Analysis

  • max time kernel
    117s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05-01-2025 16:03

General

  • Target

    JaffaCakes118_af382cfb9632dde6f7de3f2d0a76e103.exe

  • Size

    426KB

  • MD5

    af382cfb9632dde6f7de3f2d0a76e103

  • SHA1

    2ace18dcd993145b4367dbb13cc1b5e99c3eeaf0

  • SHA256

    44d150b890d0d9440e430d47f2b5aeb2c6b5148bbe8cfabf83dcb4f89abdef2e

  • SHA512

    4987935c732c974760b0de0d54bdef75ce0a75cf88d698e3014b974828f2d370576aa7dd79ac661f14141fd36b41e844f581a9808ea2f6eabfbc3ab5b7fba0cf

  • SSDEEP

    6144:tYvr7D1PE/3BcL9l5bUsgFxvJqBIeAZtvHLPKKzAI17JY0H+kK1e:tGPD549FRaSkT1e

Malware Config

Signatures

  • Growtopia

    Growtopa is an opensource modular stealer written in C#.

  • Growtopia family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 7 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_af382cfb9632dde6f7de3f2d0a76e103.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_af382cfb9632dde6f7de3f2d0a76e103.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2244
    • C:\Users\Admin\AppData\Local\Temp\Exafarm Loader.exe
      "C:\Users\Admin\AppData\Local\Temp\Exafarm Loader.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Modifies system certificate store
      • Suspicious use of WriteProcessMemory
      PID:2804
      • C:\Windows\system32\cmd.exe
        cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\UAC.bat"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2728
        • C:\Windows\system32\reg.exe
          REG ADD "HKCU\SOFTWARE\Classes\ms-settings\shell\open\command" /t REG_SZ /d "C:\windows\system32\cmd.exe /c REG ADD HKLM\software\microsoft\windows\currentversion\policies\system /v ConsentPromptBehaviorAdmin /t REG_DWORD /d 0 /f" /f
          4⤵
          • Modifies registry class
          PID:2396
        • C:\Windows\system32\reg.exe
          REG ADD "hkcu\software\classes\ms-settings\shell\open\command" /v DelegateExecute /t REG_SZ /d " " /f
          4⤵
          • Modifies registry class
          PID:2956
      • C:\Windows\system32\cmd.exe
        cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\DC.exe" /D
        3⤵
          PID:2696
        • C:\Windows\system32\cmd.exe
          cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\MAC.bat"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2672
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell get-NetAdapter
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2616
        • C:\Windows\system32\cmd.exe
          cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\GenReg.exe" [29549]--[140496283]--[14774,14774c,14774w,14774wc]--[105372212,105372212c]
          3⤵
            PID:2816
          • C:\Windows\system32\cmd.exe
            cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\WBPVBat.bat"
            3⤵
              PID:2188
            • C:\Windows\system32\cmd.exe
              cmd.exe /c Powershell.exe -NoProfile -ExecutionPolicy unrestricted -file "C:\Users\Admin\AppData\Local\Temp\ZBRecoveredFolder\RecoverFiles.ps1"
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:1960
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                Powershell.exe -NoProfile -ExecutionPolicy unrestricted -file "C:\Users\Admin\AppData\Local\Temp\ZBRecoveredFolder\RecoverFiles.ps1"
                4⤵
                • Command and Scripting Interpreter: PowerShell
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:796
            • C:\Windows\system32\cmd.exe
              cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ScanPC.bat"
              3⤵
                PID:2260
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2804 -s 1516
                3⤵
                • Loads dropped DLL
                • Program crash
                PID:2344

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\Cab47CC.tmp

            Filesize

            70KB

            MD5

            49aebf8cbd62d92ac215b2923fb1b9f5

            SHA1

            1723be06719828dda65ad804298d0431f6aff976

            SHA256

            b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

            SHA512

            bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

          • C:\Users\Admin\AppData\Local\Temp\Exafarm Loader.exe

            Filesize

            151KB

            MD5

            a5649742d25bd68b1db70b70b3012d50

            SHA1

            469f0f58b70db096c8e0ecc30252d26fe274ff76

            SHA256

            f2adef7d44afd81ae29ff66853f7db11c5959d22439cd623291638dc657fca38

            SHA512

            b5db014aab517a28959562bde768c375805cdff9a1f241460da849e0637dfafe88d4c7dc9129e7c63b651a3a8bbd6b9721d47c8a53182f1151893f419aac0a71

          • C:\Users\Admin\AppData\Local\Temp\MAC.bat

            Filesize

            42B

            MD5

            56120ea7d97e691243935b98d32f4b65

            SHA1

            f89f6249a946882410de06765ec07e11f2608177

            SHA256

            1d6a29ec8b4f624b3246450c2a34ae1a8b3e35cdc7f3fa86a680e14169e01a67

            SHA512

            4cda70d6283fc48105a64c157c50fbe61bc5c77aa0f28e8c1176943cfdfa4345df77f09573d49ff896830cfc8315547a453a7bcbe68c00dd140b99ead94c8b5b

