Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
31/08/2024, 17:35
Static task
static1
Behavioral task
behavioral1
Sample
cd459b5d7ce33980aa895c511dfbc715_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
cd459b5d7ce33980aa895c511dfbc715_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
cd459b5d7ce33980aa895c511dfbc715_JaffaCakes118.exe
-
Size
282KB
-
MD5
cd459b5d7ce33980aa895c511dfbc715
-
SHA1
c797f1b77ed83e4dd0f6572a4a1f6f4cd26d9d70
-
SHA256
6bd7c4de6608a66b29d48912a5a38a1dcf523f4b24f531ec6ca2520193171beb
-
SHA512
1102c48caaaeaf5ec3bd85d6e824ab89c62244916427a72f7b3d9420ba7db42879087b336d98de7e6525d15b551b4f391ac29115b63741b0256eb3f6d5284ae6
-
SSDEEP
6144:Izf/4vSu9hHaZBynO1qQZq2kwJD7DOZa6emP/CvL:Izf/c9hHXQY2kqD7DOw6eeaT
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" cd459b5d7ce33980aa895c511dfbc715_JaffaCakes118.exe -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 1920 2971.tmp -
Loads dropped DLL 2 IoCs
pid Process 1828 cd459b5d7ce33980aa895c511dfbc715_JaffaCakes118.exe 1828 cd459b5d7ce33980aa895c511dfbc715_JaffaCakes118.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1828-2-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1828-11-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1828-12-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2880-14-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2880-15-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1808-179-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1828-180-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1828-328-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1828-333-0x0000000000400000-0x000000000046B000-memory.dmp upx -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\21B.exe = "C:\\Program Files (x86)\\LP\\7D6B\\21B.exe" cd459b5d7ce33980aa895c511dfbc715_JaffaCakes118.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\LP\7D6B\21B.exe cd459b5d7ce33980aa895c511dfbc715_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\LP\7D6B\2971.tmp cd459b5d7ce33980aa895c511dfbc715_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\LP\7D6B\21B.exe cd459b5d7ce33980aa895c511dfbc715_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cd459b5d7ce33980aa895c511dfbc715_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cd459b5d7ce33980aa895c511dfbc715_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cd459b5d7ce33980aa895c511dfbc715_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2971.tmp -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1828 cd459b5d7ce33980aa895c511dfbc715_JaffaCakes118.exe 1828 cd459b5d7ce33980aa895c511dfbc715_JaffaCakes118.exe 1828 cd459b5d7ce33980aa895c511dfbc715_JaffaCakes118.exe 1828 cd459b5d7ce33980aa895c511dfbc715_JaffaCakes118.exe 1828 cd459b5d7ce33980aa895c511dfbc715_JaffaCakes118.exe 1828 cd459b5d7ce33980aa895c511dfbc715_JaffaCakes118.exe 1828 cd459b5d7ce33980aa895c511dfbc715_JaffaCakes118.exe 1828 cd459b5d7ce33980aa895c511dfbc715_JaffaCakes118.exe 1828 cd459b5d7ce33980aa895c511dfbc715_JaffaCakes118.exe 1828 cd459b5d7ce33980aa895c511dfbc715_JaffaCakes118.exe 1828 cd459b5d7ce33980aa895c511dfbc715_JaffaCakes118.exe 1828 cd459b5d7ce33980aa895c511dfbc715_JaffaCakes118.exe 1828 cd459b5d7ce33980aa895c511dfbc715_JaffaCakes118.exe 1828 cd459b5d7ce33980aa895c511dfbc715_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2492 explorer.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeRestorePrivilege 2056 msiexec.exe Token: SeTakeOwnershipPrivilege 2056 msiexec.exe Token: SeSecurityPrivilege 2056 msiexec.exe Token: SeShutdownPrivilege 2492 explorer.exe Token: SeShutdownPrivilege 2492 explorer.exe Token: SeShutdownPrivilege 2492 explorer.exe Token: SeShutdownPrivilege 2492 explorer.exe Token: SeShutdownPrivilege 2492 explorer.exe Token: SeShutdownPrivilege 2492 explorer.exe Token: SeShutdownPrivilege 2492 explorer.exe Token: SeShutdownPrivilege 2492 explorer.exe Token: SeShutdownPrivilege 2492 explorer.exe Token: SeShutdownPrivilege 2492 explorer.exe Token: SeShutdownPrivilege 2492 explorer.exe Token: SeShutdownPrivilege 2492 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe -
