Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21/09/2024, 14:38

General

  • Target

    f002bf28f8af3bd6ca14f25f002b5b5a_JaffaCakes118.exe

  • Size

    366KB

  • MD5

    f002bf28f8af3bd6ca14f25f002b5b5a

  • SHA1

    b626e1e77bc2d474a63e3f1873e0ded2d5f07b24

  • SHA256

    9ba560fb26213c307fe1940e9918e0a57d160122c0e4e1531bf4a8f5392bc5ed

  • SHA512

    ceaf4816c2a11fad031c83e8c003e6dc7f6cf855d0f94c9940bb9c0f7ed2f55b830a3833f4eaf75830d8cdc70f95f60637c68027cf68014e6320949a5d2670e6

  • SSDEEP

    6144:YCZ/3sHw0Ecywu3fY+0APPTybbasvDIepNMSqZxXXeWm60yDOrOY+Hk:YMUHTyHrPPTybb5vDFFq8uLk

Malware Config

Signatures

  • Drops file in Drivers directory 2 IoCs
  • Deletes itself 1 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 10 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 43 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1196
      • C:\Users\Admin\AppData\Local\Temp\f002bf28f8af3bd6ca14f25f002b5b5a_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\f002bf28f8af3bd6ca14f25f002b5b5a_JaffaCakes118.exe"
        2⤵
        • Drops file in Drivers directory
        • Adds Run key to start application
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2124
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1904
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2532
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\$$aA68C.bat
          3⤵
          • Deletes itself
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1252
          • C:\Users\Admin\AppData\Local\Temp\f002bf28f8af3bd6ca14f25f002b5b5a_JaffaCakes118.exe
            "C:\Users\Admin\AppData\Local\Temp\f002bf28f8af3bd6ca14f25f002b5b5a_JaffaCakes118.exe"
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:2892
        • C:\Windows\Logo1_.exe
          C:\Windows\Logo1_.exe
          3⤵
          • Drops file in Drivers directory
          • Drops startup file
          • Executes dropped EXE
          • Adds Run key to start application
          • Enumerates connected drives
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2232
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2184
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
              • System Location Discovery: System Language Discovery
              PID:2880
          • C:\Windows\SysWOW64\net.exe
            net stop "Kingsoft AntiVirus Service"
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2592
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
              5⤵
              • System Location Discovery: System Language Discovery
              PID:2868

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\$$aA68C.bat

            Filesize

            614B

            MD5

            c59e8ee06d325b4dac67fa2a5db062a5

            SHA1

            1e6dd39cac4c6a50070d615864a3682612885901

            SHA256

            d15d55359a92d345b3c1d3b5dea73273922bcbb23ba25edc2b4760263b1480af

            SHA512

            329d98d4df4bfe3008133f5e58d264957ea799d07b41aa493cfb5bae4d535dcdf833dcede02d3ec0677512084c05216343b7d1f30635bcc1e7be4782e5683606

          • C:\Users\Admin\AppData\Local\Temp\f002bf28f8af3bd6ca14f25f002b5b5a_JaffaCakes118.exe

            Filesize

            278KB

            MD5

            7b883fbf12d8febcaa3e94c7c421d7ae

            SHA1

            321eaa1df78ba1ad4ede806d5d8b170938aa5155

            SHA256

            c85520acd0cec077b187a3622ce5e6dc873eb00aacd915ef059970320a3967b3

            SHA512

            e488ef52a654a6bf84d7639e9c51f64bb932cca99ca3f62c2080ddb20d9e65d6e4d1895123590a175a8880f615a42051ae705f97963e75d405614eeda049694a

          • C:\Windows\Logo1_.exe

            Filesize

            88KB

            MD5

            d9e5d5d18508aa5c50bb62a9b235ab0b

            SHA1

            865e38d294a107fa5171b75354863989e19c5671

            SHA256

            c44e647431b9e3cb95532be8865d873850821664daa8500e1458ebf013bf3d05

            SHA512

            ae40f879d2dbb86af612f6df6cb14321091078edbed61aeaeef0067915fcee40dd33eb8b4836a3948823c6b7a7a04aa890605f147853ea7730d4af1625ae7e3d

          • C:\Windows\system32\drivers\etc\hosts

            Filesize

            832B

            MD5

            7e3a0edd0c6cd8316f4b6c159d5167a1

            SHA1

            753428b4736ffb2c9e3eb50f89255b212768c55a

            SHA256

            1965854dfa54c72529c88c7d9f41fa31b4140cad04cf03d3f0f2e7601fcbdc6c

            SHA512

            9c68f7f72dfa109fcfba6472a1cced85bc6c2a5481232c6d1d039c88b2f65fb86070aeb26ac23e420c6255daca02ea6e698892f7670298d2c4f741b9e9415c7f

          • F:\$RECYCLE.BIN\S-1-5-21-4177215427-74451935-3209572229-1000\_desktop.ini

            Filesize

            9B

            MD5

            5412111268dd2c1fb1cf8697bfab9b6c

            SHA1

            16d0b289e83c74cb50a004edd7c5750ac706f321

            SHA256

            f3aa35be7048ddbf11fc581e5f9476745d75bcf097e121ba2915614e360a0cdc

            SHA512

            13fc5bf11faaf5471fde8a1bafdcc6d27521bad796e5e532c94d9c8232dd70088e70b6d5ac60c4c15d13e59926ac38e9a9e01b4dd4694a77d70bdd1ae7005ccf

          • memory/1196-26-0x00000000026A0000-0x00000000026A1000-memory.dmp

            Filesize

            4KB

          • memory/2124-15-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/2232-30-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/2232-2959-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/2232-4147-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB