Analysis
-
max time kernel
135s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-08-2024 03:21
Static task
static1
Behavioral task
behavioral1
Sample
adb1654c27760ecff4f8dc87f55be850_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
adb1654c27760ecff4f8dc87f55be850_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
adb1654c27760ecff4f8dc87f55be850_JaffaCakes118.exe
-
Size
764KB
-
MD5
adb1654c27760ecff4f8dc87f55be850
-
SHA1
db7e0194b8a01c95d9be76bf29d59f68887f39f7
-
SHA256
90ddfd2d3594bd9ee1c991862b9b1d7a8e03636383e1b60741d828dce4975520
-
SHA512
3e67bd00ce08df6d72a6890b9c71bb01d05a28942c004b6e9ca85bbd66f42f95259f35a9f670a32f7a55f0da4b31456522b228d758193a377c0d2e2feafbfaaf
-
SSDEEP
12288:ulGLmWWRI8VNcBaMnj6JNoZA9WviRPRKKSvrSrGjdRvuIM0/EG:ulCmWWRJaj6Xoa/lESaxRvLl
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation adb1654c27760ecff4f8dc87f55be850_JaffaCakes118.exe -
Executes dropped EXE 4 IoCs
pid Process 1892 chrome.exe 1396 Vulcan Logger.exe 3992 vbc.exe 2828 vbc.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/2828-51-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral2/memory/2828-54-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral2/memory/2828-55-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral2/memory/2828-58-0x0000000000400000-0x0000000000453000-memory.dmp upx -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WinUpdtr = "C:\\Users\\Admin\\AppData\\Roaming\\WinUpdtr\\chrome.exe" chrome.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1892 set thread context of 3992 1892 chrome.exe 89 PID 3992 set thread context of 2828 3992 vbc.exe 90 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Vulcan Logger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3992 vbc.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 4336 wrote to memory of 1892 4336 adb1654c27760ecff4f8dc87f55be850_JaffaCakes118.exe 84 PID 4336 wrote to memory of 1892 4336 adb1654c27760ecff4f8dc87f55be850_JaffaCakes118.exe 84 PID 4336 wrote to memory of 1892 4336 adb1654c27760ecff4f8dc87f55be850_JaffaCakes118.exe 84 PID 4336 wrote to memory of 1396 4336 adb1654c27760ecff4f8dc87f55be850_JaffaCakes118.exe 85 PID 4336 wrote to memory of 1396 4336 adb1654c27760ecff4f8dc87f55be850_JaffaCakes118.exe 85 PID 4336 wrote to memory of 1396 4336 adb1654c27760ecff4f8dc87f55be850_JaffaCakes118.exe 85 PID 1892 wrote to memory of 3992 1892 chrome.exe 89 PID 1892 wrote to memory of 3992 1892 chrome.exe 89 PID 1892 wrote to memory of 3992 1892 chrome.exe 89 PID 1892 wrote to memory of 3992 1892 chrome.exe 89 PID 1892 wrote to memory of 3992 1892 chrome.exe 89 PID 1892 wrote to memory of 3992 1892 chrome.exe 89 PID 1892 wrote to memory of 3992 1892 chrome.exe 89 PID 1892 wrote to memory of 3992 1892 chrome.exe 89 PID 3992 wrote to memory of 2828 3992 vbc.exe 90 PID 3992 wrote to memory of 2828 3992 vbc.exe 90 PID 3992 wrote to memory of 2828 3992 vbc.exe 90 PID 3992 wrote to memory of 2828 3992 vbc.exe 90 PID 3992 wrote to memory of 2828 3992 vbc.exe 90 PID 3992 wrote to memory of 2828 3992 vbc.exe 90 PID 3992 wrote to memory of 2828 3992 vbc.exe 90 PID 3992 wrote to memory of 2828 3992 vbc.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\adb1654c27760ecff4f8dc87f55be850_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\adb1654c27760ecff4f8dc87f55be850_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Users\Admin\AppData\Local\Temp\chrome.exe"C:\Users\Admin\AppData\Local\Temp\chrome.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Users\Admin\AppData\Local\Temp\vbc.exeC:\Users\Admin\AppData\Local\Temp\vbc.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Users\Admin\AppData\Local\Temp\vbc.exe/scomma "C:\Users\Admin\AppData\Local\Temp\tmp.ini"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2828
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Vulcan Logger.exe"C:\Users\Admin\AppData\Local\Temp\Vulcan Logger.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1396
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
244KB
MD5fa9a5b7d966ce66723747b80310e6e47
SHA1f307108aba31c1cb100a5561870eaf513bbb5fdf
SHA25602c5e061e1f4031e6301700a6f022ac040434f3d8e5ae74a3d06305055fbef43
SHA512db2b22ff8a2454dd89d4d5e61d9c8036247d850fdf02cf8844fb6413e43b3585fd3d5574e452a14d2e3e46873d1df87302f346b3402d012552000435d4b4bfba
-
Filesize
316KB
MD52c2d40567b166fb5d90834b21b43a608
SHA1c507ee42900f919eb423004a7fc3e7dd396ec903
SHA256b51841b27a317fea442fc8d28e5d06e4d035c81dcc13cb589b84403cc1f20765
SHA512814eb0c4710f3833f404f9b6f863392e9fbc460f2e96e4def5412a83156010386c4a8f6743003f8881274cd810ec8d3b7f783a3da83e377612eb7feee87a261d
-
Filesize
5B
MD5d1ea279fb5559c020a1b4137dc4de237
SHA1db6f8988af46b56216a6f0daf95ab8c9bdb57400
SHA256fcdcc2c46896915a1c695d6231f0fee336a668531b7a3da46178c80362546dba
SHA512720e9c284f0559015312df7fe977563e5e16f48d3506e51eb4016adf7971924d352f740b030aa3adc81b6f65fd1dba12df06d10fa6c115074e5097e7ee0f08b3
-
Filesize
1.1MB
MD5d881de17aa8f2e2c08cbb7b265f928f9
SHA108936aebc87decf0af6e8eada191062b5e65ac2a
SHA256b3a37093609f9a20ad60b85a9fa9de2ba674cba9b5bd687729440c70ba619ca0
SHA5125f23bfb1b8740247b36ed0ab741738c7d4c949736129e767213e321607d1ccd3e3a8428e4ba44bd28a275b5e3f6206285b1a522514b7ef7ea5e698d90a713d34