Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
09/04/2024, 12:10
Static task
static1
Behavioral task
behavioral1
Sample
e9f5788ba2b875d7debe7d398d0eb4b1_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
e9f5788ba2b875d7debe7d398d0eb4b1_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
e9f5788ba2b875d7debe7d398d0eb4b1_JaffaCakes118.exe
-
Size
643KB
-
MD5
e9f5788ba2b875d7debe7d398d0eb4b1
-
SHA1
821bfe0ddd6384c02a8c5565a1689702d3d44a53
-
SHA256
211f69de0184d66a4525463a4056932fb7fea95d96ebfce09930d295e95488cd
-
SHA512
ac6d1e2882120e26ca1d99e77bb0c64923e086e697ae839f4e6b0ec237fb3880859f2e03d5729107685470068691353388fbd1adace9bd80894133d2cdc5bd5b
-
SSDEEP
12288:VLG6JA70VxW6hSlLOQ0UCKO6H88DdMBLZoVjiIwaghvTDAsAuFekhX7xp/L6i6Y:VC6JK2hkLOhUCKO6cidw6jWaQ/FekhL1
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 2780 attrib.exe -
Deletes itself 1 IoCs
pid Process 2672 cmd.exe -
Executes dropped EXE 3 IoCs
pid Process 2364 rar.exe 2484 rar.exe 1668 lsess.exe -
Loads dropped DLL 5 IoCs
pid Process 2788 cmd.exe 2788 cmd.exe 2788 cmd.exe 2788 cmd.exe 2788 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnceEx\windows\Entry1 = "c:\\windows\\web\\printers\\123.bat" regedit.exe -
Enumerates connected drives 3 TTPs 3 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\h: cmd.exe File opened (read-only) \??\e: cmd.exe File opened (read-only) \??\g: cmd.exe -
Drops file in Windows directory 43 IoCs
description ioc Process File created \??\c:\windows\web\printers\3.reg rar.exe File opened for modification \??\c:\windows\web\printers\5.reg rar.exe File opened for modification \??\c:\windows\web\printers\SVCH0ST.EXE rar.exe File created \??\c:\windows\web\printers\jinshan.vbs rar.exe File opened for modification \??\c:\windows\web\printers\jinshan.vbs rar.exe File created \??\c:\windows\web\printers\k.bat rar.exe File created \??\c:\windows\web\printers\4.reg rar.exe File opened for modification \??\c:\windows\web\printers\QQlog.exe rar.exe File opened for modification \??\c:\windows\web\printers\gl.txt rar.exe File opened for modification \??\c:\windows\ztop\svchost.exe cmd.exe File opened for modification \??\c:\windows\dell\lsess.exe cmd.exe File created \??\c:\windows\dell\lsess.exe cmd.exe File opened for modification \??\c:\windows\web\printers\usbhard.rar e9f5788ba2b875d7debe7d398d0eb4b1_JaffaCakes118.exe File created \??\c:\windows\web\printers\5.reg rar.exe File opened for modification \??\c:\windows\web\printers\360s.txt rar.exe File opened for modification \??\c:\windows\web\printers\zzz.rar e9f5788ba2b875d7debe7d398d0eb4b1_JaffaCakes118.exe File opened for modification \??\c:\windows\web\printers\rar.exe e9f5788ba2b875d7debe7d398d0eb4b1_JaffaCakes118.exe File opened for modification \??\c:\windows\web\printers\3.reg rar.exe File created \??\c:\windows\web\printers\QQlog.exe rar.exe File created \??