Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20-08-2024 01:08
Behavioral task
behavioral1
Sample
ad514e36f03dda43c9056cb30891c4e6_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
ad514e36f03dda43c9056cb30891c4e6_JaffaCakes118.exe
-
Size
38KB
-
MD5
ad514e36f03dda43c9056cb30891c4e6
-
SHA1
ffe7381ee1a4716f11de48b300b36f9f9059c11a
-
SHA256
14ebec94b490fffbfe2800f04e1bdb77a582f9ca30c5923e0fb278b34897100c
-
SHA512
bfe4e6d358fd157916488bc37d2a891ecbf3f16617cb7d888eca40577512e95e59c036ff65cc9d791ea28799441cb34fab1e45dbe07a2e69b0e9b76411b4660f
-
SSDEEP
768:Vo1g8s6A481XR9wBzLkD6Re6JGnY8zrBAxAlYoC8UtDT04U:Voud6XKRyBXkzdYqFMAlYNPT7U
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 812 rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 812 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2988-0-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral1/memory/2988-12-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral1/memory/2988-14-0x0000000000400000-0x0000000000418000-memory.dmp upx -
Drops file in System32 directory 11 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\yuksuser.dll ad514e36f03dda43c9056cb30891c4e6_JaffaCakes118.exe File created C:\Windows\SysWOW64\yumidimap.dll ad514e36f03dda43c9056cb30891c4e6_JaffaCakes118.exe File created C:\Windows\SysWOW64\midimap.dll ad514e36f03dda43c9056cb30891c4e6_JaffaCakes118.exe File created C:\Windows\SysWOW64\msimg32.dll ad514e36f03dda43c9056cb30891c4e6_JaffaCakes118.exe File created C:\Windows\SysWOW64\yuksuser.dll ad514e36f03dda43c9056cb30891c4e6_JaffaCakes118.exe File created C:\Windows\SysWOW64\ksuser.dll ad514e36f03dda43c9056cb30891c4e6_JaffaCakes118.exe File created C:\Windows\SysWOW64\dllcache\ksuser.dll ad514e36f03dda43c9056cb30891c4e6_JaffaCakes118.exe File created C:\Windows\SysWOW64\dllcache\midimap.dll ad514e36f03dda43c9056cb30891c4e6_JaffaCakes118.exe File created C:\Windows\SysWOW64\yumsimg32.dll ad514e36f03dda43c9056cb30891c4e6_JaffaCakes118.exe File created C:\Windows\SysWOW64\dllcache\msimg32.dll ad514e36f03dda43c9056cb30891c4e6_JaffaCakes118.exe File created C:\Windows\SysWOW64\sysapp10.dll ad514e36f03dda43c9056cb30891c4e6_JaffaCakes118.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 292 sc.exe 2064 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad514e36f03dda43c9056cb30891c4e6_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2988 ad514e36f03dda43c9056cb30891c4e6_JaffaCakes118.exe 2988 ad514e36f03dda43c9056cb30891c4e6_JaffaCakes118.exe 2988 ad514e36f03dda43c9056cb30891c4e6_JaffaCakes118.exe 2988 ad514e36f03dda43c9056cb30891c4e6_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2988 ad514e36f03dda43c9056cb30891c4e6_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2988 wrote to memory of 824 2988 ad514e36f03dda43c9056cb30891c4e6_JaffaCakes118.exe 28 PID 2988 wrote to memory of 824 2988 ad514e36f03dda43c9056cb30891c4e6_JaffaCakes118.exe 28 PID 2988 wrote to memory of 824 2988 ad514e36f03dda43c9056cb30891c4e6_JaffaCakes118.exe 28 PID 2988 wrote to memory of 824 2988 ad514e36f03dda43c9056cb30891c4e6_JaffaCakes118.exe 28 PID 2988 wrote to memory of 292 2988 ad514e36f03dda43c9056cb30891c4e6_JaffaCakes118.exe 29 PID 2988 wrote to memory of 292 2988 ad514e36f03dda43c9056cb30891c4e6_JaffaCakes118.exe 29 PID 2988 wrote to memory of 292 2988 ad514e36f03dda43c9056cb30891c4e6_JaffaCakes118.exe 29 PID 2988 wrote to memory of 292 2988 ad514e36f03dda43c9056cb30891c4e6_JaffaCakes118.exe 29 PID 2988 wrote to memory of 2064 2988 ad514e36f03dda43c9056cb30891c4e6_JaffaCakes118.exe 31 PID 2988 wrote to memory of 2064 2988 ad514e36f03dda43c9056cb30891c4e6_JaffaCakes118.exe 31 PID 2988 wrote to memory of 2064 2988 ad514e36f03dda43c9056cb30891c4e6_JaffaCakes118.exe 31 PID 2988 wrote to memory of 2064 2988 ad514e36f03dda43c9056cb30891c4e6_JaffaCakes118.exe 31 PID 824 wrote to memory of 2256 824 net.exe 34 PID 824 wrote to memory of 2256 824 net.exe 34 PID 824 wrote to memory of 2256 824 net.exe 34 PID 824 wrote to memory of 2256 824 net.exe 34 PID 2988 wrote to memory of 812 2988 ad514e36f03dda43c9056cb30891c4e6_JaffaCakes118.exe 35 PID 2988 wrote to memory of 812 2988 ad514e36f03dda43c9056cb30891c4e6_JaffaCakes118.exe 35 PID 2988 wrote to memory of 812 2988 ad514e36f03dda43c9056cb30891c4e6_JaffaCakes118.exe 35 PID 2988 wrote to memory of 812 2988 ad514e36f03dda43c9056cb30891c4e6_JaffaCakes118.exe 35 PID 2988 wrote to memory of 812 2988 ad514e36f03dda43c9056cb30891c4e6_JaffaCakes118.exe 35 PID 2988 wrote to memory of 812 2988 ad514e36f03dda43c9056cb30891c4e6_JaffaCakes118.exe 35 PID 2988 wrote to memory of 812 2988 ad514e36f03dda43c9056cb30891c4e6_JaffaCakes118.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad514e36f03dda43c9056cb30891c4e6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ad514e36f03dda43c9056cb30891c4e6_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\net.exenet stop cryptsvc2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop cryptsvc3⤵
- System Location Discovery: System Language Discovery
PID:2256
-
-
-
C:\Windows\SysWOW64\sc.exesc config cryptsvc start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:292
-
-
C:\Windows\SysWOW64\sc.exesc delete cryptsvc2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2064
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Users\Admin\AppData\Local\Temp\1724116141.dat, ServerMain c:\users\admin\appdata\local\temp\ad514e36f03dda43c9056cb30891c4e6_jaffacakes118.exe2⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD5dc762f58edc6ffef1bcb3eada8345bb9
SHA1d0a24048bdbc7d30ef1ec656d66c32a9bfd0dfd0
SHA25609ddc0b01f571447050adaf23527e5b751c822a54d6b93ca7a8f089ba0156e8c
SHA512a67d815d42a17b0d78f6d185f953dbf0395798be0ab9920285dec21051f81507f983c723d0c31332d9e1683bfc251d29b059b29c2e15c49d3161761893c2c9c6