Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
22-08-2024 12:49
Static task
static1
Behavioral task
behavioral1
Sample
b7b32445d7ad6970d602976d2170fc94_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b7b32445d7ad6970d602976d2170fc94_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b7b32445d7ad6970d602976d2170fc94_JaffaCakes118.exe
-
Size
3.0MB
-
MD5
b7b32445d7ad6970d602976d2170fc94
-
SHA1
20485f3d9424523002ba12ed577119f5a04e84b5
-
SHA256
29fb77bcf3c1c1f3ef186c63bb12c559304037364b091b7ad521f34fc4bb669b
-
SHA512
a99f723cedf21823da9b394ca0fedf0c4da1c0721280f1ce99f49fc0f8adc423eef2cab90c14b7bc0fac551c4233735d53a941d287b0bc71faf616c9c79f9f25
-
SSDEEP
98304:3Vy0GIKJmXXEf8mf50XYZsYdzSth0HZD1:iHqXY/GtOZ5
Malware Config
Signatures
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload 3 IoCs
resource yara_rule behavioral1/memory/1768-27-0x0000000000400000-0x0000000000414000-memory.dmp family_isrstealer behavioral1/memory/1768-25-0x0000000000400000-0x0000000000414000-memory.dmp family_isrstealer behavioral1/memory/1768-38-0x0000000000400000-0x0000000000414000-memory.dmp family_isrstealer -
Executes dropped EXE 2 IoCs
pid Process 2676 WebBuilder.exe 2712 Update.exe -
Loads dropped DLL 9 IoCs
pid Process 2772 b7b32445d7ad6970d602976d2170fc94_JaffaCakes118.exe 2772 b7b32445d7ad6970d602976d2170fc94_JaffaCakes118.exe 2772 b7b32445d7ad6970d602976d2170fc94_JaffaCakes118.exe 2712 Update.exe 2712 Update.exe 2712 Update.exe 2676 WebBuilder.exe 2676 WebBuilder.exe 2676 WebBuilder.exe -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2712 set thread context of 1768 2712 Update.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b7b32445d7ad6970d602976d2170fc94_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WebBuilder.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1768 vbc.exe 1768 vbc.exe 1768 vbc.exe 1768 vbc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2676 WebBuilder.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2676 WebBuilder.exe 2676 WebBuilder.exe 1768 vbc.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2772 wrote to memory of 2676 2772 b7b32445d7ad6970d602976d2170fc94_JaffaCakes118.exe 30 PID 2772 wrote to memory of 2676 2772 b7b32445d7ad6970d602976d2170fc94_JaffaCakes118.exe 30 PID 2772 wrote to memory of 2676 2772 b7b32445d7ad6970d602976d2170fc94_JaffaCakes118.exe 30 PID 2772 wrote to memory of 2676 2772 b7b32445d7ad6970d602976d2170fc94_JaffaCakes118.exe 30 PID 2772 wrote to memory of 2676 2772 b7b32445d7ad6970d602976d2170fc94_JaffaCakes118.exe 30 PID 2772 wrote to memory of 2676 2772 b7b32445d7ad6970d602976d2170fc94_JaffaCakes118.exe 30 PID 2772 wrote to memory of 2676 2772 b7b32445d7ad6970d602976d2170fc94_JaffaCakes118.exe 30 PID 2772 wrote to memory of 2712 2772 b7b32445d7ad6970d602976d2170fc94_JaffaCakes118.exe 31 PID 2772 wrote to memory of 2712 2772 b7b32445d7ad6970d602976d2170fc94_JaffaCakes118.exe 31 PID 2772 wrote to memory of 2712 2772 b7b32445d7ad6970d602976d2170fc94_JaffaCakes118.exe 31 PID 2772 wrote to memory of 2712 2772 b7b32445d7ad6970d602976d2170fc94_JaffaCakes118.exe 31 PID 2772 wrote to memory of 2712 2772 b7b32445d7ad6970d602976d2170fc94_JaffaCakes118.exe 31 PID 2772 wrote to memory of 2712 2772 b7b32445d7ad6970d602976d2170fc94_JaffaCakes118.exe 31 PID 2772 wrote to memory of 2712 2772 b7b32445d7ad6970d602976d2170fc94_JaffaCakes118.exe 31 PID 2712 wrote to memory of 1768 2712 Update.exe 32 PID 2712 wrote to memory of 1768 2712 Update.exe 32 PID 2712 wrote to memory of 1768 2712 Update.exe 32 PID 2712 wrote to memory of 1768 2712 Update.exe 32 PID 2712 wrote to memory of 1768 2712 Update.exe 32 PID 2712 wrote to memory of 1768 2712 Update.exe 32 PID 2712 wrote to memory of 1768 2712 Update.exe 32 PID 2712 wrote to memory of 1768 2712 Update.exe 32 PID 2712 wrote to memory of 1768 2712 Update.exe 32 PID 2712 wrote to memory of 1768 2712 Update.exe 32 PID 2712 wrote to memory of 1768 2712 Update.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\b7b32445d7ad6970d602976d2170fc94_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b7b32445d7ad6970d602976d2170fc94_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\WebBuilder.exe"C:\Users\Admin\AppData\Local\Temp\WebBuilder.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2676
-
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1768
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
214KB
MD56392ab8c6c194dc2bcaa2ae5b5166d4f
SHA155d604d051b1d0459f885ed4ebb9cdf9c8fe9b20
SHA25637abcda409909bae474da0205815688b2535404c35a1dce526cab1e1cf6e03fb
SHA512f26b4a84ca25601b79ad0aa24873233ad6c3c332472cea9edd4cf6c2c4e0100f4873d715d38a66fd5b6645bc925199e086f9bd4b2fc379c724c1cb2ec8f39bd1
-
Filesize
7.7MB
MD56c89fdcbcfe778e77ae4b84015d0b666
SHA18e47fefc27c8560354bcedd34c7a183ff7749189
SHA256fe16f891a44cc10d03186be22324239bee65ceaad95fa90dcdc51cfa74958f13
SHA512caa46642ef7ac658b5e5fa85a5645241054b927aa873ea8b367094a33de88637a3aeae4f3fb44dc08a016a2fc214d68ed45967a573475f4f26169e1ae31404bb