Analysis
-
max time kernel
143s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10-08-2024 23:06
Static task
static1
Behavioral task
behavioral1
Sample
8809858de680c7a36e1bc0972c1847ef_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8809858de680c7a36e1bc0972c1847ef_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8809858de680c7a36e1bc0972c1847ef_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
8809858de680c7a36e1bc0972c1847ef
-
SHA1
943cb9e9365bf92fa0ad9c06bc63caaa77815b05
-
SHA256
d8ece9627b3f6ee7906b6dea24a52ecf0c6dbac3f5da250f653b9a418e464ef1
-
SHA512
edaa89705d61ce71cbf114b8a92c46158d1ff0e31bd3ecb596b3ea3e2520bffcec4c8082d37fa765452486dc6988755c4724ffdba88ab4433443ae8c3cd3d2a7
-
SSDEEP
24576:icZKZGKzir+ldqvxmlvSFaGV4JmnLS229XPlIUrQIGPk8Puyp:i2KIgir+nqnMMCpXP5r5Gw4
Malware Config
Signatures
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload 1 IoCs
Processes:
resource yara_rule behavioral2/files/0x000b000000023454-5.dat family_isrstealer -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
8809858de680c7a36e1bc0972c1847ef_JaffaCakes118.exeEasy Binder.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation 8809858de680c7a36e1bc0972c1847ef_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation Easy Binder.exe -
Executes dropped EXE 4 IoCs
Processes:
ist.exeEasy Binder.exeist.exetemp.exepid Process 316 ist.exe 228 Easy Binder.exe 4896 ist.exe 2412 temp.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral2/memory/4896-26-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral2/memory/4896-28-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral2/memory/4896-29-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral2/memory/4896-33-0x0000000000400000-0x0000000000453000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
Processes:
ist.exedescription pid Process procid_target PID 316 set thread context of 4896 316 ist.exe 86 -
Drops file in Windows directory 64 IoCs
Processes:
temp.exedescription ioc Process File created C:\Windows\EasyBind\Contrib\Language files\Portuguese.nlf temp.exe File created C:\Windows\EasyBind\Contrib\Language files\Korean.nlf temp.exe File created C:\Windows\EasyBind\Contrib\Language files\Kurdish.nlf temp.exe File created C:\Windows\EasyBind\Contrib\Language files\Luxembourgish.nlf temp.exe File created C:\Windows\EasyBind\Contrib\Language files\Thai.nlf temp.exe File created C:\Windows\EasyBind\Include\UpgradeDLL.nsh temp.exe File created C:\Windows\EasyBind\Stubs\uninst temp.exe File opened for modification C:\Windows\EasyBind\Contrib\Language files\Danish.nlf temp.exe File created C:\Windows\EasyBind\Contrib\Language files\English.nlf temp.exe File opened for modification C:\Windows\EasyBind\Contrib\UIs\default.exe temp.exe File opened for modification C:\Windows\EasyBind\Include\StrFunc.nsh temp.exe File opened for modification C:\Windows\EasyBind\Include\TextFunc.nsh temp.exe File opened for modification C:\Windows\EasyBind\Include\WinMessages.nsh temp.exe File created C:\Windows\EasyBind\Contrib\Language files\Breton.nlf temp.exe File opened for modification C:\Windows\EasyBind\Contrib\Language files\Bulgarian.nlf temp.exe File created C:\Windows\EasyBind\Contrib\Language files\French.nlf temp.exe File opened for modification C:\Windows\EasyBind\Contrib\Language files\Latvian.nlf temp.exe File created C:\Windows\EasyBind\Plugins\Splash.dll temp.exe File created C:\Windows\EasyBind\Plugins\TypeLib.dll temp.exe File opened for modification C:\Windows\EasyBind\Contrib\Language