Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01/07/2024, 10:08
Static task
static1
Behavioral task
behavioral1
Sample
1ae272ca4c11d918a2f1af765d2aa9ad_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1ae272ca4c11d918a2f1af765d2aa9ad_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
1ae272ca4c11d918a2f1af765d2aa9ad_JaffaCakes118.exe
-
Size
809KB
-
MD5
1ae272ca4c11d918a2f1af765d2aa9ad
-
SHA1
2198a9b2b7627ffe0ab21debe646e1fd8e954b34
-
SHA256
2f4beca27851cc3070bc3867ce046f683f419bb0086c5fa6bff02965072dbe75
-
SHA512
2479204e42c8ebd3d3d69c11e6b4232e369132c3bf458d11c068f819caaaaf9f7c4c0ad9d1052066429bedb8bd1c71053d2466ab6e81e57057979efeddd13b24
-
SSDEEP
24576:3UZtsPf0dscjY8sJXmJ/umGYEmUh8X7XQ:3UZO0di8sdmNuRYEw
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2328 privacy.exe -
Loads dropped DLL 3 IoCs
pid Process 2300 1ae272ca4c11d918a2f1af765d2aa9ad_JaffaCakes118.exe 2300 1ae272ca4c11d918a2f1af765d2aa9ad_JaffaCakes118.exe 2300 1ae272ca4c11d918a2f1af765d2aa9ad_JaffaCakes118.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\Privacy Protection = "C:\\ProgramData\\privacy.exe" privacy.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: privacy.exe File opened (read-only) \??\L: privacy.exe File opened (read-only) \??\M: privacy.exe File opened (read-only) \??\Q: privacy.exe File opened (read-only) \??\W: privacy.exe File opened (read-only) \??\Y: privacy.exe File opened (read-only) \??\G: privacy.exe File opened (read-only) \??\N: privacy.exe File opened (read-only) \??\R: privacy.exe File opened (read-only) \??\T: privacy.exe File opened (read-only) \??\X: privacy.exe File opened (read-only) \??\P: privacy.exe File opened (read-only) \??\S: privacy.exe File opened (read-only) \??\U: privacy.exe File opened (read-only) \??\E: privacy.exe File opened (read-only) \??\I: privacy.exe File opened (read-only) \??\J: privacy.exe File opened (read-only) \??\K: privacy.exe File opened (read-only) \??\O: privacy.exe File opened (read-only) \??\V: privacy.exe File opened (read-only) \??\Z: privacy.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 privacy.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 1ae272ca4c11d918a2f1af765d2aa9ad_JaffaCakes118.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 1ae272ca4c11d918a2f1af765d2aa9ad_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2300 1ae272ca4c11d918a2f1af765d2aa9ad_JaffaCakes118.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe -
Suspicious use of FindShellTrayWindow 17 IoCs
pid Process 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe -
Suspicious use of SendNotifyMessage 17 IoCs
pid Process 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe 2328 privacy.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2328 privacy.exe 2328 privacy.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2300 wrote to memory of 2328 2300 1ae272ca4c11d918a2f1af765d2aa9ad_JaffaCakes118.exe 28 PID 2300 wrote to memory of 2328 2300 1ae272ca4c11d918a2f1af765d2aa9ad_JaffaCakes118.exe 28 PID 2300 wrote to memory of 2328 2300 1ae272ca4c11d918a2f1af765d2aa9ad_JaffaCakes118.exe 28 PID 2300 wrote to memory of 2328 2300 1ae272ca4c11d918a2f1af765d2aa9ad_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ae272ca4c11d918a2f1af765d2aa9ad_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1ae272ca4c11d918a2f1af765d2aa9ad_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\ProgramData\privacy.exeC:\ProgramData\privacy.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2328
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
2Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
802KB
MD5ace364fdda385f7d25e0a8b6d560bcd5
SHA1969d6e2b413d946b87bc9b5c0ff969d6bc8a3c83
SHA2569d21ffca4af9e02ad53d3adb8ccbd4c9e2c624697ba78871089b96f0b08e25d5
SHA512144cc3c4d44f1e949b90d01d1618ee9158352ac6ccf86b1cbae849bcdeb8650b603be52143b896dbf49d1e99b7419147cc0453c72c8b3dc17a7f7f77d2aa7f46