Analysis
-
max time kernel
141s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 17:35
Behavioral task
behavioral1
Sample
abefab19051f6d1a076dbaeb69739435_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
abefab19051f6d1a076dbaeb69739435_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
abefab19051f6d1a076dbaeb69739435_JaffaCakes118.exe
-
Size
505KB
-
MD5
abefab19051f6d1a076dbaeb69739435
-
SHA1
ceffed1cb5da9fdaceb567959621f196828e036a
-
SHA256
391b7621f4ef3dbe98e0ccf838bc90311772c2cd3baaba9d73f1a709626b6f46
-
SHA512
4d3e5d62fda8f5f252e86218219c7114952b9c0557aed690c203097602f5ceef212a8993b030521de471499411118d448b6bc36d14c5cad0b0ead5bbb404645d
-
SSDEEP
12288:KzcRD02J4Sq2vHGB67KWKKmDyScXwxgi+JoCtIyTK0:IcRToImoAeScXzzoqK0
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2692 reader.exe 2880 reader.exe -
Loads dropped DLL 2 IoCs
pid Process 2376 abefab19051f6d1a076dbaeb69739435_JaffaCakes118.exe 2692 reader.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2380-0-0x0000000000400000-0x000000000050C000-memory.dmp upx behavioral1/memory/2380-22-0x0000000000400000-0x000000000050C000-memory.dmp upx behavioral1/files/0x000800000001211b-25.dat upx behavioral1/memory/2692-32-0x0000000000400000-0x000000000050C000-memory.dmp upx behavioral1/memory/2692-59-0x0000000000400000-0x000000000050C000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\winstep = "C:\\Users\\Admin\\AppData\\Roaming\\reader.exe" reader.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2380-22-0x0000000000400000-0x000000000050C000-memory.dmp autoit_exe behavioral1/memory/2692-59-0x0000000000400000-0x000000000050C000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2380 set thread context of 2376 2380 abefab19051f6d1a076dbaeb69739435_JaffaCakes118.exe 30 PID 2692 set thread context of 2880 2692 reader.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language abefab19051f6d1a076dbaeb69739435_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language abefab19051f6d1a076dbaeb69739435_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reader.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2880 reader.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 2380 abefab19051f6d1a076dbaeb69739435_JaffaCakes118.exe 2380 abefab19051f6d1a076dbaeb69739435_JaffaCakes118.exe 2380 abefab19051f6d1a076dbaeb69739435_JaffaCakes118.exe 2692 reader.exe 2692 reader.exe 2692 reader.exe -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 2380 abefab19051f6d1a076dbaeb69739435_JaffaCakes118.exe 2380 abefab19051f6d1a076dbaeb69739435_JaffaCakes118.exe 2380 abefab19051f6d1a076dbaeb69739435_JaffaCakes118.exe 2692 reader.exe 2692 reader.exe 2692 reader.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2380 wrote to memory of 2376 2380 abefab19051f6d1a076dbaeb69739435_JaffaCakes118.exe 30 PID 2380 wrote to memory of 2376 2380 abefab19051f6d1a076dbaeb69739435_JaffaCakes118.exe 30 PID 2380 wrote to memory of 2376 2380 abefab19051f6d1a076dbaeb69739435_JaffaCakes118.exe 30 PID 2380 wrote to memory of 2376 2380 abefab19051f6d1a076dbaeb69739435_JaffaCakes118.exe 30 PID 2380 wrote to memory of 2376 2380 abefab19051f6d1a076dbaeb69739435_JaffaCakes118.exe 30 PID 2380 wrote to memory of 2376 2380 abefab19051f6d1a076dbaeb69739435_JaffaCakes118.exe 30 PID 2380 wrote to memory of 2376 2380 abefab19051f6d1a076dbaeb69739435_JaffaCakes118.exe 30 PID 2380 wrote to memory of 2376 2380 abefab19051f6d1a076dbaeb69739435_JaffaCakes118.exe 30 PID 2380 wrote to memory of 2376 2380 abefab19051f6d1a076dbaeb69739435_JaffaCakes118.exe 30 PID 2380 wrote to memory of 2376 2380 abefab19051f6d1a076dbaeb69739435_JaffaCakes118.exe 30 PID 2380 wrote to memory of 2376 2380 abefab19051f6d1a076dbaeb69739435_JaffaCakes118.exe 30 PID 2380 wrote to memory of 2376 2380 abefab19051f6d1a076dbaeb69739435_JaffaCakes118.exe 30 PID 2376 wrote to memory of 2692 2376 abefab19051f6d1a076dbaeb69739435_JaffaCakes118.exe 31 PID 2376 wrote to memory of 2692 2376 abefab19051f6d1a076dbaeb69739435_JaffaCakes118.exe 31 PID 2376 wrote to memory of 2692 2376 abefab19051f6d1a076dbaeb69739435_JaffaCakes118.exe 31 PID 2376 wrote to memory of 2692 2376 abefab19051f6d1a076dbaeb69739435_JaffaCakes118.exe 31 PID 2692 wrote to memory of 2880 2692 reader.exe 32 PID 2692 wrote to memory of 2880 2692 reader.exe 32 PID 2692 wrote to memory of 2880 2692 reader.exe 32 PID 2692 wrote to memory of 2880 2692 reader.exe 32 PID 2692 wrote to memory of 2880 2692 reader.exe 32 PID 2692 wrote to memory of 2880 2692 reader.exe 32 PID 2692 wrote to memory of 2880 2692 reader.exe 32 PID 2692 wrote to memory of 2880 2692 reader.exe 32 PID 2692 wrote to memory of 2880 2692 reader.exe 32 PID 2692 wrote to memory of 2880 2692 reader.exe 32 PID 2692 wrote to memory of 2880 2692 reader.exe 32 PID 2692 wrote to memory of 2880 2692 reader.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\abefab19051f6d1a076dbaeb69739435_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\abefab19051f6d1a076dbaeb69739435_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\abefab19051f6d1a076dbaeb69739435_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\abefab19051f6d1a076dbaeb69739435_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Admin\AppData\Roaming\reader.exeC:\Users\Admin\AppData\Roaming\reader.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Roaming\reader.exe"C:\Users\Admin\AppData\Roaming\reader.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:2880
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
505KB
MD5abefab19051f6d1a076dbaeb69739435
SHA1ceffed1cb5da9fdaceb567959621f196828e036a
SHA256391b7621f4ef3dbe98e0ccf838bc90311772c2cd3baaba9d73f1a709626b6f46
SHA5124d3e5d62fda8f5f252e86218219c7114952b9c0557aed690c203097602f5ceef212a8993b030521de471499411118d448b6bc36d14c5cad0b0ead5bbb404645d