Analysis
-
max time kernel
143s -
max time network
103s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
15/07/2024, 12:02
Static task
static1
Behavioral task
behavioral1
Sample
49b0f8750e7c27363134c901e74293c5_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
49b0f8750e7c27363134c901e74293c5_JaffaCakes118.exe
-
Size
286KB
-
MD5
49b0f8750e7c27363134c901e74293c5
-
SHA1
326fd357f24fe982d6a744f0414385559891540b
-
SHA256
00bdc3fc997519768f4e5ace965b337e494806c0cd03cd09eb73ad81501737c5
-
SHA512
db297f05a03a3ac476c0032e8b61bfc487a1239d758b016128a40f4fe22d9553a7780146b7602e32e6e9d4f3d4d79868127d616e20b043afdadbde6e804619d2
-
SSDEEP
6144:mnCCrLUwNcvmPSnBIvivyTz7JA1LQGtqro8THwCvLQOWV42WwqnW2aaOKj:QSXBIqvyTzYt+oG/ZS42NqnILKj
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" 49b0f8750e7c27363134c901e74293c5_JaffaCakes118.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 932 DEBB.tmp -
Loads dropped DLL 2 IoCs
pid Process 2564 49b0f8750e7c27363134c901e74293c5_JaffaCakes118.exe 2564 49b0f8750e7c27363134c901e74293c5_JaffaCakes118.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2564-1-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2564-2-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2564-3-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2516-76-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2516-74-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2564-77-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2564-185-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2928-241-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2564-242-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2564-346-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2564-352-0x0000000000400000-0x000000000046B000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\7F1.exe = "C:\\Program Files (x86)\\LP\\589F\\7F1.exe" 49b0f8750e7c27363134c901e74293c5_JaffaCakes118.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\LP\589F\7F1.exe 49b0f8750e7c27363134c901e74293c5_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\LP\589F\7F1.exe 49b0f8750e7c27363134c901e74293c5_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\LP\589F\DEBB.tmp 49b0f8750e7c27363134c901e74293c5_JaffaCakes118.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2564 49b0f8750e7c27363134c901e74293c5_JaffaCakes118.exe 2564 49b0f8750e7c27363134c901e74293c5_JaffaCakes118.exe 2564 49b0f8750e7c27363134c901e74293c5_JaffaCakes118.exe 2564 49b0f8750e7c27363134c901e74293c5_JaffaCakes118.exe 2564 49b0f8750e7c27363134c901e74293c5_JaffaCakes118.exe 2564 49b0f8750e7c27363134c901e74293c5_JaffaCakes118.exe 2564 49b0f8750e7c27363134c901e74293c5_JaffaCakes118.exe 2564 49b0f8750e7c27363134c901e74293c5_JaffaCakes118.exe 2564 49b0f8750e7c27363134c901e74293c5_JaffaCakes118.exe 2564 49b0f8750e7c27363134c901e74293c5_JaffaCakes118.exe 2564 49b0f8750e7c27363134c901e74293c5_JaffaCakes118.exe 2564 49b0f8750e7c27363134c901e74293c5_JaffaCakes118.exe 2564 49b0f8750e7c27363134c901e74293c5_JaffaCakes118.exe 2564 49b0f8750e7c27363134c901e74293c5_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3024 explorer.exe -
Suspicious use of AdjustPrivilegeToken 19 IoCs
description pid Process Token: SeRestorePrivilege 1636 msiexec.exe Token: SeTakeOwnershipPrivilege 1636 msiexec.exe Token: SeSecurityPrivilege 1636 msiexec.exe Token: SeShutdownPrivilege 3024 explorer.exe Token: SeShutdownPrivilege 3024 explorer.exe Token: SeShutdownPrivilege 3024 explorer.exe Token: SeShutdownPrivilege 3024 explorer.exe Token: SeShutdownPrivilege 3024 explorer.exe Token: SeShutdownPrivilege 3024 explorer.exe Token: SeShutdownPrivilege 3024 explorer.exe Token: SeShutdownPrivilege 3024 explorer.exe Token: SeShutdownPrivilege 3024 explorer.exe Token: SeShutdownPrivilege 3024 explorer.exe Token: 33 952 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 952 AUDIODG.EXE Token: 33 952 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 952 AUDIODG.EXE Token: SeShutdownPrivilege 3024 explorer.exe Token: SeShutdownPrivilege 3024 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 3024 explorer.exe 3024 explorer.exe 3024 explorer.exe 3024 explorer.exe 3024 explorer.exe 3024 explorer.exe 3024 explorer.exe 3024 explorer.exe 3024 explorer.exe 3024 explorer.exe 3024 explorer.exe 3024 explorer.exe 3024 explorer.exe 3024 explorer.exe 3024 explorer.exe 3024 explorer.exe 3024 explorer.exe 3024 explorer.exe 3024 explorer.exe 3024 explorer.exe 3024 explorer.exe 3024 explorer.exe 3024 explorer.exe 3024 explorer.exe 3024 explorer.exe 3024 explorer.exe 3024 explorer.exe 3024 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 