Overview
overview
10Static
static
3bc67c34fae...18.exe
windows7-x64
10bc67c34fae...18.exe
windows10-2004-x64
10$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3blog-targetting.js
windows7-x64
3blog-targetting.js
windows10-2004-x64
3jquery.deb...ize.js
windows7-x64
3jquery.deb...ize.js
windows10-2004-x64
3pbPage.js
windows7-x64
3pbPage.js
windows10-2004-x64
3responsive...min.js
windows7-x64
3responsive...min.js
windows10-2004-x64
3Analysis
-
max time kernel
152s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
18-06-2024 14:24
Static task
static1
Behavioral task
behavioral1
Sample
bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
blog-targetting.js
Resource
win7-20240611-en
Behavioral task
behavioral8
Sample
blog-targetting.js
Resource
win10v2004-20240611-en
Behavioral task
behavioral9
Sample
jquery.debouncedresize.js
Resource
win7-20240611-en
Behavioral task
behavioral10
Sample
jquery.debouncedresize.js
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
pbPage.js
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
pbPage.js
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
responsive-containers.min.js
Resource
win7-20231129-en
Behavioral task
behavioral14
Sample
responsive-containers.min.js
Resource
win10v2004-20240611-en
General
-
Target
bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe
-
Size
275KB
-
MD5
bc67c34fae42d4408d4223c537131c95
-
SHA1
27a6effafda93ba0c103e965fb925f92468e2623
-
SHA256
d9ddfa571587bd55c75526b8f17e6dbbb8a4b6179bfc002575cdcbf446154e7a
-
SHA512
f347803528c4f3c1f706f17af0901e31901ecc98dc27466e73d3657ea149c63993c9dc030d7cef901ed4d12b91e5c93fbc90ef91e2e609af4680fd3257a501d0
-
SSDEEP
6144:KpkXGh5y+M9+JCeoNUGXo0f76bCQjzxyQRkdvH8XkiJvvD:L13nNPXo0f7AvkjvmkiVvD
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\OneNote\16.0\_README_64QWY_.hta
Signatures
-
Contacts a large (591) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Loads dropped DLL 1 IoCs
pid Process 2260 bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2260 set thread context of 3384 2260 bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe 98 -
Drops file in Program Files directory 6 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\DESIGNER.ONE bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\BUSINESS.ONE bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\BLANK.ONE bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\ACADEMIC.ONE bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\PLANNERS.ONE bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe File created C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\_README_XQ4DH0_.hta bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3384 bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe 3384 bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe 3384 bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe 3384 bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe 3384 bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe 3384 bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe 3384 bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe 3384 bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe 3384 bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe 3384 bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe 3384 bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe 3384 bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe 3384 bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe 3384 bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe 3384 bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe 3384 bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe 3384 bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe 3384 bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe 3384 bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe 3384 bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe 3384 bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe 3384 bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe 3384 bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe 3384 bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe 3384 bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe 3384 bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe 3384 bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe 3384 bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe 3384 bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe 3384 bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe 3384 bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe 3384 bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe 3384 bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe 3384 bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe 3384 bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe 3384 bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe 3384 bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe 3384 bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe 3384 bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe 3384 bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe 3384 bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe 3384 bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe 3384 bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe 3384 bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe 3384 bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe 3384 bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe 3384 bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe 3384 bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe 3384 bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe 3384 bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe 3384 bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe 3384 bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe 3384 bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe 3384 bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe 3384 bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe 3384 bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe 3384 bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe 3384 bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe 3384 bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe 3384 bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe 3384 bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe 3384 bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe 3384 bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe 3384 bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2260 bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 3384 bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 3384 bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2260 wrote to memory of 3384 2260 bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe 98 PID 2260 wrote to memory of 3384 2260 bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe 98 PID 2260 wrote to memory of 3384 2260 bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe 98 PID 2260 wrote to memory of 3384 2260 bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bc67c34fae42d4408d4223c537131c95_JaffaCakes118.exe"2⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3984 --field-trial-handle=2280,i,1836084024518340990,18250262151825427757,262144 --variations-seed-version /prefetch:81⤵PID:4192
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5a4dd044bcd94e9b3370ccf095b31f896
SHA117c78201323ab2095bc53184aa8267c9187d5173
SHA2562e226715419a5882e2e14278940ee8ef0aa648a3ef7af5b3dc252674111962bc
SHA51287335a43b9ca13e1300c7c23e702e87c669e2bcf4f6065f0c684fc53165e9c1f091cc4d79a3eca3910f0518d3b647120ac0be1a68eaade2e75eaa64adfc92c5a
-
Filesize
66KB
MD5fd54f36c2bec52658d5c04268591bc44
SHA1911649d9c5d84b69d3ac8b8a3333233ef2898533
SHA2561a392481135366f3e770567c3556a22b555e04320ffa92557850d5a9088e2ae4
SHA5126b2a53c5a5c219ee6302925827e40b33c5a5cbdd32b714c5fd07cc9674fc6b7ba504738b600d7874da8e0727f743e9acbcee800466afe984589ccef992b6b0ea