Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-07-2024 14:50

General

  • Target

    4ece9e1e721cd7dc5a270b3cf7d1f083_JaffaCakes118.exe

  • Size

    696KB

  • MD5

    4ece9e1e721cd7dc5a270b3cf7d1f083

  • SHA1

    a863b9cb0531deee7e356f2534a39723b5ee929b

  • SHA256

    ec10f4e43d71e5d52862f7d11af464316b4301254f62fedfba385a097923ffa4

  • SHA512

    8560755a71bb652cad90839b85d5f6f8d63984b1e5e8a887ec55d38a206451fb6c639aafd6cc4f904b776081b9c940800c3100125dbfcdd65c7e1fda4d3c14be

  • SSDEEP

    12288:3m1+jgi2aZFMZj7Kexe2f27HjUtbnbKEFsB61a9tNMbFynKNJDzGGpZJD:yxqZaZjWy2Utbusd1a9tObFynKHGG1

Malware Config

Signatures

  • ISR Stealer

    ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

  • ISR Stealer payload 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4ece9e1e721cd7dc5a270b3cf7d1f083_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\4ece9e1e721cd7dc5a270b3cf7d1f083_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4820
    • C:\Users\Admin\AppData\Local\Temp\chronic-16-12.exe
      "C:\Users\Admin\AppData\Local\Temp\chronic-16-12.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:3408
      • C:\Windows\SysWOW64\svchost.exe
        "C:\Windows\system32\svchost.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:1588
    • C:\Users\Admin\AppData\Local\Temp\SnDk&p.exe
      "C:\Users\Admin\AppData\Local\Temp\SnDk&p.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      PID:2120
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x300 0x328
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4832

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\SnDk&p.exe

    Filesize

    282KB

    MD5

    3e9b7b76b154342811a8dcc2b507c1ce

    SHA1

    2828b9bd9e3d65e578b51b049a2bf5d4f2aef182

    SHA256

    16ff4927174e13d3bfa6da64956c8fb50a6087fba07b26234d0a4bfcdbaff729

    SHA512

    b6aa6f304d5976ab4b9330fcff39c3c04e38c900500d020a3bb5eb7dc86036fe5b0c4d5acbf838d1d8a0bbcffe384e44379bb552182fa15a5420641bc1738090

  • C:\Users\Admin\AppData\Local\Temp\chronic-16-12.exe

    Filesize

    224KB

    MD5

    e9448b0e4b0460577192295bde8324c1

    SHA1

    647bf34d64c913f41f74c13b431159f956eaa032

    SHA256

    f567a106a362584f89d672f36fe1651edd166f03e579c6d682e2ff222e73baa8

    SHA512

    5fdc74cdbc3c32a4ce5159ed234e4104eb15ecb2d8fdbb3968d58cbc2a9b378c920e6d40940f3eca231df236d142c8890553b2b43093eec4b36506f8d485a6c5

  • memory/1588-37-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/1588-35-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/2120-48-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/2120-50-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/2120-24-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/2120-58-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/2120-57-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/2120-56-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/2120-34-0x0000000002330000-0x0000000002331000-memory.dmp

    Filesize

    4KB

  • memory/2120-33-0x0000000002410000-0x0000000002411000-memory.dmp

    Filesize

    4KB

  • memory/2120-32-0x0000000002420000-0x0000000002421000-memory.dmp

    Filesize

    4KB

  • memory/2120-31-0x0000000002390000-0x0000000002391000-memory.dmp

    Filesize

    4KB

  • memory/2120-30-0x00000000023A0000-0x00000000023A1000-memory.dmp

    Filesize

    4KB

  • memory/2120-29-0x0000000002340000-0x0000000002341000-memory.dmp

    Filesize

    4KB

  • memory/2120-55-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/2120-54-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/2120-53-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/2120-43-0x00000000023C0000-0x00000000023C1000-memory.dmp

    Filesize

    4KB

  • memory/2120-42-0x00000000023B0000-0x00000000023B1000-memory.dmp

    Filesize

    4KB

  • memory/2120-52-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/2120-51-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/2120-49-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/2120-45-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/2120-46-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/2120-47-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/3408-44-0x0000000074C30000-0x00000000751E1000-memory.dmp

    Filesize

    5.7MB

  • memory/3408-39-0x0000000005BF0000-0x0000000005CF0000-memory.dmp

    Filesize

    1024KB

  • memory/3408-41-0x0000000005BF0000-0x0000000005CF0000-memory.dmp

    Filesize

    1024KB

  • memory/3408-28-0x0000000074C30000-0x00000000751E1000-memory.dmp

    Filesize

    5.7MB

  • memory/3408-27-0x0000000074C30000-0x00000000751E1000-memory.dmp

    Filesize

    5.7MB

  • memory/3408-25-0x0000000074C32000-0x0000000074C33000-memory.dmp

    Filesize

    4KB

  • memory/4820-0-0x00007FFB5BE15000-0x00007FFB5BE16000-memory.dmp

    Filesize

    4KB

  • memory/4820-4-0x00007FFB5BB60000-0x00007FFB5C501000-memory.dmp

    Filesize

    9.6MB

  • memory/4820-1-0x000000001B4F0000-0x000000001B596000-memory.dmp

    Filesize

    664KB

  • memory/4820-2-0x00007FFB5BB60000-0x00007FFB5C501000-memory.dmp

    Filesize

    9.6MB

  • memory/4820-26-0x00007FFB5BB60000-0x00007FFB5C501000-memory.dmp

    Filesize

    9.6MB