Analysis
-
max time kernel
150s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08/04/2024, 14:25
Static task
static1
Behavioral task
behavioral1
Sample
e7aaa493057a46d27453f462717df3f1_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e7aaa493057a46d27453f462717df3f1_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
e7aaa493057a46d27453f462717df3f1_JaffaCakes118.exe
-
Size
157KB
-
MD5
e7aaa493057a46d27453f462717df3f1
-
SHA1
421e61e17d5df6f6b36c8f87c3373a71f70334ee
-
SHA256
2e31b00188d8fbd3c8d548fbf9103f61b3222976b45d637ded902d624a57a8d8
-
SHA512
6ab1b61893983241795c639b5607d94c60629b31ffc313601d11cf860f75208698bf2ad8cd6e66175b337e7b36255021e0ffb12be4dce0b91399ea39471c2c02
-
SSDEEP
3072:uyjeJhyDR+FrRLIT7+cXmImWpJMd40wD+sc8dgSgmUoODRU+lLyHgNlOCzg:udbFrVIdXRHvl0wKv8d2DRU+tVnOC0
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2868 B6232F3AAC6.exe 2520 OOUA209.exe -
Loads dropped DLL 3 IoCs
pid Process 2256 e7aaa493057a46d27453f462717df3f1_JaffaCakes118.exe 2868 B6232F3AAC6.exe 2868 B6232F3AAC6.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2256-0-0x00000000007E0000-0x0000000000840000-memory.dmp upx behavioral1/memory/2256-6-0x00000000007E0000-0x0000000000840000-memory.dmp upx behavioral1/memory/2256-5-0x00000000007E0000-0x0000000000840000-memory.dmp upx behavioral1/memory/2256-9-0x00000000007E0000-0x0000000000840000-memory.dmp upx behavioral1/memory/2256-11-0x00000000007E0000-0x0000000000840000-memory.dmp upx behavioral1/memory/2256-7-0x00000000007E0000-0x0000000000840000-memory.dmp upx behavioral1/memory/2256-12-0x00000000007E0000-0x0000000000840000-memory.dmp upx behavioral1/memory/2868-24-0x00000000001C0000-0x0000000000220000-memory.dmp upx behavioral1/memory/2868-30-0x00000000001C0000-0x0000000000220000-memory.dmp upx behavioral1/memory/2868-29-0x00000000001C0000-0x0000000000220000-memory.dmp upx behavioral1/memory/2868-32-0x00000000001C0000-0x0000000000220000-memory.dmp upx behavioral1/memory/2868-34-0x00000000001C0000-0x0000000000220000-memory.dmp upx behavioral1/memory/2868-35-0x00000000001C0000-0x0000000000220000-memory.dmp upx behavioral1/memory/2868-56-0x00000000001C0000-0x0000000000220000-memory.dmp upx behavioral1/memory/2256-65-0x00000000007E0000-0x0000000000840000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\4Y3Y0C3AYF7W1HXESOOO = "C:\\Recycle.Bin\\B6232F3AAC6.exe /q" OOUA209.exe -
Modifies Internet Explorer Phishing Filter 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PhishingFilter\ShownServiceDownBalloon = "0" OOUA209.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PhishingFilter OOUA209.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PhishingFilter\EnabledV8 = "0" OOUA209.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery OOUA209.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\ClearBrowsingHistoryOnExit = "0" OOUA209.