Analysis

  • max time kernel
    140s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240910-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2024, 17:36

General

  • Target

    ebdafddf0e3e0e943015f856a95c4496_JaffaCakes118.exe

  • Size

    949KB

  • MD5

    ebdafddf0e3e0e943015f856a95c4496

  • SHA1

    166713b75e645432bc59a95894cf68bb4022b0e6

  • SHA256

    ed0eea95deff05ebcc0d8365ebb50de8079c287b388adfd3593e21fbe5585fe8

  • SHA512

    d19a941da96be1d9ef3e2759655a10fd457835ddd452eb3258264d5539a5286bd851886fa52a187b8fcee16841bc4aa87a4920b1c44115ac2913f9a4c49ba0bf

  • SSDEEP

    12288:jTJc8ZqtVOXenNQaeRJLKP1sYBlYWf81N2KkEu1jjcbpoxvDU4fg8MZUC:jXqtVOiNXe6PGYlY6u5UjGpoxvAZUC

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 13 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ebdafddf0e3e0e943015f856a95c4496_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ebdafddf0e3e0e943015f856a95c4496_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4072
    • C:\Users\Admin\AppData\Local\Temp\MPQEditor.exe
      "C:\Users\Admin\AppData\Local\Temp\MPQEditor.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:324
    • C:\Users\Admin\AppData\Local\Temp\pinch3.exe
      "C:\Users\Admin\AppData\Local\Temp\pinch3.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3712

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\MPQEditor.exe

          Filesize

          916KB

          MD5

          1fc8a3367df99ebe15e3674fbd2780ae

          SHA1

          ce29cac5d7e0ad0ced0b26cc14087e6252ef67be

          SHA256

          e0abdb8ee18457cd5fc7b4290b9487d026e5d7870d614e035553e93c3ddeee51

          SHA512

          e69a4e19ab6e91ff69dfa4492807badd0e29bb40ecf92d9cd6d975b926517d593901f21b26c82ebbaa5c961b99272b3471363be8db19e2d3ab9a1d301e07dba9

        • C:\Users\Admin\AppData\Local\Temp\pinch3.exe

          Filesize

          31KB

          MD5

          a13e5916b21dcd61b76a8d71f91941a5

          SHA1

          34858fb4dbd2d2d236323f0bbb1037bc6ab17526

          SHA256

          fe1eae6aba248cbb073904cd3416771b467114339c3d95ff3f4084fa57c54752

          SHA512

          29d6e5bbc1cdd30110e5f2c21a21c2733f620c72570a4c2dc3d58a97639aef3e59dd32f142eb0d8b6d0204e4e94c6c890e39377082f619ec94fcac111b923267

        • memory/3712-20-0x00000000001C0000-0x00000000001C1000-memory.dmp

          Filesize

          4KB

        • memory/3712-19-0x0000000013140000-0x0000000013184000-memory.dmp

          Filesize

          272KB

        • memory/3712-21-0x00000000001C0000-0x00000000001C1000-memory.dmp

          Filesize

          4KB

        • memory/3712-22-0x0000000013140000-0x0000000013184000-memory.dmp

          Filesize

          272KB