Analysis

  • max time kernel
    150s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    22-07-2024 13:30

General

  • Target

    635bfdccf002f785c92933cf85f7e979_JaffaCakes118.exe

  • Size

    2.5MB

  • MD5

    635bfdccf002f785c92933cf85f7e979

  • SHA1

    fec331ce9cedd62da59a9e6be0ab186454afad07

  • SHA256

    fe849bb79af03df6d283c756eb299b8dedb4ce03b2dccba69b868acec512999d

  • SHA512

    bcce76b6035b1c7769bedbde2d64caf0b235b48b97732152a482847cbcc833d6d60d0ad9f9fdd8ca4cd8f9476156cc83e812e879fa0a5a5d7512f54698fa5d4c

  • SSDEEP

    49152:Or/GJ4z+MMUMNVewEhi3QUA0JM3gGX9y0Q8SfgngFLuh3eDumu+lVb:u+J4VMUMNVewEYNA0JM3VCTfxmeqmu+

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 9 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\635bfdccf002f785c92933cf85f7e979_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\635bfdccf002f785c92933cf85f7e979_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2296
    • C:\Users\Admin\AppData\Local\Temp\_2BD1.tmpac7d.exe
      "C:\Users\Admin\AppData\Local\Temp\_2BD1.tmpac7d.exe" -p"04:29 AM" -y -o"C:\Users\Admin\AppData\Roaming\AntiVirus AntiSpyware 2011"
      2⤵
      • Executes dropped EXE
      PID:2328
    • C:\Users\Admin\AppData\Roaming\AntiVirus AntiSpyware 2011\AntiVirus AntiSpyware.exe
      "C:\Users\Admin\AppData\Roaming\AntiVirus AntiSpyware 2011\AntiVirus AntiSpyware.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:2616
    • C:\Users\Admin\AppData\Roaming\AntiVirus AntiSpyware 2011\securitymanager.exe
      "C:\Users\Admin\AppData\Roaming\AntiVirus AntiSpyware 2011\securitymanager.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in System32 directory
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1948
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /C dir "C:\Users\Admin\AppData\Roaming"
      2⤵
        PID:2760
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /C dir "C:\Users\Admin\AppData\Roaming\AntiVirus AntiSpyware 2011"
        2⤵
          PID:928

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\AntiVirus AntiSpyware 2011\AntiVirus AntiSpyware.exe

        Filesize

        2.5MB

        MD5

        d1d2a467c3fd107c6dc52c51ee73463d

        SHA1

        ed64a4ab40efb083a8288c05d79b91c070d3cdf7

        SHA256

        aa2b7fe559a91eab2933ce9f60a3bb1a9e698f963e704bf2377b15ea3b61dfa8

        SHA512

        678b7044fcb7753e16b4d8772c5d487f6d04814fbc2e6028b3cf0702b4e4ffd32bd6553fe40b9ee503534f550d16cfabebd8a99bd7391e1db9c0f3a310853d0c

      • C:\Users\Admin\AppData\Roaming\AntiVirus AntiSpyware 2011\securitymanager.exe

        Filesize

        91KB

        MD5

        e9ac09a581cca66a88fb5e5081dfaca8

        SHA1

        42904bf53a6124fe387a260ab9ec6b79abbca23a

        SHA256

        2b856362dc40436b16ea53b8d620e4510dd172f70d68271cd94ef70608926e3c

        SHA512

        bf85cfd493142800e50204b8909e292a2fe56dc9f85ac399cbd90be4fb2755fd559dcc727a6e11eebea5a1b1fd534d56f8fb4bb10c712ccc856636565d6b772c

      • \Users\Admin\AppData\Local\Temp\_2BD1.tmpac7d.exe

        Filesize

        1.8MB

        MD5

        619b9d8ccf99fb4161805ec1e348e141

        SHA1

        678b9519b1583f2941d0f9717567785b951f88c4

        SHA256

        b9f5b076e983f983b5874fdbb95a3f876a1af6e2df252573c667132f5e71a7e1

        SHA512

        3ae2c6f382d50357199594254f5e007be83365882eff007f5561067e818203417c8b9a0dee39b4d9750882fa09c3e2949123b1dc7b4af01820498866eb2b7813

      • memory/1948-42-0x0000000000440000-0x000000000047C000-memory.dmp

        Filesize

        240KB

      • memory/1948-45-0x0000000000400000-0x000000000043C000-memory.dmp

        Filesize

        240KB

      • memory/2296-46-0x0000000000400000-0x0000000000D66000-memory.dmp

        Filesize

        9.4MB

      • memory/2296-0-0x00000000026A0000-0x0000000003006000-memory.dmp

        Filesize

        9.4MB

      • memory/2296-2-0x0000000000400000-0x0000000000D66000-memory.dmp

        Filesize

        9.4MB

      • memory/2296-56-0x0000000000400000-0x0000000000D66000-memory.dmp

        Filesize

        9.4MB

      • memory/2296-43-0x0000000000400000-0x0000000000D66000-memory.dmp

        Filesize

        9.4MB

      • memory/2296-1-0x0000000000400000-0x0000000000D66000-memory.dmp

        Filesize

        9.4MB

      • memory/2616-48-0x0000000000400000-0x0000000001B04000-memory.dmp

        Filesize

        23.0MB

      • memory/2616-64-0x0000000000400000-0x0000000001B04000-memory.dmp

        Filesize

        23.0MB

      • memory/2616-51-0x0000000000400000-0x0000000001B04000-memory.dmp

        Filesize

        23.0MB

      • memory/2616-54-0x0000000000400000-0x0000000001B04000-memory.dmp

        Filesize

        23.0MB

      • memory/2616-40-0x0000000003420000-0x0000000004B24000-memory.dmp

        Filesize

        23.0MB

      • memory/2616-57-0x0000000000400000-0x0000000001B04000-memory.dmp

        Filesize

        23.0MB

      • memory/2616-61-0x0000000000400000-0x0000000001B04000-memory.dmp

        Filesize

        23.0MB

      • memory/2616-44-0x0000000000400000-0x0000000001B04000-memory.dmp

        Filesize

        23.0MB

      • memory/2616-67-0x0000000000400000-0x0000000001B04000-memory.dmp

        Filesize

        23.0MB

      • memory/2616-70-0x0000000000400000-0x0000000001B04000-memory.dmp

        Filesize

        23.0MB

      • memory/2616-73-0x0000000000400000-0x0000000001B04000-memory.dmp

        Filesize

        23.0MB

      • memory/2616-76-0x0000000000400000-0x0000000001B04000-memory.dmp

        Filesize

        23.0MB

      • memory/2616-79-0x0000000000400000-0x0000000001B04000-memory.dmp

        Filesize

        23.0MB

      • memory/2616-82-0x0000000000400000-0x0000000001B04000-memory.dmp

        Filesize

        23.0MB

      • memory/2616-85-0x0000000000400000-0x0000000001B04000-memory.dmp

        Filesize

        23.0MB