Analysis
-
max time kernel
141s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 20:37
Static task
static1
Behavioral task
behavioral1
Sample
d068b3fe41ac9d98cd3a29d3bb4883a5_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d068b3fe41ac9d98cd3a29d3bb4883a5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d068b3fe41ac9d98cd3a29d3bb4883a5_JaffaCakes118.exe
-
Size
272KB
-
MD5
d068b3fe41ac9d98cd3a29d3bb4883a5
-
SHA1
c045143d113e295b6765f364fd5c468e5086369e
-
SHA256
04615bb86170e97f549f956cae47e06954c618207c4bc0189a18b0eb95127838
-
SHA512
4a2f1a4366b9250b66f704bdfc0280b2a10a1eb1b06ae579338df49c7ac07a527a2d6931da791586876a34dafd63a771082701f3a06052fac826bd5781911e05
-
SSDEEP
6144:K3yLcxK+CXab720WKQVCAU4HbC2iiajmS7crmaY:KCqcG20WKopHNhpxL
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" d068b3fe41ac9d98cd3a29d3bb4883a5_JaffaCakes118.exe -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 2164 FA27.tmp -
Loads dropped DLL 2 IoCs
pid Process 2400 d068b3fe41ac9d98cd3a29d3bb4883a5_JaffaCakes118.exe 2400 d068b3fe41ac9d98cd3a29d3bb4883a5_JaffaCakes118.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2400-2-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2400-3-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2400-30-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral1/memory/2400-31-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1272-34-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1272-35-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2400-36-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1528-123-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2400-124-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2400-208-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2400-214-0x0000000000400000-0x000000000046A000-memory.dmp upx -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\619.exe = "C:\\Program Files (x86)\\LP\\2C04\\619.exe" d068b3fe41ac9d98cd3a29d3bb4883a5_JaffaCakes118.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\LP\2C04\619.exe d068b3fe41ac9d98cd3a29d3bb4883a5_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\LP\2C04\FA27.tmp d068b3fe41ac9d98cd3a29d3bb4883a5_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\LP\2C04\619.exe d068b3fe41ac9d98cd3a29d3bb4883a5_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FA27.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d068b3fe41ac9d98cd3a29d3bb4883a5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d068b3fe41ac9d98cd3a29d3bb4883a5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d068b3fe41ac9d98cd3a29d3bb4883a5_JaffaCakes118.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2400 d068b3fe41ac9d98cd3a29d3bb4883a5_JaffaCakes118.exe 2400 d068b3fe41ac9d98cd3a29d3bb4883a5_JaffaCakes118.exe 2400 d068b3fe41ac9d98cd3a29d3bb4883a5_JaffaCakes118.exe 2400 d068b3fe41ac9d98cd3a29d3bb4883a5_JaffaCakes118.exe 2400 d068b3fe41ac9d98cd3a29d3bb4883a5_JaffaCakes118.exe 2400 d068b3fe41ac9d98cd3a29d3bb4883a5_JaffaCakes118.exe 2400 d068b3fe41ac9d98cd3a29d3bb4883a5_JaffaCakes118.exe 2400 d068b3fe41ac9d98cd3a29d3bb4883a5_JaffaCakes118.exe 2400 d068b3fe41ac9d98cd3a29d3bb4883a5_JaffaCakes118.exe 2400 d068b3fe41ac9d98cd3a29d3bb4883a5_JaffaCakes118.exe 2400 d068b3fe41ac9d98cd3a29d3bb4883a5_JaffaCakes118.exe 2400 d068b3fe41ac9d98cd3a29d3bb4883a5_JaffaCakes118.exe 2400 d068b3fe41ac9d98cd3a29d3bb4883a5_JaffaCakes118.exe 2400 d068b3fe41ac9d98cd3a29d3bb4883a5_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 916 explorer.