Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
07-09-2024 09:32
Static task
static1
Behavioral task
behavioral1
Sample
d19f0fdeb4e6aab014d6d1ca247a256f_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d19f0fdeb4e6aab014d6d1ca247a256f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d19f0fdeb4e6aab014d6d1ca247a256f_JaffaCakes118.exe
-
Size
279KB
-
MD5
d19f0fdeb4e6aab014d6d1ca247a256f
-
SHA1
ee32e373a7f97dd6a06dced860971566a6f173ce
-
SHA256
a28d071ab55fa86bea99598749768fb8af37d0c75669c1d9b108eccea3633c87
-
SHA512
1cba15f7e8712aac08cd3b12992cbcf908c7a89489185a2e99048e1034c057f0776e2a1f199dfcf83117c75b6d25ce01cf90d170b268f566ba69c4fed48bd473
-
SSDEEP
6144:2RBSCIYJXQU/qaNr1gyL0bwPcJSJJ+WTO:2R5IgX//qmr1gTbsJB
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" d19f0fdeb4e6aab014d6d1ca247a256f_JaffaCakes118.exe -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 2712 386E.tmp -
Loads dropped DLL 2 IoCs
pid Process 2584 d19f0fdeb4e6aab014d6d1ca247a256f_JaffaCakes118.exe 2584 d19f0fdeb4e6aab014d6d1ca247a256f_JaffaCakes118.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2584-2-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2584-11-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1116-15-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1116-16-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1116-14-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2584-13-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2584-103-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2664-105-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2584-181-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2584-185-0x0000000000400000-0x000000000046B000-memory.dmp upx -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\661.exe = "C:\\Program Files (x86)\\LP\\B4A3\\661.exe" d19f0fdeb4e6aab014d6d1ca247a256f_JaffaCakes118.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\LP\B4A3\661.exe d19f0fdeb4e6aab014d6d1ca247a256f_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\LP\B4A3\386E.tmp d19f0fdeb4e6aab014d6d1ca247a256f_JaffaCakes118.exe File created C:\Program Files (x86)\LP\B4A3\661.exe d19f0fdeb4e6aab014d6d1ca247a256f_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d19f0fdeb4e6aab014d6d1ca247a256f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d19f0fdeb4e6aab014d6d1ca247a256f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d19f0fdeb4e6aab014d6d1ca247a256f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 386E.tmp -
Modifies registry class 5 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2584 d19f0fdeb4e6aab014d6d1ca247a256f_JaffaCakes118.exe 2584 d19f0fdeb4e6aab014d6d1ca247a256f_JaffaCakes118.exe 2584 d19f0fdeb4e6aab014d6d1ca247a256f_JaffaCakes118.exe 2584 d19f0fdeb4e6aab014d6d1ca247a256f_JaffaCakes118.exe 2584 d19f0fdeb4e6aab014d6d1ca247a256f_JaffaCakes118.exe 2584 d19f0fdeb4e6aab014d6d1ca247a256f_JaffaCakes118.exe 2584 d19f0fdeb4e6aab014d6d1ca247a256f_JaffaCakes118.exe 2584 d19f0fdeb4e6aab014d6d1ca247a256f_JaffaCakes118.exe 2584 d19f0fdeb4e6aab014d6d1ca247a256f_JaffaCakes118.exe 2584 d19f0fdeb4e6aab014d6d1ca247a256f_JaffaCakes118.exe 2584 d19f0fdeb4e6aab014d6d1ca247a256f_JaffaCakes118.exe 2584 d19f0fdeb4e6aab014d6d1ca247a256f_JaffaCakes118.exe 2584 d19f0fdeb4e6aab014d6d1ca247a256f_JaffaCakes118.exe 2584 d19f0fdeb4e6aab014d6d1ca247a256f_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2228 explorer.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeRestorePrivilege 2400 msiexec.exe Token: SeTakeOwnershipPrivilege 2400 msiexec.exe Token: SeSecurityPrivilege 2400 msiexec.exe Token: SeShutdownPrivilege 2228 explorer.exe Token: SeShutdownPrivilege 2228 explorer.exe Token: SeShutdownPrivilege 2228 explorer.exe Token: SeShutdownPrivilege 2228 explorer.exe Token: SeShutdownPrivilege 2228 explorer.exe Token: SeShutdownPrivilege 2228 explorer.exe Token: SeShutdownPrivilege 2228 explorer.exe Token: SeShutdownPrivilege 2228 explorer.exe Token: SeShutdownPrivilege 2228 explorer.exe Token: SeShutdownPrivilege 2228 explorer.exe Token: SeShutdownPrivilege 2228 explorer.exe Token: SeShutdownPrivilege 2228 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 2228 explorer.exe 2228 explorer.exe 2228 explorer.exe 2228 explorer.exe 2228 explorer.exe 2228 explorer.exe 2228 explorer.exe 2228 explorer.exe 2228 explorer.exe 2228 explorer.exe 2228 explorer.exe 2228 explorer.exe 2228 explorer.exe 2228 explorer.exe 2228 explorer.exe 2228 explorer.exe 2228 explorer.exe 2228 explorer.exe 2228 explorer.exe 