Analysis

  • max time kernel
    140s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    10-09-2024 02:02

General

  • Target

    d772089c64fd321e88dba042688c2c79_JaffaCakes118.exe

  • Size

    263KB

  • MD5

    d772089c64fd321e88dba042688c2c79

  • SHA1

    f04d764228543960458ea202a98367f5ca2556d2

  • SHA256

    8d3e9dceb061652f03b0b89c6d98ad4e61e2b2fc2036163776a8c24607be9bcc

  • SHA512

    d101bb43b11364d1aaa118dc2e7bfe10d88f0411e4e27c498a8c3cbf9c349c3593349a58354c6c1f9775a187601d7581ce1525f3a307b11e350e665b5534464a

  • SSDEEP

    6144:m12GcL7LVE72xZlDS0Bo4tgoPZPomcgHwbaA61PESw:m1g7L+sTDS0i4OchVnHG61PES

Malware Config

Signatures

  • Modifies security service 2 TTPs 1 IoCs
  • Pony,Fareit

    Pony is a Remote Access Trojan application that steals information.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Disables taskbar notifications via registry modification
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 11 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 15 IoCs
  • Suspicious use of FindShellTrayWindow 28 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d772089c64fd321e88dba042688c2c79_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d772089c64fd321e88dba042688c2c79_JaffaCakes118.exe"
    1⤵
    • Modifies security service
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2972
    • C:\Users\Admin\AppData\Local\Temp\d772089c64fd321e88dba042688c2c79_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\d772089c64fd321e88dba042688c2c79_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\360CB\EC9AF.exe%C:\Users\Admin\AppData\Roaming\360CB
      2⤵
        PID:1920
      • C:\Users\Admin\AppData\Local\Temp\d772089c64fd321e88dba042688c2c79_JaffaCakes118.exe
        C:\Users\Admin\AppData\Local\Temp\d772089c64fd321e88dba042688c2c79_JaffaCakes118.exe startC:\Program Files (x86)\CB278\lvvm.exe%C:\Program Files (x86)\CB278
        2⤵
          PID:1772
        • C:\Program Files (x86)\LP\AF03\2E03.tmp
          "C:\Program Files (x86)\LP\AF03\2E03.tmp"
          2⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:592
      • C:\Windows\system32\msiexec.exe
        C:\Windows\system32\msiexec.exe /V
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1712
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Modifies registry class
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:700

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\360CB\B278.60C

        Filesize

        996B

        MD5

        464b3d3a92f9ab83b3d203d695139199

        SHA1

        0d25263a94f888af9c75feafbc46330639d3a39b

        SHA256

        3e6616a8167ac6a26fda3db228c990bb5dcf6a8e1c9382c79fb39b0751894a8b

        SHA512

        ee9e63028931e719d2e84c911e88a345d5618b4b5e513a39e8bdab3faf2e92c0af47c5217a54cf95eb2bd55c69187832317bde81ccb62cd1e13895b1d04fb653

      • C:\Users\Admin\AppData\Roaming\360CB\B278.60C

        Filesize

        600B

        MD5

        c0585f4ddd91e28a81e8dbf6f302b7a7

        SHA1

        c18ed4626a3ea228b42b6c3c436ee4a8cd653b43

        SHA256

        6ef838141aaa7484dc1966a4bb3dace270e38144599c1c60ffc471daf532d51f

        SHA512

        63ebaa081aa6c9ec5b485f311eb8e02d7e76c73b201001c6d90e97f1392544f3a275eed4c84a896cbe83d647d5aa73d9d237c5fb389c5e0cd3ff27bd47d6ea4a

      • C:\Users\Admin\AppData\Roaming\360CB\B278.60C

        Filesize

        1KB

        MD5

        327bd6ac12bd547aa7bf78f6ea27078d

        SHA1

        d8cfd3bbe53a181a9d8d949c067eb0b9d2578768

        SHA256

        09be20de0d4ab152f1d8ce5804518f7bced66f38e4104ccd52862394b6d84f51

        SHA512

        6c559c052b0be7ba0dd2fd8a3b7dcd3502e6264917385550f205878602031692fb7e070548d8c73c7ede1770d714bd28dfce130fb6603c5669362dcc563407e3

      • \Program Files (x86)\LP\AF03\2E03.tmp

        Filesize

        94KB

        MD5

        7c038627f6f9ccd7964a25dce79530f7

        SHA1

        bbb30bf608847506511832eefd3270e755428848

        SHA256

        1ce8efa02f5a3a9fe57228e06eb8a872bd47068730959d845622956df7cfb101

        SHA512

        2692241f367013ff59b9671977b6f42e51a7c130280b978cf132d457ffac4e05a512e4368f9b2c3b2cfc09636d2eb6df26761111fcab5b8320711c6d9a85687b

      • memory/592-319-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/1772-142-0x0000000000400000-0x0000000000468000-memory.dmp

        Filesize

        416KB

      • memory/1772-143-0x0000000000400000-0x0000000000468000-memory.dmp

        Filesize

        416KB

      • memory/1920-15-0x0000000000400000-0x0000000000468000-memory.dmp

        Filesize

        416KB

      • memory/1920-18-0x0000000000400000-0x0000000000468000-memory.dmp

        Filesize

        416KB

      • memory/2972-16-0x0000000000400000-0x0000000000466000-memory.dmp

        Filesize

        408KB

      • memory/2972-139-0x0000000000400000-0x0000000000468000-memory.dmp

        Filesize

        416KB

      • memory/2972-0-0x0000000000400000-0x0000000000468000-memory.dmp

        Filesize

        416KB

      • memory/2972-13-0x0000000000400000-0x0000000000468000-memory.dmp

        Filesize

        416KB

      • memory/2972-301-0x0000000000400000-0x0000000000468000-memory.dmp

        Filesize

        416KB

      • memory/2972-3-0x0000000000400000-0x0000000000468000-memory.dmp

        Filesize

        416KB

      • memory/2972-318-0x0000000000400000-0x0000000000468000-memory.dmp

        Filesize

        416KB

      • memory/2972-2-0x0000000000400000-0x0000000000466000-memory.dmp

        Filesize

        408KB

      • memory/2972-322-0x0000000000400000-0x0000000000468000-memory.dmp

        Filesize

        416KB