files\French.nlf temp.exe File created C:\Windows\EasyBind\Contrib\Language files\Valencian.nlf temp.exe File created C:\Windows\EasyBind\Include\Colors.nsh temp.exe File opened for modification C:\Windows\EasyBind\Stubs temp.exe File created C:\Windows\EasyBind\Contrib\Language files\Bulgarian.nlf temp.exe File created C:\Windows\EasyBind\Include\LogicLib.nsh temp.exe File created C:\Windows\EasyBind\Include\WinMessages.nsh temp.exe File created C:\Windows\EasyBind\Plugins\System.dll temp.exe File opened for modification C:\Windows\EasyBind\Contrib\Language files\English.nlf temp.exe File created C:\Windows\EasyBind\Contrib\UIs\sdbarker_tiny.exe temp.exe File opened for modification C:\Windows\EasyBind\Include\Library.nsh temp.exe File opened for modification C:\Windows\EasyBind\Contrib\Language files\Bosnian.nlf temp.exe File created C:\Windows\EasyBind\Contrib\Language files\Italian.nlf temp.exe File created C:\Windows\EasyBind\Plugins\newadvsplash.dll temp.exe File opened for modification C:\Windows\EasyBind\Contrib\Language files\Hungarian.nlf temp.exe File opened for modification C:\Windows\EasyBind\Include\UpgradeDLL.nsh temp.exe File opened for modification C:\Windows\EasyBind\Include\VPatchLib.nsh temp.exe File opened for modification C:\Windows\EasyBind\Include temp.exe File opened for modification C:\Windows\EasyBind\makensis.exe temp.exe File created C:\Windows\EasyBind\Plugins\UserInfo.dll temp.exe File created C:\Windows\EasyBind\Contrib\Language files\Japanese.nlf temp.exe File created C:\Windows\EasyBind\Include\FileFunc.nsh temp.exe File created C:\Windows\EasyBind\Stubs\zlib temp.exe File opened for modification C:\Windows\EasyBind\Contrib\Language files\Catalan.nlf temp.exe File opened for modification C:\Windows\EasyBind\Plugins\FindProcDLL.dll temp.exe File created C:\Windows\EasyBind\Contrib\Language files\Hebrew.nlf temp.exe File opened for modification C:\Windows\EasyBind\Contrib\Language files\Irish.nlf temp.exe File opened for modification C:\Windows\EasyBind\Contrib\Language files\Korean.nlf temp.exe File opened for modification C:\Windows\EasyBind\Plugins\Banner.dll temp.exe File created C:\Windows\EasyBind\Contrib\Language files\Finnish.nlf temp.exe File created C:\Windows\EasyBind\Contrib\Language files\Norwegian.nlf temp.exe File opened for modification C:\Windows\EasyBind\Contrib\Language files\Luxembourgish.nlf temp.exe File opened for modification C:\Windows\EasyBind\Contrib\Language files\Slovak.nlf temp.exe File created C:\Windows\EasyBind\makensis.exe temp.exe File created C:\Windows\EasyBind\Plugins\nsExec.dll temp.exe File opened for modification C:\Windows\EasyBind\Contrib\Language files\Albanian.nlf temp.exe File opened for modification C:\Windows\EasyBind\Contrib\Language files\Czech.nlf temp.exe File created C:\Windows\EasyBind\Contrib\Language files\Danish.nlf temp.exe File created C:\Windows\EasyBind\Contrib\Language files\German.nlf temp.exe File created C:\Windows\EasyBind\Contrib\Language files\Polish.nlf temp.exe File opened for modification C:\Windows\EasyBind\Include\LogicLib.nsh temp.exe File opened for modification C:\Windows\EasyBind\Contrib\Language files\Lithuanian.nlf temp.exe File opened for modification C:\Windows\EasyBind\Contrib\Language files\Polish.nlf temp.exe File opened for modification C:\Windows\EasyBind\Contrib\Language files\Uzbek.nlf temp.exe File opened for modification C:\Windows\EasyBind\Plugins temp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
