Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
20-08-2024 21:35
Behavioral task
behavioral1
Sample
b0ed7891dc4f7edf2c5919c80fc612d2_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
b0ed7891dc4f7edf2c5919c80fc612d2_JaffaCakes118.exe
-
Size
331KB
-
MD5
b0ed7891dc4f7edf2c5919c80fc612d2
-
SHA1
e4058f0a748b5195d208b6b7dd8ffddbcc50d130
-
SHA256
af9158cfa5eb572ee1aad81176bc969ef129fb2935ca3fbbf6491abc97a8d8a2
-
SHA512
d946f0c38cb0d76fb3d0dddb35de76bb62f709cf0720c0b21dbcca73fb057c3f9941355ca997bc8330808810082d1c0da0681fc98d2337817941e27d8a83bbb0
-
SSDEEP
6144:10kwSQGyhOiqP+FaceKNetdWQofQB9+5fKQL6NhhrY9i7w4De:WEQN7qP4XebWPf0UKSK9/75D
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2564 B6232F3AD35.exe 2904 DMA9109.exe -
Loads dropped DLL 4 IoCs
pid Process 2028 b0ed7891dc4f7edf2c5919c80fc612d2_JaffaCakes118.exe 2028 b0ed7891dc4f7edf2c5919c80fc612d2_JaffaCakes118.exe 2564 B6232F3AD35.exe 2564 B6232F3AD35.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2028-0-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral1/memory/2028-6-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral1/memory/2028-7-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral1/memory/2028-8-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral1/memory/2028-14-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral1/files/0x0009000000015ce1-21.dat upx behavioral1/memory/2564-27-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral1/memory/2564-29-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral1/memory/2564-34-0x0000000000400000-0x0000000000497000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\4Y3Y0C3AXF7W0A5ECKYK = "C:\\Recycle.Bin\\B6232F3AD35.exe /q" DMA9109.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b0ed7891dc4f7edf2c5919c80fc612d2_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language B6232F3AD35.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DMA9109.exe -
Modifies Internet Explorer Phishing Filter 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PhishingFilter DMA9109.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PhishingFilter\EnabledV8 = "0" DMA9109.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PhishingFilter\ShownServiceDownBalloon = "0" DMA9109.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery DMA9109.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\ClearBrowsingHistoryOnExit = "0" DMA9109.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2028 b0ed7891dc4f7edf2c5919c80fc612d2_JaffaCakes118.exe 2028 b0ed7891dc4f7edf2c5919c80fc612d2_JaffaCakes118.exe 2564 B6232F3AD35.exe 2904 DMA9109.exe 2904 DMA9109.exe 2904 DMA9109.exe 2904 DMA9109.exe 2904 DMA9109.exe 2904 DMA9109.exe 2904 DMA9109.exe 2904 DMA9109.exe 2904 DMA9109.exe 2904 DMA9109.exe 2904 DMA9109.exe 2904 DMA9109.exe 2904 DMA9109.exe 2904 DMA9109.exe 2904 DMA9109.exe 2904 DMA9109.exe 2904 DMA9109.exe 2904 DMA9109.exe 2904 DMA9109.exe 2904 DMA9109.exe 2904 