Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/08/2024, 07:00
Behavioral task
behavioral1
Sample
b283ef0394730264ff594515fc9a47ee_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b283ef0394730264ff594515fc9a47ee_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b283ef0394730264ff594515fc9a47ee_JaffaCakes118.exe
-
Size
157KB
-
MD5
b283ef0394730264ff594515fc9a47ee
-
SHA1
cd5cd3a09965b197d7cae22e7ec883be95877f3b
-
SHA256
07644fe81c4fd72a38bcaca446a18647f866db33f77f105b51cf05302ad6374c
-
SHA512
02df79547538a3390baf17f0de2aeba54819b82c7627d54411c5acf2b36ba13ab209984cdd0cf1d3e2d508061d6645ed7e006ce24c70e6926b3409ffe2794e6e
-
SSDEEP
3072:RUClX2HtIwk5xkfudHMA0WE7t6GMqIwV7KgJNeuZx5Do7/U7pDMX3sI/zoutp0:RUClmM7dj0WEhXIKw0pDMnsIboSp
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 5092 7E402E93F41.exe 5068 7E402E93F41.exe 3720 tCD7705.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/4568-0-0x0000000000400000-0x00000000004A8000-memory.dmp upx behavioral2/memory/4204-3-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/memory/4204-9-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/memory/4204-12-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/memory/4204-13-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/memory/4204-8-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/memory/4568-15-0x0000000000400000-0x00000000004A8000-memory.dmp upx behavioral2/memory/4204-6-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/memory/4204-5-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/memory/4204-11-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/memory/4204-19-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/files/0x0003000000022a80-23.dat upx behavioral2/memory/5068-32-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/memory/5068-31-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/memory/5068-35-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/memory/5068-36-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/memory/5092-38-0x0000000000400000-0x00000000004A8000-memory.dmp upx behavioral2/memory/5068-45-0x0000000000400000-0x0000000000460000-memory.dmp upx -
Unexpected DNS network traffic destination 6 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 195.14.112.83 Destination IP 188.241.114.93 Destination IP 188.241.114.93 Destination IP 4.2.2.2 Destination IP 195.14.112.83 Destination IP 4.2.2.2 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ZU5YXYWE8HZI6JVUDPQUYKKQIFPNNRP = "C:\\Record.Cl\\7E402E93F41.exe" tCD7705.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4568 set thread context of 4204 4568 b283ef0394730264ff594515fc9a47ee_JaffaCakes118.exe 88 PID 5092 set thread context of 5068 5092 7E402E93F41.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7E402E93F41.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tCD7705.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b283ef0394730264ff594515fc9a47ee_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b283ef0394730264ff594515fc9a47ee_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7E402E93F41.exe -
Modifies Internet Explorer Phishing Filter 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\PhishingFilter tCD7705.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\PhishingFilter\EnabledV8 = "0" tCD7705.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\PhishingFilter\ShownServiceDownBalloon = "0" tCD7705.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\Recovery tCD7705.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\ClearBrowsingHistoryOnExit = "0" tCD7705.