Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14/07/2024, 15:20
Static task
static1
Behavioral task
behavioral1
Sample
46646ab07d603284ff59a39b81e8f232_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
46646ab07d603284ff59a39b81e8f232_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
46646ab07d603284ff59a39b81e8f232_JaffaCakes118.exe
-
Size
651KB
-
MD5
46646ab07d603284ff59a39b81e8f232
-
SHA1
01b7948875e0e730bfa76d10d206b8e66da24249
-
SHA256
1bc5a2cda8d440502c14ec8ac7dd37ae152beef48be8a72b47b56d8a90aba70d
-
SHA512
55db2f2184a4b217c079c54897cb66fdc3cbe87bbc5182d3752bad852f1108171ea602cf116c2b1b80fc84823ce8a2f660f13fe8ee6633ebfe688f9f51d8fb43
-
SSDEEP
12288:HThVMOJixo0WyE+vckSd0vZ9StyCPY/m0Rjnl:HTxiWSvcf+/F
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2812 InstallHelper.exe -
Loads dropped DLL 2 IoCs
pid Process 2232 46646ab07d603284ff59a39b81e8f232_JaffaCakes118.exe 2812 InstallHelper.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTServiceManager = "C:\\Users\\Admin\\AppData\\Local\\Temp\\46646ab07d603284ff59a39b81e8f232_JaffaCakes118.exe" 46646ab07d603284ff59a39b81e8f232_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\{AB79D3B4-AEDB-428a-B504-BAC00521A1C7} InstallHelper.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\{AB79D3B4-AEDB-428a-B504-BAC00521A1C7}\DisplayName = "google-feed.net" InstallHelper.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\{AB79D3B4-AEDB-428a-B504-BAC00521A1C7}\URL = "http://www.smartwebsearch.net/index.php?from=4&q={searchTerms}" InstallHelper.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DefaultScope = "{AB79D3B4-AEDB-428a-B504-BAC00521A1C7}" InstallHelper.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.smartwebsearch.net/index.php?from=3" InstallHelper.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2812 2232 46646ab07d603284ff59a39b81e8f232_JaffaCakes118.exe 30 PID 2232 wrote to memory of 2812 2232 46646ab07d603284ff59a39b81e8f232_JaffaCakes118.exe 30 PID 2232 wrote to memory of 2812 2232 46646ab07d603284ff59a39b81e8f232_JaffaCakes118.exe 30 PID 2232 wrote to memory of 2812 2232 46646ab07d603284ff59a39b81e8f232_JaffaCakes118.exe 30 PID 2232 wrote to memory of 2812 2232 46646ab07d603284ff59a39b81e8f232_JaffaCakes118.exe 30 PID 2232 wrote to memory of 2812 2232 46646ab07d603284ff59a39b81e8f232_JaffaCakes118.exe 30 PID 2232 wrote to memory of 2812 2232 46646ab07d603284ff59a39b81e8f232_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\46646ab07d603284ff59a39b81e8f232_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\46646ab07d603284ff59a39b81e8f232_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\InstallHelper.exe"C:\Users\Admin\AppData\Local\Temp\InstallHelper.exe" -all2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
PID:2812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59KB
MD54fdfb8758684503395d366311ca20a81
SHA1e7025abab125664592d1b091c17d33e2f4c49af2
SHA256d14de42e0f549ede67752eec5a6abeed65cfef7899a1f18475d40f4f6ed27f1b
SHA51206d3c5268507f579d838ccad981166e70408e7ade1168a25287ba9c88fade6d9a871a6bbf59184cff1fcd63484e8bdc9abd1a7d8ed64e491c0357a5ca4193f92
-
Filesize
438B
MD599b80b52cd88dedb0618f0eaa7fd6050
SHA1e8ed4795241f59424193415d2cee8a4242aeb79e
SHA256362222b5ff0031117757550c266fc82484e042d6f1a8eaf6ba876d7270a15dd8
SHA51215f3c16a55f03c28f3d7705be38a6e9f5f4249fe38569a98841fe34305f850f3d92f0125183d914a0825142cfaff0014d384819fb26ec8ea26dd6e762e1777ad
-
Filesize
383B
MD58079e94fadee0d782319e22a38cd1864
SHA1195d6158bf3b314d19786a9d1866c4036a3d8e7c
SHA25692f7ae2596ec1dfec5126744d02cd89f238a4085da17f118e3fd69d128163114
SHA512b7daf716601bd9f871f772619add805fbd3260cdef7c4d684340db15f537298ee24f32b48a8815491e6d845b705eab3e80525982b5e5f4a41e7a68ae8dbbe5e6
-
Filesize
98KB
MD5f2935b82031b4ec6c94ecef768b964ea
SHA1fbbb72c2841fc47f81da414db670642d5fc1da90
SHA2565005edd7db43d336710e4ed3e54fe042d1fda3b5c61156b69685214439a60b8d
SHA5121aa119a37d0a5a539674c570f02359172b73dd4aa10bad876feb71089e4754fd62f3f960ab60871948ca0ae450172b87213af31dc0d596ce84ff003d27ce02f6
-
Filesize
277KB
MD527b004acae7c7bd12b9bb6d96a51bcd9
SHA1b26ad838e4085e8b0eb5df6b61b607c9285ef382
SHA2565eb1ab22d8fedb85b075c29e60421877a4a7e3a90c9df6ef6675293d249de332
SHA5121556fcb7ad8aaa4c70c3e9bb51ba38319648f9c0a3d00c5be716f659113ae3635744359f9ec367970cc2356b3efce5ea955c5f97862f6016061c9b62c59c03c0