Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
24/06/2024, 09:22
Static task
static1
Behavioral task
behavioral1
Sample
07adccbb82d8a156aa3a7be42d967ca0_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
07adccbb82d8a156aa3a7be42d967ca0_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
07adccbb82d8a156aa3a7be42d967ca0_JaffaCakes118.exe
-
Size
384KB
-
MD5
07adccbb82d8a156aa3a7be42d967ca0
-
SHA1
66956db9ec2d9ab0c30fa5cb42416597f69f0704
-
SHA256
93e1eca283157f02c728c93c14268a29852a3ab05237ebfb9a80011dc4313b82
-
SHA512
d9f92785e315ca55cd5d61f56f85683e6de5359e6bdfd112f7fa145c87407ebf793a8acee3b8ff86e70a003762a6fe146827799a2982de223002de52b95290f5
-
SSDEEP
6144:oE7J8NrR6WA72Q5pt9/htY5mwBxBLtXII17Q9ruV1//O1S1ynnrvRt6gc+3pp:oyJ8NIWvMzFIdIIC9r0//O1S1ynnrvjl
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Deletes itself 1 IoCs
pid Process 1600 iol.exe -
Executes dropped EXE 1 IoCs
pid Process 1600 iol.exe -
Loads dropped DLL 1 IoCs
pid Process 1872 07adccbb82d8a156aa3a7be42d967ca0_JaffaCakes118.exe -
Modifies system executable filetype association 2 TTPs 17 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\exefile\shell\open\command iol.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\exefile\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\iol.exe\" -a \"%1\" %*" iol.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\exefile\shell\runas\command\ = "\"%1\" %*" iol.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\exefile\shell\start\command\ = "\"%1\" %*" iol.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\exefile\shell\open iol.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\exefile\shell\runas iol.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\exefile\shell\runas\command\IsolatedCommand = "\"%1\" %*" iol.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\exefile\shell\start iol.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\exefile\shell\start\command\IsolatedCommand = "\"%1\" %*" iol.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\exefile\ = "Application" iol.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\exefile\DefaultIcon iol.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\exefile\DefaultIcon\ = "%1" iol.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\exefile\Content Type = "application/x-msdownload" iol.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\exefile\shell iol.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\exefile\shell\open\command\IsolatedCommand = "\"%1\" %*" iol.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\exefile\shell\runas\command iol.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\exefile\shell\start\command iol.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\ctfmon.exe = "C:\\WINDOWS\\system32\\ctfmon.exe" 07adccbb82d8a156aa3a7be42d967ca0_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\659957238 = "C:\\Users\\Admin\\AppData\\Local\\iol.exe" 07adccbb82d8a156aa3a7be42d967ca0_JaffaCakes118.exe -
Modifies registry class 41 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\.exe\shell iol.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\exefile\shell\runas\command\IsolatedCommand = "\"%1\" %*" iol.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\exefile\shell\start iol.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\.exe\DefaultIcon\ = "%1" iol.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\.exe\shell\runas iol.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\.exe\shell\start\command iol.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\exefile\DefaultIcon iol.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\.exe\ = "exefile" iol.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\exefile\shell\open\command iol.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\exefile\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\iol.exe\" -a \"%1\" %*" iol.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\.exe\shell\open iol.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\.exe\DefaultIcon iol.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" iol.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\exefile\shell\runas\command\ = "\"%1\" %*" iol.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\.exe\Content Type = "application/x-msdownload" iol.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\.exe\shell\runas\command\ = "\"%1\" %*" iol.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\.exe\shell\start iol.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\.exe\shell\start\command\ = "\"%1\" %*" iol.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\exefile iol.