Analysis
-
max time kernel
125s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
23/05/2024, 16:17
Static task
static1
Behavioral task
behavioral1
Sample
6b85f6c8ac06c58dc6004b3abe3a4a75_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
6b85f6c8ac06c58dc6004b3abe3a4a75_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
6b85f6c8ac06c58dc6004b3abe3a4a75_JaffaCakes118.exe
-
Size
582KB
-
MD5
6b85f6c8ac06c58dc6004b3abe3a4a75
-
SHA1
b027729d6fb7197c5478d13cc239b5cac713acaf
-
SHA256
d13af5e3ac408cddb5f77f98c7f0ea747223ae9295bcba9c3e2e38e158f3fc98
-
SHA512
4573157e1d061c7ab6b6dd9939bab769ffeb0018ccc92cb69fec426c2097721632febc583d9c9ae64f62a1a52c344c9742d11f841549e78fbc189895de50c331
-
SSDEEP
6144:iBurhRHBUPBJ7wG/6lWQE9Y3gE9xLYpY3gE9xLYpY3gE9xLY5F/CVtXjFw5p:R87wG/PYbgYbgYbSFMjyp
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts cmd.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 6b85f6c8ac06c58dc6004b3abe3a4a75_JaffaCakes118.exe Key opened \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 6b85f6c8ac06c58dc6004b3abe3a4a75_JaffaCakes118.exe Key opened \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 6b85f6c8ac06c58dc6004b3abe3a4a75_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\qni = "C:\\Users\\Admin\\AppData\\Roaming\\qni\\qni.exe" 6b85f6c8ac06c58dc6004b3abe3a4a75_JaffaCakes118.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 checkip.dyndns.org -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2060 6b85f6c8ac06c58dc6004b3abe3a4a75_JaffaCakes118.exe 2060 6b85f6c8ac06c58dc6004b3abe3a4a75_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2060 6b85f6c8ac06c58dc6004b3abe3a4a75_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2060 6b85f6c8ac06c58dc6004b3abe3a4a75_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2060 wrote to memory of 2644 2060 6b85f6c8ac06c58dc6004b3abe3a4a75_JaffaCakes118.exe 29 PID 2060 wrote to memory of 2644 2060 6b85f6c8ac06c58dc6004b3abe3a4a75_JaffaCakes118.exe 29 PID 2060 wrote to memory of 2644 2060 6b85f6c8ac06c58dc6004b3abe3a4a75_JaffaCakes118.exe 29 PID 2060 wrote to memory of 2644 2060 6b85f6c8ac06c58dc6004b3abe3a4a75_JaffaCakes118.exe 29 PID 2644 wrote to memory of 2876 2644 cmd.exe 31 PID 2644 wrote to memory of 2876 2644 cmd.exe 31 PID 2644 wrote to memory of 2876 2644 cmd.exe 31 PID 2644 wrote to memory of 2876 2644 cmd.exe 31 PID 2644 wrote to memory of 2704 2644 cmd.exe 32 PID 2644 wrote to memory of 2704 2644 cmd.exe 32 PID 2644 wrote to memory of 2704 2644 cmd.exe 32 PID 2644 wrote to memory of 2704 2644 cmd.exe 32 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 6b85f6c8ac06c58dc6004b3abe3a4a75_JaffaCakes118.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 6b85f6c8ac06c58dc6004b3abe3a4a75_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6b85f6c8ac06c58dc6004b3abe3a4a75_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6b85f6c8ac06c58dc6004b3abe3a4a75_JaffaCakes118.exe"1⤵
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:2060 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\HostsBlock.cmd" "2⤵
- Drops file in Drivers directory
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\find.exeFIND /C /I "on4u3.buhl.de" C:\Windows\system32\drivers\etc\hosts3⤵PID:2876
-
-
C:\Windows\SysWOW64\find.exeFIND /C /I "www.on4u3.buhl.de" C:\Windows\system32\drivers\etc\hosts3⤵PID:2704
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
381B
MD5c2cc3363c0f230240be8fb444a7e646d
SHA1bd21590107913ccf7a919ba4d95c2266df566f35
SHA256dd98390b969e1730aafbc19a9bd99951816003d9bec954fee4644c83c2266df0
SHA512f03c08c3cbcd58151f95609e56d0c501859cbc8dd73297a43944f9df003328d12b2c427f5734c18ff2af32c29f57644cfc67c55208a856c1abe69b533fe55fd7
-
Filesize
1016B
MD591c1afd23f07f50112954ad080af46cf
SHA16b1596c2b4c9cda0b3028cc1d21d41dcab0ec0df
SHA25642b60e18792e12f69f2dd59fd79edcdda5e4184887687340fbc1602234861909
SHA512274819b0c6cbb0e12949d2bbd274d455d03678eb2f1f91d83650756f517979b6b2ed515ab0bf23c9d10577ee1019a343cbef3f0d24fb532711aba28c861797c6