Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/08/2024, 07:28
Static task
static1
Behavioral task
behavioral1
Sample
95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe
-
Size
340KB
-
MD5
95268a7ca995494a01a1fae4f8c64386
-
SHA1
45b50cc7827903fd182dfd79a945b86934dc4f9d
-
SHA256
e1315c5d45b564fcd7732dc134c758e2b14ae3972c81235bbd15424bbb2f7bb5
-
SHA512
cddf7ba8ca744cce7efaec5d68afcf35767d8fe23e36bd6302cfd00c75cf3aa9a22968b60c0649bb3bd2abd75677c72f851344bda479f808bd807e3b4261a296
-
SSDEEP
6144:IEB6DO7G6DPaxOyVBWQc0PmtqtLd8brLdbOqhIkIxWe8NTC0Sge:IEsDqrHybWQchaLd8nLdbt7/NXJe
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe -
Disables Task Manager via registry modification
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\WINDOWS\system32\drivers\etc\hosts 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/2140-4-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral2/memory/2140-7-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral2/memory/2140-8-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral2/memory/2140-20-0x0000000000400000-0x000000000043C000-memory.dmp upx -
Suspicious use of SetThreadContext 8 IoCs
description pid Process procid_target PID 2636 set thread context of 2140 2636 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 87 PID 2140 set thread context of 3088 2140 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 122 PID 2140 set thread context of 32 2140 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 123 PID 2140 set thread context of 3520 2140 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 124 PID 2140 set thread context of 3412 2140 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 126 PID 2140 set thread context of 1272 2140 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 127 PID 2140 set thread context of 1464 2140 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 128 PID 2140 set thread context of 3512 2140 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 129 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\WINDOWS\HOSTS 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
pid pid_target Process procid_target 2016 3412 WerFault.exe 126 4244 3520 WerFault.exe 124 1648 1464 WerFault.exe 128 2300 32 WerFault.exe 123 -
System Location Discovery: System Language Discovery 1 TTPs 19 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe -
Kills process with taskkill 11 IoCs
pid Process 5008 taskkill.exe 400 taskkill.exe 4460 taskkill.exe 1620 taskkill.exe 1956 taskkill.exe 2792 taskkill.exe 4412 taskkill.exe 3356 taskkill.exe 2248 taskkill.exe 3224 taskkill.exe 2448 taskkill.exe -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 5008 taskkill.exe Token: SeDebugPrivilege 2792 taskkill.exe Token: SeDebugPrivilege 4412 taskkill.exe Token: SeDebugPrivilege 3356 taskkill.exe Token: SeDebugPrivilege 400 taskkill.exe Token: SeDebugPrivilege 4460 taskkill.exe Token: SeDebugPrivilege 1620 taskkill.exe Token: SeDebugPrivilege 2248 taskkill.exe Token: SeDebugPrivilege 1956 taskkill.exe Token: SeDebugPrivilege 2448 taskkill.exe Token: SeDebugPrivilege 3224 taskkill.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2636 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 2140 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2636 wrote to memory of 2140 2636 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 87 PID 2636 wrote to memory of 2140 2636 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 87 PID 2636 wrote to memory of 2140 2636 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 87 PID 2636 wrote to memory of 2140 2636 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 87 PID 2636 wrote to memory of 2140 2636 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 87 PID 2636 wrote to memory of 2140 2636 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 87 PID 2636 wrote to memory of 2140 2636 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 87 PID 2636 wrote to memory of 2140 2636 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 87 PID 2140 wrote to memory of 5040 2140 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 89 PID 2140 wrote to memory of 5040 2140 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 89 PID 2140 wrote to memory of 5040 2140 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 89 PID 2140 wrote to memory of 5008 2140 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 90 PID 2140 wrote to memory of 5008 2140 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 90 PID 2140 wrote to memory of 5008 2140 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 90 PID 5040 wrote to memory of 3040 5040 net.exe 93 PID 5040 wrote to memory of 3040 5040 net.exe 93 PID 5040 wrote to memory of 3040 5040 net.exe 93 PID 2140 wrote to memory of 2792 2140 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 94 PID 2140 wrote to memory of 2792 2140 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 94 PID 2140 wrote to memory of 2792 2140 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 94 PID 2140 wrote to memory of 4412 2140 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 96 PID 2140 wrote to memory of 4412 2140 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 96 PID 2140 wrote to memory of 4412 2140 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 96 PID 2140 wrote to memory of 3356 2140 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 97 PID 2140 wrote to memory of 3356 2140 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 97 PID 2140 wrote to memory of 3356 2140 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 97 PID 2140 wrote to memory of 400 2140 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 100 PID 2140 wrote to memory of 400 2140 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 100 PID 2140 wrote to memory of 400 2140 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 100 PID 2140 wrote to memory of 4460 2140 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 102 PID 2140 wrote to memory of 4460 2140 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 102 PID 2140 wrote to memory of 4460 2140 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 102 PID 2140 wrote to memory of 1620 2140 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 103 PID 2140 wrote to memory of 1620 2140 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 103 PID 2140 wrote to memory of 1620 2140 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 103 PID 2140 wrote