Analysis

  • max time kernel
    95s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-09-2024 09:50

General

  • Target

    fa2f3ffb34db747f9e0f71db54366828_JaffaCakes118.exe

  • Size

    8.8MB

  • MD5

    fa2f3ffb34db747f9e0f71db54366828

  • SHA1

    bce3c4f26fe9620689bd789eb289bddb95b13c07

  • SHA256

    7a9c0e726aa4db17aeec45f63425219a098756dc6a434c084853c98e3d4ec9eb

  • SHA512

    44d22f63e5d8bea4411da3d3f224fc468b798032b967ac73ec38cdb14bd6f5bab7014b2e82aad442cba302b60b5f18e1df3d1f49c54c60dee44c5e4dee6d7dde

  • SSDEEP

    196608:64wb69bPe3Fd+FPhQVjFA7t2RHfYlQZJgTamGcBiG:64AqL7h6AWHf3A

Malware Config

Signatures

  • Detects Strela Stealer payload 2 IoCs
  • Strela stealer

    An info stealer targeting mail credentials first seen in late 2022.

  • Drops file in System32 directory 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fa2f3ffb34db747f9e0f71db54366828_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fa2f3ffb34db747f9e0f71db54366828_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4188
    • C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Au_.exe
      "C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\
      2⤵
      • Drops file in System32 directory
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:3200

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsc662D.tmp\ConfirmUninstallPage.ini

    Filesize

    742B

    MD5

    212ed4c76455c713968b7c06a1689bbb

    SHA1

    3d88b82d3b94a46facfbbb3d6ab29ed48d8d58b9

    SHA256

    888cbaaa8fa95526440b6cf0a0bbbe856cec1ceff36475bbf147865796406865

    SHA512

    2e2c27af04225addf337c176b24577920dac6f88528e3d6a57381df1e95226a0bb2d77e371a831b61ddce416b6e7ea586444cf75b4116de605d9345758628e43

  • C:\Users\Admin\AppData\Local\Temp\nsc662D.tmp\ConfirmUninstallPage.ini

    Filesize

    660B

    MD5

    9394cd17f501b9abda76c34a84ff7398

    SHA1

    5fabd3d206521108e565fb5dd6672cd1bb2f068e

    SHA256

    bbcb8b1a2f296cbcb5d18291d917032f0a6224c5db6e44d36f4f90c65d7e0f0c

    SHA512

    0c16eb6af06e807dfd0c0faa9d87d69824dabd9b8dab1a9e0e5db5b262b903485ce3ea7b19e832b0a6cf19dd3ca9bf8f07716df2b33e4fdbd69ba7374569f450

  • C:\Users\Admin\AppData\Local\Temp\nsc662D.tmp\IceDragonPlugin.dll

    Filesize

    2.1MB

    MD5

    0f5f24058e46a85d65f35d856e063ddb

    SHA1

    5dbefd4a5705c9edaa85c930b297929fd9abb2ba

    SHA256

    e01e1e6d73392a90973e60d384c88855de05f8024c76ab1a94229a87191f2029

    SHA512

    636653a1a98715d58b8b7a1be917dc470f9c660f75710908cb3caa9c03d2a9b5b3bc6fa0514a28d18873df39aa18151417bdb55e0e655ee21fb1595cf6a9830d

  • C:\Users\Admin\AppData\Local\Temp\nsc662D.tmp\InstallOptions.dll

    Filesize

    14KB

    MD5

    4cb36c62157fe5bf48aa7f20bc0a9eb0

    SHA1

    ca194fb9ab75fbf23a0eb0814fd44996b5959210

    SHA256

    a4774fa2602702951839d3d3a593f3b39e71e14c3fbab77bf6274935924d755b

    SHA512

    fd141c0b8ead070b2b266344ad6e804df24a2dd578f78285ece6e003de35b4dfdac1ebbcc0ce2ca6f0a4e5673fc0e26639dcc5073e4e474d4ddcca9c6f978cdd

