Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
11-07-2024 16:39
Static task
static1
Behavioral task
behavioral1
Sample
39ee717b40ae1f97060712436defe3fc_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
39ee717b40ae1f97060712436defe3fc_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
39ee717b40ae1f97060712436defe3fc_JaffaCakes118.exe
-
Size
688KB
-
MD5
39ee717b40ae1f97060712436defe3fc
-
SHA1
30d39a75d998758e3da9675c2152444839bebd1a
-
SHA256
e0c8e81873372ffcddeac3f122725a66d552f293064bd8cc2d1573bc98556879
-
SHA512
8c411359c3fe23164b514433e0213de6520517343246d2ab4dce345c5453f75bf4ac600e89fa729d5129cf31620bf92213db4b8f56e8e867b8c75b688f7c29b6
-
SSDEEP
12288:XLXlW3Y0Jz6t6bFOcHDMJwqHdcouf8u2zxbdi06weZwd:zlyYsdDMDHdcouaxbd/xL
Malware Config
Signatures
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload 5 IoCs
resource yara_rule behavioral1/memory/2536-52-0x0000000000400000-0x0000000000435000-memory.dmp family_isrstealer behavioral1/memory/2536-48-0x0000000000400000-0x0000000000435000-memory.dmp family_isrstealer behavioral1/memory/2536-58-0x0000000000400000-0x0000000000435000-memory.dmp family_isrstealer behavioral1/memory/2536-89-0x0000000000400000-0x0000000000435000-memory.dmp family_isrstealer behavioral1/memory/2536-95-0x0000000000400000-0x0000000000435000-memory.dmp family_isrstealer -
resource yara_rule behavioral1/memory/2576-59-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/2576-61-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/2576-67-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/2576-62-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/2576-71-0x0000000000400000-0x0000000000453000-memory.dmp upx -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\devupd = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\System\\Services\\devupd.exe" 39ee717b40ae1f97060712436defe3fc_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\devupd = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\System\\Services\\devupd.exe" 39ee717b40ae1f97060712436defe3fc_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2140 set thread context of 2536 2140 39ee717b40ae1f97060712436defe3fc_JaffaCakes118.exe 30 PID 2536 set thread context of 2576 2536 vbc.exe 31 -
NTFS ADS 3 IoCs
description ioc Process File created C:\ProgramData:$SS_DESCRIPTOR_XBVLV2PKPV19FKN45LJ8K8M3UKVVVVTJV6VVBVT 39ee717b40ae1f97060712436defe3fc_JaffaCakes118.exe File created C:\ProgramData\MyProject\1.0.0:$SS_DESCRIPTOR_XBVLV2PKPV19FKN45LJ8K8M3UKVVVVTJV6VVBVT 39ee717b40ae1f97060712436defe3fc_JaffaCakes118.exe File created C:\Users\Public\Desktop:$SS_DESCRIPTOR_XBVLV2PKPV19FKN45LJ8K8M3UKVVVVTJV6VVBVT 39ee717b40ae1f97060712436defe3fc_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2140 39ee717b40ae1f97060712436defe3fc_JaffaCakes118.exe 2140 39ee717b40ae1f97060712436defe3fc_JaffaCakes118.exe 2140 39ee717b40ae1f97060712436defe3fc_JaffaCakes118.exe 2140 39ee717b40ae1f97060712436defe3fc_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2536 vbc.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2140 wrote to memory of 2536 2140 39ee717b40ae1f97060712436defe3fc_JaffaCakes118.exe 30 PID 2140 wrote to memory of 2536 2140 39ee717b40ae1f97060712436defe3fc_JaffaCakes118.exe 30 PID 2140 wrote to memory of 2536 2140 39ee717b40ae1f97060712436defe3fc_JaffaCakes118.exe 30 PID 2140 wrote to memory of 2536 2140 39ee717b40ae1f97060712436defe3fc_JaffaCakes118.exe 30 PID 2140 wrote to memory of 2536 2140 39ee717b40ae1f97060712436defe3fc_JaffaCakes118.exe 30 PID 2140 wrote to memory of 2536 2140 39ee717b40ae1f97060712436defe3fc_JaffaCakes118.exe 30 PID 2140 wrote to memory of 2536 2140 39ee717b40ae1f97060712436defe3fc_JaffaCakes118.exe 30 PID 2140 wrote to memory of 2536 2140 39ee717b40ae1f97060712436defe3fc_JaffaCakes118.exe 30 PID 2536 wrote to memory of 2576 2536 vbc.exe 31 PID 2536 wrote to memory of 2576 2536 vbc.exe 31 PID 2536 wrote to memory of 2576 2536 vbc.exe 31 PID 2536 wrote to memory of 2576 2536 vbc.exe 31 PID 2536 wrote to memory of 2576 2536 vbc.exe 31 PID 2536 wrote to memory of 2576 2536 vbc.exe 31 PID 2536 wrote to memory of 2576 2536 vbc.exe 31 PID 2536 wrote to memory of 2576 2536 vbc.exe 31 PID 2536 wrote to memory of 2576 2536 vbc.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\39ee717b40ae1f97060712436defe3fc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\39ee717b40ae1f97060712436defe3fc_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe/scomma "C:\Users\Admin\AppData\Local\Temp\xaZMWPl3rN.ini"3⤵PID:2576
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
971B
MD5abf86d812a66b3218fcb05311bc9e9e6
SHA191b385dfb9cde7613fa1dee91a21f6858354e6e5
SHA25694636002917eb91609edf0f29d148fb52df62862f5479bceb14a90d3ee385a01
SHA512b9edf315c55c18cc1aebd4ba0cfd9cb10edc3c0da29a0216b1184f86f53b7a6c7a41360039d0a26120cd538a587e7ae6a3e970fab20b6815decf97f9a8a55c58
-
Filesize
971B
MD55ee03558592be7546db2a85b799f9854
SHA174cf0a70362b5260a35a47caf5c276be63faa4f2
SHA2563b06f07a0539ee27ea6dc0e8e41ed5ce9dd88ed19b144fc613e3cde86385c756
SHA512c3dc37877126cf08038c95a09e498ce9a135580d2b8a8a06777bb4c3f479d8b8c7d8c123d36fa3e641546dd4959efb448a1834bd718435006f2b1287782f8379
-
Filesize
5B
MD5d1ea279fb5559c020a1b4137dc4de237
SHA1db6f8988af46b56216a6f0daf95ab8c9bdb57400
SHA256fcdcc2c46896915a1c695d6231f0fee336a668531b7a3da46178c80362546dba
SHA512720e9c284f0559015312df7fe977563e5e16f48d3506e51eb4016adf7971924d352f740b030aa3adc81b6f65fd1dba12df06d10fa6c115074e5097e7ee0f08b3
-
Filesize
971B
MD5308461639d0af1a087f78f6649b90454
SHA140a64959083976dcace91e0c2f9768f256c0a9e6
SHA256073a3a60906f835c038e35245170a446faf4f4df92da4a782e5ffebbf40de652
SHA51241af05c84f81b769b81ba63a17326b49cad99a863f90060d20cc3d2a08da7b4762338685c7cc2c4fc42210656f0c4e2d97fe4aeab59ee0776c2da9bc5c6ac984