Analysis
-
max time kernel
13s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21-08-2024 03:47
Static task
static1
Behavioral task
behavioral1
Sample
b1fde53efb77c5feefe3aec21a517997_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b1fde53efb77c5feefe3aec21a517997_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b1fde53efb77c5feefe3aec21a517997_JaffaCakes118.exe
-
Size
747KB
-
MD5
b1fde53efb77c5feefe3aec21a517997
-
SHA1
2ed24d838e52709347928299a429b82ac98dadde
-
SHA256
bbe8e9d853a8605dfc5eb7054b28c05fdece4e8378b59ec70a469d31145c6af5
-
SHA512
84cbb42ed4aacbc5a674e5c1ad3dbf59fb1c10e70c7904d96e22428ae1bc7df256aa6a2331add625f2c9680506a0786d075711e1e4c8739831000595af31a5ef
-
SSDEEP
12288:QRi8r7Yz4td/zbYPqdGnTSolJYlNj0EC9iPF+7dJMitxcV:QRi8rM8dfYPqdGnTn/4TiCF+7bMivcV
Malware Config
Extracted
Protocol: ftp- Host:
killrecycler.do.am - Port:
21 - Username:
8killrecycler - Password:
43uyu_54y
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Executes dropped EXE 1 IoCs
pid Process 2952 ñïàìåð.exe -
Loads dropped DLL 2 IoCs
pid Process 1944 b1fde53efb77c5feefe3aec21a517997_JaffaCakes118.exe 1944 b1fde53efb77c5feefe3aec21a517997_JaffaCakes118.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 whatismyip.akamai.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b1fde53efb77c5feefe3aec21a517997_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ñïàìåð.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 b1fde53efb77c5feefe3aec21a517997_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString b1fde53efb77c5feefe3aec21a517997_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier b1fde53efb77c5feefe3aec21a517997_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1944 b1fde53efb77c5feefe3aec21a517997_JaffaCakes118.exe 1944 b1fde53efb77c5feefe3aec21a517997_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1944 wrote to memory of 2952 1944 b1fde53efb77c5feefe3aec21a517997_JaffaCakes118.exe 29 PID 1944 wrote to memory of 2952 1944 b1fde53efb77c5feefe3aec21a517997_JaffaCakes118.exe 29 PID 1944 wrote to memory of 2952 1944 b1fde53efb77c5feefe3aec21a517997_JaffaCakes118.exe 29 PID 1944 wrote to memory of 2952 1944 b1fde53efb77c5feefe3aec21a517997_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\b1fde53efb77c5feefe3aec21a517997_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b1fde53efb77c5feefe3aec21a517997_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\ñïàìåð.exe"C:\Users\Admin\AppData\Local\Temp\ñïàìåð.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2952
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f32c91e0ca717d48eb7aba557df0f3d4
SHA1eb038fd0cec42bdf6e32762f315e1e8b29277b21
SHA25601fb2bc51a25741292b79401b4dc40e521def7802518bf0a36cc4337299b8912
SHA5121881fc308cf24072437b895ffb9861861683ad90d0fdd67514c0a42b08464508a582e11b35251b60c5813b5d788707340e98cfeb2846f279685fc599547513fe
-
Filesize
914KB
MD5157f6efeb51131b5cdc4623df22f9016
SHA1fb2df4cd7b774d21844a3cd7b9afa265c80e311f
SHA256c3c5cf3abb57c22f7b72969b13232f82254818102cb73bb9c04addb49a5b9b9b
SHA512b554687d6f0a41d20bb4537c8f72198fe9819b9e230e8cbfa00af5ed1d28d1725d17d071e9d43ffc56562b5ba38a701e44347296863f71f7abdaa69bf6067537