Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    06-07-2024 17:50

General

  • Target

    29116272281ad7f8b672112fe47d1a17_JaffaCakes118.exe

  • Size

    847KB

  • MD5

    29116272281ad7f8b672112fe47d1a17

  • SHA1

    7fe297ff7b1b88f41a80e1c71327bed4e12a49c6

  • SHA256

    b143c1b25096ec1fc28a227a74d1ff0d2decafcd41b02317d3ed0002f329f043

  • SHA512

    abcb1e965679be5aef5bc025ec1d679394c2c27341ec7a63a67d9fd94142b9f803b77f9ce2fd73aa6a1dbb43b55e40dbdf45a9dd633c42201a831119f0f7b57d

  • SSDEEP

    24576:y3+BG6BhAVGbqQ4sW8xYBrMBJyPVrk8hACSM/:VT6EUz8fqGCS

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 17 IoCs
  • Suspicious use of SendNotifyMessage 17 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\29116272281ad7f8b672112fe47d1a17_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\29116272281ad7f8b672112fe47d1a17_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2976
    • C:\ProgramData\isecurity.exe
      C:\ProgramData\isecurity.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Enumerates connected drives
      • Writes to the Master Boot Record (MBR)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:3024

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \ProgramData\isecurity.exe

    Filesize

    841KB

    MD5

    4c5b246fe421ca1b67bd9c339992149d

    SHA1

    afe516a0ddeb755597dc02c03953c05435c1d0f6

    SHA256

    b8abb0aefce6c74af264aeaacac1e0c716961d9aa446cebbd17c1d358da4dc5b

    SHA512

    2291585192cd5d89547137b03dc06ce7bceab5688b6339c7e5812d0203adce973427cf8a40b3ef73223dca4e6f2125420e31bc73a83a9c4b6058693581fbb2aa

  • memory/2976-0-0x00000000004D6000-0x00000000004D7000-memory.dmp

    Filesize

    4KB

  • memory/2976-1-0x0000000000400000-0x0000000000500000-memory.dmp

    Filesize

    1024KB

  • memory/2976-2-0x0000000000400000-0x0000000000500000-memory.dmp

    Filesize

    1024KB

  • memory/2976-5-0x0000000000400000-0x0000000000500000-memory.dmp

    Filesize

    1024KB

  • memory/3024-28-0x0000000000400000-0x0000000000A3F000-memory.dmp

    Filesize

    6.2MB

  • memory/3024-33-0x0000000000400000-0x0000000000A3F000-memory.dmp

    Filesize

    6.2MB

  • memory/3024-22-0x0000000000400000-0x0000000000A3F000-memory.dmp

    Filesize

    6.2MB

  • memory/3024-23-0x0000000000400000-0x0000000000A3F000-memory.dmp

    Filesize

    6.2MB

  • memory/3024-24-0x0000000000400000-0x0000000000A3F000-memory.dmp

    Filesize

    6.2MB

  • memory/3024-26-0x0000000000400000-0x0000000000A3F000-memory.dmp

    Filesize

    6.2MB

  • memory/3024-27-0x0000000000400000-0x0000000000A3F000-memory.dmp

    Filesize

    6.2MB

  • memory/3024-19-0x0000000000400000-0x0000000000A3F000-memory.dmp

    Filesize

    6.2MB

  • memory/3024-29-0x0000000000400000-0x0000000000A3F000-memory.dmp

    Filesize

    6.2MB

  • memory/3024-30-0x0000000000400000-0x0000000000A3F000-memory.dmp

    Filesize

    6.2MB

  • memory/3024-32-0x0000000000400000-0x0000000000A3F000-memory.dmp

    Filesize

    6.2MB

  • memory/3024-21-0x0000000000400000-0x0000000000A3F000-memory.dmp

    Filesize

    6.2MB

  • memory/3024-34-0x0000000000400000-0x0000000000A3F000-memory.dmp

    Filesize

    6.2MB

  • memory/3024-35-0x0000000000400000-0x0000000000A3F000-memory.dmp

    Filesize

    6.2MB

  • memory/3024-36-0x0000000000400000-0x0000000000A3F000-memory.dmp

    Filesize

    6.2MB

  • memory/3024-37-0x0000000000400000-0x0000000000A3F000-memory.dmp

    Filesize

    6.2MB

  • memory/3024-38-0x0000000000400000-0x0000000000A3F000-memory.dmp

    Filesize

    6.2MB

  • memory/3024-39-0x0000000000400000-0x0000000000A3F000-memory.dmp

    Filesize

    6.2MB

  • memory/3024-40-0x0000000000400000-0x0000000000A3F000-memory.dmp

    Filesize

    6.2MB

  • memory/3024-41-0x0000000000400000-0x0000000000A3F000-memory.dmp

    Filesize

    6.2MB

  • memory/3024-42-0x0000000000400000-0x0000000000A3F000-memory.dmp

    Filesize

    6.2MB

  • memory/3024-43-0x0000000000400000-0x0000000000A3F000-memory.dmp

    Filesize

    6.2MB