Analysis

  • max time kernel
    146s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09/09/2024, 17:30

General

  • Target

    d6caf3179dc94ffd1052f2a526390db6_JaffaCakes118.exe

  • Size

    11.4MB

  • MD5

    d6caf3179dc94ffd1052f2a526390db6

  • SHA1

    9c53c8bffcbbbe02fef88144d3fde1b8570695e1

  • SHA256

    cfb6fb3812e6bfd9011254c6c40d030ff98cd80e72be1e98836d8da055525ea5

  • SHA512

    d597e90035a9054cd0233bff5c18025e48fcad490b577c493f3a5d6bf8cc462511ae19417c2637851ba4e0435beb0cec028c2d5ba99676e99392c1d3c77e2b82

  • SSDEEP

    196608:UTwx42RPPBdebEm1iWWHc1SUX6apg3ZhncrJPm59vzgO8L1vsqFRUo7t/IbsCTM9:UaRPiGWW8sUtu/Am5q91vsqFRn5AACTM

Malware Config

Signatures

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 13 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies data under HKEY_USERS 3 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 7 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d6caf3179dc94ffd1052f2a526390db6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d6caf3179dc94ffd1052f2a526390db6_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2656
    • C:\Users\Admin\AppData\Local\Temp\4E7E.tmp
      "C:\Users\Admin\AppData\Local\Temp\4E7E.tmp"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2128
      • C:\Users\Admin\AppData\Local\Temp\56E6.tmp
        "C:\Users\Admin\AppData\Local\Temp\56E6.tmp"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Writes to the Master Boot Record (MBR)
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Modifies system certificate store
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2616
        • C:\Users\Admin\AppData\Local\Temp\56E6.tmp
          "C:\Users\Admin\AppData\Local\Temp\56E6.tmp" /test
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:1916
        • C:\Users\Admin\AppData\Local\Temp\56E6.tmp
          "C:\Users\Admin\AppData\Local\Temp\56E6.tmp" /restart /util
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:668
      • C:\Users\Admin\AppData\Local\Temp\59A6.tmp
        "C:\Users\Admin\AppData\Local\Temp\59A6.tmp" "install"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2748
  • C:\Users\Admin\AppData\Local\Temp\59A6.tmp
    "C:\Users\Admin\AppData\Local\Temp\59A6.tmp" run
    1⤵
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:2640

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Чистилка\Чистилка Uninstall.lnk

    Filesize

    1KB

    MD5

    e334e39c98f57fbf8e0d25509d7838c5

    SHA1

    d3019c37044dfaf46193db69a964db6c4bf53559

    SHA256

    ad012b3ebe9e6c49c4f19618b9999787766eca5f5e9c66c2237bee181b760ccb

    SHA512

    e9a33d2d363a978f2cf6ae16bf18a4ef520909dd9c77ca69ac1d504506983aae3a97b9d226db4104c7be0aa557ec71d7d57d28fee625bb8cee3b7e5c94a72da1

  • C:\ProgramData\Чистилка\config.dat

    Filesize

    476KB

    MD5

    e149176d0b3e6af6e657d3def670acc1

    SHA1

    c29446dd10d5eba0334c5bd85e947cecb185910c

    SHA256

    c64eef61dda6accfe64a7006f5e0b2d36dbc2ffc23f0d97f7300aa9070572e23

    SHA512

    4e845389f6f9283f0eb2850f5fe8eebbceb0123c3822357bf12dcc075d3a27b8ca32aa1991c72dd06254d700e35b2448ed3a6105f61a08bfd1529f64a980d430

  • C:\ProgramData\Чистилка\settings.json

    Filesize

    445B

    MD5

    2297859eda6921100ccbf383a704bda6

    SHA1

    234fae2e7e0d6b4799632193df85bb74c65cc65e

    SHA256

    67d1ffd6fe5735ffce159764dd5a1ad3a1914a4e816c18c955bd20dc084dc120

    SHA512

    37614902c9c2a764a36c878a0f3d4ef3714ace6ac817a84cb6cc231a9cf18bc48a67f7669a5d2344b3e20f7279692da334b16035d2e983d59303949ef049346a

  • C:\ProgramData\Чистилка\Чистилка.exe

    Filesize

    1.6MB

    MD5

    cd32fe5df34966a7c464bffdcc08faeb

    SHA1

    3bdbce927a568f2ae8766e03f2de9180b7f98677

    SHA256

    531edfa9370a6af76e3ecdb8bc846091819768ba83f10d4d63e28608f489744c

    SHA512

    61ccb76d1c87943f8052e25e7c586aeed25b9a0a2e598226156eb4d8390192ece819f2ec7a20f61409ddce157d84b7766cd1ee20a08d579f6f67a52d5a1bd9c4