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2256 e7aaa493057a46d27453f462717df3f1_JaffaCakes118.exe 2256 e7aaa493057a46d27453f462717df3f1_JaffaCakes118.exe 2868 B6232F3AAC6.exe 2520 OOUA209.exe 2520 OOUA209.exe 2520 OOUA209.exe 2520 OOUA209.exe 2520 OOUA209.exe 2520 OOUA209.exe 2520 OOUA209.exe 2520 OOUA209.exe 2520 OOUA209.exe 2520 OOUA209.exe 2520 OOUA209.exe 2520 OOUA209.exe 2520 OOUA209.exe 2520 OOUA209.exe 2520 OOUA209.exe 2520 OOUA209.exe 2520 OOUA209.exe 2520 OOUA209.exe 2520 OOUA209.exe 2520 OOUA209.exe 2520 OOUA209.exe 2520 OOUA209.exe 2520 OOUA209.exe 2520 OOUA209.exe 2520 OOUA209.exe 2520 OOUA209.exe 2520 OOUA209.exe 2520 OOUA209.exe 2520 OOUA209.exe 2520 OOUA209.exe 2520 OOUA209.exe 2520 OOUA209.exe 2520 OOUA209.exe 2520 OOUA209.exe 2520 OOUA209.exe 2520 OOUA209.exe 2520 OOUA209.exe 2520 OOUA209.exe 2520 OOUA209.exe 2520 OOUA209.exe 2520 OOUA209.exe 2520 OOUA209.exe 2520 OOUA209.exe 2520 OOUA209.exe 2520 OOUA209.exe 2520 OOUA209.exe 2520 OOUA209.exe 2520 OOUA209.exe 2520 OOUA209.exe 2520 OOUA209.exe 2520 OOUA209.exe 2520 OOUA209.exe 2520 OOUA209.exe 2520 OOUA209.exe 2520 OOUA209.exe 2520 OOUA209.exe 2520 OOUA209.exe 2520 OOUA209.exe 2520 OOUA209.exe 2520 OOUA209.exe 2520 OOUA209.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2256 e7aaa493057a46d27453f462717df3f1_JaffaCakes118.exe Token: SeDebugPrivilege 2256 e7aaa493057a46d27453f462717df3f1_JaffaCakes118.exe Token: SeDebugPrivilege 2256 e7aaa493057a46d27453f462717df3f1_JaffaCakes118.exe Token: SeDebugPrivilege 2256 e7aaa493057a46d27453f462717df3f1_JaffaCakes118.exe Token: SeDebugPrivilege 2868 B6232F3AAC6.exe Token: SeDebugPrivilege 2868 B6232F3AAC6.exe Token: SeDebugPrivilege 2520 OOUA209.exe Token: SeDebugPrivilege 2520 OOUA209.exe Token: SeDebugPrivilege 2520 OOUA209.exe Token: SeDebugPrivilege 2520 OOUA209.exe Token: SeDebugPrivilege 2520 OOUA209.exe Token: SeDebugPrivilege 2520 OOUA209.exe Token: SeDebugPrivilege 2520 OOUA209.exe Token: SeDebugPrivilege 2520 OOUA209.exe Token: SeDebugPrivilege 2520 OOUA209.exe Token: SeDebugPrivilege 2520 OOUA209.exe Token: SeDebugPrivilege 2520 OOUA209.exe Token: SeDebugPrivilege 2520 OOUA209.exe Token: SeDebugPrivilege 2520 OOUA209.exe Token: SeDebugPrivilege 2520 OOUA209.exe Token: SeDebugPrivilege 2520 OOUA209.exe Token: SeDebugPrivilege 2520 OOUA209.exe Token: SeDebugPrivilege 2520 OOUA209.exe Token: SeDebugPrivilege 2520 OOUA209.exe Token: SeDebugPrivilege 2520 OOUA209.exe Token: SeDebugPrivilege 2520 OOUA209.exe Token: SeDebugPrivilege 2520 OOUA209.exe Token: SeDebugPrivilege 2520 OOUA209.exe Token: SeDebugPrivilege 2520 OOUA209.exe Token: SeDebugPrivilege 2520 OOUA209.exe Token: SeDebugPrivilege 2520 OOUA209.exe Token: SeDebugPrivilege 2520 OOUA209.exe Token: SeDebugPrivilege 2520 OOUA209.exe Token: SeDebugPrivilege 2520 OOUA209.exe Token: SeDebugPrivilege 2520 OOUA209.exe Token: SeDebugPrivilege 2520 OOUA209.exe Token: SeDebugPrivilege 2520 OOUA209.exe Token: SeDebugPrivilege 2520 OOUA209.exe Token: SeDebugPrivilege 2520 OOUA209.exe Token: SeDebugPrivilege 2520 OOUA209.exe Token: SeDebugPrivilege 2520 OOUA209.exe Token: SeDebugPrivilege 2520 OOUA209.exe Token: SeDebugPrivilege 2520 OOUA209.exe Token: SeDebugPrivilege 2520 OOUA209.exe Token: SeDebugPrivilege 2520 OOUA209.exe Token: SeDebugPrivilege 2520 OOUA209.exe Token: SeDebugPrivilege 2520 OOUA209.exe Token: SeDebugPrivilege 2520 OOUA209.exe Token: SeDebugPrivilege 2520 OOUA209.exe Token: SeDebugPrivilege 2520 OOUA209.exe Token: SeDebugPrivilege 2520 OOUA209.exe Token: SeDebugPrivilege 2520 OOUA209.exe Token: SeDebugPrivilege 2520 OOUA209.exe Token: SeDebugPrivilege 2520 OOUA209.exe Token: SeDebugPrivilege 2520 OOUA209.exe Token: SeDebugPrivilege 2520 OOUA209.exe Token: SeDebugPrivilege 2520 OOUA209.exe Token: SeDebugPrivilege 2520 OOUA209.exe Token: SeDebugPrivilege 2520 OOUA209.exe Token: SeDebugPrivilege 2520 OOUA209.exe Token: SeDebugPrivilege 2520 OOUA209.exe Token: SeDebugPrivilege 2520 OOUA209.exe Token: SeDebugPrivilege 2520 OOUA209.exe Token: SeDebugPrivilege 2520 OOUA209.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2256 wrote to memory of 2868 2256 e7aaa493057a46d27453f462717df3f1_JaffaCakes118.exe 28 PID 2256 wrote to memory of 2868 2256 e7aaa493057a46d27453f462717df3f1_JaffaCakes118.exe 28 PID 2256 wrote to memory of 2868 2256 e7aaa493057a46d27453f462717df3f1_JaffaCakes118.exe 28 PID 2256 wrote to memory of 2868 2256 e7aaa493057a46d27453f462717df3f1_JaffaCakes118.exe 28 PID 2868 wrote to memory of 2520 2868 B6232F3AAC6.exe 29 PID 2868 wrote to memory of 2520 2868 B6232F3AAC6.exe 29 PID 2868 wrote to memory of 2520 2868 B6232F3AAC6.exe 29 PID 2868 wrote to memory of 2520 2868 B6232F3AAC6.exe 29 PID 2868 wrote to memory of 2520 2868 B6232F3AAC6.exe 29 PID 2868 wrote to memory of 2520 2868 B6232F3AAC6.exe 29 PID 2520 wrote to memory of 2256 2520 OOUA209.exe 27 PID 2520 wrote to memory of 2256 2520 OOUA209.exe 27 PID 2520 wrote to memory of 2256 2520 OOUA209.exe 27 PID 2520 wrote to memory of 2256 2520 OOUA209.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\e7aaa493057a46d27453f462717df3f1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e7aaa493057a46d27453f462717df3f1_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Recycle.Bin\B6232F3AAC6.exe"C:\Recycle.Bin\B6232F3AAC6.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\OOUA209.exe"C:\Users\Admin\AppData\Local\Temp\OOUA209.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2520
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD517f297d2f718fea10f19bff03b9aed83
SHA143121f55f266835b654c4f5c75dfa2880ee5674e
SHA256158f3d7041e163244f196a9cce775ad9c1e6102e32d16e361637c9e432289b7c
SHA5125b413320d06ba7407f395893adda50d5f735a9f58cfc12a88ceaf22a5df58e6eab97866a3b266ff582e59b132abeb8c75b2dcb55e73670b17656a3f92fd07913
-
Filesize
157KB
MD5e7aaa493057a46d27453f462717df3f1
SHA1421e61e17d5df6f6b36c8f87c3373a71f70334ee
SHA2562e31b00188d8fbd3c8d548fbf9103f61b3222976b45d637ded902d624a57a8d8
SHA5126ab1b61893983241795c639b5607d94c60629b31ffc313601d11cf860f75208698bf2ad8cd6e66175b337e7b36255021e0ffb12be4dce0b91399ea39471c2c02
-
Filesize
3KB
MD529090b6b4d6605a97ac760d06436ac2d
SHA1d929d3389642e52bae5ad8512293c9c4d3e4fab5
SHA25698a24f0caf5b578e230e6f1103a5fba6aecb28a9128cad5520fcde546d643272
SHA5129121ec42fa66e14a4fc3932c8dbcc8fb1a93ab9de00da57a82e176faa70b73f6992f8c5e2ab52c02fc28c8f0c59aee73b6fbbd39107db7d15105054f4390e9be