Analysis
-
max time kernel
142s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
10-08-2024 05:31
Static task
static1
Behavioral task
behavioral1
Sample
84f575c4c95fe16d14f152d4383b7ab5_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
84f575c4c95fe16d14f152d4383b7ab5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
84f575c4c95fe16d14f152d4383b7ab5_JaffaCakes118.exe
-
Size
285KB
-
MD5
84f575c4c95fe16d14f152d4383b7ab5
-
SHA1
56cea3997ca3d8a1718b00708303113b8d14845a
-
SHA256
580f8b3fdd3793e44543c57cd91eba8abc692a00145119ba89d1a9a2130160e4
-
SHA512
b68a6aac8388e85d439010c355dc01f83663028d602164cd876ce2075982ad48f69a2bed18bed6d0e56db2afdf8b5afc81dfd9779960bb651307a72b918965b8
-
SSDEEP
6144:HM8MoU9rnsyrumZ2vMOA6+S/wq02xBfAt7ouKzxjkTzU:HMd9sIM9//w0/fW0X4HU
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" 84f575c4c95fe16d14f152d4383b7ab5_JaffaCakes118.exe -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 1012 20E9.tmp -
Loads dropped DLL 2 IoCs
pid Process 3024 84f575c4c95fe16d14f152d4383b7ab5_JaffaCakes118.exe 3024 84f575c4c95fe16d14f152d4383b7ab5_JaffaCakes118.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/3024-1-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/3024-2-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/3024-3-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1936-57-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1936-59-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/3024-60-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/3024-161-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/3024-160-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1076-163-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/3024-288-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/3024-356-0x0000000000400000-0x000000000046B000-memory.dmp upx -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\828.exe = "C:\\Program Files (x86)\\LP\\EA37\\828.exe" 84f575c4c95fe16d14f152d4383b7ab5_JaffaCakes118.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\LP\EA37\828.exe 84f575c4c95fe16d14f152d4383b7ab5_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\LP\EA37\828.exe 84f575c4c95fe16d14f152d4383b7ab5_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\LP\EA37\20E9.tmp 84f575c4c95fe16d14f152d4383b7ab5_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 84f575c4c95fe16d14f152d4383b7ab5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20E9.tmp -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 3024 84f575c4c95fe16d14f152d4383b7ab5_JaffaCakes118.exe 3024 84f575c4c95fe16d14f152d4383b7ab5_JaffaCakes118.exe 3024 84f575c4c95fe16d14f152d4383b7ab5_JaffaCakes118.exe 3024 84f575c4c95fe16d14f152d4383b7ab5_JaffaCakes118.exe 3024 84f575c4c95fe16d14f152d4383b7ab5_JaffaCakes118.exe 3024 84f575c4c95fe16d14f152d4383b7ab5_JaffaCakes118.exe 3024 84f575c4c95fe16d14f152d4383b7ab5_JaffaCakes118.exe 3024 84f575c4c95fe16d14f152d4383b7ab5_JaffaCakes118.exe 3024 84f575c4c95fe16d14f152d4383b7ab5_JaffaCakes118.exe 3024 84f575c4c95fe16d14f152d4383b7ab5_JaffaCakes118.exe 3024 84f575c4c95fe16d14f152d4383b7ab5_JaffaCakes118.exe 3024 84f575c4c95fe16d14f152d4383b7ab5_JaffaCakes118.exe 3024 84f575c4c95fe16d14f152d4383b7ab5_JaffaCakes118.exe 3024 84f575c4c95fe16d14f152d4383b7ab5_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1048 explorer.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeRestorePrivilege 2796 msiexec.exe Token: SeTakeOwnershipPrivilege 2796 msiexec.exe Token: SeSecurityPrivilege 2796 msiexec.exe Token: SeShutdownPrivilege 1048 explorer.exe Token: SeShutdownPrivilege 1048 explorer.exe Token: SeShutdownPrivilege 1048 explorer.exe Token: SeShutdownPrivilege 1048 explorer.exe Token: SeShutdownPrivilege 1048 explorer.exe Token: SeShutdownPrivilege 1048 explorer.exe Token: SeShutdownPrivilege 1048 explorer.exe Token: SeShutdownPrivilege 1048 explorer.exe Token: SeShutdownPrivilege 1048 explorer.exe Token: SeShutdownPrivilege 1048 explorer.exe Token: SeShutdownPrivilege 1048 explorer.exe Token: SeShutdownPrivilege 1048 explorer.exe -
Suspicious use of FindShellTrayWindow 29 IoCs
pid Process 1048 explorer.exe 1048 explorer.exe 1048 explorer.exe 1048 explorer.exe 1048 explorer.exe 1048 explorer.exe 1048 explorer.exe 1048 explorer.exe 1048 explorer.exe 1048 explorer.exe 1048 explorer.exe 1048 explorer.exe 1048 explorer.exe 1048 explorer.exe 1048 explorer.exe 1048 explorer.exe 1048 explorer.exe 1048 explorer.exe 1048 explorer.exe 1048 explorer.exe 1048 explorer.exe 1048 explorer.exe 1048 explorer.exe 1048 explorer.exe 1048 explorer.exe 1048 explorer.exe 1048 explorer.exe 1048 explorer.exe 1048 explorer.exe -
Suspicious use of SendNotifyMessage 19 IoCs
pid Process 1048 explorer.exe 1048 explorer.exe 1048 explorer.exe 1048 explorer.exe 1048 explorer.exe 1048 explorer.exe 1048 explorer.exe 1048 explorer.exe 1048 explorer.exe 1048 explorer.exe 1048 explorer.exe 1048 explorer.exe 1048 explorer.exe 1048 explorer.exe 1048 explorer.exe 1048 explorer.exe 1048 explorer.exe 1048 explorer.exe 1048 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3024 wrote to memory of 1936 3024 84f575c4c95fe16d14f152d4383b7ab5_JaffaCakes118.exe 31 PID 3024 wrote to memory of 1936 3024 84f575c4c95fe16d14f152d4383b7ab5_JaffaCakes118.exe 31 PID 3024 wrote to memory of 1936 3024 84f575c4c95fe16d14f152d4383b7ab5_JaffaCakes118.exe 31 PID 3024 wrote to memory of 1936 3024 84f575c4c95fe16d14f152d4383b7ab5_JaffaCakes118.exe 31 PID 3024 wrote to memory of 1076 3024 84f575c4c95fe16d14f152d4383b7ab5_JaffaCakes118.exe 33 PID 3024 wrote to memory of 1076 3024 84f575c4c95fe16d14f152d4383b7ab5_JaffaCakes118.exe 33 PID 3024 wrote to memory of 1076 3024 84f575c4c95fe16d14f152d4383b7ab5_JaffaCakes118.exe 33 PID 3024 wrote to memory of 1076 3024 84f575c4c95fe16d14f152d4383b7ab5_JaffaCakes118.exe 33 PID 3024 wrote to memory of 1012 3024 84f575c4c95fe16d14f152d4383b7ab5_JaffaCakes118.exe 36 PID 3024 wrote to memory of 1012 3024 84f575c4c95fe16d14f152d4383b7ab5_JaffaCakes118.exe 36 PID 3024 wrote to memory of 1012 3024 84f575c4c95fe16d14f152d4383b7ab5_JaffaCakes118.exe 36 PID 3024 wrote to memory of 1012 3024 84f575c4c95fe16d14f152d4383b7ab5_JaffaCakes118.exe 36 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" 84f575c4c95fe16d14f152d4383b7ab5_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 84f575c4c95fe16d14f152d4383b7ab5_JaffaCakes118.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\84f575c4c95fe16d14f152d4383b7ab5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\84f575c4c95fe16d14f152d4383b7ab5_JaffaCakes118.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\84f575c4c95fe16d14f152d4383b7ab5_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\84f575c4c95fe16d14f152d4383b7ab5_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\74C08\CC4EA.exe%C:\Users\Admin\AppData\Roaming\74C082⤵PID:1936
-
-
C:\Users\Admin\AppData\Local\Temp\84f575c4c95fe16d14f152d4383b7ab5_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\84f575c4c95fe16d14f152d4383b7ab5_JaffaCakes118.exe startC:\Program Files (x86)\08587\lvvm.exe%C:\Program Files (x86)\085872⤵PID:1076
-
-
C:\Program Files (x86)\LP\EA37\20E9.tmp"C:\Program Files (x86)\LP\EA37\20E9.tmp"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1012
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2796
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1048
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
102KB
MD59636b8b316a3bc776f9a98ea09da5caf
SHA1050f0bc24149a2e208fdec8e0d7bdb08133ff958
SHA2562de935d69a83a276edbd20ee616e8ece2a2ec3aa75daebd91de5891a099e3a4f
SHA512472bc6565f724a356938412a0dac7c443c2e45b71101831542b6723f6bcee9d3d54afc40adec603db829d736c828d60c08b0a3a78e1f691bdbff8445c424e8a0
-
Filesize
696B
MD5ed5d3f2aaea14b91ff915f80b5e53e6b
SHA1168ba8a0a47a1cbb7ee2375b332c1235256da0e0
SHA2560be28c416c82b2f112183358f56b25d9551688c2b5d6c76e014fe773c314a981
SHA51243ef6e6206df497e95af67a14cc067485c97a4d4fc1cbaa6baebf27965ed68d270dcfb9526d3136d5a1b69f4a252c024c2df3f6f2363068c6412bf1c108d9a6c
-
Filesize
1KB
MD544775bf2be54be729d1d255bca444242
SHA1b4909aada1b4bdf28b5d25756ad8213b3aaee1b4
SHA2564df0890464c6f523af870b4d5828fe087627aca9664ac065636f1fe3c298dada
SHA512756cb0c26694db4af4360b89ebb84d9e400797a5d08cf9456bc9737020fac8c32009cf5694cd81f2fb4687f47136b039963d78abcefbbeb0255f33c49991bdfd
-
Filesize
1KB
MD5a6f5db196c9bdbaed6fb6a3239426f30
SHA18ae7f5c43c7f5304cab1df39aa52507a915af528
SHA256cad161ac40bc38987df009f8b8cb6dd3dec580e16925f5f38671f6817c7d3f63
SHA512668a47aad0b24575007f9f5ffa8b284c8ea866bdf0fa9f46e29bfecfedb47fa83b4c22ad63fc97d18a4d2e538668e9e575f49adb48bfd318755331e9f628a8f1
-
Filesize
300B
MD5710e67a912035a603aa041cdd604d5cf
SHA1e79441a18c9b5b464c116f6fc9fe7b79e2e7f35e
SHA2569b5a538945c7a4e3eae88164652126edd19067ba96f5f9a8b9e9676bdc76c8d7
SHA512a35fe1357102da4ce75d7b19d79f2fc4ba8187b816ddee65287b5f73709e35fd4e9f5c6f25797017a39e018aeaab51ed9d74cabce8b0e21ed399206a2d7bd24a