Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
15/07/2024, 20:00
Static task
static1
Behavioral task
behavioral1
Sample
4b2ee932d6b05e642c894fbe68388bd4_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4b2ee932d6b05e642c894fbe68388bd4_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
4b2ee932d6b05e642c894fbe68388bd4_JaffaCakes118.exe
-
Size
809KB
-
MD5
4b2ee932d6b05e642c894fbe68388bd4
-
SHA1
bf680f98429e1ba3663d813710f8363fa1c46001
-
SHA256
58388725ce4324d4327873f06f6360529e50387617edb2869b8ce5a9ac822d28
-
SHA512
35c38b142d8f3aa1239920c8b5e3ad71579e5248eeb6e614bbd124aeb9de0a68ef41dafad326dc0cba268300d1f85ac7341c075b5aa68c35a48ded2214cc7bfe
-
SSDEEP
12288:nKaQp0iSqf2+HwVaUr6aOGSOXyefS6DXFTK6U9SheR5rX6obatS3qXP:a8qfAhr62VCefSEVO6Uwc5X6kattX
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 568 privacy.exe -
Loads dropped DLL 3 IoCs
pid Process 2708 4b2ee932d6b05e642c894fbe68388bd4_JaffaCakes118.exe 2708 4b2ee932d6b05e642c894fbe68388bd4_JaffaCakes118.exe 2708 4b2ee932d6b05e642c894fbe68388bd4_JaffaCakes118.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\Privacy Protection = "C:\\ProgramData\\privacy.exe" privacy.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\V: privacy.exe File opened (read-only) \??\J: privacy.exe File opened (read-only) \??\H: privacy.exe File opened (read-only) \??\M: privacy.exe File opened (read-only) \??\O: privacy.exe File opened (read-only) \??\R: privacy.exe File opened (read-only) \??\X: privacy.exe File opened (read-only) \??\E: privacy.exe File opened (read-only) \??\K: privacy.exe File opened (read-only) \??\N: privacy.exe File opened (read-only) \??\W: privacy.exe File opened (read-only) \??\Y: privacy.exe File opened (read-only) \??\G: privacy.exe File opened (read-only) \??\L: privacy.exe File opened (read-only) \??\P: privacy.exe File opened (read-only) \??\Q: privacy.exe File opened (read-only) \??\S: privacy.exe File opened (read-only) \??\T: privacy.exe File opened (read-only) \??\U: privacy.exe File opened (read-only) \??\Z: privacy.exe File opened (read-only) \??\I: privacy.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 privacy.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2708 4b2ee932d6b05e642c894fbe68388bd4_JaffaCakes118.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe -
Suspicious use of FindShellTrayWindow 15 IoCs
pid Process 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe -
Suspicious use of SendNotifyMessage 15 IoCs
pid Process 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe 568 privacy.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 568 privacy.exe 568 privacy.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2708 wrote to memory of 568 2708 4b2ee932d6b05e642c894fbe68388bd4_JaffaCakes118.exe 30 PID 2708 wrote to memory of 568 2708 4b2ee932d6b05e642c894fbe68388bd4_JaffaCakes118.exe 30 PID 2708 wrote to memory of 568 2708 4b2ee932d6b05e642c894fbe68388bd4_JaffaCakes118.exe 30 PID 2708 wrote to memory of 568 2708 4b2ee932d6b05e642c894fbe68388bd4_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b2ee932d6b05e642c894fbe68388bd4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4b2ee932d6b05e642c894fbe68388bd4_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\ProgramData\privacy.exeC:\ProgramData\privacy.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:568
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
802KB
MD543b51c578cb0404643103fece48f9255
SHA10fb12ce11ae4c0e47709baa6773bf01140405f2e
SHA25619745879446d7c3ee8caef2062c57239d939d8bc05b67d24f6cebf76a17c60c1
SHA512fef6fdd669edab77cb797695b9a015a59cc0ec3a34970ba88bb25784922e26fd4fa7a3a200725ec64073471e75ab6abb9609b300b959d805b1f1e12ad162e72f