Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/09/2024, 10:14

General

  • Target

    dffbcb725ff00f7014fd7d7856d527a7_JaffaCakes118.exe

  • Size

    196KB

  • MD5

    dffbcb725ff00f7014fd7d7856d527a7

  • SHA1

    5d03aecc0bc76134c1225d86ebf179f1cc52b573

  • SHA256

    6ad721bd5cafd52c589d3c87c3612303a7573862b28abec8649f5af73583fe07

  • SHA512

    6fce91f74fc79fb288ce0bd2d2a065d8d0fd5f4cdf0081ba691ddcb52a869eb241765ab5b0801941fd98df4012481ba2d657fbed4835455dba51393229532430

  • SSDEEP

    6144:V1qcw5cc7UTKvNA1rxGkqdreVRQmUVCF6:j3IMW1OxGkqdCHQmU4F6

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer Phishing Filter 1 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dffbcb725ff00f7014fd7d7856d527a7_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\dffbcb725ff00f7014fd7d7856d527a7_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4544
    • C:\Recycle.Bin\B6232F3AC2C.exe
      "C:\Recycle.Bin\B6232F3AC2C.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4968
      • C:\Users\Admin\AppData\Local\Temp\XN28925.exe
        "C:\Users\Admin\AppData\Local\Temp\XN28925.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer Phishing Filter
        • Modifies Internet Explorer settings
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4712

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Recycle.Bin\5CBD14A07B115A6

    Filesize

    25KB

    MD5

    0acdcf8c86eacc7a21b7107cf3fdc407

    SHA1

    257a320059881568e23e3bb3f1071b7de272f955

    SHA256

    7708e2ef8125c86c47d8d396a12071caae576b82cc4f14e412a46ec29b2b68c2

    SHA512

    00c03f37e81921efec36d23efa7d7b3b0b23e9e19bea5c6c7182fc292321262e8d203d0f76f2f3754e89170e21ba6fdc5d76530043ff56d665d2c78a4525c00f

  • C:\Recycle.Bin\B6232F3AC2C.exe

    Filesize

    196KB

    MD5

    dffbcb725ff00f7014fd7d7856d527a7

    SHA1

    5d03aecc0bc76134c1225d86ebf179f1cc52b573

    SHA256

    6ad721bd5cafd52c589d3c87c3612303a7573862b28abec8649f5af73583fe07

    SHA512

    6fce91f74fc79fb288ce0bd2d2a065d8d0fd5f4cdf0081ba691ddcb52a869eb241765ab5b0801941fd98df4012481ba2d657fbed4835455dba51393229532430

  • C:\Users\Admin\AppData\Local\Temp\XN28925.exe

    Filesize

    3KB

    MD5

    29090b6b4d6605a97ac760d06436ac2d

    SHA1

    d929d3389642e52bae5ad8512293c9c4d3e4fab5

    SHA256

    98a24f0caf5b578e230e6f1103a5fba6aecb28a9128cad5520fcde546d643272

    SHA512

    9121ec42fa66e14a4fc3932c8dbcc8fb1a93ab9de00da57a82e176faa70b73f6992f8c5e2ab52c02fc28c8f0c59aee73b6fbbd39107db7d15105054f4390e9be

  • memory/4544-71-0x0000000000BC0000-0x0000000000BC1000-memory.dmp

    Filesize

    4KB

  • memory/4544-77-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/4544-4-0x00000000007B0000-0x00000000007B1000-memory.dmp

