Overview
overview
9Static
static
3c7675ca1be...18.exe
windows7-x64
9c7675ca1be...18.exe
windows10-2004-x64
9$1/1337/Pa...er.exe
windows7-x64
3$1/1337/Pa...er.exe
windows10-2004-x64
3$1/1337/�...xe.exe
windows7-x64
3$1/1337/�...xe.exe
windows10-2004-x64
3$1/1337/2.exe
windows7-x64
9$1/1337/2.exe
windows10-2004-x64
9$1/1337/1.exe
windows7-x64
9$1/1337/1.exe
windows10-2004-x64
9$1/1337/Test.exe
windows7-x64
9$1/1337/Test.exe
windows10-2004-x64
9$1/1337/msvcr100.dll
windows7-x64
3$1/1337/msvcr100.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$1/1337/sqlite3.dll
windows7-x64
3$1/1337/sqlite3.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$1/1337/libcurl.dll
windows7-x64
3$1/1337/libcurl.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
28/08/2024, 18:25
Static task
static1
Behavioral task
behavioral1
Sample
c7675ca1be07c1ece91bcc37ab552ec7_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c7675ca1be07c1ece91bcc37ab552ec7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$1/1337/Paradox-crypter.exe
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
$1/1337/Paradox-crypter.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$1/1337/ Forexe.exe
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
$1/1337/ Forexe.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$1/1337/2.exe
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
$1/1337/2.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$1/1337/1.exe
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
$1/1337/1.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$1/1337/Test.exe
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
$1/1337/Test.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
$1/1337/msvcr100.dll
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
$1/1337/msvcr100.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
$1/1337/sqlite3.dll
Resource
win7-20240705-en
Behavioral task
behavioral18
Sample
$1/1337/sqlite3.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
$1/1337/libcurl.dll
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
$1/1337/libcurl.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240729-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
General
-
Target
c7675ca1be07c1ece91bcc37ab552ec7_JaffaCakes118.exe
-
Size
3.6MB
-
MD5
c7675ca1be07c1ece91bcc37ab552ec7
-
SHA1
6f14be3054a124acdff33805876a9bf821b74c74
-
SHA256
c9a87d68a65ade147208ac8a6d68297877f145285e3f3f40ec01ea8d562fadc9
-
SHA512
63e2de0470154a65cc31e2d8e83531de4db2c53b6881916bb575c2382e2e21cb2e10a72a7561df3cf2f8b5b4407f8201343d6f971df578999238cbb120b04505
-
SSDEEP
98304:UUIbT8TEV20PCjVh59plfSkoVVsbzNJpZZBD9AB9nPX:hIb27PfTfShvsbhbZZwBVv
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Test.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Test.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Test.exe -
Executes dropped EXE 5 IoCs
pid Process 2880 Paradox-crypter.exe 2648 Çàðàáîòîê íà Forexe.exe 2464 2.exe 1188 1.exe 2604 Test.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Wine Test.exe -
Loads dropped DLL 12 IoCs
pid Process 2752 c7675ca1be07c1ece91bcc37ab552ec7_JaffaCakes118.exe 2752 c7675ca1be07c1ece91bcc37ab552ec7_JaffaCakes118.exe 2752 c7675ca1be07c1ece91bcc37ab552ec7_JaffaCakes118.exe 2648 Çàðàáîòîê íà Forexe.exe 2648 Çàðàáîòîê íà Forexe.exe 2464 2.exe 2464 2.exe 1188 1.exe 1188 1.exe 2604 Test.exe 2604 Test.exe 2604 Test.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2604 Test.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7675ca1be07c1ece91bcc37ab552ec7_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Çàðàáîòîê íà Forexe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Paradox-crypter.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Test.exe -
NSIS installer 6 IoCs
resource yara_rule behavioral1/files/0x0007000000016c7d-13.dat nsis_installer_1 behavioral1/files/0x0007000000016c7d-13.dat nsis_installer_2 behavioral1/files/0x00080000000172a7-29.dat nsis_installer_1 behavioral1/files/0x00080000000172a7-29.dat nsis_installer_2 behavioral1/files/0x0005000000019309-53.dat nsis_installer_1 behavioral1/files/0x0005000000019309-53.dat nsis_installer_2 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2604 Test.exe 2604 Test.