  • C:\Users\Admin\AppData\Local\Temp\56E6.tmp

    Filesize

    2.1MB

    MD5

    96a5f6a935085ecc50302ca0d3d5967c

    SHA1

    ba96c79ae2f82eaa1ae16f5b9db95d6effbde49c

    SHA256

    ecf8cfb50373c76d1170246ea5c6e4a5ac2421d85e67cfdca854c13754bf67b5

    SHA512

    0e9af7242a5e00a2d56c1264be3fbde0248240afd7ea74d8864c44b0a052a225adfb72809fe08c66be526d973e87a97fa119786853b876fbada59bbbdc4a8cb6

  • C:\Users\Admin\AppData\Local\Temp\56E6.tmp

    Filesize

    4.8MB

    MD5

    bc266b0ef1f0befcbd08e3d87bc6dccd

    SHA1

    3d06c1b9e149c59a877c830800410960f9371063

    SHA256

    c23d6b72c3c49e8f4617de5b2a99726cae6fda2c037845daeb7bae751c6aee4d

    SHA512

    ee78e9eaea66778f2cc7ad3426ab2ba22747ba5195b3fd8edb10dcf7e97ac39ed42d3f1132d439c3d9ae9f680076fb64fd8e2780181fe005387675eb90ad03d7

  • C:\Users\Admin\AppData\Local\Temp\56E6.tmp

    Filesize

    4.4MB

    MD5

    8f4eaf6cb289666366408ccfbe6cff8a

    SHA1

    32c911a23a94d67195866dfd486670cf497e7438

    SHA256

    7fb561c2a56abff44a013b082e532d874cb68465abae7e8805046c7e5296d7ed

    SHA512

    dc0245bf9b0a818b473b7c70a1c475aa6977da33be2bdaab4fc5053804c8a77ef1d224ee751a565f6ac3262c1ef765920d18fb0366c1d4e79f369adb0612ee8c

  • C:\Users\Admin\AppData\Local\Temp\56E6.tmp

    Filesize

    3.5MB

    MD5

    80801588b8817c8a1c72c1a5fccf1d4b

    SHA1

    87d3273af1df3513ff86e28be3f2b605cacd0afc

    SHA256

    6a9ab744202003322f2f93514108534baee904bac73d7b761e7d5e9d579133da

    SHA512

    b45c48c6efbfa49421371f828db7d3928b30d8866afd4bde397e91f6217ec024c46d96edc518a27802e6c0200f11ba6b0e2d95ac1c2be71f7fa3e6298f8f6faf

  • C:\Users\Admin\AppData\Local\Temp\clnA18E.tmp

    Filesize

    49KB

    MD5

    abee4387ab69da821ed9397cc651597d

    SHA1

    5d14f4afdbe15448bf884b528ffffab874f920a7

    SHA256

    ac1dfd38d2fa61e28211e196cd3d754f6ccfb220e8c1beba52e54825cf615e22

    SHA512

    e014294cb60b66bd259f4a6ce262fc9eca30a30e7674dae178dbac6132ba464120e5d1076ee81c1210a2f42f819d94373733172cef9fda77c9effb4eed53a904

  • C:\Users\Admin\AppData\Local\Temp\clnA862.tmp

    Filesize

    2.6MB

    MD5

    ea44502931f9a8ffd0bee2a80fcba11b

    SHA1

    de2ee149c0c3ca95412354b925606f1821015a4d

    SHA256

    93641b283745a6235f09a2a711a6418641f0fe006e8bf660601000634c443315

    SHA512

    73982e1aa1f8b14c004f5bbafc005229e62bb6f80793e80e672bf28aef1417a895083b70f9b2f352107e69168ca68716165f3bb77d0c8bdfafd098626c606a4f

  • C:\Users\Public\Desktop\Чистилка.lnk

    Filesize

    1KB

    MD5

    c65d91b241634ec60941a497a3655cae

    SHA1

    76c7701cf132c13fe3bf5f672066ea68dc723f97

    SHA256

    aff0146b0a2ccf1189c9dcd18ca6da295702d4da2f16acaf05b00fc637dd2033

    SHA512

    05917f2db3ff424714eb5b6bd2bf39beebadb3ec83fcccf705483eaa4168adf4f3324059578484ef8f74f7821a148f7a3ce40e810e2300408de5be9233065a55

  • C:\Windows\Fonts\pns.ttf

    Filesize

    127KB

    MD5

    df8c626474a73ab7a8b511655597c7c4

    SHA1

    5de28f387ea88553d195d1978286d43c33231969

    SHA256

    723091ba5a1b8e65164075516d69c00c71225c6dde61ffc32dd4047803ab42b5

    SHA512

    c8f7d1577cb70610c40b96c835faca6b916c4924b5061351c8a67287567556b2014efb7c73cdcc4fb6533829541cd0264b8a9e428d3c572e29c06b0d96633d59

