Analysis

  • max time kernel
    149s
  • max time network
    95s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    23-08-2024 09:19

General

  • Target

    bb27b1f9c0b075e3d5c4d2f12c78e083_JaffaCakes118.exe

  • Size

    130KB

  • MD5

    bb27b1f9c0b075e3d5c4d2f12c78e083

  • SHA1

    9185ec5efe66698fc7d04ce0363c10d1d6299506

  • SHA256

    c3de4bbd4616d73e6b2796778762c82a68712370707e6a8206065e87c9b2a6ad

  • SHA512

    7ef1bc5ea4dba761f6dc80110996569c5801054ed6316830d83dca2020689fd3fd01356111b4967a6e09dc33058fd02fda779fb6d362b8ef4ddb27b491858a3a

  • SSDEEP

    3072:3kVD1BSqao9c3HwsanTdgyOxsP+f+wmCDJV:wSqjc3HsTaxoqrmCDJ

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 4 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Runs net.exe
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1160
      • C:\Users\Admin\AppData\Local\Temp\bb27b1f9c0b075e3d5c4d2f12c78e083_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\bb27b1f9c0b075e3d5c4d2f12c78e083_JaffaCakes118.exe"
        2⤵
        • Adds Run key to start application
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2864
        • C:\Users\Admin\AppData\Local\Temp\bb27b1f9c0b075e3d5c4d2f12c78e083_JaffaCakes118.exe
          "C:\Users\Admin\AppData\Local\Temp\bb27b1f9c0b075e3d5c4d2f12c78e083_JaffaCakes118.exe"
          3⤵
          • Adds Run key to start application
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1544
          • C:\Users\Admin\AppData\Local\Temp\bb27b1f9c0b075e3d5c4d2f12c78e083_JaffaCakes118.exe
            "C:\Users\Admin\AppData\Local\Temp\bb27b1f9c0b075e3d5c4d2f12c78e083_JaffaCakes118.exe"
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1572
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1572 -s 192
              5⤵
              • Program crash
              • Suspicious use of WriteProcessMemory
              PID:2176
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2176 -s 524
                6⤵
                • Program crash
                PID:2212
        • C:\Windows\SysWOW64\Net.exe
          Net Send * My god! Some one killed ChineseHacker-2 Monitor
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2720
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 Send * My god! Some one killed ChineseHacker-2 Monitor
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2620

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\readme.eml

      Filesize

      14KB

      MD5

      ca9ebb14e7f1758827ec8f29f9f03c5d

      SHA1

      0f7683bcf5b7a13eb3fce38c7091bd3558060f7f

      SHA256

      514fd6be40073426a9f45177ddfad0e83ec844d6abcce649838b1884714fc5a1

      SHA512

      cf91aff89f61ff281c6f42670c3674acc404b71234301bd09224dbede22a9ed647114e631857a321a61adbff063e6b050b319bef9dab4018060dace26f6edf12

    • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\epl-v10.html

      Filesize

      12KB

      MD5

      8156706568e77846b7bfbcc091c6ffeb

      SHA1

      792aa0db64f517520ee8f745bee71152532fe4d2

      SHA256

      5e19cfbd6690649d3349e585472385186d99f56a94dc32d9073b83011cea85f8

      SHA512

      8760f26069296f0fe09532f1244d93a57db4cafa8d06aaa9dc981bcaed4bde05366ef21e6f0c1aadad4478382b59a4e43d26c04185cf2ed965901321d05604b8

    • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\license.html

      Filesize

      8KB

      MD5

      7757fe48a0974cb625e89012c92cc995

      SHA1

      e4684021f14053c3f9526070dc687ff125251162

      SHA256

      c0a8aa811a50c9b592c8f7987c016e178c732d7ebfd11aa985a8f0480539fa03

      SHA512

      b3d4838b59f525078542e7ebbf77300d6f94e13b0bff1c9a2c5b44a66b89310a2593815703f9571565c18b0cdeb84e9e48432208aaa25dff9d2223722902d526

    • C:\ProgramData\Package Cache\{33d1fd90-4274-48a1-9bc1-97e33d9c2d6f}\vcredist_x86.exe

      Filesize

      451KB

      MD5

      5c77667da93ada9c8224b36125fae720

      SHA1

      3729156b113bb06dd171d864a700ec95e4a5b098

      SHA256

      e676c05c9cfeed8a2d2746cf1af41326f2339a941780e175b76b547a087383d2

      SHA512

      37fadb8e8276baa42e05ad559fb4c5f9fbf94df85a4f868e24a3c4922202069afafed7c858fdd5266aa6ebe402afc7627f37523744bda528bd3cf273f8427e0b

    • C:\ProgramData\Package Cache\{4d8dcf8c-a72a-43e1-9833-c12724db736e}\VC_redist.x86.exe

      Filesize

      640KB

      MD5

      0c9b52ea6f35ca4babf00044c10ae727

      SHA1

      899f5c709914acd994c642cde4d04fad630b8eb6

      SHA256

      d29aabd91f0aa8a608604d3788bbb5f915b578cb61985a9cd44e3a14e63a3f7a

      SHA512

      f447e5d3c2a659e7aadae7440f93845ae8ce7d2edbbed4cfff4004ab8a24865c250cc03d379e7156fac155b744f669e05cb6214d2401affa686a86de488b2713

