Analysis

  • max time kernel
    94s
  • max time network
    105s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/10/2024, 01:44

General

  • Target

    28a0bcda107fb1e915b3ec7e066a6e29_JaffaCakes118.exe

  • Size

    2.4MB

  • MD5

    28a0bcda107fb1e915b3ec7e066a6e29

  • SHA1

    bd99449f74591310c782e71c882f38c4c3f39c0b

  • SHA256

    71ed926faa587e2474903f5c0bb521d4a25c0e7dee983de3ec3ca820b6608268

  • SHA512

    bc08c781b850b0f60ad39ff2ebbf5ce2c4d1049d073f059b2e50606e5f5982ccff1c6712af7bb9028cf023770d4271f98dca0f4039cc0e86ba3416364769bbac

  • SSDEEP

    49152:g7LpqPnAU0nJtOCsglhUDWA1/Y6jyq5r4Flw/HD5:G2+LFsfrdjB5Eg/t

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.gmail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    monkeyarman

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\28a0bcda107fb1e915b3ec7e066a6e29_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\28a0bcda107fb1e915b3ec7e066a6e29_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4676
    • C:\Users\Admin\AppData\Roaming\Svchost.exe
      "C:\Users\Admin\AppData\Roaming\Svchost.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      PID:372

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\FZQHUfONBBckwZs.txt

    Filesize

    84B

    MD5

    a7d4f0da9ddf1b2725ddf7ebd008e4f2

    SHA1

    be4912a702054ea775f6eb7fc5e9ab4eac62a090

    SHA256

    92a3f11301535af24c274545057aabacefaf8b2f99bdaf236636e1a20a21dd2d

    SHA512

    77fde46d74d75b7159f84240e196152db6bc2832c9a0ff40a578f0ff31a307b8dc5034be68ae81e547ac39448c384e67e60090fc2eff57fe7597649c7bf96967

  • C:\Users\Admin\AppData\Roaming\Svchost.exe

    Filesize

    2.4MB

    MD5

    28a0bcda107fb1e915b3ec7e066a6e29

    SHA1

    bd99449f74591310c782e71c882f38c4c3f39c0b

    SHA256

    71ed926faa587e2474903f5c0bb521d4a25c0e7dee983de3ec3ca820b6608268

    SHA512

    bc08c781b850b0f60ad39ff2ebbf5ce2c4d1049d073f059b2e50606e5f5982ccff1c6712af7bb9028cf023770d4271f98dca0f4039cc0e86ba3416364769bbac

  • memory/372-27-0x00007FFC7BDB0000-0x00007FFC7C751000-memory.dmp

    Filesize

    9.6MB

  • memory/372-22-0x000000001F000000-0x000000001F30E000-memory.dmp

    Filesize

    3.1MB

  • memory/372-19-0x00007FFC7BDB0000-0x00007FFC7C751000-memory.dmp

    Filesize

    9.6MB

  • memory/372-20-0x00007FFC7BDB0000-0x00007FFC7C751000-memory.dmp

    Filesize

    9.6MB

  • memory/4676-4-0x000000001BD00000-0x000000001BD9C000-memory.dmp

    Filesize

    624KB

  • memory/4676-6-0x0000000000D20000-0x0000000000D28000-memory.dmp

    Filesize

    32KB

  • memory/4676-5-0x00007FFC7BDB0000-0x00007FFC7C751000-memory.dmp

    Filesize

    9.6MB

  • memory/4676-0-0x00007FFC7C065000-0x00007FFC7C066000-memory.dmp

    Filesize

    4KB

  • memory/4676-2-0x00007FFC7BDB0000-0x00007FFC7C751000-memory.dmp

    Filesize

    9.6MB

  • memory/4676-3-0x000000001B830000-0x000000001BCFE000-memory.dmp

    Filesize

    4.8MB

  • memory/4676-23-0x00007FFC7C065000-0x00007FFC7C066000-memory.dmp

    Filesize

    4KB

  • memory/4676-25-0x00007FFC7BDB0000-0x00007FFC7C751000-memory.dmp

    Filesize

    9.6MB

  • memory/4676-26-0x00007FFC7BDB0000-0x00007FFC7C751000-memory.dmp

    Filesize

    9.6MB

  • memory/4676-1-0x000000001B2B0000-0x000000001B356000-memory.dmp

    Filesize

    664KB