Analysis
-
max time kernel
141s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25-07-2024 18:11
Static task
static1
Behavioral task
behavioral1
Sample
70af6e25e0549f794eeaf255cb5af763_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
70af6e25e0549f794eeaf255cb5af763_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
70af6e25e0549f794eeaf255cb5af763_JaffaCakes118.exe
-
Size
285KB
-
MD5
70af6e25e0549f794eeaf255cb5af763
-
SHA1
ddc55e4f18027f01b06e0921ca3eb7df6d9517f8
-
SHA256
7a2ed84f9927c8e4ab548c6e6dd969962a79a931199ac67d410c57b857852e73
-
SHA512
c907c0cf6652a79f6a9774dbfc722f74726cb0253786d09fb1e75f997d7aa1fab352053353efd355d8fb7b3943502d9ce77d1e8ee56e943cbb87b8de93ba745e
-
SSDEEP
6144:6Ul6WH9PeIvBF/pIR9sEPs+djj0+g9xZnlBeli:wyXv7/wts+djQ+g9x7
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
Processes:
70af6e25e0549f794eeaf255cb5af763_JaffaCakes118.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" 70af6e25e0549f794eeaf255cb5af763_JaffaCakes118.exe -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
Processes:
7713.tmppid process 2948 7713.tmp -
Loads dropped DLL 2 IoCs
Processes:
70af6e25e0549f794eeaf255cb5af763_JaffaCakes118.exepid process 2636 70af6e25e0549f794eeaf255cb5af763_JaffaCakes118.exe 2636 70af6e25e0549f794eeaf255cb5af763_JaffaCakes118.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral1/memory/2636-2-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2636-1-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2636-11-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/484-13-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/484-14-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2636-126-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1244-130-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1244-128-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2636-131-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2636-310-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2636-314-0x0000000000400000-0x000000000046B000-memory.dmp upx -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
70af6e25e0549f794eeaf255cb5af763_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\8C1.exe = "C:\\Program Files (x86)\\LP\\CB0A\\8C1.exe" 70af6e25e0549f794eeaf255cb5af763_JaffaCakes118.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 3 IoCs
Processes:
70af6e25e0549f794eeaf255cb5af763_JaffaCakes118.exedescription ioc process File created C:\Program Files (x86)\LP\CB0A\8C1.exe 70af6e25e0549f794eeaf255cb5af763_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\LP\CB0A\8C1.exe 70af6e25e0549f794eeaf255cb5af763_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\LP\CB0A\7713.tmp 70af6e25e0549f794eeaf255cb5af763_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
70af6e25e0549f794eeaf255cb5af763_JaffaCakes118.exe70af6e25e0549f794eeaf255cb5af763_JaffaCakes118.exe70af6e25e0549f794eeaf255cb5af763_JaffaCakes118.exe7713.tmpdescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 70af6e25e0549f794eeaf255cb5af763_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 70af6e25e0549f794eeaf255cb5af763_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 70af6e25e0549f794eeaf255cb5af763_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7713.tmp -
Modifies registry class 5 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
70af6e25e0549f794eeaf255cb5af763_JaffaCakes118.exepid process 2636 70af6e25e0549f794eeaf255cb5af763_JaffaCakes118.exe 2636 70af6e25e0549f794eeaf255cb5af763_JaffaCakes118.exe 2636 70af6e25e0549f794eeaf255cb5af763_JaffaCakes118.exe 2636 70af6e25e0549f794eeaf255cb5af763_JaffaCakes118.exe 2636 70af6e25e0549f794eeaf255cb5af763_JaffaCakes118.exe 2636 70af6e25e0549f794eeaf255cb5af763_JaffaCakes118.exe 2636 70af6e25e0549f794eeaf255cb5af763_JaffaCakes118.exe 2636 70af6e25e0549f794eeaf255cb5af763_JaffaCakes118.exe 2636 70af6e25e0549f794eeaf255cb5af763_JaffaCakes118.exe 2636 70af6e25e0549f794eeaf255cb5af763_JaffaCakes118.exe 2636 70af6e25e0549f794eeaf255cb5af763_JaffaCakes118.exe 2636 70af6e25e0549f794eeaf255cb5af763_JaffaCakes118.exe 2636 70af6e25e0549f794eeaf255cb5af763_JaffaCakes118.exe 2636 70af6e25e0549f794eeaf255cb5af763_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
explorer.exepid process 1632 explorer.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
Processes:
msiexec.exeexplorer.exedescription pid process Token: SeRestorePrivilege 2820 msiexec.exe Token: SeTakeOwnershipPrivilege 2820 msiexec.exe Token: SeSecurityPrivilege 2820 msiexec.exe Token: SeShutdownPrivilege 1632 explorer.exe Token: SeShutdownPrivilege 1632 explorer.exe Token: SeShutdownPrivilege 1632 explorer.exe Token: SeShutdownPrivilege 1632 explorer.exe Token: SeShutdownPrivilege 1632 explorer.exe Token: SeShutdownPrivilege 1632 explorer.exe Token: SeShutdownPrivilege 1632 explorer.exe Token: SeShutdownPrivilege 1632 explorer.exe Token: SeShutdownPrivilege 1632 explorer.exe Token: SeShutdownPrivilege 1632 explorer.exe Token: SeShutdownPrivilege 1632 explorer.exe Token: SeShutdownPrivilege 1632 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
