Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/07/2024, 00:23
Static task
static1
Behavioral task
behavioral1
Sample
59b76d02fe8a1b203214a9ccd414df87_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
59b76d02fe8a1b203214a9ccd414df87_JaffaCakes118.exe
-
Size
888KB
-
MD5
59b76d02fe8a1b203214a9ccd414df87
-
SHA1
0ee62ca868fd6cc5d013c027bd30f98b7a05e054
-
SHA256
f54d6c25d170a5ea3af6bc70f0565f349d35b9ef0d1b1f28b826ea3fb05c5ea3
-
SHA512
cf1ff96692999f1e0ba9ddfad4ba29ffc8c3ec3d549b534913b4512b70f2b1259b60bddc83f99cba63142beabe534b0f5bc3127a97e72f3cc77573c09467a84b
-
SSDEEP
24576:WwIxB2m6kgFlqx1/jI75Wc5BYWmQIx0SYOXcttL:WwCB21FUxyv0x0SKtJ
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 2548 59b76d02fe8a1b203214a9ccd414df87_JaffaCakes118.exe -
Loads dropped DLL 2 IoCs
pid Process 2384 59b76d02fe8a1b203214a9ccd414df87_JaffaCakes118.exe 2548 59b76d02fe8a1b203214a9ccd414df87_JaffaCakes118.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 checkip.dyndns.org -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\DXM.REG cmd.exe File opened for modification C:\Windows\DXM.reg cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs .reg file with regedit 1 IoCs
pid Process 2820 regedit.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2384 59b76d02fe8a1b203214a9ccd414df87_JaffaCakes118.exe 2548 59b76d02fe8a1b203214a9ccd414df87_JaffaCakes118.exe 2548 59b76d02fe8a1b203214a9ccd414df87_JaffaCakes118.exe 2548 59b76d02fe8a1b203214a9ccd414df87_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2384 wrote to memory of 2548 2384 59b76d02fe8a1b203214a9ccd414df87_JaffaCakes118.exe 30 PID 2384 wrote to memory of 2548 2384 59b76d02fe8a1b203214a9ccd414df87_JaffaCakes118.exe 30 PID 2384 wrote to memory of 2548 2384 59b76d02fe8a1b203214a9ccd414df87_JaffaCakes118.exe 30 PID 2384 wrote to memory of 2548 2384 59b76d02fe8a1b203214a9ccd414df87_JaffaCakes118.exe 30 PID 2548 wrote to memory of 3052 2548 59b76d02fe8a1b203214a9ccd414df87_JaffaCakes118.exe 31 PID 2548 wrote to memory of 3052 2548 59b76d02fe8a1b203214a9ccd414df87_JaffaCakes118.exe 31 PID 2548 wrote to memory of 3052 2548 59b76d02fe8a1b203214a9ccd414df87_JaffaCakes118.exe 31 PID 2548 wrote to memory of 3052 2548 59b76d02fe8a1b203214a9ccd414df87_JaffaCakes118.exe 31 PID 3052 wrote to memory of 2820 3052 cmd.exe 33 PID 3052 wrote to memory of 2820 3052 cmd.exe 33 PID 3052 wrote to memory of 2820 3052 cmd.exe 33 PID 3052 wrote to memory of 2820 3052 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\59b76d02fe8a1b203214a9ccd414df87_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\59b76d02fe8a1b203214a9ccd414df87_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Roaming\Sysutils_Update\59b76d02fe8a1b203214a9ccd414df87_JaffaCakes118.exe"C:\Users\Admin\AppData\Roaming\Sysutils_Update\59b76d02fe8a1b203214a9ccd414df87_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Roaming\Sysutils_Update\lahvwahvbavwav.bat" "3⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\regedit.exeregedit /s C:\Windows\DXM.reg4⤵
- Runs .reg file with regedit
PID:2820
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
410B
MD534aa5ef73b11bd509639b52cd6749302
SHA1190eb110d50c34345411e60cbfb05beb69432928
SHA25679753e0d0f300beb999f83d76b7dbec58ded4b1c470cf4777cda1856c10d6595
SHA51215fceafb6848ca54e59a1b7433f5f6df1933a02b3df940df47c6d981d1029f8af3df9eed1d846d954ac6efbe2166a91e72be6dced3a20e1146ca6f5987e1d5bf
-
Filesize
229B
MD571ffad4df24e8ec99306a969b4a5fba3
SHA1288f86a641e9497144070aa8139a97aac2b1c45f
SHA256ad0e8e7eccc8cca18156391eb0903ba61cfbf88a9633d563c026b8a85517d5bf
SHA51217e3892e5ac5a8c484da25e86abc75129d2bf9c4d34119c2f2f3c4ea817666027918f68199bad57308e4bbada5770abb079b007ed0846cb61f5c68022dd8b72d
-
Filesize
888KB
MD559b76d02fe8a1b203214a9ccd414df87
SHA10ee62ca868fd6cc5d013c027bd30f98b7a05e054
SHA256f54d6c25d170a5ea3af6bc70f0565f349d35b9ef0d1b1f28b826ea3fb05c5ea3
SHA512cf1ff96692999f1e0ba9ddfad4ba29ffc8c3ec3d549b534913b4512b70f2b1259b60bddc83f99cba63142beabe534b0f5bc3127a97e72f3cc77573c09467a84b