Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13/09/2024, 21:36

General

  • Target

    def1475d0eaffbd73f85df6968a5dde7_JaffaCakes118.exe

  • Size

    219KB

  • MD5

    def1475d0eaffbd73f85df6968a5dde7

  • SHA1

    6955fa7c6f2d24fa5cfc7a17b190912b5a637be6

  • SHA256

    63d4f3a0bbfb29d7da1e2785a2673b030bd9312c61d5d829cecb8be03137a4dc

  • SHA512

    9af8d09e0443694eaa9e7d83f2d1b90c21451d5af361e0a2e446d20d7b7d016b344a8fe9e10ac6ef537a7ba0be5255b08c3461271d8e3ce538238d57c4a727f4

  • SSDEEP

    6144:wDAO8kn5iBh9aLASgR4dMOiU3SUb6liZwillBq6AfJ:wDAO8kn5iBDaLx/MOP3fb6liykjpAfJ

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 15 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 42 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 36 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 27 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\def1475d0eaffbd73f85df6968a5dde7_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\def1475d0eaffbd73f85df6968a5dde7_JaffaCakes118.exe"
    1⤵
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    PID:1848
  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    PID:3024
  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    PID:2816
  • C:\Windows\system32\dllhost.exe
    C:\Windows\system32\dllhost.exe /Processid:{02D4B3F1-FD88-11D1-960D-00805FC79235}
    1⤵
    • Drops file in Windows directory
    PID:3040
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2780
  • C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"
    1⤵
    • Executes dropped EXE
    • Windows security modification
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2628

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\ose.vir

    Filesize

    284KB

    MD5

    7ffeb68eb174c10b3f48898548a2f2a0

    SHA1

    6a02857cd6c936fe1566969450996e8d2d6af707

    SHA256

    9f120500f86cd50bcfefd660dd2ddd192b7ec6909ec6d910978ed0b7c2d53269

    SHA512

    3a7ee1ab3addb35746241579ab3713520900c8cc3d852532ae26c252b0821351158a0f2b97c8b37197351935c1e284b627912f675fffd0c8c8e5eee30a41627c

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\setup.exe

    Filesize

    1.2MB

    MD5

    81c19480abd4ea36763852ec1ee742d4

    SHA1

    5b9469f27c40c96d6a74de59ed6c4eafcaa1a08a

    SHA256

    bdfe435ad5d00e55ea05332e2de62bd2aafc8bab6ec8925dbc0036226db700cd

    SHA512

    3b71d6dc9d0f8c5d652b75db80078fee37c5e6b71cf1ad744b1b38c4ed553681ad50e6e6aaee8570cfef7c0b831e85b5156b44cb6c3f6d0a79c2ed1a7d1cbe58

  • C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\OSE.EXE

    Filesize

    284KB

    MD5

    3ce02cff55f5decfa38df16330f8ba7c

    SHA1

    f8ea61f04f3406f9287ee0ba5e899f078743feb2

    SHA256

    a93766a726de012b7f8220f5b5c9de338481bef6610dfeb95e65c6891a5cf62e

    SHA512

    96f1cc42c9f59efb9cca8bfec1ed11e1e1ff132c08c32add9562dfa03ccead30d8e348eef4c52502f827c9839b0b37ebc56a0e11bac43ce749f06a3ddb205f13

  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe

    Filesize

    203KB

    MD5

    fc4edf8876633305e658129b25cd0be3

    SHA1

    adee6295b832fa50b336bfc5bf31f0a8d5b8c317

    SHA256

    847cc07a5aa563a09362c6d519c8a3035aec79d7af2e855a8a9c90bdca3ef478

    SHA512

    78de59c47c563b71558db2342224934d0aefb2bf42be12ce4633d8344e5d85919bf6ff479120dbaeac28cf4198b38e6b7cac8980ab61c4a5a47c8b8c10e89b34

  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.log

    Filesize

    1003KB

    MD5

    da974fd178d3e1c2c2170970e2671897

    SHA1

    bd66a102ff468c910143a01cb2a624543b3f4a44

    SHA256

    aece816d0b71a98f1fc177641f64ac933b9c13d0f958bcdedbe0076d36b070da

    SHA512

    3f2326f05eb6c08b15fbdd63a72657ea6b8b978c9d1273edd739d39ffa7043c955318d8fc3e79a16f6b1ecd334111c4e40dc02fc14362599fe8c292d8edeff0e

  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

    Filesize

    234KB

    MD5

    f8cb2617a86cf81897fedca18c0d9fc9

    SHA1

    04ed43c030c7d7e8ff6c92b55ecd5b7a7a2eae62

    SHA256

    2a226d50fa3db785ac5972b78a4a3b80ec5d99b5fc84ec861549efa1aa6b5868

    SHA512

    e67e8428d8114113c50ce92232e7e422745b0078eeb374c1291ea6e0541f6f15f1ec3ec99916440dddce8411d10df655ff224703de9010681ff9470cb61f1bf4

  • \??\c:\program files (x86)\microsoft office\office14\groove.exe

    Filesize

    29.7MB

    MD5

    a2a22699006a9818065fd22d2ef9f5c3

    SHA1

    98086aceada29a0408ec4452ff72a3ee27e1f456

    SHA256

    b980423059b9bd3e38ce3fadcb9042db91cb711b8b918ac97f100ea3ca9356c7

    SHA512

    322ed852055f0803f4c2b97345c286ddb257ef7e148e6c2835173e0c3998394791ab2a38f98c5f8a2c5db8cb19d15adfae94d495f9dc479fbbd1a154080001c4

  • \??\c:\windows\SysWOW64\searchindexer.exe

    Filesize

    562KB

    MD5

    3d34c4c9984ce5687a3bdb186dba1006

    SHA1

    d3b82c8cb50f53b0e436ab4a5891462692314c10

    SHA256

    91ad65a62168a15799ef9080d6c110fcca99149835a22a8582febe80ae1da014

    SHA512

    74dd989dc4d39f043fb16f47d040f0a3e24b7179b3e55e856e1b0fe47af4205a2c7b64fff3b89484374b64b32139eec0bbe40f2215691a8a64725372ad4498bc

  • \??\c:\windows\SysWOW64\svchost.exe

    Filesize

    164KB

    MD5

    613ea99a75c547de3c95118302a2ba79

    SHA1

    6ffeb7890d983a51f3bbd6da3a5a86431639ceaa

    SHA256

    9ef59d6333240643814b20a6160eea6af3f7d14297f7f4618e70af9b8b77fe1d

    SHA512

    8e080f856ce8abb3ddfbd7b860b6ab12012789fc17efbd5c954b99aab138a25a84f061f2f8605359dc52396e9820b9b594be4db6509c7d6684560c732383bc7c

  • memory/1848-0-0x0000000001000000-0x000000000109C000-memory.dmp

    Filesize

    624KB

  • memory/1848-81-0x0000000001000000-0x000000000109C000-memory.dmp

    Filesize

    624KB

  • memory/2628-42-0x000000002E000000-0x000000002E086000-memory.dmp

    Filesize

    536KB

  • memory/2628-82-0x000000002E000000-0x000000002E086000-memory.dmp

    Filesize

    536KB

  • memory/2816-23-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/3024-24-0x0000000010000000-0x0000000010070000-memory.dmp

    Filesize

    448KB

  • memory/3024-11-0x0000000010000000-0x0000000010070000-memory.dmp

    Filesize

    448KB