Analysis

  • max time kernel
    135s
  • max time network
    133s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-08-2024 09:52

General

  • Target

    cc9720fe2882a3f7cc54f0f9afb1f335_JaffaCakes118.exe

  • Size

    487KB

  • MD5

    cc9720fe2882a3f7cc54f0f9afb1f335

  • SHA1

    aea59caec4ed3bfbbee2b8cd94c516ae45848a69

  • SHA256

    7e0afbcc7487f74ef4d2dc400812b48542b95dfecad63fe356231065fa10a3db

  • SHA512

    c310106ae8e37c7b85e9355b0852fe87ee73f03cbd23d68c7ac236a2548bb46b7b4a20dfcc973ee836ac415f1dedef5c53a4ade365e90be0dc7e11ef7641e1fa

  • SSDEEP

    12288:xNgW6anyJNH+RCBRITavKrn7xcCCKAUQXWfWv1K6lghoS:zWJNeRReSlcCAUQmQng

Malware Config

Extracted

Family

ffdroider

C2

http://101.36.107.74

Signatures

  • FFDroider

    Stealer targeting social media platform users first seen in April 2022.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cc9720fe2882a3f7cc54f0f9afb1f335_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\cc9720fe2882a3f7cc54f0f9afb1f335_JaffaCakes118.exe"
    1⤵
    • Checks whether UAC is enabled
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    PID:436
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 436 -s 1504
      2⤵
      • Program crash
      PID:936
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4356,i,16316361669272684588,6171287487746154806,262144 --variations-seed-version --mojo-platform-channel-handle=1044 /prefetch:8
    1⤵
      PID:1704
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 436 -ip 436
      1⤵
        PID:4036

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\d.jfm

        Filesize

        16KB

        MD5

        e1c35d3aae0063ea6b1b117d5c5dcd17

        SHA1

        12eafa6a1106833568748c3f86394d0631a2c3db

        SHA256

        501cf69c4bde4489f7142d3314df7095168e934e6d591d3943069cb22e421b63

        SHA512

        055931198d74bfce1fc67ee2a0b5b95f40940945e72008c5a7298cfe3c16b0cbda7bac834d2d32dcc7ef0c304e68ea3a4af85289b7906b3c0e79ea8655b960c6

      • C:\Users\Admin\AppData\Local\Temp\d.jfm

        Filesize

        16KB

        MD5

        842699bce131289bccab8465a0fe10d7

        SHA1

        1ab0dd541ba9521e5db1eee86f9add93ae2d4c71

        SHA256

        9e14c17c6448130adbf89dcd655f8f51cdf56fc70500a55a09d0ff96c994e263

        SHA512

        a4a4b2ad01010da8514781a0050da8c05402082a42573f019e1f87b9a08e4c154556916814fb40d1e6c998d5e56cbf5949cd88d8bc4ef468d8b0619497c0d839

      • C:\Users\Admin\AppData\Local\Temp\d.jfm

        Filesize

        16KB

        MD5

        067d3a5c6749d4fac5d5e0abfd09dc82

        SHA1

        5c0bc51ef94cfd1f7aa75723c377dbbdf5bfb10b

        SHA256

        26c1d85f372c0cce2fb11989a21e2316c28d4c3e9dd43808b4cc38ec13ee18bd

        SHA512

        5ed8a4dbfad38a11cd845bd77cdafe201e47da89b427869a73fc465f31b89a6534c5a5dc07f3d20b4bdabd2059c5d3721f5c7284339bba381ffc7bf8371958bd

      • C:\Users\Admin\AppData\Local\Temp\d.jfm

        Filesize

        16KB

        MD5

        3e763d1f41b1e41d3dbbccdb235366be

        SHA1

        8cf60b9eeb973993a6b88891f6930118d277beb7

        SHA256

        cff44e9a6d0d2ffd69e730eb9c208350c9a2e9150172f16eaf34eb2ece938a65

        SHA512

        4a01d261989c6b08597989a36cdda2ba13fac1755874fea7698847b11ca3b2dc47fb4d9384e6a905d66f3f225545226de26eeb93014124fcf207ba561e99e81b

      • C:\Users\Admin\AppData\Local\Temp\d.jfm

        Filesize

        16KB

        MD5

        ee5e2c9c6643ff74f6ec32cd6b56f6c7

        SHA1

        54e6b61d8152bacdc9911cf624434a573cd89ce3

        SHA256

        5b953f3fe5f9bf95213d3a0698cc31cd1c373e370784a1474dd728fe1ebc244a

        SHA512

        014068581383308bac7d287b94708ba7d24789f28705b6a862d4f6b7ba32233e591637c011ff2aa5234f71b6ea4224efc55383797f2c473748beb211326a30be

      • memory/436-22-0x00000000043C0000-0x00000000043C8000-memory.dmp

        Filesize

        32KB

      • memory/436-19-0x00000000042E0000-0x00000000042E8000-memory.dmp

        Filesize

        32KB

      • memory/436-25-0x0000000004380000-0x0000000004388000-memory.dmp

        Filesize

        32KB

      • memory/436-26-0x0000000004640000-0x0000000004648000-memory.dmp

        Filesize

        32KB

      • memory/436-27-0x00000000049F0000-0x00000000049F8000-memory.dmp

        Filesize

        32KB

      • memory/436-28-0x00000000048F0000-0x00000000048F8000-memory.dmp

        Filesize

        32KB

      • memory/436-29-0x0000000004760000-0x0000000004768000-memory.dmp

        Filesize

        32KB

      • memory/436-20-0x0000000004300000-0x0000000004308000-memory.dmp

        Filesize

        32KB

      • memory/436-42-0x0000000004300000-0x0000000004308000-memory.dmp

        Filesize

        32KB

      • memory/436-0-0x0000000000400000-0x0000000000522000-memory.dmp

        Filesize

        1.1MB

      • memory/436-50-0x0000000004760000-0x0000000004768000-memory.dmp

        Filesize

        32KB

      • memory/436-52-0x0000000004890000-0x0000000004898000-memory.dmp

        Filesize

        32KB

      • memory/436-12-0x0000000003830000-0x0000000003840000-memory.dmp

        Filesize

        64KB

      • memory/436-65-0x0000000004300000-0x0000000004308000-memory.dmp

        Filesize

        32KB

      • memory/436-6-0x0000000003690000-0x00000000036A0000-memory.dmp

        Filesize

        64KB

      • memory/436-73-0x0000000004890000-0x0000000004898000-memory.dmp

        Filesize

        32KB

      • memory/436-75-0x0000000004760000-0x0000000004768000-memory.dmp

        Filesize

        32KB

      • memory/436-3-0x0000000000400000-0x0000000000522000-memory.dmp

        Filesize

        1.1MB

      • memory/436-100-0x0000000000400000-0x0000000000522000-memory.dmp

        Filesize

        1.1MB