Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
10-08-2024 23:06
Static task
static1
Behavioral task
behavioral1
Sample
8809858de680c7a36e1bc0972c1847ef_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8809858de680c7a36e1bc0972c1847ef_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8809858de680c7a36e1bc0972c1847ef_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
8809858de680c7a36e1bc0972c1847ef
-
SHA1
943cb9e9365bf92fa0ad9c06bc63caaa77815b05
-
SHA256
d8ece9627b3f6ee7906b6dea24a52ecf0c6dbac3f5da250f653b9a418e464ef1
-
SHA512
edaa89705d61ce71cbf114b8a92c46158d1ff0e31bd3ecb596b3ea3e2520bffcec4c8082d37fa765452486dc6988755c4724ffdba88ab4433443ae8c3cd3d2a7
-
SSDEEP
24576:icZKZGKzir+ldqvxmlvSFaGV4JmnLS229XPlIUrQIGPk8Puyp:i2KIgir+nqnMMCpXP5r5Gw4
Malware Config
Signatures
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload 1 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\ist.exe family_isrstealer -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Executes dropped EXE 4 IoCs
Processes:
ist.exeist.exeEasy Binder.exetemp.exepid process 3044 ist.exe 2616 ist.exe 2612 Easy Binder.exe 2128 temp.exe -
Loads dropped DLL 14 IoCs
Processes:
8809858de680c7a36e1bc0972c1847ef_JaffaCakes118.exeist.exeist.exetemp.exepid process 2056 8809858de680c7a36e1bc0972c1847ef_JaffaCakes118.exe 2056 8809858de680c7a36e1bc0972c1847ef_JaffaCakes118.exe 3044 ist.exe 3044 ist.exe 3044 ist.exe 3044 ist.exe 2056 8809858de680c7a36e1bc0972c1847ef_JaffaCakes118.exe 2056 8809858de680c7a36e1bc0972c1847ef_JaffaCakes118.exe 2616 ist.exe 2616 ist.exe 2616 ist.exe 2128 temp.exe 2128 temp.exe 2128 temp.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral1/memory/2616-18-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/2616-33-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/2616-26-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/2616-35-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/2616-34-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/2616-263-0x0000000000400000-0x0000000000453000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
Processes:
ist.exedescription pid process target process PID 3044 set thread context of 2616 3044 ist.exe ist.exe -
Drops file in Windows directory 64 IoCs
Processes:
temp.exedescription ioc process File created C:\Windows\EasyBind\Contrib\UIs\modern_nodesc.exe temp.exe File opened for modification C:\Windows\EasyBind\Contrib\UIs\sdbarker_tiny.exe temp.exe File opened for modification C:\Windows\EasyBind\Include\Registry.nsh temp.exe File opened for modification C:\Windows\EasyBind\Include\WinVer.nsh temp.exe File opened for modification C:\Windows\EasyBind\Contrib\Language files\Farsi.nlf temp.exe File opened for modification C:\Windows\EasyBind\Contrib\Language files\Malay.nlf temp.exe File created C:\Windows\EasyBind\Contrib\UIs\modern_headerbmpr.exe temp.exe File opened for modification C:\Windows\EasyBind\Contrib\Language files temp.exe File created C:\Windows\EasyBind\Contrib\Language files\Icelandic.nlf temp.exe File opened for modification C:\Windows\EasyBind\Contrib\Language files\Norwegian.nlf temp.exe File opened for modification C:\Windows\EasyBind\Contrib\Language files\Macedonian.nlf temp.exe File created C:\Windows\EasyBind\Contrib\Language files\Spanish.nlf temp.exe File created C:\Windows\EasyBind\Include\StrFunc.nsh temp.exe File created C:\Windows\EasyBind\Stubs\lzma temp.exe File opened for modification C:\Windows\EasyBind\Contrib\Language files\Polish.nlf temp.exe File created C:\Windows\EasyBind\Include\WinMessages.nsh temp.exe File created C:\Windows\EasyBind\Plugins\Registry.dll temp.exe File created C:\Windows\EasyBind\Contrib\Language files\Greek.nlf temp.exe File created C:\Windows\EasyBind\nsisconf.nsh temp.exe File created C:\Windows\EasyBind\Plugins\InstallOptions.dll temp.exe File created C:\Windows\EasyBind\Contrib\Language