Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    19-07-2024 08:22

General

  • Target

    5b27a89f962e384cd7bb798926695a2a_JaffaCakes118.exe

  • Size

    162KB

  • MD5

    5b27a89f962e384cd7bb798926695a2a

  • SHA1

    0c4cc56dce28ab4514987c895bb1c884a07ab057

  • SHA256

    f3513be9dbcf5541e427f849e6aedb0e6f9fb565f46189829396efd9a2196d69

  • SHA512

    4d491302ac7a2d07885fdb0902202e5d46ba2b44745c36a92a4cf1074fc28de179899f36d40f33d0b96372f5e606cc73170cd5b93ada6b79724148018d070f88

  • SSDEEP

    3072:fND/Plo5V903cbe3H/dpZ5yooZa3+vCACI4H+r0Ev38VBKlfts:ftP+5V3e3frvy6Hc8rcfa

Malware Config

Signatures

  • ElysiumStealer

    ElysiumStealer (previously known as ZeromaxStealer) is an info stealer that can steal login credentials for various accounts.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5b27a89f962e384cd7bb798926695a2a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\5b27a89f962e384cd7bb798926695a2a_JaffaCakes118.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2332
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2332 -s 1660
      2⤵
      • Program crash
      PID:2548

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\59\C45D4E782B668A74F67ED21C3D728E94.txt

    Filesize

    92KB

    MD5

    a58d87b023e155c10b4e15fdfc6fcb06

    SHA1

    0ee449b782aeac54c0406adde543f19ecd9dfd38

    SHA256

    331b040f0bd7731b64e72a837ad86943379ff02e239c305d200108fe7e3c8c61

    SHA512

    1965574101a71a640efb135a49c4a968fd5feb328779c33936047afb2209424b44fba3a1ccdacee959ce5a016f22b49c8b42dc543476b11f83df0feb1b080eae

  • memory/2332-0-0x00000000741CE000-0x00000000741CF000-memory.dmp

    Filesize

    4KB

  • memory/2332-1-0x0000000000050000-0x000000000007E000-memory.dmp

    Filesize

    184KB

  • memory/2332-2-0x0000000000310000-0x0000000000316000-memory.dmp

    Filesize

    24KB

  • memory/2332-3-0x00000000741C0000-0x00000000748AE000-memory.dmp

    Filesize

    6.9MB

  • memory/2332-4-0x00000000741C0000-0x00000000748AE000-memory.dmp

    Filesize

    6.9MB

  • memory/2332-5-0x00000000003D0000-0x0000000000408000-memory.dmp

    Filesize

    224KB

  • memory/2332-6-0x0000000000380000-0x0000000000386000-memory.dmp

    Filesize

    24KB

  • memory/2332-22-0x00000000741CE000-0x00000000741CF000-memory.dmp

    Filesize

    4KB

  • memory/2332-23-0x00000000741C0000-0x00000000748AE000-memory.dmp

    Filesize

    6.9MB