          • C:\Users\Admin\AppData\Local\Temp\MAC.zb

            Filesize

            423B

            MD5

            dfd4ca0036d729b95ec5a67081801628

            SHA1

            d213288411a38c9b60b606321e5617180805a7c3

            SHA256

            663431f49b93a7cc72370896bb20920edae4764b1fac6da2c31717c0ebdfd1e4

            SHA512

            c844edabab2dac76b0ee6f3203dca97a9009443df3466621616e2536570c1be04177e5080d83330440d2e4b6b58de604d93f040fb49cd109e4849fcc383a5316

          • C:\Users\Admin\AppData\Local\Temp\ScanPC.bat

            Filesize

            65B

            MD5

            fe76c9e647f358368eaf4e222e204dc6

            SHA1

            c94ea01f006620f2adedf56a377ad452b30be98a

            SHA256

            46aa77e7b80cab973f35033380be8dd8924bc7a5f43990037359809baf628244

            SHA512

            fd1b4fe5bc64813614a847d9552d4e29a9ec9957f4e7a94176d65298293412213f0255400bf55d188a4a159575d611a072fce999e2253adf0be8f382af977daa

          • C:\Users\Admin\AppData\Local\Temp\Tar484B.tmp

            Filesize

            181KB

            MD5

            4ea6026cf93ec6338144661bf1202cd1

            SHA1

            a1dec9044f750ad887935a01430bf49322fbdcb7

            SHA256

            8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

            SHA512

            6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

          • C:\Users\Admin\AppData\Local\Temp\UAC.bat

            Filesize

            351B

            MD5

            84e809c3854f97339e11bb74129f69d1

            SHA1

            63e45ca731eeb00cbbd89b8870c1cdeeaf6c8ef0

            SHA256

            c9db5db63e80c488a96460c775e88a7208e6ca278f14128a1267d4d6f3f3187c

            SHA512

            e8d313fc47f247770e3c346c7a9fe13902e80f1e2a37e08a46a7c0a3026cc3939a84a321f90d09b5aa9f6e7aa0dc799d86bc58e417e8bd4e197d5b62d23dacc5

          • C:\Users\Admin\AppData\Local\Temp\WBPVBat.bat

            Filesize

            45B

            MD5

            8f6fe19e0609ab1352a0789cc2f26930

            SHA1

            0e03b9c99795d0edece5b885211d142e21df56bc

            SHA256

            390d8088e112cd92ed0f9be3ac1cc127e6cdf482d0b7546ec869c73d85a6d682

            SHA512

            d4fce506abdb0c25564a99b1d49e067197d61b2fc43fcc7bb063d1fc084cc1591162ae8a3c20c78558bb0543ea892323aacc4d609658ea1593f936f1ff13b17a

          • C:\Users\Admin\AppData\Local\Temp\ZBRecoveredFolder\RecoverFiles.ps1

            Filesize

            253B

            MD5

            c2a812a536121ead50a97e6dca817b19

            SHA1

            d56a1b38c4161f03e01bc95e3d5172c1b54b6143

            SHA256

            e73f61c7505305910b75d1794b43b1d3030034459e2cb0e723d4f3b16384554e

            SHA512

            bab9271abc4e6da9c7c3aba74ec59e98d4325888235d1e364045ddaeef5aec42342ef4683a4541019f7190af160f555d673e9924ab8daf09b8816350b4d2ce46

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

            Filesize

            7KB

            MD5

            94f5485258d47565e9bf1a4fd2ecb4e8

            SHA1

            08ff204548b3efca75458388c0cfbbe8c4564f02

            SHA256

            efeea6045eaa4b1572cab3b7543ea32eccde752f2995f91e644e96ba0db61266

            SHA512

            3921371177395fe4f5617dbab3602134a4b28510cc48a4b84a4438863bfdb714952c8308a2fc27f2ce21b0ccbd76b3d84fe1f0cff99e83cb7ac25a50f28372ec

          • memory/796-92-0x000000001B740000-0x000000001BA22000-memory.dmp

            Filesize

            2.9MB

          • memory/796-93-0x00000000027D0000-0x00000000027D8000-memory.dmp

            Filesize

            32KB

          • memory/2244-0-0x000007FEF5E23000-0x000007FEF5E24000-memory.dmp

            Filesize

            4KB

          • memory/2244-1-0x0000000000180000-0x00000000001F0000-memory.dmp

            Filesize

            448KB

          • memory/2616-80-0x00000000023D0000-0x00000000023D8000-memory.dmp

            Filesize

            32KB

          • memory/2616-79-0x000000001B710000-0x000000001B9F2000-memory.dmp

            Filesize

            2.9MB