Analysis

  • max time kernel
    150s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20/09/2024, 08:43

General

  • Target

    ed3ae0057a325f3001da26fb75886b1e_JaffaCakes118.exe

  • Size

    484KB

  • MD5

    ed3ae0057a325f3001da26fb75886b1e

  • SHA1

    f1ce0dd833a9af4e97cd1f1bbbe6358ff1c40660

  • SHA256

    b7dd05c858d1ceee2b84c51c01b029855ae08881e89205917ff9b51f916503e8

  • SHA512

    19433f8447831f217024402bec52573f249d63553e9b8e3da501204b028e62e978d9b48b5136f40bb8bd32eebe32eae67ebf07c8f8e50ad133cbb52b3f8d6423

  • SSDEEP

    12288:WP9GBWQch+L/ZgHP+v7xK0DmFwUfIp7JVyvWt1aBnSFAPHzeO:WPoBHch+uudKNffiv1aVSaPTeO

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 14 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 10 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 52 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 15 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\csrss.exe
    %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16
    1⤵
    • Executes dropped EXE
    • Drops desktop.ini file(s)
    • Suspicious use of UnmapMainImage
    PID:332
  • C:\Users\Admin\AppData\Local\Temp\ed3ae0057a325f3001da26fb75886b1e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ed3ae0057a325f3001da26fb75886b1e_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2656
    • C:\Users\Admin\AppData\Local\Temp\ed3ae0057a325f3001da26fb75886b1e_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\ed3ae0057a325f3001da26fb75886b1e_JaffaCakes118.exe"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1400
      • C:\Users\Admin\V6oUpCF0mC.exe
        C:\Users\Admin\V6oUpCF0mC.exe
        3⤵
        • Modifies visiblity of hidden/system files in Explorer
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2760
        • C:\Users\Admin\wooul.exe
          "C:\Users\Admin\wooul.exe"
          4⤵
          • Modifies visiblity of hidden/system files in Explorer
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          PID:2828
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c tasklist&&del V6oUpCF0mC.exe
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2636
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            5⤵
            • Enumerates processes with tasklist
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:2480
      • C:\Users\Admin\ayhost.exe
        C:\Users\Admin\ayhost.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1564
        • C:\Users\Admin\ayhost.exe
          "C:\Users\Admin\ayhost.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          PID:1372
      • C:\Users\Admin\byhost.exe
        C:\Users\Admin\byhost.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:808
        • C:\Users\Admin\byhost.exe
          "C:\Users\Admin\byhost.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2824
          • C:\Windows\explorer.exe
            0000003C*
            5⤵
            • Modifies registry class
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2536
      • C:\Users\Admin\cyhost.exe
        C:\Users\Admin\cyhost.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1048
        • C:\Users\Admin\cyhost.exe
          C:\Users\Admin\cyhost.exe startC:\Users\Admin\AppData\Roaming\conhost.exe%C:\Users\Admin\AppData\Roaming
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:1972
        • C:\Users\Admin\cyhost.exe
          C:\Users\Admin\cyhost.exe startC:\Users\Admin\AppData\Local\Temp\dwm.exe%C:\Users\Admin\AppData\Local\Temp
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2680
      • C:\Users\Admin\dyhost.exe
        C:\Users\Admin\dyhost.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2504
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c tasklist&&del ed3ae0057a325f3001da26fb75886b1e_JaffaCakes118.exe
        3⤵
        • Deletes itself
        • System Location Discovery: System Language Discovery
        PID:2700
        • C:\Windows\SysWOW64\tasklist.exe
          tasklist
          4⤵
          • Enumerates processes with tasklist
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:2188
  • C:\Windows\system32\DllHost.exe
    C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
    1⤵
    • Loads dropped DLL
    PID:2076
  • C:\Windows\system32\wbem\wmiprvse.exe
    C:\Windows\system32\wbem\wmiprvse.exe -Embedding
    1⤵
      PID:2076

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\C41B.872

      Filesize

      600B

      MD5

      e3eabe5409f097b64a941ee987ccad71

      SHA1

      c72b69a98eed296e95f1b9400a81f08e772ca627

      SHA256

      6167b0e3118a800f5356431f0e3c1bed2d00c8c47bc8e1dd0d1e23955e9de0be

      SHA512

      474151bc44c54653260f4c3739028ebab2e753c5096c64aa179a2bb103dd73fa32de152f497b85f190f9dd6a754045fcdd2fb089b1374b3d93f1704506ddae31

