Analysis
-
max time kernel
137s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25/07/2024, 22:14
Behavioral task
behavioral1
Sample
717249c759b5d75419246371f9c4c094_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
717249c759b5d75419246371f9c4c094_JaffaCakes118.exe
-
Size
32KB
-
MD5
717249c759b5d75419246371f9c4c094
-
SHA1
1ea3037e1af1cbdb8be8893b01f572ea6558d27b
-
SHA256
c380ca9e6b302c11cc1e23f92aadb985ecd0ca0eab356f41d8745b95e41fe841
-
SHA512
29cdbf43889f288bafd7b9008304996fecb018bfc326997a7575887f37f423944dbc2b7e643cb37371774297dfd99feff9eca6357a0f9b28a915a7f631184e90
-
SSDEEP
768:99PpmRFCRxWFfw6ww2W8QIF6T6sfxTJl3QPlyMAGeAPRq:jPWCRxWF/ww2WgF6T5pJxQPlRTeAPRq
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3852 rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 3852 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/1628-0-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/memory/1628-3-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/memory/1628-14-0x0000000000400000-0x0000000000416000-memory.dmp upx -
Drops file in System32 directory 8 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\YUksuser.dll 717249c759b5d75419246371f9c4c094_JaffaCakes118.exe File created C:\Windows\SysWOW64\ksuser.dll 717249c759b5d75419246371f9c4c094_JaffaCakes118.exe File created C:\Windows\SysWOW64\dllcache\ksuser.dll 717249c759b5d75419246371f9c4c094_JaffaCakes118.exe File created C:\Windows\SysWOW64\YUmidimap.dll 717249c759b5d75419246371f9c4c094_JaffaCakes118.exe File created C:\Windows\SysWOW64\midimap.dll 717249c759b5d75419246371f9c4c094_JaffaCakes118.exe File created C:\Windows\SysWOW64\dllcache\midimap.dll 717249c759b5d75419246371f9c4c094_JaffaCakes118.exe File created C:\Windows\SysWOW64\sysapp7.dll 717249c759b5d75419246371f9c4c094_JaffaCakes118.exe File created C:\Windows\SysWOW64\YUksuser.dll 717249c759b5d75419246371f9c4c094_JaffaCakes118.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1656 sc.exe 424 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 717249c759b5d75419246371f9c4c094_JaffaCakes118.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1628 717249c759b5d75419246371f9c4c094_JaffaCakes118.exe 1628 717249c759b5d75419246371f9c4c094_JaffaCakes118.exe 1628 717249c759b5d75419246371f9c4c094_JaffaCakes118.exe 1628 717249c759b5d75419246371f9c4c094_JaffaCakes118.exe 1628 717249c759b5d75419246371f9c4c094_JaffaCakes118.exe 1628 717249c759b5d75419246371f9c4c094_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1628 717249c759b5d75419246371f9c4c094_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1628 wrote to memory of 644 1628 717249c759b5d75419246371f9c4c094_JaffaCakes118.exe 97 PID 1628 wrote to memory of 644 1628 717249c759b5d75419246371f9c4c094_JaffaCakes118.exe 97 PID 1628 wrote to memory of 644 1628 717249c759b5d75419246371f9c4c094_JaffaCakes118.exe 97 PID 1628 wrote to memory of 1656 1628 717249c759b5d75419246371f9c4c094_JaffaCakes118.exe 98 PID 1628 wrote to memory of 1656 1628 717249c759b5d75419246371f9c4c094_JaffaCakes118.exe 98 PID 1628 wrote to memory of 1656 1628 717249c759b5d75419246371f9c4c094_JaffaCakes118.exe 98 PID 1628 wrote to memory of 424 1628 717249c759b5d75419246371f9c4c094_JaffaCakes118.exe 99 PID 1628 wrote to memory of 424 1628 717249c759b5d75419246371f9c4c094_JaffaCakes118.exe 99 PID 1628 wrote to memory of 424 1628 717249c759b5d75419246371f9c4c094_JaffaCakes118.exe 99 PID 1628 wrote to memory of 3852 1628 717249c759b5d75419246371f9c4c094_JaffaCakes118.exe 102 PID 1628 wrote to memory of 3852 1628 717249c759b5d75419246371f9c4c094_JaffaCakes118.exe 102 PID 1628 wrote to memory of 3852 1628 717249c759b5d75419246371f9c4c094_JaffaCakes118.exe 102 PID 644 wrote to memory of 600 644 net.exe 104 PID 644 wrote to memory of 600 644 net.exe 104 PID 644 wrote to memory of 600 644 net.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\717249c759b5d75419246371f9c4c094_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\717249c759b5d75419246371f9c4c094_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\net.exenet stop cryptsvc2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop cryptsvc3⤵
- System Location Discovery: System Language Discovery
PID:600
-
-
-
C:\Windows\SysWOW64\sc.exesc config cryptsvc start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1656
-
-
C:\Windows\SysWOW64\sc.exesc delete cryptsvc2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:424
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Users\Admin\AppData\Local\Temp\1721945818.dat, ServerMain c:\users\admin\appdata\local\temp\717249c759b5d75419246371f9c4c094_jaffacakes118.exe2⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3852
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD513b20de9cf287e90c6b7515f77e5334e
SHA1e239866045dc30c151695bbcd1baf141edbf4a57
SHA2566234bafce39922df5c976171caa5ad5f1cd1f6cfa5ebe19410f15ccb52549c9a
SHA512b30abad0bcfcffc8cf6aa39e2232b42eb7ee90998a0fa639ced682bd0c377e95913bee09c47e7f22950d29938729b8fbf3d13aacdc37fd55d41cc4eb16a11575