Analysis

  • max time kernel
    150s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06/10/2024, 12:24

General

  • Target

    1811f857108561f2efebe9cf57d501ff_JaffaCakes118.exe

  • Size

    201KB

  • MD5

    1811f857108561f2efebe9cf57d501ff

  • SHA1

    1862725b5aea2788e7d33af0a88a13e15b12c397

  • SHA256

    9644ca2e6839d42aa3e6ddc4d1c09e5e105b9588665a2a23e512e81ccce8f7cf

  • SHA512

    a7af5ae79410aa2d778c95fe346eedabf073dc6e4e1b0a721ab127774d920af08f395b2f8516e916bb79af90b5b65f7767dc1e924ed99984f9d4db8eaf024432

  • SSDEEP

    6144:Amh0LXJZk4khK3D6Gib9cmJ69SuwVzgF:Amh0b3oKTbiJhJ69H24

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • UPX packed file 14 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer Phishing Filter 1 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1811f857108561f2efebe9cf57d501ff_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\1811f857108561f2efebe9cf57d501ff_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2316
    • C:\Users\Admin\AppData\Local\Temp\1811f857108561f2efebe9cf57d501ff_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\1811f857108561f2efebe9cf57d501ff_JaffaCakes118.exe
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2944
      • C:\pagess.sys\pagess.sys.exe
        "C:\pagess.sys\pagess.sys.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2732
        • C:\pagess.sys\pagess.sys.exe
          C:\pagess.sys\pagess.sys.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3056
          • C:\Users\Admin\AppData\Local\Temp\AB65A60.exe
            "C:\Users\Admin\AppData\Local\Temp\AB65A60.exe"
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer Phishing Filter
            • Modifies Internet Explorer settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2480

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\AB65A60.exe

    Filesize

    3KB

    MD5

    29090b6b4d6605a97ac760d06436ac2d

    SHA1

    d929d3389642e52bae5ad8512293c9c4d3e4fab5

    SHA256

    98a24f0caf5b578e230e6f1103a5fba6aecb28a9128cad5520fcde546d643272

    SHA512

    9121ec42fa66e14a4fc3932c8dbcc8fb1a93ab9de00da57a82e176faa70b73f6992f8c5e2ab52c02fc28c8f0c59aee73b6fbbd39107db7d15105054f4390e9be

  • C:\pagess.sys\config.bin

    Filesize

    6KB

    MD5

    a9b31a5ec5cd9a273ada9f2d076cab15

    SHA1

    dff9cbaa2d6fca61372a8c1916a1808d28752da0

    SHA256

    a092f9498e978169e1ed9a1a28022adbd5afe79f2ef872c1c9e74a7b781b4dfd

    SHA512

    de1e9857c20d3375faf42dcb9e318db706a15c0f4263a7d0bf9aae9d5af62828b860db59d4e43e44899dce2321e2ed016f96a73289708af0ec9e0a45694768b4

  • C:\pagess.sys\pagess.sys.exe

    Filesize

    201KB

    MD5

    1811f857108561f2efebe9cf57d501ff

    SHA1

    1862725b5aea2788e7d33af0a88a13e15b12c397

    SHA256

    9644ca2e6839d42aa3e6ddc4d1c09e5e105b9588665a2a23e512e81ccce8f7cf

    SHA512

    a7af5ae79410aa2d778c95fe346eedabf073dc6e4e1b0a721ab127774d920af08f395b2f8516e916bb79af90b5b65f7767dc1e924ed99984f9d4db8eaf024432

