Analysis
-
max time kernel
150s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24/06/2024, 23:03
Behavioral task
behavioral1
Sample
0b233b4bc57d558fde9358ea7e0a1de0_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0b233b4bc57d558fde9358ea7e0a1de0_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0b233b4bc57d558fde9358ea7e0a1de0_JaffaCakes118.exe
-
Size
95KB
-
MD5
0b233b4bc57d558fde9358ea7e0a1de0
-
SHA1
381943f2d1ade962bdda80c185510335a8c6cf46
-
SHA256
70f3521618bdfa654a4f8f5c8b27fd85e4cf50390f7c3ee904362e00704d0c6b
-
SHA512
8160296e81f833203f5929050bd9b22cd4d7d28bcd66bb7d0d1a43f0e1832db2b6c81a19e4d97cfab96195e6a1ab0bcda45304d07ea6363045f37bf858c39ca8
-
SSDEEP
1536:9Awe/fNJPDur8D1HNd7GN5dZRWrfxZCS02fevLIi7tQpQwNjXHukQlWlAonouy8P:fcvhhHNy5HopZCS02eLN7BwJuGoutP
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1408 B6232F3AEA5.exe 2584 FNB1028.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/3708-0-0x0000000000DE0000-0x0000000000E38000-memory.dmp upx behavioral2/files/0x00080000000235bb-11.dat upx behavioral2/memory/1408-15-0x0000000000700000-0x0000000000758000-memory.dmp upx behavioral2/memory/1408-29-0x0000000000700000-0x0000000000758000-memory.dmp upx behavioral2/memory/3708-74-0x0000000000DE0000-0x0000000000E38000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\4Y3Y0C3AXF7W0HWEGYKI = "C:\\Recycle.Bin\\B6232F3AEA5.exe /q" FNB1028.exe -
Modifies Internet Explorer Phishing Filter 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Software\Microsoft\Internet Explorer\PhishingFilter FNB1028.exe Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Internet Explorer\PhishingFilter\EnabledV8 = "0" FNB1028.exe Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Internet Explorer\PhishingFilter\ShownServiceDownBalloon = "0" FNB1028.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Software\Microsoft\Internet Explorer\Recovery FNB1028.exe Set value (int) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\ClearBrowsingHistoryOnExit = "0" FNB1028.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3708 0b233b4bc57d558fde9358ea7e0a1de0_JaffaCakes118.exe 3708 0b233b4bc57d558fde9358ea7e0a1de0_JaffaCakes118.exe 3708 0b233b4bc57d558fde9358ea7e0a1de0_JaffaCakes118.exe 3708 0b233b4bc57d558fde9358ea7e0a1de0_JaffaCakes118.exe 1408 B6232F3AEA5.exe 1408 B6232F3AEA5.exe 2584 FNB1028.exe 2584 FNB1028.exe 2584 FNB1028.exe 2584 FNB1028.exe 2584 FNB1028.exe 2584 FNB1028.exe 2584 FNB1028.exe 2584 FNB1028.exe 2584 FNB1028.exe 2584 FNB1028.exe 2584 FNB1028.exe 2584 FNB1028.exe 2584 FNB1028.exe 2584 FNB1028.exe 2584 FNB1028.exe 2584 FNB1028.exe 2584 FNB1028.exe 2584 FNB1028.exe 2584 FNB1028.exe 2584 FNB1028.exe 2584 FNB1028.exe 2584 FNB1028.exe 2584 FNB1028.exe 2584 FNB1028.exe 2584 FNB1028.exe 2584 FNB1028.exe 2584 FNB1028.exe 2584 FNB1028.exe 2584 FNB1028.exe 2584 FNB1028.exe 2584 FNB1028.exe 2584 