Analysis

  • max time kernel
    95s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-09-2024 09:33

General

  • Target

    f5b693e65bb05bd6916e29cbb1adb1cc_JaffaCakes118.exe

  • Size

    1.2MB

  • MD5

    f5b693e65bb05bd6916e29cbb1adb1cc

  • SHA1

    8ed9365deb17627a4d5ff4fb5a1467c8beab2031

  • SHA256

    3dd24bfc6728959f084de536645e2bd20318e4a709b41cddb9245147922da1d0

  • SHA512

    df8444288514c3da117ba5115ca357851af7ecdea8d73299a944a0694ffb7de57b39cee92fc827c994b550de58089316df5c5bcc5c96c43178dc5f57c6e0bf68

  • SSDEEP

    24576:oaPADnvDHtyGnOJlIqeJC6e0ZVmPGZK40Nx1O97P6iaSVVu1kqE27:iDnrHIGnulIJC6L4uZf0D1BuV+EI

Malware Config

Extracted

Family

vidar

Version

24

Botnet

93

C2

http://wrangellse.com/

Attributes
  • profile_id

    93

Signatures

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar Stealer 2 IoCs
  • Manipulates Digital Signatures 1 TTPs 3 IoCs

    Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Accesses 2FA software files, possible credential harvesting 2 TTPs
  • Deobfuscate/Decode Files or Information 1 TTPs 2 IoCs

    Payload decoded via CertUtil.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f5b693e65bb05bd6916e29cbb1adb1cc_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f5b693e65bb05bd6916e29cbb1adb1cc_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:548
    • C:\Windows\SysWOW64\cmd.exe
      "cmd" /c <nul set /p ="M" > dwm.com & type SmdLPo.com >> dwm.com & del SmdLPo.com & certutil -decode zje.com F & dwm.com F & ping 127.0.0.1 -n 2 > nul & del zje.com & del F
      2⤵
      • Deobfuscate/Decode Files or Information
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:928
      • C:\Windows\SysWOW64\certutil.exe
        certutil -decode zje.com F
        3⤵
        • Manipulates Digital Signatures
        • Deobfuscate/Decode Files or Information
        • System Location Discovery: System Language Discovery
        PID:1836
      • C:\Users\Admin\AppData\Local\Temp\dwm.com
        dwm.com F
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:396
        • C:\Users\Admin\AppData\Local\Temp\dwm.com
          C:\Users\Admin\AppData\Local\Temp\dwm.com F
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          PID:1248
          • C:\Windows\SysWOW64\dllhost.exe
            "C:\Windows\SysWOW64\dllhost.exe"
            5⤵
              PID:5092
            • C:\Windows\SysWOW64\dllhost.exe
              "C:\Windows\SysWOW64\dllhost.exe"
              5⤵
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:3284
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 3284 -s 1248
                6⤵
                • Program crash
                PID:2192
        • C:\Windows\SysWOW64\PING.EXE
          ping 127.0.0.1 -n 2
          3⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:1976
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3284 -ip 3284
      1⤵
        PID:3064

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\F

        Filesize

        224KB

        MD5

        d82d5bba1efff5f3f16c44fa7367d138

        SHA1

        2eec25a2b861817104e5b099f0e46d8a89a04ef8

        SHA256

        a8f444fa060af6fa08e6bb49477459562afceb382363cc6319c0c752c65a1621

        SHA512

        24bf57cb3c5945e3f5c4027c4d4bbf627ff2dfac6a9f351ff22fbdad82d1dae321313117aa029bc87aefada7a0565a6b991112bc6550a003f58e44d6e4a66b8b

      • C:\Users\Admin\AppData\Local\Temp\SmdLPo.com

        Filesize

        872KB

        MD5

        d86ab2aeeac2553c7857ece4492eda5d

        SHA1

        0828db56b556f3f0486a9de9d2c728216035e8e6

        SHA256

        8861365fb619dbb90da0027db93d041681c30deb93071ec588121a8f8ba08436

        SHA512

        8c0154d80fb47ea5225816e95db0126d02950f0ec7909a68205ee67a0d1c4dbff971933ee5ba0307c24658ce52400e144cde720e514acf3024fbdb2505345cfe

