Resubmissions

26-04-2024 19:01

240426-xpejwaaa89 10

26-04-2024 19:00

240426-xnq7aaah9y 10

26-04-2024 18:24

240426-w1z5aaac81 10

Analysis

  • max time kernel
    98s
  • max time network
    96s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    26-04-2024 19:01

General

  • Target

    016268eb5a31a62631682b24291855ba_JaffaCakes118.exe

  • Size

    988KB

  • MD5

    016268eb5a31a62631682b24291855ba

  • SHA1

    9f4b549156a17451748c8a580126a18d00ffe633

  • SHA256

    c1d656f523274f8af119e05658173aa49c52d3bba63e083ca8adc7c7346f2147

  • SHA512

    a3c091820409fb3637a0c910d1f7abfc131aecf3d27f13578e0187525d86d66bce5415ba84c139a17aa3d7f891f90ff88e6ee19d3198f097030a215dc6c524a1

  • SSDEEP

    24576:hs48aycVm2RT3oy8sFKAWRN3KtCfJ0yhnSMiGr0+MC+bqF:h/NRI2tgsFGKkfXXiKyC3F

Malware Config

Signatures

  • Troldesh, Shade, Encoder.858

    Troldesh is a ransomware spread by malspam.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 22 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 37 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 15 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\016268eb5a31a62631682b24291855ba_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\016268eb5a31a62631682b24291855ba_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4296
    • C:\Users\Admin\AppData\Local\Temp\016268eb5a31a62631682b24291855ba_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\016268eb5a31a62631682b24291855ba_JaffaCakes118.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      PID:2128
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -nohome
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1240
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1240 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3284
  • C:\Windows\System32\fontview.exe
    "C:\Windows\System32\fontview.exe" C:\Users\Admin\Desktop\UninstallConvertFrom.fon
    1⤵
      PID:4480
    • C:\Windows\system32\OpenWith.exe
      C:\Windows\system32\OpenWith.exe -Embedding
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:2268
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Desktop\CheckpointUpdate.docx" /o ""
      1⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:600
    • C:\Windows\system32\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Program Files\VideoLAN\VLC\NEWS.txt
      1⤵
        PID:3336

      Network

      MITRE ATT&CK Matrix ATT&CK v13

      Persistence

      Boot or Logon Autostart Execution

      1
      T1547

      Registry Run Keys / Startup Folder

      1
      T1547.001

      Privilege Escalation

      Boot or Logon Autostart Execution

      1
      T1547

      Registry Run Keys / Startup Folder

      1
      T1547.001

      Defense Evasion

      Modify Registry

      2
      T1112

      Credential Access

      Unsecured Credentials

      1
      T1552

      Credentials In Files

      1
      T1552.001

      Discovery

      Query Registry

      3
      T1012

      System Information Discovery

      3
      T1082

      Collection

      Data from Local System

      1
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
        Filesize

        4KB

        MD5

        1bfe591a4fe3d91b03cdf26eaacd8f89

        SHA1

        719c37c320f518ac168c86723724891950911cea

        SHA256

        9cf94355051bf0f4a45724ca20d1cc02f76371b963ab7d1e38bd8997737b13d8

        SHA512

        02f88da4b610678c31664609bcfa9d61db8d0b0617649981af948f670f41a6207b4ec19fecce7385a24e0c609cbbf3f2b79a8acaf09a03c2c432cc4dce75e9db

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
        Filesize

        471B

        MD5

        1ea29a0cc6d85595d47073870a07d42e

        SHA1

        cce5c7b97cf667b82a4f434d6a2bef57c94160bb

        SHA256

        c381ccee2031990ebd66f69207392bbfe80f2b9f61b25d6b24eaf60d637ae73a

        SHA512

        6e98ef5191bf19caf5c9ba823664a5c533d105fd2d7826771f32c8a3c133a12e7158f88a7063b90e2103c3cac24824eba05ac0fd50298b3794bc7d1fd00d40aa

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
        Filesize

        338B

        MD5

        32612382a8b4891f44e05617779955eb

        SHA1

        bee6f41568c235dfd5fd790fa1b339951f2fb5ff

        SHA256

        3bd6d869fc8f64bccb672db67e7ab0a61557c791e956cc82cbd3f71c6eea8c82

        SHA512

        9f456b9b0e2577b1f92b41661a3507f4045fcfb26058b8838815017c21586e11d1f663beef11c2602e1fcba2692d5c7fcebc4a01f4d2395efa519cecbcb79958

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
        Filesize

        404B

        MD5

        feb237d9eae646c08640eb4da01d8219

        SHA1

        86f6b449cd88e4d402079bcb1e5799c2546fa9b8

        SHA256

        c92b0349c52efd7e82b4b344ee1cb5049fbacd31b8fc2eaa10f8906937ae602d

        SHA512

        d894b7a97f86e447e84a7d4c38ec88d20e7477747de8afe9cb7573a565fd065d3071d5d91d6d46722d933f13c25d0d18edda9dc89006eaf20e66f62c7a2ce69c

