Analysis
-
max time kernel
142s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
27-08-2024 19:37
Static task
static1
Behavioral task
behavioral1
Sample
c59b106da450b6a75249a068d1337564_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c59b106da450b6a75249a068d1337564_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c59b106da450b6a75249a068d1337564_JaffaCakes118.exe
-
Size
676KB
-
MD5
c59b106da450b6a75249a068d1337564
-
SHA1
bc5641774b4ebebe55be2451e2166f6e5172021f
-
SHA256
83ea254f1a8476977d5ce7d1afc95cc5a377c4232b8f41f4e7735185905cf5cf
-
SHA512
1f24cf40de161ec83b12b077189bdee07e716a2be1c98dd3f983e8d4a443b71244c08e47a2dfca6f220cec73553262c1cab693e3f3bbe6c7f4cabc42912dfd24
-
SSDEEP
12288:APc2CrUyTlbuACIoFtrr8FFs4yleK062mqUkqWzF+c5W8hGiEB:Ap+lbuA67r8Fm48/2mqrR+2WhB
Malware Config
Signatures
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/1952-19-0x0000000000400000-0x0000000000484000-memory.dmp family_isrstealer behavioral1/memory/1952-21-0x0000000000400000-0x0000000000484000-memory.dmp family_isrstealer behavioral1/memory/1952-17-0x0000000000400000-0x0000000000484000-memory.dmp family_isrstealer behavioral1/memory/1952-13-0x0000000000400000-0x0000000000484000-memory.dmp family_isrstealer C:\Users\Admin\AppData\Local\Temp\SERVER.EXE family_isrstealer behavioral1/memory/1952-47-0x0000000000400000-0x0000000000484000-memory.dmp family_isrstealer -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Executes dropped EXE 3 IoCs
Processes:
ADOBE CS 5.5 MASTER COLLECTION KEYGEN.EXESERVER.EXESERVER.EXEpid process 2976 ADOBE CS 5.5 MASTER COLLECTION KEYGEN.EXE 3040 SERVER.EXE 2700 SERVER.EXE -
Loads dropped DLL 5 IoCs
Processes:
vbc.exeSERVER.EXEpid process 1952 vbc.exe 1952 vbc.exe 1952 vbc.exe 1952 vbc.exe 3040 SERVER.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral1/memory/2700-56-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/2700-57-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/2700-55-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/2700-53-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/2700-59-0x0000000000400000-0x0000000000453000-memory.dmp upx -
Uses the VBS compiler for execution 1 TTPs
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
ADOBE CS 5.5 MASTER COLLECTION KEYGEN.EXEdescription ioc process File opened for modification \??\PhysicalDrive0 ADOBE CS 5.5 MASTER COLLECTION KEYGEN.EXE -
Suspicious use of SetThreadContext 2 IoCs
Processes:
c59b106da450b6a75249a068d1337564_JaffaCakes118.exeSERVER.EXEdescription pid process target process PID 2776 set thread context of 1952 2776 c59b106da450b6a75249a068d1337564_JaffaCakes118.exe vbc.exe PID 3040 set thread context of 2700 3040 SERVER.EXE SERVER.EXE -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
SERVER.EXESERVER.EXEc59b106da450b6a75249a068d1337564_JaffaCakes118.exevbc.exeADOBE CS 5.5 MASTER COLLECTION KEYGEN.EXEdescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SERVER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SERVER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c59b106da450b6a75249a068d1337564_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ADOBE CS 5.5 MASTER COLLECTION KEYGEN.EXE -
Modifies registry class 3 IoCs
Processes:
ADOBE CS 5.5 MASTER COLLECTION KEYGEN.EXEdescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key ADOBE CS 5.5 MASTER COLLECTION KEYGEN.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ ADOBE CS 5.5 MASTER COLLECTION KEYGEN.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" ADOBE CS 5.5 MASTER COLLECTION KEYGEN.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
SERVER.EXEpid process 3040 SERVER.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
