Analysis
-
max time kernel
141s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
20/06/2024, 14:29
Static task
static1
Behavioral task
behavioral1
Sample
06d44c8c2a4799c31aeeeb0f66cee6e2_JaffaCakes118.exe
Resource
win7-20231129-en
General
-
Target
06d44c8c2a4799c31aeeeb0f66cee6e2_JaffaCakes118.exe
-
Size
282KB
-
MD5
06d44c8c2a4799c31aeeeb0f66cee6e2
-
SHA1
f1560b67a8e0e30d40fd9f598281799a516e58ea
-
SHA256
2cf0f06225998fb06a2dd991277574d83a3e1566181edd8bcf56840146d2316b
-
SHA512
890d743a98711cf5a55ab6a58e555f06321887a0daaf10444eebd5b93b0c770377c4634fbca78fe9efac711b9e1f03ff4da33415fc5f7c12334ff65de7e628ac
-
SSDEEP
6144:Z0mTmnVaKf0pALLPd6H0Ldit1SVadGvowQ/pJUJlowL:+Vc4uALLjW1gowujQlowL
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" 06d44c8c2a4799c31aeeeb0f66cee6e2_JaffaCakes118.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 1520 8B2F.tmp -
Loads dropped DLL 2 IoCs
pid Process 2340 06d44c8c2a4799c31aeeeb0f66cee6e2_JaffaCakes118.exe 2340 06d44c8c2a4799c31aeeeb0f66cee6e2_JaffaCakes118.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2340-2-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2340-1-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2340-49-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/792-51-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/792-53-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2340-145-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1828-148-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1828-147-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2340-149-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2340-336-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2340-340-0x0000000000400000-0x000000000046B000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\156.exe = "C:\\Program Files (x86)\\LP\\62C3\\156.exe" 06d44c8c2a4799c31aeeeb0f66cee6e2_JaffaCakes118.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\LP\62C3\156.exe 06d44c8c2a4799c31aeeeb0f66cee6e2_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\LP\62C3\156.exe 06d44c8c2a4799c31aeeeb0f66cee6e2_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\LP\62C3\8B2F.tmp 06d44c8c2a4799c31aeeeb0f66cee6e2_JaffaCakes118.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2340 06d44c8c2a4799c31aeeeb0f66cee6e2_JaffaCakes118.exe 2340 06d44c8c2a4799c31aeeeb0f66cee6e2_JaffaCakes118.exe 2340 06d44c8c2a4799c31aeeeb0f66cee6e2_JaffaCakes118.exe 2340 06d44c8c2a4799c31aeeeb0f66cee6e2_JaffaCakes118.exe 2340 06d44c8c2a4799c31aeeeb0f66cee6e2_JaffaCakes118.exe 2340 06d44c8c2a4799c31aeeeb0f66cee6e2_JaffaCakes118.exe 2340 06d44c8c2a4799c31aeeeb0f66cee6e2_JaffaCakes118.exe 2340 06d44c8c2a4799c31aeeeb0f66cee6e2_JaffaCakes118.exe 2340 06d44c8c2a4799c31aeeeb0f66cee6e2_JaffaCakes118.exe 2340 06d44c8c2a4799c31aeeeb0f66cee6e2_JaffaCakes118.exe 2340 06d44c8c2a4799c31aeeeb0f66cee6e2_JaffaCakes118.exe 2340 06d44c8c2a4799c31aeeeb0f66cee6e2_JaffaCakes118.exe 2340 06d44c8c2a4799c31aeeeb0f66cee6e2_JaffaCakes118.exe 2340 06d44c8c2a4799c31aeeeb0f66cee6e2_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1880 explorer.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeRestorePrivilege 2304 msiexec.exe Token: SeTakeOwnershipPrivilege 2304 msiexec.exe Token: SeSecurityPrivilege 2304 msiexec.exe Token: SeShutdownPrivilege 1880 explorer.exe Token: SeShutdownPrivilege 1880 explorer.exe Token: SeShutdownPrivilege 1880 explorer.exe Token: SeShutdownPrivilege 1880 explorer.exe Token: SeShutdownPrivilege 1880 explorer.exe Token: SeShutdownPrivilege 1880 explorer.exe Token: SeShutdownPrivilege 1880 explorer.exe Token: SeShutdownPrivilege 1880 explorer.exe Token: SeShutdownPrivilege 1880 explorer.exe Token: SeShutdownPrivilege 1880 explorer.exe Token: SeShutdownPrivilege 1880 explorer.exe Token: SeShutdownPrivilege 1880 explorer.exe -
