Analysis
-
max time kernel
147s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 05:24
Static task
static1
Behavioral task
behavioral1
Sample
892892d401dfe53ea4aebb4eb000977f_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
892892d401dfe53ea4aebb4eb000977f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
892892d401dfe53ea4aebb4eb000977f_JaffaCakes118.exe
-
Size
469KB
-
MD5
892892d401dfe53ea4aebb4eb000977f
-
SHA1
81b7bfd26e21be0377ad3a78003e39755b08ac0c
-
SHA256
ce6d01a5a746c4e5fa1a4a54ecb6cc135642b55c5e4a003868ce2f092763000f
-
SHA512
48f35cc0d4f7932c34120e6940b5d064a55156c828f91cf5fa215e3d00e5f35013614063a3c9ea4696a2f0ede96606347ac114a593e7314f79ce651afad75d14
-
SSDEEP
6144:YWvoh/o704sg+1eG2Wt8hHs8zuWkWQ1+6CkejEanQgteXAHD6DLnMd0QGpoK2EhD:hwh/k8eGJMFzuWr4YL0zog5
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2852 axaa.exe 1220 axaa.exe -
Loads dropped DLL 3 IoCs
pid Process 1780 892892d401dfe53ea4aebb4eb000977f_JaffaCakes118.exe 1780 892892d401dfe53ea4aebb4eb000977f_JaffaCakes118.exe 2852 axaa.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\axaa.exe = "C:\\Users\\Admin\\AppData\\Roaming\\axaa.exe" 892892d401dfe53ea4aebb4eb000977f_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2520 set thread context of 1780 2520 892892d401dfe53ea4aebb4eb000977f_JaffaCakes118.exe 30 PID 2852 set thread context of 1220 2852 axaa.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axaa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 892892d401dfe53ea4aebb4eb000977f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 892892d401dfe53ea4aebb4eb000977f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axaa.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main axaa.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch axaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" axaa.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2520 892892d401dfe53ea4aebb4eb000977f_JaffaCakes118.exe Token: SeDebugPrivilege 2852 axaa.exe Token: 33 1280 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1280 AUDIODG.EXE Token: 33 1280 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1280 AUDIODG.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1780 892892d401dfe53ea4aebb4eb000977f_JaffaCakes118.exe 1780 892892d401dfe53ea4aebb4eb000977f_JaffaCakes118.exe 1780 892892d401dfe53ea4aebb4eb000977f_JaffaCakes118.exe 1780 892892d401dfe53ea4aebb4eb000977f_JaffaCakes118.exe 1220 axaa.exe 1220 axaa.exe 1220 axaa.exe 1220 axaa.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2520 wrote to memory of 1780 2520 892892d401dfe53ea4aebb4eb000977f_JaffaCakes118.exe 30 PID 2520 wrote to memory of 1780 2520 892892d401dfe53ea4aebb4eb000977f_JaffaCakes118.exe 30 PID 2520 wrote to memory of 1780 2520 892892d401dfe53ea4aebb4eb000977f_JaffaCakes118.exe 30 PID 2520 wrote to memory of 1780 2520 892892d401dfe53ea4aebb4eb000977f_JaffaCakes118.exe 30 PID 2520 wrote to memory of 1780 2520 892892d401dfe53ea4aebb4eb000977f_JaffaCakes118.exe 30 PID 2520 wrote to memory of 1780 2520 892892d401dfe53ea4aebb4eb000977f_JaffaCakes118.exe 30 PID 2520 wrote to memory of 1780 2520 892892d401dfe53ea4aebb4eb000977f_JaffaCakes118.exe 30 PID 2520 wrote to memory of 1780 2520 892892d401dfe53ea4aebb4eb000977f_JaffaCakes118.exe 30 PID 2520 wrote to memory of 1780 2520 892892d401dfe53ea4aebb4eb000977f_JaffaCakes118.exe 30 PID 1780 wrote to memory of 2852 1780 892892d401dfe53ea4aebb4eb000977f_JaffaCakes118.exe 31 PID 1780 wrote to memory of 2852 1780 892892d401dfe53ea4aebb4eb000977f_JaffaCakes118.exe 31 PID 1780 wrote to memory of 2852 1780 892892d401dfe53ea4aebb4eb000977f_JaffaCakes118.exe 31 PID 1780 wrote to memory of 2852 1780 892892d401dfe53ea4aebb4eb000977f_JaffaCakes118.exe 31 PID 2852 wrote to memory of 1220 2852 axaa.exe 32 PID 2852 wrote to memory of 1220 2852 axaa.exe 32 PID 2852 wrote to memory of 1220 2852 axaa.exe 32 PID 2852 wrote to memory of 1220 2852 axaa.exe 32 PID 2852 wrote to memory of 1220 2852 axaa.exe 32 PID 2852 wrote to memory of 1220 2852 axaa.exe 32 PID 2852 wrote to memory of 1220 2852 axaa.exe 32 PID 2852 wrote to memory of 1220 2852 axaa.exe 32 PID 2852 wrote to memory of 1220 2852 axaa.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\892892d401dfe53ea4aebb4eb000977f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\892892d401dfe53ea4aebb4eb000977f_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\892892d401dfe53ea4aebb4eb000977f_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\892892d401dfe53ea4aebb4eb000977f_JaffaCakes118.exe2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Users\Admin\AppData\Roaming\axaa.exeC:\Users\Admin\AppData\Roaming\axaa.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Users\Admin\AppData\Roaming\axaa.exeC:\Users\Admin\AppData\Roaming\axaa.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1220
-
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5b01⤵
- Suspicious use of AdjustPrivilegeToken
PID:1280
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XWMUP5AI\NewErrorPageTemplate[1]
Filesize1KB
MD5cdf81e591d9cbfb47a7f97a2bcdb70b9
SHA18f12010dfaacdecad77b70a3e781c707cf328496
SHA256204d95c6fb161368c795bb63e538fe0b11f9e406494bb5758b3b0d60c5f651bd
SHA512977dcc2c6488acaf0e5970cef1a7a72c9f9dc6bb82da54f057e0853c8e939e4ab01b163eb7a5058e093a8bc44ecad9d06880fdc883e67e28ac67fee4d070a4cc
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XWMUP5AI\httpErrorPagesScripts[1]
Filesize8KB
MD53f57b781cb3ef114dd0b665151571b7b
SHA1ce6a63f996df3a1cccb81720e21204b825e0238c
SHA25646e019fa34465f4ed096a9665d1827b54553931ad82e98be01edb1ddbc94d3ad
SHA5128cbf4ef582332ae7ea605f910ad6f8a4bc28513482409fa84f08943a72cac2cf0fa32b6af4c20c697e1fac2c5ba16b5a64a23af0c11eefbf69625b8f9f90c8fa
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Z7V06J7Q\dnserrordiagoff[1]
Filesize1KB
MD547f581b112d58eda23ea8b2e08cf0ff0
SHA16ec1df5eaec1439573aef0fb96dabfc953305e5b
SHA256b1c947d00db5fce43314c56c663dbeae0ffa13407c9c16225c17ccefc3afa928
SHA512187383eef3d646091e9f68eff680a11c7947b3d9b54a78cc6de4a04629d7037e9c97673ac054a6f1cf591235c110ca181a6b69ecba0e5032168f56f4486fff92
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Z7V06J7Q\errorPageStrings[1]
Filesize2KB
MD5e3e4a98353f119b80b323302f26b78fa
SHA120ee35a370cdd3a8a7d04b506410300fd0a6a864
SHA2569466d620dc57835a2475f8f71e304f54aee7160e134ba160baae0f19e5e71e66
SHA512d8e4d73c76804a5abebd5dbc3a86dcdb6e73107b873175a8de67332c113fb7c4899890bf7972e467866fa4cd100a7e2a10a770e5a9c41cbf23b54351b771dcee
-
Filesize
86B
MD55e907bfbf1a95e12146da0435e349702
SHA1c27794aa61ee666890ee438a26029302983afb09
SHA256cd013a0f8af2271b70cc1785847a306f7e870f4812460f21ac706d3e558f374e
SHA51249d7277c0fdf6237a5f57c4dca82dff71c2fbb381a008f8d8547bd566716f40c09007e1a002118a1684eaf2ef96d49b0619f013b4b70af317a81374bec5dc4a8
-
Filesize
55B
MD5632bcdcdaba65a06ede4e9ae34eff8db
SHA1d6591b9d9c5e54568b0192dd179dbafababc4c52
SHA256a74ef3fcaae14853d9b9ac754a62a7364d52b50f01b5d800c81a9d72dee1e755
SHA5120b76d4f89ed6c4987b6a6f6018497f703d0e442a4f77c0967fb066f5014c0642e149c002884783bf1e2a6cbb46f420c30f3e4542a772c0feae7de4573bd483b1
-
Filesize
4B
MD52588ee1be117044b9c5ee49cc26d55c4
SHA1d863e8f7254f1cfbf175d2521e088c74a1b17831
SHA256e986b5c4c9be09fd79eea7a94c303d460394aa0d45902ac9a373be4096a6b6fb
SHA51271d84113652906956c04b0471d198d7567acd48801f6a87e4ef9e488d2f13e1b0c5800c61176f0a141bd041548e934ae1d4d4cc0f25966b8c1488337af520856
-
Filesize
19B
MD5e5157a3a87e549228bb06cff31da5347
SHA17e329f11ddeb205231e2236c93ae985eeb067776
SHA2568daa75ed1cf13dda053c10e1fac54c6b77c4bc7d02169974a21a71f867f32dd1
SHA512f22e77ce8d25cd5fc1d341c1c1ce9ef62f07b89cd23bb8a951e7407477d667cd665c9d6d51459a7d38dfba8e8e7ac45aa4395c8dda3e7ac50a68d6aa60fbe1e1
-
Filesize
469KB
MD5892892d401dfe53ea4aebb4eb000977f
SHA181b7bfd26e21be0377ad3a78003e39755b08ac0c
SHA256ce6d01a5a746c4e5fa1a4a54ecb6cc135642b55c5e4a003868ce2f092763000f
SHA51248f35cc0d4f7932c34120e6940b5d064a55156c828f91cf5fa215e3d00e5f35013614063a3c9ea4696a2f0ede96606347ac114a593e7314f79ce651afad75d14