Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2024, 03:00
Behavioral task
behavioral1
Sample
4444c931de8190ce8463cd4a296683bc_JaffaCakes118.exe
Resource
win7-20240215-en
General
-
Target
4444c931de8190ce8463cd4a296683bc_JaffaCakes118.exe
-
Size
1.2MB
-
MD5
4444c931de8190ce8463cd4a296683bc
-
SHA1
105ca60574cad4b42d4570cc787b3584c9bb87f7
-
SHA256
235284fedabfe48b5a2ff0abdc351a3d088ce1bdcf05c8a6ea4b64c9796abb54
-
SHA512
6bf9355605e8f261ed9aefe5ccbd52792edf0eaa3473a13585041edff1c52e6f74b3b15bd178dc4fae49f5dcd1f11d7ad6e2c6fa7fd65e85af0c7143f5659773
-
SSDEEP
24576:j0ff/Atv+i1kU9tEG8B4nZDr4x59YUtETgvk2c+fFF78f2yirk:QAtv/fyGDnl8z9YUWwBhr89
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/412-0-0x0000000000800000-0x0000000000B10000-memory.dmp upx behavioral2/memory/412-35-0x0000000000800000-0x0000000000B10000-memory.dmp upx -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 412 4444c931de8190ce8463cd4a296683bc_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2904 412 WerFault.exe 83 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl 4444c931de8190ce8463cd4a296683bc_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION 4444c931de8190ce8463cd4a296683bc_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\4444c931de8190ce8463cd4a296683bc_JaffaCakes118.exe = "11001" 4444c931de8190ce8463cd4a296683bc_JaffaCakes118.exe -
Modifies registry class 36 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Setup.Application\CLSID\ = "{017E057B-DACF-4A07-B878-E294565E3F90}" 4444c931de8190ce8463cd4a296683bc_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\TypeLib 4444c931de8190ce8463cd4a296683bc_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\TypeLib\Version = "1.0" 4444c931de8190ce8463cd4a296683bc_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\TypeLib 4444c931de8190ce8463cd4a296683bc_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{017E057B-DACF-4A07-B878-E294565E3F90}\ = "Setup.Application" 4444c931de8190ce8463cd4a296683bc_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{017E057B-DACF-4A07-B878-E294565E3F90}\LocalServer32\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\4444c931de8190ce8463cd4a296683bc_JaffaCakes118.exe\"" 4444c931de8190ce8463cd4a296683bc_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" 4444c931de8190ce8463cd4a296683bc_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\ProxyStubClsid32 4444c931de8190ce8463cd4a296683bc_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\TypeLib\ = "{F126C9FC-9299-40F2-BD42-C59023AD1E7F}" 4444c931de8190ce8463cd4a296683bc_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Setup.Application 4444c931de8190ce8463cd4a296683bc_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F126C9FC-9299-40F2-BD42-C59023AD1E7F} 4444c931de8190ce8463cd4a296683bc_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F126C9FC-9299-40F2-BD42-C59023AD1E7F}\1.0\0 4444c931de8190ce8463cd4a296683bc_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967} 4444c931de8190ce8463cd4a296683bc_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\ProxyStubClsid32 4444c931de8190ce8463cd4a296683bc_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{017E057B-DACF-4A07-B878-E294565E3F90} 4444c931de8190ce8463cd4a296683bc_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F126C9FC-9299-40F2-BD42-C59023AD1E7F}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\4444c931de8190ce8463cd4a296683bc_JaffaCakes118.exe" 4444c931de8190ce8463cd4a296683bc_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\ = "ISetup" 4444c931de8190ce8463cd4a296683bc_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\TypeLib\Version = "1.0" 4444c931de8190ce8463cd4a296683bc_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F126C9FC-9299-40F2-BD42-C59023AD1E7F}\1.0\FLAGS\ = "0" 4444c931de8190ce8463cd4a296683bc_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" 