Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-10-2024 09:53

General

  • Target

    2f05f7d1ad04c1ab3a71b5f7d30df4fa_JaffaCakes118.exe

  • Size

    303KB

  • MD5

    2f05f7d1ad04c1ab3a71b5f7d30df4fa

  • SHA1

    1bf10faa5af0efe5473d53a6a6f78a46cfd7e256

  • SHA256

    cf1399c3d0353a89a688f2241c81729ccddb5e445205abe8721b62940dccccb2

  • SHA512

    4e54be1f16746298504784cc88ccffba84f62fb3b57e432000c8657141480ffb27711d9e5da5c0cbdcba76cf5d06afb096545ccd229ab8d43441c5e964d79d68

  • SSDEEP

    6144:X26oGcFo42LAgV8LLyrTEzh98wNry/fn:yGcyLAgVOhw

Malware Config

Signatures

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 27 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2f05f7d1ad04c1ab3a71b5f7d30df4fa_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2f05f7d1ad04c1ab3a71b5f7d30df4fa_JaffaCakes118.exe"
    1⤵
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:3352

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

    Filesize

    567KB

    MD5

    9f317852446d1680a2ef1e78a0bc6c66

    SHA1

    c4388c917f07da78127942837a7fd1b3191235a5

    SHA256

    85470f06bbb3e8f587d5a2add044887e50260391f75e3a3963877c10faf87637

    SHA512

    a05c87a710083c60225dd807ca82e47ebeb641b4698e1346553897497d439632bbcaa67677a5e23e120ba1789b7542892c92b61d65954f61d5c4c68cda23d858

  • C:\Windows\SysWOW64\msiexec.vir

    Filesize

    202KB

    MD5

    02929ef3cb8f974d46663cac4aae14f6

    SHA1

    c5fd673c8d546d2b4e324ea47520662fe242022f

    SHA256

    16b50ade7b450201d466ee6a81d40fb1f166f1f680fd70184cf73b06f4e35947

    SHA512

    0d8009869e1e94d6aae196cba3516c55bb7d9bb1c312f17e7d45672a1c2216fba654711d0df1d52a88aa13ec1fccf06bb5e0dda036c1611fb5f0b5b85556ff80

  • memory/3352-0-0x0000000001000000-0x000000000108A000-memory.dmp

    Filesize

    552KB

  • memory/3352-1-0x000000000100E000-0x000000000100F000-memory.dmp

    Filesize

    4KB

  • memory/3352-2-0x0000000001000000-0x000000000108A000-memory.dmp

    Filesize

    552KB