FNB1028.exe 2584 FNB1028.exe 2584 FNB1028.exe 2584 FNB1028.exe 2584 FNB1028.exe 2584 FNB1028.exe 2584 FNB1028.exe 2584 FNB1028.exe 2584 FNB1028.exe 2584 FNB1028.exe 2584 FNB1028.exe 2584 FNB1028.exe 2584 FNB1028.exe 2584 FNB1028.exe 2584 FNB1028.exe 2584 FNB1028.exe 2584 FNB1028.exe 2584 FNB1028.exe 2584 FNB1028.exe 2584 FNB1028.exe 2584 FNB1028.exe 2584 FNB1028.exe 2584 FNB1028.exe 2584 FNB1028.exe 2584 FNB1028.exe 2584 FNB1028.exe 2584 FNB1028.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3708 0b233b4bc57d558fde9358ea7e0a1de0_JaffaCakes118.exe Token: SeDebugPrivilege 3708 0b233b4bc57d558fde9358ea7e0a1de0_JaffaCakes118.exe Token: SeDebugPrivilege 3708 0b233b4bc57d558fde9358ea7e0a1de0_JaffaCakes118.exe Token: SeDebugPrivilege 3708 0b233b4bc57d558fde9358ea7e0a1de0_JaffaCakes118.exe Token: SeDebugPrivilege 1408 B6232F3AEA5.exe Token: SeDebugPrivilege 1408 B6232F3AEA5.exe Token: SeDebugPrivilege 2584 FNB1028.exe Token: SeDebugPrivilege 2584 FNB1028.exe Token: SeDebugPrivilege 2584 FNB1028.exe Token: SeDebugPrivilege 2584 FNB1028.exe Token: SeDebugPrivilege 2584 FNB1028.exe Token: SeDebugPrivilege 2584 FNB1028.exe Token: SeDebugPrivilege 2584 FNB1028.exe Token: SeDebugPrivilege 2584 FNB1028.exe Token: SeDebugPrivilege 2584 FNB1028.exe Token: SeDebugPrivilege 2584 FNB1028.exe Token: SeDebugPrivilege 2584 FNB1028.exe Token: SeDebugPrivilege 2584 FNB1028.exe Token: SeDebugPrivilege 2584 FNB1028.exe Token: SeDebugPrivilege 2584 FNB1028.exe Token: SeDebugPrivilege 2584 FNB1028.exe Token: SeDebugPrivilege 2584 FNB1028.exe Token: SeDebugPrivilege 2584 FNB1028.exe Token: SeDebugPrivilege 2584 FNB1028.exe Token: SeDebugPrivilege 2584 FNB1028.exe Token: SeDebugPrivilege 2584 FNB1028.exe Token: SeDebugPrivilege 2584 FNB1028.exe Token: SeDebugPrivilege 2584 FNB1028.exe Token: SeDebugPrivilege 2584 FNB1028.exe Token: SeDebugPrivilege 2584 FNB1028.exe Token: SeDebugPrivilege 2584 FNB1028.exe Token: SeDebugPrivilege 2584 FNB1028.exe Token: SeDebugPrivilege 2584 FNB1028.exe Token: SeDebugPrivilege 2584 FNB1028.exe Token: SeDebugPrivilege 2584 FNB1028.exe Token: SeDebugPrivilege 2584 FNB1028.exe Token: SeDebugPrivilege 2584 FNB1028.exe Token: SeDebugPrivilege 2584 FNB1028.exe Token: SeDebugPrivilege 2584 FNB1028.exe Token: SeDebugPrivilege 2584 FNB1028.exe Token: SeDebugPrivilege 2584 FNB1028.exe Token: SeDebugPrivilege 2584 FNB1028.exe Token: SeDebugPrivilege 2584 FNB1028.exe Token: SeDebugPrivilege 2584 FNB1028.exe Token: SeDebugPrivilege 2584 FNB1028.exe Token: SeDebugPrivilege 2584 FNB1028.exe Token: SeDebugPrivilege 2584 FNB1028.exe Token: SeDebugPrivilege 2584 FNB1028.exe Token: SeDebugPrivilege 2584 FNB1028.exe Token: SeDebugPrivilege 2584 FNB1028.exe Token: SeDebugPrivilege 2584 FNB1028.exe Token: SeDebugPrivilege 2584 FNB1028.exe Token: SeDebugPrivilege 2584 FNB1028.exe Token: SeDebugPrivilege 2584 FNB1028.exe Token: SeDebugPrivilege 2584 FNB1028.exe Token: SeDebugPrivilege 2584 FNB1028.exe Token: SeDebugPrivilege 2584 FNB1028.exe Token: SeDebugPrivilege 2584 FNB1028.exe Token: SeDebugPrivilege 2584 FNB1028.exe Token: SeDebugPrivilege 2584 FNB1028.exe Token: SeDebugPrivilege 2584 FNB1028.exe Token: SeDebugPrivilege 2584 FNB1028.exe Token: SeDebugPrivilege 2584 FNB1028.exe Token: SeDebugPrivilege 2584 FNB1028.