Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-09-2024 12:40
Static task
static1
Behavioral task
behavioral1
Sample
da5e63e1b126dfd4990b891845a18ea7_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
da5e63e1b126dfd4990b891845a18ea7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
da5e63e1b126dfd4990b891845a18ea7_JaffaCakes118.exe
-
Size
278KB
-
MD5
da5e63e1b126dfd4990b891845a18ea7
-
SHA1
54aac9466b1db1089cdaa16750f667faf8973de0
-
SHA256
79c52865086ccba7f563ded0055cf0e5d025a066b3cdbf015e670d5ef4315ad6
-
SHA512
986ef221484285da52a4e3e63fafa6b42f3ab9b96649b726fac8a0a4df10f70c2a22171bf683b90658a72cff92170be7c0f3d1b940bf305a9ca785857972c381
-
SSDEEP
6144:MCvJSq7COG+85s5CbLWTrRInjbtMB/TsQOtyA5ytDSXh24p0:fvsq7C5p5sW6hIjbAXJAcRKhD
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" da5e63e1b126dfd4990b891845a18ea7_JaffaCakes118.exe -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 1756 41D1.tmp -
Loads dropped DLL 2 IoCs
pid Process 840 da5e63e1b126dfd4990b891845a18ea7_JaffaCakes118.exe 840 da5e63e1b126dfd4990b891845a18ea7_JaffaCakes118.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/840-2-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2116-15-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2116-14-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/840-16-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral1/memory/840-17-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/664-81-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/840-82-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/840-189-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/840-192-0x0000000000400000-0x000000000046A000-memory.dmp upx -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\379.exe = "C:\\Program Files (x86)\\LP\\EC0F\\379.exe" da5e63e1b126dfd4990b891845a18ea7_JaffaCakes118.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\LP\EC0F\379.exe da5e63e1b126dfd4990b891845a18ea7_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\LP\EC0F\41D1.tmp da5e63e1b126dfd4990b891845a18ea7_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\LP\EC0F\379.exe da5e63e1b126dfd4990b891845a18ea7_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da5e63e1b126dfd4990b891845a18ea7_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da5e63e1b126dfd4990b891845a18ea7_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da5e63e1b126dfd4990b891845a18ea7_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 41D1.tmp -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 840 da5e63e1b126dfd4990b891845a18ea7_JaffaCakes118.exe 840 da5e63e1b126dfd4990b891845a18ea7_JaffaCakes118.exe 840 da5e63e1b126dfd4990b891845a18ea7_JaffaCakes118.exe 840 da5e63e1b126dfd4990b891845a18ea7_JaffaCakes118.exe 840 da5e63e1b126dfd4990b891845a18ea7_JaffaCakes118.exe 840 da5e63e1b126dfd4990b891845a18ea7_JaffaCakes118.exe 840 da5e63e1b126dfd4990b891845a18ea7_JaffaCakes118.exe 840 da5e63e1b126dfd4990b891845a18ea7_JaffaCakes118.exe 840 da5e63e1b126dfd4990b891845a18ea7_JaffaCakes118.exe 840 da5e63e1b126dfd4990b891845a18ea7_JaffaCakes118.exe 840 da5e63e1b126dfd4990b891845a18ea7_JaffaCakes118.exe 840 da5e63e1b126dfd4990b891845a18ea7_JaffaCakes118.exe 840 da5e63e1b126dfd4990b891845a18ea7_JaffaCakes118.exe 840 da5e63e1b126dfd4990b891845a18ea7_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2120 explorer.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeRestorePrivilege 2504 msiexec.exe Token: SeTakeOwnershipPrivilege 2504 msiexec.exe Token: SeSecurityPrivilege 2504 msiexec.exe Token: SeShutdownPrivilege 2120 explorer.exe Token: SeShutdownPrivilege 2120 explorer.exe Token: SeShutdownPrivilege 2120 explorer.exe Token: SeShutdownPrivilege 2120 explorer.exe Token: SeShutdownPrivilege 2120 explorer.exe Token: SeShutdownPrivilege 2120 explorer.exe Token: SeShutdownPrivilege 2120 explorer.exe Token: SeShutdownPrivilege 2120 explorer.exe Token: SeShutdownPrivilege 2120 explorer.exe Token: SeShutdownPrivilege 2120 explorer.exe Token: SeShutdownPrivilege 2120 explorer.exe Token: SeShutdownPrivilege 2120 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe -
