Analysis

  • max time kernel
    150s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08-10-2024 02:00

General

  • Target

    1ef885180b8c94fde6c5e565f6db81b4_JaffaCakes118.exe

  • Size

    1.1MB

  • MD5

    1ef885180b8c94fde6c5e565f6db81b4

  • SHA1

    33050d1789d3c546120de50d50590c10419e8617

  • SHA256

    a8068ff1d828406bdf89fc700bb6f4beac215ee18248f0afe3dbb451253b6d37

  • SHA512

    cb71808409587efbdad2d41223838c9c3a706547bb24240eba51c7c1d8dcafac77314c4367cb73a96c5410860afa00064add4912310a179930c9c198b986d142

  • SSDEEP

    24576:1QBRDxAlCXxX87wsRL+74l/LwwehUofEvC2eEgN/K3vuI5akK5C3:u3DSlCXSN6Y/Lx/ofWMnq

Malware Config

Signatures

  • Panda Stealer payload 2 IoCs
  • PandaStealer

    Panda Stealer is a fork of CollectorProject Stealer written in C++.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks for any installed AV software in registry 1 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1ef885180b8c94fde6c5e565f6db81b4_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\1ef885180b8c94fde6c5e565f6db81b4_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1292
    • C:\Users\Admin\AppData\Local\Temp\Thinstall\CCleaner_2.07.575\40000012400002i\CCleaner.exe
      "C:\Users\Admin\AppData\Local\Temp\Thinstall\CCleaner_2.07.575\40000012400002i\CCleaner.exe"
      2⤵
      • Executes dropped EXE
      • Checks for any installed AV software in registry
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      PID:2888

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Thinstall\CCleaner_2.07.575\Registry.rw.lck

    Filesize

    36B

    MD5

    c74d0b6ab0a9ce857b2100146a12f991

    SHA1

    2ac51199f35603e06e9e94e7d16d9f86f5f8aad4

    SHA256

    18c52e74cbf33fe4618512c14cd19ab9ffd974d9a3042fe8a951154d52043f27

    SHA512

    f36385f69e37b0ec7775b250d4d533e66fc3272c0b4b4331f405f1dcf09f3c23003d53acb681cf42a61b817f1cf553cb0fa0e322c1cc08ebd1adc16be8cebedb

  • \Users\Admin\AppData\Local\Temp\Thinstall\CCleaner_2.07.575\40000012400002i\CCleaner.exe

    Filesize

    74KB

    MD5

    0d3be9ad33ff1a4f7409d84af26ab907

    SHA1

    dc399b72589e5873c9e1a9ef411759ddd9932db1

    SHA256

    4a2bf92d6cd4e09a7eff7e50fd9f1b7a67b2a406cfdb636a78581b4171d269bc

    SHA512

    258ff66fdf7834e5d97ff921878aadfeb8ed3cf1023d26f053544aa4efd26a12e08746b671ad98dc1a1f866aa37d11e36da9239ad8f50fb806776a1fee137829

