Analysis
-
max time kernel
147s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
18-04-2024 02:19
Behavioral task
behavioral1
Sample
f710a2d33d63a764233266d1956513c0_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
f710a2d33d63a764233266d1956513c0_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
f710a2d33d63a764233266d1956513c0_JaffaCakes118.exe
-
Size
354KB
-
MD5
f710a2d33d63a764233266d1956513c0
-
SHA1
b69fea2fd572b9726fd49c6e62c5b4c4a7c2d675
-
SHA256
6b40d28502a2b197934f8bfbbf30f9281b5d9f92acfadf3ce421a10e7d1f692c
-
SHA512
74f1c0f71cad9f4695f07c989d703efc3bd895a33a9e436e285d78a69e1b377b6c4c9c8e617b1d43f289766a48dbd54a862aa058d57e626fcfe909f574a12f73
-
SSDEEP
6144:wx3yO8R7r6mKkVrlBmUhruSHN+KTFHs0WcnGcDTuglLfJkhsmRi9wQ:wIOunPjBdCMN+KTps0FG0uglLfJQsmR
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule C:\Windows\SysWOW64\msijce32.dll acprotect -
Loads dropped DLL 4 IoCs
Processes:
rundll32.exepid process 3020 rundll32.exe 3020 rundll32.exe 3020 rundll32.exe 3020 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral1/memory/1752-0-0x0000000000400000-0x0000000000468000-memory.dmp upx C:\Windows\SysWOW64\msijce32.dll upx behavioral1/memory/3020-12-0x0000000010000000-0x0000000010087000-memory.dmp upx behavioral1/memory/1752-13-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/3020-14-0x0000000010000000-0x0000000010087000-memory.dmp upx -
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
Processes:
f710a2d33d63a764233266d1956513c0_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook f710a2d33d63a764233266d1956513c0_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
f710a2d33d63a764233266d1956513c0_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSIDLL = "C:\\Windows\\SysWOW64\\rundll32.exe msijce32.dll,EmYMsld" f710a2d33d63a764233266d1956513c0_JaffaCakes118.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 2 IoCs
Processes:
f710a2d33d63a764233266d1956513c0_JaffaCakes118.exedescription ioc process File created C:\Windows\SysWOW64\msijce32.dll f710a2d33d63a764233266d1956513c0_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\msijce32.dll f710a2d33d63a764233266d1956513c0_JaffaCakes118.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3036 1752 WerFault.exe f710a2d33d63a764233266d1956513c0_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
f710a2d33d63a764233266d1956513c0_JaffaCakes118.exepid process 1752 f710a2d33d63a764233266d1956513c0_JaffaCakes118.exe 1752 f710a2d33d63a764233266d1956513c0_JaffaCakes118.exe 1752 f710a2d33d63a764233266d1956513c0_JaffaCakes118.exe 1752 f710a2d33d63a764233266d1956513c0_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
f710a2d33d63a764233266d1956513c0_JaffaCakes118.exedescription pid process target process PID 1752 wrote to memory of 3020 1752 f710a2d33d63a764233266d1956513c0_JaffaCakes118.exe rundll32.exe PID 1752 wrote to memory of 3020 1752 f710a2d33d63a764233266d1956513c0_JaffaCakes118.exe rundll32.exe PID 1752 wrote to memory of 3020 1752 f710a2d33d63a764233266d1956513c0_JaffaCakes118.exe rundll32.exe PID 1752 wrote to memory of 3020 1752 f710a2d33d63a764233266d1956513c0_JaffaCakes118.exe rundll32.exe PID 1752 wrote to memory of 3020 1752 f710a2d33d63a764233266d1956513c0_JaffaCakes118.exe rundll32.exe PID 1752 wrote to memory of 3020 1752 f710a2d33d63a764233266d1956513c0_JaffaCakes118.exe rundll32.exe PID 1752 wrote to memory of 3020 1752 f710a2d33d63a764233266d1956513c0_JaffaCakes118.exe rundll32.exe PID 1752 wrote to memory of 3036 1752 f710a2d33d63a764233266d1956513c0_JaffaCakes118.exe WerFault.exe PID 1752 wrote to memory of 3036 1752 f710a2d33d63a764233266d1956513c0_JaffaCakes118.exe WerFault.exe PID 1752 wrote to memory of 3036 1752 f710a2d33d63a764233266d1956513c0_JaffaCakes118.exe WerFault.exe PID 1752 wrote to memory of 3036 1752 f710a2d33d63a764233266d1956513c0_JaffaCakes118.exe WerFault.exe -
outlook_win_path 1 IoCs
Processes:
f710a2d33d63a764233266d1956513c0_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook f710a2d33d63a764233266d1956513c0_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f710a2d33d63a764233266d1956513c0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f710a2d33d63a764233266d1956513c0_JaffaCakes118.exe"1⤵
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- outlook_win_path
PID:1752 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe msijce32.dll,EmYMsld2⤵
- Loads dropped DLL
PID:3020
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1752 -s 3202⤵
- Program crash
PID:3036
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD5ce7d70fee773b5060dfadae59ee44c50
SHA172d1b5169a317d379cefcf6dd81532b55c84d0ba
SHA256819711654751fa54b36659d79214f4a1c43b7886b4e122f68c2133b4f4128dcf
SHA5121fdb02fbf85a3c1e01b4406889736bbc02d776c46252c4db2606010209f7a4adf39344ace733c9ca5d06a188c8235350d1d0f68e3e818c1864ed883288b9da44