Analysis

  • max time kernel
    150s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/09/2024, 18:46

General

  • Target

    d6e5818176c47b965f8287f7c8239d19_JaffaCakes118.exe

  • Size

    152KB

  • MD5

    d6e5818176c47b965f8287f7c8239d19

  • SHA1

    c8d6a923c2efae5c7dad3026f2ce7b3f12950d3e

  • SHA256

    e6fffaa62c9104dea538908099a00122da7151b0d614d6f88270df3e091988fb

  • SHA512

    c0d79254254638902674e7f6bbf38e120f86fed99fb031e75bd65ec6a004ec98f3bf76749317b33017a9427f96f38cb45cc52c5554cbfca97f0f303460090fc4

  • SSDEEP

    1536:RG3uieHXmXYiptXxmnQu8M7trSLgd7mRQG5B1pwlizWzbt5:guie3gvpBMnp57teLgd7mv5npwt5

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.gmail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    legendkiller

Signatures

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d6e5818176c47b965f8287f7c8239d19_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d6e5818176c47b965f8287f7c8239d19_JaffaCakes118.exe"
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2656
    • C:\Temp\Install\svchost.exe
      "C:\Temp\Install\svchost.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:2160

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Temp\Install\svchost.exe

    Filesize

    152KB

    MD5

    d6e5818176c47b965f8287f7c8239d19

    SHA1

    c8d6a923c2efae5c7dad3026f2ce7b3f12950d3e

    SHA256

    e6fffaa62c9104dea538908099a00122da7151b0d614d6f88270df3e091988fb

    SHA512

    c0d79254254638902674e7f6bbf38e120f86fed99fb031e75bd65ec6a004ec98f3bf76749317b33017a9427f96f38cb45cc52c5554cbfca97f0f303460090fc4

  • memory/2160-32-0x00007FFB876F0000-0x00007FFB88091000-memory.dmp

    Filesize

    9.6MB

  • memory/2160-31-0x00007FFB876F0000-0x00007FFB88091000-memory.dmp

    Filesize

    9.6MB

  • memory/2160-29-0x00007FFB876F0000-0x00007FFB88091000-memory.dmp

    Filesize

    9.6MB

  • memory/2656-6-0x0000000001880000-0x0000000001888000-memory.dmp

    Filesize

    32KB

  • memory/2656-5-0x00007FFB876F0000-0x00007FFB88091000-memory.dmp

    Filesize

    9.6MB

  • memory/2656-0-0x00007FFB879A5000-0x00007FFB879A6000-memory.dmp

    Filesize

    4KB

  • memory/2656-4-0x000000001C9A0000-0x000000001CA3C000-memory.dmp

    Filesize

    624KB

  • memory/2656-13-0x00007FFB876F0000-0x00007FFB88091000-memory.dmp

    Filesize

    9.6MB

  • memory/2656-15-0x00007FFB879A5000-0x00007FFB879A6000-memory.dmp

    Filesize

    4KB

  • memory/2656-16-0x00007FFB876F0000-0x00007FFB88091000-memory.dmp

    Filesize

    9.6MB

  • memory/2656-3-0x000000001C4D0000-0x000000001C99E000-memory.dmp

    Filesize

    4.8MB

  • memory/2656-30-0x00007FFB876F0000-0x00007FFB88091000-memory.dmp

    Filesize

    9.6MB

  • memory/2656-2-0x00007FFB876F0000-0x00007FFB88091000-memory.dmp

    Filesize

    9.6MB

  • memory/2656-1-0x000000001BF50000-0x000000001BFF6000-memory.dmp

    Filesize

    664KB