Analysis

  • max time kernel
    150s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    28-09-2024 16:56

General

  • Target

    fcbe45d42b2134331496c74fca78aef9_JaffaCakes118.exe

  • Size

    420KB

  • MD5

    fcbe45d42b2134331496c74fca78aef9

  • SHA1

    d91d93a90cd5110b44533c068031c1cd0a8372a8

  • SHA256

    e1b14fc4d2cc073d99db38053c79ab0ce01ccb530efcb3474d0c921c0a932ac5

  • SHA512

    52f646c8fe967cacd8f01a8ab850fdec66032e1336d3a470a8663315f30a6e345779e978c913f965e987533c67fb033afb54a5ea6e325a9a4c0de90e2e06cc9f

  • SSDEEP

    6144:dkXEhgQHU9qGbZ3DFLhSdy+EUL7c1Qww639qdN0:dkXEhgQH0qGjsqULo1Qy3AT0

Malware Config

Signatures

  • GlobeImposter

    GlobeImposter is a ransomware first seen in 2017.

  • Renames multiple (2253) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 27 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\fcbe45d42b2134331496c74fca78aef9_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fcbe45d42b2134331496c74fca78aef9_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • System Location Discovery: System Language Discovery
    PID:1956

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Public\Videos\doc.html

    Filesize

    7KB

    MD5

    d5d561822a429dbc7a116aa8a5be2a32

    SHA1

    c31bd3f6dc8107b407e364430fcda9664a923562

    SHA256

    df51ba9035bf8293a36d82ac03f16f6fdac0b498e196ae6c0929c4851cfbfdc5

    SHA512

    071e336773d90cce1d656b2df1e61336e2d5ff9feaf064e8c921773de331a717ee65c24081bd490cbbf1ee370da42a30a249b904ec68b93aef575f07a6cc8aef

  • memory/1956-6-0x0000000001DF0000-0x0000000001E6A000-memory.dmp

    Filesize

    488KB

  • memory/1956-12-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/1956-3-0x00000000002D0000-0x00000000002D1000-memory.dmp

    Filesize

    4KB

  • memory/1956-4-0x00000000002D0000-0x00000000002D1000-memory.dmp

    Filesize

    4KB

  • memory/1956-5-0x00000000002D0000-0x00000000002D1000-memory.dmp

    Filesize

    4KB

  • memory/1956-0-0x0000000001DF0000-0x0000000001E6A000-memory.dmp

    Filesize

    488KB

  • memory/1956-11-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/1956-2-0x00000000002D0000-0x00000000002D1000-memory.dmp

    Filesize

    4KB

  • memory/1956-10-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/1956-9-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/1956-8-0x0000000000409000-0x000000000040A000-memory.dmp

    Filesize

    4KB

  • memory/1956-14-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/1956-46-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/1956-1-0x00000000002D0000-0x00000000002D1000-memory.dmp

    Filesize

    4KB