files\NorwegianNynorsk.nlf temp.exe File opened for modification C:\Windows\EasyBind\Plugins\InstallOptions.dll temp.exe File created C:\Windows\EasyBind\Plugins\UserInfo.dll temp.exe File created C:\Windows\EasyBind\Contrib\Language files\Belarusian.nlf temp.exe File created C:\Windows\EasyBind\Contrib\Language files\Japanese.nlf temp.exe File opened for modification C:\Windows\EasyBind\Contrib\Language files\Latvian.nlf temp.exe File opened for modification C:\Windows\EasyBind\Contrib\Language files\German.nlf temp.exe File opened for modification C:\Windows\EasyBind\Contrib\Language files\Hungarian.nlf temp.exe File opened for modification C:\Windows\EasyBind\Contrib\Language files\SimpChinese.nlf temp.exe File created C:\Windows\EasyBind\Contrib\Language files\Uzbek.nlf temp.exe File opened for modification C:\Windows\EasyBind\Include\FileFunc.nsh temp.exe File opened for modification C:\Windows\EasyBind\Contrib\Language files\Arabic.nlf temp.exe File created C:\Windows\EasyBind\Contrib\Language files\Bulgarian.nlf temp.exe File created C:\Windows\EasyBind\Contrib\Language files\French.nlf temp.exe File opened for modification C:\Windows\EasyBind\Plugins\BgImage.dll temp.exe File opened for modification C:\Windows\EasyBind\Stubs\zlib_solid temp.exe File opened for modification C:\Windows\EasyBind\Plugins\FindProcDLL.dll temp.exe File created C:\Windows\EasyBind\Plugins\StartMenu.dll temp.exe File opened for modification C:\Windows\EasyBind\Stubs temp.exe File created C:\Windows\EasyBind\Stubs\uninst temp.exe File created C:\Windows\EasyBind\Contrib\Language files\Catalan.nlf temp.exe File created C:\Windows\EasyBind\Contrib\Language files\Finnish.nlf temp.exe File opened for modification C:\Windows\EasyBind\Include\WordFunc.nsh temp.exe File created C:\Windows\EasyBind\Include\Sections.nsh temp.exe File created C:\Windows\EasyBind\Plugins\Banner.dll temp.exe File opened for modification C:\Windows\EasyBind\Contrib\Language files\Greek.nlf temp.exe File opened for modification C:\Windows\EasyBind\Contrib\Language files\Indonesian.nlf temp.exe File opened for modification C:\Windows\EasyBind\Contrib\Language files\Japanese.nlf temp.exe File opened for modification C:\Windows\EasyBind\Stubs\uninst temp.exe File created C:\Windows\EasyBind\Contrib\Language files\Kurdish.nlf temp.exe File opened for modification C:\Windows\EasyBind\Contrib\Language files\Valencian.nlf temp.exe File created C:\Windows\EasyBind\Include\MUI.nsh temp.exe File created C:\Windows\EasyBind\Contrib\Language files\Bosnian.nlf temp.exe File created C:\Windows\EasyBind\Contrib\Language files\SerbianLatin.nlf temp.exe File opened for modification C:\Windows\EasyBind\Include\TextFunc.nsh temp.exe File opened for modification C:\Windows\EasyBind\makensis.exe temp.exe File opened for modification C:\Windows\EasyBind\Plugins temp.exe File created C:\Windows\EasyBind\Plugins\FindProcDLL.dll temp.exe File opened for modification C:\Windows\EasyBind\Plugins\System.dll temp.exe File opened for modification C:\Windows\EasyBind temp.exe File opened for modification C:\Windows\EasyBind\Contrib\Language files\Icelandic.nlf temp.exe File created C:\Windows\EasyBind\Contrib\Language files\Lithuanian.nlf temp.exe File opened for modification C:\Windows\EasyBind\Contrib\Language files\Irish.nlf temp.exe File created C:\Windows\EasyBind\Contrib\Language files\Ukrainian.nlf temp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
temp.exe8809858de680c7a36e1bc0972c1847ef_JaffaCakes118.exeist.exeist.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language temp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8809858de680c7a36e1bc0972c1847ef_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
ist.exepid process 3044 ist.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
