Analysis
-
max time kernel
146s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 17:30
Static task
static1
Behavioral task
behavioral1
Sample
d6caf3179dc94ffd1052f2a526390db6_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
d6caf3179dc94ffd1052f2a526390db6_JaffaCakes118.exe
-
Size
11.4MB
-
MD5
d6caf3179dc94ffd1052f2a526390db6
-
SHA1
9c53c8bffcbbbe02fef88144d3fde1b8570695e1
-
SHA256
cfb6fb3812e6bfd9011254c6c40d030ff98cd80e72be1e98836d8da055525ea5
-
SHA512
d597e90035a9054cd0233bff5c18025e48fcad490b577c493f3a5d6bf8cc462511ae19417c2637851ba4e0435beb0cec028c2d5ba99676e99392c1d3c77e2b82
-
SSDEEP
196608:UTwx42RPPBdebEm1iWWHc1SUX6apg3ZhncrJPm59vzgO8L1vsqFRUo7t/IbsCTM9:UaRPiGWW8sUtu/Am5q91vsqFRn5AACTM
Malware Config
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 2128 4E7E.tmp 2616 56E6.tmp 2748 59A6.tmp 2640 59A6.tmp 1916 56E6.tmp 668 56E6.tmp -
Loads dropped DLL 13 IoCs
pid Process 2656 d6caf3179dc94ffd1052f2a526390db6_JaffaCakes118.exe 2128 4E7E.tmp 2128 4E7E.tmp 2616 56E6.tmp 2616 56E6.tmp 2616 56E6.tmp 2616 56E6.tmp 2616 56E6.tmp 2616 56E6.tmp 2616 56E6.tmp 2616 56E6.tmp 2616 56E6.tmp 2616 56E6.tmp -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 56E6.tmp -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\System32\GroupPolicy 56E6.tmp File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini 56E6.tmp -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\fonts\pns.ttf 56E6.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 59A6.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 59A6.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 56E6.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 56E6.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d6caf3179dc94ffd1052f2a526390db6_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4E7E.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 56E6.tmp -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main 56E6.tmp -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\chst 59A6.tmp Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\chst 59A6.tmp Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\chst 59A6.tmp -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 56E6.tmp Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 56E6.tmp -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2616 56E6.tmp Token: SeRestorePrivilege 2616 56E6.tmp Token: SeDebugPrivilege 2616 56E6.tmp -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 2616 56E6.tmp 2616 56E6.tmp 2616 56E6.tmp 2616 56E6.tmp 2616 56E6.tmp 2616 56E6.tmp 2616 56E6.tmp -
Suspicious use of SendNotifyMessage 7 IoCs
