Analysis
-
max time kernel
63s -
max time network
64s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
23-08-2024 16:56
Static task
static1
Behavioral task
behavioral1
Sample
bc900ec165c7974d6b8a35003e8b469f_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
bc900ec165c7974d6b8a35003e8b469f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bc900ec165c7974d6b8a35003e8b469f_JaffaCakes118.exe
-
Size
248KB
-
MD5
bc900ec165c7974d6b8a35003e8b469f
-
SHA1
2455fca46873fddc8e776278d931e4f86bea326d
-
SHA256
93f2e07cc7722a22a158b71a0cc2a456f4fbdca5cfd67fa8e905e066522216f3
-
SHA512
d8ecb449ce2e6489f345a29fdf9a8ab2d16fa5407310195f8e8dbf6590c0160417a054cc6e908badb0ade9c50cde33a503ffeb06121d12a83011b7fd0444d060
-
SSDEEP
3072:hm+JmSCT1QEMQkrp8RCODSS2olEPKeMFxdK0NHhwCxzL5PKATEt1l8Hw3bImQQEj:8+6T6EMjpQDL20EP1MvwCIOH
Malware Config
Signatures
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload 4 IoCs
resource yara_rule behavioral1/memory/2448-11-0x0000000000400000-0x0000000000414000-memory.dmp family_isrstealer behavioral1/memory/2448-7-0x0000000000400000-0x0000000000414000-memory.dmp family_isrstealer behavioral1/memory/2448-39-0x0000000000400000-0x0000000000414000-memory.dmp family_isrstealer behavioral1/memory/2448-126-0x0000000000400000-0x0000000000414000-memory.dmp family_isrstealer -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bc900ec165c7974d6b8a35003e8b469f_JaffaCakes118.exe bc900ec165c7974d6b8a35003e8b469f_JaffaCakes1181.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bc900ec165c7974d6b8a35003e8b469f_JaffaCakes118.exe bc900ec165c7974d6b8a35003e8b469f_JaffaCakes1181.exe -
Executes dropped EXE 1 IoCs
pid Process 2980 bc900ec165c7974d6b8a35003e8b469f_JaffaCakes1181.exe -
Loads dropped DLL 2 IoCs
pid Process 1456 bc900ec165c7974d6b8a35003e8b469f_JaffaCakes118.exe 1456 bc900ec165c7974d6b8a35003e8b469f_JaffaCakes118.exe -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1456 set thread context of 2448 1456 bc900ec165c7974d6b8a35003e8b469f_JaffaCakes118.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bc900ec165c7974d6b8a35003e8b469f_JaffaCakes1181.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bc900ec165c7974d6b8a35003e8b469f_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2448 vbc.exe 2448 vbc.exe 2448 vbc.exe 2448 vbc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2448 vbc.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1456 wrote to memory of 2448 1456 bc900ec165c7974d6b8a35003e8b469f_JaffaCakes118.exe 29 PID 1456 wrote to memory of 2448 1456 bc900ec165c7974d6b8a35003e8b469f_JaffaCakes118.exe 29 PID 1456 wrote to memory of 2448 1456 bc900ec165c7974d6b8a35003e8b469f_JaffaCakes118.exe 29 PID 1456 wrote to memory of 2448 1456 bc900ec165c7974d6b8a35003e8b469f_JaffaCakes118.exe 29 PID 1456 wrote to memory of 2448 1456 bc900ec165c7974d6b8a35003e8b469f_JaffaCakes118.exe 29 PID 1456 wrote to memory of 2448 1456 bc900ec165c7974d6b8a35003e8b469f_JaffaCakes118.exe 29 PID 1456 wrote to memory of 2448 1456 bc900ec165c7974d6b8a35003e8b469f_JaffaCakes118.exe 29 PID 1456 wrote to memory of 2448 1456 bc900ec165c7974d6b8a35003e8b469f_JaffaCakes118.exe 29 PID 1456 wrote to memory of 2824 1456 bc900ec165c7974d6b8a35003e8b469f_JaffaCakes118.exe 30 PID 1456 wrote to memory of 2824 1456 bc900ec165c7974d6b8a35003e8b469f_JaffaCakes118.exe 30 PID 1456 wrote to memory of 2824 1456 bc900ec165c7974d6b8a35003e8b469f_JaffaCakes118.exe 30 PID 1456 wrote to memory of 2824 1456 bc900ec165c7974d6b8a35003e8b469f_JaffaCakes118.exe 