Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 01:25
Static task
static1
Behavioral task
behavioral1
Sample
a4d8bde5ad011855502faba674c06787_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a4d8bde5ad011855502faba674c06787_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a4d8bde5ad011855502faba674c06787_JaffaCakes118.exe
-
Size
268KB
-
MD5
a4d8bde5ad011855502faba674c06787
-
SHA1
7e46623f634daf3d0767d14d246cf4cd358783e3
-
SHA256
c274040940d7569c7605ab79bb5612715fde118d29416750608e7c02a9ea6733
-
SHA512
0699ffe7fdd4f975541109a44e27b62b17ddeaa3163a0e8138ba7ec4aa263d8cc2ba906e9ec53ef2bcd36cf04fb6f527635a5bf567c85219d62e3937b8c05887
-
SSDEEP
3072:UitfJFBkJyqf9uXpGvRGqelQ1HIgfegAXQu88ptCFHQRl8ewJcJTcfnbJI4wP8L8:yB9qWRGiHI4AXQuSQn/SfCVPgezmqvV
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2084 873D3F8AE56.exe 3040 fGXCF02.exe -
Loads dropped DLL 4 IoCs
pid Process 2232 a4d8bde5ad011855502faba674c06787_JaffaCakes118.exe 2232 a4d8bde5ad011855502faba674c06787_JaffaCakes118.exe 2084 873D3F8AE56.exe 2084 873D3F8AE56.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2232-3-0x0000000000400000-0x00000000004FB000-memory.dmp upx behavioral1/memory/2232-9-0x0000000000400000-0x00000000004FB000-memory.dmp upx behavioral1/memory/2084-22-0x0000000000400000-0x00000000004FB000-memory.dmp upx behavioral1/memory/2084-18-0x0000000000400000-0x00000000004FB000-memory.dmp upx behavioral1/memory/2084-28-0x0000000000400000-0x00000000004FB000-memory.dmp upx behavioral1/memory/2084-17-0x0000000000400000-0x00000000004FB000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\4Y3Y0C3AYG6CYFWWNRFDFJVXNTCBSFF = "C:\\serverg.Bin\\873D3F8AE56.exe /q" fGXCF02.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a4d8bde5ad011855502faba674c06787_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 873D3F8AE56.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fGXCF02.exe -
Modifies Internet Explorer Phishing Filter 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PhishingFilter\EnabledV8 = "0" fGXCF02.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PhishingFilter\ShownServiceDownBalloon = "0" fGXCF02.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PhishingFilter fGXCF02.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\ClearBrowsingHistoryOnExit = "0" fGXCF02.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery fGXCF02.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2232 a4d8bde5ad011855502faba674c06787_JaffaCakes118.exe 2232 a4d8bde5ad011855502faba674c06787_JaffaCakes118.exe 2084 873D3F8AE56.exe 3040 fGXCF02.exe 3040 fGXCF02.exe 3040 fGXCF02.exe 3040 fGXCF02.exe 3040 fGXCF02.exe 3040 fGXCF02.exe 3040 fGXCF02.exe 3040 fGXCF02.exe 3040 fGXCF02.exe 3040 fGXCF02.exe 3040 fGXCF02.exe 3040 fGXCF02.exe 3040 fGXCF02.exe 3040 fGXCF02.exe 3040 fGXCF02.exe 3040 fGXCF02.exe 3040 fGXCF02.exe 3040 fGXCF02.exe 3040 fGXCF02.exe 3040 fGXCF02.exe 3040 fGXCF02.exe 3040 fGXCF02.exe 3040 fGXCF02.exe 3040 fGXCF02.exe 3040 fGXCF02.exe 3040 fGXCF02.exe 3040 fGXCF02.exe 3040 fGXCF02.exe 3040 fGXCF02.exe 3040 fGXCF02.exe 3040 fGXCF02.exe 3040 fGXCF02.exe 3040 fGXCF02.exe 3040 fGXCF02.exe 3040 fGXCF02.exe 3040 fGXCF02.exe 3040 fGXCF02.exe 3040 fGXCF02.exe 3040 fGXCF02.exe 3040 fGXCF02.exe 3040 fGXCF02.exe 3040 fGXCF02.exe 3040 fGXCF02.exe 3040 fGXCF02.exe 3040 fGXCF02.exe 3040 fGXCF02.exe 3040 fGXCF02.exe 3040 fGXCF02.exe 3040 fGXCF02.exe 3040 fGXCF02.exe 3040 fGXCF02.exe 3040 fGXCF02.exe 3040 fGXCF02.exe 3040 fGXCF02.exe 3040 fGXCF02.exe 3040 fGXCF02.exe 3040 fGXCF02.exe 3040 fGXCF02.exe 3040 fGXCF02.exe 3040 fGXCF02.exe 3040 fGXCF02.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2232 a4d8bde5ad011855502faba674c06787_JaffaCakes118.exe Token: SeDebugPrivilege 2232 a4d8bde5ad011855502faba674c06787_JaffaCakes118.exe Token: SeDebugPrivilege 2232 a4d8bde5ad011855502faba674c06787_JaffaCakes118.exe Token: SeDebugPrivilege 2232 a4d8bde5ad011855502faba674c06787_JaffaCakes118.exe Token: SeDebugPrivilege 2084 873D3F8AE56.exe Token: SeDebugPrivilege 2084 873D3F8AE56.exe Token: SeDebugPrivilege 3040 fGXCF02.exe Token: SeDebugPrivilege 3040 fGXCF02.exe Token: SeDebugPrivilege 3040 fGXCF02.exe Token: SeDebugPrivilege 3040 fGXCF02.exe Token: SeDebugPrivilege 3040 fGXCF02.exe Token: SeDebugPrivilege 3040 fGXCF02.exe Token: SeDebugPrivilege 3040 fGXCF02.exe Token: SeDebugPrivilege 3040 fGXCF02.exe Token: SeDebugPrivilege 3040 fGXCF02.exe Token: SeDebugPrivilege 3040 fGXCF02.exe Token: SeDebugPrivilege 3040 fGXCF02.exe Token: SeDebugPrivilege 3040 fGXCF02.exe Token: SeDebugPrivilege 3040 fGXCF02.exe Token: SeDebugPrivilege 3040 fGXCF02.exe Token: SeDebugPrivilege 3040 fGXCF02.exe Token: SeDebugPrivilege 3040 fGXCF02.exe Token: SeDebugPrivilege 3040 fGXCF02.exe Token: SeDebugPrivilege 3040 fGXCF02.exe Token: SeDebugPrivilege 3040 fGXCF02.exe Token: SeDebugPrivilege 3040 fGXCF02.exe Token: SeDebugPrivilege 3040 fGXCF02.exe Token: SeDebugPrivilege 3040 fGXCF02.exe Token: SeDebugPrivilege 3040 fGXCF02.exe Token: SeDebugPrivilege 3040 fGXCF02.exe Token: SeDebugPrivilege 3040 fGXCF02.exe Token: SeDebugPrivilege 3040 fGXCF02.exe Token: SeDebugPrivilege 3040 fGXCF02.exe Token: SeDebugPrivilege 3040 fGXCF02.exe Token: SeDebugPrivilege 3040 fGXCF02.exe Token: SeDebugPrivilege 3040 fGXCF02.exe Token: SeDebugPrivilege 3040 fGXCF02.exe Token: SeDebugPrivilege 3040 fGXCF02.exe Token: SeDebugPrivilege 3040 fGXCF02.exe Token: SeDebugPrivilege 3040 fGXCF02.exe Token: SeDebugPrivilege 3040 fGXCF02.exe Token: SeDebugPrivilege 3040 fGXCF02.exe Token: SeDebugPrivilege 3040 fGXCF02.exe Token: SeDebugPrivilege 3040 fGXCF02.exe Token: SeDebugPrivilege 3040 fGXCF02.exe Token: SeDebugPrivilege 3040 fGXCF02.exe Token: SeDebugPrivilege 3040 fGXCF02.exe Token: SeDebugPrivilege 3040 fGXCF02.exe Token: SeDebugPrivilege 3040 fGXCF02.exe Token: SeDebugPrivilege 3040 