Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
28/08/2024, 23:10
Static task
static1
Behavioral task
behavioral1
Sample
c7d17921187fdce84758737b2c8cdb8c_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c7d17921187fdce84758737b2c8cdb8c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c7d17921187fdce84758737b2c8cdb8c_JaffaCakes118.exe
-
Size
286KB
-
MD5
c7d17921187fdce84758737b2c8cdb8c
-
SHA1
44a310a7b7e59e4a1dec723770fbefe836d729f8
-
SHA256
eab1890ddf98b4ac18421407b75f4376b89697cd7b5e307ce5d5fb70fd74f917
-
SHA512
e327b5ef4460469557546e5b94018948e4763614ba11687bc6f8fdffeeae9bde9828cfb46ef08185d5d8877d7d1f270c1154c9e2f903df31d2b4334cccb816f5
-
SSDEEP
6144:zXF4+3H9SCXHeN5ezDJIgwDQ/Q2BfVZYND:z19tSqeNgIcQ83QD
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" c7d17921187fdce84758737b2c8cdb8c_JaffaCakes118.exe -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 1928 48D3.tmp -
Loads dropped DLL 2 IoCs
pid Process 2516 c7d17921187fdce84758737b2c8cdb8c_JaffaCakes118.exe 2516 c7d17921187fdce84758737b2c8cdb8c_JaffaCakes118.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2516-2-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2516-11-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/384-17-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/384-15-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2516-14-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2516-125-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1768-128-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1768-127-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2516-307-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2516-312-0x0000000000400000-0x000000000046C000-memory.dmp upx -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\E05.exe = "C:\\Program Files (x86)\\LP\\76A2\\E05.exe" c7d17921187fdce84758737b2c8cdb8c_JaffaCakes118.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\LP\76A2\E05.exe c7d17921187fdce84758737b2c8cdb8c_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\LP\76A2\E05.exe c7d17921187fdce84758737b2c8cdb8c_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\LP\76A2\48D3.tmp c7d17921187fdce84758737b2c8cdb8c_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7d17921187fdce84758737b2c8cdb8c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 48D3.tmp -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2516 c7d17921187fdce84758737b2c8cdb8c_JaffaCakes118.exe 2516 c7d17921187fdce84758737b2c8cdb8c_JaffaCakes118.exe 2516 c7d17921187fdce84758737b2c8cdb8c_JaffaCakes118.exe 2516 c7d17921187fdce84758737b2c8cdb8c_JaffaCakes118.exe 2516 c7d17921187fdce84758737b2c8cdb8c_JaffaCakes118.exe 2516 c7d17921187fdce84758737b2c8cdb8c_JaffaCakes118.exe 2516 c7d17921187fdce84758737b2c8cdb8c_JaffaCakes118.exe 2516 c7d17921187fdce84758737b2c8cdb8c_JaffaCakes118.exe 2516 c7d17921187fdce84758737b2c8cdb8c_JaffaCakes118.exe 2516 c7d17921187fdce84758737b2c8cdb8c_JaffaCakes118.exe 2516 c7d17921187fdce84758737b2c8cdb8c_JaffaCakes118.exe 2516 c7d17921187fdce84758737b2c8cdb8c_JaffaCakes118.exe 2516 c7d17921187fdce84758737b2c8cdb8c_JaffaCakes118.exe 2516 c7d17921187fdce84758737b2c8cdb8c_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 904 explorer.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeRestorePrivilege 3032 msiexec.exe Token: SeTakeOwnershipPrivilege 3032 msiexec.exe Token: SeSecurityPrivilege 3032 msiexec.exe Token: SeShutdownPrivilege 904 explorer.exe Token: SeShutdownPrivilege 904 explorer.exe Token: SeShutdownPrivilege 904 explorer.exe Token: SeShutdownPrivilege 904 explorer.exe Token: SeShutdownPrivilege 904 explorer.exe Token: SeShutdownPrivilege 904 explorer.exe Token: SeShutdownPrivilege 904 explorer.exe Token: SeShutdownPrivilege 904 explorer.exe Token: SeShutdownPrivilege 904 explorer.exe Token: SeShutdownPrivilege 904 explorer.exe Token: SeShutdownPrivilege 904 explorer.exe Token: SeShutdownPrivilege 904 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe -
