Analysis
-
max time kernel
147s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
30-08-2024 21:51
Static task
static1
Behavioral task
behavioral1
Sample
cbbd0d914f1b8fd1852e514a77ae16c5_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
cbbd0d914f1b8fd1852e514a77ae16c5_JaffaCakes118.exe
-
Size
614KB
-
MD5
cbbd0d914f1b8fd1852e514a77ae16c5
-
SHA1
cdcfe3f05d2334b387d9347ad7dd0f7806e497f1
-
SHA256
31c8c2014f2c7d1425741342ba9cc283641764c189e7e18c0caf571728d931c4
-
SHA512
d38e0dff68899ec64b1f9b77fd4d57f3b5231e36fc79e2303468089b5011eac3969df4aab9fd18240b1dd0f12091f384eb270539a205edc60a31319e2f2626aa
-
SSDEEP
12288:51beMP9g/CigiRVZzV1NTY9JNSE++JhIQUaPQWdoC4E40fAgyJ:516qCCsLZzV1C9JlJhJJ4Odf6
Malware Config
Extracted
formbook
3.9
ej
ratnik.online
qqqq5025.com
oliverschmidtleipzig.biz
wallet-service4.com
securityinformation.link
kuaitool.com
chuanyuemeili.com
jetluxurysedansok.live
xn--autodrne-93a.com
ipdzke.men
opebet489.com
defamey.com
switchbank.finance
bplti.info
habomilk.com
onlineprintersupport.info
kansashemporium.com
xnewmovie.info
yuvakarshan.com
camwrshh.com
sadegulkilic.com
nomadflight.com
citratiket.com
keyresourcetek.com
manis-nagoya.com
aboutlouis.com
kankabul.net
hlstnyy.com
freebaseballpredictions.com
sharedpo.com
retailrealty.net
fattiarantes.com
tattoojay.com
leadmmo.com
otthonbiztositas.online
katakori-kaisyoushitai.net
eaeyz.info
placetel-togo.com
kevincurley.net
niemehraknepdf.com
autovn360.com
coinaircourier.com
655ope.com
bestvideogamechairs.com
buildthemind.com
homebizfounder.com
hannguvietsky.com
irancalligraphers.net
goldmanjewelers.com
sajilotarika.com
pwufugqeg.download
purelyforyou.biz
henrysaesthetic.com
ccc616.com
sdryo.info
newconnectbiblestudy.com
onu.supply
weed.futbol
hospilabels.com
sec8rentals.info
duanb32daimo.com
miaoulog.com
thedmvarea.com
pixlogics.com
kervax.com
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Formbook payload 1 IoCs
resource yara_rule behavioral1/memory/1308-17-0x0000000000400000-0x000000000042A000-memory.dmp formbook -
Executes dropped EXE 2 IoCs
pid Process 2924 proj37328.exe 1308 proj37328.exe -
Loads dropped DLL 1 IoCs
pid Process 3036 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\Application = "C:\\Users\\Admin\\Desktop\\proj37328.exe -boot" proj37328.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\AJLHZLEH = "C:\\Program Files (x86)\\Ycbc\\services8p2p.exe" netsh.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2924 set thread context of 1308 2924 proj37328.exe 35 PID 1308 set thread context of 1252 1308 proj37328.exe 20 PID 2352 set thread context of 1252 2352 netsh.exe 20 -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Ycbc\services8p2p.exe netsh.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cbbd0d914f1b8fd1852e514a77ae16c5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language proj37328.exe -
description ioc Process Key created \Registry\User\S-1-5-21-2703099537-420551529-3771253338-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 netsh.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 1308 proj37328.exe 1308 proj37328.exe 2352 netsh.exe 2352 netsh.exe 2352 netsh.exe 2352 netsh.exe 2352 netsh.exe 2352 netsh.exe 2352 netsh.exe 2352 netsh.exe 2352 netsh.exe 2352 netsh.exe 2352 netsh.exe 2352 netsh.exe 2352 netsh.exe 2352 netsh.exe 2352 netsh.exe 2352 netsh.exe 2352 netsh.exe 2352 netsh.exe 2352 netsh.exe 2352 netsh.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 1308 proj37328.exe 1308 proj37328.exe 1308 proj37328.exe 2352 netsh.exe 2352 netsh.