Analysis

  • max time kernel
    117s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    29-11-2024 08:01

General

  • Target

    afe792e92c8def79c88d16479c8f9051_JaffaCakes118.exe

  • Size

    364KB

  • MD5

    afe792e92c8def79c88d16479c8f9051

  • SHA1

    c7ba86acd3435e4242092e607f4007ffe7f8cef5

  • SHA256

    e9bc6d9a2f1beee9a1bc7cd7a5f244fd72f4bececf7799f8b3788491aacee67a

  • SHA512

    0440b9aeacd9718c7f6e277cfb095e7bcf698159fe505863f878c61b00e308a7ec2421660227e7e11c14d1f0d97379ba87a1b4fe2ede50d9cfb4031a8db34da1

  • SSDEEP

    6144:vdBavOW+2/czOW+2/cxsgz3qm5N7cjh6lHSkJrcOR63mFi9gYR73:vdBavVcDVcjz3/86tAOgiuXb

Malware Config

Signatures

  • ISR Stealer

    ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

  • ISR Stealer payload 1 IoCs
  • Isrstealer family
  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\afe792e92c8def79c88d16479c8f9051_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\afe792e92c8def79c88d16479c8f9051_JaffaCakes118.exe"
    1⤵
    • Identifies Wine through registry keys
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1976
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2156
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2156 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2312

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    065112c667fb90c42ed01c671f0f0464

    SHA1

    30698e76370f724880f4d9c160679c82c0ff56de

    SHA256

    47d61ad53d5c1ebbba50a4748e3b8d54d1fa7ba72b75f1dff818294965a60335

    SHA512

    4c0bd2efef70abbe598f1ddfd0405d9e5318beab92dd0d79479c4bea8a6ed5a1ac44d2e982980285a7842cc8add7ccca619bc950f3cc33f263f5cf7eccc080bd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9101e9eacbace736764ca6a8bb209ef3

    SHA1

    3e5640da360a58afd3d082f19d740138c80da26f

    SHA256

    b765475b7ca94d57ea0f2a052ad5460d8ca43832cb9a02fa774b8f0937d2db47

    SHA512

    e43d494ad823c0ca5c1cfcd1da4c596684ad642205ffd0439d74e6abbdb781b9db24a8b1c7f8ce568e6118bf8fd3e71a5b3863d83c1945c57046a2c513e6929b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5b445637dd4405f3df11418d7bcd9a2e

    SHA1

    63c665362607eb578ea01333b359049573d8446b

    SHA256

    9ccbf0074d0fc0bb69d475927ac0540713ce126787dd63b4fd42660a444f7539

    SHA512

    ac15c3bcef810ff48ed6a5c3c8683a0ac15db756ab1aff863644595e156c7eed485867de4004b73c4cfdaf0810c190193fcc663b5557bcece97bd8bd3e2cec36

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cd761defd6d1855ce2fa1b688ffc86c6

    SHA1

    bc676e8a6e82ad7ba4d60a8a21569f3eb4deebbb

    SHA256

    f98ceae44920dce06a7002a0aedf79d2d4766af7fc1e1620177e5090b40e41bb

    SHA512

    cd1c9c3e945ec9a3c3b00d041109ad4fd1ff0451260318ebc3c9a85329aa5ce9a0763b45223f2fb8b32d3b9f556b8342997f11ddff6fed9110a1df8e4403a7ec

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dafc3a407a655882acdb6d65132fd168

    SHA1

    17304bae1e7e77ad54754eb6b47a48556e5e232b

    SHA256

    bf953868b4b3ff7bfe0d1c4e4d14e5a0b68fe4bbb7aa80603277db73811264d5

    SHA512

    1bf2858db2eaf61290f4d6730b4de92d62babf7dfe9df33b4803120ac9662fa402d5db3fe94a3f2168198e40ea8f9065602104d07e8bc6dd0e295a14e47692df

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e063e19130cfdfe38e613d2b6400a307

    SHA1

    4aa272430a4e3ff795507dece593fbe600039a3d

    SHA256

    09ffac5e81a1f610c35bf80d9cd1ecad5ffab581e881666a0316a80dfba6a794

    SHA512

    a589927767dd2964c2fd689e277e32d4e83d432a2f16ce7bcf6f9f066bd808df325cbb1bb7c80427a495f94575536d09ac5f2b2e15cc880c247d8ce3a934bd2e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    83ef717f6d77ff725bee3117eb0b2ed8

    SHA1

    eb673682b4e408fe6294fccf4325a19b18cb674d

    SHA256

    e122935f6bde2b53059663523d7d34076d789bf12e34c3aed7abcd4b82532f7e

    SHA512

    15e884b8e24cd052b2216f9e98d1f90fefcbc3b571ba09a4d165e4953419ef1dc1db7972ad7746ee2129b03a05e33e0f6680d4ef6121f64cd5597390ff3c4518

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    60d6aaf196de8684257fe6900ac67912

    SHA1

    3e68cb3288b63dabf96a4eef4b0865d91bb8d5ec

    SHA256

    dda6ac0cd50e1b89e1b14098b09f2f90cf8dfe84a894bd99b2c712443bb2790d

    SHA512

    de04be558b5231219d893fb1024437c6dbd0d144e611566b5c0a160aabd8df23732f53b4786ace82bf21283fe99e724e7d83e97d8431fcf76299228082597c3c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    69abb376cffb0e89517c56fff91c70ef

