Analysis
-
max time kernel
154s -
max time network
162s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-04-2024 15:23
Static task
static1
Behavioral task
behavioral1
Sample
eb6077d51dcfbef883bbc0eca60d9249_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
eb6077d51dcfbef883bbc0eca60d9249_JaffaCakes118.exe
Resource
win10v2004-20240319-en
General
-
Target
eb6077d51dcfbef883bbc0eca60d9249_JaffaCakes118.exe
-
Size
340KB
-
MD5
eb6077d51dcfbef883bbc0eca60d9249
-
SHA1
023031e9308677f9a97f94ad8b38bfb4283d7da5
-
SHA256
e860eaa381f9a67604b29d4cb5c017f381b11d231e36dbc7b98b1ee6417412b2
-
SHA512
f639a9adc8972fa777a5160f66eee8f2a31c7c75753150491c9730beeff341b85440fd1c1ec09d7fdf630d9d288a354fb7ea0392a693b58e974880ad1a7ba273
-
SSDEEP
6144:62EUuzB3Us09UoF8um5N5losgZ9j76s4H8BlHvy8kI9faCXfMT:mUrsqUoahJGsUl76s4QlHvXkknX
Malware Config
Signatures
-
Disables taskbar notifications via registry modification
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Deletes itself 1 IoCs
pid Process 3028 nmf.exe -
Executes dropped EXE 1 IoCs
pid Process 3028 nmf.exe -
Loads dropped DLL 2 IoCs
pid Process 3060 eb6077d51dcfbef883bbc0eca60d9249_JaffaCakes118.exe 3060 eb6077d51dcfbef883bbc0eca60d9249_JaffaCakes118.exe -
Modifies system executable filetype association 2 TTPs 17 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\exefile\shell\runas\command\IsolatedCommand = "\"%1\" %*" nmf.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\exefile\shell\start\command nmf.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\exefile\Content Type = "application/x-msdownload" nmf.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\exefile\shell nmf.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\exefile\shell\runas nmf.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\exefile\shell\runas\command nmf.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\exefile\shell\start nmf.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\exefile\shell\start\command\ = "\"%1\" %*" nmf.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\exefile\shell\open nmf.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\exefile\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\nmf.exe\" -a \"%1\" %*" nmf.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\exefile\shell\open\command\IsolatedCommand = "\"%1\" %*" nmf.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\exefile\shell\runas\command\ = "\"%1\" %*" nmf.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\exefile\DefaultIcon nmf.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\exefile\DefaultIcon\ = "%1" nmf.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\exefile\shell\open\command nmf.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\exefile\shell\start\command\IsolatedCommand = "\"%1\" %*" nmf.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\exefile\ = "Application" nmf.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\ctfmon.exe = "C:\\WINDOWS\\system32\\ctfmon.exe" nmf.exe -
Modifies registry class 41 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\.exe\shell\open nmf.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\exefile\shell\start nmf.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\.exe\shell\runas nmf.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\exefile\DefaultIcon\ = "%1" nmf.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\exefile\shell\open\command\IsolatedCommand = "\"%1\" %*" nmf.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\.exe\ = "exefile" nmf.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\.exe\DefaultIcon nmf.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\.exe\shell\runas\command\ = "\"%1\" %*" nmf.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\exefile\ = "Application" nmf.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\exefile\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\nmf.exe\" -a \"%1\" %*" nmf.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\exefile\shell\start\command\ = "\"%1\" %*" nmf.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\.exe\shell nmf.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\.exe\shell\open\command nmf.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\.exe\shell\start nmf.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\.exe\shell\start\command\ = "\"%1\" %*" nmf.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\exefile\Content Type = "application/x-msdownload" nmf.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\exefile\shell\start\command nmf.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\.exe\DefaultIcon\ = "%1" nmf.