Analysis

  • max time kernel
    93s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/09/2024, 07:29

General

  • Target

    dc12df8dbe0c7165ed620933bc343a97_JaffaCakes118.exe

  • Size

    320KB

  • MD5

    dc12df8dbe0c7165ed620933bc343a97

  • SHA1

    5da83bc5c013c107ef648eb560f17f08fb416d16

  • SHA256

    269c1b4bd1ba6d520b0e8da5177e03f4474c85a452563c777d43fd06225f51bd

  • SHA512

    4b679a53bddb91d50e43c736f44dabf4d1c6986943751b32cc43daf99b8d6ba28b8bbc102c271d25f6ba62fcaea5d64156cc3e4c254491038649548582d3898a

  • SSDEEP

    6144:I4lRkAehaKuqT+FDlpmrpad7P52JW4Vj3OeH2GgN72RoODr:IkWAehJuqT6pmtadD5qVj3YOV/

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 3 IoCs
  • Drops file in Program Files directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies Internet Explorer start page 1 TTPs 1 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dc12df8dbe0c7165ed620933bc343a97_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\dc12df8dbe0c7165ed620933bc343a97_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4512
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\JustClicking\home.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4708
      • C:\Windows\SysWOW64\reg.exe
        reg add HKLM\software\Microsoft\Windows\CurrentVersion\Run /v "WebSite" /t REG_SZ /d "C:\Program Files (x86)\JustClicking\JustClicking.exe" /f
        3⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Modifies registry key
        PID:4396
      • C:\Program Files (x86)\JustClicking\JustClicking.exe
        JustClicking.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Modifies Internet Explorer start page
        PID:2664
      • C:\Program Files (x86)\JustClicking\dll.exe
        dll.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:4496

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\JustClicking\JustClicking.exe

    Filesize

    565KB

    MD5

    056389adb8409ea9557313e95c465d89

    SHA1

    12b3226f2d94de916f43dd7c2299595af5462c38

    SHA256

    07726da66b65fa5765eaa1ae2b6252ab1372fe3c3e5234ea18f329d789787665

    SHA512

    796947830e4f0ad8b31e763584b5f41c27042f99e1a8fbca87fc05ccda2d33041b91c7cbb2a8f844e8299a852da0d047131b6ce4d3b4446b40cfdd00fe05f2da

  • C:\Program Files (x86)\JustClicking\dll.exe

    Filesize

    156KB

    MD5

    5d003f891fb747a0343640fba040a38f

    SHA1

    4e75325ad5edb3ca6ded501c92c0f4aced4a5873

    SHA256

    12a2803eff682e62a816571a40dfcb9418d56e8f19e0459d55eb117d37a10d6c

    SHA512

    5ed39c3297dc2df4febe1fdd7bffff04a11d4b23cac38e30ac57c8ae81e208461fd85c5bac34d48049bc7684621cac003c5deacbe0fc4eb410aefb29ca00470c

  • C:\Program Files (x86)\JustClicking\home.bat

    Filesize

    173B

    MD5

    e9b8196ebbf61f2af27aa6a503015fb5

    SHA1

    27ac0c3bff72609ea3c5b0bd6fd338965c08ada8

    SHA256

    825214610a812300ce3e8f13b175b1ae40f80ac99edb67f9c58eb7730433fee2

    SHA512

    a09d5a5af64fd632906082c94ddbb90212a57be14aaf6f8399051878758447c5fdb221e8965dc0c4b5ee76d5f825dc0ed474f721b83f3978ea32e2e73e9f3115

  • memory/2664-21-0x0000000000400000-0x0000000000493000-memory.dmp

    Filesize

    588KB

  • memory/4496-15-0x0000000073122000-0x0000000073123000-memory.dmp

    Filesize

    4KB

  • memory/4496-18-0x0000000004800000-0x0000000004803000-memory.dmp

    Filesize

    12KB

  • memory/4496-19-0x0000000073120000-0x00000000736D1000-memory.dmp

    Filesize

    5.7MB

  • memory/4496-17-0x0000000004800000-0x0000000004803000-memory.dmp

    Filesize

    12KB

  • memory/4496-22-0x0000000073122000-0x0000000073123000-memory.dmp

    Filesize

    4KB

  • memory/4496-23-0x0000000073120000-0x00000000736D1000-memory.dmp

    Filesize

    5.7MB

  • memory/4496-26-0x0000000073120000-0x00000000736D1000-memory.dmp

    Filesize

    5.7MB