Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
11-09-2024 01:51
Static task
static1
Behavioral task
behavioral1
Sample
d9661054ea9d4d7f7169a5e32ba68822_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d9661054ea9d4d7f7169a5e32ba68822_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d9661054ea9d4d7f7169a5e32ba68822_JaffaCakes118.exe
-
Size
278KB
-
MD5
d9661054ea9d4d7f7169a5e32ba68822
-
SHA1
92c469afbc37b46afb9da836cf56fb22e641f8c5
-
SHA256
d806df6405ee274aca0b653a3e55e605fc39cff0dabc4bc3f2241217065b2cef
-
SHA512
b3c0da7738b0a9fb4be3a6537c9c13486dc251a8c65d1e79ac316a7b5d674843ff9501afd9f3ca2fd1edb4f2f17fab18e4e5a3eb93b313d2d70b7c2b47fafade
-
SSDEEP
6144:cWADCDvlryv64mSmW6yI6eOoq5UO1jQqRcm29I2oeVunDWAs:cVQrS9mZ3X6VoOUOXZ29srDW
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" d9661054ea9d4d7f7169a5e32ba68822_JaffaCakes118.exe -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 2192 B1A3.tmp -
Loads dropped DLL 2 IoCs
pid Process 1884 d9661054ea9d4d7f7169a5e32ba68822_JaffaCakes118.exe 1884 d9661054ea9d4d7f7169a5e32ba68822_JaffaCakes118.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1884-2-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1884-11-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2612-15-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2612-17-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1884-14-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral1/memory/1884-81-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2968-83-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1884-196-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1884-200-0x0000000000400000-0x000000000046A000-memory.dmp upx -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\BA3.exe = "C:\\Program Files (x86)\\LP\\77F1\\BA3.exe" d9661054ea9d4d7f7169a5e32ba68822_JaffaCakes118.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\LP\77F1\BA3.exe d9661054ea9d4d7f7169a5e32ba68822_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\LP\77F1\BA3.exe d9661054ea9d4d7f7169a5e32ba68822_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\LP\77F1\B1A3.tmp d9661054ea9d4d7f7169a5e32ba68822_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d9661054ea9d4d7f7169a5e32ba68822_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d9661054ea9d4d7f7169a5e32ba68822_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d9661054ea9d4d7f7169a5e32ba68822_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language B1A3.tmp -
Modifies registry class 5 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1884 d9661054ea9d4d7f7169a5e32ba68822_JaffaCakes118.exe 1884 d9661054ea9d4d7f7169a5e32ba68822_JaffaCakes118.exe 1884 d9661054ea9d4d7f7169a5e32ba68822_JaffaCakes118.exe 1884 d9661054ea9d4d7f7169a5e32ba68822_JaffaCakes118.exe 1884 d9661054ea9d4d7f7169a5e32ba68822_JaffaCakes118.exe 1884 d9661054ea9d4d7f7169a5e32ba68822_JaffaCakes118.exe 1884 d9661054ea9d4d7f7169a5e32ba68822_JaffaCakes118.exe 1884 d9661054ea9d4d7f7169a5e32ba68822_JaffaCakes118.exe 1884 d9661054ea9d4d7f7169a5e32ba68822_JaffaCakes118.exe 1884 d9661054ea9d4d7f7169a5e32ba68822_JaffaCakes118.exe 1884 d9661054ea9d4d7f7169a5e32ba68822_JaffaCakes118.exe 1884 d9661054ea9d4d7f7169a5e32ba68822_JaffaCakes118.exe 1884 d9661054ea9d4d7f7169a5e32ba68822_JaffaCakes118.exe 1884 d9661054ea9d4d7f7169a5e32ba68822_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 692 explorer.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeRestorePrivilege 2828 msiexec.exe Token: SeTakeOwnershipPrivilege 2828 msiexec.exe Token: SeSecurityPrivilege 2828 msiexec.exe Token: SeShutdownPrivilege 692 explorer.exe Token: SeShutdownPrivilege 692 explorer.exe Token: SeShutdownPrivilege 692 explorer.exe Token: SeShutdownPrivilege 692 explorer.exe Token: SeShutdownPrivilege 692 explorer.exe Token: SeShutdownPrivilege 692 explorer.exe Token: SeShutdownPrivilege 692 explorer.exe Token: SeShutdownPrivilege 692 explorer.exe Token: SeShutdownPrivilege 692 explorer.exe Token: SeShutdownPrivilege 692 explorer.exe Token: SeShutdownPrivilege 692 explorer.exe Token: SeShutdownPrivilege 692 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 692 explorer.exe 692 explorer.exe 692 explorer.exe 692 explorer.exe 692 explorer.exe 692 explorer.exe 692 explorer.exe 692 explorer.exe 692 explorer.exe 692 explorer.exe 692 