pid Process 2616 56E6.tmp 2616 56E6.tmp 2616 56E6.tmp 2616 56E6.tmp 2616 56E6.tmp 2616 56E6.tmp 2616 56E6.tmp -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2616 56E6.tmp 2616 56E6.tmp -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2656 wrote to memory of 2128 2656 d6caf3179dc94ffd1052f2a526390db6_JaffaCakes118.exe 30 PID 2656 wrote to memory of 2128 2656 d6caf3179dc94ffd1052f2a526390db6_JaffaCakes118.exe 30 PID 2656 wrote to memory of 2128 2656 d6caf3179dc94ffd1052f2a526390db6_JaffaCakes118.exe 30 PID 2656 wrote to memory of 2128 2656 d6caf3179dc94ffd1052f2a526390db6_JaffaCakes118.exe 30 PID 2128 wrote to memory of 2616 2128 4E7E.tmp 31 PID 2128 wrote to memory of 2616 2128 4E7E.tmp 31 PID 2128 wrote to memory of 2616 2128 4E7E.tmp 31 PID 2128 wrote to memory of 2616 2128 4E7E.tmp 31 PID 2128 wrote to memory of 2748 2128 4E7E.tmp 32 PID 2128 wrote to memory of 2748 2128 4E7E.tmp 32 PID 2128 wrote to memory of 2748 2128 4E7E.tmp 32 PID 2128 wrote to memory of 2748 2128 4E7E.tmp 32 PID 2616 wrote to memory of 1916 2616 56E6.tmp 38 PID 2616 wrote to memory of 1916 2616 56E6.tmp 38 PID 2616 wrote to memory of 1916 2616 56E6.tmp 38 PID 2616 wrote to memory of 1916 2616 56E6.tmp 38 PID 2616 wrote to memory of 668 2616 56E6.tmp 39 PID 2616 wrote to memory of 668 2616 56E6.tmp 39 PID 2616 wrote to memory of 668 2616 56E6.tmp 39 PID 2616 wrote to memory of 668 2616 56E6.tmp 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\d6caf3179dc94ffd1052f2a526390db6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d6caf3179dc94ffd1052f2a526390db6_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\4E7E.tmp"C:\Users\Admin\AppData\Local\Temp\4E7E.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\56E6.tmp"C:\Users\Admin\AppData\Local\Temp\56E6.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\56E6.tmp"C:\Users\Admin\AppData\Local\Temp\56E6.tmp" /test4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1916
-
-
C:\Users\Admin\AppData\Local\Temp\56E6.tmp"C:\Users\Admin\AppData\Local\Temp\56E6.tmp" /restart /util4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:668
-
-
-
C:\Users\Admin\AppData\Local\Temp\59A6.tmp"C:\Users\Admin\AppData\Local\Temp\59A6.tmp" "install"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2748
-
-
-
C:\Users\Admin\AppData\Local\Temp\59A6.tmp"C:\Users\Admin\AppData\Local\Temp\59A6.tmp" run1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2640
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e334e39c98f57fbf8e0d25509d7838c5
SHA1d3019c37044dfaf46193db69a964db6c4bf53559
SHA256ad012b3ebe9e6c49c4f19618b9999787766eca5f5e9c66c2237bee181b760ccb
SHA512e9a33d2d363a978f2cf6ae16bf18a4ef520909dd9c77ca69ac1d504506983aae3a97b9d226db4104c7be0aa557ec71d7d57d28fee625bb8cee3b7e5c94a72da1
-
Filesize
476KB
MD5e149176d0b3e6af6e657d3def670acc1
SHA1c29446dd10d5eba0334c5bd85e947cecb185910c
SHA256c64eef61dda6accfe64a7006f5e0b2d36dbc2ffc23f0d97f7300aa9070572e23
