Analysis
-
max time kernel
142s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26-07-2024 10:23
Static task
static1
Behavioral task
behavioral1
Sample
73a6a11c2d266a38c47231cf08185cdf_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
73a6a11c2d266a38c47231cf08185cdf_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
73a6a11c2d266a38c47231cf08185cdf_JaffaCakes118.exe
-
Size
276KB
-
MD5
73a6a11c2d266a38c47231cf08185cdf
-
SHA1
788d49570ac3369daa5ece2eda1be818f0273b10
-
SHA256
3ef340e711b406fba665954a9500b27a99f6940cc20a5ecf1404922c2f985a1b
-
SHA512
dccc86cd3e9d83785a31990c85d68df3df5e0d9f430ab8287317a674f53e72bb46d7c7130e544490904b037c172a180a3f8b4f0a71ee34f5011b9b3ecd3f930a
-
SSDEEP
6144:r3LzKycO8rWSfSgl5U+7KhSpuehkv8dnb9YTlCYHTR9:Xzdhg7fKYkcne119
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
Processes:
73a6a11c2d266a38c47231cf08185cdf_JaffaCakes118.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" 73a6a11c2d266a38c47231cf08185cdf_JaffaCakes118.exe -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
Processes:
1584.tmppid process 616 1584.tmp -
Loads dropped DLL 2 IoCs
Processes:
73a6a11c2d266a38c47231cf08185cdf_JaffaCakes118.exepid process 2416 73a6a11c2d266a38c47231cf08185cdf_JaffaCakes118.exe 2416 73a6a11c2d266a38c47231cf08185cdf_JaffaCakes118.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral1/memory/2416-2-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2416-3-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2416-15-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2268-16-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2268-19-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2268-17-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2972-192-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2416-193-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2416-316-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2416-321-0x0000000000400000-0x000000000046A000-memory.dmp upx -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
73a6a11c2d266a38c47231cf08185cdf_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\BE0.exe = "C:\\Program Files (x86)\\LP\\2A94\\BE0.exe" 73a6a11c2d266a38c47231cf08185cdf_JaffaCakes118.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 3 IoCs
Processes:
73a6a11c2d266a38c47231cf08185cdf_JaffaCakes118.exedescription ioc process File created C:\Program Files (x86)\LP\2A94\BE0.exe 73a6a11c2d266a38c47231cf08185cdf_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\LP\2A94\BE0.exe 73a6a11c2d266a38c47231cf08185cdf_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\LP\2A94\1584.tmp 73a6a11c2d266a38c47231cf08185cdf_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
Processes:
explorer.exedescription ioc process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
73a6a11c2d266a38c47231cf08185cdf_JaffaCakes118.exe1584.tmpdescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 73a6a11c2d266a38c47231cf08185cdf_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1584.tmp -
Modifies registry class 5 IoCs
Processes:
explorer.exedescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
73a6a11c2d266a38c47231cf08185cdf_JaffaCakes118.exepid process 2416 73a6a11c2d266a38c47231cf08185cdf_JaffaCakes118.exe 2416 73a6a11c2d266a38c47231cf08185cdf_JaffaCakes118.exe 2416 73a6a11c2d266a38c47231cf08185cdf_JaffaCakes118.exe 2416 73a6a11c2d266a38c47231cf08185cdf_JaffaCakes118.exe 2416 73a6a11c2d266a38c47231cf08185cdf_JaffaCakes118.exe 2416 73a6a11c2d266a38c47231cf08185cdf_JaffaCakes118.exe 2416 73a6a11c2d266a38c47231cf08185cdf_JaffaCakes118.exe 2416 73a6a11c2d266a38c47231cf08185cdf_JaffaCakes118.exe 2416 73a6a11c2d266a38c47231cf08185cdf_JaffaCakes118.exe 2416 73a6a11c2d266a38c47231cf08185cdf_JaffaCakes118.exe 2416 73a6a11c2d266a38c47231cf08185cdf_JaffaCakes118.exe 2416 73a6a11c2d266a38c47231cf08185cdf_JaffaCakes118.exe 2416 73a6a11c2d266a38c47231cf08185cdf_JaffaCakes118.exe 2416 73a6a11c2d266a38c47231cf08185cdf_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
explorer.exepid process 1452 explorer.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
Processes:
msiexec.exeexplorer.exedescription pid process Token: SeRestorePrivilege 1724 msiexec.exe Token: SeTakeOwnershipPrivilege 1724 msiexec.exe Token: SeSecurityPrivilege 1724 msiexec.exe Token: SeShutdownPrivilege 1452 explorer.exe Token: SeShutdownPrivilege 1452 explorer.exe Token: SeShutdownPrivilege 1452 explorer.exe Token: SeShutdownPrivilege 1452 explorer.exe Token: SeShutdownPrivilege 1452 explorer.exe Token: SeShutdownPrivilege 1452 explorer.exe Token: SeShutdownPrivilege 1452 explorer.exe Token: SeShutdownPrivilege 1452 explorer.exe Token: SeShutdownPrivilege 1452 explorer.exe Token: SeShutdownPrivilege 1452 explorer.exe Token: SeShutdownPrivilege 1452 explorer.exe Token: SeShutdownPrivilege 1452 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