\c:\windows\web\printers\md5.txt cmd.exe File opened for modification \??\c:\windows\dell\lsess.txt rar.exe File created \??\c:\windows\web\printers\123.bat rar.exe File created \??\c:\windows\web\printers\jin.vbs rar.exe File opened for modification \??\c:\windows\web\printers\SVCH0ST.ini rar.exe File created \??\c:\windows\web\printers\1.reg rar.exe File opened for modification \??\c:\windows\web\printers\4.reg rar.exe File created \??\c:\windows\web\printers\SVCH0ST.EXE rar.exe File created \??\c:\windows\web\printers\gl.txt rar.exe File created \??\c:\windows\dell\lsess.txt rar.exe File opened for modification \??\c:\windows\intell\1.txt e9f5788ba2b875d7debe7d398d0eb4b1_JaffaCakes118.exe File created \??\c:\windows\web\printers\125.bat e9f5788ba2b875d7debe7d398d0eb4b1_JaffaCakes118.exe File created \??\c:\windows\web\printers\124.bat rar.exe File opened for modification C:\windows\web\printers attrib.exe File created \??\c:\windows\web\printers\abc.vbs rar.exe File created \??\c:\windows\web\printers\360s.txt rar.exe File opened for modification \??\c:\windows\web\printers\123.bat rar.exe File opened for modification \??\c:\windows\web\printers\124.bat rar.exe File opened for modification \??\c:\windows\web\printers\abc.vbs rar.exe File opened for modification \??\c:\windows\web\printers\jin.vbs rar.exe File opened for modification \??\c:\windows\web\printers\k.bat rar.exe File created \??\c:\windows\web\printers\SVCH0ST.ini rar.exe File opened for modification \??\c:\windows\web\printers\1.reg rar.exe File created \??\c:\windows\ztop\svchost.exe cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs .reg file with regedit 3 IoCs
pid Process 1220 regedit.exe 1372 regedit.exe 1048 regedit.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2892 PING.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1328 e9f5788ba2b875d7debe7d398d0eb4b1_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1328 wrote to memory of 2788 1328 e9f5788ba2b875d7debe7d398d0eb4b1_JaffaCakes118.exe 29 PID 1328 wrote to memory of 2788 1328 e9f5788ba2b875d7debe7d398d0eb4b1_JaffaCakes118.exe 29 PID 1328 wrote to memory of 2788 1328 e9f5788ba2b875d7debe7d398d0eb4b1_JaffaCakes118.exe 29 PID 1328 wrote to memory of 2788 1328 e9f5788ba2b875d7debe7d398d0eb4b1_JaffaCakes118.exe 29 PID 2788 wrote to memory of 2364 2788 cmd.exe 31 PID 2788 wrote to memory of 2364 2788 cmd.exe 31 PID 2788 wrote to memory of 2364 2788 cmd.exe 31 PID 2788 wrote to memory of 2364 2788 cmd.exe 31 PID 2788 wrote to memory of 2780 2788 cmd.exe 32 PID 2788 wrote to memory of 2780 2788 cmd.exe 32 PID 2788 wrote to memory of 2780 2788 cmd.exe 32 PID 2788 wrote to memory of 2780 2788 cmd.exe 32 PID 2788 wrote to memory of 1048 2788 cmd.exe 33 PID 2788 wrote to memory of 1048 2788 cmd.exe 33 PID 2788 wrote to memory of 1048 2788 cmd.exe 33 PID 2788 