Analysis

  • max time kernel
    147s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    16-07-2024 07:03

General

  • Target

    4d41ec98a7dfcecb0661d2a9cbb403b9_JaffaCakes118.exe

  • Size

    11KB

  • MD5

    4d41ec98a7dfcecb0661d2a9cbb403b9

  • SHA1

    2371d1e5927c79a1ce5c00e938cd815b448efd28

  • SHA256

    62a7c9b00cef1bbcacc170ffcb9fa55e78aaf77784c8f56fbaef5aa28a2932c0

  • SHA512

    89edf06717224e58689c3f33c16403bbf888e800cb5734e91170bc6fb1f55f792f6b8c0a3287ed96f36df6ed21f79459a3f57fe4953aeb7d686f06738e972bf4

  • SSDEEP

    192:jejxz38hsuWqoQLbLpBgq/kVGl81oynM/2rL:joN56HHgq/kVGl81q/2r

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Modifies Internet Explorer start page 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4d41ec98a7dfcecb0661d2a9cbb403b9_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\4d41ec98a7dfcecb0661d2a9cbb403b9_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2416
    • C:\Users\Admin\AppData\Roaming\web2net.exe
      "C:\Users\Admin\AppData\Roaming\web2net.exe"
      2⤵
      • Executes dropped EXE
      • Modifies Internet Explorer start page
      PID:2536

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\x07tfuqf.default-release\prefs.js

    Filesize

    6KB

    MD5

    2642a415fd964feb06f367a30e0c70e8

    SHA1

    317855a62255e12f8d1bcff97658bb146064b5b0

    SHA256

    671c51fe599cc3e90452a0498d61cfa77d5dbf80f7e68ba1d711fc69dc6469c4

    SHA512

    2f8ae72d9c974da8a49b1fd9114b67e888e982af97c0894c6b2f0d3eaa98c7d33f4a2a94f29ff43c362a0902d2461dcd2618b71c8852831cc433732d44704f1d

  • \Users\Admin\AppData\Roaming\web2net.exe

    Filesize

    11KB

    MD5

    4d41ec98a7dfcecb0661d2a9cbb403b9

    SHA1

    2371d1e5927c79a1ce5c00e938cd815b448efd28

    SHA256

    62a7c9b00cef1bbcacc170ffcb9fa55e78aaf77784c8f56fbaef5aa28a2932c0

    SHA512

    89edf06717224e58689c3f33c16403bbf888e800cb5734e91170bc6fb1f55f792f6b8c0a3287ed96f36df6ed21f79459a3f57fe4953aeb7d686f06738e972bf4