Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
17-08-2024 23:37
Behavioral task
behavioral1
Sample
a4997fc9948dc3e0d63fe36ed09063d6_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a4997fc9948dc3e0d63fe36ed09063d6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a4997fc9948dc3e0d63fe36ed09063d6_JaffaCakes118.exe
-
Size
867KB
-
MD5
a4997fc9948dc3e0d63fe36ed09063d6
-
SHA1
b2f258fbe321b266eff60f7d2a8683bf07c7bd34
-
SHA256
e86c2193492459026a8e2dd5e341ada7679fb7c819c2de8f437392c5f50ed052
-
SHA512
43802e242ec8afbd693c914e31f7a939882391e1b7252a8f925586132851491467252f12b50f1e7a3e272f8eeacd84611afe638602258298624081b1e5bd719b
-
SSDEEP
24576:i/djifabNbQahynQ4HZ81jjbp3Lw5JCkBu:UdjifabNB8nfZeTp3LT
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2332 defender.exe -
Loads dropped DLL 3 IoCs
pid Process 2824 a4997fc9948dc3e0d63fe36ed09063d6_JaffaCakes118.exe 2824 a4997fc9948dc3e0d63fe36ed09063d6_JaffaCakes118.exe 2824 a4997fc9948dc3e0d63fe36ed09063d6_JaffaCakes118.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2824-0-0x0000000000400000-0x0000000000695000-memory.dmp upx behavioral1/files/0x0008000000015d47-15.dat upx behavioral1/memory/2332-23-0x0000000000400000-0x0000000000A26000-memory.dmp upx behavioral1/memory/2824-22-0x0000000002D10000-0x0000000003336000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\Security Protection = "C:\\ProgramData\\defender.exe" defender.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\V: defender.exe File opened (read-only) \??\X: defender.exe File opened (read-only) \??\I: defender.exe File opened (read-only) \??\J: defender.exe File opened (read-only) \??\K: defender.exe File opened (read-only) \??\Q: defender.exe File opened (read-only) \??\T: defender.exe File opened (read-only) \??\L: defender.exe File opened (read-only) \??\P: defender.exe File opened (read-only) \??\S: defender.exe File opened (read-only) \??\W: defender.exe File opened (read-only) \??\Z: defender.exe File opened (read-only) \??\H: defender.exe File opened (read-only) \??\U: defender.exe File opened (read-only) \??\R: defender.exe File opened (read-only) \??\Y: defender.exe File opened (read-only) \??\E: defender.exe File opened (read-only) \??\G: defender.exe File opened (read-only) \??\M: defender.exe File opened (read-only) \??\N: defender.exe File opened (read-only) \??\O: defender.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 defender.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a4997fc9948dc3e0d63fe36ed09063d6_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language defender.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2824 a4997fc9948dc3e0d63fe36ed09063d6_JaffaCakes118.exe 2332 defender.exe 2332 defender.exe 2332 defender.exe 2332 defender.exe 2332 defender.exe 2332 defender.exe 2332 defender.exe 2332 defender.exe 2332 defender.exe 2332 defender.exe 2332 defender.exe 2332 defender.exe 2332 defender.exe 2332 defender.exe 2332 defender.exe 2332 defender.exe 2332 defender.exe 2332 defender.exe 2332 defender.exe 2332 defender.exe 2332 defender.exe 2332 defender.exe 2332 defender.exe 2332 defender.exe 2332 defender.exe 2332 defender.exe 2332 defender.exe 2332 defender.exe 2332 defender.exe 2332 defender.exe 2332 defender.exe 2332 defender.exe 2332 defender.exe 2332 defender.exe 2332 defender.exe 2332 defender.exe 2332 defender.exe 2332 defender.exe 2332 defender.exe 2332 defender.exe 2332 defender.exe 2332 defender.exe 2332 defender.exe 2332 defender.exe 2332 defender.exe 2332 defender.exe 2332 defender.exe 2332 defender.exe 2332 defender.exe 2332 defender.exe 2332 defender.exe 2332 defender.exe 2332 defender.exe 2332 defender.exe 2332 defender.exe 2332 defender.exe 2332 defender.exe 2332 defender.exe 2332 defender.exe 2332 defender.exe 2332 defender.exe 2332 defender.exe 2332 defender.exe -
Suspicious use of FindShellTrayWindow 12 IoCs
pid Process 2332 defender.exe 2332 defender.exe 2332 defender.exe 2332 defender.exe 2332 defender.exe 2332 defender.exe 2332 defender.exe 2332 defender.exe 2332 defender.exe 2332 defender.exe 2332 defender.exe 2332 defender.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2332 defender.exe 2332 defender.exe 2332 defender.exe 2332 defender.exe 2332 defender.exe 2332 defender.exe 2332 defender.exe 2332 defender.exe 2332 defender.exe 2332 defender.exe 2332 defender.exe 2332 defender.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2332 defender.exe 2332 defender.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2824 wrote to memory of 2332 2824 a4997fc9948dc3e0d63fe36ed09063d6_JaffaCakes118.exe 31 PID 2824 wrote to memory of 2332 2824 a4997fc9948dc3e0d63fe36ed09063d6_JaffaCakes118.exe 31 PID 2824 wrote to memory of 2332 2824 a4997fc9948dc3e0d63fe36ed09063d6_JaffaCakes118.exe 31 PID 2824 wrote to memory of 2332 2824 a4997fc9948dc3e0d63fe36ed09063d6_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\a4997fc9948dc3e0d63fe36ed09063d6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a4997fc9948dc3e0d63fe36ed09063d6_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\ProgramData\defender.exeC:\ProgramData\defender.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2332
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
821KB
MD577ffbc592bbce0b254554c32b7401e59
SHA12041c8eee813d45ddf4925fa58610ef04bb6f02c
SHA2562c56c0fba15d780617b8593ae93f31cb6f403903f607de0a0e403ab30c265f59
SHA5129531340102ed2a2b970947873e167acdd46bb5490c372ef15c803a581460ce66650a6c38381984fb4e83c074c24fc3e18a13640af9f983c4ce3b78597787033e