3024 explorer.exe 3024 explorer.exe 3024 explorer.exe 3024 explorer.exe 3024 explorer.exe 3024 explorer.exe 3024 explorer.exe 3024 explorer.exe 3024 explorer.exe 3024 explorer.exe 3024 explorer.exe 3024 explorer.exe 3024 explorer.exe 3024 explorer.exe 3024 explorer.exe 3024 explorer.exe 3024 explorer.exe 3024 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2564 wrote to memory of 2516 2564 49b0f8750e7c27363134c901e74293c5_JaffaCakes118.exe 30 PID 2564 wrote to memory of 2516 2564 49b0f8750e7c27363134c901e74293c5_JaffaCakes118.exe 30 PID 2564 wrote to memory of 2516 2564 49b0f8750e7c27363134c901e74293c5_JaffaCakes118.exe 30 PID 2564 wrote to memory of 2516 2564 49b0f8750e7c27363134c901e74293c5_JaffaCakes118.exe 30 PID 2564 wrote to memory of 2928 2564 49b0f8750e7c27363134c901e74293c5_JaffaCakes118.exe 35 PID 2564 wrote to memory of 2928 2564 49b0f8750e7c27363134c901e74293c5_JaffaCakes118.exe 35 PID 2564 wrote to memory of 2928 2564 49b0f8750e7c27363134c901e74293c5_JaffaCakes118.exe 35 PID 2564 wrote to memory of 2928 2564 49b0f8750e7c27363134c901e74293c5_JaffaCakes118.exe 35 PID 2564 wrote to memory of 932 2564 49b0f8750e7c27363134c901e74293c5_JaffaCakes118.exe 36 PID 2564 wrote to memory of 932 2564 49b0f8750e7c27363134c901e74293c5_JaffaCakes118.exe 36 PID 2564 wrote to memory of 932 2564 49b0f8750e7c27363134c901e74293c5_JaffaCakes118.exe 36 PID 2564 wrote to memory of 932 2564 49b0f8750e7c27363134c901e74293c5_JaffaCakes118.exe 36 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 49b0f8750e7c27363134c901e74293c5_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" 49b0f8750e7c27363134c901e74293c5_JaffaCakes118.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\49b0f8750e7c27363134c901e74293c5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\49b0f8750e7c27363134c901e74293c5_JaffaCakes118.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2564 -
C:\Users\Admin\AppData\Local\Temp\49b0f8750e7c27363134c901e74293c5_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\49b0f8750e7c27363134c901e74293c5_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\FB6F6\69058.exe%C:\Users\Admin\AppData\Roaming\FB6F62⤵PID:2516
-
-
C:\Users\Admin\AppData\Local\Temp\49b0f8750e7c27363134c901e74293c5_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\49b0f8750e7c27363134c901e74293c5_JaffaCakes118.exe startC:\Program Files (x86)\F67FE\lvvm.exe%C:\Program Files (x86)\F67FE2⤵PID:2928
-
-
C:\Program Files (x86)\LP\589F\DEBB.tmp"C:\Program Files (x86)\LP\589F\DEBB.tmp"2⤵
- Executes dropped EXE
PID:932
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1636
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3024
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x1c01⤵
- Suspicious use of AdjustPrivilegeToken
PID:952
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD5e01642350226050056b909fc8e886f56
SHA1035b3fcefcbecaae018eeabc9e8c8b36ed9d2276
SHA256a11e658dbb7115a125997f2f6244bcb649df1b92bc8484ede21c791f8e853e16
SHA5121f66ff76fb9c92a28d375d1aade5bae0df7337e4f9da897dc6d2b3ed4d5e2937b8a5942b1b0e54b7102d30f19ebd012620be8656dd000f525f93691fc2b3ea22
-
Filesize
1KB
MD5d88a590a6ebe02a5822eaf4603c0d87d
SHA1d4453fd37b301219039b5443e1c414826b62e74e
SHA256b49280757a67fbb769356ebd68d5239cbaa0a70ba22e5234509f9d905088d532
SHA512698c433e81af3c1940ae8594867771b0021b7eb6b402f5d889f62dec40408abadc488466f9053fb2ee236250cfacb890f7489a2b500e6387a58adcd8c21815cc
-
Filesize
1KB
MD5b09dd49f787824c0c1a89eeb56496be9
SHA168514f47adf9517a15ae5b3f452fdca47a9e2ea5
SHA256d3930ac43b0db73e0336fb57e7426aeba344532865e3267229f04efdd03d76c1
SHA51208f6527eb8b5d2a5a66147d16dbd223fcacb30d1b2f517fa834e68150c69fa8c144148168f406231ad0cf205d0088967070f1f27af7e3c980a7f7cced2d5ca75
-
Filesize
600B
MD500f4af246729dfa12b22e4a887bf7ef8
SHA10726ea501e84897711d89554806e2f709fac08bc
SHA256ac201fdd27235d19e2fb08425ea94bcdf76c399a8cc18d7779fcc4c567aab989
SHA5122581b86c9a45a18a84a9e9fd5b1148a2d132ade84e631c9c2b24075bf6cf366b81e1196730f950a343429dd3b01ae89e20c91a94bf30bc01fb8ee73822492d3c
-
Filesize
300B
MD5e79bec0b7e38579202b2ce1cc3b7e1ad
SHA1456147eb6cef2a251dbdd39a4f8728d615e8ca07
SHA256d8eed28bf2a33c49a5e9c8ca9a99fa7ae28eb9fe6065e26891fc253bf189c209
SHA51298296f3d37a68bce0a114e7fd7d4142f73ff69ef5f31934c9ec467c05c69942c5ece22743433889fdb96416024bfb5c29a10f3ea2d599cc2260a6fb8c9c6c179
-
Filesize
102KB
MD59636b8b316a3bc776f9a98ea09da5caf
SHA1050f0bc24149a2e208fdec8e0d7bdb08133ff958
SHA2562de935d69a83a276edbd20ee616e8ece2a2ec3aa75daebd91de5891a099e3a4f
SHA512472bc6565f724a356938412a0dac7c443c2e45b71101831542b6723f6bcee9d3d54afc40adec603db829d736c828d60c08b0a3a78e1f691bdbff8445c424e8a0