Analysis
-
max time kernel
149s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
29-07-2024 14:00
Static task
static1
Behavioral task
behavioral1
Sample
4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe
-
Size
164KB
-
MD5
4ab7f450124b7b4400bf866243d41a19
-
SHA1
37d2b935cfb5424f675aa707efc29e0a526a59f9
-
SHA256
573032a583013a819dc46f1040e37506f700ddec7ac92f4292ce79a83d48c92f
-
SHA512
cc13ce5852f6297820f59114135f0cfbe0131a4542761b6f3a875d6ed501086257406faa31f16e1e4521d06814e1720a6abe3b270c39aeb4dc6b94a6eb71b42c
-
SSDEEP
3072:bk/swoSzoh+vZ9oT8t4LYoH9KYlBe5wAAGOKRkRiYfkQdjLY1SprO:zAZ9oT8ttggYwwAcRy
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Windows PowerShell (x86).exepid process 4860 Windows PowerShell (x86).exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Software\WINE 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\WINE 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows PowerShell (x86).exe = "\"C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Acrobat\\DC\\Security\\Windows PowerShell (x86).exe\"" svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exeWindows PowerShell (x86).execmd.exesvchost.exesvchost.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Windows PowerShell (x86).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 44 IoCs
Processes:
4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exesvchost.exepid process 5036 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe 5036 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe 5036 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe 5036 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe 5036 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe 5036 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe 5036 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe 5036 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe 5036 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe 5036 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe 5036 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe 5036 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe 5036 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe 5036 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe 5036 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe 5036 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe 5036 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe 5036 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe 5036 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe 5036 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe 3688 svchost.exe 3688 svchost.exe 3688 svchost.exe 3688 svchost.exe 3688 svchost.exe 3688 svchost.exe 3688 svchost.exe 3688 svchost.exe 3688 svchost.exe 3688 svchost.exe 3688 svchost.exe 3688 svchost.exe 3688 svchost.exe 3688 svchost.exe 3688 svchost.exe 3688 svchost.exe 3688 svchost.exe 3688 svchost.exe 3688 svchost.exe 3688 svchost.exe 3688 svchost.exe 3688 svchost.exe 3688 svchost.exe 3688 svchost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exedescription pid process Token: SeSecurityPrivilege 5036 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exeWindows PowerShell (x86).exedescription pid process target process PID 5036 wrote to memory of 4860 5036 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe Windows PowerShell (x86).exe PID 5036 wrote to memory of 4860 5036 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe Windows PowerShell (x86).exe PID 5036 wrote to memory of 4860 5036 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe Windows PowerShell (x86).exe PID 5036 wrote to memory of 972 5036 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe cmd.exe PID 5036 wrote to memory of 972 5036 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe cmd.exe PID 5036 wrote to memory of 972 5036 4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe cmd.exe PID 4860 wrote to memory of 3688 4860 Windows PowerShell (x86).exe svchost.exe PID 4860 wrote to memory of 3688 4860 Windows PowerShell (x86).exe svchost.exe PID 4860 wrote to memory of 3688 4860 Windows PowerShell (x86).exe svchost.exe PID 4860 wrote to memory of 3688 4860 Windows PowerShell (x86).exe svchost.exe PID 4860 wrote to memory of 3688 4860 Windows PowerShell (x86).exe svchost.exe PID 4860 wrote to memory of 3688 4860 Windows PowerShell (x86).exe svchost.exe PID 4860 wrote to memory of 3688 4860 Windows PowerShell (x86).exe svchost.exe PID 4860 wrote to memory of 1936 4860 Windows PowerShell (x86).exe svchost.exe PID 4860 wrote to memory of 1936 4860 Windows PowerShell (x86).exe svchost.exe PID 4860 wrote to memory of 1936 4860 Windows PowerShell (x86).exe svchost.exe PID 4860 wrote to memory of 1936 4860 Windows PowerShell (x86).exe svchost.exe PID 4860 wrote to memory of 1936 4860 Windows PowerShell (x86).exe svchost.exe PID 4860 wrote to memory of 1936 4860 Windows PowerShell (x86).exe svchost.exe PID 4860 wrote to memory of 1936 4860 Windows PowerShell (x86).exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4ab7f450124b7b4400bf866243d41a19_JaffaCakes118.exe"1⤵
- Identifies Wine through registry keys
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\DC\Security\Windows PowerShell (x86).exe"C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\DC\Security\Windows PowerShell (x86).exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3688
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵
- System Location Discovery: System Language Discovery
PID:1936
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\upd7da13a5d.bat"2⤵
- System Location Discovery: System Language Discovery
PID:972
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
277B
MD56b47bc2933af420bde867ae25978778b
SHA102d9009cbec2d664d73f18e8b01e9716db9fd1ba
SHA256ea37ca4018cccabbbb8148c90cd2f4e0691c4577b05e3ae61cdcbf60ef269f92
SHA512e65730fdf97c7c657c2346fce6e86919e36fa44bd1ec6114a7cfa90279232393a70edab580dce4c0d358863f8c82883d890dd701940fa3b11304fd218f484c7b
-
Filesize
164KB
MD54ab7f450124b7b4400bf866243d41a19
SHA137d2b935cfb5424f675aa707efc29e0a526a59f9
SHA256573032a583013a819dc46f1040e37506f700ddec7ac92f4292ce79a83d48c92f
SHA512cc13ce5852f6297820f59114135f0cfbe0131a4542761b6f3a875d6ed501086257406faa31f16e1e4521d06814e1720a6abe3b270c39aeb4dc6b94a6eb71b42c