Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
13/07/2024, 12:30
Static task
static1
Behavioral task
behavioral1
Sample
41aae9514b062392c5dca03f6f7f81cd_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
41aae9514b062392c5dca03f6f7f81cd_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
41aae9514b062392c5dca03f6f7f81cd_JaffaCakes118.exe
-
Size
340KB
-
MD5
41aae9514b062392c5dca03f6f7f81cd
-
SHA1
5ccef3aedae7237e0f3affc415ae2712fb8f5e8b
-
SHA256
80c86e7b7c506f45047b9d6d3ef06d8b6aa77525b0b18b2b9687ab56f96a6a70
-
SHA512
59d9796a641b0d438ab547c21fa95d3d4ddf206988cff9df88a7b5bb7766ce8c9dd9b6e9f381a0621ee4ac2a625239661e188a802f17a1506633a28ace52d2ad
-
SSDEEP
6144:MJB6shVKYl4TECNTiRVlwySxk+ft+AytCx3cJfPlyT:MGshVK8WEoTXyck+CtCx3cJfd
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Deletes itself 1 IoCs
pid Process 1864 rbt.exe -
Executes dropped EXE 1 IoCs
pid Process 1864 rbt.exe -
Loads dropped DLL 2 IoCs
pid Process 1988 41aae9514b062392c5dca03f6f7f81cd_JaffaCakes118.exe 1988 41aae9514b062392c5dca03f6f7f81cd_JaffaCakes118.exe -
Modifies system executable filetype association 2 TTPs 17 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\exefile\shell\runas\command rbt.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\exefile\Content Type = "application/x-msdownload" rbt.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\exefile\shell\open rbt.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\exefile\shell\runas rbt.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\exefile\shell\start rbt.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\exefile\DefaultIcon\ = "%1" rbt.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\exefile\shell rbt.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\exefile\shell\runas\command\ = "\"%1\" %*" rbt.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\exefile\shell\runas\command\IsolatedCommand = "\"%1\" %*" rbt.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\exefile\shell\start\command\ = "\"%1\" %*" rbt.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\exefile\shell\start\command\IsolatedCommand = "\"%1\" %*" rbt.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\exefile\DefaultIcon rbt.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\exefile\shell\open\command\IsolatedCommand = "\"%1\" %*" rbt.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\exefile\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\rbt.exe\" -a \"%1\" %*" rbt.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\exefile\shell\start\command rbt.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\exefile\ = "Application" rbt.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\exefile\shell\open\command rbt.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Windows\CurrentVersion\Run\2573284963 = "C:\\Users\\Admin\\AppData\\Local\\rbt.exe" 41aae9514b062392c5dca03f6f7f81cd_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Windows\CurrentVersion\Run\ctfmon.exe = "C:\\WINDOWS\\system32\\ctfmon.exe" 41aae9514b062392c5dca03f6f7f81cd_JaffaCakes118.exe -
Modifies registry class 41 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\.exe rbt.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" rbt.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\.exe\shell\start\command\ = "\"%1\" %*" rbt.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\exefile\shell\open\command rbt.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\.exe\shell rbt.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" rbt.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\exefile\DefaultIcon\ = "%1" rbt.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\exefile\shell\runas\command\IsolatedCommand = "\"%1\" %*" rbt.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_Classes\Local Settings explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\exefile\shell\open\command\IsolatedCommand = "\"%1\" %*" rbt.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\.exe\DefaultIcon rbt.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\.exe\DefaultIcon\ = "%1" rbt.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\.exe\shell\open rbt.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\.exe\shell\open\command rbt.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\.exe\shell\start rbt.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\.exe\shell\start\command\IsolatedCommand = "\"%1\" %*" rbt.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\exefile rbt.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\exefile\ = "Application" rbt.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\exefile\shell\runas\command\ = "\"%1\" %*" rbt.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\exefile\shell\start rbt.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\exefile\shell\runas\command rbt.