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2752 wrote to memory of 2880 2752 c7675ca1be07c1ece91bcc37ab552ec7_JaffaCakes118.exe 30 PID 2752 wrote to memory of 2880 2752 c7675ca1be07c1ece91bcc37ab552ec7_JaffaCakes118.exe 30 PID 2752 wrote to memory of 2880 2752 c7675ca1be07c1ece91bcc37ab552ec7_JaffaCakes118.exe 30 PID 2752 wrote to memory of 2880 2752 c7675ca1be07c1ece91bcc37ab552ec7_JaffaCakes118.exe 30 PID 2752 wrote to memory of 2648 2752 c7675ca1be07c1ece91bcc37ab552ec7_JaffaCakes118.exe 31 PID 2752 wrote to memory of 2648 2752 c7675ca1be07c1ece91bcc37ab552ec7_JaffaCakes118.exe 31 PID 2752 wrote to memory of 2648 2752 c7675ca1be07c1ece91bcc37ab552ec7_JaffaCakes118.exe 31 PID 2752 wrote to memory of 2648 2752 c7675ca1be07c1ece91bcc37ab552ec7_JaffaCakes118.exe 31 PID 2648 wrote to memory of 2464 2648 Çàðàáîòîê íà Forexe.exe 32 PID 2648 wrote to memory of 2464 2648 Çàðàáîòîê íà Forexe.exe 32 PID 2648 wrote to memory of 2464 2648 Çàðàáîòîê íà Forexe.exe 32 PID 2648 wrote to memory of 2464 2648 Çàðàáîòîê íà Forexe.exe 32 PID 2464 wrote to memory of 1188 2464 2.exe 33 PID 2464 wrote to memory of 1188 2464 2.exe 33 PID 2464 wrote to memory of 1188 2464 2.exe 33 PID 2464 wrote to memory of 1188 2464 2.exe 33 PID 1188 wrote to memory of 2604 1188 1.exe 34 PID 1188 wrote to memory of 2604 1188 1.exe 34 PID 1188 wrote to memory of 2604 1188 1.exe 34 PID 1188 wrote to memory of 2604 1188 1.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\c7675ca1be07c1ece91bcc37ab552ec7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c7675ca1be07c1ece91bcc37ab552ec7_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Users\Admin\AppData\Roaming\1337\Paradox-crypter.exe"C:\Users\Admin\AppData\Roaming\1337\Paradox-crypter.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2880
-
-
C:\Users\Admin\AppData\Roaming\1337\Çàðàáîòîê íà Forexe.exe"C:\Users\Admin\AppData\Roaming\1337\Çàðàáîòîê íà Forexe.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Roaming\1337\2.exe"C:\Users\Admin\AppData\Roaming\1337\2.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Users\Admin\AppData\Roaming\1337\1.exe"C:\Users\Admin\AppData\Roaming\1337\1.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Users\Admin\AppData\Roaming\1337\Test.exe"C:\Users\Admin\AppData\Roaming\1337\Test.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2604
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD5c6f1b27b6b65413942afeee03f13c12a
SHA1d0c9b1b4409c0d4808dc30226463caa9da3a877a
SHA256305ddcd4d976597f0f219c41a49749d87d7f45ff4578408d60921016b6d662ab
SHA512585df1b3d6f6b95d79e214b88dced62acee6e9b7a547ee05ab1b2dcbcdb8de80dd8d2dd3dd9ef93964183930add2a594c4c664ee38eaed5e41fe57770f1954d0
-
Filesize
2.4MB
MD5bd029ebcf93372264841945ba91d0b26
SHA1592a3da5fc92f7f92e4b7fd12ca4028f90f05762
SHA256cf7074081335231a0c3c76a35ae1e6b252ad15e7424f1aa99b48e40835a71391
SHA512b15e9cd5548c019d6d91fec665d89da2874785778cbdfdfdbf400b19019a3fae9f23f02a7e51a33d39e30fce05b88cc0ebd5221e627e153e04644370d8b09138
-
Filesize
740KB
MD50e8888aadab9669d06f55767f2ccaf7b
SHA14a1917b4fbda7705782216594fc912e41e76465a
SHA25643af6d081b5ded0bd3b1b269719b3a63400da25a805d46d579c4dd2a77861ba1
SHA51266aea1fb8e3e205ae336c0d4dfc8c7a0b635b2f58be893bae47c04e55c128cec2c95cd377fea5ea33befe86b3af7e9dbf35dedd5a9aa5a8bca8b2dbdc5e55ad7
-
Filesize
831KB
MD52381ce4058796ca28666afe291b5ea29
SHA1431f2ef403180b1924b1d0870ed99748e0627c73
SHA2561e53a7b078d5451b95c92af3b0cfb5c01a9d6122b1e3218cf96b0e6fef0df11d
SHA51283bc783703f156132d7b77265540e4e172784aafb65537338d1f95ec5f1a5dce94650c24d84a7c33d29941744ba55d267a42755bed92bd6ca5b9534dafca3cda
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
1.1MB
MD53baeaddf47c08c80ee3ee4435e98f60f
SHA11cab02faa6f8a2fab257599d831a89954a0c6cc2
SHA256317cc90ab9037e2e4598abf3856e5f5b6729a40dccd9b3b99d621daab776ff76
SHA5121b5b6a8465bc0d53abf8d549a2f6a11eb3cd2709485e0a99043f7069f3c04d968715b590b520d856eff42e5b3043b77a4311e99b5229b630e25a248f56163939
-
Filesize
1.6MB
MD5a0b96dbbdeb12eff9630a2de7311e4eb
SHA14d75fbf0357122e513ec72b0552dd1e3d75119d3
SHA25642db31d1ff1f8eed5938b3b3a220406267d103cc308ca4a26d7ab1120aa65848
SHA512a44c8a27ce148585927fce6de67fec407a4081b5b3ed7cd9a69963fd06a2540807de5924683c804fc2086b3ef2ea86df40c7fdfcea71f380bd74ac6fe8dbc21f
-
Filesize
268KB
MD596b6090bf24e2899e01346c995bd401b
SHA10aa75b06f61f3ebc20c8dbf93235f10f20ec83cb
SHA2564e4543d3925202e350acdb39eac4f31bb255b4f934ab09504d36bd3ca6319279
SHA5122f17052ecf0448994a7888c78f6121f0d104f8aa35cea568a9993cee6db4cd8c3aa4421dd7e7a940bfe5b0f2c65d22db046daccc354118a7045c763097965014
-
Filesize
2.6MB
MD5747f22287c0f2ba22b1f08ae45375238
SHA116a823ec4b69210d10cddfc1f44fe3dd866e0dfe
SHA256a372f4b5a1f263b1f2f2e234671acd55ed587bb7d81632747d5cc77eaf854585
SHA512e2ac63baa7c666db8d0a191dd80d3bd47c3b0ff42f2e57aee62073fc180853078220a552eb46eb765e14a3e4cece379b757ff66b1e41e816abd1efaa38164f99