Analysis

  • max time kernel
    95s
  • max time network
    121s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-07-2024 03:04

General

  • Target

    2ac464aac49537a0c6c023c30c5f2cb1_JaffaCakes118.exe

  • Size

    552KB

  • MD5

    2ac464aac49537a0c6c023c30c5f2cb1

  • SHA1

    5689ec2fb93013842400e37b4d5b05b56084e31d

  • SHA256

    e2f3d9ed24f2318cbda5f3a4a80eb46204e9a191978c9b73971ecfc4b5f5dbe7

  • SHA512

    07bbfcbe64be67125f6b32b8bf5653fd31b129761cc147f0840bd4197470961e4a7e2a3d70f91a28ce1c63845f6d758a9f73adebac5b6bc209326fbefb405359

  • SSDEEP

    6144:Sf/YnyF5SW3tYJaFXcfowRppuyF5SW3tgJaFr7555/4zAaEpV3s6tdm5:SfJ/R3Yeao6ppZ/R30eufEpvu

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    Smtp.gmail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Spanglish1

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2ac464aac49537a0c6c023c30c5f2cb1_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2ac464aac49537a0c6c023c30c5f2cb1_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops desktop.ini file(s)
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:3248
    • C:\Users\Admin\AppData\Local\Temp\RSBots_Auth_Gen.exe
      "C:\Users\Admin\AppData\Local\Temp\RSBots_Auth_Gen.exe"
      2⤵
      • Executes dropped EXE
      PID:5044
    • C:\Users\Admin\AppData\Local\Temp\RsBotAuthGenv1.6.exe
      "C:\Users\Admin\AppData\Local\Temp\RsBotAuthGenv1.6.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4576
      • C:\Users\Admin\AppData\Local\Temp\Microsoftnet.exe
        C:\Users\Admin\AppData\Local\Temp\Microsoftnet.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:3484

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Microsoftnet.exe

    Filesize

    18KB

    MD5

    ddaa9ac21ce4316190e2a8780f9aa4d2

    SHA1

    0721e72c05adf6eae41d1af7fb4a47463a7a2202

    SHA256

    5daea85cf593f2bae2877b407bb1f774f030a70fd4f28167e1accea350176960

    SHA512

    17b74eda39863bf4738275b6b2df7429f6bbf0cbc43445f19e3dfd2cfa8e78907e33d39fdf5dee0652cf9676e0bb05889a05ae9c5dffa787012da6ba25594d1d

  • C:\Users\Admin\AppData\Local\Temp\RSBots_Auth_Gen.exe

    Filesize

    332KB

    MD5

    8f22bc0e8e470eaa5db321104a3b57d8

    SHA1

    084589806236369e72d2a73d92efb6aec0fb6b7a

    SHA256

    647740f31ff7cb91213c330a98f1edf0cdcdb5b0268a0bdeac99e9c0153b8e88

    SHA512

    b1b553851016bbecbe98e73d8941156365baf6f899460851d20a41287160a0035eddf90dff65a3c24d4a368db81f15b98e874a7e06cb6d2ae631ae3fc3341437

  • C:\Users\Admin\AppData\Local\Temp\RsBotAuthGenv1.6.exe

    Filesize

    182KB

    MD5

    88842b5508bfbb6a6c580380d87b0541

    SHA1

    a1e7bf9e2e6ac4756c13c1dce61b89475d97e237

    SHA256

    9491638673574e4eb1b6dc4e29484c89ff107948afaaf47c17464881c73c8917

    SHA512

    18c884eabed1a3fbc52007f73ba0a0b8f684d37f40e2f150cbd59d87d75250fe5df91c2e2cf4fcd73fba2f81d6ad5b8089e34a2b66e0445b203c3224392d5d9a

  • memory/3248-6-0x000000001B870000-0x000000001B878000-memory.dmp

    Filesize

    32KB

  • memory/3248-4-0x000000001BF30000-0x000000001C3FE000-memory.dmp

    Filesize

    4.8MB

  • memory/3248-5-0x000000001C4F0000-0x000000001C58C000-memory.dmp

    Filesize

    624KB

  • memory/3248-36-0x00007FFCB2B90000-0x00007FFCB3531000-memory.dmp

    Filesize

    9.6MB

  • memory/3248-7-0x000000001C650000-0x000000001C69C000-memory.dmp

    Filesize

    304KB

  • memory/3248-8-0x000000001B8D0000-0x000000001B8D6000-memory.dmp

    Filesize

    24KB

  • memory/3248-12-0x00007FFCB2B90000-0x00007FFCB3531000-memory.dmp

    Filesize

    9.6MB

  • memory/3248-3-0x000000001B9B0000-0x000000001BA56000-memory.dmp

    Filesize

    664KB

  • memory/3248-2-0x00007FFCB2B90000-0x00007FFCB3531000-memory.dmp

    Filesize

    9.6MB

  • memory/3248-1-0x00007FFCB2B90000-0x00007FFCB3531000-memory.dmp

    Filesize

    9.6MB

  • memory/3248-0-0x00007FFCB2E45000-0x00007FFCB2E46000-memory.dmp

    Filesize

    4KB

  • memory/4576-41-0x00007FFCB2B90000-0x00007FFCB3531000-memory.dmp

    Filesize

    9.6MB

  • memory/4576-39-0x00007FFCB2B90000-0x00007FFCB3531000-memory.dmp

    Filesize

    9.6MB

  • memory/4576-40-0x00007FFCB2B90000-0x00007FFCB3531000-memory.dmp

    Filesize

    9.6MB

  • memory/4576-42-0x000000001CF20000-0x000000001CF82000-memory.dmp

    Filesize

    392KB

  • memory/4576-43-0x000000001B9A0000-0x000000001B9AC000-memory.dmp

    Filesize

    48KB

  • memory/4576-44-0x000000001FDD0000-0x00000000200DE000-memory.dmp

    Filesize

    3.1MB

  • memory/4576-52-0x00007FFCB2B90000-0x00007FFCB3531000-memory.dmp

    Filesize

    9.6MB

  • memory/5044-38-0x00007FFCB2B90000-0x00007FFCB3531000-memory.dmp

    Filesize

    9.6MB

  • memory/5044-37-0x00007FFCB2B90000-0x00007FFCB3531000-memory.dmp

    Filesize

    9.6MB

  • memory/5044-35-0x00007FFCB2B90000-0x00007FFCB3531000-memory.dmp

    Filesize

    9.6MB

  • memory/5044-51-0x00007FFCB2B90000-0x00007FFCB3531000-memory.dmp

    Filesize

    9.6MB