Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26-06-2024 22:05
Static task
static1
Behavioral task
behavioral1
Sample
13a199850a238ceff22998dd97323260_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
13a199850a238ceff22998dd97323260_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
13a199850a238ceff22998dd97323260_JaffaCakes118.exe
-
Size
190KB
-
MD5
13a199850a238ceff22998dd97323260
-
SHA1
e80c4eac7d8f04bae6b7ca7cc3f4df0d0efb0f22
-
SHA256
8c0e1f0cb5679571cf2b129c98853018823e0e7674cfc7c5973d4053dfda0578
-
SHA512
4bff87799025997a9013ce692257ac0895c518f2dd899988f6800fe245a8c40342673f949035996737aeb7eb68ba19acf163ababea4219cc8a857fc17c6d3fb8
-
SSDEEP
3072:zCOP+8j32s/exLyOpLXjeyYHbLIulrVGvZZbCwJkASIWzIbcligqgqxR7Lb:Pm99horZ6swCIWEbcliBZx
Malware Config
Signatures
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/2868-11-0x0000000000400000-0x000000000041A000-memory.dmp family_isrstealer behavioral1/memory/2868-17-0x0000000000400000-0x0000000000414000-memory.dmp family_isrstealer behavioral1/memory/2868-19-0x0000000000400000-0x000000000041A000-memory.dmp family_isrstealer behavioral1/memory/2868-20-0x0000000000400000-0x0000000000414000-memory.dmp family_isrstealer -
Executes dropped EXE 2 IoCs
Processes:
u9qz1x.exeu9qz1x.exepid process 2864 u9qz1x.exe 2868 u9qz1x.exe -
Loads dropped DLL 3 IoCs
Processes:
13a199850a238ceff22998dd97323260_JaffaCakes118.exeu9qz1x.exepid process 2232 13a199850a238ceff22998dd97323260_JaffaCakes118.exe 2232 13a199850a238ceff22998dd97323260_JaffaCakes118.exe 2864 u9qz1x.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
u9qz1x.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\Users\\Admin\\AppData\\Roaming\\yregxj1ex6\\u9qz1x.exe" u9qz1x.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
u9qz1x.exedescription pid process target process PID 2864 set thread context of 2868 2864 u9qz1x.exe u9qz1x.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
u9qz1x.exepid process 2868 u9qz1x.exe 2868 u9qz1x.exe 2868 u9qz1x.exe 2868 u9qz1x.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
u9qz1x.exepid process 2868 u9qz1x.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
13a199850a238ceff22998dd97323260_JaffaCakes118.exeu9qz1x.exedescription pid process target process PID 2232 wrote to memory of 2864 2232 13a199850a238ceff22998dd97323260_JaffaCakes118.exe u9qz1x.exe PID 2232 wrote to memory of 2864 2232 13a199850a238ceff22998dd97323260_JaffaCakes118.exe u9qz1x.exe PID 2232 wrote to memory of 2864 2232 13a199850a238ceff22998dd97323260_JaffaCakes118.exe u9qz1x.exe PID 2232 wrote to memory of 2864 2232 13a199850a238ceff22998dd97323260_JaffaCakes118.exe u9qz1x.exe PID 2864 wrote to memory of 2868 2864 u9qz1x.exe u9qz1x.exe PID 2864 wrote to memory of 2868 2864 u9qz1x.exe u9qz1x.exe PID 2864 wrote to memory of 2868 2864 u9qz1x.exe u9qz1x.exe PID 2864 wrote to memory of 2868 2864 u9qz1x.exe u9qz1x.exe PID 2864 wrote to memory of 2868 2864 u9qz1x.exe u9qz1x.exe PID 2864 wrote to memory of 2868 2864 u9qz1x.exe u9qz1x.exe PID 2864 wrote to memory of 2868 2864 u9qz1x.exe u9qz1x.exe PID 2864 wrote to memory of 2868 2864 u9qz1x.exe u9qz1x.exe PID 2864 wrote to memory of 2868 2864 u9qz1x.exe u9qz1x.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\13a199850a238ceff22998dd97323260_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\13a199850a238ceff22998dd97323260_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\AppData\Roaming\yregxj1ex6\u9qz1x.exe"C:\Users\Admin\AppData\Roaming\yregxj1ex6\u9qz1x.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\AppData\Roaming\yregxj1ex6\u9qz1x.exe"C:\Users\Admin\AppData\Roaming\yregxj1ex6\u9qz1x.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2868
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
190KB
MD513a199850a238ceff22998dd97323260
SHA1e80c4eac7d8f04bae6b7ca7cc3f4df0d0efb0f22
SHA2568c0e1f0cb5679571cf2b129c98853018823e0e7674cfc7c5973d4053dfda0578
SHA5124bff87799025997a9013ce692257ac0895c518f2dd899988f6800fe245a8c40342673f949035996737aeb7eb68ba19acf163ababea4219cc8a857fc17c6d3fb8