c59b106da450b6a75249a068d1337564_JaffaCakes118.exevbc.exeSERVER.EXEdescription pid process target process PID 2776 wrote to memory of 1952 2776 c59b106da450b6a75249a068d1337564_JaffaCakes118.exe vbc.exe PID 2776 wrote to memory of 1952 2776 c59b106da450b6a75249a068d1337564_JaffaCakes118.exe vbc.exe PID 2776 wrote to memory of 1952 2776 c59b106da450b6a75249a068d1337564_JaffaCakes118.exe vbc.exe PID 2776 wrote to memory of 1952 2776 c59b106da450b6a75249a068d1337564_JaffaCakes118.exe vbc.exe PID 2776 wrote to memory of 1952 2776 c59b106da450b6a75249a068d1337564_JaffaCakes118.exe vbc.exe PID 2776 wrote to memory of 1952 2776 c59b106da450b6a75249a068d1337564_JaffaCakes118.exe vbc.exe PID 2776 wrote to memory of 1952 2776 c59b106da450b6a75249a068d1337564_JaffaCakes118.exe vbc.exe PID 2776 wrote to memory of 1952 2776 c59b106da450b6a75249a068d1337564_JaffaCakes118.exe vbc.exe PID 2776 wrote to memory of 1952 2776 c59b106da450b6a75249a068d1337564_JaffaCakes118.exe vbc.exe PID 2776 wrote to memory of 1952 2776 c59b106da450b6a75249a068d1337564_JaffaCakes118.exe vbc.exe PID 2776 wrote to memory of 1952 2776 c59b106da450b6a75249a068d1337564_JaffaCakes118.exe vbc.exe PID 1952 wrote to memory of 2976 1952 vbc.exe ADOBE CS 5.5 MASTER COLLECTION KEYGEN.EXE PID 1952 wrote to memory of 2976 1952 vbc.exe ADOBE CS 5.5 MASTER COLLECTION KEYGEN.EXE PID 1952 wrote to memory of 2976 1952 vbc.exe ADOBE CS 5.5 MASTER COLLECTION KEYGEN.EXE PID 1952 wrote to memory of 2976 1952 vbc.exe ADOBE CS 5.5 MASTER COLLECTION KEYGEN.EXE PID 1952 wrote to memory of 3040 1952 vbc.exe SERVER.EXE PID 1952 wrote to memory of 3040 1952 vbc.exe SERVER.EXE PID 1952 wrote to memory of 3040 1952 vbc.exe SERVER.EXE PID 1952 wrote to memory of 3040 1952 vbc.exe SERVER.EXE PID 3040 wrote to memory of 2700 3040 SERVER.EXE SERVER.EXE PID 3040 wrote to memory of 2700 3040 SERVER.EXE SERVER.EXE PID 3040 wrote to memory of 2700 3040 SERVER.EXE SERVER.EXE PID 3040 wrote to memory of 2700 3040 SERVER.EXE SERVER.EXE PID 3040 wrote to memory of 2700 3040 SERVER.EXE SERVER.EXE PID 3040 wrote to memory of 2700 3040 SERVER.EXE SERVER.EXE PID 3040 wrote to memory of 2700 3040 SERVER.EXE SERVER.EXE PID 3040 wrote to memory of 2700 3040 SERVER.EXE SERVER.EXE PID 3040 wrote to memory of 2700 3040 SERVER.EXE SERVER.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\c59b106da450b6a75249a068d1337564_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c59b106da450b6a75249a068d1337564_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\vbc.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\ADOBE CS 5.5 MASTER COLLECTION KEYGEN.EXE"C:\Users\Admin\AppData\Local\Temp\ADOBE CS 5.5 MASTER COLLECTION KEYGEN.EXE"3⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2976
-
-
C:\Users\Admin\AppData\Local\Temp\SERVER.EXE"C:\Users\Admin\AppData\Local\Temp\SERVER.EXE"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\SERVER.EXE/scomma "C:\Users\Admin\AppData\Local\Temp\k5TYJti58Q.ini"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2700
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
250KB
MD5e2f0f90da62a446c3ebe72ca23b0c5b1
SHA1b586c35580fea9b6964faff570fb0472c687a317
SHA256695bbe8783fd8540e6ecdabb23f228269a59c703611dfcd290cb0d512da3098a
SHA5121d177cb993b446c940616b659038016ab83c4b3c2122ef82ba98e8e278cac54bfe90a8a4dad21f4a2c96d733198001b58a8fd2b7755d3741845c3840c270549d
-
Filesize
208KB
MD5007a8e29949c84a56447f5d8e3dab4d6
SHA1a6c5dcfa0d12588e14e30248916540d4ace26692
SHA256d28123396918c102b8da1ebb2ac106082d01f981abbf34bdd4552e820a432072
SHA512eb913a582a623928f7fc8199e4ae1be5b7eef52c3d7b6b31538aa13615e3f89a0207f4cae16781ed1ad441bee3a2597f7909f83ef6683a22190590c2155e07aa
-
Filesize
5B
MD5d1ea279fb5559c020a1b4137dc4de237
SHA1db6f8988af46b56216a6f0daf95ab8c9bdb57400
SHA256fcdcc2c46896915a1c695d6231f0fee336a668531b7a3da46178c80362546dba
SHA512720e9c284f0559015312df7fe977563e5e16f48d3506e51eb4016adf7971924d352f740b030aa3adc81b6f65fd1dba12df06d10fa6c115074e5097e7ee0f08b3