Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
19-06-2024 19:03
Static task
static1
Behavioral task
behavioral1
Sample
0014ccea773bb3d535b0bc5d90e5fc5f_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0014ccea773bb3d535b0bc5d90e5fc5f_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0014ccea773bb3d535b0bc5d90e5fc5f_JaffaCakes118.exe
-
Size
850KB
-
MD5
0014ccea773bb3d535b0bc5d90e5fc5f
-
SHA1
e5c386d108b2f1dabda603850e93b29281794991
-
SHA256
868e2e284842786e373e4f5a532871ed7f53712b1b66473d5654b04bb033e6c0
-
SHA512
f69ac0471996c77918bf45781001559f9dc11d6f37f3a990b57b0de76fc986ea6a7ac65fe079a9c2e7da9c7b1ad757c59aa94b2531b97d008c094f59724c96c3
-
SSDEEP
12288:OoWdBjdDhyzwgXPdlGdXbaH0wUExv5cjkXWXKWhCe//nbpDtSNTS04jC2TwtX:MDhSPKK4ExwxKkXlZSRSiMwtX
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2064 isecurity.exe -
Loads dropped DLL 3 IoCs
pid Process 2436 0014ccea773bb3d535b0bc5d90e5fc5f_JaffaCakes118.exe 2436 0014ccea773bb3d535b0bc5d90e5fc5f_JaffaCakes118.exe 2436 0014ccea773bb3d535b0bc5d90e5fc5f_JaffaCakes118.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\Internet Security = "C:\\ProgramData\\isecurity.exe" isecurity.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\N: isecurity.exe File opened (read-only) \??\R: isecurity.exe File opened (read-only) \??\S: isecurity.exe File opened (read-only) \??\W: isecurity.exe File opened (read-only) \??\X: isecurity.exe File opened (read-only) \??\K: isecurity.exe File opened (read-only) \??\J: isecurity.exe File opened (read-only) \??\M: isecurity.exe File opened (read-only) \??\Q: isecurity.exe File opened (read-only) \??\T: isecurity.exe File opened (read-only) \??\Y: isecurity.exe File opened (read-only) \??\Z: isecurity.exe File opened (read-only) \??\E: isecurity.exe File opened (read-only) \??\H: isecurity.exe File opened (read-only) \??\I: isecurity.exe File opened (read-only) \??\U: isecurity.exe File opened (read-only) \??\V: isecurity.exe File opened (read-only) \??\G: isecurity.exe File opened (read-only) \??\O: isecurity.exe File opened (read-only) \??\P: isecurity.exe File opened (read-only) \??\L: isecurity.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 isecurity.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2436 0014ccea773bb3d535b0bc5d90e5fc5f_JaffaCakes118.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2436 0014ccea773bb3d535b0bc5d90e5fc5f_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 14 IoCs
pid Process 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe -
Suspicious use of SendNotifyMessage 14 IoCs
pid Process 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe 2064 isecurity.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2064 isecurity.exe 2064 isecurity.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2436 wrote to memory of 2064 2436 0014ccea773bb3d535b0bc5d90e5fc5f_JaffaCakes118.exe 28 PID 2436 wrote to memory of 2064 2436 0014ccea773bb3d535b0bc5d90e5fc5f_JaffaCakes118.exe 28 PID 2436 wrote to memory of 2064 2436 0014ccea773bb3d535b0bc5d90e5fc5f_JaffaCakes118.exe 28 PID 2436 wrote to memory of 2064 2436 0014ccea773bb3d535b0bc5d90e5fc5f_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\0014ccea773bb3d535b0bc5d90e5fc5f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0014ccea773bb3d535b0bc5d90e5fc5f_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\ProgramData\isecurity.exeC:\ProgramData\isecurity.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2064
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
841KB
MD5c5a14db5284c1b7e56e59eb667cccc08
SHA13c409d9a6370d9deec0616918812a32711c4caf4
SHA25675a20b9289ccf422af35aa13a797c38bf8df39c65c38904e3a8b2375c1e4d52c
SHA51292bece318e77c74d23d632fe665d88aa6043f66d37aac6c985016ebadca341a0f0fbbe97e65e616ceb4494f6bb52f011cc64d96d3ff9501cc145da7d6092f76e