Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
29-07-2024 14:00
Static task
static1
Behavioral task
behavioral1
Sample
4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe
-
Size
164KB
-
MD5
4ab7f450124b7b4400bf866243d41a19
-
SHA1
37d2b935cfb5424f675aa707efc29e0a526a59f9
-
SHA256
573032a583013a819dc46f1040e37506f700ddec7ac92f4292ce79a83d48c92f
-
SHA512
cc13ce5852f6297820f59114135f0cfbe0131a4542761b6f3a875d6ed501086257406faa31f16e1e4521d06814e1720a6abe3b270c39aeb4dc6b94a6eb71b42c
-
SSDEEP
3072:bk/swoSzoh+vZ9oT8t4LYoH9KYlBe5wAAGOKRkRiYfkQdjLY1SprO:zAZ9oT8ttggYwwAcRy
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 620 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 900 pkcs11.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\WINE 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\Software\Wow6432Node\WINE 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe -
Loads dropped DLL 2 IoCs
pid Process 2424 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe 2424 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Windows\CurrentVersion\Run\pkcs11.exe = "\"C:\\Users\\Admin\\AppData\\Roaming\\Macromedia\\Flash Player\\macromedia.com\\support\\flashplayer\\sys\\pkcs11.exe\"" svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pkcs11.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 34 IoCs
pid Process 2424 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe 2424 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe 2424 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe 2424 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe 2424 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe 2424 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe 2424 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe 2424 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe 2424 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe 2424 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeSecurityPrivilege 2424 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2776 svchost.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2424 wrote to memory of 900 2424 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe 30 PID 2424 wrote to memory of 900 2424 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe 30 PID 2424 wrote to memory of 900 2424 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe 30 PID 2424 wrote to memory of 900 2424 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe 30 PID 2424 wrote to memory of 620 2424 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe 31 PID 2424 wrote to memory of 620 2424 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe 31 PID 2424 wrote to memory of 620 2424 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe 31 PID 2424 wrote to memory of 620 2424 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe 31 PID 900 wrote to memory of 2776 900 pkcs11.exe 33 PID 900 wrote to memory of 2776 900 pkcs11.exe 33 PID 900 wrote to memory of 2776 900 pkcs11.exe 33 PID 900 wrote to memory of 2776 900 pkcs11.exe 33 PID 900 wrote to memory of 2776 900 pkcs11.exe 33 PID 900 wrote to memory of 2776 900 pkcs11.exe 33 PID 900 wrote to memory of 2776 900 pkcs11.exe 33 PID 900 wrote to memory of 2776 900 pkcs11.exe 33 PID 900 wrote to memory of 2124 900 pkcs11.exe 34 PID 900 wrote to memory of 2124 900 pkcs11.exe 34 PID 900 wrote to memory of 2124 900 pkcs11.exe 34 PID 900 wrote to memory of 2124 900 pkcs11.exe 34 PID 900 wrote to memory of 2124 900 pkcs11.exe 34 PID 900 wrote to memory of 2124 900 pkcs11.exe 34 PID 900 wrote to memory of 2124 900 pkcs11.exe 34 PID 900 wrote to memory of 2124 900 pkcs11.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe"1⤵
- Identifies Wine through registry keys
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Users\Admin\AppData\Roaming\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\pkcs11.exe"C:\Users\Admin\AppData\Roaming\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\pkcs11.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:2776
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵
- System Location Discovery: System Language Discovery
PID:2124
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\updc63e4452.bat"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:620
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
277B
MD521344b4239e014b405abfce11ca785cf
SHA1877dc23b0b49826974d73438513bb5fc267af27b
SHA256e7faec219bb31be6d04b25caf0e426061ef969f9171c23a50bbae161bde63572
SHA51261e421a9b96bfc4e682b21570756b6867bc14f47b5923ed3ce0507592dd2f71470a500fd2bde1affdce271b6baff62208ea96b6838a18a28de1a677dfa8e2fbb
-
\Users\Admin\AppData\Roaming\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\pkcs11.exe
Filesize164KB
MD54ab7f450124b7b4400bf866243d41a19
SHA137d2b935cfb5424f675aa707efc29e0a526a59f9
SHA256573032a583013a819dc46f1040e37506f700ddec7ac92f4292ce79a83d48c92f
SHA512cc13ce5852f6297820f59114135f0cfbe0131a4542761b6f3a875d6ed501086257406faa31f16e1e4521d06814e1720a6abe3b270c39aeb4dc6b94a6eb71b42c