Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/10/2024, 21:44

General

  • Target

    53e2ba476c8711cc76f2ed60c9c9e5ff_JaffaCakes118.exe

  • Size

    656KB

  • MD5

    53e2ba476c8711cc76f2ed60c9c9e5ff

  • SHA1

    df701dcddc914d53931c888da736b13ac3be5ce5

  • SHA256

    63889b4c0b857f84b7040d90ad392ff8e063d47bc9e37a414fb60cd4607de070

  • SHA512

    827c554eacfbb44d029073c262f3b898a025293eb671f99b50f82adb0030713f206c532727eaeeaf14c63d27dc3a427a4c89eb7c01ecd1cc8d70636586a844ae

  • SSDEEP

    12288:hzyMJfsziYA0PARKzG6JG8mrTOR3cZUACciqSvEqRZrAcFIUzU64GvKmUioPu0DT:JyMJfs2d0YRKJG84fdCcjSvEqLrZ38z1

Malware Config

Signatures

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 45 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\53e2ba476c8711cc76f2ed60c9c9e5ff_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\53e2ba476c8711cc76f2ed60c9c9e5ff_JaffaCakes118.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:864

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\ish240627296\bootstrap_17324.html

    Filesize

    156B

    MD5

    1ea9e5b417811379e874ad4870d5c51a

    SHA1

    a4bd01f828454f3619a815dbe5423b181ec4051c

    SHA256

    f076773a6e3ae0f1cee3c69232779a1aaaf05202db472040c0c8ea4a70af173a

    SHA512

    965c10d2aa5312602153338da873e8866d2782e0cf633befe5a552b770e08abf47a4d2e007cdef7010c212ebcb9fefea5610c41c7ed1553440eaeab7ddd72daa

  • C:\Users\Admin\AppData\Local\Temp\ish240627296\css\main.css

    Filesize

    5KB

    MD5

    50b090b3d4090ea1d984e62d2bc4ebd9

    SHA1

    da159c590907b671404f79a4bd8ff1480761aee0

    SHA256

    6e27027ffd9af638069e5eba5aaa43053a62be21a9f00c3861f56e31710dfdb7

    SHA512

    24515c50f8b0f37a8b99f187a73beb8876b42bd3a7300bf49b087b8f943211441ba2f46d819f2250084e05fc5902689866f80ee6f0dca3a9afd2fa3630a53e77

  • C:\Users\Admin\AppData\Local\Temp\ish240627296\css\sdk-ui\progress-bar.css

    Filesize

    506B

    MD5

    5335f1c12201b5f7cf5f8b4f5692e3d1

    SHA1

    13807a10369f7ff9ab3f9aba18135bccb98bec2d

    SHA256

    974cd89e64bdaa85bf36ed2a50af266d245d781a8139f5b45d7c55a0b0841dda

    SHA512

    0d4e54d2ffe96ccf548097f7812e3608537b4dae9687816983fddfb73223c196159cc6a39fcdc000784c79b2ced878efbc7a5b5f6e057973bf25b128124510df

  • C:\Users\Admin\AppData\Local\Temp\ish240627296\images\BG1.png

    Filesize

    29KB

    MD5

    4540d627f2024ae3337745c1068c4c28

    SHA1

    ba0301b24bba70bbf174c7fc8a8c272cf303985a

    SHA256

    99755a3cb1dd892749d70b2f22d817586f1b5418dbec20a2e0ac582f992bdc69

    SHA512

    fa0614efa938b7a544951c3a10ec81809b715b7f223da10d65aeb44ac03876f9d1793b3bf1111469c9a007e16bde6002e4b5f27989b095bc212f618b03dcb0a6

  • C:\Users\Admin\AppData\Local\Temp\ish240627296\images\Close.png

    Filesize

    1KB

    MD5

    60e7a3f760637dd125a1150474e7f6bb

    SHA1

    46e4b53480dd7b3db532e3511a7ad3b9e99b2f48

    SHA256

    d244e6d623fb3706340ead5491bb61663e5d53a3f7d96d4b613175c875c42184

    SHA512

    d279b197d330c4fe7de5e891b45e60273b603d58c84a502461ba2edf008ed51e6bcfd8768a74ee95bc9558bcbe8294f9f759c188327f7c54b1483d1072b32268

  • C:\Users\Admin\AppData\Local\Temp\ish240627296\images\Color_Button.png

    Filesize

    2KB

    MD5

    ad3b142304c6edd3aa818610b6f52b6e

    SHA1

    d6e2d7437c7bfeb5a268b76219d8a1232e93c0a5

    SHA256

    79801f4e8d8037f112ee1d10cf2f6b6a24b4b3f289f72a76054343dc294a2c2d

    SHA512

    0c8619de4e2df5511878fa1a7eddf77f486e1d42a12bec6e238e4a767e2574d401ebfb1e751be3a27913fa703448ddc96f4af60e6332b51a12c4c945f4201ceb

  • C:\Users\Admin\AppData\Local\Temp\ish240627296\images\Grey_Button.png

    Filesize

    2KB

    MD5

    9497f998e7fdd2113f14e82d45b55d0f

    SHA1

    6e2c1fd3fcd17ec4f97b747a7bdf2c35723de465

    SHA256

    13f12da31e302899a18ad6f2881778b7f9e2734eaf6583fa9cafae5fd2f96ec4

    SHA512

    2c139cf10200216952062035e058be750b1e154cfbb389c3080731e5d6d1c28509911767ff68fa01aec0b7c18bbf02d9cd6676c03b980f8d863d30757797a078