wrote to memory of 1048 2788 cmd.exe 33 PID 2788 wrote to memory of 2484 2788 cmd.exe 34 PID 2788 wrote to memory of 2484 2788 cmd.exe 34 PID 2788 wrote to memory of 2484 2788 cmd.exe 34 PID 2788 wrote to memory of 2484 2788 cmd.exe 34 PID 1328 wrote to memory of 2672 1328 e9f5788ba2b875d7debe7d398d0eb4b1_JaffaCakes118.exe 35 PID 1328 wrote to memory of 2672 1328 e9f5788ba2b875d7debe7d398d0eb4b1_JaffaCakes118.exe 35 PID 1328 wrote to memory of 2672 1328 e9f5788ba2b875d7debe7d398d0eb4b1_JaffaCakes118.exe 35 PID 1328 wrote to memory of 2672 1328 e9f5788ba2b875d7debe7d398d0eb4b1_JaffaCakes118.exe 35 PID 2672 wrote to memory of 2892 2672 cmd.exe 37 PID 2672 wrote to memory of 2892 2672 cmd.exe 37 PID 2672 wrote to memory of 2892 2672 cmd.exe 37 PID 2672 wrote to memory of 2892 2672 cmd.exe 37 PID 2672 wrote to memory of 1912 2672 cmd.exe 38 PID 2672 wrote to memory of 1912 2672 cmd.exe 38 PID 2672 wrote to memory of 1912 2672 cmd.exe 38 PID 2672 wrote to memory of 1912 2672 cmd.exe 38 PID 2788 wrote to memory of 1668 2788 cmd.exe 39 PID 2788 wrote to memory of 1668 2788 cmd.exe 39 PID 2788 wrote to memory of 1668 2788 cmd.exe 39 PID 2788 wrote to memory of 1668 2788 cmd.exe 39 PID 2788 wrote to memory of 1220 2788 cmd.exe 40 PID 2788 wrote to memory of 1220 2788 cmd.exe 40 PID 2788 wrote to memory of 1220 2788 cmd.exe 40 PID 2788 wrote to memory of 1220 2788 cmd.exe 40 PID 2788 wrote to memory of 1372 2788 cmd.exe 41 PID 2788 wrote to memory of 1372 2788 cmd.exe 41 PID 2788 wrote to memory of 1372 2788 cmd.exe 41 PID 2788 wrote to memory of 1372 2788 cmd.exe 41 PID 2788 wrote to memory of 1920 2788 cmd.exe 42 PID 2788 wrote to memory of 1920 2788 cmd.exe 42 PID 2788 wrote to memory of 1920 2788 cmd.exe 42 PID 2788 wrote to memory of 1920 2788 cmd.exe 42 PID 2788 wrote to memory of 1916 2788 cmd.exe 43 PID 2788 wrote to memory of 1916 2788 cmd.exe 43 PID 2788 wrote to memory of 1916 2788 cmd.exe 43 PID 2788 wrote to memory of 1916 2788 cmd.exe 43 PID 2788 wrote to memory of 2408 2788 cmd.exe 44 PID 2788 wrote to memory of 2408 2788 cmd.exe 44 PID 2788 wrote to memory of 2408 2788 cmd.exe 44 PID 2788 wrote to memory of 2408 2788 cmd.exe 44 PID 2788 wrote to memory of 2036 2788 cmd.exe 45 PID 2788 wrote to memory of 2036 2788 cmd.exe 45 PID 2788 wrote to memory of 2036 2788 cmd.exe 45 PID 2788 wrote to memory of 2036 2788 cmd.exe 45 PID 2788 wrote to memory of 2492 2788 cmd.exe 46 PID 2788 wrote to memory of 2492 2788 cmd.exe 46 PID 2788 wrote to memory of 2492 2788 cmd.exe 46 PID 2788 wrote to memory of 2492 2788 cmd.exe 46 -
Views/modifies file attributes 1 TTPs 12 IoCs
