Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
18-04-2024 22:10
Behavioral task
behavioral1
Sample
f8daf7cbe59a512b93b099dc13ea06de_JaffaCakes118.exe
Resource
win7-20240319-en
General
-
Target
f8daf7cbe59a512b93b099dc13ea06de_JaffaCakes118.exe
-
Size
202KB
-
MD5
f8daf7cbe59a512b93b099dc13ea06de
-
SHA1
29de37a12221aff3dc59fe4a721441023f5cc387
-
SHA256
05257d35e86654f5d055733ba23e4efed41bd466784c383b77a55348d8de6478
-
SHA512
c5b3b930ef7ffb699922d09b6b6f9909d888c7c5312a479432250d8d1106d151b617d58b5d79f9cdf3461dd5c3921dce8dbb8c25c658f9627ff76b18b8785805
-
SSDEEP
3072:jcMNXatZMsh3qFGZ1sKdA6HIhdKoMr7W+hrrsiSZidM9woNEWamBAnSw0J+iDNUK:jcii4GZsh2rs0PsB7w0J+iDNlsy
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/2736-0-0x0000000000400000-0x0000000000496000-memory.dmp upx behavioral2/memory/2736-11-0x0000000000400000-0x0000000000496000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31101405" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420243192" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1154142410" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31101405" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1160080067" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0929c45dd91da01 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31101405" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007ec8c882d3928f4590e7632d430ff3f90000000002000000000010660000000100002000000027d8167c520dc0fb945ee1c549ba7abe9d1da3265beb08b279490d6c36131c21000000000e80000000020000200000009537c1c33cd78c98795b924d8c33dbdf0c9c3f58c4fe647edc252d859d5dd05a20000000b7b9c4eb0f87d85c52d6024b9d936375c505ee2720e83c7ed9b3a549dc9ee66b400000002800a4e15f33d2145221cbbc68190b756aee292aa9731acd6e067a2a96b621db0f1b7b008e9780f8bd4d06c6057869786e46d86e07ad2a96780c236c2e67eaad IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0219a45dd91da01 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{7071F5D0-FDD0-11EE-95FD-D2EF31A6F606} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1154142410" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007ec8c882d3928f4590e7632d430ff3f9000000000200000000001066000000010000200000000d855bbe5dcb9a408115dd36e9f021673159cc117468dbbdc3f2e96400ee64e8000000000e8000000002000020000000614220f44656efe5a4db1b1b7e7ff3f21b84df7672c59bc5d08a1e98c24469b420000000208c1a7d9883331ef0022b6759c0d13d03fae64f195153915f511fc1d3dc8780400000001642c9b0a831b0e0bc213d35d4333f259d3bdd5093f7a3635661056f616639a78549b0540dea5562426a9efe2c9ae84ad07c973ebfdeccb6f258764517b950c4 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 376 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 376 IEXPLORE.EXE 376 IEXPLORE.EXE 5056 IEXPLORE.EXE 5056 IEXPLORE.EXE 5056 IEXPLORE.EXE 5056 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2736 wrote to memory of 3256 2736 f8daf7cbe59a512b93b099dc13ea06de_JaffaCakes118.exe 86 PID 2736 wrote to memory of 3256 2736 f8daf7cbe59a512b93b099dc13ea06de_JaffaCakes118.exe 86 PID 2736 wrote to memory of 3256 2736 f8daf7cbe59a512b93b099dc13ea06de_JaffaCakes118.exe 86 PID 3256 wrote to memory of 376 3256 IEXPLORE.EXE 87 PID 3256 wrote to memory of 376 3256 IEXPLORE.EXE 87 PID 376 wrote to memory of 5056 376 IEXPLORE.EXE 88 PID 376 wrote to memory of 5056 376 IEXPLORE.EXE 88 PID 376 wrote to memory of 5056 376 IEXPLORE.EXE 88 PID 2736 wrote to memory of 3588 2736 f8daf7cbe59a512b93b099dc13ea06de_JaffaCakes118.exe 89 PID 2736 wrote to memory of 3588 2736 f8daf7cbe59a512b93b099dc13ea06de_JaffaCakes118.exe 89 PID 2736 wrote to memory of 3588 2736 f8daf7cbe59a512b93b099dc13ea06de_JaffaCakes118.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\f8daf7cbe59a512b93b099dc13ea06de_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f8daf7cbe59a512b93b099dc13ea06de_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" http://apfpb.org/libraries/phputf8/inf4/files.php2⤵
- Suspicious use of WriteProcessMemory
PID:3256 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://apfpb.org/libraries/phputf8/inf4/files.php3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:376 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:376 CREDAT:17410 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:5056
-
-
-
-
C:\Windows\SysWOW64\wscript.exewscript.exe /B "C:\Users\Admin\e.vbs2⤵PID:3588
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
1KB
MD510ad3cd0478415158d2fdf4725f2d1e5
SHA184d4aa38768df7e9e6554d5d42bf0bad49782f3a
SHA25632bfc8e83ac23c4e0995ad72107af2584e77361723abd13ed40a339dba628e37
SHA5129b5c293177ca5b979aa62aa5afd3a3500235a42c2b9d04ffbbd1121850a732668f1463f5bf09c85fdb818d3ee52461b27d55d571cb31326aa51ef0e170312ed0