Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
25/06/2024, 14:05
Static task
static1
Behavioral task
behavioral1
Sample
0e5a29d95099fc1680911db841b2fc87_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0e5a29d95099fc1680911db841b2fc87_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0e5a29d95099fc1680911db841b2fc87_JaffaCakes118.exe
-
Size
326KB
-
MD5
0e5a29d95099fc1680911db841b2fc87
-
SHA1
62d5dfa6215b275fd4e79687160274ddc6a760db
-
SHA256
9726ded4f6c531cb2426322abea6f9ae20a9dcd47b6caa1750083baa35c0a569
-
SHA512
793049c64d94a0ef4841fdb0cf0ad13d0a4b89e97b1b95e50ea6a943c5b0e9aaa99101b07ec0b971742aa90e9363b3caeaee3b45ba6eb0eb451020f6b5fcc405
-
SSDEEP
6144:Gnq4v69OavMU01GhSvoWSJSFG0u01L0N6yVeO9dJQ4QXgShhWjhi:zyJ91GS1vkJw0NuodhChw
Malware Config
Signatures
-
Disables taskbar notifications via registry modification
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\f9956414 0e5a29d95099fc1680911db841b2fc87_JaffaCakes118.exe -
Modifies registry class 20 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\gf\ = "Application" 0e5a29d95099fc1680911db841b2fc87_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\gf\shell\open\command 0e5a29d95099fc1680911db841b2fc87_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\gf\shell 0e5a29d95099fc1680911db841b2fc87_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\gf\shell\runas\command\IsolatedCommand = "\"%1\" %*" 0e5a29d95099fc1680911db841b2fc87_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\gf\shell\start\command 0e5a29d95099fc1680911db841b2fc87_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\gf\DefaultIcon 0e5a29d95099fc1680911db841b2fc87_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\gf\shell\open 0e5a29d95099fc1680911db841b2fc87_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\gf\shell\runas 0e5a29d95099fc1680911db841b2fc87_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\gf\shell\open\command\IsolatedCommand = "\"%1\" %*" 0e5a29d95099fc1680911db841b2fc87_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\gf\shell\runas\command 0e5a29d95099fc1680911db841b2fc87_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\gf\shell\start\command\ = "\"%1\" %*" 0e5a29d95099fc1680911db841b2fc87_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\gf\shell\start\command\IsolatedCommand = "\"%1\" %*" 0e5a29d95099fc1680911db841b2fc87_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\.exe 0e5a29d95099fc1680911db841b2fc87_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\.exe\ = "gf" 0e5a29d95099fc1680911db841b2fc87_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\gf\DefaultIcon\ = "%1" 0e5a29d95099fc1680911db841b2fc87_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\gf\shell\runas\command\ = "\"%1\" %*" 0e5a29d95099fc1680911db841b2fc87_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\gf\shell\start 0e5a29d95099fc1680911db841b2fc87_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\gf 0e5a29d95099fc1680911db841b2fc87_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\gf\Content Type = "application/x-msdownload" 0e5a29d95099fc1680911db841b2fc87_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\gf\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\hys.exe\" -a \"%1\" %*" 0e5a29d95099fc1680911db841b2fc87_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2056 0e5a29d95099fc1680911db841b2fc87_JaffaCakes118.exe 2056 0e5a29d95099fc1680911db841b2fc87_JaffaCakes118.exe 2056 0e5a29d95099fc1680911db841b2fc87_JaffaCakes118.exe 2056 0e5a29d95099fc1680911db841b2fc87_JaffaCakes118.exe 2056 0e5a29d95099fc1680911db841b2fc87_JaffaCakes118.exe 2056 0e5a29d95099fc1680911db841b2fc87_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2056 0e5a29d95099fc1680911db841b2fc87_JaffaCakes118.exe 2056 0e5a29d95099fc1680911db841b2fc87_JaffaCakes118.exe 2056 0e5a29d95099fc1680911db841b2fc87_JaffaCakes118.exe 2056 0e5a29d95099fc1680911db841b2fc87_JaffaCakes118.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2056 0e5a29d95099fc1680911db841b2fc87_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2056 0e5a29d95099fc1680911db841b2fc87_JaffaCakes118.exe 2056 0e5a29d95099fc1680911db841b2fc87_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e5a29d95099fc1680911db841b2fc87_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0e5a29d95099fc1680911db841b2fc87_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2056
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:2592