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\exefile\shell\start\command\IsolatedCommand = "\"%1\" %*" rbt.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\.exe\ = "exefile" rbt.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\.exe\shell\runas rbt.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\.exe\shell\start\command rbt.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\exefile\shell\open rbt.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\exefile\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\rbt.exe\" -a \"%1\" %*" rbt.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\.exe\shell\runas\command rbt.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\exefile\DefaultIcon rbt.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\exefile\shell\start\command\ = "\"%1\" %*" rbt.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\.exe\Content Type = "application/x-msdownload" rbt.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\rbt.exe\" -a \"%1\" %*" rbt.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\.exe\shell\runas\command\ = "\"%1\" %*" rbt.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\exefile\Content Type = "application/x-msdownload" rbt.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\exefile\shell rbt.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\exefile\shell\runas rbt.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\exefile\shell\start\command rbt.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1988 41aae9514b062392c5dca03f6f7f81cd_JaffaCakes118.exe 1988 41aae9514b062392c5dca03f6f7f81cd_JaffaCakes118.exe 1988 41aae9514b062392c5dca03f6f7f81cd_JaffaCakes118.exe 1988 41aae9514b062392c5dca03f6f7f81cd_JaffaCakes118.exe 1988 41aae9514b062392c5dca03f6f7f81cd_JaffaCakes118.exe 1988 41aae9514b062392c5dca03f6f7f81cd_JaffaCakes118.exe 1988 41aae9514b062392c5dca03f6f7f81cd_JaffaCakes118.exe 1988 41aae9514b062392c5dca03f6f7f81cd_JaffaCakes118.exe 1988 41aae9514b062392c5dca03f6f7f81cd_JaffaCakes118.exe 1988 41aae9514b062392c5dca03f6f7f81cd_JaffaCakes118.exe 1988 41aae9514b062392c5dca03f6f7f81cd_JaffaCakes118.exe 1988 41aae9514b062392c5dca03f6f7f81cd_JaffaCakes118.exe 1988 41aae9514b062392c5dca03f6f7f81cd_JaffaCakes118.exe 1864 rbt.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2764 explorer.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeShutdownPrivilege 2764 explorer.exe Token: SeShutdownPrivilege 2764 explorer.exe Token: SeShutdownPrivilege 2764 explorer.exe Token: SeShutdownPrivilege 2764 explorer.exe Token: SeShutdownPrivilege 2764 explorer.exe Token: SeShutdownPrivilege 2764 explorer.exe Token: SeShutdownPrivilege 2764 explorer.exe Token: SeShutdownPrivilege 2764 explorer.exe Token: SeShutdownPrivilege 2764 explorer.exe Token: SeShutdownPrivilege 2764 explorer.exe Token: SeShutdownPrivilege 2764 explorer.exe Token: SeShutdownPrivilege 2764 explorer.exe Token: SeShutdownPrivilege 2764 explorer.exe Token: SeShutdownPrivilege 2764 explorer.exe -
Suspicious use of FindShellTrayWindow 37 IoCs
pid Process 1864 rbt.exe 1864 rbt.exe 1864 rbt.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 1864 rbt.exe 2764 explorer.exe 2764 explorer.exe 1864 rbt.exe 1864 rbt.exe 2764 explorer.exe -
Suspicious use of SendNotifyMessage 20 IoCs
pid Process 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 1864 rbt.exe 1864 rbt.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1864 rbt.exe 1864 rbt.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1988 wrote to memory of 1864 1988 41aae9514b062392c5dca03f6f7f81cd_JaffaCakes118.exe 31 PID 1988 wrote to memory of 1864 1988 41aae9514b062392c5dca03f6f7f81cd_JaffaCakes118.exe 31 PID 1988 wrote to memory of 1864 1988 41aae9514b062392c5dca03f6f7f81cd_JaffaCakes118.exe 31 PID 1988 wrote to memory of 1864 1988 41aae9514b062392c5dca03f6f7f81cd_JaffaCakes118.exe 31 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\41aae9514b062392c5dca03f6f7f81cd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\41aae9514b062392c5dca03f6f7f81cd_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\AppData\Local\rbt.exe"C:\Users\Admin\AppData\Local\rbt.exe" -gav C:\Users\Admin\AppData\Local\Temp\41aae9514b062392c5dca03f6f7f81cd_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system executable filetype association
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1864
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2764
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340KB
MD541aae9514b062392c5dca03f6f7f81cd
SHA15ccef3aedae7237e0f3affc415ae2712fb8f5e8b
SHA25680c86e7b7c506f45047b9d6d3ef06d8b6aa77525b0b18b2b9687ab56f96a6a70
SHA51259d9796a641b0d438ab547c21fa95d3d4ddf206988cff9df88a7b5bb7766ce8c9dd9b6e9f381a0621ee4ac2a625239661e188a802f17a1506633a28ace52d2ad