Analysis
-
max time kernel
125s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
25-05-2024 14:20
Static task
static1
Behavioral task
behavioral1
Sample
723e7c1139d82d5a440909f5a3cba306_JaffaCakes118.exe
Resource
win7-20240215-en
General
-
Target
723e7c1139d82d5a440909f5a3cba306_JaffaCakes118.exe
-
Size
732KB
-
MD5
723e7c1139d82d5a440909f5a3cba306
-
SHA1
b733583481aa78f05e81435771c62dd24d2ce95f
-
SHA256
86d5021cc2c237026b8d86c324debdb38c50b8e1988488f2e2bd2686f4f653a0
-
SHA512
0af161592fd00e8f6a9c7839c01e1b3a7f730068cdce562f3bf632f28add49967dd0305ea621d972b80265bbefe5ec3864406ec5f9ba4442a7914858bf5b3115
-
SSDEEP
12288:4VJtYUkkoGly3cJuq2kqYNwnJtFB/yDhv4BK9fsp6b8u8wkpuzvX3X/zid6lgpn:4VJOUnoOy3cwq2ZYNwnGDhv4BK9Up6ba
Malware Config
Signatures
-
NirSoft MailPassView 4 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral1/memory/1868-56-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView behavioral1/memory/1868-59-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView behavioral1/memory/1868-58-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView behavioral1/memory/1868-62-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 3 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral1/memory/1288-63-0x0000000000400000-0x0000000000458000-memory.dmp WebBrowserPassView behavioral1/memory/1288-64-0x0000000000400000-0x0000000000458000-memory.dmp WebBrowserPassView behavioral1/memory/1288-67-0x0000000000400000-0x0000000000458000-memory.dmp WebBrowserPassView -
Nirsoft 7 IoCs
resource yara_rule behavioral1/memory/1868-56-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral1/memory/1868-59-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral1/memory/1868-58-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral1/memory/1868-62-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral1/memory/1288-63-0x0000000000400000-0x0000000000458000-memory.dmp Nirsoft behavioral1/memory/1288-64-0x0000000000400000-0x0000000000458000-memory.dmp Nirsoft behavioral1/memory/1288-67-0x0000000000400000-0x0000000000458000-memory.dmp Nirsoft -
Deletes itself 1 IoCs
pid Process 1964 Windows Update.exe -
Executes dropped EXE 1 IoCs
pid Process 1964 Windows Update.exe -
Loads dropped DLL 1 IoCs
pid Process 2484 723e7c1139d82d5a440909f5a3cba306_JaffaCakes118.exe -
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts vbc.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 whatismyipaddress.com 6 whatismyipaddress.com 7 whatismyipaddress.com -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1964 set thread context of 1868 1964 Windows Update.exe 30 PID 1964 set thread context of 1288 1964 Windows Update.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1964 Windows Update.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1964 Windows Update.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1964 Windows Update.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2484 wrote to memory of 1964 2484 723e7c1139d82d5a440909f5a3cba306_JaffaCakes118.exe 28 PID 2484 wrote to memory of 1964 2484 723e7c1139d82d5a440909f5a3cba306_JaffaCakes118.exe 28 PID 2484 wrote to memory of 1964 2484 723e7c1139d82d5a440909f5a3cba306_JaffaCakes118.exe 28 PID 2484 wrote to memory of 1964 2484 723e7c1139d82d5a440909f5a3cba306_JaffaCakes118.exe 28 PID 2484 wrote to memory of 1964 2484 723e7c1139d82d5a440909f5a3cba306_JaffaCakes118.exe 28 PID 2484 wrote to memory of 1964 2484 723e7c1139d82d5a440909f5a3cba306_JaffaCakes118.exe 28 PID 2484 wrote to memory of 1964 2484 723e7c1139d82d5a440909f5a3cba306_JaffaCakes118.exe 28 PID 1964 wrote to memory of 1868 1964 Windows Update.exe 30 PID 1964 wrote to memory of 1868 1964 Windows Update.exe 30 PID 1964 wrote to memory of 1868 1964 Windows Update.exe 30 PID 1964 wrote to memory of 1868 1964 Windows Update.exe 30 PID 1964 wrote to memory of 1868 1964 Windows Update.exe 30 PID 1964 wrote to memory of 1868 1964 Windows Update.exe 30 PID 1964 wrote to memory of 1868 1964 Windows Update.exe 30 PID 1964 wrote to memory of 1868 1964 Windows Update.exe 30 PID 1964 wrote to memory of 1868 1964 Windows Update.exe 30 PID 1964 wrote to memory of 1868 1964 Windows Update.exe 30 PID 1964 wrote to memory of 1288 1964 Windows Update.exe 31 PID 1964 wrote to memory of 1288 1964 Windows Update.exe 31 PID 1964 wrote to memory of 1288 1964 Windows Update.exe 31 PID 1964 wrote to memory of 1288 1964 Windows Update.exe 31 PID 1964 wrote to memory of 1288 1964 Windows Update.exe 31 PID 1964 wrote to memory of 1288 1964 Windows Update.exe 31 PID 1964 wrote to memory of 1288 1964 Windows Update.exe 31 PID 1964 wrote to memory of 1288 1964 Windows Update.exe 31 PID 1964 wrote to memory of 1288 1964 Windows Update.exe 31 PID 1964 wrote to memory of 1288 1964 Windows Update.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\723e7c1139d82d5a440909f5a3cba306_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\723e7c1139d82d5a440909f5a3cba306_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Users\Admin\AppData\Roaming\Windows Update.exe"C:\Users\Admin\AppData\Roaming\Windows Update.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"3⤵
- Accesses Microsoft Outlook accounts
PID:1868
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holderwb.txt"3⤵PID:1288
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
84B
MD5782f6247eaf698d95249d2b1c6e24ed9
SHA1ea1e94755947f60d4f2507c6e6d688c49f988890
SHA2568257369b61f7d97edaa803298930b0a8f535ab6397250ff549233ceabee42b0f
SHA512d4097181af19e0f0d2fe6248789f68e93e6eb9e606845a7c57f75b1fa5c56c2f38085c6a6fd0bb20c4cb0cce697b2c0e891f08b4cea7d1ece0763cc90a1c2c17
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
732KB
MD5723e7c1139d82d5a440909f5a3cba306
SHA1b733583481aa78f05e81435771c62dd24d2ce95f
SHA25686d5021cc2c237026b8d86c324debdb38c50b8e1988488f2e2bd2686f4f653a0
SHA5120af161592fd00e8f6a9c7839c01e1b3a7f730068cdce562f3bf632f28add49967dd0305ea621d972b80265bbefe5ec3864406ec5f9ba4442a7914858bf5b3115