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeRestorePrivilege 2704 msiexec.exe Token: SeTakeOwnershipPrivilege 2704 msiexec.exe Token: SeSecurityPrivilege 2704 msiexec.exe Token: SeShutdownPrivilege 916 explorer.exe Token: SeShutdownPrivilege 916 explorer.exe Token: SeShutdownPrivilege 916 explorer.exe Token: SeShutdownPrivilege 916 explorer.exe Token: SeShutdownPrivilege 916 explorer.exe Token: SeShutdownPrivilege 916 explorer.exe Token: SeShutdownPrivilege 916 explorer.exe Token: SeShutdownPrivilege 916 explorer.exe Token: SeShutdownPrivilege 916 explorer.exe Token: SeShutdownPrivilege 916 explorer.exe Token: SeShutdownPrivilege 916 explorer.exe Token: SeShutdownPrivilege 916 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 916 explorer.exe 916 explorer.exe 916 explorer.exe 916 explorer.exe 916 explorer.exe 916 explorer.exe 916 explorer.exe 916 explorer.exe 916 explorer.exe 916 explorer.exe 916 explorer.exe 916 explorer.exe 916 explorer.exe 916 explorer.exe 916 explorer.exe 916 explorer.exe 916 explorer.exe 916 explorer.exe 916 explorer.exe 916 explorer.exe 916 explorer.exe 916 explorer.exe 916 explorer.exe 916 explorer.exe 916 explorer.exe 916 explorer.exe 916 explorer.exe 916 explorer.exe -
Suspicious use of SendNotifyMessage 22 IoCs
pid Process 916 explorer.exe 916 explorer.exe 916 explorer.exe 916 explorer.exe 916 explorer.exe 916 explorer.exe 916 explorer.exe 916 explorer.exe 916 explorer.exe 916 explorer.exe 916 explorer.exe 916 explorer.exe 916 explorer.exe 916 explorer.exe 916 explorer.exe 916 explorer.exe 916 explorer.exe 916 explorer.exe 916 explorer.exe 916 explorer.exe 916 explorer.exe 916 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2400 wrote to memory of 1272 2400 d068b3fe41ac9d98cd3a29d3bb4883a5_JaffaCakes118.exe 31 PID 2400 wrote to memory of 1272 2400 d068b3fe41ac9d98cd3a29d3bb4883a5_JaffaCakes118.exe 31 PID 2400 wrote to memory of 1272 2400 d068b3fe41ac9d98cd3a29d3bb4883a5_JaffaCakes118.exe 31 PID 2400 wrote to memory of 1272 2400 d068b3fe41ac9d98cd3a29d3bb4883a5_JaffaCakes118.exe 31 PID 2400 wrote to memory of 1528 2400 d068b3fe41ac9d98cd3a29d3bb4883a5_JaffaCakes118.exe 35 PID 2400 wrote to memory of 1528 2400 d068b3fe41ac9d98cd3a29d3bb4883a5_JaffaCakes118.exe 35 PID 2400 wrote to memory of 1528 2400 d068b3fe41ac9d98cd3a29d3bb4883a5_JaffaCakes118.exe 35 PID 2400 wrote to memory of 1528 2400 d068b3fe41ac9d98cd3a29d3bb4883a5_JaffaCakes118.exe 35 PID 2400 wrote to memory of 2164 2400 d068b3fe41ac9d98cd3a29d3bb4883a5_JaffaCakes118.exe 37 PID 2400 wrote to memory of 2164 2400 d068b3fe41ac9d98cd3a29d3bb4883a5_JaffaCakes118.exe 37 PID 2400 wrote to memory of 2164 2400 d068b3fe41ac9d98cd3a29d3bb4883a5_JaffaCakes118.exe 37 PID 2400 wrote to memory of 2164 2400 d068b3fe41ac9d98cd3a29d3bb4883a5_JaffaCakes118.exe 37 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer d068b3fe41ac9d98cd3a29d3bb4883a5_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" d068b3fe41ac9d98cd3a29d3bb4883a5_JaffaCakes118.