Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11-08-2024 09:36
Static task
static1
Behavioral task
behavioral1
Sample
89df6152889fd5b561772d22e2171703_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
89df6152889fd5b561772d22e2171703_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
89df6152889fd5b561772d22e2171703_JaffaCakes118.exe
-
Size
857KB
-
MD5
89df6152889fd5b561772d22e2171703
-
SHA1
9a1d4b24579a9cf6c9692d1d2595123c253ed24e
-
SHA256
62a4aa6e6e0c4df7b32f8b4d6bd52eca1b98e0b9637ba3d437fbb77f413b6c4b
-
SHA512
fc0abc93477b7dc34dac722e7e6a2bd02c307dc94428320a2673a2b4643a8865a0a71cfc12ddb3541873f31b060ac805446e2175ba421e3159c44cf031c23bb8
-
SSDEEP
24576:lBy06cUfLdB5bapl/Zumq8qgGYPCQ0cBIUKw5vkKR:jy06rLdB5b0jq8qmpDBLH5
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2788 isecurity.exe -
Loads dropped DLL 3 IoCs
pid Process 2672 89df6152889fd5b561772d22e2171703_JaffaCakes118.exe 2672 89df6152889fd5b561772d22e2171703_JaffaCakes118.exe 2672 89df6152889fd5b561772d22e2171703_JaffaCakes118.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\Internet Security = "C:\\ProgramData\\isecurity.exe" isecurity.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\N: isecurity.exe File opened (read-only) \??\V: isecurity.exe File opened (read-only) \??\K: isecurity.exe File opened (read-only) \??\T: isecurity.exe File opened (read-only) \??\Z: isecurity.exe File opened (read-only) \??\P: isecurity.exe File opened (read-only) \??\H: isecurity.exe File opened (read-only) \??\I: isecurity.exe File opened (read-only) \??\J: isecurity.exe File opened (read-only) \??\L: isecurity.exe File opened (read-only) \??\Q: isecurity.exe File opened (read-only) \??\R: isecurity.exe File opened (read-only) \??\S: isecurity.exe File opened (read-only) \??\G: isecurity.exe File opened (read-only) \??\U: isecurity.exe File opened (read-only) \??\M: isecurity.exe File opened (read-only) \??\O: isecurity.exe File opened (read-only) \??\W: isecurity.exe File opened (read-only) \??\X: isecurity.exe File opened (read-only) \??\Y: isecurity.exe File opened (read-only) \??\E: isecurity.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 isecurity.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 89df6152889fd5b561772d22e2171703_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language isecurity.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2672 89df6152889fd5b561772d22e2171703_JaffaCakes118.exe 2788 isecurity.exe 2788 isecurity.exe 2788 isecurity.exe 2788 isecurity.exe 2788 isecurity.exe 2788 isecurity.exe 2788 isecurity.exe 2788 isecurity.exe 2788 isecurity.exe 2788 isecurity.exe 2788 isecurity.exe 2788 isecurity.exe 2788 isecurity.exe 2788 isecurity.exe 2788 isecurity.exe 2788 isecurity.exe 2788 isecurity.exe 2788 isecurity.exe 2788 isecurity.exe 2788 isecurity.exe 2788 isecurity.exe 2788 isecurity.exe 2788 isecurity.exe 2788 isecurity.exe 2788 isecurity.exe 2788 isecurity.exe 2788 isecurity.exe 2788 isecurity.exe 2788 isecurity.exe 2788 isecurity.exe 2788 isecurity.exe 2788 isecurity.exe 2788 isecurity.exe 2788 isecurity.exe 2788 isecurity.exe 2788 isecurity.exe 2788 isecurity.exe 2788 isecurity.exe 2788 isecurity.exe 2788 isecurity.exe 2788 isecurity.exe 2788 isecurity.exe 2788 isecurity.exe 2788 isecurity.exe 2788 isecurity.exe 2788 isecurity.exe 2788 isecurity.exe 2788 isecurity.exe 2788 isecurity.exe 2788 isecurity.exe 2788 isecurity.exe 2788 isecurity.exe 2788 isecurity.exe 2788 isecurity.exe 2788 isecurity.exe 2788 isecurity.exe 2788 isecurity.exe 2788 isecurity.exe 2788 isecurity.exe 2788 isecurity.exe 2788 isecurity.exe 2788 isecurity.exe 2788 isecurity.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2672 89df6152889fd5b561772d22e2171703_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 9 IoCs
pid Process 2788 isecurity.exe 2788 isecurity.exe 2788 isecurity.exe 2788 isecurity.exe 2788 isecurity.exe 2788 isecurity.exe 2788 isecurity.exe 2788 isecurity.exe 2788 isecurity.exe -
Suspicious use of SendNotifyMessage 9 IoCs
pid Process 2788 isecurity.exe 2788 isecurity.exe 2788 isecurity.exe 2788 isecurity.exe 2788 isecurity.exe 2788 isecurity.exe 2788 isecurity.exe 2788 isecurity.exe 2788 isecurity.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2788 isecurity.exe 2788 isecurity.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2672 wrote to memory of 2788 2672 89df6152889fd5b561772d22e2171703_JaffaCakes118.exe 30 PID 2672 wrote to memory of 2788 2672 89df6152889fd5b561772d22e2171703_JaffaCakes118.exe 30 PID 2672 wrote to memory of 2788 2672 89df6152889fd5b561772d22e2171703_JaffaCakes118.exe 30 PID 2672 wrote to memory of 2788 2672 89df6152889fd5b561772d22e2171703_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\89df6152889fd5b561772d22e2171703_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\89df6152889fd5b561772d22e2171703_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\ProgramData\isecurity.exeC:\ProgramData\isecurity.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2788
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
848KB
MD5aa3d86e9412f666c757f8f863ce20cf2
SHA1ef0033b6b4abc9d0238910e639d2bffa7ffff157
SHA256fd6f51babe86c8b4b66907c5a2248ffe8f4cf2e2833c279f26fe3893ecae2ab1
SHA512267d64575193453ba1bf1152f4030247140b562bc6ccfbc3b711db9a91c05d28d28f9231670855be92b8a98281d2a47c192548d9808f6243cfd2b5601b6f5f92