Processes:
explorer.exepid process 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe -
Suspicious use of SendNotifyMessage 22 IoCs
Processes:
explorer.exepid process 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe 1632 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
70af6e25e0549f794eeaf255cb5af763_JaffaCakes118.exedescription pid process target process PID 2636 wrote to memory of 484 2636 70af6e25e0549f794eeaf255cb5af763_JaffaCakes118.exe 70af6e25e0549f794eeaf255cb5af763_JaffaCakes118.exe PID 2636 wrote to memory of 484 2636 70af6e25e0549f794eeaf255cb5af763_JaffaCakes118.exe 70af6e25e0549f794eeaf255cb5af763_JaffaCakes118.exe PID 2636 wrote to memory of 484 2636 70af6e25e0549f794eeaf255cb5af763_JaffaCakes118.exe 70af6e25e0549f794eeaf255cb5af763_JaffaCakes118.exe PID 2636 wrote to memory of 484 2636 70af6e25e0549f794eeaf255cb5af763_JaffaCakes118.exe 70af6e25e0549f794eeaf255cb5af763_JaffaCakes118.exe PID 2636 wrote to memory of 1244 2636 70af6e25e0549f794eeaf255cb5af763_JaffaCakes118.exe 70af6e25e0549f794eeaf255cb5af763_JaffaCakes118.exe PID 2636 wrote to memory of 1244 2636 70af6e25e0549f794eeaf255cb5af763_JaffaCakes118.exe 70af6e25e0549f794eeaf255cb5af763_JaffaCakes118.exe PID 2636 wrote to memory of 1244 2636 70af6e25e0549f794eeaf255cb5af763_JaffaCakes118.exe 70af6e25e0549f794eeaf255cb5af763_JaffaCakes118.exe PID 2636 wrote to memory of 1244 2636 70af6e25e0549f794eeaf255cb5af763_JaffaCakes118.exe 70af6e25e0549f794eeaf255cb5af763_JaffaCakes118.exe PID 2636 wrote to memory of 2948 2636 70af6e25e0549f794eeaf255cb5af763_JaffaCakes118.exe 7713.tmp PID 2636 wrote to memory of 2948 2636 70af6e25e0549f794eeaf255cb5af763_JaffaCakes118.exe 7713.tmp PID 2636 wrote to memory of 2948 2636 70af6e25e0549f794eeaf255cb5af763_JaffaCakes118.exe 7713.tmp PID 2636 wrote to memory of 2948 2636 70af6e25e0549f794eeaf255cb5af763_JaffaCakes118.exe 7713.tmp -
System policy modification 1 TTPs 2 IoCs
Processes:
70af6e25e0549f794eeaf255cb5af763_JaffaCakes118.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 70af6e25e0549f794eeaf255cb5af763_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" 70af6e25e0549f794eeaf255cb5af763_JaffaCakes118.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\70af6e25e0549f794eeaf255cb5af763_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\70af6e25e0549f794eeaf255cb5af763_JaffaCakes118.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\70af6e25e0549f794eeaf255cb5af763_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\70af6e25e0549f794eeaf255cb5af763_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\AF0AD\2D1CB.exe%C:\Users\Admin\AppData\Roaming\AF0AD2⤵
- System Location Discovery: System Language Discovery
PID:484 -
C:\Users\Admin\AppData\Local\Temp\70af6e25e0549f794eeaf255cb5af763_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\70af6e25e0549f794eeaf255cb5af763_JaffaCakes118.exe startC:\Program Files (x86)\AD099\lvvm.exe%C:\Program Files (x86)\AD0992⤵
- System Location Discovery: System Language Discovery
PID:1244 -
C:\Program Files (x86)\LP\CB0A\7713.tmp"C:\Program Files (x86)\LP\CB0A\7713.tmp"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2948
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2820
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1632
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD5046a274c693a3e888efb59a2e74b1a19
SHA1f7b30d0d18e54d082ad5971f89f5c3b0f917eb22
SHA256fc68cfe468f23abcdbc44fddb484a27e7ffa0534c09983eabb13b645133e7952
SHA51275acceeddd4a7e8f72577bef368f89511d86c180a8bbe6bd52277ef22c7e9e48c3883b3f00de172fc33f3ed55923ac7f72a1e161cffdc56c0bba25035f69af46
-
Filesize
1KB
MD5899051d611811a0884cb07608a48b356
SHA18c3d35592b631321037bcf57107efb8ace3927fb
SHA2566fbaa99e2dbcb94feab382c86d52c26b6d4b5d6118827e8faf461e776243591f
SHA512fb08e1f591a06c609b555ac4fcfaf9d0a16b4832fa018c772ca1b513a8703d5d0e81eed121b10b8a412f5ac722aadcbc539762754211be9dc5f591d55322bb51
-
Filesize
600B
MD5d00fc33997ffaf394ad51d0c722fbfe3
SHA1d1285a16dd935a1321f4a9ac0a67af4edb774ca4
SHA25639b95a340f0ffb7653a5a994d70bd396738ff0b58c4679752863165d7b09ca34
SHA512cc8ab49f7c4c4688027bcebe864adb2906d6bd42aab536cc67a86f2697782fb90b84c862145eae7dc0ce57566f9c1a98cd48d7c7070f657edb84b238750bab1d
-
Filesize
100KB
MD5340f18faddf54d738f6e56fe3d8b1d54
SHA1bb247a2f8db305906d558c0c665cc7fd7f86ff67
SHA2564613dcf13e53312b483bfebb7866b9e1111c434beabd1b19a03721ab7a2ec572
SHA512e47e375ec6c8cd07411da44cec52c35c1c28e3fce9d09acf390371ea6b1c456e1d43f87d7b5de6f8ba9b233d11caf25cfd5b4890f356b510688286322d7cab74