  • \ProgramData\Чистилка\Чистилка.exe

    Filesize

    1.3MB

    MD5

    e183e9c221a01ce16167790ae7a9b20d

    SHA1

    3756b1bbfbf3989e2c8c16e2622e536a134f56cc

    SHA256

    b8311fca06fc3c98c64dff807033ec3dddb8e06f843d6d1701e1321e7139b316

    SHA512

    47a6dd618c14dc2278b3430638c3ed41e5e47186f2dea73d29e1aed4df361f134d9a53bca09083f68738878faa96c75c7836b20b936019c108b339a9e800ed45

  • \ProgramData\Чистилка\Чистилка.exe

    Filesize

    1.6MB

    MD5

    3f2c905efb0158221d37ab08724a901b

    SHA1

    fd3008c4e7ca89b4e78c1cf55a7e6d6e513abad6

    SHA256

    83a9df9bddb1269ee23ff608acf239666aed13430ca9bbe04ea526935e849c8d

    SHA512

    dffce70c00d551f76a6b55d19e39e323f23ab3014ed1d96af86e5037658ec08da4f98103f0957240fb714adfdcd1801df2745477b60593898c23fe4e0bd455c8

  • \Users\Admin\AppData\Local\Temp\4E7E.tmp

    Filesize

    11.0MB

    MD5

    bd670fcd41f77f519213dfad74496e87

    SHA1

    ee77369da0985f2c7c863bece458b2ea60154cc8

    SHA256

    a8c6b192ca4f2e208630d561ca88a9d5902afb050bcedbccecba0e3206eaef40

    SHA512

    b1f055076120b51e9918c0cb2fca4943112685ec662d76a459680392dff5d3edfcc6a2576edf45ddd247b879ba5fe0b64c17ea556daa48928ef99058af85c683

  • \Users\Admin\AppData\Local\Temp\56E6.tmp

    Filesize

    5.1MB

    MD5

    60257d20f671ce60bf30f39ebca42d02

    SHA1

    7d8c6e454140821b7e85d497dbc14b1d56808f17

    SHA256

    471faea5db86fa98c6136057d3b1f12d21d71b6e65dd160a18cf15958f4b8f88

    SHA512

    588cf87845edecf3ceafb94ba7e487dd6e143fe63c571df37e2804bb5c5cac97cf1e0a8a068a648532a9a5d5a24f470ab685e724ba56f5bb11a2dc950a20c3af

  • \Users\Admin\AppData\Local\Temp\56E6.tmp

    Filesize

    2.5MB

    MD5

    5b5082358caeceaf9594071b6f758c8e

    SHA1

    174dd5e6b192928cb98fc9a69f23012cc5bf3b08

    SHA256

    159e684614112e5675ecb05feb09e2d78763d2ee4315ce478de55d3612bf0724

    SHA512

    bc97f86a3b6d7d471bfb6a6d61a6c20e159a2a4904b3d49bfad0007e73cc0dd1714a7f06b3481ec7a510b9412fd8ce490db7b0da6dc69e14a852c62f08b264b1

  • \Users\Admin\AppData\Local\Temp\56E6.tmp

    Filesize

    10.3MB

    MD5

    d26a10f1d736b6f3e8950ac87e08b073

    SHA1

    52377ff734ab8ecfbc77ff3f953ac5d187dfb8fe

    SHA256

    78b4db9798882b192bcf43f41655c8debdab5f295e7cd2429657c6022a1a7f98

    SHA512

    1bc265b8f50dd332b58761b443faac71382d743bfdfc61e2bce1225714cb6364e40bffb2c92fa869df9e8e64efd3c52a78cc33d18011d1586d4f00bebdf3157e

  • \Users\Admin\AppData\Local\Temp\59A6.tmp

    Filesize

    324KB

    MD5

    bf9f6045d47dd87ae6d41fc7b5485506

    SHA1

    462184bdd3c143f70ff7e9553966cb3d63b7cd12

    SHA256

    f4cc03a26f2d13a41a86da8629b5d5c80a9ea586b6ba044e952b1972ab013440

    SHA512

    bce57892b7cc2f44dae9eed0113530775f64e16d2846e6f08b10d76b9829e0885a94d816bf84d20ee5751ae3d3c536b6a9e6a75b4f95197d6317b032a839b605

  • \Users\Admin\AppData\Local\Temp\sciter.dll

    Filesize

    5.0MB

    MD5

    9d23e2946b37a886dd9b5ce146cdd280

    SHA1

    ac82352e5ef3988dd53403a9552bf9c4bc5162d3

    SHA256

    9fabfffee8ef815f6e0f34c8909597ddf360ebff061151f18365202b774ceb20

    SHA512

    872951f7ed72422e05e5957ab7bd274fdae2fba465b3177bba4b0dd1f1c7b047d7684977f7ad51fa79dd98b30b30dc6e52eac424798c31ae0e0fe31961b682a5

  • memory/2616-98-0x0000000000D00000-0x000000000174F000-memory.dmp

    Filesize

    10.3MB