4444c931de8190ce8463cd4a296683bc_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Setup.Application\ = "Setup.Application" 4444c931de8190ce8463cd4a296683bc_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{017E057B-DACF-4A07-B878-E294565E3F90}\InprocHandler32 4444c931de8190ce8463cd4a296683bc_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{017E057B-DACF-4A07-B878-E294565E3F90}\InprocHandler32\ = "ole32.dll" 4444c931de8190ce8463cd4a296683bc_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F126C9FC-9299-40F2-BD42-C59023AD1E7F}\1.0\HELPDIR 4444c931de8190ce8463cd4a296683bc_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\TypeLib\ = "{F126C9FC-9299-40F2-BD42-C59023AD1E7F}" 4444c931de8190ce8463cd4a296683bc_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967} 4444c931de8190ce8463cd4a296683bc_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{017E057B-DACF-4A07-B878-E294565E3F90}\ProgID\ = "Setup.Application" 4444c931de8190ce8463cd4a296683bc_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F126C9FC-9299-40F2-BD42-C59023AD1E7F}\1.0 4444c931de8190ce8463cd4a296683bc_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F126C9FC-9299-40F2-BD42-C59023AD1E7F}\1.0\0\win32 4444c931de8190ce8463cd4a296683bc_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F126C9FC-9299-40F2-BD42-C59023AD1E7F}\1.0\HELPDIR\ 4444c931de8190ce8463cd4a296683bc_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\ = "ISetup" 4444c931de8190ce8463cd4a296683bc_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Setup.Application\CLSID 4444c931de8190ce8463cd4a296683bc_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{017E057B-DACF-4A07-B878-E294565E3F90}\ProgID 4444c931de8190ce8463cd4a296683bc_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{017E057B-DACF-4A07-B878-E294565E3F90}\LocalServer32 4444c931de8190ce8463cd4a296683bc_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F126C9FC-9299-40F2-BD42-C59023AD1E7F}\1.0\ = "Setup" 4444c931de8190ce8463cd4a296683bc_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F126C9FC-9299-40F2-BD42-C59023AD1E7F}\1.0\FLAGS 4444c931de8190ce8463cd4a296683bc_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 412 4444c931de8190ce8463cd4a296683bc_JaffaCakes118.exe 412 4444c931de8190ce8463cd4a296683bc_JaffaCakes118.exe 412 4444c931de8190ce8463cd4a296683bc_JaffaCakes118.exe 412 4444c931de8190ce8463cd4a296683bc_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 412 4444c931de8190ce8463cd4a296683bc_JaffaCakes118.exe 412 4444c931de8190ce8463cd4a296683bc_JaffaCakes118.exe 412 4444c931de8190ce8463cd4a296683bc_JaffaCakes118.exe 412 4444c931de8190ce8463cd4a296683bc_JaffaCakes118.exe 412 4444c931de8190ce8463cd4a296683bc_JaffaCakes118.exe 412 4444c931de8190ce8463cd4a296683bc_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4444c931de8190ce8463cd4a296683bc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4444c931de8190ce8463cd4a296683bc_JaffaCakes118.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:412 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 412 -s 25042⤵
- Program crash
PID:2904
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 412 -ip 4121⤵PID:4280
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
130KB
MD521b378e2391f279730a2738dd96d0e61
SHA1e2a700881720e136b491165e81ee1fb2bd9dae89
SHA256cdafd8acd6710705c7178890e03beab8a7c6e894372e3b8943fb05d5a929c314
SHA5125f0794d62875902bd7a26d97ee55614c7201eef1974a0245ad7e6ffa2a46c6cf2d9d69262b78a21851da38bd9c5a50da61c3b331c81bd72b943b0ae40589fc7f
-
Filesize
301B
MD513a1e975699338b90ddd3b9311d042d5
SHA177a769b1342c000e5347ac58e99bb676f4e9aca2
SHA25636217d8a8ac8073bf060c04475d3b88f2eafe76dce2e25be35ee715357d79323
SHA512fb1594104f7bf9033cff66b7c85a545d3beeca3e213476285995b39731b7289e8e90b2b58f99985cc3d207c7d6fba542fb844e0a9ab1bfabdf15e49fd39e706f