Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
20-06-2024 15:38
Static task
static1
Behavioral task
behavioral1
Sample
075eba5b9f7b51def6b42501bcf35d75_JaffaCakes118.exe
Resource
win7-20240419-en
General
-
Target
075eba5b9f7b51def6b42501bcf35d75_JaffaCakes118.exe
-
Size
274KB
-
MD5
075eba5b9f7b51def6b42501bcf35d75
-
SHA1
d29b1756601f6661987b82d6ec3f6332bffdc980
-
SHA256
3cbafe791bae6936e83c36aee30c84b36d9e236d1fecb829d470392f53b17472
-
SHA512
2d6519340bb03c209531e6b7e311bc19196127a02e8592bc12b6ee05dbf1b4e37cfd726465f5026fad6a8e5dda0e7bad4ec7b74fababb90fb3e6e3adb517fa97
-
SSDEEP
6144:rWYZ2KZGRhEbStJT3FlZZmUFYn9gEQymEJc33nK3XXH7B9qA:rZ2ROWJzFlZZmt9gEqEynUXr
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" 075eba5b9f7b51def6b42501bcf35d75_JaffaCakes118.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 2444 A3AF.tmp -
Loads dropped DLL 2 IoCs
pid Process 2164 075eba5b9f7b51def6b42501bcf35d75_JaffaCakes118.exe 2164 075eba5b9f7b51def6b42501bcf35d75_JaffaCakes118.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2164-3-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2164-2-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral1/memory/1236-66-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/1236-67-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral1/memory/2164-69-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2164-182-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2188-184-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2188-185-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral1/memory/2164-241-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral1/memory/2164-362-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2164-366-0x0000000000400000-0x0000000000469000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\F39.exe = "C:\\Program Files (x86)\\LP\\1A94\\F39.exe" 075eba5b9f7b51def6b42501bcf35d75_JaffaCakes118.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\LP\1A94\F39.exe 075eba5b9f7b51def6b42501bcf35d75_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\LP\1A94\F39.exe 075eba5b9f7b51def6b42501bcf35d75_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\LP\1A94\A3AF.tmp 075eba5b9f7b51def6b42501bcf35d75_JaffaCakes118.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2164 075eba5b9f7b51def6b42501bcf35d75_JaffaCakes118.exe 2164 075eba5b9f7b51def6b42501bcf35d75_JaffaCakes118.exe 2164 075eba5b9f7b51def6b42501bcf35d75_JaffaCakes118.exe 2164 075eba5b9f7b51def6b42501bcf35d75_JaffaCakes118.exe 2164 075eba5b9f7b51def6b42501bcf35d75_JaffaCakes118.exe 2164 075eba5b9f7b51def6b42501bcf35d75_JaffaCakes118.exe 2164 075eba5b9f7b51def6b42501bcf35d75_JaffaCakes118.exe 2164 075eba5b9f7b51def6b42501bcf35d75_JaffaCakes118.exe 2164 075eba5b9f7b51def6b42501bcf35d75_JaffaCakes118.exe 2164 075eba5b9f7b51def6b42501bcf35d75_JaffaCakes118.exe 2164 075eba5b9f7b51def6b42501bcf35d75_JaffaCakes118.exe 2164 075eba5b9f7b51def6b42501bcf35d75_JaffaCakes118.exe 2164 075eba5b9f7b51def6b42501bcf35d75_JaffaCakes118.exe 2164 075eba5b9f7b51def6b42501bcf35d75_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1972 explorer.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeRestorePrivilege 2740 msiexec.exe Token: SeTakeOwnershipPrivilege 2740 msiexec.exe Token: SeSecurityPrivilege 2740 msiexec.exe Token: SeShutdownPrivilege 1972 explorer.exe Token: SeShutdownPrivilege 1972 explorer.exe Token: SeShutdownPrivilege 1972 explorer.exe Token: SeShutdownPrivilege 1972 explorer.exe Token: SeShutdownPrivilege 1972 explorer.exe Token: SeShutdownPrivilege 1972 explorer.exe Token: SeShutdownPrivilege 1972 explorer.exe Token: SeShutdownPrivilege 1972 explorer.exe Token: SeShutdownPrivilege 1972 explorer.exe Token: SeShutdownPrivilege 1972 explorer.exe Token: SeShutdownPrivilege 1972 explorer.exe Token: SeShutdownPrivilege 1972 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe 1972 