explorer.exe 692 explorer.exe 692 explorer.exe 692 explorer.exe 692 explorer.exe 692 explorer.exe 692 explorer.exe 692 explorer.exe 692 explorer.exe 692 explorer.exe 692 explorer.exe 692 explorer.exe 692 explorer.exe 692 explorer.exe 692 explorer.exe 692 explorer.exe 692 explorer.exe 692 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 692 explorer.exe 692 explorer.exe 692 explorer.exe 692 explorer.exe 692 explorer.exe 692 explorer.exe 692 explorer.exe 692 explorer.exe 692 explorer.exe 692 explorer.exe 692 explorer.exe 692 explorer.exe 692 explorer.exe 692 explorer.exe 692 explorer.exe 692 explorer.exe 692 explorer.exe 692 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1884 wrote to memory of 2612 1884 d9661054ea9d4d7f7169a5e32ba68822_JaffaCakes118.exe 31 PID 1884 wrote to memory of 2612 1884 d9661054ea9d4d7f7169a5e32ba68822_JaffaCakes118.exe 31 PID 1884 wrote to memory of 2612 1884 d9661054ea9d4d7f7169a5e32ba68822_JaffaCakes118.exe 31 PID 1884 wrote to memory of 2612 1884 d9661054ea9d4d7f7169a5e32ba68822_JaffaCakes118.exe 31 PID 1884 wrote to memory of 2968 1884 d9661054ea9d4d7f7169a5e32ba68822_JaffaCakes118.exe 33 PID 1884 wrote to memory of 2968 1884 d9661054ea9d4d7f7169a5e32ba68822_JaffaCakes118.exe 33 PID 1884 wrote to memory of 2968 1884 d9661054ea9d4d7f7169a5e32ba68822_JaffaCakes118.exe 33 PID 1884 wrote to memory of 2968 1884 d9661054ea9d4d7f7169a5e32ba68822_JaffaCakes118.exe 33 PID 1884 wrote to memory of 2192 1884 d9661054ea9d4d7f7169a5e32ba68822_JaffaCakes118.exe 36 PID 1884 wrote to memory of 2192 1884 d9661054ea9d4d7f7169a5e32ba68822_JaffaCakes118.exe 36 PID 1884 wrote to memory of 2192 1884 d9661054ea9d4d7f7169a5e32ba68822_JaffaCakes118.exe 36 PID 1884 wrote to memory of 2192 1884 d9661054ea9d4d7f7169a5e32ba68822_JaffaCakes118.exe 36 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer d9661054ea9d4d7f7169a5e32ba68822_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" d9661054ea9d4d7f7169a5e32ba68822_JaffaCakes118.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\d9661054ea9d4d7f7169a5e32ba68822_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d9661054ea9d4d7f7169a5e32ba68822_JaffaCakes118.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\d9661054ea9d4d7f7169a5e32ba68822_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\d9661054ea9d4d7f7169a5e32ba68822_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\14827\39777.exe%C:\Users\Admin\AppData\Roaming\148272⤵
- System Location Discovery: System Language Discovery
PID:2612
-
-
C:\Users\Admin\AppData\Local\Temp\d9661054ea9d4d7f7169a5e32ba68822_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\d9661054ea9d4d7f7169a5e32ba68822_JaffaCakes118.exe startC:\Program Files (x86)\2729E\lvvm.exe%C:\Program Files (x86)\2729E2⤵
- System Location Discovery: System Language Discovery
PID:2968
-
-
C:\Program Files (x86)\LP\77F1\B1A3.tmp"C:\Program Files (x86)\LP\77F1\B1A3.tmp"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2192
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2828
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:692
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a7c4bde235375c5e2fafc83bdb3bf5be
SHA18590956fa07a804418914e6a79a5ef1601497512
SHA256daba48a4ec02907e680f3330df391c161fa947c4cff989f195b869926813c916
SHA5123413fd49cc6c041e60810c7e8ace9500e9a751e2824b2a222597ab221ecd0ffb307abd91d3d9adebfb887b92990339c8ff383113211c74c3f3245f5880d95281
-
Filesize
600B
MD5d3cbdee171f85f3ceb01a25a347eca48
SHA1e2246436b7cdca7f5bebca824f634e1bdca29839
SHA256f38ff08e18b40c945504bdc730fa9194cf3162b6aea5690f68fbfe655061a692
SHA512cb3e782cb611a178028a19074ce7b4343bfecf7bf7a2472314488eba094836dbf3c16cc4cd66e28d81e74745ed11d2bb3efcbe221921cf6afd6c794f0166699f
-
Filesize
996B
MD561b9917b7ff5322828d381189927acea
SHA1338377022c98c8f560766e582d64239f4923935d
SHA2568d87530c584a112d6b1e26ef0511458595e5b7d40b26b0a5157891bffff47106
SHA51299a91f1cd6298f43e12c10c96bab6a756bc3b3b40d4caf1ab93349dba32a0f5e12b18a3600e5eb6bc80ede39765f92d6d2ccec4c7c8579e328d863f0f1460006
-
Filesize
99KB
MD508a5937a576b475126ca81d436937a26
SHA10511a1e2596ab2ab23d032c2883c3380fdcc9878
SHA256e74db8ec9e61cb575458a11f2c8e750347a3f50f2e3a0153a7e191ef64923519
SHA512e1da5dbf78aef5ff60d6d6b3961cce297bb0bf96aa51d1f115be1c31110684ecac8585f69c4f1124d712b65b718da0374dc859884fb595d3a9835617bbde8a25