Analysis

  • max time kernel
    94s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/09/2024, 13:36

General

  • Target

    cfa77e1bcda21bb364dbc5459791925d_JaffaCakes118.exe

  • Size

    176KB

  • MD5

    cfa77e1bcda21bb364dbc5459791925d

  • SHA1

    b27e18f025119da1160d6d0cfe067aa2f85c68e0

  • SHA256

    31592fe5a522a0c046693c363fbb2f42f3b323319cf0c41bdedeb77c390c4cea

  • SHA512

    5a13b2c15212476a944afd4696545c7d9ea6e6e719e2aa20c0a59edf97cf24fdef074dac386a08c4ba0e4b5de7d1c71fc7eab7c876fe3b2a4ef70e0590e426b5

  • SSDEEP

    3072:08pniD17UueS8E1n5yGqwD0qXHU8nsJcRGx/WgIDbT/4dN+qMtP1UCl:0/B4uyE1n5yGbD0qX0vJcRm/WN/4dNYt

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 27 IoCs
  • Drops file in Program Files directory 13 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cfa77e1bcda21bb364dbc5459791925d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\cfa77e1bcda21bb364dbc5459791925d_JaffaCakes118.exe"
    1⤵
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    PID:4588

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

          Filesize

          567KB

          MD5

          6240c94a100f581d3dae1cf108d52762

          SHA1

          53b67a598ed03c656c82ce5b0a1d0782b7819fc0

          SHA256

          64c510e114dc2682e3a0ef9098fba56a36a0e9dab3187eee10fc640162085dbb

          SHA512

          45d7a99539f7ca0c6ee17455bb8a832e9b80d9ceb442565c6d702c56e245caa8e42240b3083db6669ebcd8c4088afdb8120e62fcbdff0d0b5caf0730c59b59d8

        • C:\Windows\SysWOW64\msiexec.vir

          Filesize

          202KB

          MD5

          893c547ab01ebf26d9a46c4bb6b9355f

          SHA1

          5ce473849e2e83b2221147220aa93b3542ecfffe

          SHA256

          507b6dc3476f44b544f3b79989a6af6da14b61ec08b09bfb1a3be70a9bed21d9

          SHA512

          04d9aadc2545ae46003ca8c8a10db70022bccb35db22e556c193c10a2b9dfcf849d6ca398c912678ebfa237ffd0de484866f8e24f3df2f1136bcb3ab2467d7db

        • memory/4588-0-0x0000000001000000-0x0000000001067000-memory.dmp

          Filesize

          412KB

        • memory/4588-31-0x0000000001000000-0x0000000001067000-memory.dmp

          Filesize

          412KB