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\d068b3fe41ac9d98cd3a29d3bb4883a5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d068b3fe41ac9d98cd3a29d3bb4883a5_JaffaCakes118.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\d068b3fe41ac9d98cd3a29d3bb4883a5_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\d068b3fe41ac9d98cd3a29d3bb4883a5_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\41BFF\6AC2C.exe%C:\Users\Admin\AppData\Roaming\41BFF2⤵
- System Location Discovery: System Language Discovery
PID:1272
-
-
C:\Users\Admin\AppData\Local\Temp\d068b3fe41ac9d98cd3a29d3bb4883a5_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\d068b3fe41ac9d98cd3a29d3bb4883a5_JaffaCakes118.exe startC:\Program Files (x86)\FF889\lvvm.exe%C:\Program Files (x86)\FF8892⤵
- System Location Discovery: System Language Discovery
PID:1528
-
-
C:\Program Files (x86)\LP\2C04\FA27.tmp"C:\Program Files (x86)\LP\2C04\FA27.tmp"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2164
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2704
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:916
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5517b5169adb53966adbbc732192bd4e8
SHA19043e8abc80323961a3a41374f1c14fb685e15d2
SHA2565ebd2cc082660e738cd5a3bce3546d50447d8a5c2d36971016cecbcd2cec5e9b
SHA512781af8cd872cdfb6f7baea4152bf31778e0ec9fe2e957702d5aef70bf652430388a971464206e1881ea5363cd3ee1a0177fc49c4d9adc9a3348cf28e99a5f020
-
Filesize
1KB
MD5ebbcd07f4773922b9296f55c586ac7d0
SHA1831652c391215b2e985f8b958426a9461803fc70
SHA2566aaefe9fb2ef9f4b6fb0cd95b38c11f732083cc1000f9ed863f621ddda122155
SHA51210115b1341313c88e96c202700a0bff4e1819f6fa335496f103375e828e6d59ccbd290d200ee9e0e68963335c89936b1ed2c8713ff832a09d780b1e93b66444f
-
Filesize
600B
MD5a43bc9692cc827b0b80b4a36cf6fcc9e
SHA1636ccb4c611e3b2862eefa6c09f853ad4dd01cb2
SHA25607b089eae43df261fad570f2220c9d8a1701ce57715b4b2c316b66bb99d29641
SHA5125a224cb1fdd1a6d8cc75414f895cae2d7775a29de771ef8d22b1ee30edbf70c032e24ee8bf0e9d58f556efdbdda54dc776e7136f5671dd8b636a32c05b77428b
-
Filesize
300B
MD570554861a5c1d0e5d14e5b8132a5f906
SHA1b84fc2fd18a5865b80dd87419214ec2b30b14c0e
SHA256ad56fa54e03480066baf2c31da1c77ad17d5a0c70725615b1e64362768bd0186
SHA5125ff9cd958d06dd2aa92d211b03eb8839087df5e76bd32c0579c235af427fe63ac4a15c051041df08607651fa4267ffbcf5cc73e1b50abd8fc17f487ebbb312df
-
Filesize
996B
MD556cf4ee7c46c64fcf82b71b7c91808bd
SHA163aa6c83f0196898b5f6b5bc2f4fcbe1b21226b1
SHA256e7d1586ea553f9b6882fe80c5f18b19ffb6a8b3b84dddc450b51302a276a803a
SHA512c67d6e81066c01de69deceba76b9c176114761aa1611ac0e441d2e924e867ff460edbbeaff2ce4c840d8c7ce83345758f4baad626807667a9fadbd18f6860a6e
-
Filesize
97KB
MD51982720acf8fa5cce7ed7378d6df64bd
SHA1ff1302f00bcacedcc895f17eae364ac2bb1c338b
SHA256e78dc40dbcc630291632cec308b1c76c95bbe4a103561003fd63706eddb3ce3b
SHA512efaf84039f45fd9445270048cd734bfcb6e3785af7223ee8a89a3a0d74cc5977b8368a674132d5e9c1945a6c22c8a7bef21465ef17077c81082704e43a04e481