Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240319-en -
resource tags
arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system -
submitted
16/04/2024, 12:01
Static task
static1
Behavioral task
behavioral1
Sample
f37420f662960f129e38dc7d42445480_JaffaCakes118.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
f37420f662960f129e38dc7d42445480_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f37420f662960f129e38dc7d42445480_JaffaCakes118.exe
-
Size
332KB
-
MD5
f37420f662960f129e38dc7d42445480
-
SHA1
919f459416fc2a9fb00a3eb39982dde727134329
-
SHA256
b25bb72eff74e3928001bbfe7c6f310d92f92b51623a3a84b1556231bfc5fc30
-
SHA512
cdb8dadda4dff39caf9edcdc0556531b7dace3b136ecc99caff73b6daa04f36a0e75f0863fdbbe94dcfd6e8727221b935ca557031c41d490071bed1e2ce9cb58
-
SSDEEP
6144:fHRoNQ9Oc7YLBYa/HyvGmqjVcyFC5Gjq4xZm5JhXRGdr+T:fxoEBKnzjqyF0Gj/+ThhE
Malware Config
Signatures
-
Disables taskbar notifications via registry modification
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Deletes itself 1 IoCs
pid Process 2636 ogl.exe -
Executes dropped EXE 1 IoCs
pid Process 2636 ogl.exe -
Loads dropped DLL 2 IoCs
pid Process 1252 f37420f662960f129e38dc7d42445480_JaffaCakes118.exe 1252 f37420f662960f129e38dc7d42445480_JaffaCakes118.exe -
Modifies system executable filetype association 2 TTPs 17 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000_CLASSES\exefile\ = "Application" ogl.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000_CLASSES\exefile\DefaultIcon ogl.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000_CLASSES\exefile\shell\runas\command ogl.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000_CLASSES\exefile\shell\start\command ogl.exe Set value (str) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000_CLASSES\exefile\DefaultIcon\ = "%1" ogl.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000_CLASSES\exefile\shell\open ogl.exe Set value (str) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000_CLASSES\exefile\shell\runas\command\ = "\"%1\" %*" ogl.exe Set value (str) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000_CLASSES\exefile\shell\start\command\IsolatedCommand = "\"%1\" %*" ogl.exe Set value (str) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000_CLASSES\exefile\Content Type = "application/x-msdownload" ogl.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000_CLASSES\exefile\shell ogl.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000_CLASSES\exefile\shell\open\command ogl.exe Set value (str) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000_CLASSES\exefile\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\ogl.exe\" -a \"%1\" %*" ogl.exe Set value (str) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000_CLASSES\exefile\shell\open\command\IsolatedCommand = "\"%1\" %*" ogl.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000_CLASSES\exefile\shell\start ogl.exe Set value (str) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000_CLASSES\exefile\shell\start\command\ = "\"%1\" %*" ogl.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000_CLASSES\exefile\shell\runas ogl.exe Set value (str) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000_CLASSES\exefile\shell\runas\command\IsolatedCommand = "\"%1\" %*" ogl.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Run\ctfmon.exe = "C:\\WINDOWS\\system32\\ctfmon.exe" ogl.exe -
Modifies registry class 41 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000_CLASSES\.exe\ = "exefile" ogl.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000_CLASSES\.exe\DefaultIcon ogl.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000_CLASSES\.exe\shell ogl.exe Set value (str) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000_CLASSES\.exe\shell\start\command\ = "\"%1\" %*" ogl.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000_CLASSES\exefile\shell\open\command ogl.exe Set value (str) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000_CLASSES\exefile\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\ogl.exe\" -a \"%1\" %*" ogl.exe Set value (data) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000_CLASSES\exefile ogl.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000_CLASSES\exefile\shell\runas\command ogl.exe Set value (str) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000_CLASSES\exefile\DefaultIcon\ = "%1" ogl.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000_CLASSES\exefile\shell\start\command ogl.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000_CLASSES\.exe\DefaultIcon\ = "%1" ogl.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000_CLASSES\.exe\shell\open\command ogl.exe Set value (str) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000_CLASSES\exefile\shell\open\command\IsolatedCommand = "\"%1\" %*" ogl.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000_CLASSES\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" ogl.exe Set value (str) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000_CLASSES\.exe\shell\runas\command\ = "\"%1\" %*" ogl.exe Set value (str) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000_CLASSES\.exe\shell\start\command\IsolatedCommand = "\"%1\" %*" ogl.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000_CLASSES\.exe ogl.exe Set value (str) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000_CLASSES\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\ogl.exe\" -a \"%1\" %*" ogl.