8809858de680c7a36e1bc0972c1847ef_JaffaCakes118.exeist.exeEasy Binder.exedescription pid process target process PID 2056 wrote to memory of 3044 2056 8809858de680c7a36e1bc0972c1847ef_JaffaCakes118.exe ist.exe PID 2056 wrote to memory of 3044 2056 8809858de680c7a36e1bc0972c1847ef_JaffaCakes118.exe ist.exe PID 2056 wrote to memory of 3044 2056 8809858de680c7a36e1bc0972c1847ef_JaffaCakes118.exe ist.exe PID 2056 wrote to memory of 3044 2056 8809858de680c7a36e1bc0972c1847ef_JaffaCakes118.exe ist.exe PID 2056 wrote to memory of 3044 2056 8809858de680c7a36e1bc0972c1847ef_JaffaCakes118.exe ist.exe PID 2056 wrote to memory of 3044 2056 8809858de680c7a36e1bc0972c1847ef_JaffaCakes118.exe ist.exe PID 2056 wrote to memory of 3044 2056 8809858de680c7a36e1bc0972c1847ef_JaffaCakes118.exe ist.exe PID 3044 wrote to memory of 2616 3044 ist.exe ist.exe PID 3044 wrote to memory of 2616 3044 ist.exe ist.exe PID 3044 wrote to memory of 2616 3044 ist.exe ist.exe PID 3044 wrote to memory of 2616 3044 ist.exe ist.exe PID 3044 wrote to memory of 2616 3044 ist.exe ist.exe PID 3044 wrote to memory of 2616 3044 ist.exe ist.exe PID 3044 wrote to memory of 2616 3044 ist.exe ist.exe PID 3044 wrote to memory of 2616 3044 ist.exe ist.exe PID 3044 wrote to memory of 2616 3044 ist.exe ist.exe PID 3044 wrote to memory of 2616 3044 ist.exe ist.exe PID 3044 wrote to memory of 2616 3044 ist.exe ist.exe PID 3044 wrote to memory of 2616 3044 ist.exe ist.exe PID 2056 wrote to memory of 2612 2056 8809858de680c7a36e1bc0972c1847ef_JaffaCakes118.exe Easy Binder.exe PID 2056 wrote to memory of 2612 2056 8809858de680c7a36e1bc0972c1847ef_JaffaCakes118.exe Easy Binder.exe PID 2056 wrote to memory of 2612 2056 8809858de680c7a36e1bc0972c1847ef_JaffaCakes118.exe Easy Binder.exe PID 2056 wrote to memory of 2612 2056 8809858de680c7a36e1bc0972c1847ef_JaffaCakes118.exe Easy Binder.exe PID 2612 wrote to memory of 2128 2612 Easy Binder.exe temp.exe PID 2612 wrote to memory of 2128 2612 Easy Binder.exe temp.exe PID 2612 wrote to memory of 2128 2612 Easy Binder.exe temp.exe PID 2612 wrote to memory of 2128 2612 Easy Binder.exe temp.exe PID 2612 wrote to memory of 2128 2612 Easy Binder.exe temp.exe PID 2612 wrote to memory of 2128 2612 Easy Binder.exe temp.exe PID 2612 wrote to memory of 2128 2612 Easy Binder.exe temp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8809858de680c7a36e1bc0972c1847ef_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8809858de680c7a36e1bc0972c1847ef_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\ist.exe"C:\Users\Admin\AppData\Local\Temp\ist.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\ist.exe/scomma "C:\Users\Admin\AppData\Local\Temp\tmp.ini"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2616
-
-
-
C:\Users\Admin\AppData\Local\Temp\Easy Binder.exe"C:\Users\Admin\AppData\Local\Temp\Easy Binder.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\temp.exe"C:\Users\Admin\AppData\Local\Temp\temp.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2128
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.3MB
MD5efbc9f49dd2f2e1088cdcec3cf35a41b
SHA1ecef7f277a50420d08fa7a9e0cbd8f37faef3394
SHA256cf28de8089bc70759c9d524cbbac2c3d46c4aed10ac57f622086e71032226295
SHA5129506331e80d4027e6e8c51ff8424ebe45226a63ab11a7bf228a4e1c5ecfe97606f507b47470e5015baba5cef5cae37fd7fd3caac7ea55ceac4894156d10cc665
-
Filesize
204KB
MD5f367fac37fae9dc205e79c22f92d8b46
SHA14da5ef2b108e97743e7e8f931bca6a0e7477fb42
SHA256f0e47658f3563af754aea9bed76619326b5425f49e4cffc9cf292d2ea85e98dc
SHA5122c8cc3dd15f1f8af1948ad304c14b575e3651c74786ca8ff97004c815656c0f6d25f0b328631b0712c9fc9b40858c8049c671f9427212e339422d64cd8ea0aaf
-
Filesize
725KB
MD5df21207322bb1e8511a824107e852e16
SHA14818206adb4235428f76954fc51eb319215d8147
SHA2565eab7cbc6741aee4fe457138732e8f07751ce360aba25f973e41cf96a6b880b5
SHA51285981d12a547a24d4218479aad1ec0ad72307f931456c9eb042a2c1647063ade23b2c84229fcb1c4e0c6fc498562fd24eb0d8c9afd46243223f7f4afea2d63c7