Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
16-05-2024 10:55
Static task
static1
Behavioral task
behavioral1
Sample
4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe
-
Size
164KB
-
MD5
4ab7f450124b7b4400bf866243d41a19
-
SHA1
37d2b935cfb5424f675aa707efc29e0a526a59f9
-
SHA256
573032a583013a819dc46f1040e37506f700ddec7ac92f4292ce79a83d48c92f
-
SHA512
cc13ce5852f6297820f59114135f0cfbe0131a4542761b6f3a875d6ed501086257406faa31f16e1e4521d06814e1720a6abe3b270c39aeb4dc6b94a6eb71b42c
-
SSDEEP
3072:bk/swoSzoh+vZ9oT8t4LYoH9KYlBe5wAAGOKRkRiYfkQdjLY1SprO:zAZ9oT8ttggYwwAcRy
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2864 SendCheckpoint.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\WINE 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\WINE 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SendCheckpoint.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Acrobat\\DC\\Security\\SendCheckpoint.exe" svchost.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 2488 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe 2488 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe 2488 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe 2488 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe 2488 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe 2488 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe 2488 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe 2488 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe 2488 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe 2488 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe 2488 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe 2488 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe 2488 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe 2488 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe 2488 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe 2488 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe 2488 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe 2488 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe 2488 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe 2488 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe 1208 svchost.exe 1208 svchost.exe 1208 svchost.exe 1208 svchost.exe 1208 svchost.exe 1208 svchost.exe 1208 svchost.exe 1208 svchost.exe 1208 svchost.exe 1208 svchost.exe 1208 svchost.exe 1208 svchost.exe 1208 svchost.exe 1208 svchost.exe 1208 svchost.exe 1208 svchost.exe 1208 svchost.exe 1208 svchost.exe 1208 svchost.exe 1208 svchost.exe 1208 svchost.exe 1208 svchost.exe 1208 svchost.exe 1208 svchost.exe 1208 svchost.exe 1208 svchost.exe 1208 svchost.exe 1208 svchost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeSecurityPrivilege 2488 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2488 wrote to memory of 2864 2488 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe 82 PID 2488 wrote to memory of 2864 2488 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe 82 PID 2488 wrote to memory of 2864 2488 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe 82 PID 2488 wrote to memory of 4908 2488 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe 83 PID 2488 wrote to memory of 4908 2488 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe 83 PID 2488 wrote to memory of 4908 2488 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe 83 PID 2864 wrote to memory of 1208 2864 SendCheckpoint.exe 107 PID 2864 wrote to memory of 1208 2864 SendCheckpoint.exe 107 PID 2864 wrote to memory of 1208 2864 SendCheckpoint.exe 107 PID 2864 wrote to memory of 1208 2864 SendCheckpoint.exe 107 PID 2864 wrote to memory of 1208 2864 SendCheckpoint.exe 107 PID 2864 wrote to memory of 1208 2864 SendCheckpoint.exe 107 PID 2864 wrote to memory of 1208 2864 SendCheckpoint.exe 107 PID 2864 wrote to memory of 744 2864 SendCheckpoint.exe 108 PID 2864 wrote to memory of 744 2864 SendCheckpoint.exe 108 PID 2864 wrote to memory of 744 2864 SendCheckpoint.exe 108 PID 2864 wrote to memory of 744 2864 SendCheckpoint.exe 108 PID 2864 wrote to memory of 744 2864 SendCheckpoint.exe 108 PID 2864 wrote to memory of 744 2864 SendCheckpoint.exe 108 PID 2864 wrote to memory of 744 2864 SendCheckpoint.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe"1⤵
- Identifies Wine through registry keys
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\DC\Security\SendCheckpoint.exe"C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\DC\Security\SendCheckpoint.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:1208
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵PID:744
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\upd7a048b3b.bat"2⤵PID:4908
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
277B
MD5ada4824c0745b28e86904184ca9f6454
SHA185c78144170e148cb77b88a16f4c6277386a151b
SHA2565abce68bdc7243dd80dd9fde978dd90376d952b05aa103745d8d6fff4781fdb9
SHA51260c66cdc1a2f9bbf0e502e64f7d72196be37f019863e27d58ca95c1f51189ae4b556e3e444569dcfbcb85aa7095dec9bafdcd48c885583313b0265ac01053c13
-
Filesize
164KB
MD54ab7f450124b7b4400bf866243d41a19
SHA137d2b935cfb5424f675aa707efc29e0a526a59f9
SHA256573032a583013a819dc46f1040e37506f700ddec7ac92f4292ce79a83d48c92f
SHA512cc13ce5852f6297820f59114135f0cfbe0131a4542761b6f3a875d6ed501086257406faa31f16e1e4521d06814e1720a6abe3b270c39aeb4dc6b94a6eb71b42c