Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
25-07-2024 21:33
Static task
static1
Behavioral task
behavioral1
Sample
7152a95ffec86a17c4f017cef3da7c5d_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
7152a95ffec86a17c4f017cef3da7c5d_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
7152a95ffec86a17c4f017cef3da7c5d_JaffaCakes118.exe
-
Size
263KB
-
MD5
7152a95ffec86a17c4f017cef3da7c5d
-
SHA1
b9bec3fd8bf1c0aa1dcf1d7051a2a12573f3756d
-
SHA256
d36562384e504b4418df10c867679decb98dc57ed4f284d03d143b59cb84fce7
-
SHA512
03ba78a59456dcad2b279bb89a142dcede295dec7bda327066913f3cbb92dc4641a4b2a55434a914102ae7b97f497168e03a91b95669ec3da2047692898c3551
-
SSDEEP
6144:tedYQkU7+cQQ2QbrfPnFaPcnQcD+Ia4hQVmrZbKe2YgpC:tTQkc+s2QbrnFMxIacQV4ZbVP
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
Processes:
7152a95ffec86a17c4f017cef3da7c5d_JaffaCakes118.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" 7152a95ffec86a17c4f017cef3da7c5d_JaffaCakes118.exe -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
Processes:
933B.tmppid process 1776 933B.tmp -
Loads dropped DLL 2 IoCs
Processes:
7152a95ffec86a17c4f017cef3da7c5d_JaffaCakes118.exepid process 2648 7152a95ffec86a17c4f017cef3da7c5d_JaffaCakes118.exe 2648 7152a95ffec86a17c4f017cef3da7c5d_JaffaCakes118.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral1/memory/2648-3-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2648-2-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2648-13-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1860-15-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1860-16-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2648-114-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1708-117-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1708-116-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2648-119-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2648-286-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2648-290-0x0000000000400000-0x0000000000468000-memory.dmp upx -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
7152a95ffec86a17c4f017cef3da7c5d_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\560.exe = "C:\\Program Files (x86)\\LP\\C6EB\\560.exe" 7152a95ffec86a17c4f017cef3da7c5d_JaffaCakes118.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 3 IoCs
Processes:
7152a95ffec86a17c4f017cef3da7c5d_JaffaCakes118.exedescription ioc process File opened for modification C:\Program Files (x86)\LP\C6EB\560.exe 7152a95ffec86a17c4f017cef3da7c5d_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\LP\C6EB\933B.tmp 7152a95ffec86a17c4f017cef3da7c5d_JaffaCakes118.exe File created C:\Program Files (x86)\LP\C6EB\560.exe 7152a95ffec86a17c4f017cef3da7c5d_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
7152a95ffec86a17c4f017cef3da7c5d_JaffaCakes118.exe7152a95ffec86a17c4f017cef3da7c5d_JaffaCakes118.exe7152a95ffec86a17c4f017cef3da7c5d_JaffaCakes118.exe933B.tmpdescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7152a95ffec86a17c4f017cef3da7c5d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7152a95ffec86a17c4f017cef3da7c5d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7152a95ffec86a17c4f017cef3da7c5d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 933B.tmp -
Modifies registry class 5 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
7152a95ffec86a17c4f017cef3da7c5d_JaffaCakes118.exepid process 2648 7152a95ffec86a17c4f017cef3da7c5d_JaffaCakes118.exe 2648 7152a95ffec86a17c4f017cef3da7c5d_JaffaCakes118.exe 2648 7152a95ffec86a17c4f017cef3da7c5d_JaffaCakes118.exe 2648 7152a95ffec86a17c4f017cef3da7c5d_JaffaCakes118.exe 2648 7152a95ffec86a17c4f017cef3da7c5d_JaffaCakes118.exe 2648 7152a95ffec86a17c4f017cef3da7c5d_JaffaCakes118.exe 2648 7152a95ffec86a17c4f017cef3da7c5d_JaffaCakes118.exe 2648 7152a95ffec86a17c4f017cef3da7c5d_JaffaCakes118.exe 2648 7152a95ffec86a17c4f017cef3da7c5d_JaffaCakes118.exe 2648 7152a95ffec86a17c4f017cef3da7c5d_JaffaCakes118.exe 2648 7152a95ffec86a17c4f017cef3da7c5d_JaffaCakes118.exe 2648 7152a95ffec86a17c4f017cef3da7c5d_JaffaCakes118.exe 2648 7152a95ffec86a17c4f017cef3da7c5d_JaffaCakes118.exe 2648 7152a95ffec86a17c4f017cef3da7c5d_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
explorer.exepid process 1524 explorer.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
Processes:
msiexec.exeexplorer.exedescription pid process Token: SeRestorePrivilege 2996 msiexec.exe Token: SeTakeOwnershipPrivilege 2996 msiexec.exe Token: SeSecurityPrivilege 2996 msiexec.exe Token: SeShutdownPrivilege 1524 explorer.exe Token: SeShutdownPrivilege 1524 explorer.exe Token: SeShutdownPrivilege 1524 explorer.exe Token: SeShutdownPrivilege 1524 explorer.exe Token: SeShutdownPrivilege 1524 explorer.exe Token: SeShutdownPrivilege 1524 explorer.exe Token: SeShutdownPrivilege 1524 explorer.exe Token: SeShutdownPrivilege 1524 explorer.exe Token: SeShutdownPrivilege 1524 explorer.exe Token: SeShutdownPrivilege 1524 explorer.exe Token: SeShutdownPrivilege 1524 explorer.exe Token: SeShutdownPrivilege 1524 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