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4204 b283ef0394730264ff594515fc9a47ee_JaffaCakes118.exe 4204 b283ef0394730264ff594515fc9a47ee_JaffaCakes118.exe 4204 b283ef0394730264ff594515fc9a47ee_JaffaCakes118.exe 4204 b283ef0394730264ff594515fc9a47ee_JaffaCakes118.exe 5068 7E402E93F41.exe 5068 7E402E93F41.exe 3720 tCD7705.exe 3720 tCD7705.exe 3720 tCD7705.exe 3720 tCD7705.exe 3720 tCD7705.exe 3720 tCD7705.exe 3720 tCD7705.exe 3720 tCD7705.exe 3720 tCD7705.exe 3720 tCD7705.exe 3720 tCD7705.exe 3720 tCD7705.exe 3720 tCD7705.exe 3720 tCD7705.exe 3720 tCD7705.exe 3720 tCD7705.exe 3720 tCD7705.exe 3720 tCD7705.exe 3720 tCD7705.exe 3720 tCD7705.exe 3720 tCD7705.exe 3720 tCD7705.exe 3720 tCD7705.exe 3720 tCD7705.exe 3720 tCD7705.exe 3720 tCD7705.exe 3720 tCD7705.exe 3720 tCD7705.exe 3720 tCD7705.exe 3720 tCD7705.exe 3720 tCD7705.exe 3720 tCD7705.exe 3720 tCD7705.exe 3720 tCD7705.exe 3720 tCD7705.exe 3720 tCD7705.exe 3720 tCD7705.exe 3720 tCD7705.exe 3720 tCD7705.exe 3720 tCD7705.exe 3720 tCD7705.exe 3720 tCD7705.exe 3720 tCD7705.exe 3720 tCD7705.exe 3720 tCD7705.exe 3720 tCD7705.exe 3720 tCD7705.exe 3720 tCD7705.exe 3720 tCD7705.exe 3720 tCD7705.exe 3720 tCD7705.exe 3720 tCD7705.exe 3720 tCD7705.exe 3720 tCD7705.exe 3720 tCD7705.exe 3720 tCD7705.exe 3720 tCD7705.exe 3720 tCD7705.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4204 b283ef0394730264ff594515fc9a47ee_JaffaCakes118.exe Token: SeDebugPrivilege 4204 b283ef0394730264ff594515fc9a47ee_JaffaCakes118.exe Token: SeDebugPrivilege 4204 b283ef0394730264ff594515fc9a47ee_JaffaCakes118.exe Token: SeDebugPrivilege 4204 b283ef0394730264ff594515fc9a47ee_JaffaCakes118.exe Token: SeDebugPrivilege 5068 7E402E93F41.exe Token: SeDebugPrivilege 5068 7E402E93F41.exe Token: SeDebugPrivilege 3720 tCD7705.exe Token: SeDebugPrivilege 3720 tCD7705.exe Token: SeDebugPrivilege 3720 tCD7705.exe Token: SeDebugPrivilege 3720 tCD7705.exe Token: SeDebugPrivilege 3720 tCD7705.exe Token: SeDebugPrivilege 3720 tCD7705.exe Token: SeDebugPrivilege 3720 tCD7705.exe Token: SeDebugPrivilege 3720 tCD7705.exe Token: SeDebugPrivilege 3720 tCD7705.exe Token: SeDebugPrivilege 3720 tCD7705.exe Token: SeDebugPrivilege 3720 tCD7705.exe Token: SeDebugPrivilege 3720 tCD7705.exe Token: SeDebugPrivilege 3720 tCD7705.exe Token: SeDebugPrivilege 3720 tCD7705.exe Token: SeDebugPrivilege 3720 tCD7705.exe Token: SeDebugPrivilege 3720 tCD7705.exe Token: SeDebugPrivilege 3720 tCD7705.exe Token: SeDebugPrivilege 3720 tCD7705.exe Token: SeDebugPrivilege 3720 tCD7705.exe Token: SeDebugPrivilege 3720 tCD7705.exe Token: SeDebugPrivilege 3720 tCD7705.exe Token: SeDebugPrivilege 3720 tCD7705.exe Token: SeDebugPrivilege 3720 tCD7705.exe Token: SeDebugPrivilege 3720 tCD7705.exe Token: SeDebugPrivilege 3720 tCD7705.exe Token: SeDebugPrivilege 3720 tCD7705.exe Token: SeDebugPrivilege 3720 tCD7705.exe Token: SeDebugPrivilege 3720 tCD7705.exe Token: SeDebugPrivilege 3720 tCD7705.exe Token: SeDebugPrivilege 3720 tCD7705.exe Token: SeDebugPrivilege 3720 tCD7705.exe Token: SeDebugPrivilege 3720 tCD7705.exe Token: SeDebugPrivilege 3720 tCD7705.exe Token: SeDebugPrivilege 3720 tCD7705.exe Token: SeDebugPrivilege 3720 tCD7705.exe Token: SeDebugPrivilege 3720 tCD7705.exe Token: SeDebugPrivilege 3720 tCD7705.exe Token: SeDebugPrivilege 3720 tCD7705.exe Token: SeDebugPrivilege 3720 tCD7705.exe Token: SeDebugPrivilege 3720 tCD7705.exe Token: SeDebugPrivilege 3720 tCD7705.exe Token: SeDebugPrivilege 3720 tCD7705.exe Token: SeDebugPrivilege 3720 tCD7705.exe Token: SeDebugPrivilege 3720 tCD7705.exe Token: SeDebugPrivilege 3720 tCD7705.exe Token: SeDebugPrivilege 3720 tCD7705.exe Token: SeDebugPrivilege 3720 tCD7705.exe Token: SeDebugPrivilege 3720 tCD7705.exe Token: SeDebugPrivilege 3720 tCD7705.exe Token: SeDebugPrivilege 3720 tCD7705.exe Token: SeDebugPrivilege 3720 tCD7705.exe Token: SeDebugPrivilege 3720 tCD7705.exe Token: SeDebugPrivilege 3720 tCD7705.exe Token: SeDebugPrivilege 3720 tCD7705.exe Token: SeDebugPrivilege 3720 tCD7705.exe Token: SeDebugPrivilege 3720 tCD7705.exe Token: SeDebugPrivilege 3720 tCD7705.exe Token: SeDebugPrivilege 3720 tCD7705.