Analysis

  • max time kernel
    144s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    31-10-2024 08:28

General

  • Target

    8276750c5376d3bff650384015695d37_JaffaCakes118.exe

  • Size

    134KB

  • MD5

    8276750c5376d3bff650384015695d37

  • SHA1

    b2134e886934afe496673b65dcd7eeb0874821c3

  • SHA256

    df3abde34a02d47cca84c2d8d9b9ef4b0f29004c1464d6e84ef66377c19a861d

  • SHA512

    44eb0a0d1d30949b3370d71898e249ca8284522549a02b2c8d923f5132214ff309e292ba753ff7eacfd175b5390ce46d4c2901553a68a2e90452274160cb59e8

  • SSDEEP

    1536:8uDAfCsBfLLyIq/o0ksFppobLIliYc0fwFa5wA/9iKKbH9:P8KsBfL2//Qs2bL34wF4LAXbH9

Malware Config

Signatures

  • Server Software Component: Terminal Services DLL 1 TTPs 10 IoCs
  • Loads dropped DLL 16 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in System32 directory 10 IoCs
  • Drops file in Program Files directory 32 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8276750c5376d3bff650384015695d37_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8276750c5376d3bff650384015695d37_JaffaCakes118.exe"
    1⤵
    • Server Software Component: Terminal Services DLL
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    PID:2016
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:2864
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2108
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:2260
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:1600
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:2240
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:2708
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:1732
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:2168
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2200
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:2548

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Package Cache\{4d8dcf8c-a72a-43e1-9833-c12724db736e}\VC_redist.x86.exe

    Filesize

    635KB

    MD5

    7b65288f6f29ac0521df70fff568fbb7

    SHA1

    b06fa446ad86f1514c6b5a5a805af2f26532d87c

    SHA256

    3dc55c81f9d49c3c78eb65ac1981dfdea7731168f0c6e263e503b965480b2454

    SHA512

    98d452e84c0b27a703b212b9faa5c45e140052a55595b071303e002c70764b7a288a50e7de25862da786706ccbaa1a9b53b07ebf1beb4a3e2fa50f4a5109a5a3

  • C:\ProgramData\Package Cache\{57a73df6-4ba9-4c1d-bbbb-517289ff6c13}\VC_redist.x64.exe

    Filesize

    635KB

    MD5

    afdaa0a824535f51d4221efdbac647df

    SHA1

    3e801665b66ca1adb2a0b5287d5f323fee4e2146

    SHA256

    746145ea1f97a1d4d352a84f4121a1e1132e54017816c01da4ccb42857b3eab0

    SHA512

    2910c7b237639252a2f8bbe83993c21096eace5b0bfd051f8600a1286472d0736a897769e996bfbaa7c80dd8f9433cd48a958a238675feaedab03a766ba6a5f4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7B8944BA8AD0EFDF0E01A43EF62BECD0_B2DB1CC4B5F2D2A802D56AAED525802D

    Filesize

    5B

    MD5

    5bfa51f3a417b98e7443eca90fc94703

    SHA1

    8c015d80b8a23f780bdd215dc842b0f5551f63bd

    SHA256

    bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128

    SHA512

    4cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C3948BE6E525B8A8CEE9FAC91C9E392_F70553637B9F26717122C4DAFA3ADB11

    Filesize

    412B

    MD5

    717b92e0f1bf4e400719bedcf2aaab07

    SHA1

    2c225f64d9387159208315d113cb24887e26db4b

    SHA256

    13170b1b6ecbd6bc989ef274bf3c9d0570ac81738ac9eb6e1526458376739e8b

    SHA512

    75fbe04c4da5868e7ade012c806820cc01b848d09729899494b5203b8ebc3689aa940a372ba4aeca860c3ce2295722a1e61ace14dd509769652e6377623835c5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6c2d6c9163acbc243c6838ff647224d4

    SHA1

    79a834788440a85eada7fa5a2f0c06567b51bf04

    SHA256

    64d3d1207f0ce317e21d70e900bbc783ec6bd1c49d7e516d3c5f52a1bbe4c85a

    SHA512

    db5ae12458d223d9aff80b94790bfe44926fb5f8ade76ef3357e5db18e40b8679457096505e1df8bb77afd7e8c95ae0087c722ff3d4b4e8aaaa449b1cdb1ad87

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b9bd11397e0d41e1c2bb8405f1f0876d

    SHA1

    843b4c82644dc27c6b8d140626206370b4592c07

    SHA256

    8f73c8bfeb1ce3fabb64abab8995fbc3d92e199a9fc10ba4f2db73112b565e67

    SHA512

    09afe35535f41689d954a872aaf4737855db75a37ccf1e81cf3a0f49f9b4703e2c224fce3b075aa08b4197e822803a8787734fd9cbdebbe78f7307e25594700b

  • C:\Users\Admin\AppData\Local\Temp\CabDD86.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarDE06.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \??\c:\windows\SysWOW64\fastuserswitchingcompatibility.dll

    Filesize

    134KB

    MD5

    852549e5cc3e2371baf22441c8f1c028

    SHA1

    f62ea61dde955dd1bba5611d6f2d99b108d7ae0f

    SHA256

    374fe3ce53605655a7f101fc91169373023c80891b2fbcc5e12571a80bb0bd6f

    SHA512

    1f5b6fa7088f489280d0dc140c33d5db669cf746b03d115c0ec07fdfaa357ecf87a9a90016e6015b805c804df4dc68e390d97c4b64f826783881bf0c888bd2db

  • memory/1600-340-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB

  • memory/1600-341-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB

  • memory/1732-358-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB

  • memory/1732-357-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB

  • memory/2016-2-0x0000000000230000-0x0000000000252000-memory.dmp

    Filesize

    136KB

  • memory/2016-1-0x0000000000230000-0x0000000000252000-memory.dmp

    Filesize

    136KB

  • memory/2016-0-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB

  • memory/2016-154-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB

  • memory/2016-155-0x0000000000230000-0x0000000000252000-memory.dmp

    Filesize

    136KB

  • memory/2168-364-0x0000000000260000-0x0000000000282000-memory.dmp

    Filesize

    136KB

  • memory/2168-362-0x0000000000260000-0x0000000000282000-memory.dmp

    Filesize

    136KB

  • memory/2240-347-0x0000000000150000-0x0000000000172000-memory.dmp

    Filesize

    136KB

  • memory/2240-345-0x0000000000150000-0x0000000000172000-memory.dmp

    Filesize

    136KB

  • memory/2260-334-0x00000000002F0000-0x0000000000312000-memory.dmp

    Filesize

    136KB

  • memory/2260-335-0x00000000002F0000-0x0000000000312000-memory.dmp

    Filesize

    136KB

  • memory/2548-371-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB

  • memory/2548-370-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB

  • memory/2708-352-0x00000000002E0000-0x0000000000302000-memory.dmp

    Filesize

    136KB

  • memory/2864-327-0x0000000000110000-0x0000000000132000-memory.dmp

    Filesize

    136KB

  • memory/2864-328-0x0000000000110000-0x0000000000132000-memory.dmp

    Filesize

    136KB