8809858de680c7a36e1bc0972c1847ef_JaffaCakes118.exeist.exeist.exetemp.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8809858de680c7a36e1bc0972c1847ef_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language temp.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
ist.exepid Process 316 ist.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
8809858de680c7a36e1bc0972c1847ef_JaffaCakes118.exeist.exeEasy Binder.exedescription pid Process procid_target PID 4660 wrote to memory of 316 4660 8809858de680c7a36e1bc0972c1847ef_JaffaCakes118.exe 84 PID 4660 wrote to memory of 316 4660 8809858de680c7a36e1bc0972c1847ef_JaffaCakes118.exe 84 PID 4660 wrote to memory of 316 4660 8809858de680c7a36e1bc0972c1847ef_JaffaCakes118.exe 84 PID 4660 wrote to memory of 228 4660 8809858de680c7a36e1bc0972c1847ef_JaffaCakes118.exe 85 PID 4660 wrote to memory of 228 4660 8809858de680c7a36e1bc0972c1847ef_JaffaCakes118.exe 85 PID 316 wrote to memory of 4896 316 ist.exe 86 PID 316 wrote to memory of 4896 316 ist.exe 86 PID 316 wrote to memory of 4896 316 ist.exe 86 PID 316 wrote to memory of 4896 316 ist.exe 86 PID 316 wrote to memory of 4896 316 ist.exe 86 PID 316 wrote to memory of 4896 316 ist.exe 86 PID 316 wrote to memory of 4896 316 ist.exe 86 PID 316 wrote to memory of 4896 316 ist.exe 86 PID 228 wrote to memory of 2412 228 Easy Binder.exe 90 PID 228 wrote to memory of 2412 228 Easy Binder.exe 90 PID 228 wrote to memory of 2412 228 Easy Binder.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\8809858de680c7a36e1bc0972c1847ef_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8809858de680c7a36e1bc0972c1847ef_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Users\Admin\AppData\Local\Temp\ist.exe"C:\Users\Admin\AppData\Local\Temp\ist.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Users\Admin\AppData\Local\Temp\ist.exe/scomma "C:\Users\Admin\AppData\Local\Temp\tmp.ini"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4896
-
-
-
C:\Users\Admin\AppData\Local\Temp\Easy Binder.exe"C:\Users\Admin\AppData\Local\Temp\Easy Binder.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Users\Admin\AppData\Local\Temp\temp.exe"C:\Users\Admin\AppData\Local\Temp\temp.exe"3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2412
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.3MB
MD5efbc9f49dd2f2e1088cdcec3cf35a41b
SHA1ecef7f277a50420d08fa7a9e0cbd8f37faef3394
SHA256cf28de8089bc70759c9d524cbbac2c3d46c4aed10ac57f622086e71032226295
SHA5129506331e80d4027e6e8c51ff8424ebe45226a63ab11a7bf228a4e1c5ecfe97606f507b47470e5015baba5cef5cae37fd7fd3caac7ea55ceac4894156d10cc665
-
Filesize
204KB
MD5f367fac37fae9dc205e79c22f92d8b46
SHA14da5ef2b108e97743e7e8f931bca6a0e7477fb42
SHA256f0e47658f3563af754aea9bed76619326b5425f49e4cffc9cf292d2ea85e98dc
SHA5122c8cc3dd15f1f8af1948ad304c14b575e3651c74786ca8ff97004c815656c0f6d25f0b328631b0712c9fc9b40858c8049c671f9427212e339422d64cd8ea0aaf
-
Filesize
725KB
MD5df21207322bb1e8511a824107e852e16
SHA14818206adb4235428f76954fc51eb319215d8147
SHA2565eab7cbc6741aee4fe457138732e8f07751ce360aba25f973e41cf96a6b880b5
SHA51285981d12a547a24d4218479aad1ec0ad72307f931456c9eb042a2c1647063ade23b2c84229fcb1c4e0c6fc498562fd24eb0d8c9afd46243223f7f4afea2d63c7
-
Filesize
5B
MD5d1ea279fb5559c020a1b4137dc4de237
SHA1db6f8988af46b56216a6f0daf95ab8c9bdb57400
SHA256fcdcc2c46896915a1c695d6231f0fee336a668531b7a3da46178c80362546dba
SHA512720e9c284f0559015312df7fe977563e5e16f48d3506e51eb4016adf7971924d352f740b030aa3adc81b6f65fd1dba12df06d10fa6c115074e5097e7ee0f08b3