    Filesize

    4KB

  • memory/4544-9-0x0000000000400000-0x0000000000484000-memory.dmp

    Filesize

    528KB

  • memory/4544-3-0x0000000000400000-0x0000000000484000-memory.dmp

    Filesize

    528KB

  • memory/4544-122-0x0000000077890000-0x00000000778F3000-memory.dmp

    Filesize

    396KB

  • memory/4544-115-0x0000000077890000-0x00000000778F3000-memory.dmp

    Filesize

    396KB

  • memory/4544-113-0x0000000077C72000-0x0000000077C74000-memory.dmp

    Filesize

    8KB

  • memory/4544-2-0x0000000000400000-0x0000000000484000-memory.dmp

    Filesize

    528KB

  • memory/4544-0-0x0000000001490000-0x0000000001570000-memory.dmp

    Filesize

    896KB

  • memory/4544-70-0x0000000077C72000-0x0000000077C74000-memory.dmp

    Filesize

    8KB

  • memory/4544-66-0x0000000000BC0000-0x0000000000BC1000-memory.dmp

    Filesize

    4KB

  • memory/4544-81-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/4544-5-0x00000000007B0000-0x00000000007B1000-memory.dmp

    Filesize

    4KB

  • memory/4544-78-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/4544-79-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/4544-1-0x0000000000400000-0x0000000000484000-memory.dmp

    Filesize

    528KB

  • memory/4544-80-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/4544-82-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/4544-83-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/4544-84-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/4544-86-0x0000000077890000-0x00000000778F3000-memory.dmp

    Filesize

    396KB

  • memory/4544-85-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/4544-87-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/4544-88-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/4544-89-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/4712-65-0x0000000001400000-0x000000000144E000-memory.dmp

    Filesize

    312KB

  • memory/4712-62-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/4712-51-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/4712-47-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/4712-50-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/4712-49-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/4712-48-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/4712-53-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/4712-44-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/4712-43-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/4712-42-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/4712-41-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/4712-40-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/4712-72-0x00000000778A5000-0x00000000778A7000-memory.dmp

    Filesize

    8KB

  • memory/4712-75-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/4712-54-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/4712-55-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/4712-56-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/4712-57-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/4712-58-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/4712-59-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/4712-60-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/4712-61-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/4712-52-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/4712-64-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/4712-45-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/4712-46-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/4712-30-0x0000000001400000-0x000000000144E000-memory.dmp

    Filesize

    312KB

  • memory/4712-76-0x0000000077890000-0x00000000778F3000-memory.dmp

    Filesize

    396KB

  • memory/4712-32-0x0000000001400000-0x000000000144E000-memory.dmp

    Filesize

    312KB

  • memory/4712-25-0x0000000001001000-0x0000000001003000-memory.dmp

    Filesize

    8KB

  • memory/4712-68-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/4712-67-0x0000000001400000-0x000000000144E000-memory.dmp

    Filesize

    312KB

  • memory/4712-38-0x00000000005A0000-0x00000000005A6000-memory.dmp

    Filesize

    24KB

  • memory/4712-33-0x0000000001400000-0x000000000144E000-memory.dmp

    Filesize

    312KB

  • memory/4712-36-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/4712-24-0x0000000001400000-0x000000000144E000-memory.dmp

    Filesize

    312KB

  • memory/4712-28-0x0000000001400000-0x000000000144E000-memory.dmp

    Filesize

    312KB

  • memory/4712-27-0x0000000001400000-0x000000000144E000-memory.dmp

    Filesize

    312KB

  • memory/4712-26-0x0000000001000000-0x0000000001004000-memory.dmp

    Filesize

    16KB

  • memory/4712-109-0x0000000077890000-0x00000000778F3000-memory.dmp

    Filesize

    396KB

  • memory/4712-111-0x0000000077890000-0x00000000778F3000-memory.dmp

    Filesize

    396KB

  • memory/4712-19-0x0000000001400000-0x000000000144E000-memory.dmp

    Filesize

    312KB

  • memory/4712-112-0x0000000077890000-0x00000000778F3000-memory.dmp

    Filesize

    396KB

  • memory/4712-114-0x0000000077890000-0x00000000778F3000-memory.dmp

    Filesize

    396KB

  • memory/4968-18-0x0000000000400000-0x0000000000484000-memory.dmp

    Filesize

    528KB

  • memory/4968-13-0x0000000000400000-0x0000000000484000-memory.dmp

    Filesize

    528KB