Analysis

  • max time kernel
    149s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    09/09/2024, 18:46

General

  • Target

    d6e5818176c47b965f8287f7c8239d19_JaffaCakes118.exe

  • Size

    152KB

  • MD5

    d6e5818176c47b965f8287f7c8239d19

  • SHA1

    c8d6a923c2efae5c7dad3026f2ce7b3f12950d3e

  • SHA256

    e6fffaa62c9104dea538908099a00122da7151b0d614d6f88270df3e091988fb

  • SHA512

    c0d79254254638902674e7f6bbf38e120f86fed99fb031e75bd65ec6a004ec98f3bf76749317b33017a9427f96f38cb45cc52c5554cbfca97f0f303460090fc4

  • SSDEEP

    1536:RG3uieHXmXYiptXxmnQu8M7trSLgd7mRQG5B1pwlizWzbt5:guie3gvpBMnp57teLgd7mv5npwt5

Malware Config

Signatures

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d6e5818176c47b965f8287f7c8239d19_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d6e5818176c47b965f8287f7c8239d19_JaffaCakes118.exe"
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2748
    • C:\Temp\Install\svchost.exe
      "C:\Temp\Install\svchost.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:2948

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Temp\Install\svchost.exe

    Filesize

    152KB

    MD5

    d6e5818176c47b965f8287f7c8239d19

    SHA1

    c8d6a923c2efae5c7dad3026f2ce7b3f12950d3e

    SHA256

    e6fffaa62c9104dea538908099a00122da7151b0d614d6f88270df3e091988fb

    SHA512

    c0d79254254638902674e7f6bbf38e120f86fed99fb031e75bd65ec6a004ec98f3bf76749317b33017a9427f96f38cb45cc52c5554cbfca97f0f303460090fc4

  • memory/2748-0-0x000007FEF5DFE000-0x000007FEF5DFF000-memory.dmp

    Filesize

    4KB

  • memory/2748-1-0x000007FEF5B40000-0x000007FEF64DD000-memory.dmp

    Filesize

    9.6MB

  • memory/2748-2-0x000007FEF5B40000-0x000007FEF64DD000-memory.dmp

    Filesize

    9.6MB

  • memory/2748-10-0x000007FEF5B40000-0x000007FEF64DD000-memory.dmp

    Filesize

    9.6MB

  • memory/2748-18-0x000007FEF5B40000-0x000007FEF64DD000-memory.dmp

    Filesize

    9.6MB

  • memory/2948-20-0x000007FEF5B40000-0x000007FEF64DD000-memory.dmp

    Filesize

    9.6MB

  • memory/2948-19-0x000007FEF5B40000-0x000007FEF64DD000-memory.dmp

    Filesize

    9.6MB

  • memory/2948-21-0x000007FEF5B40000-0x000007FEF64DD000-memory.dmp

    Filesize

    9.6MB