Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
28-08-2024 19:46
Static task
static1
Behavioral task
behavioral1
Sample
c788365d5348b71e201c0c15372cc039_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
c788365d5348b71e201c0c15372cc039_JaffaCakes118.exe
-
Size
2.2MB
-
MD5
c788365d5348b71e201c0c15372cc039
-
SHA1
34de196d6a7160d1baf00c0f6112681fb136a0a3
-
SHA256
276bc7736bd40f07ecfbaa1cc399fb4a7f64fc0b1f27691b1041d498c8787bf1
-
SHA512
c51db053d4ba6ef643d2c63240d7b8614ac9c95c10a9a9518a2b823ce9e1e0d0a9c7c81a0267bd05f2ed9dd3ba113f33e3ccb306448f0715a30fa03866cf3000
-
SSDEEP
49152:jfQnt1Fz5mzc1vvKRNXQ8rcQLqBg6jqJRT7r7lsotbgJST4xfseS19N:zQnLRbKRNXvcQLqgAon
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2848 svchost_ms.exe 2960 svchost_ms.exe -
Loads dropped DLL 1 IoCs
pid Process 2256 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat svchost_ms.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files (x86)\SmartData\svchost_ms.exe c788365d5348b71e201c0c15372cc039_JaffaCakes118.exe File created C:\Program Files (x86)\SmartData\performer.exe svchost_ms.exe File opened for modification C:\Program Files (x86)\SmartData\performer.exe svchost_ms.exe File created C:\Program Files\Mozilla Firefox\omni.ja.tmp c788365d5348b71e201c0c15372cc039_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c788365d5348b71e201c0c15372cc039_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Bios c788365d5348b71e201c0c15372cc039_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName c788365d5348b71e201c0c15372cc039_JaffaCakes118.exe -
Modifies data under HKEY_USERS 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" svchost_ms.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" svchost_ms.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings svchost_ms.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost_ms.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 svchost_ms.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix svchost_ms.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" svchost_ms.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings svchost_ms.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 svchost_ms.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 3016 c788365d5348b71e201c0c15372cc039_JaffaCakes118.exe 3016 c788365d5348b71e201c0c15372cc039_JaffaCakes118.exe 3016 c788365d5348b71e201c0c15372cc039_JaffaCakes118.exe 3016 c788365d5348b71e201c0c15372cc039_JaffaCakes118.exe 3016 c788365d5348b71e201c0c15372cc039_JaffaCakes118.exe 3016 c788365d5348b71e201c0c15372cc039_JaffaCakes118.exe 3016 c788365d5348b71e201c0c15372cc039_JaffaCakes118.exe 3016 c788365d5348b71e201c0c15372cc039_JaffaCakes118.exe 2960 svchost_ms.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTcbPrivilege 2960 svchost_ms.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3016 wrote to memory of 2256 3016 c788365d5348b71e201c0c15372cc039_JaffaCakes118.exe 30 PID 3016 wrote to memory of 2256 3016 c788365d5348b71e201c0c15372cc039_JaffaCakes118.exe 30 PID 3016 wrote to memory of 2256 3016 c788365d5348b71e201c0c15372cc039_JaffaCakes118.exe 30 PID 3016 wrote to memory of 2256 3016 c788365d5348b71e201c0c15372cc039_JaffaCakes118.exe 30 PID 2256 wrote to memory of 2200 2256 cmd.exe 32 PID 2256 wrote to memory of 2200 2256 cmd.exe 32 PID 2256 wrote to memory of 2200 2256 cmd.exe 32 PID 2256 wrote to memory of 2200 2256 cmd.exe 32 PID 2256 wrote to memory of 2848 2256 cmd.exe 33 PID 2256 wrote to memory of 2848 2256 cmd.exe 33 PID 2256 wrote to memory of 2848 2256 cmd.exe 33 PID 2256 wrote to memory of 2848 2256 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\c788365d5348b71e201c0c15372cc039_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c788365d5348b71e201c0c15372cc039_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /S /C choice /C Y /N /D Y /T 3 & "C:\Program Files (x86)\SmartData\svchost_ms.exe" /start2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 33⤵
- System Location Discovery: System Language Discovery
PID:2200
-
-
C:\Program Files (x86)\SmartData\svchost_ms.exe"C:\Program Files (x86)\SmartData\svchost_ms.exe" /start3⤵
- Executes dropped EXE
PID:2848
-
-
-
C:\Program Files (x86)\SmartData\svchost_ms.exe"C:\Program Files (x86)\SmartData\svchost_ms.exe" /srv1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2960
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD5c788365d5348b71e201c0c15372cc039
SHA134de196d6a7160d1baf00c0f6112681fb136a0a3
SHA256276bc7736bd40f07ecfbaa1cc399fb4a7f64fc0b1f27691b1041d498c8787bf1
SHA512c51db053d4ba6ef643d2c63240d7b8614ac9c95c10a9a9518a2b823ce9e1e0d0a9c7c81a0267bd05f2ed9dd3ba113f33e3ccb306448f0715a30fa03866cf3000