Suspicious use of FindShellTrayWindow 24 IoCs
pid Process 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe -
Suspicious use of SendNotifyMessage 16 IoCs
pid Process 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2340 wrote to memory of 792 2340 06d44c8c2a4799c31aeeeb0f66cee6e2_JaffaCakes118.exe 30 PID 2340 wrote to memory of 792 2340 06d44c8c2a4799c31aeeeb0f66cee6e2_JaffaCakes118.exe 30 PID 2340 wrote to memory of 792 2340 06d44c8c2a4799c31aeeeb0f66cee6e2_JaffaCakes118.exe 30 PID 2340 wrote to memory of 792 2340 06d44c8c2a4799c31aeeeb0f66cee6e2_JaffaCakes118.exe 30 PID 2340 wrote to memory of 1828 2340 06d44c8c2a4799c31aeeeb0f66cee6e2_JaffaCakes118.exe 32 PID 2340 wrote to memory of 1828 2340 06d44c8c2a4799c31aeeeb0f66cee6e2_JaffaCakes118.exe 32 PID 2340 wrote to memory of 1828 2340 06d44c8c2a4799c31aeeeb0f66cee6e2_JaffaCakes118.exe 32 PID 2340 wrote to memory of 1828 2340 06d44c8c2a4799c31aeeeb0f66cee6e2_JaffaCakes118.exe 32 PID 2340 wrote to memory of 1520 2340 06d44c8c2a4799c31aeeeb0f66cee6e2_JaffaCakes118.exe 35 PID 2340 wrote to memory of 1520 2340 06d44c8c2a4799c31aeeeb0f66cee6e2_JaffaCakes118.exe 35 PID 2340 wrote to memory of 1520 2340 06d44c8c2a4799c31aeeeb0f66cee6e2_JaffaCakes118.exe 35 PID 2340 wrote to memory of 1520 2340 06d44c8c2a4799c31aeeeb0f66cee6e2_JaffaCakes118.exe 35 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 06d44c8c2a4799c31aeeeb0f66cee6e2_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" 06d44c8c2a4799c31aeeeb0f66cee6e2_JaffaCakes118.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\06d44c8c2a4799c31aeeeb0f66cee6e2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\06d44c8c2a4799c31aeeeb0f66cee6e2_JaffaCakes118.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\06d44c8c2a4799c31aeeeb0f66cee6e2_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\06d44c8c2a4799c31aeeeb0f66cee6e2_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\3DCA1\87562.exe%C:\Users\Admin\AppData\Roaming\3DCA12⤵PID:792
-
-
C:\Users\Admin\AppData\Local\Temp\06d44c8c2a4799c31aeeeb0f66cee6e2_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\06d44c8c2a4799c31aeeeb0f66cee6e2_JaffaCakes118.exe startC:\Program Files (x86)\A1F17\lvvm.exe%C:\Program Files (x86)\A1F172⤵PID:1828
-
-
C:\Program Files (x86)\LP\62C3\8B2F.tmp"C:\Program Files (x86)\LP\62C3\8B2F.tmp"2⤵
- Executes dropped EXE
PID:1520
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2304
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1880
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD5a43c143891ed575c49ce39d38fcbdfdb
SHA10dd491f034b84fe59f99be729c437155398df2e4
SHA2561d90764f056d62a509836dda361d8cf95e243217db8531babaef638c558356e1
SHA51297988bd6ff67aa03958b1e6256472d08f355e7dbc85626a1399fd25332fe61c5c97619065e2be805e881a9fe91f34616c5c2f70e6c06d1bb599bc84e730268c6
-
Filesize
600B
MD5015e9c70b544ee50730a8a8aa93c2828
SHA1084067a8257f075b6f7f62226bf8a6c4cb55ae61
SHA256c114ea65f0ab9112bcaf7843880ba4913eb5d79fae1d3c2ebf0023a386e87768
SHA51245d060e79b9bca1a5e97cbfb981f30c7f21fb63bdfc2c3ebfc274b83f31453166fa62acc2e0066c529dcc4ec9e5607c6c5b09ceec283e72f765409b485547810
-
Filesize
300B
MD552de655f78c00a4b303724d29a78c884
SHA1aefb93566bdc0ce74333946a189aed0f73c2beba
SHA2565ce5322bbfbeacc7c845d77e41532be7b1e656ca94c48cbc24318f139167b10f
SHA51238156e6c75e9e61cce8d275f79a6effba602c2a074e39ec72e46cc1b2e0f9186e94739725e8483d96a29013d79a009926e90f5af263bca339654c89d6c0b4a76
-
Filesize
100KB
MD5340f18faddf54d738f6e56fe3d8b1d54
SHA1bb247a2f8db305906d558c0c665cc7fd7f86ff67
SHA2564613dcf13e53312b483bfebb7866b9e1111c434beabd1b19a03721ab7a2ec572
SHA512e47e375ec6c8cd07411da44cec52c35c1c28e3fce9d09acf390371ea6b1c456e1d43f87d7b5de6f8ba9b233d11caf25cfd5b4890f356b510688286322d7cab74