Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
05/04/2024, 16:46
Static task
static1
Behavioral task
behavioral1
Sample
d9320f2b15249a2aa4a0b2bb59a1a27d_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
d9320f2b15249a2aa4a0b2bb59a1a27d_JaffaCakes118.exe
Resource
win10v2004-20231215-en
General
-
Target
d9320f2b15249a2aa4a0b2bb59a1a27d_JaffaCakes118.exe
-
Size
87KB
-
MD5
d9320f2b15249a2aa4a0b2bb59a1a27d
-
SHA1
85094a1c32f1d4ad7718e62ced07603ff77a277d
-
SHA256
80122c05054b4808c9590ec127a21875670c64aef8992054db4ff1959911146d
-
SHA512
445e5b29e869ea8c2c63279cd9ce1e9bf26f0a5127b8d9332c58b5e883fcb7dad4ef760eedc9980254e195ed1630d119750ce4aa39007b355eed99d2bbfbef3a
-
SSDEEP
1536:p4q8Q1xZtffrb8sjPFNhTYsFFrzckH2fmitUwmDwV342OJor8LadCo:qKtfDwsjPThTYszDH2fOJ242OJor7f
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1296 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2540 Logo1_.exe 2532 d9320f2b15249a2aa4a0b2bb59a1a27d_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 1296 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\jp2launcher.exe Logo1_.exe File opened for modification C:\Program Files\Windows Journal\PDIALOG.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TextConv\WksConv\Wkconv.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ielowutil.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmc.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\policytool.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Mail\WinMail.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaws.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroTextExtractor.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Updater6\AdobeUpdaterInstallMgr.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Adobe AIR Application Installer.exe Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\extcheck.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\java.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\ssvagent.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CLVIEW.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\wmlaunch.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jabswitch.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\pack200.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\schemagen.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\policytool.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jar.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\SC_Reader.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\106.0.5249.119\chrome_installer.exe Logo1_.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\policytool.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\bckgzm.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\DW\DWTRIG20.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OIS.EXE Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jdb.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\ktab.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\wmpshare.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\wmpenc.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jarsigner.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\java-rmi.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\orbd.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSACCESS.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOSYNC.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSQRY32.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SELFCERT.EXE Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java-rmi.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmic.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\PurblePlace.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\uninstall.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\INFOPATH.EXE Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\klist.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\klist.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\pipanel.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ExtExport.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSPUB.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SCANPST.EXE Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\native2ascii.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\pack200.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\chkrzm.exe Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\A3DUtility.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\template.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\SmartTagInstall.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\XLICONS.EXE Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstatd.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\klist.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\servertool.exe Logo1_.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Logo1_.exe d9320f2b15249a2aa4a0b2bb59a1a27d_JaffaCakes118.exe File created C:\Windows\virDll.dll Logo1_.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2540 Logo1_.exe 2540 Logo1_.exe 2540 Logo1_.exe 2540 Logo1_.exe 2540 Logo1_.exe 2540 Logo1_.exe 2540 Logo1_.exe 2540 Logo1_.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1708 wrote to memory of 1296 1708 d9320f2b15249a2aa4a0b2bb59a1a27d_JaffaCakes118.exe 28 PID 1708 wrote to memory of 1296 1708 d9320f2b15249a2aa4a0b2bb59a1a27d_JaffaCakes118.exe 28 PID 1708 wrote to memory of 1296 1708 d9320f2b15249a2aa4a0b2bb59a1a27d_JaffaCakes118.exe 28 PID 1708 wrote to memory of 1296 1708 d9320f2b15249a2aa4a0b2bb59a1a27d_JaffaCakes118.exe 28 PID 1708 wrote to memory of 2540 1708 d9320f2b15249a2aa4a0b2bb59a1a27d_JaffaCakes118.exe 29 PID 1708 wrote to memory of 2540 1708 d9320f2b15249a2aa4a0b2bb59a1a27d_JaffaCakes118.exe 29 PID 1708 wrote to memory of 2540 1708 d9320f2b15249a2aa4a0b2bb59a1a27d_JaffaCakes118.exe 29 PID 1708 wrote to memory of 2540 1708 d9320f2b15249a2aa4a0b2bb59a1a27d_JaffaCakes118.exe 29 PID 2540 wrote to memory of 1208 2540 Logo1_.exe 21 PID 2540 wrote to memory of 1208 2540 Logo1_.exe 21 PID 1296 wrote to memory of 2532 1296 cmd.exe 31 PID 1296 wrote to memory of 2532 1296 cmd.exe 31 PID 1296 wrote to memory of 2532 1296 cmd.exe 31 PID 1296 wrote to memory of 2532 1296 cmd.exe 31
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\d9320f2b15249a2aa4a0b2bb59a1a27d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d9320f2b15249a2aa4a0b2bb59a1a27d_JaffaCakes118.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aA1E.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Users\Admin\AppData\Local\Temp\d9320f2b15249a2aa4a0b2bb59a1a27d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d9320f2b15249a2aa4a0b2bb59a1a27d_JaffaCakes118.exe"4⤵
- Executes dropped EXE
PID:2532
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2540
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
613B
MD552af58e4ab3c9b503af07104aaa5bc20
SHA12c0601a549eef45c857044081219bfaaab8074fe
SHA256eed22e335e64eea2800c0f24bad11d7ffe7c73d4363e77d720a31a39b261a252
SHA512cb998b9a747b7afda3faf250500f935ba69fe2889397c1ccad77c6e351c7b45574f899149fb79365c9300fbe55b5de7460ad44a39d5c09492667e2bdc09f3596
-
Filesize
29KB
MD55ee51a71335a02d839e4c9e644476ffb
SHA11417dfa69cddb1fabc6ae92b0154a2ede73e658c
SHA2562d3a4cef5eb707592afd3c39d9fcc6dd5b0bf80fbaacd348c2f1908346661aaf
SHA512b5ac870859e7120adcad90d6f8cab7e9057b38083b3d47181e8f4298a31a8097533d7695e17eb6927edb1012ad5533e4b8dcba702c9c8f4875627bb268caee39
-
Filesize
58KB
MD5787cc9bf2bb04a2053349ec941f4b492
SHA113f3b359d0466c5a76b4c0c658c53b310f992c12
SHA256af2bca9b3a2d5d812d10abda7c5d433456e38cb9c3f40846fc7c1457cc54765f
SHA512db4a59639b304fc0e282a45e659846eadd7f9708ed4ad96ae84a8b5521a89d47871f6b18876e8c94d9326107f5de6baf7aa16a1e09a0b312effd9addf709a1ee