Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    18/08/2024, 23:34

General

  • Target

    a8aec689cf6aae0e648435068829c7fe_JaffaCakes118.exe

  • Size

    23.5MB

  • MD5

    a8aec689cf6aae0e648435068829c7fe

  • SHA1

    7b1d56e86a26e49ce311ef2aab4deb56def23aba

  • SHA256

    7a5394bade4582b9826a436abfe3bc3233a8e857146a28fd70539da8c5450924

  • SHA512

    790e6b60f583764c4b30ac492a5098026bad46b4edc34c3c0fc0aadafa1f8b67687636f994af2d06b0dc756020311b74dc97e7aaa07bd0ae4606e339bda1cfe9

  • SSDEEP

    49152:XYgph7GBfWiHaqCGXDkYOMwwnMb4PmyVhV:XX77GBfWr1GIYOXwnS4rVhV

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a8aec689cf6aae0e648435068829c7fe_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a8aec689cf6aae0e648435068829c7fe_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2956
    • C:\Program Files\Internet Explorer\IEXPLORE.exe
      "C:\Program Files\Internet Explorer\IEXPLORE" 212.33.237.86/images/1/report.php
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3004
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3004 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1568

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\ose.exe

          Filesize

          23.6MB

          MD5

          da8387dd72c077bb567e636a1e9968c9

          SHA1

          3e705eec3c72ff4711c828485ef6d25b115147ab

          SHA256

          137ea1aa3f6fb64f49779de8602a8c8c9e5069756fe40ac7dcb9726e26f471f6

          SHA512

          dbb598e6e7b9bcdf59dcdb8be3de2dcc443122ba16abd8c2f1ddc70fc70111c3e7062ac9b8bd0d3e2600fb89ac3191e6113acef28f79ca974e062ee3c121636f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          8de94e1e2f00cee316709b7d89c297cc

          SHA1

          7e7d899979bfb3ab2fa67e977955a68a6018141a

          SHA256

          716312306483eeadfe1fa901f32ad97f679f0bf791e68917377aef9166207857

          SHA512

          78e76d13c842f693ec61f78baeff66d9bdaaf61c925c6681b88b1a43aec4a19dc62279ca1505470d912ffe2238cb28fdaa4aab6c57bf04eb1a5bd568139b12f6

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          05fccb705f89d887de472fa39bfa0170

          SHA1

          b3665bfe153bd0f899974815a0cc0065c752413e

          SHA256

          4f36d830eeddaf2b2c376504514f98269b8f739f64d9b1fafe121510977f0506

          SHA512

          f3684c8815a4850999ff6d0426f68c0b4025bc8042e0ac5d652fbe10e4fe97000c55dad2e6810ca7039116978b269fdf9443725ab1e584472b9ab4c366f13534

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          641e92c05a4542d95b2a8410ab31c025

          SHA1

          cdc12642a6c795263897b3eee5a86070ff75d479

          SHA256

          ce35371b02618ef4d85b47dc41a8f05e229987164d7a052ae69f7e5a5a485a72

          SHA512

          6650251cae3f3096f899a2d1bf877c9e037e45fecdb91d191d62668a6b15530e21cd5af3ccaa8929e72982cf34aa7e5a2c7ab70ca8d7fa5181cbc356adf9e48a

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          a64b161d28ef65bf1a05042de8e49f13

          SHA1

          a6e9d430074263c2c4638a3bd6c0f73ab473c01b

          SHA256

          12e3cf741241b24eb466c3c23ed59d4248d46934725e898641892fa49a5a5d92

          SHA512

          dc5ee446dd9bc0898c6010a414bb3474a895c753c7fd35b12c77bff9ca9b8745272a2ddbd52eead63fdd04b47b5c33181f644b52e3ffc5c722489a1891950e82

        • C:\Users\Admin\AppData\Local\Temp\Cab14FA.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\Tar172F.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b