DMA9109.exe 2904 DMA9109.exe 2904 DMA9109.exe 2904 DMA9109.exe 2904 DMA9109.exe 2904 DMA9109.exe 2904 DMA9109.exe 2904 DMA9109.exe 2904 DMA9109.exe 2904 DMA9109.exe 2904 DMA9109.exe 2904 DMA9109.exe 2904 DMA9109.exe 2904 DMA9109.exe 2904 DMA9109.exe 2904 DMA9109.exe 2904 DMA9109.exe 2904 DMA9109.exe 2904 DMA9109.exe 2904 DMA9109.exe 2904 DMA9109.exe 2904 DMA9109.exe 2904 DMA9109.exe 2904 DMA9109.exe 2904 DMA9109.exe 2904 DMA9109.exe 2904 DMA9109.exe 2904 DMA9109.exe 2904 DMA9109.exe 2904 DMA9109.exe 2904 DMA9109.exe 2904 DMA9109.exe 2904 DMA9109.exe 2904 DMA9109.exe 2904 DMA9109.exe 2904 DMA9109.exe 2904 DMA9109.exe 2904 DMA9109.exe 2904 DMA9109.exe 2904 DMA9109.exe 2904 DMA9109.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2028 b0ed7891dc4f7edf2c5919c80fc612d2_JaffaCakes118.exe Token: SeDebugPrivilege 2028 b0ed7891dc4f7edf2c5919c80fc612d2_JaffaCakes118.exe Token: SeDebugPrivilege 2028 b0ed7891dc4f7edf2c5919c80fc612d2_JaffaCakes118.exe Token: SeDebugPrivilege 2028 b0ed7891dc4f7edf2c5919c80fc612d2_JaffaCakes118.exe Token: SeDebugPrivilege 2564 B6232F3AD35.exe Token: SeDebugPrivilege 2564 B6232F3AD35.exe Token: SeDebugPrivilege 2904 DMA9109.exe Token: SeDebugPrivilege 2904 DMA9109.exe Token: SeDebugPrivilege 2904 DMA9109.exe Token: SeDebugPrivilege 2904 DMA9109.exe Token: SeDebugPrivilege 2904 DMA9109.exe Token: SeDebugPrivilege 2904 DMA9109.exe Token: SeDebugPrivilege 2904 DMA9109.exe Token: SeDebugPrivilege 2904 DMA9109.exe Token: SeDebugPrivilege 2904 DMA9109.exe Token: SeDebugPrivilege 2904 DMA9109.exe Token: SeDebugPrivilege 2904 DMA9109.exe Token: SeDebugPrivilege 2904 DMA9109.exe Token: SeDebugPrivilege 2904 DMA9109.exe Token: SeDebugPrivilege 2904 DMA9109.exe Token: SeDebugPrivilege 2904 DMA9109.exe Token: SeDebugPrivilege 2904 DMA9109.exe Token: SeDebugPrivilege 2904 DMA9109.exe Token: SeDebugPrivilege 2904 DMA9109.exe Token: SeDebugPrivilege 2904 DMA9109.exe Token: SeDebugPrivilege 2904 DMA9109.exe Token: SeDebugPrivilege 2904 DMA9109.exe Token: SeDebugPrivilege 2904 DMA9109.exe Token: SeDebugPrivilege 2904 DMA9109.exe Token: SeDebugPrivilege 2904 DMA9109.exe Token: SeDebugPrivilege 2904 DMA9109.exe Token: SeDebugPrivilege 2904 DMA9109.exe Token: SeDebugPrivilege 2904 DMA9109.exe Token: SeDebugPrivilege 2904 DMA9109.exe Token: SeDebugPrivilege 2904 DMA9109.exe Token: SeDebugPrivilege 2904 DMA9109.exe Token: SeDebugPrivilege 2904 DMA9109.exe Token: SeDebugPrivilege 2904 DMA9109.exe Token: SeDebugPrivilege 2904 DMA9109.exe Token: SeDebugPrivilege 2904 DMA9109.exe Token: SeDebugPrivilege 2904 DMA9109.exe Token: SeDebugPrivilege 2904 DMA9109.exe Token: SeDebugPrivilege 2904 DMA9109.exe Token: SeDebugPrivilege 2904 DMA9109.exe Token: SeDebugPrivilege 2904 DMA9109.exe Token: SeDebugPrivilege 2904 DMA9109.exe Token: SeDebugPrivilege 2904 DMA9109.exe Token: SeDebugPrivilege 2904 DMA9109.exe Token: SeDebugPrivilege 2904 DMA9109.exe Token: SeDebugPrivilege 2904 DMA9109.exe Token: SeDebugPrivilege 2904 DMA9109.exe Token: SeDebugPrivilege 2904 DMA9109.exe Token: SeDebugPrivilege 2904 DMA9109.exe Token: SeDebugPrivilege 2904 DMA9109.exe Token: SeDebugPrivilege 2904 DMA9109.exe Token: SeDebugPrivilege 2904 DMA9109.exe Token: SeDebugPrivilege 2904 DMA9109.exe Token: SeDebugPrivilege 2904 DMA9109.exe Token: SeDebugPrivilege 2904 DMA9109.exe Token: SeDebugPrivilege 2904 DMA9109.exe Token: SeDebugPrivilege 2904 DMA9109.exe Token: SeDebugPrivilege 2904 DMA9109.exe Token: SeDebugPrivilege 2904 DMA9109.exe Token: SeDebugPrivilege 2904 DMA9109.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2028 wrote to memory of 2564 2028 b0ed7891dc4f7edf2c5919c80fc612d2_JaffaCakes118.exe 28 PID 2028 wrote to memory of 2564 2028 b0ed7891dc4f7edf2c5919c80fc612d2_JaffaCakes118.exe 28 PID 2028 wrote to memory of 2564 2028 b0ed7891dc4f7edf2c5919c80fc612d2_JaffaCakes118.exe 28 PID 2028 wrote to memory of 2564 2028 b0ed7891dc4f7edf2c5919c80fc612d2_JaffaCakes118.exe 28 PID 2564 wrote to memory of 2904 2564 B6232F3AD35.exe 29 PID 2564 wrote to memory of 2904 2564 B6232F3AD35.exe 29 PID 2564 wrote to memory of 2904 2564 B6232F3AD35.exe 29 PID 2564 wrote to memory of 2904 2564 B6232F3AD35.exe 29 PID 2564 wrote to memory of 2904 2564 B6232F3AD35.exe 29 PID 2564 wrote to memory of 2904 2564 B6232F3AD35.exe 29 PID 2904 wrote to memory of 2028 2904 DMA9109.exe 27 PID 2904 wrote to memory of 2028 2904 DMA9109.exe 27 PID 2904 wrote to memory of 2028 2904 DMA9109.exe 27 PID 2904 wrote to memory of 2028 2904 DMA9109.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\b0ed7891dc4f7edf2c5919c80fc612d2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b0ed7891dc4f7edf2c5919c80fc612d2_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Recycle.Bin\B6232F3AD35.exe"C:\Recycle.Bin\B6232F3AD35.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Users\Admin\AppData\Local\Temp\DMA9109.exe"C:\Users\Admin\AppData\Local\Temp\DMA9109.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2904
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5d948b597817806aa0d4417946f24f35b
SHA1dbf26ba71d0a41cf54f66a9c8988d6f8e81f4a24
SHA256887f922dba422f9928ac8c22cafb867b1c93e15e0fc17de1a689b5e7757d678f
SHA51262c9482dddb42e4eb142220cd9bd091df7d7a386306229f0630905339c986d71bfa0cb7849e802acef043e17fd2a7c1743cb421bdc7c8c70ea44a301d8396d43
-
Filesize
331KB
MD5b0ed7891dc4f7edf2c5919c80fc612d2
SHA1e4058f0a748b5195d208b6b7dd8ffddbcc50d130
SHA256af9158cfa5eb572ee1aad81176bc969ef129fb2935ca3fbbf6491abc97a8d8a2
SHA512d946f0c38cb0d76fb3d0dddb35de76bb62f709cf0720c0b21dbcca73fb057c3f9941355ca997bc8330808810082d1c0da0681fc98d2337817941e27d8a83bbb0
-
Filesize
3KB
MD529090b6b4d6605a97ac760d06436ac2d
SHA1d929d3389642e52bae5ad8512293c9c4d3e4fab5
SHA25698a24f0caf5b578e230e6f1103a5fba6aecb28a9128cad5520fcde546d643272
SHA5129121ec42fa66e14a4fc3932c8dbcc8fb1a93ab9de00da57a82e176faa70b73f6992f8c5e2ab52c02fc28c8f0c59aee73b6fbbd39107db7d15105054f4390e9be