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2164 wrote to memory of 1236 2164 075eba5b9f7b51def6b42501bcf35d75_JaffaCakes118.exe 30 PID 2164 wrote to memory of 1236 2164 075eba5b9f7b51def6b42501bcf35d75_JaffaCakes118.exe 30 PID 2164 wrote to memory of 1236 2164 075eba5b9f7b51def6b42501bcf35d75_JaffaCakes118.exe 30 PID 2164 wrote to memory of 1236 2164 075eba5b9f7b51def6b42501bcf35d75_JaffaCakes118.exe 30 PID 2164 wrote to memory of 2188 2164 075eba5b9f7b51def6b42501bcf35d75_JaffaCakes118.exe 32 PID 2164 wrote to memory of 2188 2164 075eba5b9f7b51def6b42501bcf35d75_JaffaCakes118.exe 32 PID 2164 wrote to memory of 2188 2164 075eba5b9f7b51def6b42501bcf35d75_JaffaCakes118.exe 32 PID 2164 wrote to memory of 2188 2164 075eba5b9f7b51def6b42501bcf35d75_JaffaCakes118.exe 32 PID 2164 wrote to memory of 2444 2164 075eba5b9f7b51def6b42501bcf35d75_JaffaCakes118.exe 35 PID 2164 wrote to memory of 2444 2164 075eba5b9f7b51def6b42501bcf35d75_JaffaCakes118.exe 35 PID 2164 wrote to memory of 2444 2164 075eba5b9f7b51def6b42501bcf35d75_JaffaCakes118.exe 35 PID 2164 wrote to memory of 2444 2164 075eba5b9f7b51def6b42501bcf35d75_JaffaCakes118.exe 35 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" 075eba5b9f7b51def6b42501bcf35d75_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 075eba5b9f7b51def6b42501bcf35d75_JaffaCakes118.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\075eba5b9f7b51def6b42501bcf35d75_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\075eba5b9f7b51def6b42501bcf35d75_JaffaCakes118.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2164 -
C:\Users\Admin\AppData\Local\Temp\075eba5b9f7b51def6b42501bcf35d75_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\075eba5b9f7b51def6b42501bcf35d75_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\424FE\A3A1A.exe%C:\Users\Admin\AppData\Roaming\424FE2⤵PID:1236
-
-
C:\Users\Admin\AppData\Local\Temp\075eba5b9f7b51def6b42501bcf35d75_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\075eba5b9f7b51def6b42501bcf35d75_JaffaCakes118.exe startC:\Program Files (x86)\FE91E\lvvm.exe%C:\Program Files (x86)\FE91E2⤵PID:2188
-
-
C:\Program Files (x86)\LP\1A94\A3AF.tmp"C:\Program Files (x86)\LP\1A94\A3AF.tmp"2⤵
- Executes dropped EXE
PID:2444
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2740
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1972
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD536b5dc23d1bd32f3f7f396c5afffd941
SHA116c50551193491215e20bc528d113dfcb8d94974
SHA2563544c67ba5e0adfdc2a0b627a4887bc34178a6d6ccf798eeb2ff9fb86383ad87
SHA512d4df82f844ce63be0cddc87af110c433d4a95ea24a1dcbe32b91fa49ce28275a59e8bafa9a8485107bb0232ff9b861c07c4773acf8675281b105cb61e000edcb
-
Filesize
1KB
MD5d55af09d4c626925adeb1235da38da18
SHA1cb27f00dac90f66ee13d45611672a546989332d9
SHA256a94f63f5936c5de6bbece8fd9e3ae3b89db867e27e39ab934274f27eb3370819
SHA5125d30d803f3fdcdf2b8af542889e023dddcf2bc8c8c4b62983c4045d3b603949aa145b71885527bbd7fbdf4a99736c9b476db662e4d4f8af702e556f02d14fbd8
-
Filesize
600B
MD57308550de169aa3b9d49f2bacf3bdecc
SHA1947729a9c6949c6fce9643ed8cfe46fb4c6775b7
SHA2562ec6dfa9e8c2d76ccec9549ddfb5250b809027f130effe46ace1cec99a475bd9
SHA5120765efee83cea04b89233e56972fdba3f2ad45d5ac6eb184d493df4ba9fd8c8856bc6df7de795ff88871813221581eef9707ade1109f27027d74434907a1b6dd
-
Filesize
300B
MD5ab9d1cdaf96e1cffc3db175f7ccd4bbc
SHA1e996e9185d59098af473ae6b2620d0a79f6c6241
SHA2560e2362002101f1f59edfd915501f99b235d6848ac3d3864da1f201b9278190eb
SHA5127f84932a0552c5d82c6f72a9ad364c3facc1fed0ef1f5be0a4b24b9af959c961f98feb5b1f9ceb873eb41e587faf67d62be1841f774ab007af533d869b96f3ed
-
Filesize
97KB
MD5634825c6b5f1b1f8ab51e573d6bbcf39
SHA1916daacb7c9c86332548fa079f7c73110d2953b0
SHA25694624a98f94ef70a1a4c874203c6373548f71576f5a0afc888ffe19092c86ac8
SHA51223a9202110e962db00ab4cb00f392787807a2e2b7968f935c2b55d838002b2f76624a3ecf79d3de30e52c70167a38323bc837034a685b4bf2c35662434c9710c