Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    27-09-2024 09:50

General

  • Target

    fa2f3ffb34db747f9e0f71db54366828_JaffaCakes118.exe

  • Size

    8.8MB

  • MD5

    fa2f3ffb34db747f9e0f71db54366828

  • SHA1

    bce3c4f26fe9620689bd789eb289bddb95b13c07

  • SHA256

    7a9c0e726aa4db17aeec45f63425219a098756dc6a434c084853c98e3d4ec9eb

  • SHA512

    44d22f63e5d8bea4411da3d3f224fc468b798032b967ac73ec38cdb14bd6f5bab7014b2e82aad442cba302b60b5f18e1df3d1f49c54c60dee44c5e4dee6d7dde

  • SSDEEP

    196608:64wb69bPe3Fd+FPhQVjFA7t2RHfYlQZJgTamGcBiG:64AqL7h6AWHf3A

Malware Config

Signatures

  • Detects Strela Stealer payload 2 IoCs
  • Strela stealer

    An info stealer targeting mail credentials first seen in late 2022.

  • Drops file in System32 directory 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fa2f3ffb34db747f9e0f71db54366828_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fa2f3ffb34db747f9e0f71db54366828_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1732
    • C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Au_.exe
      "C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\
      2⤵
      • Drops file in System32 directory
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2688

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsyB433.tmp\ConfirmUninstallPage.ini

    Filesize

    740B

    MD5

    cb5adee102268bf91bcca637afbc1ffd

    SHA1

    1c7d905eeade0510d350206f6ff32a2c8920b58d

    SHA256

    53c0db610c388ccd7931147c292e0069540300f9655b9ad387290ea105904304

    SHA512

    c9744423ba37ad8a727b3b351d95585ba63941349c641aaa5b61eeacc71743a56c9c93ecb3208fe926798d6577b877eabe0fb5538c516e95a4de97ffdaefe7da

  • C:\Users\Admin\AppData\Local\Temp\nsyB433.tmp\ConfirmUninstallPage.ini

    Filesize

    660B

    MD5

    9394cd17f501b9abda76c34a84ff7398

    SHA1

    5fabd3d206521108e565fb5dd6672cd1bb2f068e

    SHA256

    bbcb8b1a2f296cbcb5d18291d917032f0a6224c5db6e44d36f4f90c65d7e0f0c

    SHA512

    0c16eb6af06e807dfd0c0faa9d87d69824dabd9b8dab1a9e0e5db5b262b903485ce3ea7b19e832b0a6cf19dd3ca9bf8f07716df2b33e4fdbd69ba7374569f450

  • \Users\Admin\AppData\Local\Temp\nsyB433.tmp\IceDragonPlugin.dll

    Filesize

    2.1MB

    MD5

    0f5f24058e46a85d65f35d856e063ddb

    SHA1

    5dbefd4a5705c9edaa85c930b297929fd9abb2ba

    SHA256

    e01e1e6d73392a90973e60d384c88855de05f8024c76ab1a94229a87191f2029

    SHA512

    636653a1a98715d58b8b7a1be917dc470f9c660f75710908cb3caa9c03d2a9b5b3bc6fa0514a28d18873df39aa18151417bdb55e0e655ee21fb1595cf6a9830d

  • \Users\Admin\AppData\Local\Temp\nsyB433.tmp\InstallOptions.dll

    Filesize

    14KB

    MD5

    4cb36c62157fe5bf48aa7f20bc0a9eb0

    SHA1

    ca194fb9ab75fbf23a0eb0814fd44996b5959210

    SHA256

    a4774fa2602702951839d3d3a593f3b39e71e14c3fbab77bf6274935924d755b

    SHA512

    fd141c0b8ead070b2b266344ad6e804df24a2dd578f78285ece6e003de35b4dfdac1ebbcc0ce2ca6f0a4e5673fc0e26639dcc5073e4e474d4ddcca9c6f978cdd

