Analysis
-
max time kernel
140s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27/08/2024, 11:02
Static task
static1
Behavioral task
behavioral1
Sample
c4dea1d39e7c009a8dd333e5e84a0486_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c4dea1d39e7c009a8dd333e5e84a0486_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c4dea1d39e7c009a8dd333e5e84a0486_JaffaCakes118.exe
-
Size
3.9MB
-
MD5
c4dea1d39e7c009a8dd333e5e84a0486
-
SHA1
fbfaa875ffd294b407d038439f8cb561c033cbe1
-
SHA256
e251bbef2c33494c43462511bda36339cf2e8b1be5aa30bb77fdc5d168d28db4
-
SHA512
377f196ea88f26f90610fa91543f264c7a710e348695580254458b47ef6f7f930d4adacf85c86eb6aa9461c4edaaa83fe65e0ce8f2b7371e8d54b3c7c2de8da6
-
SSDEEP
98304:HKIr+ZQqjWg00mSvAbQ05eKz4U0BAyHkVTFl:qI6Sg2vQ9KzDFFl
Malware Config
Extracted
stealthworker
3.06
http://190.97.167.130:8081
Extracted
stealthworker
Signatures
-
StealthWorker
StealthWorker is golang-based brute force malware.
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchostsw.exe cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchostsw.exe cmd.exe -
resource yara_rule behavioral2/memory/3532-3-0x0000000000400000-0x0000000000AE4000-memory.dmp upx behavioral2/memory/3532-9-0x0000000000400000-0x0000000000AE4000-memory.dmp upx behavioral2/memory/3532-13-0x0000000000400000-0x0000000000AE4000-memory.dmp upx behavioral2/memory/3532-14-0x0000000000400000-0x0000000000AE4000-memory.dmp upx behavioral2/memory/3532-15-0x0000000000400000-0x0000000000AE4000-memory.dmp upx behavioral2/memory/3532-16-0x0000000000400000-0x0000000000AE4000-memory.dmp upx behavioral2/memory/3532-17-0x0000000000400000-0x0000000000AE4000-memory.dmp upx behavioral2/memory/3532-18-0x0000000000400000-0x0000000000AE4000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c4dea1d39e7c009a8dd333e5e84a0486_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3532 wrote to memory of 872 3532 c4dea1d39e7c009a8dd333e5e84a0486_JaffaCakes118.exe 98 PID 3532 wrote to memory of 872 3532 c4dea1d39e7c009a8dd333e5e84a0486_JaffaCakes118.exe 98 PID 3532 wrote to memory of 872 3532 c4dea1d39e7c009a8dd333e5e84a0486_JaffaCakes118.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\c4dea1d39e7c009a8dd333e5e84a0486_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c4dea1d39e7c009a8dd333e5e84a0486_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Windows\SysWOW64\cmd.execmd /Q /C C:\Users\Admin\AppData\Local\Temp/s.bat2⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:872
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
305B
MD5a4e5715616214549c582e93674d046a5
SHA134a403cdb1e2ba2a59c8699c82a2a3ff5889e4ff
SHA2564dc6e93aea3095c86be9e8b2e41c1dd23829482a9c0994268147289c3e4ee7aa
SHA5129b23b2cd09dfbffe17d2638abb51b5bde892e515d52ea2e88610bc7d4d7f4eba2ed5ada7c704bf3cdf4ccc824052ac64c7ba914ac9586196a24d3be1916011a1