Analysis

  • max time kernel
    140s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/08/2024, 11:02

General

  • Target

    c4dea1d39e7c009a8dd333e5e84a0486_JaffaCakes118.exe

  • Size

    3.9MB

  • MD5

    c4dea1d39e7c009a8dd333e5e84a0486

  • SHA1

    fbfaa875ffd294b407d038439f8cb561c033cbe1

  • SHA256

    e251bbef2c33494c43462511bda36339cf2e8b1be5aa30bb77fdc5d168d28db4

  • SHA512

    377f196ea88f26f90610fa91543f264c7a710e348695580254458b47ef6f7f930d4adacf85c86eb6aa9461c4edaaa83fe65e0ce8f2b7371e8d54b3c7c2de8da6

  • SSDEEP

    98304:HKIr+ZQqjWg00mSvAbQ05eKz4U0BAyHkVTFl:qI6Sg2vQ9KzDFFl

Malware Config

Extracted

Family

stealthworker

Version

3.06

C2

http://190.97.167.130:8081

Extracted

Family

stealthworker

Signatures

  • StealthWorker

    StealthWorker is golang-based brute force malware.

  • Drops startup file 2 IoCs
  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c4dea1d39e7c009a8dd333e5e84a0486_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\c4dea1d39e7c009a8dd333e5e84a0486_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3532
    • C:\Windows\SysWOW64\cmd.exe
      cmd /Q /C C:\Users\Admin\AppData\Local\Temp/s.bat
      2⤵
      • Drops startup file
      • System Location Discovery: System Language Discovery
      PID:872

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\s.bat

    Filesize

    305B

    MD5

    a4e5715616214549c582e93674d046a5

    SHA1

    34a403cdb1e2ba2a59c8699c82a2a3ff5889e4ff

    SHA256

    4dc6e93aea3095c86be9e8b2e41c1dd23829482a9c0994268147289c3e4ee7aa

    SHA512

    9b23b2cd09dfbffe17d2638abb51b5bde892e515d52ea2e88610bc7d4d7f4eba2ed5ada7c704bf3cdf4ccc824052ac64c7ba914ac9586196a24d3be1916011a1

  • memory/3532-12-0x0000000002E90000-0x0000000003155000-memory.dmp

    Filesize

    2.8MB

  • memory/3532-3-0x0000000000400000-0x0000000000AE4000-memory.dmp

    Filesize

    6.9MB

  • memory/3532-2-0x0000000002E90000-0x0000000003155000-memory.dmp

    Filesize

    2.8MB

  • memory/3532-9-0x0000000000400000-0x0000000000AE4000-memory.dmp

    Filesize

    6.9MB

  • memory/3532-10-0x0000000002AC0000-0x0000000002E82000-memory.dmp

    Filesize

    3.8MB

  • memory/3532-1-0x0000000002AC0000-0x0000000002E82000-memory.dmp

    Filesize

    3.8MB

  • memory/3532-13-0x0000000000400000-0x0000000000AE4000-memory.dmp

    Filesize

    6.9MB

  • memory/3532-14-0x0000000000400000-0x0000000000AE4000-memory.dmp

    Filesize

    6.9MB

  • memory/3532-15-0x0000000000400000-0x0000000000AE4000-memory.dmp

    Filesize

    6.9MB

  • memory/3532-16-0x0000000000400000-0x0000000000AE4000-memory.dmp

    Filesize

    6.9MB

  • memory/3532-17-0x0000000000400000-0x0000000000AE4000-memory.dmp

    Filesize

    6.9MB

  • memory/3532-18-0x0000000000400000-0x0000000000AE4000-memory.dmp

    Filesize

    6.9MB