      • C:\Users\Admin\AppData\Local\Temp\dwm.com

        Filesize

        872KB

        MD5

        c56b5f0201a3b3de53e561fe76912bfd

        SHA1

        2a4062e10a5de813f5688221dbeb3f3ff33eb417

        SHA256

        237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

        SHA512

        195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

      • C:\Users\Admin\AppData\Local\Temp\nse9D3B.tmp\LUwrIrYO.dll

        Filesize

        6KB

        MD5

        293165db1e46070410b4209519e67494

        SHA1

        777b96a4f74b6c34d43a4e7c7e656757d1c97f01

        SHA256

        49b7477db8dd22f8cf2d41ee2d79ce57797f02e8c7b9e799951a6c710384349a

        SHA512

        97012139f2da5868fe8731c0b0bcb3cfda29ed10c2e6e2336b504480c9cd9fb8f4728cca23f1e0bd577d75daa542e59f94d1d341f4e8aaeebc7134bf61288c19

      • C:\Users\Admin\AppData\Local\Temp\nse9D3B.tmp\QQxlhlSY.dll

        Filesize

        68KB

        MD5

        44e5c77cae3ae434d1e4e619bdb1c39b

        SHA1

        9988f020eac45207d148668227b6819a38bdafa0

        SHA256

        326c406116026019a41c94b2e6b4c1061154f3bc9a395638063dae349f8a7579

        SHA512

        c3e40499d1296bebd2b1a770d9cd1f025859963a0f6dff002eb336f069f057ac4b3d2f5819232af6d2802ba1a3770f62440136030eb37355fa6f5b6ee0bc0470

      • C:\Users\Admin\AppData\Local\Temp\nse9D3B.tmp\System.dll

        Filesize

        11KB

        MD5

        0063d48afe5a0cdc02833145667b6641

        SHA1

        e7eb614805d183ecb1127c62decb1a6be1b4f7a8

        SHA256

        ac9dfe3b35ea4b8932536ed7406c29a432976b685cc5322f94ef93df920fede7

        SHA512

        71cbbcaeb345e09306e368717ea0503fe8df485be2e95200febc61bcd8ba74fb4211cd263c232f148c0123f6c6f2e3fd4ea20bdecc4070f5208c35c6920240f0

      • C:\Users\Admin\AppData\Local\Temp\vFaqy.com

        Filesize

        541KB

        MD5

        b6fb845a94115b7583ecc5223b45f8ef

        SHA1

        780294d122e9e4f520173ff36c31bd08ba1df259

        SHA256

        99870c51d7f5d3dde7314f9b7df5755b59bbc48f6c483dcc3de0fa788553a02e

        SHA512

        0d69c3243a6d50fae320b20e8f1d4b71437b8a13b354b4146fd2104998e0fee34202382d3d6a0d52735f596a104576f0f1862ab1777dcaaa84ec63005252d6b9

      • C:\Users\Admin\AppData\Local\Temp\zje.com

        Filesize

        308KB

        MD5

        cdfc8eee32871d7c15ad00e135dc4a48

        SHA1

        92d9341cc1fc013325504b5abd0318df059869a6

        SHA256

        5a8257ee7b6d4808356e561a7525f24b006337bb9d0d106cd24239ccf8ca6ca6

        SHA512

        237b18708fc994771ada63b52427af556e3a9c9279553164a8bf5b394b894413fad23f1a70da85eff53e23d3822ffbc38aae66da233572bc21897e564e9558fe

      • memory/3284-32-0x0000000000400000-0x000000000048D000-memory.dmp

        Filesize

        564KB

      • memory/3284-33-0x0000000000400000-0x000000000048D000-memory.dmp

        Filesize

        564KB