  • memory/2316-3-0x0000000002790000-0x000000000283B000-memory.dmp

    Filesize

    684KB

  • memory/2316-0-0x0000000000400000-0x00000000004AB000-memory.dmp

    Filesize

    684KB

  • memory/2316-13-0x0000000000400000-0x00000000004AB000-memory.dmp

    Filesize

    684KB

  • memory/2480-84-0x000000000BAD0000-0x000000000BB16000-memory.dmp

    Filesize

    280KB

  • memory/2480-83-0x000000000BAD0000-0x000000000BB16000-memory.dmp

    Filesize

    280KB

  • memory/2480-132-0x0000000077250000-0x0000000077414000-memory.dmp

    Filesize

    1.8MB

  • memory/2480-126-0x0000000077250000-0x0000000077414000-memory.dmp

    Filesize

    1.8MB

  • memory/2480-125-0x0000000077250000-0x0000000077414000-memory.dmp

    Filesize

    1.8MB

  • memory/2480-72-0x000000000BAD0000-0x000000000BB16000-memory.dmp

    Filesize

    280KB

  • memory/2480-73-0x000000000BAD0000-0x000000000BB16000-memory.dmp

    Filesize

    280KB

  • memory/2480-90-0x000000000BAD0000-0x000000000BB16000-memory.dmp

    Filesize

    280KB

  • memory/2480-74-0x000000000BAD0000-0x000000000BB16000-memory.dmp

    Filesize

    280KB

  • memory/2480-75-0x000000000BAD0000-0x000000000BB16000-memory.dmp

    Filesize

    280KB

  • memory/2480-50-0x00000000002D0000-0x0000000000316000-memory.dmp

    Filesize

    280KB

  • memory/2480-76-0x000000000BAD0000-0x000000000BB16000-memory.dmp

    Filesize

    280KB

  • memory/2480-91-0x000000000BAD0000-0x000000000BB16000-memory.dmp

    Filesize

    280KB

  • memory/2480-78-0x000000000BAD0000-0x000000000BB16000-memory.dmp

    Filesize

    280KB

  • memory/2480-56-0x0000000001000000-0x0000000001004000-memory.dmp

    Filesize

    16KB

  • memory/2480-55-0x0000000001001000-0x0000000001002000-memory.dmp

    Filesize

    4KB

  • memory/2480-57-0x00000000002D0000-0x0000000000316000-memory.dmp

    Filesize

    280KB

  • memory/2480-58-0x00000000002D0000-0x0000000000316000-memory.dmp

    Filesize

    280KB

  • memory/2480-59-0x00000000002D0000-0x0000000000316000-memory.dmp

    Filesize

    280KB

  • memory/2480-79-0x000000000BAD0000-0x000000000BB16000-memory.dmp

    Filesize

    280KB

  • memory/2480-70-0x0000000000130000-0x0000000000135000-memory.dmp

    Filesize

    20KB

  • memory/2480-61-0x00000000002D0000-0x0000000000316000-memory.dmp

    Filesize

    280KB

  • memory/2480-62-0x00000000002D0000-0x0000000000316000-memory.dmp

    Filesize

    280KB

  • memory/2480-69-0x000000000BAD0000-0x000000000BB16000-memory.dmp

    Filesize

    280KB

  • memory/2480-81-0x000000000BAD0000-0x000000000BB16000-memory.dmp

    Filesize

    280KB

  • memory/2480-94-0x000000000BAD0000-0x000000000BB16000-memory.dmp

    Filesize

    280KB

  • memory/2480-80-0x000000000BAD0000-0x000000000BB16000-memory.dmp

    Filesize

    280KB

  • memory/2480-77-0x000000000BAD0000-0x000000000BB16000-memory.dmp

    Filesize

    280KB

  • memory/2480-82-0x000000000BAD0000-0x000000000BB16000-memory.dmp

    Filesize

    280KB

  • memory/2480-89-0x000000000BAD0000-0x000000000BB16000-memory.dmp

    Filesize

    280KB

  • memory/2480-88-0x000000000BAD0000-0x000000000BB16000-memory.dmp

    Filesize

    280KB

  • memory/2480-87-0x000000000BAD0000-0x000000000BB16000-memory.dmp

    Filesize

    280KB

  • memory/2480-86-0x000000000BAD0000-0x000000000BB16000-memory.dmp

    Filesize

    280KB

  • memory/2480-92-0x000000000BAD0000-0x000000000BB16000-memory.dmp

    Filesize

    280KB

  • memory/2480-124-0x0000000077272000-0x0000000077274000-memory.dmp

    Filesize

    8KB

  • memory/2480-85-0x000000000BAD0000-0x000000000BB16000-memory.dmp

    Filesize

    280KB

  • memory/2732-39-0x0000000000400000-0x00000000004AB000-memory.dmp

    Filesize

    684KB

  • memory/2944-98-0x00000000003A0000-0x00000000003A1000-memory.dmp

    Filesize

    4KB

  • memory/2944-19-0x0000000000400000-0x0000000000459000-memory.dmp

    Filesize

    356KB

  • memory/2944-101-0x000000000BAD0000-0x000000000BB16000-memory.dmp

    Filesize

    280KB

  • memory/2944-4-0x0000000000400000-0x0000000000459000-memory.dmp

    Filesize

    356KB

  • memory/2944-102-0x000000000BAD0000-0x000000000BB16000-memory.dmp

    Filesize

    280KB

  • memory/2944-9-0x0000000000400000-0x0000000000459000-memory.dmp

    Filesize

    356KB

  • memory/2944-11-0x0000000000400000-0x0000000000459000-memory.dmp

    Filesize

    356KB

  • memory/2944-8-0x0000000000400000-0x0000000000459000-memory.dmp

    Filesize

    356KB

  • memory/2944-96-0x00000000003A0000-0x00000000003A1000-memory.dmp

    Filesize

    4KB

  • memory/2944-7-0x0000000000400000-0x0000000000459000-memory.dmp

    Filesize

    356KB

  • memory/2944-97-0x0000000077E8F000-0x0000000077E91000-memory.dmp

    Filesize

    8KB

  • memory/2944-6-0x0000000000400000-0x0000000000459000-memory.dmp

    Filesize

    356KB

  • memory/2944-27-0x0000000000730000-0x00000000007DB000-memory.dmp

    Filesize

    684KB

  • memory/2944-10-0x0000000000400000-0x0000000000459000-memory.dmp

    Filesize

    356KB

  • memory/2944-15-0x0000000000030000-0x0000000000031000-memory.dmp

    Filesize

    4KB

  • memory/2944-14-0x0000000000030000-0x0000000000031000-memory.dmp

    Filesize

    4KB

  • memory/3056-45-0x0000000000400000-0x0000000000459000-memory.dmp

    Filesize

    356KB

  • memory/3056-38-0x0000000000400000-0x0000000000459000-memory.dmp

    Filesize

    356KB