Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/08/2024, 07:00

General

  • Target

    b283ef0394730264ff594515fc9a47ee_JaffaCakes118.exe

  • Size

    157KB

  • MD5

    b283ef0394730264ff594515fc9a47ee

  • SHA1

    cd5cd3a09965b197d7cae22e7ec883be95877f3b

  • SHA256

    07644fe81c4fd72a38bcaca446a18647f866db33f77f105b51cf05302ad6374c

  • SHA512

    02df79547538a3390baf17f0de2aeba54819b82c7627d54411c5acf2b36ba13ab209984cdd0cf1d3e2d508061d6645ed7e006ce24c70e6926b3409ffe2794e6e

  • SSDEEP

    3072:RUClX2HtIwk5xkfudHMA0WE7t6GMqIwV7KgJNeuZx5Do7/U7pDMX3sI/zoutp0:RUClmM7dj0WEhXIKw0pDMnsIboSp

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 18 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unexpected DNS network traffic destination 6 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer Phishing Filter 1 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b283ef0394730264ff594515fc9a47ee_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b283ef0394730264ff594515fc9a47ee_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4568
    • C:\Users\Admin\AppData\Local\Temp\b283ef0394730264ff594515fc9a47ee_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\b283ef0394730264ff594515fc9a47ee_JaffaCakes118.exe
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4204
      • C:\Record.Cl\7E402E93F41.exe
        "C:\Record.Cl\7E402E93F41.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:5092
        • C:\Record.Cl\7E402E93F41.exe
          C:\Record.Cl\7E402E93F41.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:5068
          • C:\Users\Admin\AppData\Local\Temp\tCD7705.exe
            "C:\Users\Admin\AppData\Local\Temp\tCD7705.exe"
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer Phishing Filter
            • Modifies Internet Explorer settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3720

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Record.Cl\373F47EE4DC9BA4

    Filesize

    5KB

    MD5

    396825cc1d5fff08be7ddd66f7b13eed

    SHA1

    15605a28bc8a4bf5ea2122c6fe3fe5dcd09b711d

    SHA256

    8430a84a7dfe328ebd7fa070c71fcde3431a02d5f4339e246bbc38dd8bea1983

    SHA512

    b492073a74a52d3f19837a0ac46c7e29e187404b7d44eac5a20dd0def08019b73ecf29b21b44c8724185b43d261a10ff3f37c569a64406cfaa25f0b187dc3278

  • C:\Record.Cl\7E402E93F41.exe

    Filesize

    157KB

    MD5

    b283ef0394730264ff594515fc9a47ee

    SHA1

    cd5cd3a09965b197d7cae22e7ec883be95877f3b

    SHA256

    07644fe81c4fd72a38bcaca446a18647f866db33f77f105b51cf05302ad6374c

    SHA512

    02df79547538a3390baf17f0de2aeba54819b82c7627d54411c5acf2b36ba13ab209984cdd0cf1d3e2d508061d6645ed7e006ce24c70e6926b3409ffe2794e6e

  • C:\Users\Admin\AppData\Local\Temp\tCD7705.exe

    Filesize

    3KB

    MD5

    29090b6b4d6605a97ac760d06436ac2d

    SHA1

    d929d3389642e52bae5ad8512293c9c4d3e4fab5

    SHA256

    98a24f0caf5b578e230e6f1103a5fba6aecb28a9128cad5520fcde546d643272

    SHA512

    9121ec42fa66e14a4fc3932c8dbcc8fb1a93ab9de00da57a82e176faa70b73f6992f8c5e2ab52c02fc28c8f0c59aee73b6fbbd39107db7d15105054f4390e9be

  • memory/3720-56-0x0000000001001000-0x0000000001002000-memory.dmp

    Filesize

    4KB

  • memory/3720-51-0x00000000006D0000-0x000000000071E000-memory.dmp

    Filesize

    312KB

  • memory/3720-79-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/3720-122-0x0000000075330000-0x0000000075780000-memory.dmp