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\exefile\shell\start\command\IsolatedCommand = "\"%1\" %*" nmf.exe Set value (data) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\exefile\shell\runas nmf.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\.exe\shell\runas\command nmf.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\.exe\shell\start\command nmf.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\.exe\shell\start\command\IsolatedCommand = "\"%1\" %*" nmf.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\exefile nmf.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\exefile\shell nmf.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\exefile\shell\runas\command nmf.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\.exe nmf.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\.exe\Content Type = "application/x-msdownload" nmf.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" nmf.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\exefile\DefaultIcon nmf.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\exefile\shell\runas\command\IsolatedCommand = "\"%1\" %*" nmf.exe Set value (data) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\nmf.exe\" -a \"%1\" %*" nmf.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\exefile\shell\open\command nmf.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\exefile\shell\runas\command\ = "\"%1\" %*" nmf.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" nmf.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\exefile\shell\open nmf.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 3060 eb6077d51dcfbef883bbc0eca60d9249_JaffaCakes118.exe 3060 eb6077d51dcfbef883bbc0eca60d9249_JaffaCakes118.exe 3060 eb6077d51dcfbef883bbc0eca60d9249_JaffaCakes118.exe 3060 eb6077d51dcfbef883bbc0eca60d9249_JaffaCakes118.exe 3060 eb6077d51dcfbef883bbc0eca60d9249_JaffaCakes118.exe 3060 eb6077d51dcfbef883bbc0eca60d9249_JaffaCakes118.exe 3060 eb6077d51dcfbef883bbc0eca60d9249_JaffaCakes118.exe 3060 eb6077d51dcfbef883bbc0eca60d9249_JaffaCakes118.exe 3060 eb6077d51dcfbef883bbc0eca60d9249_JaffaCakes118.exe 3028 nmf.exe 3028 nmf.exe 3028 nmf.exe 3028 nmf.exe 3028 nmf.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2680 explorer.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeShutdownPrivilege 2680 explorer.exe Token: SeShutdownPrivilege 2680 explorer.exe Token: SeShutdownPrivilege 2680 explorer.exe Token: SeShutdownPrivilege 2680 explorer.exe Token: SeShutdownPrivilege 2680 explorer.exe Token: SeShutdownPrivilege 2680 explorer.exe Token: SeShutdownPrivilege 2680 explorer.exe Token: SeShutdownPrivilege 2680 explorer.exe Token: SeShutdownPrivilege 2680 explorer.exe Token: SeShutdownPrivilege 2680 explorer.exe Token: SeShutdownPrivilege 2680 explorer.exe Token: SeShutdownPrivilege 2680 explorer.exe Token: SeShutdownPrivilege 2680 explorer.exe Token: SeShutdownPrivilege 2680 explorer.exe Token: SeShutdownPrivilege 2680 explorer.exe Token: SeShutdownPrivilege 2680 explorer.exe Token: SeShutdownPrivilege 2680 explorer.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 3028 nmf.exe 3028 nmf.exe 3028 nmf.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 3028 nmf.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe -
Suspicious use of SendNotifyMessage 19 IoCs
pid Process 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 2680 explorer.exe 3028 nmf.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3028 nmf.exe 3028 nmf.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3060 wrote to memory of 3028 3060 eb6077d51dcfbef883bbc0eca60d9249_JaffaCakes118.exe 28 PID 3060 wrote to memory of 3028 3060 eb6077d51dcfbef883bbc0eca60d9249_JaffaCakes118.exe 28 PID 3060 wrote to memory of 3028 3060 eb6077d51dcfbef883bbc0eca60d9249_JaffaCakes118.exe 28 PID 3060 wrote to memory of 3028 3060 eb6077d51dcfbef883bbc0eca60d9249_JaffaCakes118.exe 28 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb6077d51dcfbef883bbc0eca60d9249_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eb6077d51dcfbef883bbc0eca60d9249_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Users\Admin\AppData\Local\nmf.exe"C:\Users\Admin\AppData\Local\nmf.exe" -gav C:\Users\Admin\AppData\Local\Temp\eb6077d51dcfbef883bbc0eca60d9249_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3028
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2680
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340KB
MD5eb6077d51dcfbef883bbc0eca60d9249
SHA1023031e9308677f9a97f94ad8b38bfb4283d7da5
SHA256e860eaa381f9a67604b29d4cb5c017f381b11d231e36dbc7b98b1ee6417412b2
SHA512f639a9adc8972fa777a5160f66eee8f2a31c7c75753150491c9730beeff341b85440fd1c1ec09d7fdf630d9d288a354fb7ea0392a693b58e974880ad1a7ba273