Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/07/2024, 02:22

General

  • Target

    5eab0dffc5c17bce13d167e556b0b5da_JaffaCakes118.exe

  • Size

    348KB

  • MD5

    5eab0dffc5c17bce13d167e556b0b5da

  • SHA1

    b0f7002e5d7ff7a65c3df353227031f18cdaa13a

  • SHA256

    f15d4e50aaefacc9ef3e349de66e751e327c7b72d115b33d392a5d29a995eebd

  • SHA512

    cf58f364fb646f9082de6847455f07884b9988f97492a149fe6ffdbcdc79304fbe1b57f2a23a3c142f283a697d95684951ad28c4eee8b7fe98243f760e9a2e9d

  • SSDEEP

    6144:ppMM8EV1kmffCpJip7WDBDRTUDsDvA8X9S1:URmfaXiE1DmITA8a

Malware Config

Signatures

  • Contacts a large (1178) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Modifies Internet Explorer settings 1 TTPs 37 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5eab0dffc5c17bce13d167e556b0b5da_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\5eab0dffc5c17bce13d167e556b0b5da_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2080
    • C:\Program Files\Internet Explorer\IEXPLORE.exe
      "C:\Program Files\Internet Explorer\IEXPLORE" 212.33.237.86/images/1/report.php
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:5072
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5072 CREDAT:17410 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1572

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files\7-Zip\7z.exe

          Filesize

          893KB

          MD5

          f025bcb2bfabdc85d80cf9fc498a212e

          SHA1

          9cf7ca989ef3e0e072d7bdb6e839f2c2ef6731d3

          SHA256

          ef2485440b9261c158b77719b59c9e8994ec276c94935e61670c1a31dbe50a1f

          SHA512

          01343f950acd93b0652c1c311241bba8026a6cba0e6b6421f0f4b59042a816e2bae6d6224b85575d62136f2696a80e22f6ede8d441fa8ddabff84b87af27e218

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          471B

          MD5

          22b9dbe680f4e0d81db5f64b3690eef6

          SHA1

          a1ab04a2fe8fcd962431b3202e61cb4127097c2a

          SHA256

          15bdcde215cc325d5745d5af509c7cce6199e10b13330e41e749275de6a0a15d

          SHA512

          6c40d8810a9ef52a552529b59d2a401c2ef3af1a57ddbf03d373168b14a76b26953499ae999b925d8847e9997b284b192ede8326e0b130e2ea62dd1b3c40ecf4

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          404B

          MD5

          fc50ee7251eaaf86d02d11adccd73cbf

          SHA1

          465ab18c5be10f11b189d40b695227d69f49207e

          SHA256

          7ccb4103aa88fbe9b1d08ca5de0826a7b56b5276f2cae8e58b40011f815d0450

          SHA512

          b1ac8a367756ac95e5814db769ba927ab23f8b2fffbdd4ee48c6cf0b106bc181a28801fddb87d2da9590eafc7b06eeea18547328aa52641ea8b7e7a64efce761

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\Q90VG4IN\suggestions[1].en-US

          Filesize

          17KB

          MD5

          5a34cb996293fde2cb7a4ac89587393a

          SHA1

          3c96c993500690d1a77873cd62bc639b3a10653f

          SHA256

          c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

          SHA512

          e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

        • memory/2080-0-0x0000000000400000-0x0000000000413000-memory.dmp

          Filesize

          76KB

        • memory/2080-8574-0x0000000000400000-0x0000000000413000-memory.dmp

          Filesize

          76KB