fGXCF02.exe Token: SeDebugPrivilege 3040 fGXCF02.exe Token: SeDebugPrivilege 3040 fGXCF02.exe Token: SeDebugPrivilege 3040 fGXCF02.exe Token: SeDebugPrivilege 3040 fGXCF02.exe Token: SeDebugPrivilege 3040 fGXCF02.exe Token: SeDebugPrivilege 3040 fGXCF02.exe Token: SeDebugPrivilege 3040 fGXCF02.exe Token: SeDebugPrivilege 3040 fGXCF02.exe Token: SeDebugPrivilege 3040 fGXCF02.exe Token: SeDebugPrivilege 3040 fGXCF02.exe Token: SeDebugPrivilege 3040 fGXCF02.exe Token: SeDebugPrivilege 3040 fGXCF02.exe Token: SeDebugPrivilege 3040 fGXCF02.exe Token: SeDebugPrivilege 3040 fGXCF02.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2084 2232 a4d8bde5ad011855502faba674c06787_JaffaCakes118.exe 30 PID 2232 wrote to memory of 2084 2232 a4d8bde5ad011855502faba674c06787_JaffaCakes118.exe 30 PID 2232 wrote to memory of 2084 2232 a4d8bde5ad011855502faba674c06787_JaffaCakes118.exe 30 PID 2232 wrote to memory of 2084 2232 a4d8bde5ad011855502faba674c06787_JaffaCakes118.exe 30 PID 2084 wrote to memory of 3040 2084 873D3F8AE56.exe 31 PID 2084 wrote to memory of 3040 2084 873D3F8AE56.exe 31 PID 2084 wrote to memory of 3040 2084 873D3F8AE56.exe 31 PID 2084 wrote to memory of 3040 2084 873D3F8AE56.exe 31 PID 2084 wrote to memory of 3040 2084 873D3F8AE56.exe 31 PID 2084 wrote to memory of 3040 2084 873D3F8AE56.exe 31 PID 3040 wrote to memory of 2232 3040 fGXCF02.exe 29 PID 3040 wrote to memory of 2232 3040 fGXCF02.exe 29 PID 3040 wrote to memory of 2232 3040 fGXCF02.exe 29 PID 3040 wrote to memory of 2232 3040 fGXCF02.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\a4d8bde5ad011855502faba674c06787_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a4d8bde5ad011855502faba674c06787_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\serverg.Bin\873D3F8AE56.exe"C:\serverg.Bin\873D3F8AE56.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\fGXCF02.exe"C:\Users\Admin\AppData\Local\Temp\fGXCF02.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3040
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD529090b6b4d6605a97ac760d06436ac2d
SHA1d929d3389642e52bae5ad8512293c9c4d3e4fab5
SHA25698a24f0caf5b578e230e6f1103a5fba6aecb28a9128cad5520fcde546d643272
SHA5129121ec42fa66e14a4fc3932c8dbcc8fb1a93ab9de00da57a82e176faa70b73f6992f8c5e2ab52c02fc28c8f0c59aee73b6fbbd39107db7d15105054f4390e9be
-
Filesize
268KB
MD5a4d8bde5ad011855502faba674c06787
SHA17e46623f634daf3d0767d14d246cf4cd358783e3
SHA256c274040940d7569c7605ab79bb5612715fde118d29416750608e7c02a9ea6733
SHA5120699ffe7fdd4f975541109a44e27b62b17ddeaa3163a0e8138ba7ec4aa263d8cc2ba906e9ec53ef2bcd36cf04fb6f527635a5bf567c85219d62e3937b8c05887
-
Filesize
76KB
MD5159427bc1865e157ec79c066a670588b
SHA159b6fc6e25f5e251ed1a8612c0d8a356cf959ddd
SHA25627bcd1abdbab72829e9c5eb1e8b571ee2c9fc8633091c74e9623f504ccdd10ff
SHA51287fa8bdc33073de8e5e00dea0162bee3d42ecbf4d446c38b1564bcdc29b8894c9fe73084b8e673614bf57bb2bf30ecfc1a7f9b438ab78a196ed7f49778f2137f