Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-08-2024 16:25
Static task
static1
Behavioral task
behavioral1
Sample
b42e7395d548094719753ce21cafc064_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
b42e7395d548094719753ce21cafc064_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b42e7395d548094719753ce21cafc064_JaffaCakes118.exe
-
Size
500KB
-
MD5
b42e7395d548094719753ce21cafc064
-
SHA1
6baed6fc826f81aa77cbd71945c46d44c04718e4
-
SHA256
95f5e8a8f81cc22aa687cf82e0d6cadbf130f25018fa0097710927ed40d2f939
-
SHA512
52d741889f330dddfa97897c3b642fbd7a05364b1122e794a4deab0d4c2214f6629b2e03727f5422161fff4d83e82b93866339623917b88e8123fc271a6a4557
-
SSDEEP
12288:G3s06nf8okk8kGfCIcgiLTXWswMGMv0MSPmIQWe:BPfkkZ8diLjXzGySPm7We
Malware Config
Signatures
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload 1 IoCs
resource yara_rule behavioral2/files/0x0003000000022ab4-11.dat family_isrstealer -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation b42e7395d548094719753ce21cafc064_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 540 mw_111221_passwd.exe 1220 mw_111221_vnpanel.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\crssr = "C:\\Users\\Admin\\AppData\\Roaming\\crssr" mw_111221_vnpanel.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 b42e7395d548094719753ce21cafc064_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3720 set thread context of 4964 3720 b42e7395d548094719753ce21cafc064_JaffaCakes118.exe 91 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b42e7395d548094719753ce21cafc064_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b42e7395d548094719753ce21cafc064_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mw_111221_passwd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mw_111221_vnpanel.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 540 mw_111221_passwd.exe 540 mw_111221_passwd.exe 540 mw_111221_passwd.exe 540 mw_111221_passwd.exe 540 mw_111221_passwd.exe 540 mw_111221_passwd.exe 540 mw_111221_passwd.exe 540 mw_111221_passwd.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3720 b42e7395d548094719753ce21cafc064_JaffaCakes118.exe 4964 b42e7395d548094719753ce21cafc064_JaffaCakes118.exe 540 mw_111221_passwd.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3720 wrote to memory of 4964 3720 b42e7395d548094719753ce21cafc064_JaffaCakes118.exe 91 PID 3720 wrote to memory of 4964 3720 b42e7395d548094719753ce21cafc064_JaffaCakes118.exe 91 PID 3720 wrote to memory of 4964 3720 b42e7395d548094719753ce21cafc064_JaffaCakes118.exe 91 PID 3720 wrote to memory of 4964 3720 b42e7395d548094719753ce21cafc064_JaffaCakes118.exe 91 PID 3720 wrote to memory of 4964 3720 b42e7395d548094719753ce21cafc064_JaffaCakes118.exe 91 PID 3720 wrote to memory of 4964 3720 b42e7395d548094719753ce21cafc064_JaffaCakes118.exe 91 PID 3720 wrote to memory of 4964 3720 b42e7395d548094719753ce21cafc064_JaffaCakes118.exe 91 PID 3720 wrote to memory of 4964 3720 b42e7395d548094719753ce21cafc064_JaffaCakes118.exe 91 PID 4964 wrote to memory of 540 4964 b42e7395d548094719753ce21cafc064_JaffaCakes118.exe 92 PID 4964 wrote to memory of 540 4964 b42e7395d548094719753ce21cafc064_JaffaCakes118.exe 92 PID 4964 wrote to memory of 540 4964 b42e7395d548094719753ce21cafc064_JaffaCakes118.exe 92 PID 4964 wrote to memory of 1220 4964 b42e7395d548094719753ce21cafc064_JaffaCakes118.exe 93 PID 4964 wrote to memory of 1220 4964 b42e7395d548094719753ce21cafc064_JaffaCakes118.exe 93 PID 4964 wrote to memory of 1220 4964 b42e7395d548094719753ce21cafc064_JaffaCakes118.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\b42e7395d548094719753ce21cafc064_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b42e7395d548094719753ce21cafc064_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3720 -
C:\Users\Admin\AppData\Local\Temp\b42e7395d548094719753ce21cafc064_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b42e7395d548094719753ce21cafc064_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Users\Admin\AppData\Local\Temp\mw_111221_passwd.exe"C:\Users\Admin\AppData\Local\Temp\mw_111221_passwd.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:540
-
-
C:\Users\Admin\AppData\Local\Temp\mw_111221_vnpanel.exe"C:\Users\Admin\AppData\Local\Temp\mw_111221_vnpanel.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1220
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD532c96c4a94e4066cc6eeb2b0d24dfc36
SHA1d256f6ea46af1c578d96b59d945f00880f9aa4f0
SHA25602d227751808eb5cd476c91d6b2f8260c812042de78fc04ae3770168f2873f97
SHA512af0e6c6b8ba9769b5981780740b00bac46c3cc1ae552e5d6a6a29f6eeb4df312e3f39cbd163e5d612125ae2f91173432b6a22aa1dcccc7c5eff9aafad0692fe2
-
Filesize
166KB
MD516cde6a521edcd5cc7fa9860096f9222
SHA1b69246e52d0adee6725fd9ec69c7a7b9974b7634
SHA256cdd686b7f74b3f0224bbc44daffe7fa9cc9309838866f1586d317a7df5e5df6f
SHA51241ebfe0a023213113e13307d9bcea0f780f9604cdaa444ce73cc720156d2f3868f1f32c585ad2eb8a8bdd60a0d0ba14e1140d1fd484b4cd75de8ff02826869b9