SHA5124e845389f6f9283f0eb2850f5fe8eebbceb0123c3822357bf12dcc075d3a27b8ca32aa1991c72dd06254d700e35b2448ed3a6105f61a08bfd1529f64a980d430
-
Filesize
445B
MD52297859eda6921100ccbf383a704bda6
SHA1234fae2e7e0d6b4799632193df85bb74c65cc65e
SHA25667d1ffd6fe5735ffce159764dd5a1ad3a1914a4e816c18c955bd20dc084dc120
SHA51237614902c9c2a764a36c878a0f3d4ef3714ace6ac817a84cb6cc231a9cf18bc48a67f7669a5d2344b3e20f7279692da334b16035d2e983d59303949ef049346a
-
Filesize
1.6MB
MD5cd32fe5df34966a7c464bffdcc08faeb
SHA13bdbce927a568f2ae8766e03f2de9180b7f98677
SHA256531edfa9370a6af76e3ecdb8bc846091819768ba83f10d4d63e28608f489744c
SHA51261ccb76d1c87943f8052e25e7c586aeed25b9a0a2e598226156eb4d8390192ece819f2ec7a20f61409ddce157d84b7766cd1ee20a08d579f6f67a52d5a1bd9c4
-
Filesize
2.1MB
MD596a5f6a935085ecc50302ca0d3d5967c
SHA1ba96c79ae2f82eaa1ae16f5b9db95d6effbde49c
SHA256ecf8cfb50373c76d1170246ea5c6e4a5ac2421d85e67cfdca854c13754bf67b5
SHA5120e9af7242a5e00a2d56c1264be3fbde0248240afd7ea74d8864c44b0a052a225adfb72809fe08c66be526d973e87a97fa119786853b876fbada59bbbdc4a8cb6
-
Filesize
4.8MB
MD5bc266b0ef1f0befcbd08e3d87bc6dccd
SHA13d06c1b9e149c59a877c830800410960f9371063
SHA256c23d6b72c3c49e8f4617de5b2a99726cae6fda2c037845daeb7bae751c6aee4d
SHA512ee78e9eaea66778f2cc7ad3426ab2ba22747ba5195b3fd8edb10dcf7e97ac39ed42d3f1132d439c3d9ae9f680076fb64fd8e2780181fe005387675eb90ad03d7
-
Filesize
4.4MB
MD58f4eaf6cb289666366408ccfbe6cff8a
SHA132c911a23a94d67195866dfd486670cf497e7438
SHA2567fb561c2a56abff44a013b082e532d874cb68465abae7e8805046c7e5296d7ed
SHA512dc0245bf9b0a818b473b7c70a1c475aa6977da33be2bdaab4fc5053804c8a77ef1d224ee751a565f6ac3262c1ef765920d18fb0366c1d4e79f369adb0612ee8c
-
Filesize
3.5MB
MD580801588b8817c8a1c72c1a5fccf1d4b
SHA187d3273af1df3513ff86e28be3f2b605cacd0afc
SHA2566a9ab744202003322f2f93514108534baee904bac73d7b761e7d5e9d579133da
SHA512b45c48c6efbfa49421371f828db7d3928b30d8866afd4bde397e91f6217ec024c46d96edc518a27802e6c0200f11ba6b0e2d95ac1c2be71f7fa3e6298f8f6faf
-
Filesize
49KB
MD5abee4387ab69da821ed9397cc651597d
SHA15d14f4afdbe15448bf884b528ffffab874f920a7
SHA256ac1dfd38d2fa61e28211e196cd3d754f6ccfb220e8c1beba52e54825cf615e22
SHA512e014294cb60b66bd259f4a6ce262fc9eca30a30e7674dae178dbac6132ba464120e5d1076ee81c1210a2f42f819d94373733172cef9fda77c9effb4eed53a904
-
Filesize
2.6MB
MD5ea44502931f9a8ffd0bee2a80fcba11b
SHA1de2ee149c0c3ca95412354b925606f1821015a4d
SHA25693641b283745a6235f09a2a711a6418641f0fe006e8bf660601000634c443315
SHA51273982e1aa1f8b14c004f5bbafc005229e62bb6f80793e80e672bf28aef1417a895083b70f9b2f352107e69168ca68716165f3bb77d0c8bdfafd098626c606a4f
-
Filesize
1KB
MD5c65d91b241634ec60941a497a3655cae
SHA176c7701cf132c13fe3bf5f672066ea68dc723f97
SHA256aff0146b0a2ccf1189c9dcd18ca6da295702d4da2f16acaf05b00fc637dd2033
SHA51205917f2db3ff424714eb5b6bd2bf39beebadb3ec83fcccf705483eaa4168adf4f3324059578484ef8f74f7821a148f7a3ce40e810e2300408de5be9233065a55