      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\VersionManager\ver3F27.tmp
        Filesize

        15KB

        MD5

        1a545d0052b581fbb2ab4c52133846bc

        SHA1

        62f3266a9b9925cd6d98658b92adec673cbe3dd3

        SHA256

        557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1

        SHA512

        bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d

      • C:\Users\Admin\AppData\Local\Temp\TCDCA75.tmp\sist02.xsl
        Filesize

        245KB

        MD5

        f883b260a8d67082ea895c14bf56dd56

        SHA1

        7954565c1f243d46ad3b1e2f1baf3281451fc14b

        SHA256

        ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353

        SHA512

        d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e

      • C:\Users\Admin\AppData\Local\Temp\~DF27E5E1D3CC0C6BFA.TMP
        Filesize

        16KB

        MD5

        8d716d363704f80eacc4bb24ffed7463

        SHA1

        2236674fd8cb49906017d776965ab4df39adfe4c

        SHA256

        94a138bd2795cb6ad4ec8f3f5aaebbf1364de693e9775b359f5fd8b8b8ad082c

        SHA512

        d0e86ff38bff08c3575c666829ffe07beae6f9ca83c07211901138b3440c6f9486779639f6c9ca5b5f1eefa9bd75f3a6f76fa40bc248cba20ebf6dac15f96849

      • memory/600-64-0x00007FFD48CE0000-0x00007FFD48CF0000-memory.dmp
        Filesize

        64KB

      • memory/600-57-0x00007FFD4B930000-0x00007FFD4B940000-memory.dmp
        Filesize

        64KB

      • memory/600-58-0x00007FFD4B930000-0x00007FFD4B940000-memory.dmp
        Filesize

        64KB

      • memory/600-59-0x00007FFD4B930000-0x00007FFD4B940000-memory.dmp
        Filesize

        64KB

      • memory/600-60-0x00007FFD4B930000-0x00007FFD4B940000-memory.dmp
        Filesize

        64KB

      • memory/600-63-0x00007FFD48CE0000-0x00007FFD48CF0000-memory.dmp
        Filesize

        64KB

      • memory/2128-13-0x0000000000400000-0x0000000000607000-memory.dmp
        Filesize

        2.0MB

      • memory/2128-55-0x0000000000400000-0x0000000000607000-memory.dmp
        Filesize

        2.0MB

      • memory/2128-19-0x0000000000400000-0x0000000000607000-memory.dmp
        Filesize

        2.0MB

      • memory/2128-20-0x0000000000400000-0x0000000000607000-memory.dmp
        Filesize

        2.0MB

      • memory/2128-21-0x0000000000400000-0x0000000000607000-memory.dmp
        Filesize

        2.0MB

      • memory/2128-22-0x0000000000400000-0x0000000000607000-memory.dmp
        Filesize

        2.0MB

      • memory/2128-17-0x0000000000400000-0x0000000000607000-memory.dmp
        Filesize

        2.0MB

      • memory/2128-16-0x0000000000400000-0x0000000000607000-memory.dmp
        Filesize

        2.0MB

      • memory/2128-9-0x0000000000400000-0x0000000000607000-memory.dmp
        Filesize

        2.0MB

      • memory/2128-12-0x0000000000400000-0x0000000000607000-memory.dmp
        Filesize

        2.0MB

      • memory/2128-1-0x0000000000400000-0x0000000000607000-memory.dmp
        Filesize

        2.0MB

      • memory/2128-18-0x0000000000400000-0x0000000000607000-memory.dmp
        Filesize

        2.0MB

      • memory/2128-56-0x0000000000400000-0x0000000000607000-memory.dmp
        Filesize

        2.0MB

      • memory/2128-10-0x0000000000400000-0x0000000000607000-memory.dmp
        Filesize

        2.0MB

      • memory/2128-8-0x0000000000400000-0x0000000000607000-memory.dmp
        Filesize

        2.0MB

      • memory/2128-7-0x0000000000400000-0x0000000000607000-memory.dmp
        Filesize

        2.0MB

      • memory/2128-3-0x0000000000400000-0x0000000000607000-memory.dmp
        Filesize

        2.0MB

      • memory/2128-637-0x0000000000400000-0x0000000000607000-memory.dmp
        Filesize

        2.0MB

      • memory/2128-5-0x0000000000400000-0x0000000000607000-memory.dmp
        Filesize

        2.0MB

      • memory/2128-210-0x0000000000400000-0x0000000000607000-memory.dmp
        Filesize

        2.0MB

      • memory/2128-2-0x0000000000400000-0x0000000000607000-memory.dmp
        Filesize

        2.0MB

      • memory/2128-6-0x0000000000400000-0x0000000000607000-memory.dmp
        Filesize

        2.0MB

      • memory/4296-4-0x00000000020E0000-0x00000000021C2000-memory.dmp
        Filesize

        904KB