Analysis
-
max time kernel
140s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 01:37
Static task
static1
Behavioral task
behavioral1
Sample
a0bb5d5e5900f53cf59b85505817d205_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a0bb5d5e5900f53cf59b85505817d205_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a0bb5d5e5900f53cf59b85505817d205_JaffaCakes118.exe
-
Size
308KB
-
MD5
a0bb5d5e5900f53cf59b85505817d205
-
SHA1
2a1bf62d166981db11c9d47f9f1cfc27a3d26af4
-
SHA256
1f4940dee6b45d090229d4c93c5ea7c3e772a3ee5fa4a8dae22df2d09fe7930a
-
SHA512
91b8f115ed3195c6256e5db22b3e69c3e7d26016a8069e1f89da3339664e93f6e5d64f48de977fac3d785cd1a00663b6f8316a8cb5ef17df4967b4566deaf77b
-
SSDEEP
6144:9RkDeqSoCmANolT1eJvLhz6PmyTq+a2Xaeeik8/WSfHTscC17yGEu7:5Nmso16jhz6PmIb9XDeihfAcC9yGEu7
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2220 Services.exe 1572 auto.power.on.&.shutdown.2.xx-patch.exe 1164 Services.exe -
Loads dropped DLL 13 IoCs
pid Process 1672 a0bb5d5e5900f53cf59b85505817d205_JaffaCakes118.exe 1672 a0bb5d5e5900f53cf59b85505817d205_JaffaCakes118.exe 1672 a0bb5d5e5900f53cf59b85505817d205_JaffaCakes118.exe 1572 auto.power.on.&.shutdown.2.xx-patch.exe 1572 auto.power.on.&.shutdown.2.xx-patch.exe 1572 auto.power.on.&.shutdown.2.xx-patch.exe 2220 Services.exe 2220 Services.exe 2220 Services.exe 2220 Services.exe 1164 Services.exe 1164 Services.exe 1164 Services.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/files/0x00080000000173c2-17.dat upx behavioral1/memory/1572-18-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/1164-39-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/1164-41-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/1164-40-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/1164-34-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/1164-30-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/1164-44-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/1572-46-0x0000000000400000-0x0000000000455000-memory.dmp upx -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2220 set thread context of 1164 2220 Services.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a0bb5d5e5900f53cf59b85505817d205_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language auto.power.on.&.shutdown.2.xx-patch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1988 timeout.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2220 Services.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 1672 wrote to memory of 2220 1672 a0bb5d5e5900f53cf59b85505817d205_JaffaCakes118.exe 30 PID 1672 wrote to memory of 2220 1672 a0bb5d5e5900f53cf59b85505817d205_JaffaCakes118.exe 30 PID 1672 wrote to memory of 2220 1672 a0bb5d5e5900f53cf59b85505817d205_JaffaCakes118.exe 30 PID 1672 wrote to memory of 2220 1672 a0bb5d5e5900f53cf59b85505817d205_JaffaCakes118.exe 30 PID 1672 wrote to memory of 2220 1672 a0bb5d5e5900f53cf59b85505817d205_JaffaCakes118.exe 30 PID 1672 wrote to memory of 2220 1672 a0bb5d5e5900f53cf59b85505817d205_JaffaCakes118.exe 30 PID 1672 wrote to memory of 2220 1672 a0bb5d5e5900f53cf59b85505817d205_JaffaCakes118.exe 30 PID 1672 wrote to memory of 1572 1672 a0bb5d5e5900f53cf59b85505817d205_JaffaCakes118.exe 31 PID 1672 wrote to memory of 1572 1672 a0bb5d5e5900f53cf59b85505817d205_JaffaCakes118.exe 31 PID 1672 wrote to memory of 1572 1672 a0bb5d5e5900f53cf59b85505817d205_JaffaCakes118.exe 31 PID 1672 wrote to memory of 1572 1672 a0bb5d5e5900f53cf59b85505817d205_JaffaCakes118.exe 