30 PID 2824 wrote to memory of 2752 2824 vbc.exe 32 PID 2824 wrote to memory of 2752 2824 vbc.exe 32 PID 2824 wrote to memory of 2752 2824 vbc.exe 32 PID 2824 wrote to memory of 2752 2824 vbc.exe 32 PID 1456 wrote to memory of 2980 1456 bc900ec165c7974d6b8a35003e8b469f_JaffaCakes118.exe 33 PID 1456 wrote to memory of 2980 1456 bc900ec165c7974d6b8a35003e8b469f_JaffaCakes118.exe 33 PID 1456 wrote to memory of 2980 1456 bc900ec165c7974d6b8a35003e8b469f_JaffaCakes118.exe 33 PID 1456 wrote to memory of 2980 1456 bc900ec165c7974d6b8a35003e8b469f_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc900ec165c7974d6b8a35003e8b469f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bc900ec165c7974d6b8a35003e8b469f_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2448
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\ufb7war2.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3988.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc3987.tmp"3⤵
- System Location Discovery: System Language Discovery
PID:2752
-
-
-
C:\Users\Admin\AppData\Roaming\bc900ec165c7974d6b8a35003e8b469f_JaffaCakes1181.exe"C:\Users\Admin\AppData\Roaming\bc900ec165c7974d6b8a35003e8b469f_JaffaCakes1181.exe"2⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2980
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c27dedd096d47a25e816521f8def799c
SHA1529936c7dc0b1b9899f49936a16d2c0310e51f4c
SHA2563663e324724ea4c18ac6d7bac29fd915b874a7d049529b88bc8f15a1e9b03ff7
SHA5120a5c71c03bbfe66b3602975e553ba34fe7f95c8bc32ca122951e0c0cc2cdb10fa55ccc0901bcf8a95be3846782f827022590788d6e8045a7108dabe13a274b5e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
1KB
MD556b526f24b3e6fdb0cd82ccefa9912e1
SHA1df9c33c6833bd530f6c59936ba8c72679f5bae79
SHA256b3bfc83bed357fb667c0ded68ad34f3bdd3073ab87f7999fc2124e682f6c3e40
SHA5122ecaf39f434836a100265ea1fcc385635b22bc17ae59fd409e35a1484e88211de6a12ecf34d705c38385b3487701eba5c7f2d4f9a84e031da0c5550f61df41b7
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
381B
MD580d22faecb679a9b013cc9a464ecb5e8
SHA1ba13add72b45895a41eb4b7dd99c39f868823046
SHA256ba6b5b6b8e4e5f3fa0d5532870ed023afde9e5f190f16ed33d1ca13a3f7fc82c
SHA51206e63157e33f67dd4054dfa5339804ee717b32a2abaae121a114376618ffa1c952d967816f2194fd5eaf1f79cce9a362cf07dfc43b04f998d3cb09f297376e79
-
Filesize
235B
MD58be113312a8a02976a3009a2b9be7bfc
SHA1db90cc715b2fcc29f0ee54f6b1419f6b9120d972
SHA256ffef110a4428ea1e2c32faac068bd94c484f33964e2c96e5f9f45ec23dbccb26
SHA5129fb51d1f66d23b8b12894b79769972810961dc79182b6d011994ed1d56b402926a18c8b003736c8f56ed2917a5822de8f41872b761434303b2edeb5d31e7919b
-
Filesize
804B
MD5854c95d568f634996b7ac09976ea229b
SHA1ada258b5559eaf0c7e230a9ddb28f1cfe5de19ea
SHA256d873ccc0686939bf731163f025aa89bb369a6aaee6dd28814e9062541e378e58
SHA512e496524970935c391d58dee53c9ea89f7473e720554ad1caba8c6bf5765e91105c1bc0bd9f0c14c41fc7b7950946a3f228cfe5f4a061672b6ffbffcdac4f7119
-
Filesize
248KB
MD5bc900ec165c7974d6b8a35003e8b469f
SHA12455fca46873fddc8e776278d931e4f86bea326d
SHA25693f2e07cc7722a22a158b71a0cc2a456f4fbdca5cfd67fa8e905e066522216f3
SHA512d8ecb449ce2e6489f345a29fdf9a8ab2d16fa5407310195f8e8dbf6590c0160417a054cc6e908badb0ade9c50cde33a503ffeb06121d12a83011b7fd0444d060
-
Filesize
6KB
MD533786df9de7ee4940e74985e0c76498f
SHA10deb63fec4a2204773a0275e665a736389e35c35
SHA256dd79a10dad22bc3b4b86b9215e589389eeb07f75befebba7fa5d3579cfe9fd03
SHA5122597f92c8cf85919a5549dad171b4feaf03c9d399d69f579bb6f4f2fc094b3daa19ea53ee4b342674828f2463497c92142a4ce221016a79b769fe05413152c15