Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    11-08-2024 09:36

General

  • Target

    89df6152889fd5b561772d22e2171703_JaffaCakes118.exe

  • Size

    857KB

  • MD5

    89df6152889fd5b561772d22e2171703

  • SHA1

    9a1d4b24579a9cf6c9692d1d2595123c253ed24e

  • SHA256

    62a4aa6e6e0c4df7b32f8b4d6bd52eca1b98e0b9637ba3d437fbb77f413b6c4b

  • SHA512

    fc0abc93477b7dc34dac722e7e6a2bd02c307dc94428320a2673a2b4643a8865a0a71cfc12ddb3541873f31b060ac805446e2175ba421e3159c44cf031c23bb8

  • SSDEEP

    24576:lBy06cUfLdB5bapl/Zumq8qgGYPCQ0cBIUKw5vkKR:jy06rLdB5b0jq8qmpDBLH5

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of FindShellTrayWindow 9 IoCs
  • Suspicious use of SendNotifyMessage 9 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\89df6152889fd5b561772d22e2171703_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\89df6152889fd5b561772d22e2171703_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2672
    • C:\ProgramData\isecurity.exe
      C:\ProgramData\isecurity.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Enumerates connected drives
      • Writes to the Master Boot Record (MBR)
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:2788

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \ProgramData\isecurity.exe

    Filesize

    848KB

    MD5

    aa3d86e9412f666c757f8f863ce20cf2

    SHA1

    ef0033b6b4abc9d0238910e639d2bffa7ffff157

    SHA256

    fd6f51babe86c8b4b66907c5a2248ffe8f4cf2e2833c279f26fe3893ecae2ab1

    SHA512

    267d64575193453ba1bf1152f4030247140b562bc6ccfbc3b711db9a91c05d28d28f9231670855be92b8a98281d2a47c192548d9808f6243cfd2b5601b6f5f92

  • memory/2672-4-0x0000000000400000-0x0000000000507000-memory.dmp

    Filesize

    1.0MB

  • memory/2672-3-0x0000000000401000-0x0000000000403000-memory.dmp

    Filesize

    8KB

  • memory/2672-5-0x0000000000400000-0x0000000000507000-memory.dmp

    Filesize

    1.0MB

  • memory/2788-30-0x0000000000400000-0x0000000000A40000-memory.dmp

    Filesize

    6.2MB

  • memory/2788-34-0x0000000000400000-0x0000000000A40000-memory.dmp

    Filesize

    6.2MB

  • memory/2788-21-0x0000000000400000-0x0000000000A40000-memory.dmp

    Filesize

    6.2MB

  • memory/2788-24-0x0000000000400000-0x0000000000A40000-memory.dmp

    Filesize

    6.2MB

  • memory/2788-25-0x0000000000400000-0x0000000000A40000-memory.dmp

    Filesize

    6.2MB

  • memory/2788-27-0x0000000000400000-0x0000000000A40000-memory.dmp

    Filesize

    6.2MB

  • memory/2788-28-0x0000000000400000-0x0000000000A40000-memory.dmp

    Filesize

    6.2MB

  • memory/2788-29-0x0000000000400000-0x0000000000A40000-memory.dmp

    Filesize

    6.2MB

  • memory/2788-23-0x0000000000400000-0x0000000000A40000-memory.dmp

    Filesize

    6.2MB

  • memory/2788-31-0x0000000000400000-0x0000000000A40000-memory.dmp

    Filesize

    6.2MB

  • memory/2788-32-0x0000000000400000-0x0000000000A40000-memory.dmp

    Filesize

    6.2MB

  • memory/2788-22-0x0000000000400000-0x0000000000A40000-memory.dmp

    Filesize

    6.2MB

  • memory/2788-35-0x0000000000400000-0x0000000000A40000-memory.dmp

    Filesize

    6.2MB

  • memory/2788-36-0x0000000000400000-0x0000000000A40000-memory.dmp

    Filesize

    6.2MB

  • memory/2788-37-0x0000000000400000-0x0000000000A40000-memory.dmp

    Filesize

    6.2MB

  • memory/2788-38-0x0000000000400000-0x0000000000A40000-memory.dmp

    Filesize

    6.2MB

  • memory/2788-39-0x0000000000400000-0x0000000000A40000-memory.dmp

    Filesize

    6.2MB

  • memory/2788-40-0x0000000000400000-0x0000000000A40000-memory.dmp

    Filesize

    6.2MB

  • memory/2788-41-0x0000000000400000-0x0000000000A40000-memory.dmp

    Filesize

    6.2MB

  • memory/2788-42-0x0000000000400000-0x0000000000A40000-memory.dmp

    Filesize

    6.2MB

  • memory/2788-43-0x0000000000400000-0x0000000000A40000-memory.dmp

    Filesize

    6.2MB

  • memory/2788-44-0x0000000000400000-0x0000000000A40000-memory.dmp

    Filesize

    6.2MB

  • memory/2788-45-0x0000000000400000-0x0000000000A40000-memory.dmp

    Filesize

    6.2MB