Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/08/2024, 13:31

General

  • Target

    b7d310f32f0025de829c776581651e6b_JaffaCakes118.exe

  • Size

    496KB

  • MD5

    b7d310f32f0025de829c776581651e6b

  • SHA1

    87892ab348cbe6be1bd8a628822bb9a5b9579e74

  • SHA256

    74a2d68561ff04ce009c76d7e817221554f3e793f072f1bdd4e4ea6635e0564d

  • SHA512

    7334791c5a1c0b5a5e1d0574e1b55a98479d4df469156044b509aabca8319dbad7aa664f7a900f9319cb2889530d6312f700f46540be50665ed7452da5d83a40

  • SSDEEP

    6144:CduOpGhzXfJBU0axPEnb/jHMD3DmdYD1kSMGhuirTJwGYc8HACN:CyhzPJE4rjHIQYDSSzcirTSGf8gC

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 27 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b7d310f32f0025de829c776581651e6b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b7d310f32f0025de829c776581651e6b_JaffaCakes118.exe"
    1⤵
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:228
  • C:\Windows\servicing\TrustedInstaller.exe
    C:\Windows\servicing\TrustedInstaller.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    PID:4632

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

    Filesize

    527KB

    MD5

    ec859b2fc320a1791835aa5fa2a8b85e

    SHA1

    bd7a017114a8c57a416eeb242c7edc642dfa9e21

    SHA256

    b0d549f4183c89cb262864d88ffc9d0cdc6f364ff9fae2d0064e340b1b545192

    SHA512

    a3fd601552fd2d7b517662a1383ee71cd10fea1e46988359d0751d401da0d32790c75d060caa0c4b1c2f0d53b41c7395691f4553a84861ca0bd6784c80f5c1c0

  • C:\Windows\SysWOW64\msiexec.vir

    Filesize

    162KB

    MD5

    7df600f170632bf085b8ee501902ce66

    SHA1

    5dd7bc0f062ea78dde4a45cc5682c3dbd416e034

    SHA256

    991910829b6c103dec8cc46c5e85988118db73e05b92d8e75495be75b036dff2

    SHA512

    6a65c4dc3a9a7c0a032f15cb3cb1fb6863807fe2616e9c2084d6cb6eca1ca1c84df1d691f659f327026827f210cc79a21747aa86d3af38b9fc217f9189c68619

  • C:\Windows\servicing\TrustedInstaller.exe

    Filesize

    193KB

    MD5

    805418acd5280e97074bdadca4d95195

    SHA1

    a69e4f03d775a7a0cc5ed2d5569cbfbb4d31d2d6

    SHA256

    73684e31ad4afe3fdc525b51ccaacc14d402c92db9c42e3fcbfe1e65524b1c01

    SHA512

    630a255950c0ae0983ae907d20326adea36ce262c7784428a0811b04726849c929bc9cea338a89e77447a6cec30b0889694158327c002566d3cf5be2bb88e4de

  • memory/228-0-0x0000000000400000-0x00000000004B5000-memory.dmp

    Filesize

    724KB

  • memory/228-19-0x0000000000400000-0x00000000004B5000-memory.dmp

    Filesize

    724KB