fc}\appsglobals.txt

                  Filesize

                  343KB

                  MD5

                  931b27b3ec2c5e9f29439fba87ec0dc9

                  SHA1

                  dd5e78f004c55bbebcd1d66786efc5ca4575c9b4

                  SHA256

                  541dfa71a3728424420f082023346365cca013af03629fd243b11d8762e3403e

                  SHA512

                  4ba517f09d9ad15efd3db5a79747e42db53885d3af7ccc425d52c711a72e15d24648f8a38bc7e001b3b4cc2180996c6cac3949771aa1c278ca3eb7542eae23fd

                • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Input_{740e3a06-c6ed-4cd9-a56d-3af5d908e0fc}\appssynonyms.txt

                  Filesize

                  237KB

                  MD5

                  06a69ad411292eca66697dc17898e653

                  SHA1

                  fbdcfa0e1761ddcc43a0fb280bbcd2743ba8820d

                  SHA256

                  2aa90f795a65f0e636154def7d84094af2e9a5f71b1b73f168a6ea23e74476d1

                  SHA512

                  ceb4b102309dffb65804e3a0d54b8627fd88920f555b334c3eac56b13eeb5075222d794c3cdbc3cda8bf1658325fdecf6495334e2c89b5133c9a967ec0d15693

                • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133642951030386857.txt

                  Filesize

                  2KB

                  MD5

                  ecaea544af9da1114077b951d8cb520d

                  SHA1

                  5820b2d71e7b2543cf1804eb91716c4e9f732fde

                  SHA256

                  9117b26ab2c8fdbb8223fe1f2d1770c50a6cf0d9849a5849d6aebcbe90435be6

                  SHA512

                  dc7bedbc581818011aa2d313429f234b12e5e9cf320b02b8d7ceeaf9cdc1c921ffc51af7f4080b02740f2d2146fbb006ccbf37cdcba3e3a10009142daffdb919

                • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\TempState\CortanaUnifiedTileModelCache.dat

                  Filesize

                  1KB

                  MD5

                  6ba17ff0efbf93d563a5582bf05bc71a

                  SHA1

                  e9a262ffbe27314cba5317f32343957eafef6f1d

                  SHA256

                  fe900cc38808db1b218d28379dfc5194c2c5fcc512f5ce1b44097bc68416d993

                  SHA512

                  8b4f044b7e42f2b6ddae0c27f503ca74f808c864eb226b638a0da37bed2968b476433020b2711ed8bebe73062c51ee33190f35e08ac8ecfa4671ab22247af365

                • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\TempState\CortanaUnifiedTileModelCache.dat

                  Filesize

                  1KB

                  MD5

                  31633d552589104772a297b156282dc9

                  SHA1

                  1ad53813eb453f02159420d3b8decf119903432d

                  SHA256

                  61e900dec3ad34bf2bc4d3ca1905bcd3c638f90adb1adb7ffcb09ea0d251895a

                  SHA512

                  1a0d14d75ec71b846e6bb55e093b66c75fac832b9b808d9793bc731c3116a438630fb393cea45d1c4c1651f85ad50f70866f56171d5c6a2f7ac904582d506a34

                • memory/2728-47-0x00000240D6560000-0x00000240D6561000-memory.dmp

                  Filesize

                  4KB

                • memory/2728-49-0x00000240D6560000-0x00000240D6561000-memory.dmp

                  Filesize

                  4KB

                • memory/2728-55-0x00000240D6560000-0x00000240D6561000-memory.dmp

                  Filesize

                  4KB

                • memory/2728-54-0x00000240D6560000-0x00000240D6561000-memory.dmp

                  Filesize

                  4KB

                • memory/2728-57-0x00000240D6560000-0x00000240D6561000-memory.dmp

                  Filesize

                  4KB

                • memory/2728-56-0x00000240D6560000-0x00000240D6561000-memory.dmp

                  Filesize

                  4KB

                • memory/2728-60-0x00000240D6560000-0x00000240D6561000-memory.dmp

                  Filesize

                  4KB

                • memory/2728-59-0x00000240D6560000-0x00000240D6561000-memory.dmp

                  Filesize

                  4KB

                • memory/2728-58-0x00000240D6560000-0x00000240D6561000-memory.dmp

                  Filesize

                  4KB

                • memory/2728-61-0x00000240D6560000-0x00000240D6561000-memory.dmp

                  Filesize

                  4KB

                • memory/2728-63-0x00000240D6560000-0x00000240D6561000-memory.dmp

                  Filesize

                  4KB

                • memory/2728-62-0x00000240D6560000-0x00000240D6561000-memory.dmp

                  Filesize

                  4KB

                • memory/2728-64-0x00000240D6570000-0x00000240D6571000-memory.dmp

                  Filesize

                  4KB

                • memory/2728-65-0x00000240D6570000-0x00000240D6571000-memory.dmp

                  Filesize

                  4KB

                • memory/2728-66-0x00000240D6580000-0x00000240D6581000-memory.dmp

                  Filesize

                  4KB

                • memory/2728-67-0x00000240D65D0000-0x00000240D65D1000-memory.dmp

                  Filesize

                  4KB

                • memory/2728-68-0x00000240D65D0000-0x00000240D65D1000-memory.dmp

                  Filesize

                  4KB

                • memory/2728-2-0x00000240CE140000-0x00000240CE150000-memory.dmp

                  Filesize

                  64KB

                • memory/2728-37-0x00000240D63F0000-0x00000240D63F1000-memory.dmp

                  Filesize

                  4KB

                • memory/2728-39-0x00000240D6530000-0x00000240D6531000-memory.dmp

                  Filesize

                  4KB

                • memory/2728-52-0x00000240D6560000-0x00000240D6561000-memory.dmp

                  Filesize

                  4KB

                • memory/2728-51-0x00000240D6560000-0x00000240D6561000-memory.dmp

                  Filesize

                  4KB

                • memory/2728-50-0x00000240D6560000-0x00000240D6561000-memory.dmp

                  Filesize

                  4KB

                • memory/2728-18-0x00000240CE240000-0x00000240CE250000-memory.dmp

                  Filesize

                  64KB

                • memory/2728-48-0x00000240D6560000-0x00000240D6561000-memory.dmp

                  Filesize

                  4KB

                • memory/2728-53-0x00000240D6560000-0x00000240D6561000-memory.dmp

                  Filesize

                  4KB

                • memory/2728-46-0x00000240D6560000-0x00000240D6561000-memory.dmp

                  Filesize

                  4KB

                • memory/2728-45-0x00000240D6540000-0x00000240D6541000-memory.dmp

                  Filesize

                  4KB

                • memory/2728-44-0x00000240D6540000-0x00000240D6541000-memory.dmp

                  Filesize

                  4KB

                • memory/2728-41-0x00000240D6530000-0x00000240D6531000-memory.dmp

                  Filesize

                  4KB

                • memory/2728-42-0x00000240D6540000-0x00000240D6541000-memory.dmp

                  Filesize

                  4KB

                • memory/3748-110-0x000002A0FEA30000-0x000002A0FEA50000-memory.dmp

                  Filesize

                  128KB

                • memory/3748-91-0x000002A0FE3A0000-0x000002A0FE3C0000-memory.dmp

                  Filesize

                  128KB

                • memory/3748-75-0x000002A0FE3E0000-0x000002A0FE400000-memory.dmp

                  Filesize

                  128KB