Suspicious use of SendNotifyMessage 22 IoCs
pid Process 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe 904 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2516 wrote to memory of 384 2516 c7d17921187fdce84758737b2c8cdb8c_JaffaCakes118.exe 32 PID 2516 wrote to memory of 384 2516 c7d17921187fdce84758737b2c8cdb8c_JaffaCakes118.exe 32 PID 2516 wrote to memory of 384 2516 c7d17921187fdce84758737b2c8cdb8c_JaffaCakes118.exe 32 PID 2516 wrote to memory of 384 2516 c7d17921187fdce84758737b2c8cdb8c_JaffaCakes118.exe 32 PID 2516 wrote to memory of 1768 2516 c7d17921187fdce84758737b2c8cdb8c_JaffaCakes118.exe 34 PID 2516 wrote to memory of 1768 2516 c7d17921187fdce84758737b2c8cdb8c_JaffaCakes118.exe 34 PID 2516 wrote to memory of 1768 2516 c7d17921187fdce84758737b2c8cdb8c_JaffaCakes118.exe 34 PID 2516 wrote to memory of 1768 2516 c7d17921187fdce84758737b2c8cdb8c_JaffaCakes118.exe 34 PID 2516 wrote to memory of 1928 2516 c7d17921187fdce84758737b2c8cdb8c_JaffaCakes118.exe 37 PID 2516 wrote to memory of 1928 2516 c7d17921187fdce84758737b2c8cdb8c_JaffaCakes118.exe 37 PID 2516 wrote to memory of 1928 2516 c7d17921187fdce84758737b2c8cdb8c_JaffaCakes118.exe 37 PID 2516 wrote to memory of 1928 2516 c7d17921187fdce84758737b2c8cdb8c_JaffaCakes118.exe 37 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer c7d17921187fdce84758737b2c8cdb8c_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" c7d17921187fdce84758737b2c8cdb8c_JaffaCakes118.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\c7d17921187fdce84758737b2c8cdb8c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c7d17921187fdce84758737b2c8cdb8c_JaffaCakes118.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\c7d17921187fdce84758737b2c8cdb8c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7d17921187fdce84758737b2c8cdb8c_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\25FDD\3A976.exe%C:\Users\Admin\AppData\Roaming\25FDD2⤵PID:384
-
-
C:\Users\Admin\AppData\Local\Temp\c7d17921187fdce84758737b2c8cdb8c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7d17921187fdce84758737b2c8cdb8c_JaffaCakes118.exe startC:\Program Files (x86)\DDE76\lvvm.exe%C:\Program Files (x86)\DDE762⤵PID:1768
-
-
C:\Program Files (x86)\LP\76A2\48D3.tmp"C:\Program Files (x86)\LP\76A2\48D3.tmp"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1928
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3032
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:904
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
101KB
MD580ac92fe81519a42cb9031ea571b7761
SHA1fec55eedbe309ebaa847ae1b9b4680b1e357586b
SHA256510567f9284db5bb61e1697b7befa5d940ad64be5b826db005094077682c42bd
SHA51279e91e92bbb61b546943e3824f0fd56a8cd1b0b5c18d23b129286d12c906dc10a9540876af85268aa6236f3d97af69631d389cf486b6ed45e220e7cf0a35a42e
-
Filesize
996B
MD5df08aed43965c9d2fc579110e4f3e26b
SHA11bd3f29b9b2c8e6f3180b16c89848e2244373505
SHA256d79cb5e4350c01585c7bd93bfd86ae7edc35e08c0455a345ba581dfabb23d6de
SHA512dac8344540ae02865989640206bebba99c8fde742b6da3abe5c53ee6d67e8df3ecfd84da98e44a70d6b879c9ac5be40a82c6f2e4c180912f2ac5c9ff5ab99f95
-
Filesize
600B
MD5e5692199764ffb2875881f1329f19dae
SHA1f7d3dca4a5d3b3a042d4285cc75eaac1fbfc35ad
SHA256eb2fc2e7cdf9aa28ce7cbdd2640595db537dc6d4806e85f1fd60b052db821f22
SHA5129c05f7580e1df2664f1a3a539330eaa338ad652e4496a24183b1a86a0582ef5d8c8baf66db1203ce70bb034fc8db0450aa4e1430ab93975222c8f36bde155b27
-
Filesize
1KB
MD5ffbead90afe71fe21e281b2db0db4cd9
SHA1f7a3679a4817abe8672d1b844ede198b0a51fc09
SHA2567add1e1dc2d8a484f4894383eb748dcb9a5b0cc0fe7a19abf0a65a0b194622f2
SHA51271708078ffa0b577f795f81d91991d4878c82baace342e3cbdb8f0bd2b0ddb44ca6addb388ce4e5c90c00528e685f28bc70fe26e806c0e64697219a8a28a0f61
-
Filesize
300B
MD5c29d51b46f299cbc11279563814b0e55
SHA16e69112625a17bbb49eb0c958dd7cc15b1f0ecc9
SHA2566ffe35f838965bb10ed2516e859d87408d2b73dd90757a9525670c163365ff2d
SHA5127ae06666f241bd476304b7ce6764993d0a8af64890b80e9dbf7cde1cac7795d7c12e74cbf0fbd7052472efef8f2d302e4cc8ad614159ce5098de01d2ab3ba54f