    • C:\Users\Admin\AppData\Roaming\C41B.872

      Filesize

      996B

      MD5

      a858470fa3e0c068550f60ff0e2dd0c9

      SHA1

      8afd3e9406901fee379f01593015b8ae2b3535ee

      SHA256

      cd3324e954e8700bf2c2a4a0bedd8ae421bbe6527ec6b3ead50301f7b530e127

      SHA512

      1ed66d4a5a990a074a3d10fdf632762d122c4a64ce32c8fead7d17eec19792cd4bbc8f988dae983fd04cfc7a455fb0eddccdf9f161148413b5b64b77c5b75c9b

    • C:\Users\Admin\AppData\Roaming\C41B.872

      Filesize

      1KB

      MD5

      c9b97db87f73c4e01304370237286cea

      SHA1

      d230231a034cdefd6a2377f55d81b57a7dec0371

      SHA256

      47853b933476dd66388b2a79f32b8e427e36e5d39218880674e06ff18324224e

      SHA512

      732dc379d82e5751c5adad25a0e095ceee96a3d721175c84f03872d6685c29693343117ef762005e48a222f232a4c21301436e91447265268da72398670c8a4c

    • C:\Windows\system32\consrv.DLL

      Filesize

      53KB

      MD5

      68689b2e7472e2cfb3f39da8a59505d9

      SHA1

      5be15784ab1193dc13ac24ec1efcabded5fe2df4

      SHA256

      f304eb2cf6479a4fb36fef81c6df4d0225e251002e8f06f26ee196210bf3d168

      SHA512

      269999061cd54b23b92d385689682e687ae9030bc5d26d79dd5e99f72fa4b4eef41f5a7b555325bd558771db92e2feb8a67fb40c87223be9e23ccb498b3bbc88

    • \Users\Admin\V6oUpCF0mC.exe

      Filesize

      332KB

      MD5

      b96dc0230580570446ab648e20a7e3b3

      SHA1

      27483df87ef7093d51062fb2d2fc9944f94c23fb

      SHA256

      2c65220c1c3ec6cb3282759e1d583b598ad43bf09484239325ae06b961bf0af0

      SHA512

      b8dd8743eb45f9dcc0d74b5cf450ef2950482e5c33dcdb5ab9494ad2e396d7ea5ebd80d477fca52a25a46cede6e2c31eb2647612090fda72d7e61e49913c042f

    • \Users\Admin\ayhost.exe

      Filesize

      68KB

      MD5

      2c7c2d4e9c03a1818621def0e1281a81

      SHA1

      c92b29a7f6e9998c7a86b9b57cff15f28647a127

      SHA256

      9fb6cf502b6a872ed2e58666672db9fdc0eb57e6ff5a5677b6dbc8de42193f3e

      SHA512

      431cadf9b1d4de1dd0c5efebd5bae2af2ac0f6c98a2d71a5f7bc72e2421ecf77d67616d805bb643680192de6c8921e894a48a538276492567524c4267a4e4a66

    • \Users\Admin\byhost.exe

      Filesize

      136KB

      MD5

      1d0f81b6e185ec95e716d2a0b2ba69a1

      SHA1

      09399ffa69ae8bfd9794104bc4b7b4f481980e3a

      SHA256

      abe89315434ce50001a90c9bdd662a0c42fa90d95acdf5baed5823d760e4f878

      SHA512

      6c4ecc1346bfc9952d7a1a2cb30ed5076bec24db099bb3fe20a248b19f56c075ff592d03100a1a3660ad5f47dfaff6a64b6b2bebe1bcbc7ce747f968a4c7e6b1

    • \Users\Admin\cyhost.exe

      Filesize

      168KB

      MD5

      234bf3937f8fe09351acc53c059b40d2

      SHA1

      256f162b65eacc7a1fee35722fbfdbd55bba93c7

      SHA256

      86c568452305c3943eb7d1530cef65c75f6fac39d178082783db8b12fc8eef2b

      SHA512

      6c768729abebd0b9bde9712ee827262c433ac928bb638b9176ef7f4085c2d2b4fdfa3cacffdb7da477d23a1e0ce32e63cba2ab9ace1f45dfcc8109b2c68812b7

