Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
29-08-2024 17:09
Static task
static1
Behavioral task
behavioral1
Sample
c940bb519c163c605a42ebc1c3aee1d5_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
c940bb519c163c605a42ebc1c3aee1d5_JaffaCakes118.exe
-
Size
2.0MB
-
MD5
c940bb519c163c605a42ebc1c3aee1d5
-
SHA1
de4d6ba4c9a9b498c497116dfa40199bfef9a938
-
SHA256
644c62687a429c1df4c841b7b89df3490293cb2f42269446ff0b547076a99953
-
SHA512
3b283006159f31fc730967640ca944a92561db8e648df5da7a45cc10b6b126fb8c855deb4da2d4b492569d9495a1739162da5cda0b71c0a88ab9eb75e527012b
-
SSDEEP
49152:rupmpkkZnlTEnjWaRkOTlVRF9Uc8lHUY21gue5:Qynnl4jWaD/RFi7l0be
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c940bb519c163c605a42ebc1c3aee1d5_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate c940bb519c163c605a42ebc1c3aee1d5_JaffaCakes118.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: c940bb519c163c605a42ebc1c3aee1d5_JaffaCakes118.exe File opened (read-only) \??\E: c940bb519c163c605a42ebc1c3aee1d5_JaffaCakes118.exe File opened (read-only) \??\O: c940bb519c163c605a42ebc1c3aee1d5_JaffaCakes118.exe File opened (read-only) \??\P: c940bb519c163c605a42ebc1c3aee1d5_JaffaCakes118.exe File opened (read-only) \??\R: c940bb519c163c605a42ebc1c3aee1d5_JaffaCakes118.exe File opened (read-only) \??\T: c940bb519c163c605a42ebc1c3aee1d5_JaffaCakes118.exe File opened (read-only) \??\A: c940bb519c163c605a42ebc1c3aee1d5_JaffaCakes118.exe File opened (read-only) \??\I: c940bb519c163c605a42ebc1c3aee1d5_JaffaCakes118.exe File opened (read-only) \??\M: c940bb519c163c605a42ebc1c3aee1d5_JaffaCakes118.exe File opened (read-only) \??\X: c940bb519c163c605a42ebc1c3aee1d5_JaffaCakes118.exe File opened (read-only) \??\U: c940bb519c163c605a42ebc1c3aee1d5_JaffaCakes118.exe File opened (read-only) \??\V: c940bb519c163c605a42ebc1c3aee1d5_JaffaCakes118.exe File opened (read-only) \??\Y: c940bb519c163c605a42ebc1c3aee1d5_JaffaCakes118.exe File opened (read-only) \??\B: c940bb519c163c605a42ebc1c3aee1d5_JaffaCakes118.exe File opened (read-only) \??\G: c940bb519c163c605a42ebc1c3aee1d5_JaffaCakes118.exe File opened (read-only) \??\K: c940bb519c163c605a42ebc1c3aee1d5_JaffaCakes118.exe File opened (read-only) \??\Q: c940bb519c163c605a42ebc1c3aee1d5_JaffaCakes118.exe File opened (read-only) \??\S: c940bb519c163c605a42ebc1c3aee1d5_JaffaCakes118.exe File opened (read-only) \??\H: c940bb519c163c605a42ebc1c3aee1d5_JaffaCakes118.exe File opened (read-only) \??\J: c940bb519c163c605a42ebc1c3aee1d5_JaffaCakes118.exe File opened (read-only) \??\L: c940bb519c163c605a42ebc1c3aee1d5_JaffaCakes118.exe File opened (read-only) \??\N: c940bb519c163c605a42ebc1c3aee1d5_JaffaCakes118.exe File opened (read-only) \??\W: c940bb519c163c605a42ebc1c3aee1d5_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c940bb519c163c605a42ebc1c3aee1d5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c940bb519c163c605a42ebc1c3aee1d5_JaffaCakes118.exe -
Modifies registry class 16 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1D0508A5-FCC6-F05C-9773-336A82BD229E} c940bb519c163c605a42ebc1c3aee1d5_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1D0508A5-FCC6-F05C-9773-336A82BD229E}\Implemented Categories c940bb519c163c605a42ebc1c3aee1d5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1D0508A5-FCC6-F05C-9773-336A82BD229E}\InprocServer32\RuntimeVersion = "v1.1.4322" c940bb519c163c605a42ebc1c3aee1d5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1D0508A5-FCC6-F05C-9773-336A82BD229E}\InprocServer32\ThreadingModel = "Both" c940bb519c163c605a42ebc1c3aee1d5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1D0508A5-FCC6-F05C-9773-336A82BD229E}\InprocServer32\Assembly = "mscorlib, Version=1.0.5000.