Processes:
explorer.exepid process 1452 explorer.exe 1452 explorer.exe 1452 explorer.exe 1452 explorer.exe 1452 explorer.exe 1452 explorer.exe 1452 explorer.exe 1452 explorer.exe 1452 explorer.exe 1452 explorer.exe 1452 explorer.exe 1452 explorer.exe 1452 explorer.exe 1452 explorer.exe 1452 explorer.exe 1452 explorer.exe 1452 explorer.exe 1452 explorer.exe 1452 explorer.exe 1452 explorer.exe 1452 explorer.exe 1452 explorer.exe 1452 explorer.exe 1452 explorer.exe 1452 explorer.exe 1452 explorer.exe 1452 explorer.exe 1452 explorer.exe -
Suspicious use of SendNotifyMessage 16 IoCs
Processes:
explorer.exepid process 1452 explorer.exe 1452 explorer.exe 1452 explorer.exe 1452 explorer.exe 1452 explorer.exe 1452 explorer.exe 1452 explorer.exe 1452 explorer.exe 1452 explorer.exe 1452 explorer.exe 1452 explorer.exe 1452 explorer.exe 1452 explorer.exe 1452 explorer.exe 1452 explorer.exe 1452 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
73a6a11c2d266a38c47231cf08185cdf_JaffaCakes118.exedescription pid process target process PID 2416 wrote to memory of 2268 2416 73a6a11c2d266a38c47231cf08185cdf_JaffaCakes118.exe 73a6a11c2d266a38c47231cf08185cdf_JaffaCakes118.exe PID 2416 wrote to memory of 2268 2416 73a6a11c2d266a38c47231cf08185cdf_JaffaCakes118.exe 73a6a11c2d266a38c47231cf08185cdf_JaffaCakes118.exe PID 2416 wrote to memory of 2268 2416 73a6a11c2d266a38c47231cf08185cdf_JaffaCakes118.exe 73a6a11c2d266a38c47231cf08185cdf_JaffaCakes118.exe PID 2416 wrote to memory of 2268 2416 73a6a11c2d266a38c47231cf08185cdf_JaffaCakes118.exe 73a6a11c2d266a38c47231cf08185cdf_JaffaCakes118.exe PID 2416 wrote to memory of 2972 2416 73a6a11c2d266a38c47231cf08185cdf_JaffaCakes118.exe 73a6a11c2d266a38c47231cf08185cdf_JaffaCakes118.exe PID 2416 wrote to memory of 2972 2416 73a6a11c2d266a38c47231cf08185cdf_JaffaCakes118.exe 73a6a11c2d266a38c47231cf08185cdf_JaffaCakes118.exe PID 2416 wrote to memory of 2972 2416 73a6a11c2d266a38c47231cf08185cdf_JaffaCakes118.exe 73a6a11c2d266a38c47231cf08185cdf_JaffaCakes118.exe PID 2416 wrote to memory of 2972 2416 73a6a11c2d266a38c47231cf08185cdf_JaffaCakes118.exe 73a6a11c2d266a38c47231cf08185cdf_JaffaCakes118.exe PID 2416 wrote to memory of 616 2416 73a6a11c2d266a38c47231cf08185cdf_JaffaCakes118.exe 1584.tmp PID 2416 wrote to memory of 616 2416 73a6a11c2d266a38c47231cf08185cdf_JaffaCakes118.exe 1584.tmp PID 2416 wrote to memory of 616 2416 73a6a11c2d266a38c47231cf08185cdf_JaffaCakes118.exe 1584.tmp PID 2416 wrote to memory of 616 2416 73a6a11c2d266a38c47231cf08185cdf_JaffaCakes118.exe 1584.tmp -
System policy modification 1 TTPs 2 IoCs
Processes:
73a6a11c2d266a38c47231cf08185cdf_JaffaCakes118.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 73a6a11c2d266a38c47231cf08185cdf_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" 73a6a11c2d266a38c47231cf08185cdf_JaffaCakes118.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\73a6a11c2d266a38c47231cf08185cdf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\73a6a11c2d266a38c47231cf08185cdf_JaffaCakes118.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\73a6a11c2d266a38c47231cf08185cdf_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\73a6a11c2d266a38c47231cf08185cdf_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\4902F\6212A.exe%C:\Users\Admin\AppData\Roaming\4902F2⤵PID:2268
-
C:\Users\Admin\AppData\Local\Temp\73a6a11c2d266a38c47231cf08185cdf_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\73a6a11c2d266a38c47231cf08185cdf_JaffaCakes118.exe startC:\Program Files (x86)\2F985\lvvm.exe%C:\Program Files (x86)\2F9852⤵PID:2972
-
C:\Program Files (x86)\LP\2A94\1584.tmp"C:\Program Files (x86)\LP\2A94\1584.tmp"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:616
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1724
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1452
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b9439bf1f4337f471f401646f4c8b1bf
SHA11179608aa27f7fc59ed7ee3f9a4ac21d86341e5a
SHA256653d14f804160ac95aba63080213d7b7029f4e2b9da0dcccdb2aeeaee08f6b60
SHA51243d89623f7d0e1a934486f6cab949a640cdb6a04971ef69c63d875c86b5520efdf1820c13441e495c336a7323877a082addc9eac89d9a713524fbc9b532c73d7
-
Filesize
600B
MD56378e2192f2a9e4db4fdf727646490be
SHA1f1bae4664192fedac60df3f8ffa4d1eeaba68f6f
SHA25627a35d71afc0583ee44e2bb9c4fb646674e4b0c32ed0cb9e4cd75fa7f0ffafe8
SHA512b2289d71cb6dc8dd3e1bbd07e71f17137f48791e44737042f610e05ed9840502bab652c115a2869a19f7a767b166d9ea27fade4bb3a7aa94a7af7cedec4b2e44
-
Filesize
97KB
MD534476c6ae3f87f799aa672ae62ce8b13
SHA1052eecd19bd28180c29c910c486ac27cd7ee9e93
SHA25697566dea7d7b2be42810a4f390d728232a2e046c32c13e768ec8d247c8841fc5
SHA512681e1d3007402a03546880697f99b48ea0fab5febb88b16466902518c806a0c66a85ec3b5e897e46cd715cd404c06257401ce39d20bdce13086db4d177739bb1