  • C:\Users\Admin\AppData\Local\Temp\nsc662D.tmp\NSIS_SkinCrafter_Plugin.dll

    Filesize

    5.8MB

    MD5

    bad139a2d8491896ce10ee8e4e55a921

    SHA1

    4346289950aa9b547d96553ced684b6a05af0234

    SHA256

    363e9c63b62d61ff3dd5f3cb1de5d9c2320c95787ae0a30035c19f01adebb0c3

    SHA512

    7ba1908909237986c573244743f4632dde72da9f708c151879102633f7bd7cffbaf1f79b3bb3797952304248aae9dd984f6a07a9dbf6433cc5b2d7f72ee80e15

  • C:\Users\Admin\AppData\Local\Temp\nsc662D.tmp\SkinCrafter.dll

    Filesize

    792KB

    MD5

    8fea8fd177034b52e6a5886fb5e780bd

    SHA1

    99f511388a2420d53b8406baed48ba550842eaad

    SHA256

    546dddc7a31609b5bc3dc8ecef6f6782b77613853c54171fc32314c08a69e8de

    SHA512

    5d82a3b9cf9d69049e6278a6d835b8a9a386c97ae9a69cf658675b0a8751a344d0da1ee704e9bb9023dab7cd77fdca684bdc90837960b583eef0bb4324498696

  • C:\Users\Admin\AppData\Local\Temp\nsc662D.tmp\System.dll

    Filesize

    11KB

    MD5

    4d3b19a81bd51f8ce44b93643a4e3a99

    SHA1

    35f8b00e85577b014080df98bd2c378351d9b3e9

    SHA256

    fda0018ab182ac6025d2fc9a2efcce3745d1da21ce5141859f8286cf319a52ce

    SHA512

    b2ba9c961c0e1617f802990587a9000979ab5cc493ae2f8ca852eb43eeaf24916b0b29057dbff7d41a1797dfb2dce3db41990e8639b8f205771dbec3fd80f622

  • C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Au_.exe

    Filesize

    8.8MB

    MD5

    fa2f3ffb34db747f9e0f71db54366828

    SHA1

    bce3c4f26fe9620689bd789eb289bddb95b13c07

    SHA256

    7a9c0e726aa4db17aeec45f63425219a098756dc6a434c084853c98e3d4ec9eb

    SHA512

    44d22f63e5d8bea4411da3d3f224fc468b798032b967ac73ec38cdb14bd6f5bab7014b2e82aad442cba302b60b5f18e1df3d1f49c54c60dee44c5e4dee6d7dde

  • C:\Windows\SysWOW64\mfc71.dll

    Filesize

    1.0MB

    MD5

    1fd3f9722119bdf7b8cff0ecd1e84ea6

    SHA1

    9a4faa258b375e173feaca91a8bd920baf1091eb

    SHA256

    385ea2a454172e3f9b1b18778d4d29318a12be9f0c0c0602db72e2cce136e823

    SHA512

    109d7a80a5b10548200d05ab3d7deb9dc2ae8e40d84b468184895eb462211078ecdcb11f01eb50c91c65a924f8e592cd63b78e402dcaea144ff89c11f2ab07d6

  • C:\Windows\SysWOW64\msvcr71.dll

    Filesize

    340KB

    MD5

    ca2f560921b7b8be1cf555a5a18d54c3

    SHA1

    432dbcf54b6f1142058b413a9d52668a2bde011d

    SHA256

    c4d4339df314a27ff75a38967b7569d9962337b8d4cd4b0db3aba5ff72b2bfbb

    SHA512

    23e0bdd9458a5a8e0f9bbcb7f6ce4f87fcc9e47c1ee15f964c17ff9fe8d0f82dd3a0f90263daaf1ee87fad4a238aa0ee92a16b3e2c67f47c84d575768edba43e

  • memory/3200-22-0x0000000002FB0000-0x000000000307C000-memory.dmp

    Filesize

    816KB