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" c940bb519c163c605a42ebc1c3aee1d5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1D0508A5-FCC6-F05C-9773-336A82BD229E}\InprocServer32\2.0.0.0\Class = "System.Security.Policy.AllMembershipCondition" c940bb519c163c605a42ebc1c3aee1d5_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1D0508A5-FCC6-F05C-9773-336A82BD229E}\Implemented Categories\{62C8FE65-4EBB-45E7-B440-6E39B2CDBF29} c940bb519c163c605a42ebc1c3aee1d5_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1D0508A5-FCC6-F05C-9773-336A82BD229E}\InprocServer32 c940bb519c163c605a42ebc1c3aee1d5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1D0508A5-FCC6-F05C-9773-336A82BD229E}\InprocServer32\ = "mscoree.dll" c940bb519c163c605a42ebc1c3aee1d5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1D0508A5-FCC6-F05C-9773-336A82BD229E}\ = "System.Security.Policy.AllMembershipCondition" c940bb519c163c605a42ebc1c3aee1d5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1D0508A5-FCC6-F05C-9773-336A82BD229E}\InprocServer32\Class = "System.Security.Policy.AllMembershipCondition" c940bb519c163c605a42ebc1c3aee1d5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1D0508A5-FCC6-F05C-9773-336A82BD229E}\InprocServer32\2.0.0.0\RuntimeVersion = "v2.0.50727" c940bb519c163c605a42ebc1c3aee1d5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1D0508A5-FCC6-F05C-9773-336A82BD229E}\InprocServer32\2.0.0.0\Assembly = "mscorlib, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" c940bb519c163c605a42ebc1c3aee1d5_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1D0508A5-FCC6-F05C-9773-336A82BD229E}\ProgId c940bb519c163c605a42ebc1c3aee1d5_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1D0508A5-FCC6-F05C-9773-336A82BD229E}\InprocServer32\2.0.0.0 c940bb519c163c605a42ebc1c3aee1d5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1D0508A5-FCC6-F05C-9773-336A82BD229E}\ProgId\ = "System.Security.Policy.AllMembershipCondition" c940bb519c163c605a42ebc1c3aee1d5_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2176 c940bb519c163c605a42ebc1c3aee1d5_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 2176 c940bb519c163c605a42ebc1c3aee1d5_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2176 c940bb519c163c605a42ebc1c3aee1d5_JaffaCakes118.exe Token: 33 2176 c940bb519c163c605a42ebc1c3aee1d5_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2176 c940bb519c163c605a42ebc1c3aee1d5_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2176 c940bb519c163c605a42ebc1c3aee1d5_JaffaCakes118.exe 2176 c940bb519c163c605a42ebc1c3aee1d5_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2268 wrote to memory of 2176 2268 c940bb519c163c605a42ebc1c3aee1d5_JaffaCakes118.exe 31 PID 2268 wrote to memory of 2176 2268 c940bb519c163c605a42ebc1c3aee1d5_JaffaCakes118.exe 31 PID 2268 wrote to memory of 2176 2268 c940bb519c163c605a42ebc1c3aee1d5_JaffaCakes118.exe 31 PID 2268 wrote to memory of 2176 2268 c940bb519c163c605a42ebc1c3aee1d5_JaffaCakes118.exe 31 PID 2268 wrote to memory of 2176 2268 c940bb519c163c605a42ebc1c3aee1d5_JaffaCakes118.exe 31 PID 2268 wrote to memory of 2176 2268 c940bb519c163c605a42ebc1c3aee1d5_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\c940bb519c163c605a42ebc1c3aee1d5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c940bb519c163c605a42ebc1c3aee1d5_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\c940bb519c163c605a42ebc1c3aee1d5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c940bb519c163c605a42ebc1c3aee1d5_JaffaCakes118.exe"2⤵
- Checks BIOS information in registry
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2176
-