to memory of 3924 2140 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 104 PID 2140 wrote to memory of 3924 2140 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 104 PID 2140 wrote to memory of 3924 2140 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 104 PID 3924 wrote to memory of 3436 3924 net.exe 108 PID 3924 wrote to memory of 3436 3924 net.exe 108 PID 3924 wrote to memory of 3436 3924 net.exe 108 PID 2140 wrote to memory of 1956 2140 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 109 PID 2140 wrote to memory of 1956 2140 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 109 PID 2140 wrote to memory of 1956 2140 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 109 PID 2140 wrote to memory of 2248 2140 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 110 PID 2140 wrote to memory of 2248 2140 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 110 PID 2140 wrote to memory of 2248 2140 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 110 PID 2140 wrote to memory of 2448 2140 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 113 PID 2140 wrote to memory of 2448 2140 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 113 PID 2140 wrote to memory of 2448 2140 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 113 PID 2140 wrote to memory of 3224 2140 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 114 PID 2140 wrote to memory of 3224 2140 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 114 PID 2140 wrote to memory of 3224 2140 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 114 PID 2140 wrote to memory of 3212 2140 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 115 PID 2140 wrote to memory of 3212 2140 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 115 PID 2140 wrote to memory of 3212 2140 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 115 PID 3212 wrote to memory of 2540 3212 net.exe 119 PID 3212 wrote to memory of 2540 3212 net.exe 119 PID 3212 wrote to memory of 2540 3212 net.exe 119 PID 2140 wrote to memory of 3088 2140 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 122 PID 2140 wrote to memory of 3088 2140 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 122 PID 2140 wrote to memory of 3088 2140 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 122 PID 2140 wrote to memory of 3088 2140 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 122 PID 2140 wrote to memory of 3088 2140 95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe 122
Processes
-
C:\Users\Admin\AppData\Local\Temp\95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe2⤵
- Modifies security service
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\SysWOW64\net.exenet stop wscsvc3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc4⤵
- System Location Discovery: System Language Discovery
PID:3040
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im TeaTimer.exe /f3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5008
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im SpybotSD.exe /f3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2792
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im SDUpdate.exe /f3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4412
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im Update.exe /f3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3356
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im mbam.exe /f3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:400
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im AAWService.exe /f3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4460
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im AAWTray.exe /f3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1620
-
-
C:\Windows\SysWOW64\net.exenet stop aawservice3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop aawservice4⤵
- System Location Discovery: System Language Discovery
PID:3436
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im Ad-Aware.exe /f3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1956
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im threatwork.exe /f3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2248
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im SbieSvc.exe /f3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2448
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im SbieCtrl.exe /f3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3224
-
-
C:\Windows\SysWOW64\net.exenet stop SbieSvc3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SbieSvc4⤵
- System Location Discovery: System Language Discovery
PID:2540
-
-
-
C:\Users\Admin\AppData\Local\Temp\95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe"3⤵PID:3088
-
-
C:\Users\Admin\AppData\Local\Temp\95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe/stext C:\Users\Admin\AppData\Local\Temp\mail.txt3⤵PID:32
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 32 -s 804⤵
- Program crash
PID:2300
-
-
-
C:\Users\Admin\AppData\Local\Temp\95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe/stext C:\Users\Admin\AppData\Local\Temp\dial.txt3⤵PID:3520
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3520 -s 804⤵
- Program crash
PID:4244
-
-
-
C:\Users\Admin\AppData\Local\Temp\95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe/stext C:\Users\Admin\AppData\Local\Temp\chrome.txt3⤵PID:3412
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3412 -s 804⤵
- Program crash
PID:2016
-
-
-
C:\Users\Admin\AppData\Local\Temp\95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe/stext C:\Users\Admin\AppData\Local\Temp\prot.txt3⤵PID:1272
-
-
C:\Users\Admin\AppData\Local\Temp\95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe/stext C:\Users\Admin\AppData\Local\Temp\opera.txt3⤵PID:1464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1464 -s 804⤵
- Program crash
PID:1648
-
-
-
C:\Users\Admin\AppData\Local\Temp\95268a7ca995494a01a1fae4f8c64386_JaffaCakes118.exe/stext C:\Users\Admin\AppData\Local\Temp\vnc.txt3⤵PID:3512
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 32 -ip 321⤵PID:3080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3512 -ip 35121⤵PID:4008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 1272 -ip 12721⤵PID:4100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1464 -ip 14641⤵PID:1768
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 3412 -ip 34121⤵PID:1296
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3520 -ip 35201⤵PID:1208