Analysis
-
max time kernel
141s -
max time network
105s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-09-2024 10:56
Static task
static1
Behavioral task
behavioral1
Sample
d4329adef138da6c0d2a56b79f436762_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d4329adef138da6c0d2a56b79f436762_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d4329adef138da6c0d2a56b79f436762_JaffaCakes118.exe
-
Size
270KB
-
MD5
d4329adef138da6c0d2a56b79f436762
-
SHA1
f5919faa5310c9e766df724f2f6179209b090849
-
SHA256
32be5c71903c6267907abb4497d5bcd8895032c5ff01a9518bdcf2ccd079968c
-
SHA512
3b124e0ef411d411ed2dfe525ce3345d70246469b0a825d61b9bd96a9db14f30d0170fb930c81702913efdbc24d05a895811afdfb7772892a81d86c00e44857d
-
SSDEEP
6144:9Q35nVV8A85nSfKipSV1LCY+ZD/tAXPbOGEGGkLyes:9s5nVL85S3i5cD4PKGEG7yes
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" d4329adef138da6c0d2a56b79f436762_JaffaCakes118.exe -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 1844 F69E.tmp -
Loads dropped DLL 2 IoCs
pid Process 2140 d4329adef138da6c0d2a56b79f436762_JaffaCakes118.exe 2140 d4329adef138da6c0d2a56b79f436762_JaffaCakes118.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2140-2-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2140-3-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2140-4-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2140-14-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2900-17-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2900-15-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2140-113-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1872-115-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2140-185-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2140-199-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2140-203-0x0000000000400000-0x000000000046B000-memory.dmp upx -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\18D.exe = "C:\\Program Files (x86)\\LP\\D054\\18D.exe" d4329adef138da6c0d2a56b79f436762_JaffaCakes118.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\LP\D054\18D.exe d4329adef138da6c0d2a56b79f436762_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\LP\D054\F69E.tmp d4329adef138da6c0d2a56b79f436762_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\LP\D054\18D.exe d4329adef138da6c0d2a56b79f436762_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d4329adef138da6c0d2a56b79f436762_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d4329adef138da6c0d2a56b79f436762_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d4329adef138da6c0d2a56b79f436762_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F69E.tmp -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2140 d4329adef138da6c0d2a56b79f436762_JaffaCakes118.exe 2140 d4329adef138da6c0d2a56b79f436762_JaffaCakes118.exe 2140 d4329adef138da6c0d2a56b79f436762_JaffaCakes118.exe 2140 d4329adef138da6c0d2a56b79f436762_JaffaCakes118.exe 2140 d4329adef138da6c0d2a56b79f436762_JaffaCakes118.exe 2140 d4329adef138da6c0d2a56b79f436762_JaffaCakes118.exe 2140 d4329adef138da6c0d2a56b79f436762_JaffaCakes118.exe 2140 d4329adef138da6c0d2a56b79f436762_JaffaCakes118.exe 2140 d4329adef138da6c0d2a56b79f436762_JaffaCakes118.exe 2140 d4329adef138da6c0d2a56b79f436762_JaffaCakes118.exe 2140 d4329adef138da6c0d2a56b79f436762_JaffaCakes118.exe 2140 d4329adef138da6c0d2a56b79f436762_JaffaCakes118.exe 2140 d4329adef138da6c0d2a56b79f436762_JaffaCakes118.exe 2140 d4329adef138da6c0d2a56b79f436762_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1760 explorer.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeRestorePrivilege 2712 msiexec.exe Token: SeTakeOwnershipPrivilege 2712 msiexec.exe Token: SeSecurityPrivilege 2712 msiexec.exe Token: SeShutdownPrivilege 1760 explorer.exe Token: SeShutdownPrivilege 1760 explorer.exe Token: SeShutdownPrivilege 1760 explorer.exe Token: SeShutdownPrivilege 1760 explorer.exe Token: SeShutdownPrivilege 1760 explorer.exe Token: SeShutdownPrivilege 1760 explorer.exe Token: SeShutdownPrivilege 1760 explorer.exe Token: SeShutdownPrivilege 1760 explorer.exe Token: SeShutdownPrivilege 1760 explorer.exe Token: SeShutdownPrivilege 1760 explorer.exe Token: SeShutdownPrivilege 1760 explorer.exe Token: SeShutdownPrivilege 1760 explorer.exe -
Suspicious use of FindShellTrayWindow 29 IoCs
pid Process 1760 explorer.exe 1760 explorer.exe 1760 explorer.exe 1760 explorer.exe 1760 explorer.exe 1760 explorer.exe 1760 explorer.exe 1760 explorer.exe 1760 explorer.exe 1760 explorer.exe 1760 explorer.exe 1760 explorer.exe 1760 explorer.exe 1760 explorer.exe 1760 explorer.exe 1760 explorer.exe 1760 explorer.exe 1760 explorer.exe 1760 explorer.exe 1760 explorer.exe 1760 explorer.exe 1760 explorer.exe 1760 explorer.exe 1760 explorer.exe 1760 explorer.exe 1760 explorer.exe 1760 explorer.exe 1760 explorer.exe 1760 explorer.exe -
