Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12-09-2024 01:02
Static task
static1
Behavioral task
behavioral1
Sample
db8a7205a16ebd7d01f4c1bc7ed828f3_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
db8a7205a16ebd7d01f4c1bc7ed828f3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
db8a7205a16ebd7d01f4c1bc7ed828f3_JaffaCakes118.exe
-
Size
279KB
-
MD5
db8a7205a16ebd7d01f4c1bc7ed828f3
-
SHA1
08e633fe5c3f3438d3c7b2b16b980477ce11c005
-
SHA256
32bc8fdd21b479615e48c6bbaf86552fb39a51f24492c48ef8f5e036cfcf9425
-
SHA512
60488b3d8d255bff743dbda22d6452347072f9eb4de47d64b422b26db4d724e822cad3ae404bc7e6db0b643ef1ad94cce16c4c223e33f4098a115962760495e1
-
SSDEEP
6144:R9p9rg4xpA4mckS2nlyo9q7H5c6doe7ZXtynCdgqdzZtbz4lnBcdPo:R9p9EgAbJS2nAJdooX0UZ5mnud
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" db8a7205a16ebd7d01f4c1bc7ed828f3_JaffaCakes118.exe -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 1844 BAD7.tmp -
Loads dropped DLL 2 IoCs
pid Process 2624 db8a7205a16ebd7d01f4c1bc7ed828f3_JaffaCakes118.exe 2624 db8a7205a16ebd7d01f4c1bc7ed828f3_JaffaCakes118.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2624-2-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2624-11-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2624-13-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2092-16-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2092-15-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2624-128-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2128-133-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2128-132-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2624-320-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2624-324-0x0000000000400000-0x000000000046B000-memory.dmp upx -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\DC8.exe = "C:\\Program Files (x86)\\LP\\E9E9\\DC8.exe" db8a7205a16ebd7d01f4c1bc7ed828f3_JaffaCakes118.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\LP\E9E9\DC8.exe db8a7205a16ebd7d01f4c1bc7ed828f3_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\LP\E9E9\BAD7.tmp db8a7205a16ebd7d01f4c1bc7ed828f3_JaffaCakes118.exe File created C:\Program Files (x86)\LP\E9E9\DC8.exe db8a7205a16ebd7d01f4c1bc7ed828f3_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language db8a7205a16ebd7d01f4c1bc7ed828f3_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language db8a7205a16ebd7d01f4c1bc7ed828f3_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language db8a7205a16ebd7d01f4c1bc7ed828f3_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BAD7.tmp -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2624 db8a7205a16ebd7d01f4c1bc7ed828f3_JaffaCakes118.exe 2624 db8a7205a16ebd7d01f4c1bc7ed828f3_JaffaCakes118.exe 2624 db8a7205a16ebd7d01f4c1bc7ed828f3_JaffaCakes118.exe 2624 db8a7205a16ebd7d01f4c1bc7ed828f3_JaffaCakes118.exe 2624 db8a7205a16ebd7d01f4c1bc7ed828f3_JaffaCakes118.exe 2624 db8a7205a16ebd7d01f4c1bc7ed828f3_JaffaCakes118.exe 2624 db8a7205a16ebd7d01f4c1bc7ed828f3_JaffaCakes118.exe 2624 db8a7205a16ebd7d01f4c1bc7ed828f3_JaffaCakes118.exe 2624 db8a7205a16ebd7d01f4c1bc7ed828f3_JaffaCakes118.exe 2624 db8a7205a16ebd7d01f4c1bc7ed828f3_JaffaCakes118.exe 2624 db8a7205a16ebd7d01f4c1bc7ed828f3_JaffaCakes118.exe 2624 db8a7205a16ebd7d01f4c1bc7ed828f3_JaffaCakes118.exe 2624 db8a7205a16ebd7d01f4c1bc7ed828f3_JaffaCakes118.exe 2624 db8a7205a16ebd7d01f4c1bc7ed828f3_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2888 explorer.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeRestorePrivilege 2768 msiexec.exe Token: SeTakeOwnershipPrivilege 2768 msiexec.exe Token: SeSecurityPrivilege 2768 msiexec.exe Token: SeShutdownPrivilege 2888 explorer.exe Token: SeShutdownPrivilege 2888 explorer.exe Token: SeShutdownPrivilege 2888 explorer.exe Token: SeShutdownPrivilege 2888 explorer.exe Token: SeShutdownPrivilege 2888 explorer.exe Token: SeShutdownPrivilege 2888 explorer.exe Token: SeShutdownPrivilege 2888 explorer.exe Token: SeShutdownPrivilege 2888 explorer.exe Token: SeShutdownPrivilege 2888 explorer.exe Token: SeShutdownPrivilege 2888 explorer.exe Token: SeShutdownPrivilege 2888 explorer.exe Token: SeShutdownPrivilege 2888 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe -
Suspicious use of SendNotifyMessage 22 IoCs
pid Process 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2624 wrote to memory of 2092 2624 db8a7205a16ebd7d01f4c1bc7ed828f3_JaffaCakes118.exe 31 PID 2624 wrote to memory of 2092 2624 db8a7205a16ebd7d01f4c1bc7ed828f3_JaffaCakes118.exe 31 PID 2624 wrote to memory of 2092 2624 db8a7205a16ebd7d01f4c1bc7ed828f3_JaffaCakes118.exe 31 PID 2624 wrote to memory of 2092 2624 db8a7205a16ebd7d01f4c1bc7ed828f3_JaffaCakes118.exe 31 PID 2624 wrote to memory of 2128 2624 db8a7205a16ebd7d01f4c1bc7ed828f3_JaffaCakes118.exe 33 PID 2624 wrote to memory of 2128 2624 db8a7205a16ebd7d01f4c1bc7ed828f3_JaffaCakes118.exe 33 PID 2624 wrote to memory of 2128 2624 db8a7205a16ebd7d01f4c1bc7ed828f3_JaffaCakes118.exe 33 PID 2624 wrote to memory of 2128 2624 db8a7205a16ebd7d01f4c1bc7ed828f3_JaffaCakes118.exe 33 PID 2624 wrote to memory of 1844 2624 db8a7205a16ebd7d01f4c1bc7ed828f3_JaffaCakes118.exe 36 PID 2624 wrote to memory of 1844 2624 db8a7205a16ebd7d01f4c1bc7ed828f3_JaffaCakes118.exe 36 PID 2624 wrote to memory of 1844 2624 db8a7205a16ebd7d01f4c1bc7ed828f3_JaffaCakes118.exe 36 PID 2624 wrote to memory of 1844 2624 db8a7205a16ebd7d01f4c1bc7ed828f3_JaffaCakes118.exe 36 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer db8a7205a16ebd7d01f4c1bc7ed828f3_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" db8a7205a16ebd7d01f4c1bc7ed828f3_JaffaCakes118.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\db8a7205a16ebd7d01f4c1bc7ed828f3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\db8a7205a16ebd7d01f4c1bc7ed828f3_JaffaCakes118.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2624 -
C:\Users\Admin\AppData\Local\Temp\db8a7205a16ebd7d01f4c1bc7ed828f3_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\db8a7205a16ebd7d01f4c1bc7ed828f3_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\95082\CB8E9.exe%C:\Users\Admin\AppData\Roaming\950822⤵
- System Location Discovery: System Language Discovery
PID:2092
-
-
C:\Users\Admin\AppData\Local\Temp\db8a7205a16ebd7d01f4c1bc7ed828f3_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\db8a7205a16ebd7d01f4c1bc7ed828f3_JaffaCakes118.exe startC:\Program Files (x86)\82786\lvvm.exe%C:\Program Files (x86)\827862⤵
- System Location Discovery: System Language Discovery
PID:2128
-
-
C:\Program Files (x86)\LP\E9E9\BAD7.tmp"C:\Program Files (x86)\LP\E9E9\BAD7.tmp"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1844
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2768
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2888
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD5729b41c8d6298f0702e2b8c1b8715e47
SHA10adc80bfacb1033befd6c55fc3fd0e070b0860c1
SHA256d16e804dc34f93a5f60a8ac0d926d02c9fee874fa223a5aa2d46ad77de57cfa3
SHA5126194802da438f57ac5a08a5ea336531a2809990c0c7981fc708e1cfb39960c0654d6be023b96ce698784e35cfd9a1abb669483e27427f807ff7f5be27869fc59
-
Filesize
600B
MD54dbde6803a8309bef0f4ff39f887a47e
SHA14c6b26074e7079488322f8d30d6a921cfbaa4dd7
SHA2560cfb09f87d8923f1c5169cebad9ff6cbd60283e45b2bc0f967b8f11ac8713a58
SHA5127cbc7dd7e1c0ebb2b01fbb0cdc77eeb5c39098e694b630457d1c6ceb6aed3217a9aea49b18d8f0f32754f597a6fedfd148c1650a693f7b24cbd4d050628f39c6
-
Filesize
1KB
MD5d4a89ab0631d92be0846bed25d9a20dc
SHA15cefbc2ca60d9761860830cab9cabc24e28eff02
SHA25695280a30271de8db706c482d93d2b9cea1de3aa2b046935707a63a0b03c82f2d
SHA512dbd798c59166d4fa169ecc6be1c58850f4ee5ed2dfcfe6ade135a14ace303c43c98b2d2730b0466053a35da4b96dc1a3c7827cb6695db231dca675b1c69aa9df
-
Filesize
99KB
MD5ed2bad1e6970c4aede88be76b11c9250
SHA174a9b54a7b24414b3035c5e7cdb3d89393e785d3
SHA2568d766352dd398f94f5e3ead77d5b5ffffb8e605b066c47086020f8f8400ccdae
SHA512ffbf62a08a1112be48d39d36abee306b7ac17186177842a8d7b1253ecadc0827d2d8541b7e35e037c13c6e247670f83a7d73bf5f09ff7f20815678694236bc8f