Analysis Overview
SHA256
8c3b961b4f232f5ab2594f14e852467275271b63f28d76dc82ae68144d27e9d7
Threat Level: Known bad
The file 12a0507a3fa1830c02af1155df5b17d4_JaffaCakes118 was found to be: Known bad.
Malicious Activity Summary
ISR Stealer
ISR Stealer payload
Reads data files stored by FTP clients
Reads user/profile data of web browsers
Writes to the Master Boot Record (MBR)
Suspicious use of SetThreadContext
Unsigned PE
Enumerates physical storage devices
Suspicious behavior: EnumeratesProcesses
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-06-26 16:22
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-26 16:22
Reported
2024-06-26 16:24
Platform
win7-20240611-en
Max time kernel
118s
Max time network
123s
Command Line
Signatures
ISR Stealer
ISR Stealer payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Reads data files stored by FTP clients
Reads user/profile data of web browsers
Writes to the Master Boot Record (MBR)
| Description | Indicator | Process | Target |
| File opened for modification | \??\PhysicalDrive0 | C:\Users\Admin\AppData\Local\Temp\12a0507a3fa1830c02af1155df5b17d4_JaffaCakes118.exe | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 2384 set thread context of 804 | N/A | C:\Users\Admin\AppData\Local\Temp\12a0507a3fa1830c02af1155df5b17d4_JaffaCakes118.exe | C:\Users\Admin\AppData\Local\Temp\12a0507a3fa1830c02af1155df5b17d4_JaffaCakes118.exe |
| PID 804 set thread context of 2588 | N/A | C:\Users\Admin\AppData\Local\Temp\12a0507a3fa1830c02af1155df5b17d4_JaffaCakes118.exe | C:\Users\Admin\AppData\Local\Temp\12a0507a3fa1830c02af1155df5b17d4_JaffaCakes118.exe |
Enumerates physical storage devices
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\12a0507a3fa1830c02af1155df5b17d4_JaffaCakes118.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\12a0507a3fa1830c02af1155df5b17d4_JaffaCakes118.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\12a0507a3fa1830c02af1155df5b17d4_JaffaCakes118.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\12a0507a3fa1830c02af1155df5b17d4_JaffaCakes118.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\12a0507a3fa1830c02af1155df5b17d4_JaffaCakes118.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\12a0507a3fa1830c02af1155df5b17d4_JaffaCakes118.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\12a0507a3fa1830c02af1155df5b17d4_JaffaCakes118.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\12a0507a3fa1830c02af1155df5b17d4_JaffaCakes118.exe
"C:\Users\Admin\AppData\Local\Temp\12a0507a3fa1830c02af1155df5b17d4_JaffaCakes118.exe"
C:\Users\Admin\AppData\Local\Temp\12a0507a3fa1830c02af1155df5b17d4_JaffaCakes118.exe
"C:\Users\Admin\AppData\Local\Temp\12a0507a3fa1830c02af1155df5b17d4_JaffaCakes118.exe"
C:\Users\Admin\AppData\Local\Temp\12a0507a3fa1830c02af1155df5b17d4_JaffaCakes118.exe
"C:\Users\Admin\AppData\Local\Temp\12a0507a3fa1830c02af1155df5b17d4_JaffaCakes118.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | bojku0.get24.org | udp |
Files
memory/804-12-0x0000000000400000-0x000000000041E000-memory.dmp
memory/804-10-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
memory/804-14-0x0000000000400000-0x000000000041E000-memory.dmp
memory/804-6-0x0000000000400000-0x000000000041E000-memory.dmp
memory/804-17-0x0000000000400000-0x000000000041E000-memory.dmp
memory/804-2-0x0000000000400000-0x000000000041E000-memory.dmp
memory/804-4-0x0000000000400000-0x000000000041E000-memory.dmp
memory/2588-22-0x0000000000400000-0x0000000000414000-memory.dmp
memory/2588-18-0x0000000000400000-0x0000000000414000-memory.dmp
memory/2588-20-0x0000000000400000-0x0000000000414000-memory.dmp
memory/2588-32-0x0000000000400000-0x0000000000414000-memory.dmp
memory/804-31-0x0000000000400000-0x000000000041E000-memory.dmp
memory/2588-35-0x0000000000400000-0x0000000000414000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-06-26 16:22
Reported
2024-06-26 16:24
Platform
win10v2004-20240508-en
Max time kernel
51s
Max time network
51s
Command Line
Signatures
ISR Stealer
ISR Stealer payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Reads data files stored by FTP clients
Reads user/profile data of web browsers
Writes to the Master Boot Record (MBR)
| Description | Indicator | Process | Target |
| File opened for modification | \??\PhysicalDrive0 | C:\Users\Admin\AppData\Local\Temp\12a0507a3fa1830c02af1155df5b17d4_JaffaCakes118.exe | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 2092 set thread context of 4716 | N/A | C:\Users\Admin\AppData\Local\Temp\12a0507a3fa1830c02af1155df5b17d4_JaffaCakes118.exe | C:\Users\Admin\AppData\Local\Temp\12a0507a3fa1830c02af1155df5b17d4_JaffaCakes118.exe |
| PID 4716 set thread context of 4756 | N/A | C:\Users\Admin\AppData\Local\Temp\12a0507a3fa1830c02af1155df5b17d4_JaffaCakes118.exe | C:\Users\Admin\AppData\Local\Temp\12a0507a3fa1830c02af1155df5b17d4_JaffaCakes118.exe |
Enumerates physical storage devices
Suspicious behavior: EnumeratesProcesses
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\12a0507a3fa1830c02af1155df5b17d4_JaffaCakes118.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\12a0507a3fa1830c02af1155df5b17d4_JaffaCakes118.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\12a0507a3fa1830c02af1155df5b17d4_JaffaCakes118.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\12a0507a3fa1830c02af1155df5b17d4_JaffaCakes118.exe
"C:\Users\Admin\AppData\Local\Temp\12a0507a3fa1830c02af1155df5b17d4_JaffaCakes118.exe"
C:\Users\Admin\AppData\Local\Temp\12a0507a3fa1830c02af1155df5b17d4_JaffaCakes118.exe
"C:\Users\Admin\AppData\Local\Temp\12a0507a3fa1830c02af1155df5b17d4_JaffaCakes118.exe"
C:\Users\Admin\AppData\Local\Temp\12a0507a3fa1830c02af1155df5b17d4_JaffaCakes118.exe
"C:\Users\Admin\AppData\Local\Temp\12a0507a3fa1830c02af1155df5b17d4_JaffaCakes118.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | bojku0.get24.org | udp |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
Files
memory/4716-2-0x0000000000400000-0x000000000041E000-memory.dmp
memory/4716-4-0x0000000000400000-0x000000000041E000-memory.dmp
memory/4756-9-0x0000000000400000-0x0000000000414000-memory.dmp
memory/4756-7-0x0000000000400000-0x0000000000414000-memory.dmp
memory/4716-14-0x0000000000400000-0x000000000041E000-memory.dmp
memory/4756-15-0x0000000000400000-0x0000000000414000-memory.dmp
memory/4756-16-0x0000000000400000-0x0000000000414000-memory.dmp