Suspicious use of SendNotifyMessage 19 IoCs
pid Process 1760 explorer.exe 1760 explorer.exe 1760 explorer.exe 1760 explorer.exe 1760 explorer.exe 1760 explorer.exe 1760 explorer.exe 1760 explorer.exe 1760 explorer.exe 1760 explorer.exe 1760 explorer.exe 1760 explorer.exe 1760 explorer.exe 1760 explorer.exe 1760 explorer.exe 1760 explorer.exe 1760 explorer.exe 1760 explorer.exe 1760 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2140 wrote to memory of 2900 2140 d4329adef138da6c0d2a56b79f436762_JaffaCakes118.exe 31 PID 2140 wrote to memory of 2900 2140 d4329adef138da6c0d2a56b79f436762_JaffaCakes118.exe 31 PID 2140 wrote to memory of 2900 2140 d4329adef138da6c0d2a56b79f436762_JaffaCakes118.exe 31 PID 2140 wrote to memory of 2900 2140 d4329adef138da6c0d2a56b79f436762_JaffaCakes118.exe 31 PID 2140 wrote to memory of 1872 2140 d4329adef138da6c0d2a56b79f436762_JaffaCakes118.exe 35 PID 2140 wrote to memory of 1872 2140 d4329adef138da6c0d2a56b79f436762_JaffaCakes118.exe 35 PID 2140 wrote to memory of 1872 2140 d4329adef138da6c0d2a56b79f436762_JaffaCakes118.exe 35 PID 2140 wrote to memory of 1872 2140 d4329adef138da6c0d2a56b79f436762_JaffaCakes118.exe 35 PID 2140 wrote to memory of 1844 2140 d4329adef138da6c0d2a56b79f436762_JaffaCakes118.exe 36 PID 2140 wrote to memory of 1844 2140 d4329adef138da6c0d2a56b79f436762_JaffaCakes118.exe 36 PID 2140 wrote to memory of 1844 2140 d4329adef138da6c0d2a56b79f436762_JaffaCakes118.exe 36 PID 2140 wrote to memory of 1844 2140 d4329adef138da6c0d2a56b79f436762_JaffaCakes118.exe 36 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer d4329adef138da6c0d2a56b79f436762_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" d4329adef138da6c0d2a56b79f436762_JaffaCakes118.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\d4329adef138da6c0d2a56b79f436762_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d4329adef138da6c0d2a56b79f436762_JaffaCakes118.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2140 -
C:\Users\Admin\AppData\Local\Temp\d4329adef138da6c0d2a56b79f436762_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\d4329adef138da6c0d2a56b79f436762_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\4E3BA\D97D0.exe%C:\Users\Admin\AppData\Roaming\4E3BA2⤵
- System Location Discovery: System Language Discovery
PID:2900
-
-
C:\Users\Admin\AppData\Local\Temp\d4329adef138da6c0d2a56b79f436762_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\d4329adef138da6c0d2a56b79f436762_JaffaCakes118.exe startC:\Program Files (x86)\BAF7B\lvvm.exe%C:\Program Files (x86)\BAF7B2⤵
- System Location Discovery: System Language Discovery
PID:1872
-
-
C:\Program Files (x86)\LP\D054\F69E.tmp"C:\Program Files (x86)\LP\D054\F69E.tmp"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1844
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2712
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1760
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
300B
MD52244f74198eb1342184739dae54cbc67
SHA12beb6633e89589fd01d63d28a0f14145621ec8be
SHA256f51d5bd43a913e6abd0ad124837e64eaaf67a6b414a23e6b2e80aa9244940188
SHA5128f061697d2e4f37359deec0c5b8983eb026c22b47e1a935bd107049fd4be34bebc6f84f61a3a583fb3d1fc54a8acef19b852c2d0d76b4ddc59e2572bba5cdc96
-
Filesize
996B
MD5cf31a8c7b0c17e200e40dc27b51c0d3d
SHA1c3e2a8813732f52b7ab311b55aa7333ddd090c42
SHA256c004fe4d81c08174684e5a180af4dcbb3446f01461ccde83892df289420ea454
SHA51289cdc9c8f1bb19a19702f1d256fa29e281e8ee2096db5f5833dac913508d61fb60b470ae75c342226f087371d2e6a6524cc9fa7e603de8082ad49bd4b2431133
-
Filesize
1KB
MD59284df8435e9ea134c1c46f50eb05147
SHA1dc27a39adcc06af1ed93a0d324bcd735f984bb3e
SHA2561f5257937c0302016089992f6b4b23f6f8efece604fe927ebc5bf52aae899969
SHA5126323c51866c0e1c4875c825f6078155bcc446a415032f6ec4dd9ac1c1abb7dbd86d9e48f9ef0e451f655a2a60293d469db27938397169b8f51b68269603a0686
-
Filesize
600B
MD5962373dfc7fe004350fdd24a0d19740e
SHA14275c6df0233efd8a6ed722747e74d9164125ef7
SHA256116c5fc33de91f769d9c6e206187da501bae888cdeaa20672f8131e13ac77336
SHA512c004530c12a4c3f2f5fab6a06c76ffde984a1f6c6ccef845e2b21e818cf0a2e5d7bde5477eb3d0ed2fe1b45b8e7b61abd9e10bd3f147a5f208f6b70eeacbd615
-
Filesize
97KB
MD5a69098e93aa9728af7d31557da4b81a8
SHA1ef052203a8a2a07923ff8a90cff00e4321081cc9
SHA256468913e46d25b2cc68932aad1a4e080edb3fe2ee76eddc4a9de8c43b70bbbace
SHA51277a2bacd17636ca85c7dd9c014d40ede7e3956fb2a2c09d040e270bda8c350f85dc16874e7c4b505df8df3959b855e8b7e3db097e539f431af22815910d55d46