Analysis

  • max time kernel
    150s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02/10/2024, 04:11

General

  • Target

    08d23d928b86fc4b201c77b6e41a1d3b_JaffaCakes118.exe

  • Size

    300KB

  • MD5

    08d23d928b86fc4b201c77b6e41a1d3b

  • SHA1

    b5d593f76d2c79f5c1f7ae5149c29030b4b74f80

  • SHA256

    bce829bbed72893ebb0053992ae105028ecaada344d6c27f2b01281839bf9cb6

  • SHA512

    48230fbd4eaa0a27146ab3d9811ffb537d05a9f4166bca1badd65d15a2938626343d804808ed1b8c3f8fc33be0c812c9e8ca2dfc476816e484ecc2bf15a00df0

  • SSDEEP

    6144:IQE50eRNsaxhYdg0KzT32OTnjVOmsnmg5MrYvTUaco:ApR+agW2ODj50MMv9co

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\Dwm.exe
    "C:\Windows\system32\Dwm.exe"
    1⤵
      PID:1040
    • C:\Windows\system32\taskhost.exe
      "taskhost.exe"
      1⤵
        PID:1068
      • C:\Windows\Explorer.EXE
        C:\Windows\Explorer.EXE
        1⤵
          PID:1124
          • C:\Users\Admin\AppData\Local\Temp\08d23d928b86fc4b201c77b6e41a1d3b_JaffaCakes118.exe
            "C:\Users\Admin\AppData\Local\Temp\08d23d928b86fc4b201c77b6e41a1d3b_JaffaCakes118.exe"
            2⤵
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of UnmapMainImage
            • Suspicious use of WriteProcessMemory
            PID:2372
            • C:\Users\Admin\AppData\Roaming\Vymek\mowy.exe
              "C:\Users\Admin\AppData\Roaming\Vymek\mowy.exe"
              3⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of UnmapMainImage
              • Suspicious use of WriteProcessMemory
              PID:2884
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpb267fbf1.bat"
              3⤵
              • Deletes itself
              • System Location Discovery: System Language Discovery
              PID:1584
        • C:\Windows\system32\DllHost.exe
          C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
          1⤵
            PID:804
          • C:\Program Files\Windows Mail\WinMail.exe
            "C:\Program Files\Windows Mail\WinMail.exe" -Embedding
            1⤵
            • NTFS ADS
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of SetWindowsHookEx
            PID:2228
          • C:\Windows\system32\DllHost.exe
            C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
            1⤵
              PID:1452
            • C:\Windows\system32\DllHost.exe
              C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
              1⤵
                PID:1420
              • C:\Windows\system32\DllHost.exe
                C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                1⤵
                  PID:1976
                • C:\Windows\system32\DllHost.exe
                  C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                  1⤵
                    PID:2604
                  • C:\Windows\system32\DllHost.exe
                    C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                    1⤵
                      PID:2700
                    • C:\Windows\system32\DllHost.exe
                      C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                      1⤵
                        PID:2652
                      • C:\Windows\system32\DllHost.exe
                        C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                        1⤵
                          PID:2992
                        • C:\Windows\system32\DllHost.exe
                          C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                          1⤵
                            PID:2080
                          • C:\Windows\system32\DllHost.exe
                            C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                            1⤵
                              PID:2864

                            Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\edb.log

                                    Filesize

                                    2.0MB

                                    MD5

                                    ebaa28a99398d1b361c936cc5f629919

                                    SHA1

                                    4bb29a47a2cce24dce26584d1d20f0620d9a619b

                                    SHA256

                                    ed9963801640a5343954e75974c354e58fb26f47d2c0f8329f1035f4f12afb2d

                                    SHA512

                                    fdab4fbac378f9b156f5267fdbd9a0a24b1158b189e55beb11dfe6555fcfadc86d9edae882f89b11377db0d0a11a9f584d0000cc59fbca9a6cebbe07e37431f3