Processes:
explorer.exepid process 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
Processes:
explorer.exepid process 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
7152a95ffec86a17c4f017cef3da7c5d_JaffaCakes118.exedescription pid process target process PID 2648 wrote to memory of 1860 2648 7152a95ffec86a17c4f017cef3da7c5d_JaffaCakes118.exe 7152a95ffec86a17c4f017cef3da7c5d_JaffaCakes118.exe PID 2648 wrote to memory of 1860 2648 7152a95ffec86a17c4f017cef3da7c5d_JaffaCakes118.exe 7152a95ffec86a17c4f017cef3da7c5d_JaffaCakes118.exe PID 2648 wrote to memory of 1860 2648 7152a95ffec86a17c4f017cef3da7c5d_JaffaCakes118.exe 7152a95ffec86a17c4f017cef3da7c5d_JaffaCakes118.exe PID 2648 wrote to memory of 1860 2648 7152a95ffec86a17c4f017cef3da7c5d_JaffaCakes118.exe 7152a95ffec86a17c4f017cef3da7c5d_JaffaCakes118.exe PID 2648 wrote to memory of 1708 2648 7152a95ffec86a17c4f017cef3da7c5d_JaffaCakes118.exe 7152a95ffec86a17c4f017cef3da7c5d_JaffaCakes118.exe PID 2648 wrote to memory of 1708 2648 7152a95ffec86a17c4f017cef3da7c5d_JaffaCakes118.exe 7152a95ffec86a17c4f017cef3da7c5d_JaffaCakes118.exe PID 2648 wrote to memory of 1708 2648 7152a95ffec86a17c4f017cef3da7c5d_JaffaCakes118.exe 7152a95ffec86a17c4f017cef3da7c5d_JaffaCakes118.exe PID 2648 wrote to memory of 1708 2648 7152a95ffec86a17c4f017cef3da7c5d_JaffaCakes118.exe 7152a95ffec86a17c4f017cef3da7c5d_JaffaCakes118.exe PID 2648 wrote to memory of 1776 2648 7152a95ffec86a17c4f017cef3da7c5d_JaffaCakes118.exe 933B.tmp PID 2648 wrote to memory of 1776 2648 7152a95ffec86a17c4f017cef3da7c5d_JaffaCakes118.exe 933B.tmp PID 2648 wrote to memory of 1776 2648 7152a95ffec86a17c4f017cef3da7c5d_JaffaCakes118.exe 933B.tmp PID 2648 wrote to memory of 1776 2648 7152a95ffec86a17c4f017cef3da7c5d_JaffaCakes118.exe 933B.tmp -
System policy modification 1 TTPs 2 IoCs
Processes:
7152a95ffec86a17c4f017cef3da7c5d_JaffaCakes118.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 7152a95ffec86a17c4f017cef3da7c5d_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" 7152a95ffec86a17c4f017cef3da7c5d_JaffaCakes118.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\7152a95ffec86a17c4f017cef3da7c5d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7152a95ffec86a17c4f017cef3da7c5d_JaffaCakes118.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\7152a95ffec86a17c4f017cef3da7c5d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\7152a95ffec86a17c4f017cef3da7c5d_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\BE18D\CBCC6.exe%C:\Users\Admin\AppData\Roaming\BE18D2⤵
- System Location Discovery: System Language Discovery
PID:1860 -
C:\Users\Admin\AppData\Local\Temp\7152a95ffec86a17c4f017cef3da7c5d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\7152a95ffec86a17c4f017cef3da7c5d_JaffaCakes118.exe startC:\Program Files (x86)\8DF0A\lvvm.exe%C:\Program Files (x86)\8DF0A2⤵
- System Location Discovery: System Language Discovery
PID:1708 -
C:\Program Files (x86)\LP\C6EB\933B.tmp"C:\Program Files (x86)\LP\C6EB\933B.tmp"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1776
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2996
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1524
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD5399dbf9bb9b25d25d0b87b2f01179f73
SHA1b28bd1d54e610230195225d624977411402e50db
SHA256f8cf88eeac271f78ec1d9dc0fed9ed2294baced0c94466a00c0d56b0b591e370
SHA51203da054da56e60048e1ecb3e3c18c8371a0383802d08d7d6ea04974bdba5b3c36f165dca328864206339905b807279770b0dd7658606b2a32a6edfc157ac8078
-
Filesize
600B
MD5f0eb06a7c71da7c0596b43afb7703716
SHA18094b6dbad8acd43bfbe81e0a37208fcb5a52994
SHA25639d620d77dead1afcb0dbd747c64c9d60736169f1c3e73b1087edeb08d21aa73
SHA512ead26aed153dae4a892f6dd96d4924c6587e6a4c919e445eb94fda86e7a275030e68cc0ff7f2ed6b133d8295e96ae1dc49b76e21408fed8843ff016273a7eea4
-
Filesize
1KB
MD568d3226db969f0eb3af4d5f822c6f97a
SHA135e7813c4cc0cc4575ea348ce40426a89f1a2d1e
SHA2561e23a42ae19c0af2b300a0c54c8a2c24b715c2b6bca54036b8bc1ffc9527a78a
SHA51246a713923897e3521b801a7ad20bdcc0efc2a5fc472971f63a23516fe0ccf5d18d7092edc5e1c0b68122568272ee2c28adff800df5a57dc4bf95df228427f502
-
Filesize
95KB
MD54824013ad6248b65ffdd7c36dd19caae
SHA1d75ac4307bcf70cc6ae1daafff9c9abe2f2c05eb
SHA256bc6f82aed760de6a39ce9663ea85cd7b204eb4f3297842632f0fcb3248cc4cb4
SHA51267fca6e2f61e0819d319a42e975faf2502c8e0e0a20ef30c653015738cb4cb59546a9f5e8290058c04325dc5488f9cfa357decef96624fd2780ac4f820082f91