    Filesize

    4.3MB

  • memory/3720-121-0x0000000075330000-0x0000000075780000-memory.dmp

    Filesize

    4.3MB

  • memory/3720-120-0x00000000755E5000-0x00000000755E7000-memory.dmp

    Filesize

    8KB

  • memory/3720-50-0x00000000006D0000-0x000000000071E000-memory.dmp

    Filesize

    312KB

  • memory/3720-52-0x00000000006D0000-0x000000000071E000-memory.dmp

    Filesize

    312KB

  • memory/3720-54-0x00000000006D0000-0x000000000071E000-memory.dmp

    Filesize

    312KB

  • memory/3720-57-0x0000000001000000-0x0000000001004000-memory.dmp

    Filesize

    16KB

  • memory/3720-63-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/3720-65-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/3720-66-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/3720-67-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/3720-68-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/3720-78-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/3720-43-0x00000000006D0000-0x000000000071E000-memory.dmp

    Filesize

    312KB

  • memory/3720-71-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/3720-72-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/3720-74-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/3720-55-0x00000000006D0000-0x000000000071E000-memory.dmp

    Filesize

    312KB

  • memory/3720-59-0x00000000006D0000-0x000000000071E000-memory.dmp

    Filesize

    312KB

  • memory/3720-58-0x00000000006A0000-0x00000000006A5000-memory.dmp

    Filesize

    20KB

  • memory/3720-62-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/3720-64-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/3720-70-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/3720-85-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/3720-83-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/3720-86-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/3720-82-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/3720-81-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/3720-80-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/3720-73-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/3720-77-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/3720-69-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/3720-76-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/3720-75-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/4204-9-0x0000000000400000-0x0000000000460000-memory.dmp

    Filesize

    384KB

  • memory/4204-97-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/4204-6-0x0000000000400000-0x0000000000460000-memory.dmp

    Filesize

    384KB

  • memory/4204-13-0x0000000000400000-0x0000000000460000-memory.dmp

    Filesize

    384KB

  • memory/4204-5-0x0000000000400000-0x0000000000460000-memory.dmp

    Filesize

    384KB

  • memory/4204-93-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/4204-95-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/4204-96-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/4204-8-0x0000000000400000-0x0000000000460000-memory.dmp

    Filesize

    384KB

  • memory/4204-12-0x0000000000400000-0x0000000000460000-memory.dmp

    Filesize

    384KB

  • memory/4204-19-0x0000000000400000-0x0000000000460000-memory.dmp

    Filesize

    384KB

  • memory/4204-98-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/4204-17-0x00000000004B0000-0x00000000004B1000-memory.dmp

    Filesize

    4KB

  • memory/4204-3-0x0000000000400000-0x0000000000460000-memory.dmp

    Filesize

    384KB

  • memory/4204-16-0x00000000004B0000-0x00000000004B1000-memory.dmp

    Filesize

    4KB

  • memory/4204-11-0x0000000000400000-0x0000000000460000-memory.dmp

    Filesize

    384KB

  • memory/4204-94-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/4204-88-0x00000000004C0000-0x00000000004C1000-memory.dmp

    Filesize

    4KB

  • memory/4204-89-0x0000000077C52000-0x0000000077C54000-memory.dmp

    Filesize

    8KB

  • memory/4204-90-0x00000000004C0000-0x00000000004C1000-memory.dmp

    Filesize

    4KB

  • memory/4568-0-0x0000000000400000-0x00000000004A8000-memory.dmp

    Filesize

    672KB

  • memory/4568-15-0x0000000000400000-0x00000000004A8000-memory.dmp

    Filesize

    672KB

  • memory/5068-48-0x0000000000460000-0x0000000000529000-memory.dmp

    Filesize

    804KB

  • memory/5068-32-0x0000000000400000-0x0000000000460000-memory.dmp

    Filesize

    384KB

  • memory/5068-31-0x0000000000400000-0x0000000000460000-memory.dmp

    Filesize

    384KB

  • memory/5068-35-0x0000000000400000-0x0000000000460000-memory.dmp

    Filesize

    384KB

  • memory/5068-36-0x0000000000400000-0x0000000000460000-memory.dmp

    Filesize

    384KB

  • memory/5068-45-0x0000000000400000-0x0000000000460000-memory.dmp

    Filesize

    384KB

  • memory/5092-38-0x0000000000400000-0x00000000004A8000-memory.dmp

    Filesize

    672KB