Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 05:47

General

  • Target

    eab2df02d7c5647e4b2838349d81f7d2_JaffaCakes118.exe

  • Size

    845KB

  • MD5

    eab2df02d7c5647e4b2838349d81f7d2

  • SHA1

    f10d2e0ed5c13f04190cc141b51f1f60368f8164

  • SHA256

    e6c88149ac0c62690a6416eb46c5af8f790c2f25da974737ae7cb196e40b5f2b

  • SHA512

    5bbae44eb653d659528df12ba81022df23f055dff81fa45cff6ea1fecb8aaa87e23a46ce7f004c904251d62344f5a28e1364db523abb9e62fafa5c03feb96cac

  • SSDEEP

    24576:1fUT67H4f6l1iIf9mT9SiwDzZr+pHlgQzlxn68bpVFnh:1fi6LJ/5nZr+VlgQzlxhFVFnh

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of FindShellTrayWindow 9 IoCs
  • Suspicious use of SendNotifyMessage 9 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eab2df02d7c5647e4b2838349d81f7d2_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\eab2df02d7c5647e4b2838349d81f7d2_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2968
    • C:\ProgramData\isecurity.exe
      C:\ProgramData\isecurity.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Enumerates connected drives
      • Writes to the Master Boot Record (MBR)
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:2820

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \ProgramData\isecurity.exe

    Filesize

    840KB

    MD5

    f51011d03e45d9b3a68940ce3d6d90f3

    SHA1

    b77669e69f8be58f18cd6771cc3862cd02d62963

    SHA256

    e7465c386bf4c717dc457062e438920fbaec75cf20473d71403def2e531a391e

    SHA512

    adab8c7cbf9cb8be7f43f651d5664e9e3d989cf81b1167897ecbeb890d10a8a432561e129109b28213844e5e836a5390b895112fc3bc1e192a97ed1e1c765724

  • memory/2820-30-0x0000000000400000-0x0000000000A33000-memory.dmp

    Filesize

    6.2MB

  • memory/2820-19-0x0000000000400000-0x0000000000A33000-memory.dmp

    Filesize

    6.2MB

  • memory/2820-31-0x0000000000400000-0x0000000000A33000-memory.dmp

    Filesize

    6.2MB

  • memory/2820-46-0x0000000000400000-0x0000000000A33000-memory.dmp

    Filesize

    6.2MB

  • memory/2820-32-0x0000000000400000-0x0000000000A33000-memory.dmp

    Filesize

    6.2MB

  • memory/2820-20-0x0000000000400000-0x0000000000A33000-memory.dmp

    Filesize

    6.2MB

  • memory/2820-23-0x0000000000400000-0x0000000000A33000-memory.dmp

    Filesize

    6.2MB

  • memory/2820-22-0x0000000000400000-0x0000000000A33000-memory.dmp

    Filesize

    6.2MB

  • memory/2820-24-0x0000000000400000-0x0000000000A33000-memory.dmp

    Filesize

    6.2MB

  • memory/2820-25-0x0000000000400000-0x0000000000A33000-memory.dmp

    Filesize

    6.2MB

  • memory/2820-27-0x0000000000400000-0x0000000000A33000-memory.dmp

    Filesize

    6.2MB

  • memory/2820-33-0x0000000000400000-0x0000000000A33000-memory.dmp

    Filesize

    6.2MB

  • memory/2820-29-0x0000000000400000-0x0000000000A33000-memory.dmp

    Filesize

    6.2MB

  • memory/2820-45-0x0000000000400000-0x0000000000A33000-memory.dmp

    Filesize

    6.2MB

  • memory/2820-44-0x0000000000400000-0x0000000000A33000-memory.dmp

    Filesize

    6.2MB

  • memory/2820-43-0x0000000000400000-0x0000000000A33000-memory.dmp

    Filesize

    6.2MB

  • memory/2820-28-0x0000000000400000-0x0000000000A33000-memory.dmp

    Filesize

    6.2MB

  • memory/2820-34-0x0000000000400000-0x0000000000A33000-memory.dmp

    Filesize

    6.2MB

  • memory/2820-36-0x0000000000400000-0x0000000000A33000-memory.dmp

    Filesize

    6.2MB

  • memory/2820-37-0x0000000000400000-0x0000000000A33000-memory.dmp

    Filesize

    6.2MB

  • memory/2820-38-0x0000000000400000-0x0000000000A33000-memory.dmp

    Filesize

    6.2MB

  • memory/2820-39-0x0000000000400000-0x0000000000A33000-memory.dmp

    Filesize

    6.2MB

  • memory/2820-40-0x0000000000400000-0x0000000000A33000-memory.dmp

    Filesize

    6.2MB

  • memory/2820-41-0x0000000000400000-0x0000000000A33000-memory.dmp

    Filesize

    6.2MB

  • memory/2820-42-0x0000000000400000-0x0000000000A33000-memory.dmp

    Filesize

    6.2MB

  • memory/2968-0-0x00000000004F5000-0x00000000004F7000-memory.dmp

    Filesize

    8KB

  • memory/2968-5-0x0000000000400000-0x0000000000506000-memory.dmp

    Filesize

    1.0MB

  • memory/2968-4-0x0000000000400000-0x0000000000506000-memory.dmp

    Filesize

    1.0MB

  • memory/2968-1-0x0000000000400000-0x0000000000506000-memory.dmp

    Filesize

    1.0MB