  • \Users\Admin\AppData\Local\Temp\nsyB433.tmp\NSIS_SkinCrafter_Plugin.dll

    Filesize

    5.8MB

    MD5

    bad139a2d8491896ce10ee8e4e55a921

    SHA1

    4346289950aa9b547d96553ced684b6a05af0234

    SHA256

    363e9c63b62d61ff3dd5f3cb1de5d9c2320c95787ae0a30035c19f01adebb0c3

    SHA512

    7ba1908909237986c573244743f4632dde72da9f708c151879102633f7bd7cffbaf1f79b3bb3797952304248aae9dd984f6a07a9dbf6433cc5b2d7f72ee80e15

  • \Users\Admin\AppData\Local\Temp\nsyB433.tmp\SkinCrafter.dll

    Filesize

    792KB

    MD5

    8fea8fd177034b52e6a5886fb5e780bd

    SHA1

    99f511388a2420d53b8406baed48ba550842eaad

    SHA256

    546dddc7a31609b5bc3dc8ecef6f6782b77613853c54171fc32314c08a69e8de

    SHA512

    5d82a3b9cf9d69049e6278a6d835b8a9a386c97ae9a69cf658675b0a8751a344d0da1ee704e9bb9023dab7cd77fdca684bdc90837960b583eef0bb4324498696

  • \Users\Admin\AppData\Local\Temp\nsyB433.tmp\System.dll

    Filesize

    11KB

    MD5

    4d3b19a81bd51f8ce44b93643a4e3a99

    SHA1

    35f8b00e85577b014080df98bd2c378351d9b3e9

    SHA256

    fda0018ab182ac6025d2fc9a2efcce3745d1da21ce5141859f8286cf319a52ce

    SHA512

    b2ba9c961c0e1617f802990587a9000979ab5cc493ae2f8ca852eb43eeaf24916b0b29057dbff7d41a1797dfb2dce3db41990e8639b8f205771dbec3fd80f622

  • \Users\Admin\AppData\Local\Temp\~nsuA.tmp\Au_.exe

    Filesize

    8.8MB

    MD5

    fa2f3ffb34db747f9e0f71db54366828

    SHA1

    bce3c4f26fe9620689bd789eb289bddb95b13c07

    SHA256

    7a9c0e726aa4db17aeec45f63425219a098756dc6a434c084853c98e3d4ec9eb

    SHA512

    44d22f63e5d8bea4411da3d3f224fc468b798032b967ac73ec38cdb14bd6f5bab7014b2e82aad442cba302b60b5f18e1df3d1f49c54c60dee44c5e4dee6d7dde

  • \Windows\SysWOW64\mfc71.dll

    Filesize

    1.0MB

    MD5

    1fd3f9722119bdf7b8cff0ecd1e84ea6

    SHA1

    9a4faa258b375e173feaca91a8bd920baf1091eb

    SHA256

    385ea2a454172e3f9b1b18778d4d29318a12be9f0c0c0602db72e2cce136e823

    SHA512

    109d7a80a5b10548200d05ab3d7deb9dc2ae8e40d84b468184895eb462211078ecdcb11f01eb50c91c65a924f8e592cd63b78e402dcaea144ff89c11f2ab07d6

  • \Windows\SysWOW64\msvcr71.dll

    Filesize

    340KB

    MD5

    ca2f560921b7b8be1cf555a5a18d54c3

    SHA1

    432dbcf54b6f1142058b413a9d52668a2bde011d

    SHA256

    c4d4339df314a27ff75a38967b7569d9962337b8d4cd4b0db3aba5ff72b2bfbb

    SHA512

    23e0bdd9458a5a8e0f9bbcb7f6ce4f87fcc9e47c1ee15f964c17ff9fe8d0f82dd3a0f90263daaf1ee87fad4a238aa0ee92a16b3e2c67f47c84d575768edba43e

  • memory/2688-25-0x0000000002880000-0x000000000294C000-memory.dmp

    Filesize

    816KB