Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/07/2024, 00:08

General

  • Target

    6982b0191416b6be6584a2cb53158574_JaffaCakes118.exe

  • Size

    892KB

  • MD5

    6982b0191416b6be6584a2cb53158574

  • SHA1

    924ecd1043bf02291a670b830805a6f7910ad8f5

  • SHA256

    bce82a270ca6b98cdac10128f97283190c464590e76720095f20fa58d9bc0604

  • SHA512

    66289c09adea086d59c189e4ac82293291e38cecf76d26c90bf75244fe1591269e94d67c8c93c4f951c9a7e8a65b694e848ec2569e7ccc1866eb8083f0d4feaa

  • SSDEEP

    24576:6dzEvjt7DbxoW5znPKUdroB5gmvzCCCCCCCCCCCCC+UcAAvw4eY0S0+CCCCCCCCI:5VoW5znPKUdroB5gmvzCCCCCCCCCCCCK

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 27 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6982b0191416b6be6584a2cb53158574_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\6982b0191416b6be6584a2cb53158574_JaffaCakes118.exe"
    1⤵
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:3968
  • C:\Windows\servicing\TrustedInstaller.exe
    C:\Windows\servicing\TrustedInstaller.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    PID:372

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

    Filesize

    527KB

    MD5

    8e55b964fa5da1d91d4be03a2b506e1c

    SHA1

    a959abb081aa1d9628600fabf410955723e547d1

    SHA256

    4afad22c035b869008fc098c7e708f853e7f451fa05d3739b1ee2ac4f098c8c7

    SHA512

    ec648964ee48c3a337f3b7ce019ab49b8fb81bd753a2ead6451d8cc759cb8783767945773358d300bb3dcc9464ad14203d3761f9fc87ead6b329c66a481e3e38

  • C:\Windows\SysWOW64\msiexec.vir

    Filesize

    162KB

    MD5

    e7942ca04ecd64c0ddb18e324da373dd

    SHA1

    2169e45cd70bcd34400387d69c633dc08a3d1bd2

    SHA256

    b8d6663242b22ba2247f2af85150c7cf7893a8d0c7a94aacb1a1c8a9f39fa186

    SHA512

    9d1185723a3e7ec0a7ea96eed48851076bc5a75a85a407d648e23aac6ba6bd16239b919bcae66300c79f4923981710179a629d15141468aae434c36fa9d33854

  • C:\Windows\servicing\TrustedInstaller.exe

    Filesize

    193KB

    MD5

    805418acd5280e97074bdadca4d95195

    SHA1

    a69e4f03d775a7a0cc5ed2d5569cbfbb4d31d2d6

    SHA256

    73684e31ad4afe3fdc525b51ccaacc14d402c92db9c42e3fcbfe1e65524b1c01

    SHA512

    630a255950c0ae0983ae907d20326adea36ce262c7784428a0811b04726849c929bc9cea338a89e77447a6cec30b0889694158327c002566d3cf5be2bb88e4de

  • memory/3968-0-0x0000000000400000-0x0000000000504000-memory.dmp

    Filesize

    1.0MB