    • \Users\Admin\dyhost.exe

      Filesize

      24KB

      MD5

      9814ec05c8857737f599ba75b1610fb1

      SHA1

      aa9d9b016c2feda03cf6ad1bbca332070eb9b295

      SHA256

      a68f44fa166ade605dfd2e5827a8ca3fa21141eda423c096d1f41d9bf172e597

      SHA512

      c9daf5d8015ab4d5e0c333b986e04a917a596aef6d61baf43f53e5da346e3e665cd16eb5da35726713689dca991a03fbfa137b7f3f879c77779a477a89a0268d

    • \Users\Admin\wooul.exe

      Filesize

      332KB

      MD5

      18ed09660482f2468aafb6f28cad166b

      SHA1

      3554d28a63e3c21b862fb3f6636a28739a643928

      SHA256

      1e2a0bbc12ed437ca58dead0138747268dc66e90e32eefabc8fbe8bde7ed53dc

      SHA512

      5c156490a8164081c9462dad756d0fb3432a2bf9e28b1c7fcc7cb6c59b76f5f541005ed011576d869c6f4dfe2893888aa2c86874f04330798bb3dc7f5b0a0700

    • \Windows\assembly\GAC_32\Desktop.ini

      Filesize

      4KB

      MD5

      ff7d5ec20bf73c02317e7a740fffe018

      SHA1

      365ac8cfe5b939854cc1c341caf051bcc45f9372

      SHA256

      1e230847d7034f5ab3bf010f569315e00673859af0574fc9f915636ed905779a

      SHA512

      30854c0d703fd7c6cbc0769d9be4125baa2577ec529d5e48177a434685b66752fd79c50f0321324e23eeb985738f403347748afefae7d8a3bfad388a5b512a44

    • \Windows\assembly\GAC_64\Desktop.ini

      Filesize

      5KB

      MD5

      3e7a118b119428247edfc5d5ef3761bc

      SHA1

      140e4cb00107678160411f016c4c17611580a209

      SHA256

      97c19f4103a16798202e50a501375d0bf3d7ec1bb654dda230337e85b01b1ec5

      SHA512

      b0e27a4d7aa62f937f275b9f413f75857846ae670bf3aed6e55c1db865485fda89e33dcdffa02ae2ab25f48d5f63f869232f9e6d69f9cdc8a5c93f39de09a925

    • memory/332-122-0x0000000000A60000-0x0000000000A72000-memory.dmp

      Filesize

      72KB

    • memory/808-95-0x0000000000400000-0x0000000000422000-memory.dmp

      Filesize

      136KB

    • memory/1048-147-0x0000000000400000-0x0000000000448000-memory.dmp

      Filesize

      288KB

    • memory/1372-69-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB

    • memory/1372-63-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB

    • memory/1372-57-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB

    • memory/1372-55-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB

    • memory/1372-53-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB

    • memory/1372-61-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB

    • memory/1372-70-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB

    • memory/1372-66-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB

    • memory/1372-59-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB

    • memory/1400-12-0x0000000000400000-0x00000000004BE000-memory.dmp

      Filesize

      760KB

    • memory/1400-11-0x0000000000400000-0x00000000004BE000-memory.dmp

      Filesize

      760KB

    • memory/1400-7-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/1400-128-0x0000000000400000-0x00000000004BE000-memory.dmp

      Filesize

      760KB

    • memory/1400-4-0x0000000000400000-0x00000000004BE000-memory.dmp

      Filesize

      760KB

    • memory/1400-14-0x0000000000400000-0x00000000004BE000-memory.dmp

      Filesize

      760KB

    • memory/1400-6-0x0000000000400000-0x00000000004BE000-memory.dmp

      Filesize

      760KB

    • memory/1400-9-0x0000000000400000-0x00000000004BE000-memory.dmp

      Filesize

      760KB

    • memory/1400-342-0x0000000000400000-0x00000000004BE000-memory.dmp

      Filesize

      760KB

    • memory/1400-2-0x0000000000400000-0x00000000004BE000-memory.dmp

      Filesize

      760KB

    • memory/1972-136-0x0000000000400000-0x0000000000448000-memory.dmp

      Filesize

      288KB

    • memory/2536-109-0x0000000000130000-0x0000000000149000-memory.dmp

      Filesize

      100KB

    • memory/2536-104-0x0000000000130000-0x0000000000149000-memory.dmp

      Filesize

      100KB

    • memory/2536-99-0x0000000000130000-0x0000000000149000-memory.dmp

      Filesize

      100KB

    • memory/2824-87-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/2824-83-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/2824-85-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/2824-89-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/2824-92-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/2824-94-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/2824-81-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB