Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14/08/2024, 07:28
Static task
static1
Behavioral task
behavioral1
Sample
95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe
-
Size
340KB
-
MD5
95268a7ca995494a01a1fae4f8c64386
-
SHA1
45b50cc7827903fd182dfd79a945b86934dc4f9d
-
SHA256
e1315c5d45b564fcd7732dc134c758e2b14ae3972c81235bbd15424bbb2f7bb5
-
SHA512
cddf7ba8ca744cce7efaec5d68afcf35767d8fe23e36bd6302cfd00c75cf3aa9a22968b60c0649bb3bd2abd75677c72f851344bda479f808bd807e3b4261a296
-
SSDEEP
6144:IEB6DO7G6DPaxOyVBWQc0PmtqtLd8brLdbOqhIkIxWe8NTC0Sge:IEsDqrHybWQchaLd8nLdbt7/NXJe
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe -
Disables Task Manager via registry modification
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\WINDOWS\system32\drivers\etc\hosts 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2552-4-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral1/memory/2552-9-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral1/memory/2552-6-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral1/memory/2552-30-0x0000000000400000-0x000000000043C000-memory.dmp upx -
Suspicious use of SetThreadContext 8 IoCs
description pid Process procid_target PID 2208 set thread context of 2552 2208 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 30 PID 2552 set thread context of 1148 2552 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 63 PID 2552 set thread context of 3060 2552 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 64 PID 2552 set thread context of 2876 2552 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 65 PID 2552 set thread context of 580 2552 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 66 PID 2552 set thread context of 2180 2552 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 67 PID 2552 set thread context of 2240 2552 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 68 PID 2552 set thread context of 2564 2552 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 69 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\WINDOWS\HOSTS 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 19 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Kills process with taskkill 11 IoCs
pid Process 1968 taskkill.exe 2704 taskkill.exe 2128 taskkill.exe 1976 taskkill.exe 2284 taskkill.exe 2140 taskkill.exe 2024 taskkill.exe 1752 taskkill.exe 2616 taskkill.exe 1892 taskkill.exe 2728 taskkill.exe -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 2616 taskkill.exe Token: SeDebugPrivilege 1892 taskkill.exe Token: SeDebugPrivilege 2284 taskkill.exe Token: SeDebugPrivilege 2728 taskkill.exe Token: SeDebugPrivilege 2140 taskkill.exe Token: SeDebugPrivilege 2704 taskkill.exe Token: SeDebugPrivilege 2128 taskkill.exe Token: SeDebugPrivilege 2024 taskkill.exe Token: SeDebugPrivilege 1752 taskkill.exe Token: SeDebugPrivilege 1976 taskkill.exe Token: SeDebugPrivilege 1968 taskkill.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2208 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 2552 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2552 2208 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 30 PID 2208 wrote to memory of 2552 2208 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 30 PID 2208 wrote to memory of 2552 2208 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 30 PID 2208 wrote to memory of 2552 2208 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 30 PID 2208 wrote to memory of 2552 2208 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 30 PID 2208 wrote to memory of 2552 2208 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 30 PID 2208 wrote to memory of 2552 2208 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 30 PID 2208 wrote to memory of 2552 2208 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 30 PID 2208 wrote to memory of 2552 2208 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 30 PID 2552 wrote to memory of 2740 2552 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 32 PID 2552 wrote to memory of 2740 2552 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 32 PID 2552 wrote to memory of 2740 2552 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 32 PID 2552 wrote to memory of 2740 2552 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 32 PID 2552 wrote to memory of 2616 2552 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 33 PID 2552 wrote to memory of 2616 2552 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 33 PID 2552 wrote to memory of 2616 2552 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 33 PID 2552 wrote to memory of 2616 2552 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 33 PID 2740 wrote to memory of 2816 2740 net.exe 36 PID 2740 wrote to memory of 2816 2740 net.exe 36 PID 2740 wrote to memory of 2816 2740 net.exe 36 PID 2740 wrote to memory of 2816 2740 net.exe 36 PID 2552 wrote to memory of 1892 2552 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 37 PID 2552 wrote to memory of 1892 2552 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 37 PID 2552 wrote to memory of 1892 2552 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 37 PID 2552 wrote to memory of 1892 2552 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 37 PID 2552 wrote to memory of 2728 2552 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 39 PID 2552 wrote to memory of 2728 2552 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 39 PID 2552 wrote to memory of 2728 2552 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 39 PID 2552 wrote to memory of 2728 2552 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 39 PID 2552 wrote to memory of 2284 2552 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 40 PID 2552 wrote to memory of 2284 2552 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 40 PID 2552 wrote to memory of 2284 2552 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 40 PID 2552 wrote to memory of 2284 2552 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 40 PID 2552 wrote to memory of 2140 2552 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 43 PID 2552 wrote to memory of 2140 2552 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 43 PID 2552 wrote to memory of 2140 2552 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 43 PID 2552 wrote to memory of 2140 2552 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 43 PID 2552 wrote to memory of 2704 2552 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 45 PID 2552 wrote to memory of 2704 2552 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 45 PID 2552 wrote to memory of 2704 2552 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 45 PID 2552 wrote to memory of 2704 2552 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 45 PID 2552 wrote to memory of 2128 2552 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 46 PID 2552 wrote to memory of 2128 2552 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 46 PID 2552 wrote to memory of 2128 2552 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 46 PID 2552 wrote to memory of 2128 2552 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 46 PID 2552 wrote to memory of 2136 2552 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 48 PID 2552 wrote to memory of 2136 2552 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 48 PID 2552 wrote to memory of 2136 2552 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 48 PID 2552 wrote to memory of 2136 2552 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 48 PID 2136 wrote to memory of 1964 2136 net.exe 51 PID 2136 wrote to memory of 1964 2136 net.exe 51 PID 2136 wrote to memory of 1964 2136 net.exe 51 PID 2136 wrote to memory of 1964 2136 net.exe 51 PID 2552 wrote to memory of 2024 2552 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 52 PID 2552 wrote to memory of 2024 2552 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 52 PID 2552 wrote to memory of 2024 2552 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 52 PID 2552 wrote to memory of 2024 2552 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 52 PID 2552 wrote to memory of 1752 2552 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 53 PID 2552 wrote to memory of 1752 2552 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 53 PID 2552 wrote to memory of 1752 2552 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 53 PID 2552 wrote to memory of 1752 2552 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 53 PID 2552 wrote to memory of 1976 2552 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 56 PID 2552 wrote to memory of 1976 2552 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 56 PID 2552 wrote to memory of 1976 2552 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 56
Processes
-
C:\Users\Admin\AppData\Local\Temp\95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe2⤵
- Modifies security service
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\net.exenet stop wscsvc3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc4⤵
- System Location Discovery: System Language Discovery
PID:2816
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im TeaTimer.exe /f3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2616
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im SpybotSD.exe /f3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1892
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im SDUpdate.exe /f3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2728
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im Update.exe /f3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2284
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im mbam.exe /f3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2140
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im AAWService.exe /f3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2704
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im AAWTray.exe /f3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2128
-
-
C:\Windows\SysWOW64\net.exenet stop aawservice3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop aawservice4⤵
- System Location Discovery: System Language Discovery
PID:1964
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im Ad-Aware.exe /f3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2024
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im threatwork.exe /f3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1752
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im SbieSvc.exe /f3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1976
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im SbieCtrl.exe /f3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1968
-
-
C:\Windows\SysWOW64\net.exenet stop SbieSvc3⤵
- System Location Discovery: System Language Discovery
PID:3020 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SbieSvc4⤵
- System Location Discovery: System Language Discovery
PID:1144
-
-
-
C:\Users\Admin\AppData\Local\Temp\95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe"3⤵PID:1148
-
-
C:\Users\Admin\AppData\Local\Temp\95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe/stext C:\Users\Admin\AppData\Local\Temp\mail.txt3⤵PID:3060
-
-
C:\Users\Admin\AppData\Local\Temp\95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe/stext C:\Users\Admin\AppData\Local\Temp\dial.txt3⤵PID:2876
-
-
C:\Users\Admin\AppData\Local\Temp\95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe/stext C:\Users\Admin\AppData\Local\Temp\chrome.txt3⤵PID:580
-
-
C:\Users\Admin\AppData\Local\Temp\95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe/stext C:\Users\Admin\AppData\Local\Temp\prot.txt3⤵PID:2180
-
-
C:\Users\Admin\AppData\Local\Temp\95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe/stext C:\Users\Admin\AppData\Local\Temp\opera.txt3⤵PID:2240
-
-
C:\Users\Admin\AppData\Local\Temp\95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe/stext C:\Users\Admin\AppData\Local\Temp\vnc.txt3⤵PID:2564
-
-