Suspicious use of SendNotifyMessage 22 IoCs
pid Process 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe 2492 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1828 wrote to memory of 2880 1828 cd459b5d7ce33980aa895c511dfbc715_JaffaCakes118.exe 31 PID 1828 wrote to memory of 2880 1828 cd459b5d7ce33980aa895c511dfbc715_JaffaCakes118.exe 31 PID 1828 wrote to memory of 2880 1828 cd459b5d7ce33980aa895c511dfbc715_JaffaCakes118.exe 31 PID 1828 wrote to memory of 2880 1828 cd459b5d7ce33980aa895c511dfbc715_JaffaCakes118.exe 31 PID 1828 wrote to memory of 1808 1828 cd459b5d7ce33980aa895c511dfbc715_JaffaCakes118.exe 34 PID 1828 wrote to memory of 1808 1828 cd459b5d7ce33980aa895c511dfbc715_JaffaCakes118.exe 34 PID 1828 wrote to memory of 1808 1828 cd459b5d7ce33980aa895c511dfbc715_JaffaCakes118.exe 34 PID 1828 wrote to memory of 1808 1828 cd459b5d7ce33980aa895c511dfbc715_JaffaCakes118.exe 34 PID 1828 wrote to memory of 1920 1828 cd459b5d7ce33980aa895c511dfbc715_JaffaCakes118.exe 37 PID 1828 wrote to memory of 1920 1828 cd459b5d7ce33980aa895c511dfbc715_JaffaCakes118.exe 37 PID 1828 wrote to memory of 1920 1828 cd459b5d7ce33980aa895c511dfbc715_JaffaCakes118.exe 37 PID 1828 wrote to memory of 1920 1828 cd459b5d7ce33980aa895c511dfbc715_JaffaCakes118.exe 37 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" cd459b5d7ce33980aa895c511dfbc715_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer cd459b5d7ce33980aa895c511dfbc715_JaffaCakes118.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\cd459b5d7ce33980aa895c511dfbc715_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cd459b5d7ce33980aa895c511dfbc715_JaffaCakes118.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1828 -
C:\Users\Admin\AppData\Local\Temp\cd459b5d7ce33980aa895c511dfbc715_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\cd459b5d7ce33980aa895c511dfbc715_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\B1FA3\3B37D.exe%C:\Users\Admin\AppData\Roaming\B1FA32⤵
- System Location Discovery: System Language Discovery
PID:2880
-
-
C:\Users\Admin\AppData\Local\Temp\cd459b5d7ce33980aa895c511dfbc715_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\cd459b5d7ce33980aa895c511dfbc715_JaffaCakes118.exe startC:\Program Files (x86)\A35AE\lvvm.exe%C:\Program Files (x86)\A35AE2⤵
- System Location Discovery: System Language Discovery
PID:1808
-
-
C:\Program Files (x86)\LP\7D6B\2971.tmp"C:\Program Files (x86)\LP\7D6B\2971.tmp"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1920
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2056
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2492
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD54241eed5e3727bb8be9266603292b295
SHA1caf075eed0fb30278199f1749ee429646ad1c3f3
SHA256e86abfbc24e507406d25075fa38c5ff34caf8373147053caf33bdfe514b76256
SHA512beddfb00da635545eee6b368b52e7a0f9578feaba1bc086e38a55fb4be972831670916a34ed8273a4594dd3d57328369fb8be099dd77da38ae111cac6b10da70
-
Filesize
600B
MD58d1abb16a20d68ebbe7ab9bb295f000c
SHA1b53d563e364e31db03839efdc83e1ec2ac75644d
SHA2562cc98452309d4c4bc119aa4f28545223ca327922c786fc50a39923f0c16537b9
SHA512aac6bd96e812180e408abb5b358fbe19fe74ef72edc3e03e48d2f43c971e0294b5579bdb046334c9c6a884a5a6ba87ef1fcef406e45b3672a20e0e3343bab310
-
Filesize
1KB
MD5b8ad07b05f1eb28f20f227c93269362b
SHA1a5d0dab7f7c95691930283ce8c450804ca74ecf1
SHA2563294dee1dffc18a41386f4c596abf660ee324ba7a8a6bdd44da35a336ce51cd3
SHA512e0b401a68dce30dff329110b1e45e1b2a1028f04a657aa8c087632920466abd7050df71dcbafa4e78f33ce9a00d9ef5a18766b7f10399ba7da73c5e7e0c87ad1
-
Filesize
100KB
MD5f6b59ae007f25be4bbc0d78790009c1f
SHA14224ca50f71600bd3973bd5b7400d6feb3bbfe23
SHA256ce2f2ae20dcacc1d713f241a3d230e708786eab37f4477fe53c39bea935ad8c5
SHA512c5250c43efd9f914277ec16ca973686fa44d03afccb1ba3982f61ef3b9b709ade34e526b108dbab163b078dadef8afe0a62a45d90573d583f0aa92e0e8d74c98