Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-09-2024 08:41
Static task
static1
Behavioral task
behavioral1
Sample
d186db8c7e16ecab76603fae3b41bfd5_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d186db8c7e16ecab76603fae3b41bfd5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d186db8c7e16ecab76603fae3b41bfd5_JaffaCakes118.exe
-
Size
283KB
-
MD5
d186db8c7e16ecab76603fae3b41bfd5
-
SHA1
f404557e8e646f1ee0b9c1839c8a790c78b46204
-
SHA256
07a154f6f2a62768269bbc4b1e374a24f33c4db85435eb2614303116aa954095
-
SHA512
24db26bff3000d1eada540cd16682274a5a07f1decfe14709fdd8a11232f2d1e967d050fa53566cc9645cc3617d671aa8d59ffcd7a63c68167ae771b7271d8f9
-
SSDEEP
6144:y/vIitjKYKKiYkuKcuuiRahdoZ1oiAcYS+U7MyXP2R0:yHIitGPuKcniYhdoZ1gRSL7dP2
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" d186db8c7e16ecab76603fae3b41bfd5_JaffaCakes118.exe -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 2412 1A44.tmp -
Loads dropped DLL 2 IoCs
pid Process 2332 d186db8c7e16ecab76603fae3b41bfd5_JaffaCakes118.exe 2332 d186db8c7e16ecab76603fae3b41bfd5_JaffaCakes118.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2332-2-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2332-11-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2332-14-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/3036-17-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/3036-15-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2332-83-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1692-85-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1692-86-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2332-206-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2332-209-0x0000000000400000-0x000000000046C000-memory.dmp upx -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\D5E.exe = "C:\\Program Files (x86)\\LP\\327E\\D5E.exe" d186db8c7e16ecab76603fae3b41bfd5_JaffaCakes118.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\LP\327E\1A44.tmp d186db8c7e16ecab76603fae3b41bfd5_JaffaCakes118.exe File created C:\Program Files (x86)\LP\327E\D5E.exe d186db8c7e16ecab76603fae3b41bfd5_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\LP\327E\D5E.exe d186db8c7e16ecab76603fae3b41bfd5_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d186db8c7e16ecab76603fae3b41bfd5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d186db8c7e16ecab76603fae3b41bfd5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d186db8c7e16ecab76603fae3b41bfd5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1A44.tmp -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_Classes\Local Settings explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2332 d186db8c7e16ecab76603fae3b41bfd5_JaffaCakes118.exe 2332 d186db8c7e16ecab76603fae3b41bfd5_JaffaCakes118.exe 2332 d186db8c7e16ecab76603fae3b41bfd5_JaffaCakes118.exe 2332 d186db8c7e16ecab76603fae3b41bfd5_JaffaCakes118.exe 2332 d186db8c7e16ecab76603fae3b41bfd5_JaffaCakes118.exe 2332 d186db8c7e16ecab76603fae3b41bfd5_JaffaCakes118.exe 2332 d186db8c7e16ecab76603fae3b41bfd5_JaffaCakes118.exe 2332 d186db8c7e16ecab76603fae3b41bfd5_JaffaCakes118.exe 2332 d186db8c7e16ecab76603fae3b41bfd5_JaffaCakes118.exe 2332 d186db8c7e16ecab76603fae3b41bfd5_JaffaCakes118.exe 2332 d186db8c7e16ecab76603fae3b41bfd5_JaffaCakes118.exe 2332 d186db8c7e16ecab76603fae3b41bfd5_JaffaCakes118.exe 2332 d186db8c7e16ecab76603fae3b41bfd5_JaffaCakes118.exe 2332 d186db8c7e16ecab76603fae3b41bfd5_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2488 explorer.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeRestorePrivilege 1992 msiexec.exe Token: SeTakeOwnershipPrivilege 1992 msiexec.exe Token: SeSecurityPrivilege 1992 msiexec.exe Token: SeShutdownPrivilege 2488 explorer.exe Token: SeShutdownPrivilege 2488 explorer.exe Token: SeShutdownPrivilege 2488 explorer.exe Token: SeShutdownPrivilege 2488 explorer.exe Token: SeShutdownPrivilege 2488 explorer.exe Token: SeShutdownPrivilege 2488 explorer.exe Token: SeShutdownPrivilege 2488 explorer.exe Token: SeShutdownPrivilege 2488 explorer.exe Token: SeShutdownPrivilege 2488 explorer.exe Token: SeShutdownPrivilege 2488 explorer.exe Token: SeShutdownPrivilege 2488 explorer.exe Token: SeShutdownPrivilege 2488 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe -
Suspicious use of SendNotifyMessage 22 IoCs
pid Process 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2332 wrote to memory of 3036 2332 d186db8c7e16ecab76603fae3b41bfd5_JaffaCakes118.exe 31 PID 2332 wrote to memory of 3036 2332 d186db8c7e16ecab76603fae3b41bfd5_JaffaCakes118.exe 31 PID 2332 wrote to memory of 3036 2332 d186db8c7e16ecab76603fae3b41bfd5_JaffaCakes118.exe 31 PID 2332 wrote to memory of 3036 2332 d186db8c7e16ecab76603fae3b41bfd5_JaffaCakes118.exe 31 PID 2332 wrote to memory of 1692 2332 d186db8c7e16ecab76603fae3b41bfd5_JaffaCakes118.exe 34 PID 2332 wrote to memory of 1692 2332 d186db8c7e16ecab76603fae3b41bfd5_JaffaCakes118.exe 34 PID 2332 wrote to memory of 1692 2332 d186db8c7e16ecab76603fae3b41bfd5_JaffaCakes118.exe 34 PID 2332 wrote to memory of 1692 2332 d186db8c7e16ecab76603fae3b41bfd5_JaffaCakes118.exe 34 PID 2332 wrote to memory of 2412 2332 d186db8c7e16ecab76603fae3b41bfd5_JaffaCakes118.exe 37 PID 2332 wrote to memory of 2412 2332 d186db8c7e16ecab76603fae3b41bfd5_JaffaCakes118.exe 37 PID 2332 wrote to memory of 2412 2332 d186db8c7e16ecab76603fae3b41bfd5_JaffaCakes118.exe 37 PID 2332 wrote to memory of 2412 2332 d186db8c7e16ecab76603fae3b41bfd5_JaffaCakes118.exe 37 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer d186db8c7e16ecab76603fae3b41bfd5_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" d186db8c7e16ecab76603fae3b41bfd5_JaffaCakes118.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\d186db8c7e16ecab76603fae3b41bfd5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d186db8c7e16ecab76603fae3b41bfd5_JaffaCakes118.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\d186db8c7e16ecab76603fae3b41bfd5_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\d186db8c7e16ecab76603fae3b41bfd5_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\E9CCE\49232.exe%C:\Users\Admin\AppData\Roaming\E9CCE2⤵
- System Location Discovery: System Language Discovery
PID:3036
-
-
C:\Users\Admin\AppData\Local\Temp\d186db8c7e16ecab76603fae3b41bfd5_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\d186db8c7e16ecab76603fae3b41bfd5_JaffaCakes118.exe startC:\Program Files (x86)\CE374\lvvm.exe%C:\Program Files (x86)\CE3742⤵
- System Location Discovery: System Language Discovery
PID:1692
-
-
C:\Program Files (x86)\LP\327E\1A44.tmp"C:\Program Files (x86)\LP\327E\1A44.tmp"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2412
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1992
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2488
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c14969cdf825f98ba0062fd2b5f9bad4
SHA1801843dbc9d6fc63fcded39ce8ddd26b21ea7ffe
SHA256c10b74e0e191146d4850fcda65fbf86e4e189900ee2091c3a57d3c40e2a62b8b
SHA512f1d0b6959ac4eb98a7c17b9cf741407f3a67b83d827a0933a5278686aa5f0f81f4e85c45b7935732f4bd78ff50608eeac54d75c024d417e67cb78f98c8b5bc63
-
Filesize
600B
MD55a31131db14eb2823b1edf692d5b1564
SHA11cedd5cbc51c2871ecf05665c2480487412815a6
SHA256ac8ddcef3b915c2dd793e5fbce7fb945b61cbe773bdeacb9ab701a7bf6c359ff
SHA5129347d105668343e7d694faac3b6798a358d19faeb345047f47ac110c02f3ac335f6983c25042d0138956f2fd820bcf2f9093421b643408ed5f5658ff0dfd576a
-
Filesize
996B
MD56e13bc753d6e155e9c9bbce7e2d88822
SHA1ec5fb5557818b75de733b0a93497c409bee8880a
SHA256bfaa6d185e70c8ba9b4728ca515b873d18d4023c57004eb5e6669a00542556f0
SHA512ad7596638459c95880a8d714c6d20a918c071ddd723428e5d96c7760d6e5b2bbab8a3d900d20daf6e72259486b41447af83cc1941ac0790c268fc60b8cffb662
-
Filesize
99KB
MD59d83b6d4629b9d0e96bbdb171b0dc5db
SHA1e9bed14c44fe554e0e8385096bbacca494da30b1
SHA256d3a6060ff059a7724a483d82025a9231a61143839b633a6d3842a58ccb5a7d7d
SHA512301187bdcab5ca9942b2c7b7114e37e53e58b5661eef50c389622950d7691993a29f5a825132cf499ca73cdb6637d3f58afdc024cb04fac2b8e01f752209572c