31 PID 1672 wrote to memory of 1572 1672 a0bb5d5e5900f53cf59b85505817d205_JaffaCakes118.exe 31 PID 1672 wrote to memory of 1572 1672 a0bb5d5e5900f53cf59b85505817d205_JaffaCakes118.exe 31 PID 1672 wrote to memory of 1572 1672 a0bb5d5e5900f53cf59b85505817d205_JaffaCakes118.exe 31 PID 2220 wrote to memory of 1164 2220 Services.exe 32 PID 2220 wrote to memory of 1164 2220 Services.exe 32 PID 2220 wrote to memory of 1164 2220 Services.exe 32 PID 2220 wrote to memory of 1164 2220 Services.exe 32 PID 2220 wrote to memory of 1164 2220 Services.exe 32 PID 2220 wrote to memory of 1164 2220 Services.exe 32 PID 2220 wrote to memory of 1164 2220 Services.exe 32 PID 2220 wrote to memory of 1164 2220 Services.exe 32 PID 2220 wrote to memory of 1164 2220 Services.exe 32 PID 2220 wrote to memory of 1164 2220 Services.exe 32 PID 2220 wrote to memory of 1164 2220 Services.exe 32 PID 2220 wrote to memory of 1164 2220 Services.exe 32 PID 1164 wrote to memory of 2160 1164 Services.exe 33 PID 1164 wrote to memory of 2160 1164 Services.exe 33 PID 1164 wrote to memory of 2160 1164 Services.exe 33 PID 1164 wrote to memory of 2160 1164 Services.exe 33 PID 1164 wrote to memory of 2160 1164 Services.exe 33 PID 1164 wrote to memory of 2160 1164 Services.exe 33 PID 1164 wrote to memory of 2160 1164 Services.exe 33 PID 2160 wrote to memory of 1988 2160 cmd.exe 35 PID 2160 wrote to memory of 1988 2160 cmd.exe 35 PID 2160 wrote to memory of 1988 2160 cmd.exe 35 PID 2160 wrote to memory of 1988 2160 cmd.exe 35 PID 2160 wrote to memory of 1988 2160 cmd.exe 35 PID 2160 wrote to memory of 1988 2160 cmd.exe 35 PID 2160 wrote to memory of 1988 2160 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\a0bb5d5e5900f53cf59b85505817d205_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a0bb5d5e5900f53cf59b85505817d205_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\Services.exe"C:\Users\Admin\AppData\Local\Temp\Services.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\Services.exeC:\Users\Admin\AppData\Local\Temp\Services.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 5 && del C:\Users\Admin\AppData\Local\Temp\Services.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\SysWOW64\timeout.exetimeout 55⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1988
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\auto.power.on.&.shutdown.2.xx-patch.exe"C:\Users\Admin\AppData\Local\Temp\auto.power.on.&.shutdown.2.xx-patch.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1572
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
232KB
MD589d772f3cb98bb5d708ce01ae8438739
SHA1c89ef639cb09bee738f171592c5a87c53134a9a2
SHA256ce14a27336b8bc3ac4ff2b55e90b45a559cb586b7b91456ec4a2154738355d78
SHA512239bba70236ebd010aaf2824e17202b5455f2cf76ff0206eb9468fe250d6334e8e45e8336f069f8b5a00a28a1abef34834145cca954224b50f955e6378d59f07
-
Filesize
126KB
MD5ce06140880371574e24fcd2af037a315
SHA1e310ad6a5b9ccb7f3a131b729f95b5f104951056
SHA2569f4e4373045a9694ee50b7736585b17ac199a150140ef2dfc1f9ae9a2c8e6fe6
SHA512c5f44975b193cba8d9c5edeb3516ce66c47dc5966f1bee760665970eae6b987844583fbac50d160aa91472f58982fcdbf2c6532a415ab6d228d10f3de73e0736
-
Filesize
9KB
MD5780d14604d49e3c634200c523def8351
SHA1e208ef6f421d2260070a9222f1f918f1de0a8eeb
SHA256844eb66a10b848d3a71a8c63c35f0a01550a46d2ff8503e2ca8947978b03b4d2
SHA512a49c030f11da8f0cdc4205c86bec00653ec2f8899983cad9d7195fd23255439291aaec5a7e128e1a103efd93b8566e86f15af89eba4efebf9debce14a7a5564b