    • C:\ProgramData\Package Cache\{57a73df6-4ba9-4c1d-bbbb-517289ff6c13}\VC_redist.x64.exe

      Filesize

      640KB

      MD5

      ce2b03c42da76584df8fb71e3f3aedb8

      SHA1

      b72046524b700d36d4edc1c7456dbdf543224eba

      SHA256

      5d3b98986639d52d0ee15132ff496bf502adaea4067729b1638b547e1fc529e8

      SHA512

      4c680c242046fd914e6159f4c77788fdfd8a5b75e71bda0df39330241c4dacc9dd488675edf8a0a21a7ffd300a7b8980168c1380688350e785b02d07d20a1948

    • C:\ProgramData\Package Cache\{61087a79-ac85-455c-934d-1fa22cc64f36}\vcredist_x86.exe

      Filesize

      461KB

      MD5

      5ec2fdfd41a1c71a5be693a112d04630

      SHA1

      a834ac70e8327467d637ff18c9e32d5b172d942a

      SHA256

      9d5219a004814cbfcf0def77a79a07d342e97ad4a90bb47d3370c447881f0a5b

      SHA512

      b0fdc7f02c56fcf6e40b1238c06c57a6501a315471a6c56759abeacfce70cea8f81dbe8f75b249e669c11cb921758fcf5ea889c1d9469284af5804894041134e

    • C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe

      Filesize

      451KB

      MD5

      1a41054becc69068ec821c9b9be673a0

      SHA1

      cd7a899b5253bed773207720c5e1c5fb317c32e4

      SHA256

      fae3ad60229578bc9127f8ce7531d99ad5a9099fc6ed1779a07ed76c635c96fa

      SHA512

      31164961e45a2e3747dca86db72ce172f69328d7cccc52657db35fab37ae27063d483514f491480d7deff7b2cf0d048f0171fd9e73899f1701dc7ec8eb66dda2

    • C:\ProgramData\Package Cache\{ef6b00ec-13e1-4c25-9064-b2f383cb8412}\vcredist_x64.exe

      Filesize

      461KB

      MD5

      49a914b9554c00d46a501a66b2e97c65

      SHA1

      6ca1a651e48fc419462f7b7dc2b1272def50c99e

      SHA256

      295ad19cb7ba5e639015d9c9e5cb3d329997904e9eef251e51d9d6c3d641ab12

      SHA512

      791c1f68aa703d7664ad68e2a63a4096c1bc2fd1c122dc0e869946960a1d5e8997e3035a4fbc675ecdcb67e165e75971098d34243e1c34e6adcec214a8207787

    • C:\Users\Admin\AppData\Local\Temp\ose00000.exe

      Filesize

      152KB

      MD5

      8e57b2a878a577c6a7424c580f61c6b8

      SHA1

      473b398710b4f9949bae69fb0ef208b2a1ce2f15

      SHA256

      423635928fca3b76bedf5edad765c6cf5ab30ef4fde342e356d81b5c8bbc37ef

      SHA512

      7b1c71ae2b32d9f7fc3ce6c21af3ca582bd81ee85ef38f017d3bda5202c915ba5eaa73fbd5fb52d3cd8eb32a6c7183b885ada7c979df1c6f470fb15aa956d7ca

    • C:\Windows\SysWOW64\runouce.exe

      Filesize

      10KB

      MD5

      a3ce2a4c006e9958b1e42b9dc2843a6e

      SHA1

      14cf1fb1e5024fc4b01125324af97e861b239f64

      SHA256

      c5b1332fe2d550870d2a0117d05967e8141ad2b1462359e3ee7bb4b193fe73eb

      SHA512

      5e68eeedf0c55e19eebcf4f1a157bd8119c8e3182286426f74042b038e4a2368e69dd8f724f0442d95cce19b5915b1a984696bd2681cc6765e09c977343a7141

    • C:\vcredist2010_x86.log.html

      Filesize

      81KB

      MD5

      0920d608396bbe6bc38d288686df9d32

      SHA1

      8ee6143885f5538ec489151294f022e273514c9e

      SHA256

      2437d813f85c6e46c517ab9ab1703ee5e3605b8953be0cc975c28b043532c1aa

      SHA512

      9d682bc2aec34f2241028821eeefc353d347961298bd24bbc83325056ec78b935dde183f28363807b89d53a3641a7fe367a907cd198e6e66f905857ce623c637

    • memory/1544-1026-0x00000000000B0000-0x00000000000DA000-memory.dmp

      Filesize

      168KB

    • memory/1544-1025-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/1544-1-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/1572-2-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/1572-758-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2176-6-0x0000000001D90000-0x0000000001D91000-memory.dmp

      Filesize

      4KB

    • memory/2176-747-0x00000000020B0000-0x00000000020B1000-memory.dmp

      Filesize

      4KB

    • memory/2176-5-0x0000000001D90000-0x0000000001D91000-memory.dmp

      Filesize

      4KB

    • memory/2176-4-0x0000000001D90000-0x0000000001D91000-memory.dmp

      Filesize

      4KB

    • memory/2176-481-0x00000000020B0000-0x00000000020B1000-memory.dmp

      Filesize

      4KB

    • memory/2864-1023-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2864-0-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2864-1024-0x0000000000120000-0x000000000014A000-memory.dmp

      Filesize

      168KB