Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26-07-2024 13:57
Static task
static1
Behavioral task
behavioral1
Sample
745953afb831abb7adc6507e0230345b_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
745953afb831abb7adc6507e0230345b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
745953afb831abb7adc6507e0230345b_JaffaCakes118.exe
-
Size
277KB
-
MD5
745953afb831abb7adc6507e0230345b
-
SHA1
e134cfb44ad6541e853d9adb0e66aae79ec2b59d
-
SHA256
6e0a9ce17c9c850712a70bc449a6b89e154abfe831bd535c8ee74d0d6ea1b23d
-
SHA512
bdf5e194355d169c72a3b5807d665e66bd58f638459aff21eab47807a78039a03e4cd99750c920da85937edffabd76162f3d25d97bd4f820efe69cf9237077f5
-
SSDEEP
6144:n9crGFFL4EyYlHuoy0zEyEm2h4qgofCD+mPV0:96GZHuoZ0OqgofCam
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
745953afb831abb7adc6507e0230345b_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\4FC9F\\0AED3.exe" 745953afb831abb7adc6507e0230345b_JaffaCakes118.exe -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Executes dropped EXE 1 IoCs
Processes:
39F7.tmppid process 2764 39F7.tmp -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral2/memory/3980-1-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral2/memory/3028-11-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral2/memory/3028-12-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral2/memory/3028-14-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral2/memory/3980-15-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral2/memory/3000-84-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral2/memory/3000-83-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral2/memory/3980-85-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral2/memory/3980-201-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral2/memory/3980-203-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral2/memory/3980-204-0x0000000000400000-0x00000000004A9000-memory.dmp upx -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 1 IoCs
Processes:
745953afb831abb7adc6507e0230345b_JaffaCakes118.exedescription ioc process File opened for modification C:\Program Files (x86)\Internet Explorer\D3A4\39F7.tmp 745953afb831abb7adc6507e0230345b_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
745953afb831abb7adc6507e0230345b_JaffaCakes118.exe39F7.tmpdescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 745953afb831abb7adc6507e0230345b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 39F7.tmp -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
745953afb831abb7adc6507e0230345b_JaffaCakes118.exedescription pid process target process PID 3980 wrote to memory of 3028 3980 745953afb831abb7adc6507e0230345b_JaffaCakes118.exe 745953afb831abb7adc6507e0230345b_JaffaCakes118.exe PID 3980 wrote to memory of 3028 3980 745953afb831abb7adc6507e0230345b_JaffaCakes118.exe 745953afb831abb7adc6507e0230345b_JaffaCakes118.exe PID 3980 wrote to memory of 3028 3980 745953afb831abb7adc6507e0230345b_JaffaCakes118.exe 745953afb831abb7adc6507e0230345b_JaffaCakes118.exe PID 3980 wrote to memory of 3000 3980 745953afb831abb7adc6507e0230345b_JaffaCakes118.exe 745953afb831abb7adc6507e0230345b_JaffaCakes118.exe PID 3980 wrote to memory of 3000 3980 745953afb831abb7adc6507e0230345b_JaffaCakes118.exe 745953afb831abb7adc6507e0230345b_JaffaCakes118.exe PID 3980 wrote to memory of 3000 3980 745953afb831abb7adc6507e0230345b_JaffaCakes118.exe 745953afb831abb7adc6507e0230345b_JaffaCakes118.exe PID 3980 wrote to memory of 2764 3980 745953afb831abb7adc6507e0230345b_JaffaCakes118.exe 39F7.tmp PID 3980 wrote to memory of 2764 3980 745953afb831abb7adc6507e0230345b_JaffaCakes118.exe 39F7.tmp PID 3980 wrote to memory of 2764 3980 745953afb831abb7adc6507e0230345b_JaffaCakes118.exe 39F7.tmp
Processes
-
C:\Users\Admin\AppData\Local\Temp\745953afb831abb7adc6507e0230345b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\745953afb831abb7adc6507e0230345b_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Users\Admin\AppData\Local\Temp\745953afb831abb7adc6507e0230345b_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\745953afb831abb7adc6507e0230345b_JaffaCakes118.exe startC:\Program Files (x86)\Internet Explorer\D3A4\1A5.exe%C:\Program Files (x86)\Internet Explorer\D3A42⤵PID:3028
-
C:\Users\Admin\AppData\Local\Temp\745953afb831abb7adc6507e0230345b_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\745953afb831abb7adc6507e0230345b_JaffaCakes118.exe startC:\Program Files (x86)\9FD0D\lvvm.exe%C:\Program Files (x86)\9FD0D2⤵PID:3000
-
C:\Program Files (x86)\Internet Explorer\D3A4\39F7.tmp"C:\Program Files (x86)\Internet Explorer\D3A4\39F7.tmp"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2764
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
103KB
MD590f14957af4798c13dcdd9f26c0873f6
SHA104fbe889eed77913e58c409582840e8bee606df0
SHA25615ffe721016d1490299956f82a93ec872e7d41526177401a9267f29f331c4647
SHA5128708283efb9e3349a7a13d72d58c1aa3041b8a03928fb94b66db4290d229c1fa637ecc301a0519aac2729257a5c993d34249973e2f7443f04a7202cddb586284
-
Filesize
600B
MD5160bfc6e7f07473421529bc89bdf05eb
SHA111ca4cfe77d94941199803ab062981aff77cf330
SHA2562c2a4c53e5ad5cf99f87f3d031db9096c9071e4ecc5156c851effd9675b2fd7e
SHA5122cccd01405ebde165c7690a5ac11774714d876f495b44d5d09df14339b844e42069a03cefe324a6bfb960f9ea68166abf359e4d87b2fc349f634f627245c59d4
-
Filesize
1KB
MD589b18c0fa40ec9fe23250c727db12c97
SHA173f5b3f664b7269f67d23fc442283a3291f124f6
SHA256d4c3148006bc7703c36e14c64f6830b152328faacdfc774d47e295edd22ca45c
SHA512a5e01059c30d7d291ebd14633c752fd50cb75e5c6f31f60d994afb5a1dfc484ed751f4075df0f175dfd7bf9f6ee09571cabba1adb5bc4a013ba88e8d4ebf9ea1
-
Filesize
996B
MD550b339df03526bb6224be5ac9a435547
SHA145f5efdc60cf1d11e90a9b8ac8178bedf70eb2c9
SHA256984653196f3e63e4aa1b2b61bdcfedef621bfe82326f9e03388135e400dbd4cd
SHA512e883f0279ab2abef98637fd8032c7dda0c4776de0126c84b9177464691f5ef8641ae87327787d9cabf0d46d864166613ea90050f525e80d820f8703aef411fd6