Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/08/2024, 04:06

General

  • Target

    8d3faa99b533520fb516b86d2aa4a7df_JaffaCakes118.exe

  • Size

    3.4MB

  • MD5

    8d3faa99b533520fb516b86d2aa4a7df

  • SHA1

    2cd0c04f4b3b8297e6b6d9e25498aa47d1f4fd02

  • SHA256

    5b327c541d95c2828a5509a381d20e9de69ab3da3e13d247dc6c3a941411aee3

  • SHA512

    cd551eaf3d98e5f797b2225854eff2368b8c6f3e539036c5a37b2acb04cee7714c5b68590575261370f8ac64c79151ba98543b8cc9193237d30b1d79c6deb71b

  • SSDEEP

    24576:PoH9mrnEQIh3Qh3OTZriEu8CkB06lVYtjbTpmWFb5DBk:PoFQC6mZq8J2OVijbTpTdO

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8d3faa99b533520fb516b86d2aa4a7df_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8d3faa99b533520fb516b86d2aa4a7df_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1924
    • C:\Windows\CTS.exe
      "C:\Windows\CTS.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:3672

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\excel.exe_Rules.xml

          Filesize

          3.8MB

          MD5

          7ef200bf2b216f45822a25387d23689a

          SHA1

          2fa321d415fba8a2fbeb8a92deba72ac43993095

          SHA256

          189968d61049bb04f6048f5a2f66cde506c66d3bdaea5e3e97f75af23f3d8680

          SHA512

          52865fbe7f423384b9d9fb808ce225c3cbbc44e012abf4c0954cfba31ee2e5bdfd624441b1a2d13243532c75f857d311b3596e5792a2bb51e605d5d363c7364b

        • C:\Users\Admin\AppData\Local\Temp\JFJxj96uGRo7AKQ.exe

          Filesize

          3.4MB

          MD5

          d6c0d46e7797ed375baa150f334a8169

          SHA1

          ba4faccb6510f0cabc1175506e9e389ab96022d9

          SHA256

          cf0b1fdbd48e71f7fd38dd30dfd09dbf2858164e1a8afe8d0ae6e2edccbe6384

          SHA512

          63be9a808eceb6117c07dc5c38183b81c103448c45983e04202535a35450921e74a579ccfec30b6db34b2155935bb06e8b1ca9c8e46e0ce77cc0ed280a24365b

        • C:\Windows\CTS.exe

          Filesize

          3.4MB

          MD5

          950ad7a4202239f1642ffec873b254bc

          SHA1

          12c877a3bd0e6f5c77c40f41e98b41b54c695165

          SHA256

          dc5d5bda6e3e2df827356ac62c5dd77cd0e5e4a228372cbd530da0dc8ba3be9f

          SHA512

          0ce5544de274d393f1b8c2a8ec26c3c32b1b099d8984b312eb3c96b607f211e3bb58199979b9448c95b2c3764fbe1506ca7daa3dadee7d95220d0093f2682d44

        • memory/1924-0-0x0000000000440000-0x00000000007D5000-memory.dmp

          Filesize

          3.6MB

        • memory/1924-9-0x0000000000440000-0x00000000007D5000-memory.dmp

          Filesize

          3.6MB

        • memory/1924-8-0x0000000000440000-0x00000000007D5000-memory.dmp

          Filesize

          3.6MB

        • memory/3672-10-0x0000000000490000-0x0000000000825000-memory.dmp

          Filesize

          3.6MB

        • memory/3672-35-0x0000000000490000-0x0000000000825000-memory.dmp

          Filesize

          3.6MB