Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/08/2024, 19:46
Static task
static1
Behavioral task
behavioral1
Sample
c788365d5348b71e201c0c15372cc039_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
c788365d5348b71e201c0c15372cc039_JaffaCakes118.exe
-
Size
2.2MB
-
MD5
c788365d5348b71e201c0c15372cc039
-
SHA1
34de196d6a7160d1baf00c0f6112681fb136a0a3
-
SHA256
276bc7736bd40f07ecfbaa1cc399fb4a7f64fc0b1f27691b1041d498c8787bf1
-
SHA512
c51db053d4ba6ef643d2c63240d7b8614ac9c95c10a9a9518a2b823ce9e1e0d0a9c7c81a0267bd05f2ed9dd3ba113f33e3ccb306448f0715a30fa03866cf3000
-
SSDEEP
49152:jfQnt1Fz5mzc1vvKRNXQ8rcQLqBg6jqJRT7r7lsotbgJST4xfseS19N:zQnLRbKRNXvcQLqgAon
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation c788365d5348b71e201c0c15372cc039_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 920 svchost_ms.exe 1540 svchost_ms.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 svchost_ms.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE svchost_ms.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies svchost_ms.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 svchost_ms.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\SmartData\svchost_ms.exe c788365d5348b71e201c0c15372cc039_JaffaCakes118.exe File created C:\Program Files (x86)\SmartData\performer.exe svchost_ms.exe File opened for modification C:\Program Files (x86)\SmartData\performer.exe svchost_ms.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c788365d5348b71e201c0c15372cc039_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Bios c788365d5348b71e201c0c15372cc039_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName c788365d5348b71e201c0c15372cc039_JaffaCakes118.exe -
Modifies data under HKEY_USERS 8 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" svchost_ms.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" svchost_ms.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" svchost_ms.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" svchost_ms.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix svchost_ms.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" svchost_ms.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" svchost_ms.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ svchost_ms.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 316 c788365d5348b71e201c0c15372cc039_JaffaCakes118.exe 316 c788365d5348b71e201c0c15372cc039_JaffaCakes118.exe 316 c788365d5348b71e201c0c15372cc039_JaffaCakes118.exe 316 c788365d5348b71e201c0c15372cc039_JaffaCakes118.exe 316 c788365d5348b71e201c0c15372cc039_JaffaCakes118.exe 316 c788365d5348b71e201c0c15372cc039_JaffaCakes118.exe 316 c788365d5348b71e201c0c15372cc039_JaffaCakes118.exe 316 c788365d5348b71e201c0c15372cc039_JaffaCakes118.exe 316 c788365d5348b71e201c0c15372cc039_JaffaCakes118.exe 316 c788365d5348b71e201c0c15372cc039_JaffaCakes118.exe 316 c788365d5348b71e201c0c15372cc039_JaffaCakes118.exe 316 c788365d5348b71e201c0c15372cc039_JaffaCakes118.exe 1540 svchost_ms.exe 1540 svchost_ms.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTcbPrivilege 1540 svchost_ms.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 316 wrote to memory of 4288 316 c788365d5348b71e201c0c15372cc039_JaffaCakes118.exe 86 PID 316 wrote to memory of 4288 316 c788365d5348b71e201c0c15372cc039_JaffaCakes118.exe 86 PID 316 wrote to memory of 4288 316 c788365d5348b71e201c0c15372cc039_JaffaCakes118.exe 86 PID 4288 wrote to memory of 4212 4288 cmd.exe 88 PID 4288 wrote to memory of 4212 4288 cmd.exe 88 PID 4288 wrote to memory of 4212 4288 cmd.exe 88 PID 4288 wrote to memory of 920 4288 cmd.exe 93 PID 4288 wrote to memory of 920 4288 cmd.exe 93 PID 4288 wrote to memory of 920 4288 cmd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\c788365d5348b71e201c0c15372cc039_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c788365d5348b71e201c0c15372cc039_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /S /C choice /C Y /N /D Y /T 3 & "C:\Program Files (x86)\SmartData\svchost_ms.exe" /start2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 33⤵
- System Location Discovery: System Language Discovery
PID:4212
-
-
C:\Program Files (x86)\SmartData\svchost_ms.exe"C:\Program Files (x86)\SmartData\svchost_ms.exe" /start3⤵
- Executes dropped EXE
PID:920
-
-
-
C:\Program Files (x86)\SmartData\svchost_ms.exe"C:\Program Files (x86)\SmartData\svchost_ms.exe" /srv1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1540
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD5c788365d5348b71e201c0c15372cc039
SHA134de196d6a7160d1baf00c0f6112681fb136a0a3
SHA256276bc7736bd40f07ecfbaa1cc399fb4a7f64fc0b1f27691b1041d498c8787bf1
SHA512c51db053d4ba6ef643d2c63240d7b8614ac9c95c10a9a9518a2b823ce9e1e0d0a9c7c81a0267bd05f2ed9dd3ba113f33e3ccb306448f0715a30fa03866cf3000