Analysis
-
max time kernel
11s -
max time network
15s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26-08-2024 07:01
Static task
static1
Behavioral task
behavioral1
Sample
c28072106a3941932130c8db2a135555_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
c28072106a3941932130c8db2a135555_JaffaCakes118.exe
-
Size
1.4MB
-
MD5
c28072106a3941932130c8db2a135555
-
SHA1
cc2aaeafa62ea06e5b07808f15a5263e04906e53
-
SHA256
06ad6118b7be37ff6f2ec22381098bbb11ec2eddfb7c6e0f8c24449a3b1b98fc
-
SHA512
0c3083f190c8a0d82340f6a3d0f64f76eb938e93d3070cf7ccd75aa501b58040b5b26ba57e1e5a5bd5d69bff07558733f68dfc00c50473842bdda9f9f7281b56
-
SSDEEP
12288:6Zzp1NI5x7k3+rcAT8U6x+3JYU82+/IvIh/QnviN9VzdvYhvb:6Zzp1YdkoUU82+Qwh/Qn89Vx
Malware Config
Signatures
-
Taurus Stealer payload 4 IoCs
resource yara_rule behavioral1/memory/2904-7-0x0000000000400000-0x0000000000437000-memory.dmp family_taurus_stealer behavioral1/memory/2904-6-0x0000000000400000-0x0000000000437000-memory.dmp family_taurus_stealer behavioral1/memory/2904-8-0x0000000000400000-0x0000000000437000-memory.dmp family_taurus_stealer behavioral1/memory/2904-10-0x0000000000400000-0x0000000000437000-memory.dmp family_taurus_stealer -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2520 set thread context of 2904 2520 c28072106a3941932130c8db2a135555_JaffaCakes118.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c28072106a3941932130c8db2a135555_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2628 timeout.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2520 c28072106a3941932130c8db2a135555_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2520 wrote to memory of 2904 2520 c28072106a3941932130c8db2a135555_JaffaCakes118.exe 30 PID 2520 wrote to memory of 2904 2520 c28072106a3941932130c8db2a135555_JaffaCakes118.exe 30 PID 2520 wrote to memory of 2904 2520 c28072106a3941932130c8db2a135555_JaffaCakes118.exe 30 PID 2520 wrote to memory of 2904 2520 c28072106a3941932130c8db2a135555_JaffaCakes118.exe 30 PID 2520 wrote to memory of 2904 2520 c28072106a3941932130c8db2a135555_JaffaCakes118.exe 30 PID 2520 wrote to memory of 2904 2520 c28072106a3941932130c8db2a135555_JaffaCakes118.exe 30 PID 2520 wrote to memory of 2904 2520 c28072106a3941932130c8db2a135555_JaffaCakes118.exe 30 PID 2520 wrote to memory of 2904 2520 c28072106a3941932130c8db2a135555_JaffaCakes118.exe 30 PID 2520 wrote to memory of 2904 2520 c28072106a3941932130c8db2a135555_JaffaCakes118.exe 30 PID 2520 wrote to memory of 2904 2520 c28072106a3941932130c8db2a135555_JaffaCakes118.exe 30 PID 2904 wrote to memory of 2852 2904 AddInProcess32.exe 32 PID 2904 wrote to memory of 2852 2904 AddInProcess32.exe 32 PID 2904 wrote to memory of 2852 2904 AddInProcess32.exe 32 PID 2904 wrote to memory of 2852 2904 AddInProcess32.exe 32 PID 2852 wrote to memory of 2628 2852 cmd.exe 34 PID 2852 wrote to memory of 2628 2852 cmd.exe 34 PID 2852 wrote to memory of 2628 2852 cmd.exe 34 PID 2852 wrote to memory of 2628 2852 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\c28072106a3941932130c8db2a135555_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c28072106a3941932130c8db2a135555_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\SysWOW64\timeout.exetimeout /t 34⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2628
-
-
-