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2324 cbbd0d914f1b8fd1852e514a77ae16c5_JaffaCakes118.exe Token: SeDebugPrivilege 2924 proj37328.exe Token: SeDebugPrivilege 1308 proj37328.exe Token: SeDebugPrivilege 2352 netsh.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1252 Explorer.EXE -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2324 wrote to memory of 2748 2324 cbbd0d914f1b8fd1852e514a77ae16c5_JaffaCakes118.exe 29 PID 2324 wrote to memory of 2748 2324 cbbd0d914f1b8fd1852e514a77ae16c5_JaffaCakes118.exe 29 PID 2324 wrote to memory of 2748 2324 cbbd0d914f1b8fd1852e514a77ae16c5_JaffaCakes118.exe 29 PID 2324 wrote to memory of 2748 2324 cbbd0d914f1b8fd1852e514a77ae16c5_JaffaCakes118.exe 29 PID 2324 wrote to memory of 3036 2324 cbbd0d914f1b8fd1852e514a77ae16c5_JaffaCakes118.exe 31 PID 2324 wrote to memory of 3036 2324 cbbd0d914f1b8fd1852e514a77ae16c5_JaffaCakes118.exe 31 PID 2324 wrote to memory of 3036 2324 cbbd0d914f1b8fd1852e514a77ae16c5_JaffaCakes118.exe 31 PID 2324 wrote to memory of 3036 2324 cbbd0d914f1b8fd1852e514a77ae16c5_JaffaCakes118.exe 31 PID 3036 wrote to memory of 2924 3036 cmd.exe 33 PID 3036 wrote to memory of 2924 3036 cmd.exe 33 PID 3036 wrote to memory of 2924 3036 cmd.exe 33 PID 3036 wrote to memory of 2924 3036 cmd.exe 33 PID 2924 wrote to memory of 1308 2924 proj37328.exe 35 PID 2924 wrote to memory of 1308 2924 proj37328.exe 35 PID 2924 wrote to memory of 1308 2924 proj37328.exe 35 PID 2924 wrote to memory of 1308 2924 proj37328.exe 35 PID 2924 wrote to memory of 1308 2924 proj37328.exe 35 PID 2924 wrote to memory of 1308 2924 proj37328.exe 35 PID 2924 wrote to memory of 1308 2924 proj37328.exe 35 PID 1252 wrote to memory of 2352 1252 Explorer.EXE 36 PID 1252 wrote to memory of 2352 1252 Explorer.EXE 36 PID 1252 wrote to memory of 2352 1252 Explorer.EXE 36 PID 1252 wrote to memory of 2352 1252 Explorer.EXE 36 PID 2352 wrote to memory of 2140 2352 netsh.exe 37 PID 2352 wrote to memory of 2140 2352 netsh.exe 37 PID 2352 wrote to memory of 2140 2352 netsh.exe 37 PID 2352 wrote to memory of 2140 2352 netsh.exe 37
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Users\Admin\AppData\Local\Temp\cbbd0d914f1b8fd1852e514a77ae16c5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cbbd0d914f1b8fd1852e514a77ae16c5_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\cbbd0d914f1b8fd1852e514a77ae16c5_JaffaCakes118.exe" "C:\Users\Admin\Desktop\proj37328.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2748
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c, "C:\Users\Admin\Desktop\proj37328.exe"3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Users\Admin\Desktop\proj37328.exe"C:\Users\Admin\Desktop\proj37328.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Users\Admin\Desktop\proj37328.exe"C:\Users\Admin\Desktop\proj37328.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1308
-
-
-
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\SysWOW64\netsh.exe"2⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\Desktop\proj37328.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2140
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
614KB
MD5cbbd0d914f1b8fd1852e514a77ae16c5
SHA1cdcfe3f05d2334b387d9347ad7dd0f7806e497f1
SHA25631c8c2014f2c7d1425741342ba9cc283641764c189e7e18c0caf571728d931c4
SHA512d38e0dff68899ec64b1f9b77fd4d57f3b5231e36fc79e2303468089b5011eac3969df4aab9fd18240b1dd0f12091f384eb270539a205edc60a31319e2f2626aa