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\exefile\Content Type = "application/x-msdownload" iol.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\exefile\DefaultIcon\ = "%1" iol.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\exefile\shell\open iol.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\.exe iol.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\exefile\shell\start\command\ = "\"%1\" %*" iol.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\.exe\shell\runas\command iol.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\exefile\shell\open\command\IsolatedCommand = "\"%1\" %*" iol.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\exefile\shell\runas iol.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\iol.exe\" -a \"%1\" %*" iol.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\.exe\shell\start\command\IsolatedCommand = "\"%1\" %*" iol.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\exefile\ = "Application" iol.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\exefile\shell\start\command iol.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\.exe\shell\open\command iol.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\exefile\shell iol.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\exefile\shell\runas\command iol.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\exefile\shell\start\command\IsolatedCommand = "\"%1\" %*" iol.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" iol.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1872 07adccbb82d8a156aa3a7be42d967ca0_JaffaCakes118.exe 1872 07adccbb82d8a156aa3a7be42d967ca0_JaffaCakes118.exe 1872 07adccbb82d8a156aa3a7be42d967ca0_JaffaCakes118.exe 1872 07adccbb82d8a156aa3a7be42d967ca0_JaffaCakes118.exe 1872 07adccbb82d8a156aa3a7be42d967ca0_JaffaCakes118.exe 1872 07adccbb82d8a156aa3a7be42d967ca0_JaffaCakes118.exe 1872 07adccbb82d8a156aa3a7be42d967ca0_JaffaCakes118.exe 1872 07adccbb82d8a156aa3a7be42d967ca0_JaffaCakes118.exe 1872 07adccbb82d8a156aa3a7be42d967ca0_JaffaCakes118.exe 1872 07adccbb82d8a156aa3a7be42d967ca0_JaffaCakes118.exe 1872 07adccbb82d8a156aa3a7be42d967ca0_JaffaCakes118.exe 1872 07adccbb82d8a156aa3a7be42d967ca0_JaffaCakes118.exe 1872 07adccbb82d8a156aa3a7be42d967ca0_JaffaCakes118.exe 1600 iol.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2500 explorer.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeShutdownPrivilege 2500 explorer.exe Token: SeShutdownPrivilege 2500 explorer.exe Token: SeShutdownPrivilege 2500 explorer.exe Token: SeShutdownPrivilege 2500 explorer.exe Token: SeShutdownPrivilege 2500 explorer.exe Token: SeShutdownPrivilege 2500 explorer.exe Token: SeShutdownPrivilege 2500 explorer.exe Token: SeShutdownPrivilege 2500 explorer.exe Token: SeShutdownPrivilege 2500 explorer.exe Token: SeShutdownPrivilege 2500 explorer.exe Token: SeShutdownPrivilege 2500 explorer.exe Token: SeShutdownPrivilege 2500 explorer.exe Token: SeShutdownPrivilege 2500 explorer.exe Token: SeShutdownPrivilege 2500 explorer.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 1600 iol.exe 1600 iol.exe 1600 iol.exe 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe 1600 iol.exe 2500 explorer.exe 2500 explorer.exe 1600 iol.exe 1600 iol.exe 2500 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe 1600 iol.exe 1600 iol.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1600 iol.exe 1600 iol.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1872 wrote to memory of 1600 1872 07adccbb82d8a156aa3a7be42d967ca0_JaffaCakes118.exe 28 PID 1872 wrote to memory of 1600 1872 07adccbb82d8a156aa3a7be42d967ca0_JaffaCakes118.exe 28 PID 1872 wrote to memory of 1600 1872 07adccbb82d8a156aa3a7be42d967ca0_JaffaCakes118.exe 28 PID 1872 wrote to memory of 1600 1872 07adccbb82d8a156aa3a7be42d967ca0_JaffaCakes118.exe 28 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\07adccbb82d8a156aa3a7be42d967ca0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\07adccbb82d8a156aa3a7be42d967ca0_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Users\Admin\AppData\Local\iol.exe"C:\Users\Admin\AppData\Local\iol.exe" -gav C:\Users\Admin\AppData\Local\Temp\07adccbb82d8a156aa3a7be42d967ca0_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system executable filetype association
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1600
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2500
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384KB
MD507adccbb82d8a156aa3a7be42d967ca0
SHA166956db9ec2d9ab0c30fa5cb42416597f69f0704
SHA25693e1eca283157f02c728c93c14268a29852a3ab05237ebfb9a80011dc4313b82
SHA512d9f92785e315ca55cd5d61f56f85683e6de5359e6bdfd112f7fa145c87407ebf793a8acee3b8ff86e70a003762a6fe146827799a2982de223002de52b95290f5