Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-09-2024 23:38
Static task
static1
Behavioral task
behavioral1
Sample
df1a357c7f9ea6397b1efe879400daf6_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
df1a357c7f9ea6397b1efe879400daf6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
df1a357c7f9ea6397b1efe879400daf6_JaffaCakes118.exe
-
Size
275KB
-
MD5
df1a357c7f9ea6397b1efe879400daf6
-
SHA1
6c4dcceb3188ccad0941bf61ad3c1cdfbf979c57
-
SHA256
3ca51f7d7904c175addd3144548b1eeec52ff00058d7d0539853935427b310c5
-
SHA512
6964bfdf6ffe88f85f7fd4bef051cb2041a462f1c72bdee3b015bff7c1c049cce3a7c1431efdabacebee8eb60f3011164284664bdf066a5c036ea1cffed353f8
-
SSDEEP
6144:KdtrFPaLLGFKSRhaYb6Y4MblGYoH4XdJ6ZBcLQe2S:KdtpCLZ0haYb6CE4tA6Qe
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" df1a357c7f9ea6397b1efe879400daf6_JaffaCakes118.exe -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 3064 DEAC.tmp -
Loads dropped DLL 2 IoCs
pid Process 2192 df1a357c7f9ea6397b1efe879400daf6_JaffaCakes118.exe 2192 df1a357c7f9ea6397b1efe879400daf6_JaffaCakes118.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2192-3-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2192-13-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2836-16-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2192-15-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral1/memory/2836-17-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2192-134-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2288-136-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2288-138-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2192-325-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2192-329-0x0000000000400000-0x0000000000469000-memory.dmp upx -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\01B.exe = "C:\\Program Files (x86)\\LP\\0730\\01B.exe" df1a357c7f9ea6397b1efe879400daf6_JaffaCakes118.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\LP\0730\01B.exe df1a357c7f9ea6397b1efe879400daf6_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\LP\0730\01B.exe df1a357c7f9ea6397b1efe879400daf6_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\LP\0730\DEAC.tmp df1a357c7f9ea6397b1efe879400daf6_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language df1a357c7f9ea6397b1efe879400daf6_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language df1a357c7f9ea6397b1efe879400daf6_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language df1a357c7f9ea6397b1efe879400daf6_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEAC.tmp -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2192 df1a357c7f9ea6397b1efe879400daf6_JaffaCakes118.exe 2192 df1a357c7f9ea6397b1efe879400daf6_JaffaCakes118.exe 2192 df1a357c7f9ea6397b1efe879400daf6_JaffaCakes118.exe 2192 df1a357c7f9ea6397b1efe879400daf6_JaffaCakes118.exe 2192 df1a357c7f9ea6397b1efe879400daf6_JaffaCakes118.exe 2192 df1a357c7f9ea6397b1efe879400daf6_JaffaCakes118.exe 2192 df1a357c7f9ea6397b1efe879400daf6_JaffaCakes118.exe 2192 df1a357c7f9ea6397b1efe879400daf6_JaffaCakes118.exe 2192 df1a357c7f9ea6397b1efe879400daf6_JaffaCakes118.exe 2192 df1a357c7f9ea6397b1efe879400daf6_JaffaCakes118.exe 2192 df1a357c7f9ea6397b1efe879400daf6_JaffaCakes118.exe 2192 df1a357c7f9ea6397b1efe879400daf6_JaffaCakes118.exe 2192 df1a357c7f9ea6397b1efe879400daf6_JaffaCakes118.exe 2192 df1a357c7f9ea6397b1efe879400daf6_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1788 explorer.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeRestorePrivilege 2620 msiexec.exe Token: SeTakeOwnershipPrivilege 2620 msiexec.exe Token: SeSecurityPrivilege 2620 msiexec.exe Token: SeShutdownPrivilege 1788 explorer.exe Token: SeShutdownPrivilege 1788 explorer.exe Token: SeShutdownPrivilege 1788 explorer.exe Token: SeShutdownPrivilege 1788 explorer.exe Token: SeShutdownPrivilege 1788 explorer.exe Token: SeShutdownPrivilege 1788 explorer.exe Token: SeShutdownPrivilege 1788 explorer.exe Token: SeShutdownPrivilege 1788 explorer.exe Token: SeShutdownPrivilege 1788 explorer.exe Token: SeShutdownPrivilege 1788 explorer.exe Token: SeShutdownPrivilege 1788 explorer.exe Token: SeShutdownPrivilege 1788 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 1788 explorer.exe 1788 explorer.exe 1788 explorer.exe 1788 explorer.exe 1788 explorer.exe 1788 explorer.exe 1788 explorer.exe 1788 explorer.exe 1788 explorer.exe 1788 explorer.exe 1788 explorer.exe 1788 explorer.exe 1788 explorer.exe 1788 explorer.exe 1788 explorer.exe 1788 explorer.exe 1788 explorer.exe 1788 explorer.exe 1788 explorer.exe 1788 explorer.exe 1788 explorer.exe 1788 explorer.exe 1788 explorer.exe 1788 explorer.exe 1788 explorer.exe 1788 explorer.exe 1788 explorer.exe 1788 explorer.exe -
