Analysis
-
max time kernel
140s -
max time network
96s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-09-2024 04:54
Static task
static1
Behavioral task
behavioral1
Sample
d79ce7a4383a22b42527e4e3271663cb_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d79ce7a4383a22b42527e4e3271663cb_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d79ce7a4383a22b42527e4e3271663cb_JaffaCakes118.exe
-
Size
265KB
-
MD5
d79ce7a4383a22b42527e4e3271663cb
-
SHA1
6435b07c4c203dabd75c993b27cd2616f0ade7c9
-
SHA256
6f45cb68bb37d81e2118468233bca43cfe92add46d8595ef34f55102b07fe2cc
-
SHA512
702bac42993a474ad949375c9f79a6ee0ee5fe0f1ad042d0016ab6c9fb23ab2e2ef739cb86395f2d0be086700f54402517fcbad35de755d5b3d45e76872bc2da
-
SSDEEP
6144:TTp+zLPpMCXYpUwVtyVVGqkibrcav/DBxYNWTjCPSfl:hyLPp5I1+1kOrcasNWTjCPU
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" d79ce7a4383a22b42527e4e3271663cb_JaffaCakes118.exe -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 2924 9D1A.tmp -
Loads dropped DLL 2 IoCs
pid Process 1288 d79ce7a4383a22b42527e4e3271663cb_JaffaCakes118.exe 1288 d79ce7a4383a22b42527e4e3271663cb_JaffaCakes118.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1288-3-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1288-4-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1288-50-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1288-51-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2472-54-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/920-174-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1288-237-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1288-361-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1288-366-0x0000000000400000-0x000000000046A000-memory.dmp upx -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\828.exe = "C:\\Program Files (x86)\\LP\\3DDA\\828.exe" d79ce7a4383a22b42527e4e3271663cb_JaffaCakes118.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\LP\3DDA\828.exe d79ce7a4383a22b42527e4e3271663cb_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\LP\3DDA\828.exe d79ce7a4383a22b42527e4e3271663cb_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\LP\3DDA\9D1A.tmp d79ce7a4383a22b42527e4e3271663cb_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d79ce7a4383a22b42527e4e3271663cb_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d79ce7a4383a22b42527e4e3271663cb_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d79ce7a4383a22b42527e4e3271663cb_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D1A.tmp -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1288 d79ce7a4383a22b42527e4e3271663cb_JaffaCakes118.exe 1288 d79ce7a4383a22b42527e4e3271663cb_JaffaCakes118.exe 1288 d79ce7a4383a22b42527e4e3271663cb_JaffaCakes118.exe 1288 d79ce7a4383a22b42527e4e3271663cb_JaffaCakes118.exe 1288 d79ce7a4383a22b42527e4e3271663cb_JaffaCakes118.exe 1288 d79ce7a4383a22b42527e4e3271663cb_JaffaCakes118.exe 1288 d79ce7a4383a22b42527e4e3271663cb_JaffaCakes118.exe 1288 d79ce7a4383a22b42527e4e3271663cb_JaffaCakes118.exe 1288 d79ce7a4383a22b42527e4e3271663cb_JaffaCakes118.exe 1288 d79ce7a4383a22b42527e4e3271663cb_JaffaCakes118.exe 1288 d79ce7a4383a22b42527e4e3271663cb_JaffaCakes118.exe 1288 d79ce7a4383a22b42527e4e3271663cb_JaffaCakes118.exe 1288 d79ce7a4383a22b42527e4e3271663cb_JaffaCakes118.exe 1288 d79ce7a4383a22b42527e4e3271663cb_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2120 explorer.exe -
Suspicious use of AdjustPrivilegeToken 19 IoCs
description pid Process Token: SeRestorePrivilege 2836 msiexec.exe Token: SeTakeOwnershipPrivilege 2836 msiexec.exe Token: SeSecurityPrivilege 2836 msiexec.exe Token: SeShutdownPrivilege 2120 explorer.exe Token: SeShutdownPrivilege 2120 explorer.exe Token: SeShutdownPrivilege 2120 explorer.exe Token: SeShutdownPrivilege 2120 explorer.exe Token: SeShutdownPrivilege 2120 explorer.exe Token: SeShutdownPrivilege 2120 explorer.exe Token: SeShutdownPrivilege 2120 explorer.exe Token: SeShutdownPrivilege 2120 explorer.exe Token: SeShutdownPrivilege 2120 explorer.exe Token: SeShutdownPrivilege 2120 explorer.exe Token: 33 1120 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1120 AUDIODG.EXE Token: 33 1120 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1120 AUDIODG.EXE Token: SeShutdownPrivilege 2120 explorer.exe Token: SeShutdownPrivilege 2120 explorer.exe -