                                  • C:\Users\Admin\AppData\Local\Temp\tmpb267fbf1.bat

                                    Filesize

                                    271B

                                    MD5

                                    4253d509024148875d0a45d18bd1d032

                                    SHA1

                                    0dc991cf5e9236292a59834d5f2b504a2c1b6612

                                    SHA256

                                    c275c6217de33fc632ebe69191a6527ca82ae544821e91bb33db3d5263edd6e3

                                    SHA512

                                    660c758876b904c08a7b653997e35ebf0f162d253b6c1522465bca708bb116efde5260168a30a23821b80d01ef81a30267ab4283627d1349f84dfc562a816113

                                  • C:\Users\Admin\AppData\Roaming\Lalua\sesy.tuy

                                    Filesize

                                    4KB

                                    MD5

                                    dedd081c079709c5c788f4d86262cbd2

                                    SHA1

                                    6a652d0271fc8d5e7aa8374602d017875a11b823

                                    SHA256

                                    d8cb014f6c512e628e1243320e4f7986d2ab62db5226d4a11016b6451e06e73e

                                    SHA512

                                    d8c5558df57b9bce57e33e9e3d2795560cd93a979bca28458746681df369b6477126c37be275800d367bbfc82b64cb7e838c5f9b4b8172911e6f98864d459303

                                  • \Users\Admin\AppData\Roaming\Vymek\mowy.exe

                                    Filesize

                                    300KB

                                    MD5

                                    bc6644f121bcf8a238bd3edebe4e78e9

                                    SHA1

                                    74f97f5f9ba89dc220bab2fb800f143c673f4422

                                    SHA256

                                    53c5cc0650d5e8346a006378f0682264861d396c63c257f9f74da749b5c6721f

                                    SHA512

                                    4a518ccfcc1d5498ff7744ae03e6c91d3de7b83eae123ae354f9792bb357f3d92c536dc4e54a5aecccf68488291f1e55ddd5adfb1125a765ea39adfbdc9ce449

                                  • memory/804-55-0x0000000001DE0000-0x0000000001E1C000-memory.dmp

                                    Filesize

                                    240KB

                                  • memory/804-56-0x0000000001DE0000-0x0000000001E1C000-memory.dmp

                                    Filesize

                                    240KB

                                  • memory/804-57-0x0000000001DE0000-0x0000000001E1C000-memory.dmp

                                    Filesize

                                    240KB

                                  • memory/804-58-0x0000000001DE0000-0x0000000001E1C000-memory.dmp

                                    Filesize

                                    240KB

                                  • memory/1040-37-0x0000000001FC0000-0x0000000001FFC000-memory.dmp

                                    Filesize

                                    240KB

                                  • memory/1040-35-0x0000000001FC0000-0x0000000001FFC000-memory.dmp

                                    Filesize

                                    240KB

                                  • memory/1040-33-0x0000000001FC0000-0x0000000001FFC000-memory.dmp

                                    Filesize

                                    240KB

                                  • memory/1040-39-0x0000000001FC0000-0x0000000001FFC000-memory.dmp

                                    Filesize

                                    240KB

                                  • memory/1040-41-0x0000000001FC0000-0x0000000001FFC000-memory.dmp

                                    Filesize

                                    240KB

                                  • memory/1068-45-0x0000000002250000-0x000000000228C000-memory.dmp

                                    Filesize

                                    240KB

                                  • memory/1068-46-0x0000000002250000-0x000000000228C000-memory.dmp

                                    Filesize

                                    240KB

                                  • memory/1068-47-0x0000000002250000-0x000000000228C000-memory.dmp

                                    Filesize

                                    240KB

                                  • memory/1068-48-0x0000000002250000-0x000000000228C000-memory.dmp

                                    Filesize

                                    240KB

                                  • memory/1124-50-0x0000000002ED0000-0x0000000002F0C000-memory.dmp

                                    Filesize

                                    240KB

                                  • memory/1124-53-0x0000000002ED0000-0x0000000002F0C000-memory.dmp

                                    Filesize

                                    240KB

                                  • memory/1124-52-0x0000000002ED0000-0x0000000002F0C000-memory.dmp

                                    Filesize

                                    240KB

                                  • memory/1124-51-0x0000000002ED0000-0x0000000002F0C000-memory.dmp

                                    Filesize

                                    240KB

                                  • memory/2372-77-0x00000000003F0000-0x00000000003F1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/2372-12-0x0000000000400000-0x000000000043C000-memory.dmp

