Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02-07-2024 08:09
Static task
static1
Behavioral task
behavioral1
Sample
1e95e087ddc336bc8cc038866c629537_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
1e95e087ddc336bc8cc038866c629537_JaffaCakes118.exe
-
Size
411KB
-
MD5
1e95e087ddc336bc8cc038866c629537
-
SHA1
68ff0f62b626aae7f11d5a1d7e2f7906cbe1a606
-
SHA256
567b94bcdaea498b72ea3b4193d16a0eeb6807a02fefe59b9b87d0ae03d8dcd4
-
SHA512
5e999094124243fccb6ed9f4eda9df203e527ca48c6d01126258b16c9f9b2546e6e4bb9a89db6b8e49cab71f3ec8625e42d2f3245603d0e3229df6b766ce0c15
-
SSDEEP
12288:nPCNpaWbDrPHwfoXjRrPzD1lbMoKGRtq:Pd+8Uj5PnjbMoKD
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3020 explorer.exe -
Executes dropped EXE 3 IoCs
pid Process 3020 explorer.exe 2420 nvxdsinc.exe 2600 nwtray.exe -
Loads dropped DLL 6 IoCs
pid Process 2968 1e95e087ddc336bc8cc038866c629537_JaffaCakes118.exe 2968 1e95e087ddc336bc8cc038866c629537_JaffaCakes118.exe 3020 explorer.exe 3020 explorer.exe 2420 nvxdsinc.exe 2420 nvxdsinc.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\Users\\Admin\\AppData\\Local\\Temp\\System\\nvxdsinc.exe" nvxdsinc.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3020 set thread context of 1376 3020 explorer.exe 29 PID 2600 set thread context of 2608 2600 nwtray.exe 35 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 2 IoCs
pid Process 1964 timeout.exe 1188 timeout.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3020 explorer.exe 2420 nvxdsinc.exe 2600 nwtray.exe 3020 explorer.exe 2420 nvxdsinc.exe 2600 nwtray.exe 3020 explorer.exe 2420 nvxdsinc.exe 2600 nwtray.exe 3020 explorer.exe 2420 nvxdsinc.exe 2600 nwtray.exe 3020 explorer.exe 2420 nvxdsinc.exe 2600 nwtray.exe 3020 explorer.exe 2420 nvxdsinc.exe 2600 nwtray.exe 3020 explorer.exe 2420 nvxdsinc.exe 2600 nwtray.exe 3020 explorer.exe 2420 nvxdsinc.exe 2600 nwtray.exe 3020 explorer.exe 2420 nvxdsinc.exe 2600 nwtray.exe 3020 explorer.exe 2420 nvxdsinc.exe 2600 nwtray.exe 3020 explorer.exe 2420 nvxdsinc.exe 2600 nwtray.exe 3020 explorer.exe 2420 nvxdsinc.exe 2600 nwtray.exe 3020 explorer.exe 2420 nvxdsinc.exe 2600 nwtray.exe 3020 explorer.exe 2420 nvxdsinc.exe 2600 nwtray.exe 3020 explorer.exe 2420 nvxdsinc.exe 2600 nwtray.exe 3020 explorer.exe 2420 nvxdsinc.exe 2600 nwtray.exe 3020 explorer.exe 2420 nvxdsinc.exe 2600 nwtray.exe 3020 explorer.exe 2420 nvxdsinc.exe 2600 nwtray.exe 3020 explorer.exe 2420 nvxdsinc.exe 2600 nwtray.exe 3020 explorer.exe 2420 nvxdsinc.exe 2600 nwtray.exe 3020 explorer.exe 2420 nvxdsinc.exe 2600 nwtray.exe 3020 explorer.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2968 1e95e087ddc336bc8cc038866c629537_JaffaCakes118.exe Token: SeDebugPrivilege 3020 explorer.exe Token: SeDebugPrivilege 2420 nvxdsinc.exe Token: SeDebugPrivilege 2600 nwtray.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2968 wrote to memory of 3020 2968 1e95e087ddc336bc8cc038866c629537_JaffaCakes118.exe 28 PID 2968 wrote to memory of 3020 2968 1e95e087ddc336bc8cc038866c629537_JaffaCakes118.exe 28 PID 2968 wrote to memory of 3020 2968 1e95e087ddc336bc8cc038866c629537_JaffaCakes118.exe 28 PID 2968 wrote to memory of 3020 2968 1e95e087ddc336bc8cc038866c629537_JaffaCakes118.exe 28 PID 3020 wrote to memory of 1376 3020 explorer.exe 29 PID 3020 wrote to memory of 1376 3020 explorer.exe 29 PID 3020 wrote to memory of 1376 3020 explorer.exe 29 PID 3020 wrote to memory of 1376 3020 explorer.exe 29 PID 3020 wrote to memory of 1376 3020 explorer.exe 29 PID 3020 wrote to memory of 1376 3020 explorer.exe 29 PID 3020 wrote to memory of 1376 3020 explorer.exe 29 PID 3020 wrote to memory of 1376 3020 explorer.exe 29 PID 3020 wrote to memory of 1376 3020 explorer.exe 29 PID 3020 wrote to memory of 1376 3020 explorer.exe 29 PID 3020 wrote to memory of 1376 3020 explorer.exe 29 PID 3020 wrote to memory of 1376 3020 explorer.exe 29 PID 3020 wrote to memory of 1376 3020 explorer.exe 29 PID 3020 wrote to memory of 2420 3020 explorer.exe 30 PID 3020 wrote to memory of 2420 3020 explorer.exe 30 PID 3020 wrote to memory of 2420 3020 explorer.exe 30 PID 3020 wrote to memory of 2420 3020 explorer.exe 30 PID 1376 wrote to memory of 2060 1376 