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3708 wrote to memory of 1408 3708 0b233b4bc57d558fde9358ea7e0a1de0_JaffaCakes118.exe 89 PID 3708 wrote to memory of 1408 3708 0b233b4bc57d558fde9358ea7e0a1de0_JaffaCakes118.exe 89 PID 3708 wrote to memory of 1408 3708 0b233b4bc57d558fde9358ea7e0a1de0_JaffaCakes118.exe 89 PID 1408 wrote to memory of 2584 1408 B6232F3AEA5.exe 90 PID 1408 wrote to memory of 2584 1408 B6232F3AEA5.exe 90 PID 1408 wrote to memory of 2584 1408 B6232F3AEA5.exe 90 PID 1408 wrote to memory of 2584 1408 B6232F3AEA5.exe 90 PID 1408 wrote to memory of 2584 1408 B6232F3AEA5.exe 90 PID 2584 wrote to memory of 3708 2584 FNB1028.exe 88 PID 2584 wrote to memory of 3708 2584 FNB1028.exe 88 PID 2584 wrote to memory of 3708 2584 FNB1028.exe 88 PID 2584 wrote to memory of 3708 2584 FNB1028.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b233b4bc57d558fde9358ea7e0a1de0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0b233b4bc57d558fde9358ea7e0a1de0_JaffaCakes118.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Recycle.Bin\B6232F3AEA5.exe"C:\Recycle.Bin\B6232F3AEA5.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Users\Admin\AppData\Local\Temp\FNB1028.exe"C:\Users\Admin\AppData\Local\Temp\FNB1028.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2584
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4028,i,11746347647270949551,7786733067759450703,262144 --variations-seed-version --mojo-platform-channel-handle=3772 /prefetch:81⤵PID:2804
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5bb65f08bb56765683bf2cbb90e077d8e
SHA1f33455675434cad9f4bb0c8a1827062eefb007c9
SHA25620b62991eb1011b268ea99c69abf22082993d7a376b3d7197012004afc65d583
SHA5127b4c21a6a6b12fc59c1a37124e9ee1ddc13fc1cd1e34ff82f04ae5bb8d81f20c523f704e91f953235e5b5ae1fee58087773c41aed38ce57b91566b3bd3c660c6
-
Filesize
95KB
MD50b233b4bc57d558fde9358ea7e0a1de0
SHA1381943f2d1ade962bdda80c185510335a8c6cf46
SHA25670f3521618bdfa654a4f8f5c8b27fd85e4cf50390f7c3ee904362e00704d0c6b
SHA5128160296e81f833203f5929050bd9b22cd4d7d28bcd66bb7d0d1a43f0e1832db2b6c81a19e4d97cfab96195e6a1ab0bcda45304d07ea6363045f37bf858c39ca8
-
Filesize
3KB
MD529090b6b4d6605a97ac760d06436ac2d
SHA1d929d3389642e52bae5ad8512293c9c4d3e4fab5
SHA25698a24f0caf5b578e230e6f1103a5fba6aecb28a9128cad5520fcde546d643272
SHA5129121ec42fa66e14a4fc3932c8dbcc8fb1a93ab9de00da57a82e176faa70b73f6992f8c5e2ab52c02fc28c8f0c59aee73b6fbbd39107db7d15105054f4390e9be