    SHA1

    8b2c0856d63ca8fc7d536d9090cf188eb697fa83

    SHA256

    265d6cd719f55d575fc7261c15de9b601d158ad1dc5b6f5f1694c51a55ff9164

    SHA512

    fd1fa9aebc7300b7e767d3d41640c66d66b2064f464b070e2da8b650bece8186c2ea8cbc5fde84c7fed869c1fa93088afac94302436f07164b15078dbd4c47a3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0a490f52533c4d274fac2c5e804578fd

    SHA1

    86cea20ba053253e2b377f58fd2e285dce4c4420

    SHA256

    a9dfefe58c58fe27c8a21610866c72eb438de650fe48acca383e9abeb3db6d12

    SHA512

    a4f1b56f55f26cf8bfa162781722a286bc0fb66a2466fdd957e8fe2b13cc7cb8ed2b5a7aab225a69d8268fb6fc4e0339776cf5546eb6b95d8ec7f121621900eb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5e201a3f01de5c50b71697dc8effd60b

    SHA1

    be73d9c4d9110f793b89f117170b149db64d740f

    SHA256

    e1f6d750012457ca25c3102af5091179b2792366a703938de35a49a7ca920bc4

    SHA512

    f251f40a4c4bcae2874896deda6ab10828ee658729ff9c3a944aea9763af607747f7382480814f62bf7cb05f6c53a3b1856f5d4ec1a854b8d26725791c502a19

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4450cbc62808ab89c782ba43ca156991

    SHA1

    d9d8dd3e71d02dc9bdfa7f107b1dcafd826757b6

    SHA256

    6f9ad8e76e05d02fe12893013f576e47ea003b716d1287dd9a48ac2522fd86f1

    SHA512

    1f77ca4f677fc241b572482b2dbd816d4b870b1e512e4dede05d878c52849e75d888604e862cb5f4f35444ec4958781ffe8cec7e9cf8638626c88144dca171f1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8a0c77dbb8e56b774d32da32888c26ba

    SHA1

    b36a8238d1da89c6bfe2dec4e4023f144d22dc3d

    SHA256

    c6379d605bc5583f19784868b68e088852085d49be920c6f23ad417fff4fbf35

    SHA512

    72d8a543a6dd7d36638d1c236d581294435762f75955e8c7d92c1922042cb86b0c029aa3c35fd2b373139212e4dcd266cdf437ccd9f672a75b01c7b700b82254

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c73e88465a9c0863628225906024d96b

    SHA1

    4c2c73b9cbd728b0bc9fc8209bbd5d74013873e9

    SHA256

    f0950b37a695ed7136f6dd8070c2582a6fcd6e06132b041d10e0334659871099

    SHA512

    f6d1bbc0708f89cf41308d8f5f5916281f5c3ef6cb52a9f006877fa91a00912c460a987d5489dbbfb910da006c25d07198eec79531a42852295e0362256a5fde

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    db3d2b898a8258ed1c9b12d407130458

    SHA1

    a4fd9620765c055421b007804898c62428180df3

    SHA256

    c313cf7f51a4d369dcca5f6a4d06316c626a2ea14738a54a5c95b41395c2ebfe

    SHA512

    821aaac136166e483517a79473bdbcd4d6bc187cedb0b80ef55dd507e11b5a4e96a2898a4965256eae4ef7af64712676f24d72b07ede86c9d966b863a4cd36f6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ef0a1cf467f1a2e25161526c2c6e3560

    SHA1

    021fa09d3da8f245f1a34461be6d3571415cf29e

    SHA256

    cbbb5754e34da48d8d556c43df788158735565f621f0318adc9260eceffe7644

    SHA512

    035dbc74788b5745494184cb2a572ada7d5add703544012591c2e2506afcfff7199df8298856384158ea82e2ce27d42f9df4042553d81c267674779efe7e1f70

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    aeb6f129af2615a2467d35b71eae5cfc

    SHA1

    8b604a09ad5904c465473697b78a57d2c00bbc05

    SHA256

    92ac1ddc219ef0eee9c57dc015f67a92ad8d7562a2cfd0daf154d809b4b15030

    SHA512

    c34f473ebac2d08fb719b3a14cff4baf7ff81ccf2c3f03977c81d6157b609e37a0a9396191d8c0accdd176af21133480e95ff9516e3fce1e3837cfbae26876e0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    68e48ff80632da363cff3295075456ea

    SHA1

    32546f83c5bedd195f89cacb4a6746c78de4ecd7

    SHA256

    0b6bdc0502979ebf869ad09fc41fffc5b250430eceb75e496ed5fa4aab44c66f

    SHA512

    5b2f2d44e3c35acd81a692feaf77422b9f31e43491810d045c16a92bab7724c55fadd26dcd80039efbf1418801a06ff19a6a2c7aa2fde04927200567fff94a07

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dc695de825ce13ddcb093210a9988c74

    SHA1

    ccb0f5300fe9be09c103b4ed986b3b70340fe3b4

    SHA256

    ee2d6fa59fae4dab60ddb16e8aeb57161c1d8d4f23602605e5c6d43c26865e24

    SHA512

    c495e590046346c045eb496df13138a2b0d6fc5aecad653f27de22a47fc11c948dcda50a09fb389811e8bc9717e8a976c67158c089d98b2e22b58f1f3b28b1b9

  • C:\Users\Admin\AppData\Local\Temp\CabFEDB.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarFF8A.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2156-0-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB