Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    18/08/2024, 01:25

General

  • Target

    a4d8bde5ad011855502faba674c06787_JaffaCakes118.exe

  • Size

    268KB

  • MD5

    a4d8bde5ad011855502faba674c06787

  • SHA1

    7e46623f634daf3d0767d14d246cf4cd358783e3

  • SHA256

    c274040940d7569c7605ab79bb5612715fde118d29416750608e7c02a9ea6733

  • SHA512

    0699ffe7fdd4f975541109a44e27b62b17ddeaa3163a0e8138ba7ec4aa263d8cc2ba906e9ec53ef2bcd36cf04fb6f527635a5bf567c85219d62e3937b8c05887

  • SSDEEP

    3072:UitfJFBkJyqf9uXpGvRGqelQ1HIgfegAXQu88ptCFHQRl8ewJcJTcfnbJI4wP8L8:yB9qWRGiHI4AXQuSQn/SfCVPgezmqvV

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer Phishing Filter 1 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a4d8bde5ad011855502faba674c06787_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a4d8bde5ad011855502faba674c06787_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2232
    • C:\serverg.Bin\873D3F8AE56.exe
      "C:\serverg.Bin\873D3F8AE56.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2084
      • C:\Users\Admin\AppData\Local\Temp\fGXCF02.exe
        "C:\Users\Admin\AppData\Local\Temp\fGXCF02.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer Phishing Filter
        • Modifies Internet Explorer settings
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3040

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\fGXCF02.exe

    Filesize

    3KB

    MD5

    29090b6b4d6605a97ac760d06436ac2d

    SHA1

    d929d3389642e52bae5ad8512293c9c4d3e4fab5

    SHA256

    98a24f0caf5b578e230e6f1103a5fba6aecb28a9128cad5520fcde546d643272

    SHA512

    9121ec42fa66e14a4fc3932c8dbcc8fb1a93ab9de00da57a82e176faa70b73f6992f8c5e2ab52c02fc28c8f0c59aee73b6fbbd39107db7d15105054f4390e9be

  • C:\serverg.Bin\873D3F8AE56.exe

    Filesize

    268KB

    MD5

    a4d8bde5ad011855502faba674c06787

    SHA1

    7e46623f634daf3d0767d14d246cf4cd358783e3

    SHA256

    c274040940d7569c7605ab79bb5612715fde118d29416750608e7c02a9ea6733

    SHA512

    0699ffe7fdd4f975541109a44e27b62b17ddeaa3163a0e8138ba7ec4aa263d8cc2ba906e9ec53ef2bcd36cf04fb6f527635a5bf567c85219d62e3937b8c05887

  • C:\serverg.Bin\D312F7B35CC8D9F

    Filesize

    76KB

    MD5

    159427bc1865e157ec79c066a670588b

    SHA1

    59b6fc6e25f5e251ed1a8612c0d8a356cf959ddd

    SHA256

    27bcd1abdbab72829e9c5eb1e8b571ee2c9fc8633091c74e9623f504ccdd10ff

    SHA512

    87fa8bdc33073de8e5e00dea0162bee3d42ecbf4d446c38b1564bcdc29b8894c9fe73084b8e673614bf57bb2bf30ecfc1a7f9b438ab78a196ed7f49778f2137f

  • memory/2084-17-0x0000000000400000-0x00000000004FB000-memory.dmp

    Filesize

    1004KB

  • memory/2084-22-0x0000000000400000-0x00000000004FB000-memory.dmp

    Filesize

    1004KB

  • memory/2084-18-0x0000000000400000-0x00000000004FB000-memory.dmp

    Filesize

    1004KB

  • memory/2084-93-0x0000000000400000-0x00000000004FB000-memory.dmp

    Filesize

    1004KB

  • memory/2084-35-0x00000000003B0000-0x00000000003FE000-memory.dmp

    Filesize

    312KB

  • memory/2084-28-0x0000000000400000-0x00000000004FB000-memory.dmp

    Filesize

    1004KB

  • memory/2232-3-0x0000000000400000-0x00000000004FB000-memory.dmp

    Filesize

    1004KB

  • memory/2232-90-0x00000000001D0000-0x00000000001D1000-memory.dmp

    Filesize

    4KB

  • memory/2232-107-0x0000000076F5F000-0x0000000076F61000-memory.dmp

    Filesize

    8KB

  • memory/2232-5-0x00000000001C0000-0x00000000001C1000-memory.dmp

    Filesize

    4KB

  • memory/2232-4-0x00000000001C0000-0x00000000001C1000-memory.dmp

    Filesize

    4KB

  • memory/2232-2-0x00000000001B0000-0x00000000001B1000-memory.dmp

    Filesize

    4KB

  • memory/2232-1-0x000000000209E000-0x000000000209F000-memory.dmp

    Filesize

    4KB

  • memory/2232-62-0x00000000001B0000-0x00000000001B1000-memory.dmp

    Filesize

    4KB

  • memory/2232-89-0x0000000076F5F000-0x0000000076F61000-memory.dmp

    Filesize

    8KB

  • memory/2232-9-0x0000000000400000-0x00000000004FB000-memory.dmp

    Filesize

    1004KB

  • memory/2232-91-0x00000000001D0000-0x00000000001D1000-memory.dmp

    Filesize

    4KB

  • memory/2232-0-0x0000000001E00000-0x0000000002070000-memory.dmp

    Filesize

    2.4MB

  • memory/2232-94-0x0000000076F5F000-0x0000000076F61000-memory.dmp

    Filesize

    8KB

  • memory/2232-95-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/2232-96-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/2232-97-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/2232-99-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/2232-98-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/2232-100-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/3040-69-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/3040-60-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/3040-75-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/3040-74-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/3040-73-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/3040-72-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/3040-71-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/3040-70-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/3040-80-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/3040-68-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/3040-67-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/3040-66-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/3040-64-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/3040-82-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/3040-83-0x00000000003B0000-0x00000000003FE000-memory.dmp

    Filesize

    312KB

  • memory/3040-84-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/3040-87-0x00000000003B0000-0x00000000003FE000-memory.dmp

    Filesize

    312KB

  • memory/3040-86-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/3040-78-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/3040-77-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/3040-76-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/3040-65-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/3040-53-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/3040-79-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/3040-55-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/3040-63-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/3040-61-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/3040-46-0x00000000003B0000-0x00000000003FE000-memory.dmp

    Filesize

    312KB

  • memory/3040-45-0x0000000001000000-0x0000000001004000-memory.dmp

    Filesize

    16KB

  • memory/3040-44-0x0000000001001000-0x0000000001002000-memory.dmp

    Filesize

    4KB

  • memory/3040-42-0x00000000003B0000-0x00000000003FE000-memory.dmp

    Filesize

    312KB

  • memory/3040-40-0x00000000003B0000-0x00000000003FE000-memory.dmp

    Filesize

    312KB

  • memory/3040-56-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/3040-38-0x00000000003B0000-0x00000000003FE000-memory.dmp

    Filesize

    312KB

  • memory/3040-37-0x00000000003B0000-0x00000000003FE000-memory.dmp

    Filesize

    312KB

  • memory/3040-36-0x00000000003B0000-0x00000000003FE000-memory.dmp

    Filesize

    312KB

  • memory/3040-57-0x0000000000170000-0x0000000000176000-memory.dmp

    Filesize

    24KB

  • memory/3040-30-0x00000000003B0000-0x00000000003FE000-memory.dmp

    Filesize

    312KB

  • memory/3040-54-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/3040-43-0x00000000003B0000-0x00000000003FE000-memory.dmp

    Filesize

    312KB

  • memory/3040-126-0x00000000751D7000-0x00000000751D9000-memory.dmp

    Filesize

    8KB

  • memory/3040-127-0x0000000075160000-0x0000000075324000-memory.dmp

    Filesize

    1.8MB

  • memory/3040-128-0x0000000075160000-0x0000000075324000-memory.dmp

    Filesize

    1.8MB

  • memory/3040-135-0x0000000075160000-0x0000000075324000-memory.dmp

    Filesize

    1.8MB

  • memory/3040-136-0x0000000075160000-0x0000000075324000-memory.dmp

    Filesize

    1.8MB

  • memory/3040-137-0x0000000075160000-0x0000000075324000-memory.dmp

    Filesize

    1.8MB

  • memory/3040-138-0x0000000075160000-0x0000000075324000-memory.dmp

    Filesize

    1.8MB