AppLaunch.exe 31 PID 1376 wrote to memory of 2060 1376 AppLaunch.exe 31 PID 1376 wrote to memory of 2060 1376 AppLaunch.exe 31 PID 1376 wrote to memory of 2060 1376 AppLaunch.exe 31 PID 1376 wrote to memory of 2060 1376 AppLaunch.exe 31 PID 1376 wrote to memory of 2060 1376 AppLaunch.exe 31 PID 1376 wrote to memory of 2060 1376 AppLaunch.exe 31 PID 2060 wrote to memory of 1964 2060 cmd.exe 33 PID 2060 wrote to memory of 1964 2060 cmd.exe 33 PID 2060 wrote to memory of 1964 2060 cmd.exe 33 PID 2060 wrote to memory of 1964 2060 cmd.exe 33 PID 2060 wrote to memory of 1964 2060 cmd.exe 33 PID 2060 wrote to memory of 1964 2060 cmd.exe 33 PID 2060 wrote to memory of 1964 2060 cmd.exe 33 PID 2420 wrote to memory of 2600 2420 nvxdsinc.exe 34 PID 2420 wrote to memory of 2600 2420 nvxdsinc.exe 34 PID 2420 wrote to memory of 2600 2420 nvxdsinc.exe 34 PID 2420 wrote to memory of 2600 2420 nvxdsinc.exe 34 PID 2600 wrote to memory of 2608 2600 nwtray.exe 35 PID 2600 wrote to memory of 2608 2600 nwtray.exe 35 PID 2600 wrote to memory of 2608 2600 nwtray.exe 35 PID 2600 wrote to memory of 2608 2600 nwtray.exe 35 PID 2600 wrote to memory of 2608 2600 nwtray.exe 35 PID 2600 wrote to memory of 2608 2600 nwtray.exe 35 PID 2600 wrote to memory of 2608 2600 nwtray.exe 35 PID 2600 wrote to memory of 2608 2600 nwtray.exe 35 PID 2600 wrote to memory of 2608 2600 nwtray.exe 35 PID 2600 wrote to memory of 2608 2600 nwtray.exe 35 PID 2600 wrote to memory of 2608 2600 nwtray.exe 35 PID 2600 wrote to memory of 2608 2600 nwtray.exe 35 PID 2600 wrote to memory of 2608 2600 nwtray.exe 35 PID 2608 wrote to memory of 1960 2608 AppLaunch.exe 36 PID 2608 wrote to memory of 1960 2608 AppLaunch.exe 36 PID 2608 wrote to memory of 1960 2608 AppLaunch.exe 36 PID 2608 wrote to memory of 1960 2608 AppLaunch.exe 36 PID 2608 wrote to memory of 1960 2608 AppLaunch.exe 36 PID 2608 wrote to memory of 1960 2608 AppLaunch.exe 36 PID 2608 wrote to memory of 1960 2608 AppLaunch.exe 36 PID 1960 wrote to memory of 1188 1960 cmd.exe 38 PID 1960 wrote to memory of 1188 1960 cmd.exe 38 PID 1960 wrote to memory of 1188 1960 cmd.exe 38 PID 1960 wrote to memory of 1188 1960 cmd.exe 38 PID 1960 wrote to memory of 1188 1960 cmd.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e95e087ddc336bc8cc038866c629537_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1e95e087ddc336bc8cc038866c629537_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe3⤵
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 5 && del C:\Windows\MICROS~1.NET\FRAMEW~1\V20~1.507\AppLaunch.exe4⤵
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\timeout.exetimeout 55⤵
- Delays execution with timeout.exe
PID:1964
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\System\nvxdsinc.exe"C:\Users\Admin\AppData\Local\Temp\System\nvxdsinc.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\System\nwtray.exe"C:\Users\Admin\AppData\Local\Temp\System\nwtray.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe5⤵
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 5 && del C:\Windows\MICROS~1.NET\FRAMEW~1\V20~1.507\AppLaunch.exe6⤵
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWOW64\timeout.exetimeout 57⤵
- Delays execution with timeout.exe
PID:1188
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84B
MD5078e9b825edb16211e11ff0e179170a8
SHA17471ae7132b9ac5aa62fe72c0ed548945683696a
SHA25684c4f91eb41a51fa78b1ad5ca8913d9c074d0416967bf035c731f3a4908bfd16
SHA512d09f30744b4f513846a6e964de3a12c408d98c8bf98977f04b68082d83ea2566162756a36f54c8500f27ee9deddd2bb3aa91ea54076e83fba7a70efc058383a4
-
Filesize
411KB
MD51e95e087ddc336bc8cc038866c629537
SHA168ff0f62b626aae7f11d5a1d7e2f7906cbe1a606
SHA256567b94bcdaea498b72ea3b4193d16a0eeb6807a02fefe59b9b87d0ae03d8dcd4
SHA5125e999094124243fccb6ed9f4eda9df203e527ca48c6d01126258b16c9f9b2546e6e4bb9a89db6b8e49cab71f3ec8625e42d2f3245603d0e3229df6b766ce0c15
-
Filesize
39KB
MD538abcaec6ee62213f90b1717d830a1bb
SHA1d8f5849d0d3f4ccc0dfb66a9a4a0442ac66a31b9
SHA2566fee9a2c70b2cc48b0812f7cb2e09497c9c90941976f430a8f8279ad3c787768
SHA51277eaabcbc6f7a3835b6220d72c4b1cae82d2125ea971907e33b15ceeede7e4da0741c6e63e988bd782ed6eb72ad3cbcba10ea83919eafd9b95d612c43a735274