  • memory/1292-69-0x0000000074E70000-0x0000000074FCC000-memory.dmp

    Filesize

    1.4MB

  • memory/1292-70-0x0000000074FE0000-0x0000000074FE5000-memory.dmp

    Filesize

    20KB

  • memory/1292-31-0x00000000753E0000-0x000000007602A000-memory.dmp

    Filesize

    12.3MB

  • memory/1292-4-0x0000000001D80000-0x0000000001EF4000-memory.dmp

    Filesize

    1.5MB

  • memory/1292-8-0x0000000001D80000-0x0000000001EF4000-memory.dmp

    Filesize

    1.5MB

  • memory/1292-2-0x0000000001D80000-0x0000000001EF4000-memory.dmp

    Filesize

    1.5MB

  • memory/1292-1-0x0000000001D80000-0x0000000001EF4000-memory.dmp

    Filesize

    1.5MB

  • memory/1292-6-0x0000000001D80000-0x0000000001EF4000-memory.dmp

    Filesize

    1.5MB

  • memory/1292-0-0x0000000000400000-0x0000000000524000-memory.dmp

    Filesize

    1.1MB

  • memory/1292-18-0x0000000001D80000-0x0000000001EF4000-memory.dmp

    Filesize

    1.5MB

  • memory/1292-19-0x000000007EFA0000-0x000000007EFB0000-memory.dmp

    Filesize

    64KB

  • memory/1292-5-0x0000000001D80000-0x0000000001EF4000-memory.dmp

    Filesize

    1.5MB

  • memory/1292-32-0x00000000031B0000-0x00000000032D4000-memory.dmp

    Filesize

    1.1MB

  • memory/1292-11-0x0000000001D80000-0x0000000001EF4000-memory.dmp

    Filesize

    1.5MB

  • memory/1292-33-0x00000000031B0000-0x00000000032D4000-memory.dmp

    Filesize

    1.1MB

  • memory/1292-75-0x0000000000400000-0x0000000000524000-memory.dmp

    Filesize

    1.1MB

  • memory/1292-24-0x0000000076260000-0x0000000076270000-memory.dmp

    Filesize

    64KB

  • memory/1292-66-0x00000000761F0000-0x0000000076247000-memory.dmp

    Filesize

    348KB

  • memory/1292-7-0x0000000001D80000-0x0000000001EF4000-memory.dmp

    Filesize

    1.5MB

  • memory/1292-30-0x00000000751D0000-0x0000000075270000-memory.dmp

    Filesize

    640KB

  • memory/1292-3-0x0000000001D80000-0x0000000001EF4000-memory.dmp

    Filesize

    1.5MB

  • memory/1292-9-0x0000000001D80000-0x0000000001EF4000-memory.dmp

    Filesize

    1.5MB

  • memory/2888-38-0x0000000001CE0000-0x0000000001E54000-memory.dmp

    Filesize

    1.5MB

  • memory/2888-89-0x0000000076260000-0x0000000076370000-memory.dmp

    Filesize

    1.1MB

  • memory/2888-37-0x0000000001CE0000-0x0000000001E54000-memory.dmp

    Filesize

    1.5MB

  • memory/2888-71-0x0000000076260000-0x0000000076370000-memory.dmp

    Filesize

    1.1MB

  • memory/2888-39-0x0000000001CE0000-0x0000000001E54000-memory.dmp

    Filesize

    1.5MB

  • memory/2888-47-0x0000000000400000-0x0000000000524000-memory.dmp

    Filesize

    1.1MB

  • memory/2888-40-0x0000000001CE0000-0x0000000001E54000-memory.dmp

    Filesize

    1.5MB

  • memory/2888-64-0x0000000001E70000-0x0000000001E77000-memory.dmp

    Filesize

    28KB

  • memory/2888-36-0x0000000001CE0000-0x0000000001E54000-memory.dmp

    Filesize

    1.5MB

  • memory/2888-48-0x0000000000400000-0x0000000000524000-memory.dmp

    Filesize

    1.1MB

  • memory/2888-35-0x0000000000400000-0x0000000000524000-memory.dmp

    Filesize

    1.1MB

  • memory/2888-76-0x0000000076260000-0x0000000076370000-memory.dmp

    Filesize

    1.1MB

  • memory/2888-90-0x0000000076260000-0x0000000076370000-memory.dmp

    Filesize

    1.1MB

  • memory/2888-72-0x0000000076260000-0x0000000076370000-memory.dmp

    Filesize

    1.1MB

  • memory/2888-83-0x00000000751D0000-0x0000000075270000-memory.dmp

    Filesize

    640KB

  • memory/2888-77-0x0000000076260000-0x0000000076370000-memory.dmp

    Filesize

    1.1MB

  • memory/2888-44-0x0000000001CE0000-0x0000000001E54000-memory.dmp

    Filesize

    1.5MB

  • memory/2888-41-0x0000000001CE0000-0x0000000001E54000-memory.dmp

    Filesize

    1.5MB

  • memory/2888-43-0x0000000001CE0000-0x0000000001E54000-memory.dmp

    Filesize

    1.5MB

  • memory/2888-81-0x0000000000400000-0x0000000000524000-memory.dmp

    Filesize

    1.1MB

  • memory/2888-86-0x0000000074E70000-0x0000000074FCC000-memory.dmp

    Filesize

    1.4MB

  • memory/2888-87-0x0000000074FE0000-0x0000000074FE5000-memory.dmp

    Filesize

    20KB

  • memory/2888-84-0x00000000753E0000-0x000000007602A000-memory.dmp

    Filesize

    12.3MB

  • memory/2888-85-0x00000000761F0000-0x0000000076247000-memory.dmp

    Filesize

    348KB

  • memory/2888-88-0x0000000076260000-0x0000000076370000-memory.dmp

    Filesize

    1.1MB

  • memory/2888-42-0x0000000001CE0000-0x0000000001E54000-memory.dmp

    Filesize

    1.5MB

  • memory/2888-91-0x0000000076260000-0x0000000076370000-memory.dmp

    Filesize

    1.1MB

  • memory/2888-73-0x0000000076260000-0x0000000076370000-memory.dmp

    Filesize

    1.1MB