Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2024, 07:37

General

  • Target

    eadd1d3013faea5e06d9d3ce5393bb4b_JaffaCakes118.exe

  • Size

    326KB

  • MD5

    eadd1d3013faea5e06d9d3ce5393bb4b

  • SHA1

    45f2b70e18f8799294e46da101fee348dcf8f7d9

  • SHA256

    35ba62dbb97743c00020d0812cad8fac01ccf7d755529d4d7f79f6f8839a92ce

  • SHA512

    2b85f1e9024f64476569b748d322f562536b0a4916ee9f6c0b62765dd036c6e5d52ef4cc0a28b7f87e6b916aab23c910334d48f07bd34e069504b6d679a94df6

  • SSDEEP

    6144:ZyjUca5+gfpUOiZPGTRRNeUK+Lj7fIhP2X4fJDhn5eGeyejVD:ZyYco+gunFGtRNeU7fXX4rmD

Malware Config

Signatures

  • Detected Nirsoft tools 1 IoCs

    Free utilities often used by attackers which can steal passwords, product keys, etc.

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eadd1d3013faea5e06d9d3ce5393bb4b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\eadd1d3013faea5e06d9d3ce5393bb4b_JaffaCakes118.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4224
    • C:\Users\Admin\AppData\Local\Temp\fox.exe
      C:\Users\Admin\AppData\Local\Temp\fox.exe /stext C:\Users\Admin\AppData\Local\Temp\ffpw.txt
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3064

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\fox.exe

    Filesize

    36KB

    MD5

    a714a3b9f83c0eaf066d7547d53aea29

    SHA1

    489bf2afd1176126beff5f8ddf49b83e0a1735a7

    SHA256

    712bffe2f923b80837fc75e915ab3b8e5813533376d045fcd6eeba75216b50c7

    SHA512

    7efc118ad615cf63474daca774b6e20eca3adfcefc8328ff50cdd5c001b4302198a92e046437411c1ca5be2d098e8a3a6ab613c3bbc37b3c4a5eaa91c227e606

  • memory/3064-25-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/3064-21-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/4224-5-0x000000001C490000-0x000000001C52C000-memory.dmp

    Filesize

    624KB

  • memory/4224-3-0x000000001BE70000-0x000000001C33E000-memory.dmp

    Filesize

    4.8MB

  • memory/4224-0-0x00007FFD86055000-0x00007FFD86056000-memory.dmp

    Filesize

    4KB

  • memory/4224-6-0x000000001B8C0000-0x000000001B8C8000-memory.dmp

    Filesize

    32KB

  • memory/4224-7-0x000000001C5F0000-0x000000001C63C000-memory.dmp

    Filesize

    304KB

  • memory/4224-8-0x000000001C6A0000-0x000000001C700000-memory.dmp

    Filesize

    384KB

  • memory/4224-12-0x00007FFD85DA0000-0x00007FFD86741000-memory.dmp

    Filesize

    9.6MB

  • memory/4224-13-0x000000001DD20000-0x000000001DD39000-memory.dmp

    Filesize

    100KB

  • memory/4224-14-0x00007FFD85DA0000-0x00007FFD86741000-memory.dmp

    Filesize

    9.6MB

  • memory/4224-4-0x00007FFD85DA0000-0x00007FFD86741000-memory.dmp

    Filesize

    9.6MB

  • memory/4224-18-0x00007FFD86055000-0x00007FFD86056000-memory.dmp

    Filesize

    4KB

  • memory/4224-20-0x00007FFD85DA0000-0x00007FFD86741000-memory.dmp

    Filesize

    9.6MB

  • memory/4224-2-0x00007FFD85DA0000-0x00007FFD86741000-memory.dmp

    Filesize

    9.6MB

  • memory/4224-22-0x00007FFD85DA0000-0x00007FFD86741000-memory.dmp

    Filesize

    9.6MB

  • memory/4224-23-0x00007FFD85DA0000-0x00007FFD86741000-memory.dmp

    Filesize

    9.6MB

  • memory/4224-24-0x00007FFD85DA0000-0x00007FFD86741000-memory.dmp

    Filesize

    9.6MB

  • memory/4224-1-0x000000001B8F0000-0x000000001B996000-memory.dmp

    Filesize

    664KB