pid Process 1828 attrib.exe 2732 attrib.exe 1912 attrib.exe 1920 attrib.exe 2740 attrib.exe 2036 attrib.exe 2492 attrib.exe 3060 attrib.exe 2784 attrib.exe 2780 attrib.exe 1916 attrib.exe 2408 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e9f5788ba2b875d7debe7d398d0eb4b1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e9f5788ba2b875d7debe7d398d0eb4b1_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Windows\SysWOW64\cmd.execmd /c c:\windows\web\printers\125.bat2⤵
- Loads dropped DLL
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2788 -
\??\c:\windows\web\printers\rar.exe"c:\windows\web\printers\Rar.exe" e -y -ping c:\windows\web\printers\usbhard.rar c:\windows\web\printers\3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2364
-
-
C:\Windows\SysWOW64\attrib.exeattrib +R +A +S +H c:\windows\web\printers3⤵
- Sets file to hidden
- Drops file in Windows directory
- Views/modifies file attributes
PID:2780
-
-
C:\Windows\SysWOW64\regedit.exeregedit /s c:\windows\web\printers\1.reg3⤵
- Adds Run key to start application
- Runs .reg file with regedit
PID:1048
-
-
\??\c:\windows\web\printers\rar.exe"c:\windows\web\printers\Rar.exe" e -y -ping c:\windows\web\printers\zzz.rar c:\windows\dell\3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2484
-
-
\??\c:\windows\dell\lsess.exec:\windows\dell\lsess.exe3⤵
- Executes dropped EXE
PID:1668
-
-
C:\Windows\SysWOW64\regedit.exeregedit /s c:\windows\web\printers\5.reg3⤵
- Runs .reg file with regedit
PID:1220
-
-
C:\Windows\SysWOW64\regedit.exeregedit /s c:\windows\web\printers\2.reg3⤵
- Runs .reg file with regedit
PID:1372
-
-
C:\Windows\SysWOW64\attrib.exeattrib -H -R d:\~13⤵
- Views/modifies file attributes
PID:1920
-
-
C:\Windows\SysWOW64\attrib.exeattrib +H +R d:\setprter3⤵
- Views/modifies file attributes
PID:1916
-
-
C:\Windows\SysWOW64\attrib.exeattrib -H -R e:\~13⤵
- Views/modifies file attributes
PID:2408
-
-
C:\Windows\SysWOW64\attrib.exeattrib +H +R e:\setprter3⤵
- Views/modifies file attributes
PID:2036
-
-
C:\Windows\SysWOW64\attrib.exeattrib -H -R f:\~13⤵
- Views/modifies file attributes
PID:2492
-
-
C:\Windows\SysWOW64\attrib.exeattrib +H +R f:\setprter3⤵
- Views/modifies file attributes
PID:2740
-
-
C:\Windows\SysWOW64\attrib.exeattrib -H -R g:\~13⤵
- Views/modifies file attributes
PID:1828
-
-
C:\Windows\SysWOW64\attrib.exeattrib +H +R g:\setprter3⤵
- Views/modifies file attributes
PID:3060
-
-
C:\Windows\SysWOW64\attrib.exeattrib -H -R h:\~13⤵
- Views/modifies file attributes
PID:2784
-
-
C:\Windows\SysWOW64\attrib.exeattrib +H +R h:\setprter3⤵
- Views/modifies file attributes
PID:2732
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\11a.bat2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 13⤵
- Runs ping.exe
PID:2892
-
-
C:\Windows\SysWOW64\attrib.exeattrib -S -H c:\ma.exe3⤵
- Views/modifies file attributes
PID:1912
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240B
MD533fd3c8efe8780270bffff10d338982d
SHA19f2e271aa3e8ba4e83cbcb9ba473f92507754721
SHA2564979a52405a33302dcb3b0b6e66fb0b38f15708246406639293f8b2ad15514f8
