Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-10-2024 07:04

General

  • Target

    1252c8d9d8101cba82ac58077b236ed9_JaffaCakes118.exe

  • Size

    743KB

  • MD5

    1252c8d9d8101cba82ac58077b236ed9

  • SHA1

    93088b414ed2c0f76085eaedf177340db2179e16

  • SHA256

    b4fe448064bd73c7c3d3d6e594fda0c29d59bbfc09d629e06d76ae4d101eeaf0

  • SHA512

    a1a6be67a83c286100631a3fbe12822adfb1e9f09c58da64d94a2c9b5046082f7e0bfafb25bc74aa60a4f0a1f7421e1e14fcf776a7d36cb97eda5ad2b19ad2cf

  • SSDEEP

    12288:SfUfEpv+lDZwJ+3rU/orUZoPEMscDQRYHKwcpJK1diHa2hM7GUYQ9lw8sc:bQmDZ33rUArUOPPQ6gudiOYQnX/

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    Smtp.gmail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    slapperz

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Drops desktop.ini file(s) 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1252c8d9d8101cba82ac58077b236ed9_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\1252c8d9d8101cba82ac58077b236ed9_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops desktop.ini file(s)
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1260
    • C:\Users\Admin\AppData\Local\Temp\asdf.exe
      "C:\Users\Admin\AppData\Local\Temp\asdf.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4124
      • C:\Users\Admin\AppData\Local\Temp\Microsoftnet.exe
        C:\Users\Admin\AppData\Local\Temp\Microsoftnet.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:1412

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Microsoftnet.exe

    Filesize

    18KB

    MD5

    ddaa9ac21ce4316190e2a8780f9aa4d2

    SHA1

    0721e72c05adf6eae41d1af7fb4a47463a7a2202

    SHA256

    5daea85cf593f2bae2877b407bb1f774f030a70fd4f28167e1accea350176960

    SHA512

    17b74eda39863bf4738275b6b2df7429f6bbf0cbc43445f19e3dfd2cfa8e78907e33d39fdf5dee0652cf9676e0bb05889a05ae9c5dffa787012da6ba25594d1d

  • C:\Users\Admin\AppData\Local\Temp\PinGenerator.exe

    Filesize

    523KB

    MD5

    c4be24f7b85a8ac66adae0b51f9f3ad3

    SHA1

    49981edfecd96cfeb084dfd97505b664dd814adc

    SHA256

    9c657ec02e1b2a1df1c970422fc916bc8467103205061d2dbb3f0a06fd9eda18

    SHA512

    e0e261cf6fd053348d09cf554207c2959e813f3fafaf60518b5f8b30326d7a87442734d0a8fb94c4234f461d622416e09289841b392a97ff5578f683635a0455

  • C:\Users\Admin\AppData\Local\Temp\asdf.exe

    Filesize

    182KB

    MD5

    418b25cd602de50def4a19a924331a3b

    SHA1

    52db66a78be7f9763ea2faacf75c83efcbba41d7

    SHA256

    5dc72ffa7cd14e3b30c1d485c9cd4e697eb2ed18b38842a94659ae44b7db5dfe

    SHA512

    2416ad6fd904cf3b8fbe70f7379cc6aa33707b880ed01e22598a83d1789b6f3efd54f89790a6ced3211848785d21c5ba5dc096bbd8a310692019b069a1823e18

  • memory/1260-8-0x00000000016E0000-0x00000000016E6000-memory.dmp

    Filesize

    24KB

  • memory/1260-2-0x000000001BDA0000-0x000000001BE46000-memory.dmp

    Filesize

    664KB

  • memory/1260-5-0x00007FFFFF640000-0x00007FFFFFFE1000-memory.dmp

    Filesize

    9.6MB

  • memory/1260-6-0x0000000001680000-0x0000000001688000-memory.dmp

    Filesize

    32KB

  • memory/1260-7-0x000000001CA90000-0x000000001CADC000-memory.dmp

    Filesize

    304KB

  • memory/1260-3-0x000000001C390000-0x000000001C85E000-memory.dmp

    Filesize

    4.8MB

  • memory/1260-11-0x00007FFFFF640000-0x00007FFFFFFE1000-memory.dmp

    Filesize

    9.6MB

  • memory/1260-4-0x000000001C900000-0x000000001C99C000-memory.dmp

    Filesize

    624KB

  • memory/1260-1-0x00007FFFFF640000-0x00007FFFFFFE1000-memory.dmp

    Filesize

    9.6MB

  • memory/1260-0-0x00007FFFFF8F5000-0x00007FFFFF8F6000-memory.dmp

    Filesize

    4KB

  • memory/1260-51-0x00007FFFFF640000-0x00007FFFFFFE1000-memory.dmp

    Filesize

    9.6MB

  • memory/1260-48-0x00007FFFFF640000-0x00007FFFFFFE1000-memory.dmp

    Filesize

    9.6MB

  • memory/1260-35-0x00007FFFFF640000-0x00007FFFFFFE1000-memory.dmp

    Filesize

    9.6MB

  • memory/1260-47-0x00007FFFFF8F5000-0x00007FFFFF8F6000-memory.dmp

    Filesize

    4KB

  • memory/4124-30-0x00007FFFFF640000-0x00007FFFFFFE1000-memory.dmp

    Filesize

    9.6MB

  • memory/4124-38-0x00007FFFFF640000-0x00007FFFFFFE1000-memory.dmp

    Filesize

    9.6MB

  • memory/4124-39-0x00007FFFFF640000-0x00007FFFFFFE1000-memory.dmp

    Filesize

    9.6MB

  • memory/4124-40-0x000000001F530000-0x000000001F83E000-memory.dmp

    Filesize

    3.1MB

  • memory/4124-37-0x0000000000970000-0x000000000097C000-memory.dmp

    Filesize

    48KB

  • memory/4124-36-0x000000001C7C0000-0x000000001C822000-memory.dmp

    Filesize

    392KB

  • memory/4124-33-0x00007FFFFF640000-0x00007FFFFFFE1000-memory.dmp

    Filesize

    9.6MB

  • memory/4124-49-0x00007FFFFF640000-0x00007FFFFFFE1000-memory.dmp

    Filesize

    9.6MB

  • memory/4124-32-0x00007FFFFF640000-0x00007FFFFFFE1000-memory.dmp

    Filesize

    9.6MB