Analysis
-
max time kernel
142s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2024, 16:50
Behavioral task
behavioral1
Sample
3131f57dfc1a398077f5739d109ed181_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
3131f57dfc1a398077f5739d109ed181_JaffaCakes118.exe
-
Size
290KB
-
MD5
3131f57dfc1a398077f5739d109ed181
-
SHA1
a28cfc2248859de40b78c9be61794ed098b84af4
-
SHA256
46a819b87669db5e5c2dff87dd8fe09edab930a43fc98270f4b357d559fca6a1
-
SHA512
37e1ea1be0c9201f653eb760daff1fd69efe78d74c77626726ebcee90514120279d6480d0f2cb7a189b3ad504262d64a6f10d35fdc9673fc315ec35e61e4037e
-
SSDEEP
6144:s/u/NGn9a3Ku42+uBIW0KzkWdoJts8RuSMSZGpYYW3Vsa:s/INm9KKuF+uihKz1dVKs6YWlsa
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List 3131f57dfc1a398077f5739d109ed181_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile 3131f57dfc1a398077f5739d109ed181_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications 3131f57dfc1a398077f5739d109ed181_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\3131f57dfc1a398077f5739d109ed181_JaffaCakes118.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\3131f57dfc1a398077f5739d109ed181_JaffaCakes118.exe:*:Enabled:Microsoft Update Sheduler" 3131f57dfc1a398077f5739d109ed181_JaffaCakes118.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\setup.exe 3131f57dfc1a398077f5739d109ed181_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\setup.exe 3131f57dfc1a398077f5739d109ed181_JaffaCakes118.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/1168-0-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral2/memory/1168-2-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral2/memory/1168-4-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral2/memory/1168-3-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral2/memory/1168-6-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral2/memory/1168-7-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral2/memory/1168-8-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral2/memory/1168-20-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral2/memory/1168-22-0x0000000000400000-0x00000000004C8000-memory.dmp upx -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: 3131f57dfc1a398077f5739d109ed181_JaffaCakes118.exe File opened (read-only) \??\O: 3131f57dfc1a398077f5739d109ed181_JaffaCakes118.exe File opened (read-only) \??\R: 3131f57dfc1a398077f5739d109ed181_JaffaCakes118.exe File opened (read-only) \??\S: 3131f57dfc1a398077f5739d109ed181_JaffaCakes118.exe File opened (read-only) \??\V: 3131f57dfc1a398077f5739d109ed181_JaffaCakes118.exe File opened (read-only) \??\Z: 3131f57dfc1a398077f5739d109ed181_JaffaCakes118.exe File opened (read-only) \??\H: 3131f57dfc1a398077f5739d109ed181_JaffaCakes118.exe File opened (read-only) \??\K: 3131f57dfc1a398077f5739d109ed181_JaffaCakes118.exe File opened (read-only) \??\M: 3131f57dfc1a398077f5739d109ed181_JaffaCakes118.exe File opened (read-only) \??\N: 3131f57dfc1a398077f5739d109ed181_JaffaCakes118.exe File opened (read-only) \??\U: 3131f57dfc1a398077f5739d109ed181_JaffaCakes118.exe File opened (read-only) \??\X: 3131f57dfc1a398077f5739d109ed181_JaffaCakes118.exe File opened (read-only) \??\W: 3131f57dfc1a398077f5739d109ed181_JaffaCakes118.exe File opened (read-only) \??\E: 3131f57dfc1a398077f5739d109ed181_JaffaCakes118.exe File opened (read-only) \??\I: 3131f57dfc1a398077f5739d109ed181_JaffaCakes118.exe File opened (read-only) \??\J: 3131f57dfc1a398077f5739d109ed181_JaffaCakes118.exe File opened (read-only) \??\L: 3131f57dfc1a398077f5739d109ed181_JaffaCakes118.exe File opened (read-only) \??\P: 3131f57dfc1a398077f5739d109ed181_JaffaCakes118.exe File opened (read-only) \??\Q: 3131f57dfc1a398077f5739d109ed181_JaffaCakes118.exe File opened (read-only) \??\T: 3131f57dfc1a398077f5739d109ed181_JaffaCakes118.exe File opened (read-only) \??\Y: 3131f57dfc1a398077f5739d109ed181_JaffaCakes118.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk-1.8\javafx-src.zip 3131f57dfc1a398077f5739d109ed181_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\deploy\ffjcext.zip 3131f57dfc1a398077f5739d109ed181_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\deploy\ffjcext.zip 3131f57dfc1a398077f5739d109ed181_JaffaCakes118.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\Archive.zip 3131f57dfc1a398077f5739d109ed181_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
Processes
-
C:\Users\Admin\AppData\Local\Temp\3131f57dfc1a398077f5739d109ed181_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3131f57dfc1a398077f5739d109ed181_JaffaCakes118.exe"1⤵
- Modifies firewall policy service
- Drops startup file
- Enumerates connected drives
- Drops file in Program Files directory
PID:1168