                                    Filesize

                                    240KB

                                  • memory/2372-232-0x00000000003F0000-0x00000000003F1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/2372-73-0x00000000003F0000-0x00000000003F1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/2372-71-0x0000000000480000-0x00000000004BC000-memory.dmp

                                    Filesize

                                    240KB

                                  • memory/2372-69-0x00000000003F0000-0x00000000003F1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/2372-110-0x0000000077940000-0x0000000077941000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/2372-62-0x0000000000480000-0x00000000004BC000-memory.dmp

                                    Filesize

                                    240KB

                                  • memory/2372-2-0x0000000000260000-0x0000000000261000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/2372-67-0x00000000003F0000-0x00000000003F1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/2372-60-0x0000000000480000-0x00000000004BC000-memory.dmp

                                    Filesize

                                    240KB

                                  • memory/2372-64-0x0000000000480000-0x00000000004BC000-memory.dmp

                                    Filesize

                                    240KB

                                  • memory/2372-63-0x0000000000480000-0x00000000004BC000-memory.dmp

                                    Filesize

                                    240KB

                                  • memory/2372-4-0x0000000000400000-0x000000000043C000-memory.dmp

                                    Filesize

                                    240KB

                                  • memory/2372-6-0x0000000000260000-0x0000000000261000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/2372-8-0x0000000000400000-0x000000000043C000-memory.dmp

                                    Filesize

                                    240KB

                                  • memory/2372-61-0x0000000000480000-0x00000000004BC000-memory.dmp

                                    Filesize

                                    240KB

                                  • memory/2372-75-0x0000000000480000-0x00000000004BC000-memory.dmp

                                    Filesize

                                    240KB

                                  • memory/2372-10-0x0000000000400000-0x000000000043C000-memory.dmp

                                    Filesize

                                    240KB

                                  • memory/2372-109-0x0000000000480000-0x00000000004BC000-memory.dmp

                                    Filesize

                                    240KB

                                  • memory/2372-11-0x0000000000400000-0x000000000043C000-memory.dmp

                                    Filesize

                                    240KB

                                  • memory/2372-0-0x0000000000330000-0x000000000036C000-memory.dmp

                                    Filesize

                                    240KB

                                  • memory/2372-1-0x0000000000400000-0x000000000043C000-memory.dmp

                                    Filesize

                                    240KB

                                  • memory/2372-342-0x0000000000400000-0x000000000043C000-memory.dmp

                                    Filesize

                                    240KB

                                  • memory/2372-343-0x0000000000480000-0x00000000004BC000-memory.dmp

                                    Filesize

                                    240KB

                                  • memory/2372-280-0x0000000000400000-0x000000000043C000-memory.dmp

                                    Filesize

                                    240KB

                                  • memory/2372-279-0x0000000000330000-0x000000000036C000-memory.dmp

                                    Filesize

                                    240KB

                                  • memory/2884-23-0x0000000000400000-0x000000000043C000-memory.dmp

                                    Filesize

                                    240KB

                                  • memory/2884-289-0x0000000000400000-0x000000000044A000-memory.dmp

                                    Filesize

                                    296KB

                                  • memory/2884-22-0x0000000000400000-0x000000000044A000-memory.dmp

                                    Filesize

                                    296KB

                                  • memory/2884-30-0x0000000000400000-0x000000000043C000-memory.dmp

                                    Filesize

                                    240KB

                                  • memory/2884-26-0x0000000000400000-0x000000000043C000-memory.dmp

                                    Filesize

                                    240KB

                                  • memory/2884-601-0x0000000000400000-0x000000000043C000-memory.dmp

                                    Filesize

                                    240KB