SHA512bb0e6ad1d26565cb5497caa7ee318c784091b6f187ac63f1b23ba8e6f5d9e1e6b311f3318bc87f363a948d065b6b7c678f8931b451fa04c20421e6f875cddbfa
-
Filesize
1KB
MD51af018ff177dfbae562ac429cff786cb
SHA181f09865306d8c91d59bbec8a11ac874816f102c
SHA256dda4aa27c7fd4b793bcadbd94c47dc997d66e293f910af3826de893b0381914a
SHA512a76fba548576d2c99dac7e040bb140e29a68f55ee024174018345c4236e2a7ebda96d5ed1b66da85ae60d20485847e3cd38d34262be6c45475938f8d2182ab22
-
Filesize
45KB
MD54ad724ba8346d8556e6e884727c0523e
SHA1b53e2ec83b5b8441667b980fe6a53d69987fca89
SHA25648c52c0934097cdd0aea155be18a2006f2dd6884d623a51b00baf3e5de3e1412
SHA512fde2fb90a19fa00d040ade516fef8ca5f4463aee1a8af2fc85f41c3e818365086ff12491c330c8598bf071270bdbd863bbcdb5a5dde3d2523fbd1f6182eb33f3
-
Filesize
22KB
MD53619b2192d1e0d4907f7d4702b4aa9e1
SHA11bb317bea13bb457d9ec71294e5c07c93cc9b8e6
SHA2567da095327a1e11369d67d4f15d7c2e84cce9fb5d4cbac42d9b70bf0976300893
SHA5128f2d8420dc2e92a4df42eab89bb612b2562ff6d152c4a6f651c64371089506673bf9f02a37ff1c3ad53a9ae0fe51aa9c47dcdb7e01a319df51306d58a601b7ff
-
Filesize
55.6MB
MD5526db4284f602cb880424f9459a6ce53
SHA1c0ec731ae5e22420e9532485aeacf2e5bf6fc9b6
SHA25614458b0f2963bb894d620ef724de3820cd775e27a092075a784f98cbd46d36b6
SHA51236d72cf3cbd229cf7b3105f86b8600b64cdd1faed02c659f4b1d4d89d9fa5c7eee55c2e0398b45e6ca2ffd1757f2a6abc11229056da8aaade2d193c245e20006
-
Filesize
36.6MB
MD59db87afc027bcb06705b5c918c74c84e
SHA1a8330688c6cf9797fd68769979e9676613b76a59
SHA25641b6ec359169e544c31194277d918480f7cda3607d4dc00b035dab6858791039
SHA512badd60d1fc5b646f324e249c096960174cfadef7c38ca8ba9bcaa5d0c10ae1b67fdfdc1719e3863c1446392e56bd505478c8e564517e5b61ccece10cb06c3666
-
Filesize
235KB
MD5f88fc7ec53733e37a823c1d6955afda5
SHA1fff48a1387a612ff2aa012754a64d5534b5ac85e
SHA25697ac32d6236176cf4bd52fe79bf7e9074e72918e6b0dd90062b672fdaeff16d2
SHA5129df9bcd10269be12962bc8084581f529d0ac46f91fdc1c04d03fbbbfd8fd99c6938c7e72476cb41281bf07d6860d58bf39ffe2495a0c29e85ed10aad31cc45a6
-
Filesize
232KB
MD5a4ef777a4dd805ff81d88e26bf2fce43
SHA174344e53549c128ad7450c85738fab2df2715555
SHA256bb578ce033793937421fc323fed18b9dbfc6e3cdcb9344a11a20a0415c257d4f
SHA512dba1f668c438bcf68b13c907be983c7d40f5bece7f1daecc212bb1cc8cd4adb5698e0cbd2d0bfba5cbb90f6e8a0b436312200227a1e9534da180c9f45dda117c
-
Filesize
310KB
MD50a5680183c0089a64621e211917664d8
SHA18525d73c99e28413e97a094c99950e1806786246
SHA256c7d6bfe9d26d1ecdd9f2e7f3f892a4d32030949937f86938edcb1995655c2814
SHA512b843b8994c764c3761bef8d34eefb312c9d9567b3f4aadc38008caf42d0cdb82c33276203e4210adcc1e8c567268ebdf01a0a1e839694811932889ac971bb051
-
Filesize
55.6MB
MD5fc311e5226b49bc4d9c29e5e87437d3a
SHA1f1f199e7c0ea389b50bdba0f6787d6638d254240
SHA25643a31fcedaa15089e8c1b64b58212d1884f7578ca3a2d2c6d616036ee154c344
SHA512b2ba7f02a86ef3702291c4945c37b9996a9740bd6151ae0979a38d8817c9db494afd905c07c5d48d76026011df97f7c3a8de2c959d18487d3a0520d11ef9f294