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4568 b283ef0394730264ff594515fc9a47ee_JaffaCakes118.exe 5092 7E402E93F41.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 4568 wrote to memory of 4204 4568 b283ef0394730264ff594515fc9a47ee_JaffaCakes118.exe 88 PID 4568 wrote to memory of 4204 4568 b283ef0394730264ff594515fc9a47ee_JaffaCakes118.exe 88 PID 4568 wrote to memory of 4204 4568 b283ef0394730264ff594515fc9a47ee_JaffaCakes118.exe 88 PID 4568 wrote to memory of 4204 4568 b283ef0394730264ff594515fc9a47ee_JaffaCakes118.exe 88 PID 4568 wrote to memory of 4204 4568 b283ef0394730264ff594515fc9a47ee_JaffaCakes118.exe 88 PID 4568 wrote to memory of 4204 4568 b283ef0394730264ff594515fc9a47ee_JaffaCakes118.exe 88 PID 4568 wrote to memory of 4204 4568 b283ef0394730264ff594515fc9a47ee_JaffaCakes118.exe 88 PID 4568 wrote to memory of 4204 4568 b283ef0394730264ff594515fc9a47ee_JaffaCakes118.exe 88 PID 4204 wrote to memory of 5092 4204 b283ef0394730264ff594515fc9a47ee_JaffaCakes118.exe 89 PID 4204 wrote to memory of 5092 4204 b283ef0394730264ff594515fc9a47ee_JaffaCakes118.exe 89 PID 4204 wrote to memory of 5092 4204 b283ef0394730264ff594515fc9a47ee_JaffaCakes118.exe 89 PID 5092 wrote to memory of 5068 5092 7E402E93F41.exe 90 PID 5092 wrote to memory of 5068 5092 7E402E93F41.exe 90 PID 5092 wrote to memory of 5068 5092 7E402E93F41.exe 90 PID 5092 wrote to memory of 5068 5092 7E402E93F41.exe 90 PID 5092 wrote to memory of 5068 5092 7E402E93F41.exe 90 PID 5092 wrote to memory of 5068 5092 7E402E93F41.exe 90 PID 5092 wrote to memory of 5068 5092 7E402E93F41.exe 90 PID 5092 wrote to memory of 5068 5092 7E402E93F41.exe 90 PID 5068 wrote to memory of 3720 5068 7E402E93F41.exe 91 PID 5068 wrote to memory of 3720 5068 7E402E93F41.exe 91 PID 5068 wrote to memory of 3720 5068 7E402E93F41.exe 91 PID 5068 wrote to memory of 3720 5068 7E402E93F41.exe 91 PID 5068 wrote to memory of 3720 5068 7E402E93F41.exe 91 PID 3720 wrote to memory of 4204 3720 tCD7705.exe 88 PID 3720 wrote to memory of 4204 3720 tCD7705.exe 88 PID 3720 wrote to memory of 4204 3720 tCD7705.exe 88 PID 3720 wrote to memory of 4204 3720 tCD7705.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\b283ef0394730264ff594515fc9a47ee_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b283ef0394730264ff594515fc9a47ee_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Users\Admin\AppData\Local\Temp\b283ef0394730264ff594515fc9a47ee_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\b283ef0394730264ff594515fc9a47ee_JaffaCakes118.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Record.Cl\7E402E93F41.exe"C:\Record.Cl\7E402E93F41.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Record.Cl\7E402E93F41.exeC:\Record.Cl\7E402E93F41.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Users\Admin\AppData\Local\Temp\tCD7705.exe"C:\Users\Admin\AppData\Local\Temp\tCD7705.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3720
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5396825cc1d5fff08be7ddd66f7b13eed
SHA115605a28bc8a4bf5ea2122c6fe3fe5dcd09b711d
SHA2568430a84a7dfe328ebd7fa070c71fcde3431a02d5f4339e246bbc38dd8bea1983
SHA512b492073a74a52d3f19837a0ac46c7e29e187404b7d44eac5a20dd0def08019b73ecf29b21b44c8724185b43d261a10ff3f37c569a64406cfaa25f0b187dc3278
-
Filesize
157KB
MD5b283ef0394730264ff594515fc9a47ee
SHA1cd5cd3a09965b197d7cae22e7ec883be95877f3b
SHA25607644fe81c4fd72a38bcaca446a18647f866db33f77f105b51cf05302ad6374c
SHA51202df79547538a3390baf17f0de2aeba54819b82c7627d54411c5acf2b36ba13ab209984cdd0cf1d3e2d508061d6645ed7e006ce24c70e6926b3409ffe2794e6e
-
Filesize
3KB
MD529090b6b4d6605a97ac760d06436ac2d
SHA1d929d3389642e52bae5ad8512293c9c4d3e4fab5
SHA25698a24f0caf5b578e230e6f1103a5fba6aecb28a9128cad5520fcde546d643272
SHA5129121ec42fa66e14a4fc3932c8dbcc8fb1a93ab9de00da57a82e176faa70b73f6992f8c5e2ab52c02fc28c8f0c59aee73b6fbbd39107db7d15105054f4390e9be