Analysis
-
max time kernel
141s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
28/06/2024, 03:24
Static task
static1
Behavioral task
behavioral1
Sample
189b23c28725bffbb2cf1c047918914d_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
189b23c28725bffbb2cf1c047918914d_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
189b23c28725bffbb2cf1c047918914d_JaffaCakes118.exe
-
Size
2.0MB
-
MD5
189b23c28725bffbb2cf1c047918914d
-
SHA1
89bd409a76a892c404c3cb6961bef9763da34d02
-
SHA256
cc447c1468d6ceab348ff7d5b1c38749d85455b74820ff892f4c0575d6ae16a3
-
SHA512
408817019ee634a14daa74eaf21ce94ccfbe5cf7f97c1b1075aea4c6ee3603fb6bb4c1b741aefdba77d409a674ef98682246b96851879e93da4abf1b41e705af
-
SSDEEP
3072:QUXUBCQBePBY37DOkY3ABh8Nj4NNka/kF:QzBCQBeZYL2ABOm
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\recovery = "C:\\Windows\\system32\\moninftapi.exe" 189b23c28725bffbb2cf1c047918914d_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 189b23c28725bffbb2cf1c047918914d_JaffaCakes118.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 8 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{22d7f312-b0f6-11d2-94ab-0080c33c7e95}\DontAsk = "2" 189b23c28725bffbb2cf1c047918914d_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{22d7f312-b0f6-11d2-94ab-0080c33c7e95}\IsInstalled = "1" 189b23c28725bffbb2cf1c047918914d_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{22d7f312-b0f6-11d2-94ab-0080c33c7e95}\ = "Themes Setup" 189b23c28725bffbb2cf1c047918914d_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{22d7f312-b0f6-11d2-94ab-0080c33c7e95} 189b23c28725bffbb2cf1c047918914d_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{22d7f312-b0f6-11d2-94ab-0080c33c7e95}\StubPath = "rundll32.exe C:\\Windows\\system32\\themeuichk.dll,ThemesSetupInstallCheck" 189b23c28725bffbb2cf1c047918914d_JaffaCakes118.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{22d7f312-b0f6-11d2-94ab-0080c33c7e95}\IconsBinary = 43003a005c00570069006e0064006f00770073005c00730079007300740065006d00330032005c00630070006c007000640062006e00650074002e006500780065000000 189b23c28725bffbb2cf1c047918914d_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{22d7f312-b0f6-11d2-94ab-0080c33c7e95}\Version = "1,1,1,2" 189b23c28725bffbb2cf1c047918914d_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{22d7f312-b0f6-11d2-94ab-0080c33c7e95}\ComponentID = "DOTNETFRAMEWORKS" 189b23c28725bffbb2cf1c047918914d_JaffaCakes118.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\recovery = "C:\\Windows\\system32\\moninftapi.exe" 189b23c28725bffbb2cf1c047918914d_JaffaCakes118.exe -
Installs/modifies Browser Helper Object 2 TTPs 3 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{18DF081C-E8AD-4283-A596-FA578C2EBDC3} 189b23c28725bffbb2cf1c047918914d_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\ = "AcroIEHelperStub" 189b23c28725bffbb2cf1c047918914d_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\NoExplorer = "1" 189b23c28725bffbb2cf1c047918914d_JaffaCakes118.exe -
Drops file in System32 directory 14 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\idsrvpc.exe 189b23c28725bffbb2cf1c047918914d_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\srvpdbpc.exe 189b23c28725bffbb2cf1c047918914d_JaffaCakes118.exe File created C:\Windows\SysWOW64\fwwmsys.exe 189b23c28725bffbb2cf1c047918914d_JaffaCakes118.exe File created C:\Windows\SysWOW64\wdmudfnet.ocx 189b23c28725bffbb2cf1c047918914d_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wmlibnet.exe 189b23c28725bffbb2cf1c047918914d_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\fwwmsys.exe 189b23c28725bffbb2cf1c047918914d_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wdmudfnet.ocx 189b23c28725bffbb2cf1c047918914d_JaffaCakes118.exe File created C:\Windows\SysWOW64\idsrvpc.exe 189b23c28725bffbb2cf1c047918914d_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\cplpdbnet.exe 189b23c28725bffbb2cf1c047918914d_JaffaCakes118.exe File created C:\Windows\SysWOW64\srvpdbpc.exe 189b23c28725bffbb2cf1c047918914d_JaffaCakes118.exe File created C:\Windows\SysWOW64\cplpdbnet.exe 189b23c28725bffbb2cf1c047918914d_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\moninftapi.exe 189b23c28725bffbb2cf1c047918914d_JaffaCakes118.exe File created C:\Windows\SysWOW64\moninftapi.exe 189b23c28725bffbb2cf1c047918914d_JaffaCakes118.exe File created C:\Windows\SysWOW64\wmlibnet.exe 189b23c28725bffbb2cf1c047918914d_JaffaCakes118.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\ProgID 189b23c28725bffbb2cf1c047918914d_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\VersionIndependentProgID\ = "AcroIEHelperShim.AcroIEHelperShimObj" 189b23c28725bffbb2cf1c047918914d_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\ = "Adobe PDF Link Helper" 189b23c28725bffbb2cf1c047918914d_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\InprocServer32 189b23c28725bffbb2cf1c047918914d_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\InprocServer32\ = "C:\\Windows\\SysWow64\\wdmudfnet.ocx" 189b23c28725bffbb2cf1c047918914d_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\InprocServer32\ThreadingModel = "Apartment" 189b23c28725bffbb2cf1c047918914d_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{18DF081C-E8AD-4283-A596-FA578C2EBDC3} 189b23c28725bffbb2cf1c047918914d_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\ProgID\ = "AcroIEHelperShim.AcroIEHelperShimObj.1" 189b23c28725bffbb2cf1c047918914d_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\VersionIndependentProgID 189b23c28725bffbb2cf1c047918914d_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2432 189b23c28725bffbb2cf1c047918914d_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2432 189b23c28725bffbb2cf1c047918914d_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\189b23c28725bffbb2cf1c047918914d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\189b23c28725bffbb2cf1c047918914d_JaffaCakes118.exe"1⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2432
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD5c51877d0f4f06bf0a920c745983a9049
SHA1f5ab59c38c3392f856eae7063a0d63ef5e840fb9
SHA25669754ef37c8e01f451a9d2b19b6657c150bb7f036a40b98029942451423b5c85
SHA51264ccc36b5b2613c035ec155b2594420ede1cbac1017228fd1919ebb6d838ac7535951e991bc6f2e358359909e22bd9c561c75dde0ac9e29f35f0546983e23296
-
Filesize
4KB
MD53adea70969f52d365c119b3d25619de9
SHA1d303a6ddd63ce993a8432f4daab5132732748843
SHA256c9f5a19c7b11fd866483adc93aa5bc4bd3515bd995ca79297b227e3e5ef1a665
SHA512c4d836fcbdab4c859a6fc0f849d1e41e98c7e23fc0fe0fe0a09cb68e9a57d60b2ae9ad46762d7a5e05db28d6179bd431ef179ee1f9ff016db74cc3b1d74ed7f8