Analysis

  • max time kernel
    140s
  • max time network
    66s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    29-09-2024 03:18

General

  • Target

    fdb27374252ddd49e388a5ee1ab465b4_JaffaCakes118.exe

  • Size

    160KB

  • MD5

    fdb27374252ddd49e388a5ee1ab465b4

  • SHA1

    9f67f0d1b68ddcbe1595a1a5b52a68549c3ffc97

  • SHA256

    de92d75e7695e2f74cc5ca2066aa4a583f3c8d5a0133b35c7f0856aef26b2324

  • SHA512

    b890a0bd46e8da3e17d109ab5162fccfd2ed3737beb30102965445af62f9acda082cbc9de72575d593e8be4036d74a5e0b1f9197ba01e6d674b3996c361755af

  • SSDEEP

    3072:WVY0KBbbvSCYoOKUcS4P/KEAZUBhZgGkDP5PKOsOeknOciAnqviLT:Wm0KBvDzOKtDPSEAZkhZgngaBiA

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fdb27374252ddd49e388a5ee1ab465b4_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fdb27374252ddd49e388a5ee1ab465b4_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2560
    • C:\Users\Admin\AppData\Local\Temp\fdb27374252ddd49e388a5ee1ab465b4_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\fdb27374252ddd49e388a5ee1ab465b4_JaffaCakes118.exe startC:\Program Files (x86)\LP\658E\AD4.exe%C:\Program Files (x86)\LP\658E
      2⤵
        PID:2036
      • C:\Users\Admin\AppData\Local\Temp\fdb27374252ddd49e388a5ee1ab465b4_JaffaCakes118.exe
        C:\Users\Admin\AppData\Local\Temp\fdb27374252ddd49e388a5ee1ab465b4_JaffaCakes118.exe startC:\Program Files (x86)\47975\lvvm.exe%C:\Program Files (x86)\47975
        2⤵
          PID:1516

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\E2E47\7975.2E4

        Filesize

        996B

        MD5

        8ad2af6d71f2353fb6aa96956230f222

        SHA1

        ae8d81ae5961e949775e7984fc2aca5a4ed6396d

        SHA256

        49c0c71cef18ebdecad74b9c4dde890fe39481ec17b9cbe8e8b6cd0e8eb89793

        SHA512

        54489d2c81b5d6afbe82da2817848f572afa98f8b357d6214f9eebd5887295ba3ca1b0ee98e1e0d81c68585f6301c510efe95e407a5f98d0a38dec7c5a09a4a9

      • C:\Users\Admin\AppData\Roaming\E2E47\7975.2E4

        Filesize

        600B

        MD5

        3391d8e09e21d33f794087488ee9b8e1

        SHA1

        c495e48d4aa5e6f251f67235a90548e03c25daf3

        SHA256

        1c749e3dc38c535a562ddb11214706b1feaf7777391974cb2a2762fc2b2bbefd

        SHA512

        5174ac51d642f24cbe06dff90c06f9aeec5016f9c0d20c833bab1e4c44c2fc42acd1c5d99b7207218dda8ed3969e2e9c0bda5cb5cdbe5b140534791a3aa807dd

      • C:\Users\Admin\AppData\Roaming\E2E47\7975.2E4

        Filesize

        1KB

        MD5

        89ed436125496e59cefeb42287ad18ff

        SHA1

        fbf65b35c0830b4fe7b84bbe6262c57fa9bb957d

        SHA256

        1b30d0d05e083d414b06417872c036677bb8cf48fcb3f4119704cb5dff8731a1

        SHA512

        7f4043927b42626f55e05db7cc8f27174fe975a661fe41a09cacc01259072e9efd20e7474ccb35b910c004c9f47203f887142e4b7878b145097f334148d68134

      • memory/1516-147-0x0000000000400000-0x0000000000491000-memory.dmp

        Filesize

        580KB

      • memory/1516-146-0x0000000000400000-0x0000000000491000-memory.dmp

        Filesize

        580KB

      • memory/2036-16-0x0000000000400000-0x0000000000491000-memory.dmp

        Filesize

        580KB

      • memory/2036-14-0x0000000000400000-0x0000000000491000-memory.dmp

        Filesize

        580KB

      • memory/2036-143-0x0000000000400000-0x0000000000491000-memory.dmp

        Filesize

        580KB

      • memory/2036-13-0x00000000005D0000-0x00000000006D0000-memory.dmp

        Filesize

        1024KB

      • memory/2560-17-0x0000000000400000-0x000000000048E000-memory.dmp

        Filesize

        568KB

      • memory/2560-18-0x0000000000400000-0x0000000000491000-memory.dmp

        Filesize

        580KB

      • memory/2560-0-0x0000000000400000-0x0000000000491000-memory.dmp

        Filesize

        580KB

      • memory/2560-148-0x0000000000400000-0x0000000000491000-memory.dmp

        Filesize

        580KB

      • memory/2560-4-0x0000000000400000-0x0000000000491000-memory.dmp

        Filesize

        580KB

      • memory/2560-2-0x0000000000400000-0x000000000048E000-memory.dmp

        Filesize

        568KB

      • memory/2560-310-0x0000000000400000-0x0000000000491000-memory.dmp

        Filesize

        580KB