Suspicious use of SendNotifyMessage 22 IoCs
pid Process 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe 2120 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 840 wrote to memory of 2116 840 da5e63e1b126dfd4990b891845a18ea7_JaffaCakes118.exe 32 PID 840 wrote to memory of 2116 840 da5e63e1b126dfd4990b891845a18ea7_JaffaCakes118.exe 32 PID 840 wrote to memory of 2116 840 da5e63e1b126dfd4990b891845a18ea7_JaffaCakes118.exe 32 PID 840 wrote to memory of 2116 840 da5e63e1b126dfd4990b891845a18ea7_JaffaCakes118.exe 32 PID 840 wrote to memory of 664 840 da5e63e1b126dfd4990b891845a18ea7_JaffaCakes118.exe 34 PID 840 wrote to memory of 664 840 da5e63e1b126dfd4990b891845a18ea7_JaffaCakes118.exe 34 PID 840 wrote to memory of 664 840 da5e63e1b126dfd4990b891845a18ea7_JaffaCakes118.exe 34 PID 840 wrote to memory of 664 840 da5e63e1b126dfd4990b891845a18ea7_JaffaCakes118.exe 34 PID 840 wrote to memory of 1756 840 da5e63e1b126dfd4990b891845a18ea7_JaffaCakes118.exe 36 PID 840 wrote to memory of 1756 840 da5e63e1b126dfd4990b891845a18ea7_JaffaCakes118.exe 36 PID 840 wrote to memory of 1756 840 da5e63e1b126dfd4990b891845a18ea7_JaffaCakes118.exe 36 PID 840 wrote to memory of 1756 840 da5e63e1b126dfd4990b891845a18ea7_JaffaCakes118.exe 36 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer da5e63e1b126dfd4990b891845a18ea7_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" da5e63e1b126dfd4990b891845a18ea7_JaffaCakes118.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\da5e63e1b126dfd4990b891845a18ea7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\da5e63e1b126dfd4990b891845a18ea7_JaffaCakes118.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:840 -
C:\Users\Admin\AppData\Local\Temp\da5e63e1b126dfd4990b891845a18ea7_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\da5e63e1b126dfd4990b891845a18ea7_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\F2C54\6B1EC.exe%C:\Users\Admin\AppData\Roaming\F2C542⤵
- System Location Discovery: System Language Discovery
PID:2116
-
-
C:\Users\Admin\AppData\Local\Temp\da5e63e1b126dfd4990b891845a18ea7_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\da5e63e1b126dfd4990b891845a18ea7_JaffaCakes118.exe startC:\Program Files (x86)\54895\lvvm.exe%C:\Program Files (x86)\548952⤵
- System Location Discovery: System Language Discovery
PID:664
-
-
C:\Program Files (x86)\LP\EC0F\41D1.tmp"C:\Program Files (x86)\LP\EC0F\41D1.tmp"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1756
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2504
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2120
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD50d8e387b253839b1947a01db3639afdb
SHA1c734e8e133cd0185e49b6f370ed3df282f6c1953
SHA2562af5ed7f4f1abdba4f20a6ff0b7beca8388c64404c4b9cc6006491f3be708a32
SHA512d716bc629adf8831e5ce1c8ef3ceb3ee58060cde60648accdfeb4714820858f45db7fb65e3142e0765e3e58f89bfd1b182b98b4b40b8467d56605c824f75a5a3
-
Filesize
1KB
MD5e6c5efa16078344c83ec507bf027f2b8
SHA12cc11319e02df8d1b37bd1a33168ad80ee87b696
SHA256c3f4ccf07b8ad344b6967f2aed661ecf0016bd6756a14253f125041b91be1d2c
SHA512841c93b7fa713c8eddcc2d74806a3553d126680727f5e74eb277a0cd2864085b9387f5a725f714c95b0bb0ffd13c7b87d6886f04595ec9ee9bcb8094cd7472a7
-
Filesize
600B
MD584b80b3fcbb27121dc7ebbfcac561d3a
SHA178b4f03084a4a7674a23f09aa67adda8283c3990
SHA25642030dfa62982ecae8873d2d3a136361c2b84f21cb1628a2995ab618d4ab2c12
SHA512d2d9703c8091dfd3c50a09a1ad072c4c23ffd737e32fd5a217e351b63bf1cc3295e33462749a9b9adf628f00eb83c8ca68bced41e30ba89c9794e9d8bcce599b
-
Filesize
996B
MD547cd706d0fba5458b30bfed37fd1095c
SHA1492d4fec7354699b31208efd5f02d74b0fed3156
SHA2565f86b2a972d083363512b23c1a20f86fe1c5b0374332cd7a69ab2429b90e2104
SHA512d6483599c97f31d8eb8a86f90e21b7969f28b267f23c14564c71c3e9c2897af6cc6e9069a69612ddb7da481d5d12493edd2ecb0ed0bce6f7ec2f2c2c1fdf219f
-
Filesize
96KB
MD595fd9f7a57aa12c44a0c97428c0181a9
SHA1e379a1985d6267a95ebb97df650d64771dcd77b5
SHA256f82e774ac4f906a9b0fd30d41c34b1ee90c0c9e809bf4bf66cd56a3439deccb6
SHA51207ff5c98b8507cca93725091450997140cbb5808e245ccaeeba70ba162d8340b4977ba98230cd81902d2558edb8df484c5aed799387490cba316439f96b15737