2228 explorer.exe 2228 explorer.exe 2228 explorer.exe 2228 explorer.exe 2228 explorer.exe 2228 explorer.exe 2228 explorer.exe 2228 explorer.exe 2228 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 2228 explorer.exe 2228 explorer.exe 2228 explorer.exe 2228 explorer.exe 2228 explorer.exe 2228 explorer.exe 2228 explorer.exe 2228 explorer.exe 2228 explorer.exe 2228 explorer.exe 2228 explorer.exe 2228 explorer.exe 2228 explorer.exe 2228 explorer.exe 2228 explorer.exe 2228 explorer.exe 2228 explorer.exe 2228 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2584 wrote to memory of 1116 2584 d19f0fdeb4e6aab014d6d1ca247a256f_JaffaCakes118.exe 31 PID 2584 wrote to memory of 1116 2584 d19f0fdeb4e6aab014d6d1ca247a256f_JaffaCakes118.exe 31 PID 2584 wrote to memory of 1116 2584 d19f0fdeb4e6aab014d6d1ca247a256f_JaffaCakes118.exe 31 PID 2584 wrote to memory of 1116 2584 d19f0fdeb4e6aab014d6d1ca247a256f_JaffaCakes118.exe 31 PID 2584 wrote to memory of 2664 2584 d19f0fdeb4e6aab014d6d1ca247a256f_JaffaCakes118.exe 36 PID 2584 wrote to memory of 2664 2584 d19f0fdeb4e6aab014d6d1ca247a256f_JaffaCakes118.exe 36 PID 2584 wrote to memory of 2664 2584 d19f0fdeb4e6aab014d6d1ca247a256f_JaffaCakes118.exe 36 PID 2584 wrote to memory of 2664 2584 d19f0fdeb4e6aab014d6d1ca247a256f_JaffaCakes118.exe 36 PID 2584 wrote to memory of 2712 2584 d19f0fdeb4e6aab014d6d1ca247a256f_JaffaCakes118.exe 37 PID 2584 wrote to memory of 2712 2584 d19f0fdeb4e6aab014d6d1ca247a256f_JaffaCakes118.exe 37 PID 2584 wrote to memory of 2712 2584 d19f0fdeb4e6aab014d6d1ca247a256f_JaffaCakes118.exe 37 PID 2584 wrote to memory of 2712 2584 d19f0fdeb4e6aab014d6d1ca247a256f_JaffaCakes118.exe 37 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer d19f0fdeb4e6aab014d6d1ca247a256f_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" d19f0fdeb4e6aab014d6d1ca247a256f_JaffaCakes118.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\d19f0fdeb4e6aab014d6d1ca247a256f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d19f0fdeb4e6aab014d6d1ca247a256f_JaffaCakes118.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\d19f0fdeb4e6aab014d6d1ca247a256f_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\d19f0fdeb4e6aab014d6d1ca247a256f_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\3E548\693B4.exe%C:\Users\Admin\AppData\Roaming\3E5482⤵
- System Location Discovery: System Language Discovery
PID:1116
-
-
C:\Users\Admin\AppData\Local\Temp\d19f0fdeb4e6aab014d6d1ca247a256f_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\d19f0fdeb4e6aab014d6d1ca247a256f_JaffaCakes118.exe startC:\Program Files (x86)\4871F\lvvm.exe%C:\Program Files (x86)\4871F2⤵
- System Location Discovery: System Language Discovery
PID:2664
-
-
C:\Program Files (x86)\LP\B4A3\386E.tmp"C:\Program Files (x86)\LP\B4A3\386E.tmp"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2712
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2400
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2228
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD50f66c7340a3da9bc4e9daacc711c8e70
SHA142220d11b868c16c7f45deb4fc0cb10d8c44f1d3
SHA25634b04ee6b74bc43b51bde0bde991a3801d70424f3191bdf8e189bc0f204fa269
SHA51280623d09b966caad831144ad0e02c7a773806360d153382ebbc664f54938c947ccd27efb750f2275e8844c0a98b278c0b8efa0e5221d9bd69290ad005cde3e50
-
Filesize
1KB
MD59f124fb47f78970ae9c26d02d76e68a1
SHA1eee477accbe5b1d52728179cc849524883859a61
SHA2561d1438f4a7e784d9f56d9a33ccf3d8cac0e9764300fe0d2b256292d198204057
SHA512610c61c5dc56f83534c59fb66c89e2cf9a29547de2c9765155c85471d23583817255158886860d42d35eee7f38dd5d352d4faad4ce967625f8ee747a2217c641
-
Filesize
1KB
MD57c0d534fc6fae7a1eac08269a3850dfb
SHA19a349b0616fb23cfa2e7b8154beeb2b390884456
SHA25681bf6050f34c5745285c41c6dec7b18d669afa8c320b64cc6206119536468a66
SHA5128b3d5c4b05af354e17381417ee0254e9ef60c8663bb1f572473daa073ef3904679a927364c2777340f628a12f13e657232e94175c2b5706bfbf96c64f12b4cc3
-
Filesize
600B
MD53b6987b8c3a5dea1ad0b52c1aac900f3
SHA1b665b2b93b8842f6e2ccc91a83b8f28111e1eae7
SHA2565f7b3b87f438ea33a4e0b68f59ac019c78efc393907b818c52e298d008120ce3
SHA5125672f79d176ca5be7c486bb209d20239be9a86e833e51cb5f781e2a67cbf7e86d8f493152fbdacdf22464683c607f7b5d58cd6049dcb0ebfdae669360ff9cd6c
-
Filesize
100KB
MD54c04ec47c44bc997519e18ce5f20e9d6
SHA1680968fe85eaa19ac68b8dabf3371dd81684ed83
SHA256446ddf0822deef56cedbfa0910143c744835ed765d128408d9ea994a569581a2
SHA512e33e959e25d09152c1f64d60a7733f7c7a1dfd9f0bee6ed1f8aa18cf5e5248442e365d211c4555e0723b4e23e97c0a99d43b8fe6538cc9c77f0d39fd73616279