Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14/08/2024, 17:58
Static task
static1
Behavioral task
behavioral1
Sample
9717b585ab28d053de361f5129468c83_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
9717b585ab28d053de361f5129468c83_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
9717b585ab28d053de361f5129468c83_JaffaCakes118.exe
-
Size
94KB
-
MD5
9717b585ab28d053de361f5129468c83
-
SHA1
17e88e5711a76ea3db41b120817a8e3aff952b0f
-
SHA256
8065051786f700aabd7998b1960160970c1d9794c332ecf353fb1e03e18b4805
-
SHA512
887a89267070178a5010d992a42034d5d41d60f79642dbda50fdcf0b0763589d43b2d8fd04254159428b976f37a18d5fa9ef27d5feb1a8766062733e10d7a42f
-
SSDEEP
1536:3YTKkIsmW36qtqitZnz/I5AoLZzQuOQD6MCDkZI/6kmqRwTqWAKjfRBiG:3YTKkIsmW36qtqGnz/wrLZsuOjnAZIi/
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2880 servrr.exe 2572 servrr.exe 2592 svchost.exe -
Loads dropped DLL 3 IoCs
pid Process 2880 servrr.exe 2572 servrr.exe 2572 servrr.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
resource yara_rule behavioral1/files/0x001a000000016c80-7.dat upx behavioral1/memory/2880-8-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral1/memory/2880-30-0x0000000000400000-0x000000000040C000-memory.dmp upx -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2880 set thread context of 2572 2880 servrr.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language servrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language servrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 484 timeout.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeSecurityPrivilege 2756 9717b585ab28d053de361f5129468c83_JaffaCakes118.exe Token: SeSecurityPrivilege 2756 9717b585ab28d053de361f5129468c83_JaffaCakes118.exe Token: SeSecurityPrivilege 2756 9717b585ab28d053de361f5129468c83_JaffaCakes118.exe Token: SeSecurityPrivilege 2756 9717b585ab28d053de361f5129468c83_JaffaCakes118.exe Token: SeSecurityPrivilege 2756 9717b585ab28d053de361f5129468c83_JaffaCakes118.exe Token: SeSecurityPrivilege 2756 9717b585ab28d053de361f5129468c83_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2880 servrr.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 2756 wrote to memory of 2880 2756 9717b585ab28d053de361f5129468c83_JaffaCakes118.exe 31 PID 2756 wrote to memory of 2880 2756 9717b585ab28d053de361f5129468c83_JaffaCakes118.exe 31 PID 2756 wrote to memory of 2880 2756 9717b585ab28d053de361f5129468c83_JaffaCakes118.exe 31 PID 2756 wrote to memory of 2880 2756 9717b585ab28d053de361f5129468c83_JaffaCakes118.exe 31 PID 2880 wrote to memory of 2572 2880 servrr.exe 32 PID 2880 wrote to memory of 2572 2880 servrr.exe 32 PID 2880 wrote to memory of 2572 2880 servrr.exe 32 PID 2880 wrote to memory of 2572 2880 servrr.exe 32 PID 2880 wrote to memory of 2572 2880 servrr.exe 32 PID 2880 wrote to memory of 2572 2880 servrr.exe 32 PID 2880 wrote to memory of 2572 2880 servrr.exe 32 PID 2880 wrote to memory of 2572 2880 servrr.exe 32 PID 2880 wrote to memory of 2572 2880 servrr.exe 32 PID 2880 wrote to memory of 2572 2880 servrr.exe 32 PID 2572 wrote to memory of 2592 2572 servrr.exe 33 PID 2572 wrote to memory of 2592 2572 servrr.exe 33 PID 2572 wrote to memory of 2592 2572 servrr.exe 33 PID 2572 wrote to memory of 2592 2572 servrr.exe 33 PID 2572 wrote to memory of 720 2572 servrr.exe 34 PID 2572 wrote to memory of 720 2572 servrr.exe 34 PID 2572 wrote to memory of 720 2572 servrr.exe 34 PID 2572 wrote to memory of 720 2572 servrr.exe 34 PID 720 wrote to memory of 484 720 cmd.exe 36 PID 720 wrote to memory of 484 720 cmd.exe 36 PID 720 wrote to memory of 484 720 cmd.exe 36 PID 720 wrote to memory of 484 720 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\9717b585ab28d053de361f5129468c83_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9717b585ab28d053de361f5129468c83_JaffaCakes118.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\ProgramData\servrr\servrr.exeC:\ProgramData\servrr\servrr.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\ProgramData\servrr\servrr.exe"C:\ProgramData\servrr\servrr.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"4⤵
- Executes dropped EXE
PID:2592
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 5 && del C:\PROGRA~3\servrr\servrr.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:720 -
C:\Windows\SysWOW64\timeout.exetimeout 55⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:484
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39KB
MD51094ed296086c5bf5b0e32583fcbdd7c
SHA1dff26d3b1ebbd40fd7f35e387aa6bab08b1cd6c8
SHA2567c40be5bbbfad31dfb32136c7e379d94ef79da77982c066f552d24983484798f
SHA512743a23b3a8fd5d3d4c8d41dccbbbc216881052be0be728f88b5841da7638e89a8814d375eb9798cecd015e6c6e4ee6389493d134ed08e42cdda1b9076a3824d0
-
Filesize
6KB
MD597bdfb0f7311948f5dff06c9a414ca09
SHA11829bc058b5ac08c7a9d5a957d433f450489a0ff
SHA2565270f10d29847ce0e67a7213d2e37eb34e99a805bf9b8eaa1f57e15933563248
SHA5124ad58fd567014de33b6f4258a2f4cd069d7129c2b70636235d5ff8829a552f4ba9675fa84bd57bcbb12772ea47e26fcfa235ec8598e13c1f38d1270d68821fdf