Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25-07-2024 12:18
Behavioral task
behavioral1
Sample
6f8a6d2e951e4c28a64cbcd912bfb6a7_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6f8a6d2e951e4c28a64cbcd912bfb6a7_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6f8a6d2e951e4c28a64cbcd912bfb6a7_JaffaCakes118.exe
-
Size
944KB
-
MD5
6f8a6d2e951e4c28a64cbcd912bfb6a7
-
SHA1
24e803bd053d309a1d9e64fed0e4e499bd701cd2
-
SHA256
be1310dff496b3e1b20b30080ae7eef090ac95a17e3cc10320f73ab1950a7040
-
SHA512
40adbd7b31325ce567da79c79dbb177291a854d28655a10a3b1fc7e8875bec87f7fe77632c3a9e0bf84741a53adb903ffb7acecf6479a364c267bbaf80374ae3
-
SSDEEP
24576:vCvdzE03FHfPydFEnoIyvEBmXKt6UpH3VCE/NN/5w+yV/ACwhwMCOKbaNS3M:avdzf1HfPy4SvEBmNa3kCNN/5wjNACer
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2312 defender.exe -
Loads dropped DLL 2 IoCs
pid Process 2080 6f8a6d2e951e4c28a64cbcd912bfb6a7_JaffaCakes118.exe 2080 6f8a6d2e951e4c28a64cbcd912bfb6a7_JaffaCakes118.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2080-0-0x0000000000400000-0x00000000006DF000-memory.dmp upx behavioral1/files/0x0008000000016fb3-10.dat upx behavioral1/memory/2312-20-0x0000000000400000-0x0000000000A0E000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\Malware Protection = "C:\\ProgramData\\defender.exe" defender.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: defender.exe File opened (read-only) \??\N: defender.exe File opened (read-only) \??\Q: defender.exe File opened (read-only) \??\Z: defender.exe File opened (read-only) \??\L: defender.exe File opened (read-only) \??\P: defender.exe File opened (read-only) \??\V: defender.exe File opened (read-only) \??\Y: defender.exe File opened (read-only) \??\U: defender.exe File opened (read-only) \??\W: defender.exe File opened (read-only) \??\X: defender.exe File opened (read-only) \??\I: defender.exe File opened (read-only) \??\O: defender.exe File opened (read-only) \??\R: defender.exe File opened (read-only) \??\S: defender.exe File opened (read-only) \??\T: defender.exe File opened (read-only) \??\E: defender.exe File opened (read-only) \??\G: defender.exe File opened (read-only) \??\H: defender.exe File opened (read-only) \??\K: defender.exe File opened (read-only) \??\M: defender.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 defender.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6f8a6d2e951e4c28a64cbcd912bfb6a7_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language defender.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2080 6f8a6d2e951e4c28a64cbcd912bfb6a7_JaffaCakes118.exe 2312 defender.exe 2312 defender.exe 2312 defender.exe 2312 defender.exe 2312 defender.exe 2312 defender.exe 2312 defender.exe 2312 defender.exe 2312 defender.exe 2312 defender.exe 2312 defender.exe 2312 defender.exe 2312 defender.exe 2312 defender.exe 2312 defender.exe 2312 defender.exe 2312 defender.exe 2312 defender.exe 2312 defender.exe 2312 defender.exe 2312 defender.exe 2312 defender.exe 2312 defender.exe 2312 defender.exe 2312 defender.exe 2312 defender.exe 2312 defender.exe 2312 defender.exe 2312 defender.exe 2312 defender.exe 2312 defender.exe 2312 defender.exe 2312 defender.exe 2312 defender.exe 2312 defender.exe 2312 defender.exe 2312 defender.exe 2312 defender.exe 2312 defender.exe 2312 defender.exe 2312 defender.exe 2312 defender.exe 2312 defender.exe 2312 defender.exe 2312 defender.exe 2312 defender.exe 2312 defender.exe 2312 defender.exe 2312 defender.exe 2312 defender.exe 2312 defender.exe 2312 defender.exe 2312 defender.exe 2312 defender.exe 2312 defender.exe 2312 defender.exe 2312 defender.exe 2312 defender.exe 2312 defender.exe 2312 defender.exe 2312 defender.exe 2312 defender.exe 2312 defender.exe -
Suspicious use of FindShellTrayWindow 12 IoCs
pid Process 2312 defender.exe 2312 defender.exe 2312 defender.exe 2312 defender.exe 2312 defender.exe 2312 defender.exe 2312 defender.exe 2312 defender.exe 2312 defender.exe 2312 defender.exe 2312 defender.exe 2312 defender.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2312 defender.exe 2312 defender.exe 2312 defender.exe 2312 defender.exe 2312 defender.exe 2312 defender.exe 2312 defender.exe 2312 defender.exe 2312 defender.exe 2312 defender.exe 2312 defender.exe 2312 defender.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2312 defender.exe 2312 defender.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2312 2080 6f8a6d2e951e4c28a64cbcd912bfb6a7_JaffaCakes118.exe 31 PID 2080 wrote to memory of 2312 2080 6f8a6d2e951e4c28a64cbcd912bfb6a7_JaffaCakes118.exe 31 PID 2080 wrote to memory of 2312 2080 6f8a6d2e951e4c28a64cbcd912bfb6a7_JaffaCakes118.exe 31 PID 2080 wrote to memory of 2312 2080 6f8a6d2e951e4c28a64cbcd912bfb6a7_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f8a6d2e951e4c28a64cbcd912bfb6a7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6f8a6d2e951e4c28a64cbcd912bfb6a7_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\ProgramData\defender.exeC:\ProgramData\defender.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2312
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
861KB
MD540258e43c3c28f4d5905ab69f56db6f7
SHA18433b28760312fc2bd61afdd13bf5bca8e854068
SHA256c607dce4796c320e5f575d9a6c3ce33079324f4203561b19317d9b9e4d588c27
SHA512713f94306abb467c7fc35bf67f83addc2b00cde7a2711fe36c5145579031c4f6aa94f94eecda3f3adaa14d1049014725c71e8b3d7638966521f1e956f4fa9b1e