Analysis

  • max time kernel
    92s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/07/2024, 07:01

General

  • Target

    4d409d611ca90a0e21c61a3d12b515e6_JaffaCakes118.exe

  • Size

    64KB

  • MD5

    4d409d611ca90a0e21c61a3d12b515e6

  • SHA1

    c193323b8f298a3e52216eecc71012ec353b47ab

  • SHA256

    d666ade26b0209f3167ea362bb13d59f500a217e0a900149dba59c4dedb21ffd

  • SHA512

    f91bbed51541195c90b3c73e0707e4138e0f0d35bbe827f187aff78520f5296ae1cee167daba254fd086b1c7f8754157ba3763f7fbc5fc125d3afc47d3ba8e90

  • SSDEEP

    1536:vlsUSV6MgDmmT0y//zxFZ3pE3C8lpzKwOw/UHHiauOWnqhk:vlsPgDmmT0ix1pyhUHCatWqh

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 6 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4d409d611ca90a0e21c61a3d12b515e6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\4d409d611ca90a0e21c61a3d12b515e6_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1196
    • C:\Windows\outlook.exe
      C:\Windows\outlook.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      PID:3896
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3896 -s 30460
        3⤵
        • Program crash
        PID:1856
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 200 -p 3896 -ip 3896
    1⤵
      PID:2784

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\outlook.cfg

            Filesize

            295B

            MD5

            c19aad2e5b26747970fbe045bf6beba4

            SHA1

            7bbec1f5c6536fa159238746e23b9d703f155217

            SHA256

            3a232c9dfcaa3967bb58aeedfa7ac948b50f79457dc24ce5e26fe7d27accb4a5

            SHA512

            8be1a2b34277db2a47a51b25e1a23d94ba48fab98cbcc554b11e7f928c0c6b2e4b3fc8706e3ecd094bdb3d7bc51a2760a65e839e25ee84fb97d1de052962d1cd

          • C:\Windows\outlook.cfg

            Filesize

            733B

            MD5

            52c35cb11194f7b701534d66cb84b2dd

            SHA1

            9aca9cc891759e56aa26bbcfe56e76975bd772b2

            SHA256

            1f172f1e246a4dae770e0eb83b231b463e9ecac2368aefcc4aa09e2c8ae1c850

            SHA512

            33253e32dcbbf8bf735ff65825698a8a76fd88f6565b3948fd2a1f6da329bc25e9b7935123c7a38497d1a4e47c6deca3c7f72c6d614b33b82d1e28a584f8cba1

          • C:\Windows\outlook.cfg

            Filesize

            1KB

            MD5

            9a57c8be93d9e7f8db2b6dc36483b3ed

            SHA1

            39bc288951d1842e3b04af8c68af8b67cd2659be

            SHA256

            b0a57b55c0db9c8203ab65297b2f133b0ef4fca92891201b1c94c96eba651cb3

            SHA512

            78cbf6fefa7585e9ae92f4376a4f052c6d0bcf26ccd93176af9b6b25d39c4ce967f62bd2dcf74fb7aa1b6f93e976439e61690300c2909e8b5f84d32077d963b2

          • C:\Windows\outlook.exe

            Filesize

            49KB

            MD5

            0e9379e357aba95f8b9883af9b67675e

            SHA1

            280a174a414e5b8588f42b6328af2c8c8ff4394f

            SHA256

            96b9c4ead67d03eb2c69103a983274e013e3466e80d8f95bd7cf3aea8be05b28

            SHA512

            6cc383806882729cd889b025802ac0d5e1c55a74b3e7d7c98932644e8802fe52b5b14a886eff70ab7deaa70fb60bb9898e55b5cd83b5b99e2a2d107dce367784

          • memory/1196-0-0x0000000000400000-0x000000000040C000-memory.dmp

            Filesize

            48KB

          • memory/1196-25-0x0000000000400000-0x000000000040C000-memory.dmp

            Filesize

            48KB

          • memory/3896-112-0x0000000000400000-0x000000000047E000-memory.dmp

            Filesize

            504KB

          • memory/3896-127-0x0000000000400000-0x000000000047E000-memory.dmp

            Filesize

            504KB