Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/07/2024, 08:30

General

  • Target

    3ca92ae7617a7aa37a7c9d09a501c732_JaffaCakes118.exe

  • Size

    368KB

  • MD5

    3ca92ae7617a7aa37a7c9d09a501c732

  • SHA1

    f5a1801e5fc2d5e962bb6d915801d68bbb611a41

  • SHA256

    827af611722213ebbc81a95e750d31eb9746d457243d4e5598ef040a09aacaee

  • SHA512

    38835a0c23439bd004fb25ef86e57edacf99e90873b5ec765acb2a05cfae4090af752954569cceb06b52cc7f1d40e663ff42433f8c8a5d00134fa95d5bfcb366

  • SSDEEP

    3072:RSrFhsP2MQK4v2oPl6VA6rAHBr9uu3q6FDvZuHlYq99oc:crFyP7QR6aSAR9uanFDvZy9h

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 44 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3ca92ae7617a7aa37a7c9d09a501c732_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3ca92ae7617a7aa37a7c9d09a501c732_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:4916
    • C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\qomicz.exe
      "C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\qomicz.exe" qomiczwqy.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:1120
      • C:\Program Files\dotnet\shared\FSURMD.exe
        "C:\Program Files\dotnet\shared\FSURMD.exe" C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\qomicz.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Adds Run key to start application
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:3520
        • C:\Program Files\Common Files\microsoft shared\ink\qazbqda.exe
          "C:\Program Files\Common Files\microsoft shared\ink\qazbqda.exe" C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\qomicz.exe
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Suspicious use of WriteProcessMemory
          PID:2480
          • C:\Documents and Settings\lcvyokzy.exe
            "C:\Documents and Settings\lcvyokzy.exe" C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\qomicz.exe
            5⤵
            • Executes dropped EXE
            • Enumerates connected drives
            PID:4196
          • C:\Program Files\7-Zip\Lang\gikbx.exe
            "C:\Program Files\7-Zip\Lang\gikbx.exe" C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\qomicz.exe
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:216
            • C:\PerfLogs\azdyacaj.exe
              "C:\PerfLogs\azdyacaj.exe" C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\qomicz.exe
              6⤵
              • Executes dropped EXE
              PID:4488

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files\dotnet\shared\FSURMD.exe

          Filesize

          208KB

          MD5

          2e506d1f4abd683ddb80ecf058e6fd21

          SHA1

          71786e7ac2f3c537f5aafec752ee7336964692d0

          SHA256

          ad49d1ca06292b1635211bdd33b76d8c4a89f35e07689f5ae4676a90343055d6

          SHA512

          3c45507f7e44ebe875458746e26211acce5afdb31e8e5b3ce7329ba1e046834714d041523cac6de58e6cbcf9068e8b43de93d841b470eb8e9927608c072272c8

        • C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\qomicz.exe

          Filesize

          368KB

          MD5

          3ca92ae7617a7aa37a7c9d09a501c732

          SHA1

          f5a1801e5fc2d5e962bb6d915801d68bbb611a41

          SHA256

          827af611722213ebbc81a95e750d31eb9746d457243d4e5598ef040a09aacaee

          SHA512

          38835a0c23439bd004fb25ef86e57edacf99e90873b5ec765acb2a05cfae4090af752954569cceb06b52cc7f1d40e663ff42433f8c8a5d00134fa95d5bfcb366