  • memory/864-128-0x00000000023C0000-0x00000000024FA000-memory.dmp

    Filesize

    1.2MB

  • memory/864-124-0x00000000023C0000-0x00000000024FA000-memory.dmp

    Filesize

    1.2MB

  • memory/864-1-0x00000000023C0000-0x00000000024FA000-memory.dmp

    Filesize

    1.2MB

  • memory/864-88-0x00000000023C0000-0x00000000024FA000-memory.dmp

    Filesize

    1.2MB

  • memory/864-91-0x00000000023C0000-0x00000000024FA000-memory.dmp

    Filesize

    1.2MB

  • memory/864-89-0x00000000023C0000-0x00000000024FA000-memory.dmp

    Filesize

    1.2MB

  • memory/864-90-0x00000000023C0000-0x00000000024FA000-memory.dmp

    Filesize

    1.2MB

  • memory/864-92-0x00000000023C0000-0x00000000024FA000-memory.dmp

    Filesize

    1.2MB

  • memory/864-108-0x00000000023C0000-0x00000000024FA000-memory.dmp

    Filesize

    1.2MB

  • memory/864-115-0x00000000023C0000-0x00000000024FA000-memory.dmp

    Filesize

    1.2MB

  • memory/864-6-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/864-4-0x00000000023C0000-0x00000000024FA000-memory.dmp

    Filesize

    1.2MB

  • memory/864-129-0x00000000023C0000-0x00000000024FA000-memory.dmp

    Filesize

    1.2MB

  • memory/864-135-0x00000000023C0000-0x00000000024FA000-memory.dmp

    Filesize

    1.2MB

  • memory/864-151-0x00000000023C0000-0x00000000024FA000-memory.dmp

    Filesize

    1.2MB

  • memory/864-133-0x00000000023C0000-0x00000000024FA000-memory.dmp

    Filesize

    1.2MB

  • memory/864-132-0x00000000023C0000-0x00000000024FA000-memory.dmp

    Filesize

    1.2MB

  • memory/864-131-0x00000000023C0000-0x00000000024FA000-memory.dmp

    Filesize

    1.2MB

  • memory/864-130-0x00000000023C0000-0x00000000024FA000-memory.dmp

    Filesize

    1.2MB

  • memory/864-0-0x0000000000401000-0x000000000040A000-memory.dmp

    Filesize

    36KB

  • memory/864-142-0x00000000023C0000-0x00000000024FA000-memory.dmp

    Filesize

    1.2MB

  • memory/864-127-0x00000000023C0000-0x00000000024FA000-memory.dmp

    Filesize

    1.2MB

  • memory/864-123-0x00000000023C0000-0x00000000024FA000-memory.dmp

    Filesize

    1.2MB

  • memory/864-5-0x00000000023C0000-0x00000000024FA000-memory.dmp

    Filesize

    1.2MB

  • memory/864-157-0x00000000023C0000-0x00000000024FA000-memory.dmp

    Filesize

    1.2MB

  • memory/864-160-0x00000000023C0000-0x00000000024FA000-memory.dmp

    Filesize

    1.2MB

  • memory/864-155-0x00000000023C0000-0x00000000024FA000-memory.dmp

    Filesize

    1.2MB

  • memory/864-161-0x00000000023C0000-0x00000000024FA000-memory.dmp

    Filesize

    1.2MB

  • memory/864-163-0x00000000023C0000-0x00000000024FA000-memory.dmp

    Filesize

    1.2MB

  • memory/864-165-0x00000000023C0000-0x00000000024FA000-memory.dmp

    Filesize

    1.2MB

  • memory/864-164-0x00000000023C0000-0x00000000024FA000-memory.dmp

    Filesize

    1.2MB

  • memory/864-166-0x00000000023C0000-0x00000000024FA000-memory.dmp

    Filesize

    1.2MB

  • memory/864-167-0x00000000023C0000-0x00000000024FA000-memory.dmp

    Filesize

    1.2MB

  • memory/864-168-0x00000000023C0000-0x00000000024FA000-memory.dmp

    Filesize

    1.2MB

  • memory/864-170-0x00000000023C0000-0x00000000024FA000-memory.dmp

    Filesize

    1.2MB

  • memory/864-172-0x00000000023C0000-0x00000000024FA000-memory.dmp

    Filesize

    1.2MB

  • memory/864-173-0x00000000023C0000-0x00000000024FA000-memory.dmp

    Filesize

    1.2MB

  • memory/864-174-0x00000000023C0000-0x00000000024FA000-memory.dmp

    Filesize

    1.2MB

  • memory/864-175-0x00000000023C0000-0x00000000024FA000-memory.dmp

    Filesize

    1.2MB

  • memory/864-176-0x00000000023C0000-0x00000000024FA000-memory.dmp

    Filesize

    1.2MB

  • memory/864-177-0x00000000023C0000-0x00000000024FA000-memory.dmp

    Filesize

    1.2MB

  • memory/864-178-0x00000000023C0000-0x00000000024FA000-memory.dmp

    Filesize

    1.2MB

  • memory/864-179-0x00000000023C0000-0x00000000024FA000-memory.dmp

    Filesize

    1.2MB

  • memory/864-180-0x00000000023C0000-0x00000000024FA000-memory.dmp

    Filesize

    1.2MB

  • memory/864-181-0x00000000023C0000-0x00000000024FA000-memory.dmp

    Filesize

    1.2MB

  • memory/864-182-0x00000000023C0000-0x00000000024FA000-memory.dmp

    Filesize

    1.2MB

  • memory/864-184-0x00000000023C0000-0x00000000024FA000-memory.dmp

    Filesize

    1.2MB