Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    22/07/2024, 11:15

General

  • Target

    63029abb34705b24094a4cd0723515d4_JaffaCakes118.exe

  • Size

    117KB

  • MD5

    63029abb34705b24094a4cd0723515d4

  • SHA1

    2219e1a07e942ea8a7cf50413703f8c073aff7bc

  • SHA256

    98742647dbdf4d6a9e0451b3b3d5f773907aba13e15385e0c2a92a7bacd86a72

  • SHA512

    4a7ae8e2415b761bf25d109041bfb72544078bab1fac829e95872c6716884e1838a55fb8f4356b4c9db38d1dbf65c96022c40539257ae66afc7abedb1d855ded

  • SSDEEP

    1536:ocNjQlsWjcd+xzl7SM+Gn824eo6KcR4mjD9r823Fp:bjr87S7Gnzbo6KcWmjRrz3D

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\63029abb34705b24094a4cd0723515d4_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\63029abb34705b24094a4cd0723515d4_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2436
    • C:\Windows\CTS.exe
      "C:\Windows\CTS.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:3004

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Q5zmBbdFkHeVuQY.exe

    Filesize

    117KB

    MD5

    b7c7a8b223b6f9d280cc60a060fe3ff7

    SHA1

    af639c33b685cd3526356f6873cd484124b21efa

    SHA256

    cf10dd830d98428f2a97bd564f10165981750fbd22207cfde8d9a18729e343bc

    SHA512

    3459df0c58679cecffb766681836e027d65cb0cadb149e2bb485d8004860f892f3af136233ab4eccde8707f6297a740063f5d14d6ca187dd772c58dd3e249261

  • C:\Windows\CTS.exe

    Filesize

    117KB

    MD5

    90560322e00c64a66ef2099f55ff1f09

    SHA1

    1404109a21e4656daa9dc570c32e6385b6634344

    SHA256

    69346cf100b44fce4b64c433efc47601922b255c5d4182f4ecf1fcff1ca05bf4

    SHA512

    164e6e7654b55727940b212d56df47043f11e612b04cdfbc4c33ad455bbb5b1cece3882acc944cd526f3c5dcd519bcd1d01a3d796e95902bfc680f51dfe74f61

  • memory/2436-1-0x0000000000180000-0x0000000000197000-memory.dmp

    Filesize

    92KB

  • memory/2436-8-0x0000000000180000-0x0000000000197000-memory.dmp

    Filesize

    92KB

  • memory/3004-11-0x0000000000E90000-0x0000000000EA7000-memory.dmp

    Filesize

    92KB