Analysis

  • max time kernel
    96s
  • max time network
    98s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-10-2024 22:00

General

  • Target

    26148b8e4595061e7716246a926c2eed_JaffaCakes118.exe

  • Size

    946KB

  • MD5

    26148b8e4595061e7716246a926c2eed

  • SHA1

    1a61f0eea11b5cade43f03aea8eda112ee23480c

  • SHA256

    31f9e2b98f96265b9f0b50baa0745dd88077b0a1c3adeb4047d66a6fe801e1a3

  • SHA512

    98eaf519c6d069f9bbeb6c4b71a87dca4a8fbf6ed77bda73280f2187c64d148af633a5c4ed0ce11e7ffba4c04e8c1796e42c0b9ba1232733b8f32869f1f5f7a7

  • SSDEEP

    12288:6aWzgMg7v3qnCiMErQohh0F4CCJ8lny/QLway9wv+U4iG+D:1aHMv6Corjqny/QLE91FiP

Malware Config

Signatures

  • ISR Stealer

    ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

  • ISR Stealer payload 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\26148b8e4595061e7716246a926c2eed_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\26148b8e4595061e7716246a926c2eed_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2324
    • C:\Users\Admin\AppData\Roaming\Server.exe
      "C:\Users\Admin\AppData\Roaming\Server.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3024

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Server.exe

    Filesize

    76KB

    MD5

    afceef7f15a12be583888fd4cf6c78c4

    SHA1

    5574539642da242642b84ab6216edaa3f0bc159e

    SHA256

    33d03627bd449f6dc01bffbb5cc3fb8ebe95dc0f9eb036758440d7e5affbaa4f

    SHA512

    49ea1eeb55f07cc49f55b4337d4dbd537195d689c8c4336aa09e1723273431356f4e493d40f00b61735982924010fdcadbf4d2cd41c74351d1ff4e36e33e27e6