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000_CLASSES\.exe\shell\runas ogl.exe Set value (str) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000_CLASSES\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" ogl.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000_CLASSES\.exe\shell\start ogl.exe Set value (str) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000_CLASSES\exefile\ = "Application" ogl.exe Set value (str) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000_CLASSES\exefile\Content Type = "application/x-msdownload" ogl.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000_CLASSES\exefile\DefaultIcon ogl.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000_CLASSES\exefile\shell\runas ogl.exe Set value (str) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000_CLASSES\exefile\shell\runas\command\ = "\"%1\" %*" ogl.exe Set value (str) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000_CLASSES\exefile\shell\start\command\ = "\"%1\" %*" ogl.exe Set value (str) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000_CLASSES\exefile\shell\start\command\IsolatedCommand = "\"%1\" %*" ogl.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000_CLASSES\exefile\shell\open ogl.exe Set value (str) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000_CLASSES\exefile\shell\runas\command\IsolatedCommand = "\"%1\" %*" ogl.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000_CLASSES\exefile\shell\start ogl.exe Set value (str) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000_CLASSES\.exe\Content Type = "application/x-msdownload" ogl.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000_CLASSES\.exe\shell\open ogl.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000_CLASSES\.exe\shell\runas\command ogl.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000_CLASSES\.exe\shell\start\command ogl.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000_CLASSES\exefile\shell ogl.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1252 f37420f662960f129e38dc7d42445480_JaffaCakes118.exe 1252 f37420f662960f129e38dc7d42445480_JaffaCakes118.exe 1252 f37420f662960f129e38dc7d42445480_JaffaCakes118.exe 1252 f37420f662960f129e38dc7d42445480_JaffaCakes118.exe 1252 f37420f662960f129e38dc7d42445480_JaffaCakes118.exe 1252 f37420f662960f129e38dc7d42445480_JaffaCakes118.exe 1252 f37420f662960f129e38dc7d42445480_JaffaCakes118.exe 1252 f37420f662960f129e38dc7d42445480_JaffaCakes118.exe 1252 f37420f662960f129e38dc7d42445480_JaffaCakes118.exe 2636 ogl.exe 2636 ogl.exe 2636 ogl.exe 2636 ogl.exe 2636 ogl.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2544 explorer.exe -
Suspicious use of AdjustPrivilegeToken 20 IoCs
description pid Process Token: SeShutdownPrivilege 2544 explorer.exe Token: SeShutdownPrivilege 2544 explorer.exe Token: SeShutdownPrivilege 2544 explorer.exe Token: SeShutdownPrivilege 2544 explorer.exe Token: SeShutdownPrivilege 2544 explorer.exe Token: SeShutdownPrivilege 2544 explorer.exe Token: SeShutdownPrivilege 2544 explorer.exe Token: SeShutdownPrivilege 2544 explorer.exe Token: SeShutdownPrivilege 2544 explorer.exe Token: SeShutdownPrivilege 2544 explorer.exe Token: SeShutdownPrivilege 2544 explorer.exe Token: SeShutdownPrivilege 2544 explorer.exe Token: SeShutdownPrivilege 2544 explorer.exe Token: SeShutdownPrivilege 2544 explorer.exe Token: SeShutdownPrivilege 2544 explorer.exe Token: SeShutdownPrivilege 2544 explorer.exe Token: SeShutdownPrivilege 2544 explorer.exe Token: SeShutdownPrivilege 2544 explorer.exe Token: SeShutdownPrivilege 2544 explorer.exe Token: SeShutdownPrivilege 2544 explorer.exe -
Suspicious use of FindShellTrayWindow 38 IoCs
pid Process 2636 ogl.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2636 ogl.exe 2636 ogl.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2636 ogl.exe 2544 explorer.exe 2544 explorer.exe 2636 ogl.exe 2544 explorer.exe -
Suspicious use of SendNotifyMessage 22 IoCs
pid Process 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2544 explorer.exe 2636 ogl.exe 2636 ogl.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2636 ogl.exe 2636 ogl.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1252 wrote to memory of 2636 1252 f37420f662960f129e38dc7d42445480_JaffaCakes118.exe 28 PID 1252 wrote to memory of 2636 1252 f37420f662960f129e38dc7d42445480_JaffaCakes118.exe 28 PID 1252 wrote to memory of 2636 1252 f37420f662960f129e38dc7d42445480_JaffaCakes118.exe 28 PID 1252 wrote to memory of 2636 1252 f37420f662960f129e38dc7d42445480_JaffaCakes118.exe 28 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\f37420f662960f129e38dc7d42445480_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f37420f662960f129e38dc7d42445480_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Users\Admin\AppData\Local\ogl.exe"C:\Users\Admin\AppData\Local\ogl.exe" -gav C:\Users\Admin\AppData\Local\Temp\f37420f662960f129e38dc7d42445480_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2636
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2544
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
332KB
MD5f37420f662960f129e38dc7d42445480
SHA1919f459416fc2a9fb00a3eb39982dde727134329
SHA256b25bb72eff74e3928001bbfe7c6f310d92f92b51623a3a84b1556231bfc5fc30
SHA512cdb8dadda4dff39caf9edcdc0556531b7dace3b136ecc99caff73b6daa04f36a0e75f0863fdbbe94dcfd6e8727221b935ca557031c41d490071bed1e2ce9cb58