Suspicious use of SendNotifyMessage 22 IoCs
pid Process 1788 explorer.exe 1788 explorer.exe 1788 explorer.exe 1788 explorer.exe 1788 explorer.exe 1788 explorer.exe 1788 explorer.exe 1788 explorer.exe 1788 explorer.exe 1788 explorer.exe 1788 explorer.exe 1788 explorer.exe 1788 explorer.exe 1788 explorer.exe 1788 explorer.exe 1788 explorer.exe 1788 explorer.exe 1788 explorer.exe 1788 explorer.exe 1788 explorer.exe 1788 explorer.exe 1788 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2836 2192 df1a357c7f9ea6397b1efe879400daf6_JaffaCakes118.exe 30 PID 2192 wrote to memory of 2836 2192 df1a357c7f9ea6397b1efe879400daf6_JaffaCakes118.exe 30 PID 2192 wrote to memory of 2836 2192 df1a357c7f9ea6397b1efe879400daf6_JaffaCakes118.exe 30 PID 2192 wrote to memory of 2836 2192 df1a357c7f9ea6397b1efe879400daf6_JaffaCakes118.exe 30 PID 2192 wrote to memory of 2288 2192 df1a357c7f9ea6397b1efe879400daf6_JaffaCakes118.exe 32 PID 2192 wrote to memory of 2288 2192 df1a357c7f9ea6397b1efe879400daf6_JaffaCakes118.exe 32 PID 2192 wrote to memory of 2288 2192 df1a357c7f9ea6397b1efe879400daf6_JaffaCakes118.exe 32 PID 2192 wrote to memory of 2288 2192 df1a357c7f9ea6397b1efe879400daf6_JaffaCakes118.exe 32 PID 2192 wrote to memory of 3064 2192 df1a357c7f9ea6397b1efe879400daf6_JaffaCakes118.exe 36 PID 2192 wrote to memory of 3064 2192 df1a357c7f9ea6397b1efe879400daf6_JaffaCakes118.exe 36 PID 2192 wrote to memory of 3064 2192 df1a357c7f9ea6397b1efe879400daf6_JaffaCakes118.exe 36 PID 2192 wrote to memory of 3064 2192 df1a357c7f9ea6397b1efe879400daf6_JaffaCakes118.exe 36 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer df1a357c7f9ea6397b1efe879400daf6_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" df1a357c7f9ea6397b1efe879400daf6_JaffaCakes118.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\df1a357c7f9ea6397b1efe879400daf6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\df1a357c7f9ea6397b1efe879400daf6_JaffaCakes118.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\df1a357c7f9ea6397b1efe879400daf6_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\df1a357c7f9ea6397b1efe879400daf6_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\0501B\AFE07.exe%C:\Users\Admin\AppData\Roaming\0501B2⤵
- System Location Discovery: System Language Discovery
PID:2836
-
-
C:\Users\Admin\AppData\Local\Temp\df1a357c7f9ea6397b1efe879400daf6_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\df1a357c7f9ea6397b1efe879400daf6_JaffaCakes118.exe startC:\Program Files (x86)\1B0D2\lvvm.exe%C:\Program Files (x86)\1B0D22⤵
- System Location Discovery: System Language Discovery
PID:2288
-
-
C:\Program Files (x86)\LP\0730\DEAC.tmp"C:\Program Files (x86)\LP\0730\DEAC.tmp"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3064
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2620
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1788
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD5d9167c61ab4a9dd0abddc3b944f00cb1
SHA1129def2664cf6347c2c60890eeae4546fba1b0b2
SHA256658073c1009bb49db63e2a231f0919aba5fa9378b8732b9131ec6e98cd5de98b
SHA512c9c6be6545f1b3b5e739c3015be13f4fcfd8a309ea5cc99362fd0fdd7c9e7b2e5e1405947df270940a23634c633db7f43727d7fe3d4d7600fbe0f994a33fc56b
-
Filesize
600B
MD52b5ab6322aaff8eb257f19f75a73d505
SHA17b0bcc459c23dbde2b819531e863e16b4769ed0b
SHA25620c30c387da890650c61dbc5fec2f3d9a4191d9093e123dd1452525e2530fca2
SHA512c48a46243e5b8859175980217b364462a6b354de2ebc4f906996e2bb7c2ae193e9e4168ece3eef2577f8e1b4072162ae2ea38f4ca3428f282d7c56228fd76d75
-
Filesize
1KB
MD529c978602bbcd1f76b2b03de39c46134
SHA1de29f8ef2bbf4c14110050f88b00df6b7a450258
SHA256f25f29aafe75495928ddcaf927670a564194385ff564076f2214b529a359beaf
SHA5126eea43653e3601ac1d4a98d7098ff7f8ca50a3f1b346a2877079c20f3b8bda2d773e88251b279fbd8f7468c0d079a52abbdf4e55917e6388936956d1855b0c86
-
Filesize
96KB
MD5b1fe9cd43e3c6a1dc3dbec8ab8931dca
SHA12e0c15719ca6bf30b60bb9dce5784e2b5e393702
SHA25657baaf3b29e65c7ccc724edb82a485a2f4c95520a2d3577c858cbf7c1b0eca7f
SHA51249ef4f35a4c7fbbe349dd9b1375183d433c47989ba4dc33eee3bb19112fce6fa6ec0c2d1d977356665de2da00b394af16a1d36241c1372070d9fc1bd033d70be