Analysis

  • max time kernel
    142s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/09/2024, 09:05

General

  • Target

    ed43af7b193ed81c6e26a32b94e85059_JaffaCakes118.exe

  • Size

    207KB

  • MD5

    ed43af7b193ed81c6e26a32b94e85059

  • SHA1

    8967043155e61090caa4f1ba6b52395c1da08f17

  • SHA256

    10887d73d64c6dddaf82a238733c5b6846b596bc74038a16b963c5c08e9136bd

  • SHA512

    251902a4332ef45676a11d0c8563b0752405075a6eab2239f818aa9a8db1bbd691cfe48d3d9cd6daf44c8c0a11b60deb52aff856328e00299f89d7b938523584

  • SSDEEP

    3072:DG6kSNbTtLW5D8+vIyNsHNwWSSqS7fp8ECaPKbIwzq+aFdLO388SxOjbUj6wSzOZ:xNbTtLW5Dp2HNwKY+Kb6gUtvIU

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.gmail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Javadrive123

Signatures

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ed43af7b193ed81c6e26a32b94e85059_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ed43af7b193ed81c6e26a32b94e85059_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:4104

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4104-0-0x00007FFDAF035000-0x00007FFDAF036000-memory.dmp

    Filesize

    4KB

  • memory/4104-1-0x000000001B240000-0x000000001B2E6000-memory.dmp

    Filesize

    664KB

  • memory/4104-2-0x00007FFDAED80000-0x00007FFDAF721000-memory.dmp

    Filesize

    9.6MB

  • memory/4104-3-0x000000001B7C0000-0x000000001BC8E000-memory.dmp

    Filesize

    4.8MB

  • memory/4104-4-0x000000001BD40000-0x000000001BDDC000-memory.dmp

    Filesize

    624KB

  • memory/4104-5-0x0000000000D80000-0x0000000000D88000-memory.dmp

    Filesize

    32KB

  • memory/4104-6-0x00007FFDAED80000-0x00007FFDAF721000-memory.dmp

    Filesize

    9.6MB

  • memory/4104-7-0x000000001BEA0000-0x000000001BEEC000-memory.dmp

    Filesize

    304KB

  • memory/4104-8-0x00007FFDAED80000-0x00007FFDAF721000-memory.dmp

    Filesize

    9.6MB

  • memory/4104-9-0x00007FFDAED80000-0x00007FFDAF721000-memory.dmp

    Filesize

    9.6MB

  • memory/4104-10-0x00007FFDAF035000-0x00007FFDAF036000-memory.dmp

    Filesize

    4KB

  • memory/4104-11-0x00007FFDAED80000-0x00007FFDAF721000-memory.dmp

    Filesize

    9.6MB

  • memory/4104-12-0x00007FFDAED80000-0x00007FFDAF721000-memory.dmp

    Filesize

    9.6MB

  • memory/4104-13-0x00007FFDAED80000-0x00007FFDAF721000-memory.dmp

    Filesize

    9.6MB

  • memory/4104-14-0x0000000020670000-0x00000000206D2000-memory.dmp

    Filesize

    392KB

  • memory/4104-15-0x00007FFDAED80000-0x00007FFDAF721000-memory.dmp

    Filesize

    9.6MB

  • memory/4104-21-0x00007FFDAED80000-0x00007FFDAF721000-memory.dmp

    Filesize

    9.6MB

  • memory/4104-23-0x00007FFDAED80000-0x00007FFDAF721000-memory.dmp

    Filesize

    9.6MB

  • memory/4104-22-0x00007FFDAED80000-0x00007FFDAF721000-memory.dmp

    Filesize

    9.6MB

  • memory/4104-24-0x00007FFDAED80000-0x00007FFDAF721000-memory.dmp

    Filesize

    9.6MB

  • memory/4104-25-0x00007FFDAED80000-0x00007FFDAF721000-memory.dmp

    Filesize

    9.6MB