-
Filesize
127KB
MD5df8c626474a73ab7a8b511655597c7c4
SHA15de28f387ea88553d195d1978286d43c33231969
SHA256723091ba5a1b8e65164075516d69c00c71225c6dde61ffc32dd4047803ab42b5
SHA512c8f7d1577cb70610c40b96c835faca6b916c4924b5061351c8a67287567556b2014efb7c73cdcc4fb6533829541cd0264b8a9e428d3c572e29c06b0d96633d59
-
Filesize
1.3MB
MD5e183e9c221a01ce16167790ae7a9b20d
SHA13756b1bbfbf3989e2c8c16e2622e536a134f56cc
SHA256b8311fca06fc3c98c64dff807033ec3dddb8e06f843d6d1701e1321e7139b316
SHA51247a6dd618c14dc2278b3430638c3ed41e5e47186f2dea73d29e1aed4df361f134d9a53bca09083f68738878faa96c75c7836b20b936019c108b339a9e800ed45
-
Filesize
1.6MB
MD53f2c905efb0158221d37ab08724a901b
SHA1fd3008c4e7ca89b4e78c1cf55a7e6d6e513abad6
SHA25683a9df9bddb1269ee23ff608acf239666aed13430ca9bbe04ea526935e849c8d
SHA512dffce70c00d551f76a6b55d19e39e323f23ab3014ed1d96af86e5037658ec08da4f98103f0957240fb714adfdcd1801df2745477b60593898c23fe4e0bd455c8
-
Filesize
11.0MB
MD5bd670fcd41f77f519213dfad74496e87
SHA1ee77369da0985f2c7c863bece458b2ea60154cc8
SHA256a8c6b192ca4f2e208630d561ca88a9d5902afb050bcedbccecba0e3206eaef40
SHA512b1f055076120b51e9918c0cb2fca4943112685ec662d76a459680392dff5d3edfcc6a2576edf45ddd247b879ba5fe0b64c17ea556daa48928ef99058af85c683
-
Filesize
5.1MB
MD560257d20f671ce60bf30f39ebca42d02
SHA17d8c6e454140821b7e85d497dbc14b1d56808f17
SHA256471faea5db86fa98c6136057d3b1f12d21d71b6e65dd160a18cf15958f4b8f88
SHA512588cf87845edecf3ceafb94ba7e487dd6e143fe63c571df37e2804bb5c5cac97cf1e0a8a068a648532a9a5d5a24f470ab685e724ba56f5bb11a2dc950a20c3af
-
Filesize
2.5MB
MD55b5082358caeceaf9594071b6f758c8e
SHA1174dd5e6b192928cb98fc9a69f23012cc5bf3b08
SHA256159e684614112e5675ecb05feb09e2d78763d2ee4315ce478de55d3612bf0724
SHA512bc97f86a3b6d7d471bfb6a6d61a6c20e159a2a4904b3d49bfad0007e73cc0dd1714a7f06b3481ec7a510b9412fd8ce490db7b0da6dc69e14a852c62f08b264b1
-
Filesize
10.3MB
MD5d26a10f1d736b6f3e8950ac87e08b073
SHA152377ff734ab8ecfbc77ff3f953ac5d187dfb8fe
SHA25678b4db9798882b192bcf43f41655c8debdab5f295e7cd2429657c6022a1a7f98
SHA5121bc265b8f50dd332b58761b443faac71382d743bfdfc61e2bce1225714cb6364e40bffb2c92fa869df9e8e64efd3c52a78cc33d18011d1586d4f00bebdf3157e
-
Filesize
324KB
MD5bf9f6045d47dd87ae6d41fc7b5485506
SHA1462184bdd3c143f70ff7e9553966cb3d63b7cd12
SHA256f4cc03a26f2d13a41a86da8629b5d5c80a9ea586b6ba044e952b1972ab013440
SHA512bce57892b7cc2f44dae9eed0113530775f64e16d2846e6f08b10d76b9829e0885a94d816bf84d20ee5751ae3d3c536b6a9e6a75b4f95197d6317b032a839b605
-
Filesize
5.0MB
MD59d23e2946b37a886dd9b5ce146cdd280
SHA1ac82352e5ef3988dd53403a9552bf9c4bc5162d3
SHA2569fabfffee8ef815f6e0f34c8909597ddf360ebff061151f18365202b774ceb20
SHA512872951f7ed72422e05e5957ab7bd274fdae2fba465b3177bba4b0dd1f1c7b047d7684977f7ad51fa79dd98b30b30dc6e52eac424798c31ae0e0fe31961b682a5