Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19-07-2024 23:35
Behavioral task
behavioral1
Sample
5e2811a1d2df600a913d82630286f395_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
5e2811a1d2df600a913d82630286f395_JaffaCakes118.exe
-
Size
1.4MB
-
MD5
5e2811a1d2df600a913d82630286f395
-
SHA1
42114ac635c4e8e96dff26ce5a2eb7c5a51a1551
-
SHA256
61c43e1819dd670f4c589aac171c43ff2af07a0fc07414b1af306472049152da
-
SHA512
568b015c2c56a92d8aef1ec92f29ca85e568f2eb1f18fc68e64ff3e0c5887a689d89dba270439a2c8fa83bae8fb8c8e89ee0a792c9c7ed16ee34823602feb63a
-
SSDEEP
24576:axpXPaR2J33o3S7P5zuHHOF2CxfehMHsGKzOYCMEMfX4IZ10zjP8CAq:apy+VDi8rgHfX4IZGzjP8CAq
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid Process 2248 taskkill.exe -
Processes:
5e2811a1d2df600a913d82630286f395_JaffaCakes118.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 5e2811a1d2df600a913d82630286f395_JaffaCakes118.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 5e2811a1d2df600a913d82630286f395_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
Processes:
5e2811a1d2df600a913d82630286f395_JaffaCakes118.exetaskkill.exedescription pid Process Token: SeCreateTokenPrivilege 2532 5e2811a1d2df600a913d82630286f395_JaffaCakes118.exe Token: SeAssignPrimaryTokenPrivilege 2532 5e2811a1d2df600a913d82630286f395_JaffaCakes118.exe Token: SeLockMemoryPrivilege 2532 5e2811a1d2df600a913d82630286f395_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 2532 5e2811a1d2df600a913d82630286f395_JaffaCakes118.exe Token: SeMachineAccountPrivilege 2532 5e2811a1d2df600a913d82630286f395_JaffaCakes118.exe Token: SeTcbPrivilege 2532 5e2811a1d2df600a913d82630286f395_JaffaCakes118.exe Token: SeSecurityPrivilege 2532 5e2811a1d2df600a913d82630286f395_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 2532 5e2811a1d2df600a913d82630286f395_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2532 5e2811a1d2df600a913d82630286f395_JaffaCakes118.exe Token: SeSystemProfilePrivilege 2532 5e2811a1d2df600a913d82630286f395_JaffaCakes118.exe Token: SeSystemtimePrivilege 2532 5e2811a1d2df600a913d82630286f395_JaffaCakes118.exe Token: SeProfSingleProcessPrivilege 2532 5e2811a1d2df600a913d82630286f395_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2532 5e2811a1d2df600a913d82630286f395_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 2532 5e2811a1d2df600a913d82630286f395_JaffaCakes118.exe Token: SeCreatePermanentPrivilege 2532 5e2811a1d2df600a913d82630286f395_JaffaCakes118.exe Token: SeBackupPrivilege 2532 5e2811a1d2df600a913d82630286f395_JaffaCakes118.exe Token: SeRestorePrivilege 2532 5e2811a1d2df600a913d82630286f395_JaffaCakes118.exe Token: SeShutdownPrivilege 2532 5e2811a1d2df600a913d82630286f395_JaffaCakes118.exe Token: SeDebugPrivilege 2532 5e2811a1d2df600a913d82630286f395_JaffaCakes118.exe Token: SeAuditPrivilege 2532 5e2811a1d2df600a913d82630286f395_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 2532 5e2811a1d2df600a913d82630286f395_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 2532 5e2811a1d2df600a913d82630286f395_JaffaCakes118.exe Token: SeRemoteShutdownPrivilege 2532 5e2811a1d2df600a913d82630286f395_JaffaCakes118.exe Token: SeUndockPrivilege 2532 5e2811a1d2df600a913d82630286f395_JaffaCakes118.exe Token: SeSyncAgentPrivilege 2532 5e2811a1d2df600a913d82630286f395_JaffaCakes118.exe Token: SeEnableDelegationPrivilege 2532 5e2811a1d2df600a913d82630286f395_JaffaCakes118.exe Token: SeManageVolumePrivilege 2532 5e2811a1d2df600a913d82630286f395_JaffaCakes118.exe Token: SeImpersonatePrivilege 2532 5e2811a1d2df600a913d82630286f395_JaffaCakes118.exe Token: SeCreateGlobalPrivilege 2532 5e2811a1d2df600a913d82630286f395_JaffaCakes118.exe Token: 31 2532 5e2811a1d2df600a913d82630286f395_JaffaCakes118.exe Token: 32 2532 5e2811a1d2df600a913d82630286f395_JaffaCakes118.exe Token: 33 2532 5e2811a1d2df600a913d82630286f395_JaffaCakes118.exe Token: 34 2532 5e2811a1d2df600a913d82630286f395_JaffaCakes118.exe Token: 35 2532 5e2811a1d2df600a913d82630286f395_JaffaCakes118.exe Token: SeDebugPrivilege 2248 taskkill.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
5e2811a1d2df600a913d82630286f395_JaffaCakes118.execmd.exedescription pid Process procid_target PID 2532 wrote to memory of 2772 2532 5e2811a1d2df600a913d82630286f395_JaffaCakes118.exe 31 PID 2532 wrote to memory of 2772 2532 5e2811a1d2df600a913d82630286f395_JaffaCakes118.exe 31 PID 2532 wrote to memory of 2772 2532 5e2811a1d2df600a913d82630286f395_JaffaCakes118.exe 31 PID 2532 wrote to memory of 2772 2532 5e2811a1d2df600a913d82630286f395_JaffaCakes118.exe 31 PID 2772 wrote to memory of 2248 2772 cmd.exe 33 PID 2772 wrote to memory of 2248 2772 cmd.exe 33 PID 2772 wrote to memory of 2248 2772 cmd.exe 33 PID 2772 wrote to memory of 2248 2772 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\5e2811a1d2df600a913d82630286f395_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5e2811a1d2df600a913d82630286f395_JaffaCakes118.exe"1⤵
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2248
-
-