Analysis

  • max time kernel
    150s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 06:38

General

  • Target

    eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe

  • Size

    231KB

  • MD5

    eac650f7a6550a40231f687f69a58ac8

  • SHA1

    1bedd4c2538910b97b38f07d12c26bfc74096add

  • SHA256

    0db71f9a5a8487250e2d1d86f821c7630c02fd05a91f36d3300c504ad4f5a622

  • SHA512

    52c4c07db9e275ad231447f4284861dd9430688a87be42e2988b974fd6b1a4d9fe268d0f3f9ddd8dc822c16e484f228002be8603b62acc00ead1659608a806fb

  • SSDEEP

    6144:79jr0DjekDbKig1zL07MpwNiooLFjfsGa+NDS:ZjrrkDbat07yPFjfsGa+ND

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 15 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 42 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 36 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 27 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe"
    1⤵
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:3064
  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    PID:2744
  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    PID:2920
  • C:\Windows\system32\dllhost.exe
    C:\Windows\system32\dllhost.exe /Processid:{02D4B3F1-FD88-11D1-960D-00805FC79235}
    1⤵
    • Drops file in Windows directory
    PID:2604
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1564
  • C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"
    1⤵
    • Executes dropped EXE
    • Windows security modification
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1372

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\ose.vir

    Filesize

    284KB

    MD5

    7ffeb68eb174c10b3f48898548a2f2a0

    SHA1

    6a02857cd6c936fe1566969450996e8d2d6af707

    SHA256

    9f120500f86cd50bcfefd660dd2ddd192b7ec6909ec6d910978ed0b7c2d53269

    SHA512

    3a7ee1ab3addb35746241579ab3713520900c8cc3d852532ae26c252b0821351158a0f2b97c8b37197351935c1e284b627912f675fffd0c8c8e5eee30a41627c

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\setup.exe

    Filesize

    1.2MB

    MD5

    81c19480abd4ea36763852ec1ee742d4

    SHA1

    5b9469f27c40c96d6a74de59ed6c4eafcaa1a08a

    SHA256

    bdfe435ad5d00e55ea05332e2de62bd2aafc8bab6ec8925dbc0036226db700cd

    SHA512

    3b71d6dc9d0f8c5d652b75db80078fee37c5e6b71cf1ad744b1b38c4ed553681ad50e6e6aaee8570cfef7c0b831e85b5156b44cb6c3f6d0a79c2ed1a7d1cbe58

  • C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\OSE.EXE

    Filesize

    284KB

    MD5

    35e792238c2c59d9b8e6b575e3a9b516

    SHA1

    8b73d5c73792380475d304e07be2f6ac55706bc5

    SHA256

    f9b087c8bb78d0287892f05336dabde198242dd2b8e32f1c3ad2db1a71c3c68b

    SHA512

    b4c113a3528df4f1cf4c0bdb721f0b5e794617a292ad1f8488255b8dc83a755580f5a3f9de5195f7f8513f2dad0bfbea5ca5734a709b055048848be59e0dcfa0

  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe

    Filesize

    203KB

    MD5

    087dbe7da27fcf53037652c6101ce70a

    SHA1

    d29a3af2632e69f4a4f6471df8c659680bf83852

    SHA256

    67b73c5957f711b18bf519f98bead0e608cf52eb51c616aafbbb109cd3277fed

    SHA512

    8674dd325d2ef51659e6c0f017a4517b32ab006d93c8fbafeca43b4c3b79834185d1766e6911e957b37137dda30a73c2d6062d4ba9a8700821f67217650e48b9

  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.log

    Filesize

    1003KB

    MD5

    6db89762066734b4b5fa441026eb1df8

    SHA1

    ed07a63d1b7f68facabaf716bcfb018c252d92ec

    SHA256

    89b1f1f08ac99511e501b3ab36d67e239838c575356d47be8ee67a820c185877

    SHA512

    5429a64e04d0041ededce822686c9f81501817422ec92ea0904165cf9328db6f1e8f39a36e09c350316a8f29ac4286fecc964665a931e0e08ca033d37e522771

  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

    Filesize

    234KB

    MD5

    59166344d56307b7b450f3eaa21ebbba

    SHA1

    7e89de5f40230976bbc99de45591d99242546902

    SHA256

    f3bf680450747a60a9d64723d0708e8f3c9c86c2ad512f3d2b1d3310dd4351b8

    SHA512

    a9b408e420cb832f5ecfa740eb2d2125d724d6bbd8787f28cc788bcb4cb8912cc8005aee4b4071bb6536bf2ae450caa0d1019bfc3e825a1cc4307f85b39a2731

  • \??\c:\program files (x86)\microsoft office\office14\groove.exe

    Filesize

    29.7MB

    MD5

    db88e47e4b1b8d4bd116129e56ca5b5f

    SHA1

    a9ffcb41a127e890084447308798794a21b3a0cb

    SHA256

    81313705da03d0dc4fa196d5445d8947f7fc3277783a8a9c6c2479b17a89062f

    SHA512

    57e5a3523fe7c116cef391bf23ee9e835b672a0211d846251fae04bd247b1b2471567cbe3657d1f678d6060d3f5247557100194e2be1b6b9989233bc088bf2fd

  • \??\c:\windows\SysWOW64\searchindexer.exe

    Filesize

    562KB

    MD5

    00667ad63982a000a85127d935608420

    SHA1

    9bbce5573ccecec25a092b66571aca4c92b9fa8d

    SHA256

    ed09f494fa5d7297b00579d38a1f4a58adca06312c1896f9cb311ccc9f57a74e

    SHA512

    7e706031b2f0c34b2b90a096c88dc6a0bb485b9f4509599abe152a70f47bca0f19bed98884186b2cf54eccf1c60e1c43f869d850aa167b1fc12f42e4bc02eb33

  • \??\c:\windows\SysWOW64\svchost.exe

    Filesize

    164KB

    MD5

    1381db3ff80c093155c262a86d436005

    SHA1

    ea50170b7343fd7c5fa76d350ffd042c8308d05a

    SHA256

    23e003acea3e1a8afc042a2a2c62e0b298022d983721aee3c08bc85431698378

    SHA512

    9072ec2923a870c6df616d253670969ec6ce5665e942ced2b4f2cc874c4dfcd06a5aae236ed3e01d85c2fef174dd46eeab83e2ff3be6e680561f146d2cd5a039

  • memory/1372-42-0x000000002E000000-0x000000002E086000-memory.dmp

    Filesize

    536KB

  • memory/1372-82-0x000000002E000000-0x000000002E086000-memory.dmp

    Filesize

    536KB

  • memory/2744-24-0x0000000010000000-0x0000000010070000-memory.dmp

    Filesize

    448KB

  • memory/2744-11-0x0000000010000000-0x0000000010070000-memory.dmp

    Filesize

    448KB

  • memory/2920-22-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/3064-0-0x0000000001000000-0x0000000001078000-memory.dmp

    Filesize

    480KB

  • memory/3064-81-0x0000000001000000-0x0000000001078000-memory.dmp

    Filesize

    480KB