Suspicious use of FindShellTrayWindow 29 IoCs
pid Process 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe -
Suspicious use of SendNotifyMessage 19 IoCs
pid Process 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1288 wrote to memory of 2472 1288 d79ce7a4383a22b42527e4e3271663cb_JaffaCakes118.exe 30 PID 1288 wrote to memory of 2472 1288 d79ce7a4383a22b42527e4e3271663cb_JaffaCakes118.exe 30 PID 1288 wrote to memory of 2472 1288 d79ce7a4383a22b42527e4e3271663cb_JaffaCakes118.exe 30 PID 1288 wrote to memory of 2472 1288 d79ce7a4383a22b42527e4e3271663cb_JaffaCakes118.exe 30 PID 1288 wrote to memory of 920 1288 d79ce7a4383a22b42527e4e3271663cb_JaffaCakes118.exe 32 PID 1288 wrote to memory of 920 1288 d79ce7a4383a22b42527e4e3271663cb_JaffaCakes118.exe 32 PID 1288 wrote to memory of 920 1288 d79ce7a4383a22b42527e4e3271663cb_JaffaCakes118.exe 32 PID 1288 wrote to memory of 920 1288 d79ce7a4383a22b42527e4e3271663cb_JaffaCakes118.exe 32 PID 1288 wrote to memory of 2924 1288 d79ce7a4383a22b42527e4e3271663cb_JaffaCakes118.exe 36 PID 1288 wrote to memory of 2924 1288 d79ce7a4383a22b42527e4e3271663cb_JaffaCakes118.exe 36 PID 1288 wrote to memory of 2924 1288 d79ce7a4383a22b42527e4e3271663cb_JaffaCakes118.exe 36 PID 1288 wrote to memory of 2924 1288 d79ce7a4383a22b42527e4e3271663cb_JaffaCakes118.exe 36 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer d79ce7a4383a22b42527e4e3271663cb_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" d79ce7a4383a22b42527e4e3271663cb_JaffaCakes118.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\d79ce7a4383a22b42527e4e3271663cb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d79ce7a4383a22b42527e4e3271663cb_JaffaCakes118.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1288 -
C:\Users\Admin\AppData\Local\Temp\d79ce7a4383a22b42527e4e3271663cb_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\d79ce7a4383a22b42527e4e3271663cb_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\A4BCC\AB23D.exe%C:\Users\Admin\AppData\Roaming\A4BCC2⤵
- System Location Discovery: System Language Discovery
PID:2472
-
-
C:\Users\Admin\AppData\Local\Temp\d79ce7a4383a22b42527e4e3271663cb_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\d79ce7a4383a22b42527e4e3271663cb_JaffaCakes118.exe startC:\Program Files (x86)\CCC13\lvvm.exe%C:\Program Files (x86)\CCC132⤵
- System Location Discovery: System Language Discovery
PID:920
-
-
C:\Program Files (x86)\LP\3DDA\9D1A.tmp"C:\Program Files (x86)\LP\3DDA\9D1A.tmp"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2924
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2836
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2120
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5a01⤵
- Suspicious use of AdjustPrivilegeToken
PID:1120
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
300B
MD5c542190da3e7cc1f82e13f973ef86891
SHA1af9380e0e37628725c5dbe529583f4c10fb3a9ac
SHA2568ca41aadf2f38755fb050d8e5578b960a9d85294d1b5549de4bf90775c3bcfc4
SHA5122597b5c8f2ad9b98ec3ad6c1d48ed4b02af923d237c9eb705e8d425bb610bbd3ecbf225d4af6cf2c3b20860630470a0e679f4dad191490bced07888794b8b76a
-
Filesize
996B
MD50bf94e6a4053327fc56ee61cab7860c4
SHA18b85494eed32cf4f8398e93ebafc186ec9ff8a83
SHA25606f5fb3c1b4ce48b619d4f40b8b3cd8b82f0b5bcd001fa5ed2155191b98c7d29
SHA512660769fe5ad697a9568edf1f42ea5521bc4f491ff5240b8b9b0cf06c748e77b6010435f16bf3646d82d54f11daef56765730838c441c9f52ba870ec68f28e92a
-
Filesize
1KB
MD522bc2533f8eea443303b1fe02593c787
SHA159dfc94e103ec3c971da59ab0d95733d9cfa8ad4
SHA256be4b36ea719ab3d46fe200b154fbd01ef9a62187d08e437ad452dccbf9471602
SHA5124c083ffcfe4bef36ba64801f31f89997ad7335435bbd2265b46ab0de4ab291eff5d790adc4fd2a8957cab6ab98f08d71052d15167a8261306587f66e9c40d76a
-
Filesize
600B
MD5f4966d006ee2a01349b321e71b24a3a7
SHA19a5de73139b191d8403917835d44c0e8841ef65d
SHA2563b25aa949b36b7c6640733c981a9afbd226ae73a8e4fee7f4a21049230fa1929
SHA512792a3699b4fbf736c1be101d027e18a6fa74cbf2ebafe1b60e231dc82901b65cb3d46266d22ac9241ec78581f8e7a1f1c55d5252f1c636f067f0c58756a3f9f3
-
Filesize
96KB
MD5080cae9ef700f641fc28c7907a5f6b0e
SHA1bbc8e5bcc20c05a189c0c889da7c47ba914448b3
SHA256d15cc7e649cb202989b47709830c6ec7764a4cf6ec41bec408adc2c58474a7a9
SHA51283e452cc41b276ea19a7882d10cbda80216cffd9c68de34571bc03eff6aaaf48fecf242083fdfb2d0af7543a779a894698168f7c2fde49910ba27da8c0bd8d76