Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-09-2024 01:13
Static task
static1
Behavioral task
behavioral1
Sample
dd6320b125131dabd2a8215d5dae2fa4_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dd6320b125131dabd2a8215d5dae2fa4_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dd6320b125131dabd2a8215d5dae2fa4_JaffaCakes118.exe
-
Size
361KB
-
MD5
dd6320b125131dabd2a8215d5dae2fa4
-
SHA1
8ad8efc9d656d4525b9d00743774fbbed79bacda
-
SHA256
c24c7641930fef4c547f3fe70a8a9adf1eb5318876f1dece044f640377b5c01a
-
SHA512
abeb8162720d6f9d4fd112146a9b5b5f76463258740daedfa6e2b1d22d89cae5abe5e1a8f3931b6979a4714250883b3cac862ae33dd430cebd24538a888af1a7
-
SSDEEP
6144:UFBBSls5rfh8Y9lt7Xon2u6hcjTSShc8KDdI1NXxNdWHJRbKnajjETh2gPoL:cBBSl+rfh8sLq2udjtnKu1HOJROajjEd
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Deletes itself 1 IoCs
pid Process 2516 ffl.exe -
Executes dropped EXE 1 IoCs
pid Process 2516 ffl.exe -
Loads dropped DLL 2 IoCs
pid Process 1120 dd6320b125131dabd2a8215d5dae2fa4_JaffaCakes118.exe 1120 dd6320b125131dabd2a8215d5dae2fa4_JaffaCakes118.exe -
Modifies system executable filetype association 2 TTPs 17 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\exefile\shell\runas ffl.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\exefile\shell\start ffl.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\exefile\shell\start\command\ = "\"%1\" %*" ffl.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\exefile\shell\open\command ffl.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\exefile\shell\open\command\IsolatedCommand = "\"%1\" %*" ffl.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\exefile\shell\start\command\IsolatedCommand = "\"%1\" %*" ffl.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\exefile\Content Type = "application/x-msdownload" ffl.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\exefile\shell\start\command ffl.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\exefile\shell ffl.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\exefile\shell\open ffl.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\exefile\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\ffl.exe\" -a \"%1\" %*" ffl.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\exefile\shell\runas\command ffl.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\exefile\shell\runas\command\IsolatedCommand = "\"%1\" %*" ffl.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\exefile\ = "Application" ffl.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\exefile\DefaultIcon ffl.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\exefile\DefaultIcon\ = "%1" ffl.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\exefile\shell\runas\command\ = "\"%1\" %*" ffl.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1120-145-0x0000000001E30000-0x0000000001E46000-memory.dmp upx -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\ctfmon.exe = "C:\\WINDOWS\\system32\\ctfmon.exe" dd6320b125131dabd2a8215d5dae2fa4_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\3876399163 = "C:\\Users\\Admin\\AppData\\Local\\ffl.exe" dd6320b125131dabd2a8215d5dae2fa4_JaffaCakes118.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dd6320b125131dabd2a8215d5dae2fa4_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffl.exe -
Modifies registry class 41 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\.exe\shell\open\command ffl.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\.exe\shell\start ffl.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\exefile\Content Type = "application/x-msdownload" ffl.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\exefile\shell\runas\command\IsolatedCommand = "\"%1\" %*" ffl.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\exefile\shell\open\command\IsolatedCommand = "\"%1\" %*" ffl.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\.exe\DefaultIcon ffl.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\.exe\shell\start\command\ = "\"%1\" %*" ffl.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\exefile ffl.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\exefile\DefaultIcon\ = "%1" ffl.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\exefile\shell\open\command ffl.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\.exe\shell\open ffl.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\ffl.exe\" -a \"%1\" %*" ffl.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" ffl.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\exefile\ = "Application" ffl.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\exefile\shell ffl.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\exefile\shell\runas\command\ = "\"%1\" %*" ffl.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\.exe ffl.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\.exe\DefaultIcon\ = "%1" ffl.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\.exe\shell\start\command ffl.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\exefile\DefaultIcon ffl.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\exefile\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\ffl.exe\" -a \"%1\" %*" ffl.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\exefile\shell\runas ffl.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\.exe\shell ffl.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\.exe\ = "exefile" ffl.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\.exe\shell\runas ffl.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\.exe\shell\runas\command\ = "\"%1\" %*" ffl.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\exefile\shell\open ffl.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\exefile\shell\start\command\IsolatedCommand = "\"%1\" %*" ffl.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\.exe\Content Type = "application/x-msdownload" ffl.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\.exe\shell\runas\command ffl.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\exefile\shell\start\command ffl.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" ffl.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\.exe\shell\start\command\IsolatedCommand = "\"%1\" %*" ffl.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\exefile\shell\runas\command ffl.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\exefile\shell\start ffl.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\exefile\shell\start\command\ = "\"%1\" %*" ffl.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1120 dd6320b125131dabd2a8215d5dae2fa4_JaffaCakes118.exe 1120 dd6320b125131dabd2a8215d5dae2fa4_JaffaCakes118.exe 1120 dd6320b125131dabd2a8215d5dae2fa4_JaffaCakes118.exe 1120 dd6320b125131dabd2a8215d5dae2fa4_JaffaCakes118.exe 1120 dd6320b125131dabd2a8215d5dae2fa4_JaffaCakes118.exe 1120 dd6320b125131dabd2a8215d5dae2fa4_JaffaCakes118.exe 1120 dd6320b125131dabd2a8215d5dae2fa4_JaffaCakes118.exe 1120 dd6320b125131dabd2a8215d5dae2fa4_JaffaCakes118.exe 1120 dd6320b125131dabd2a8215d5dae2fa4_JaffaCakes118.exe 1120 dd6320b125131dabd2a8215d5dae2fa4_JaffaCakes118.exe 1120 dd6320b125131dabd2a8215d5dae2fa4_JaffaCakes118.exe 1120 dd6320b125131dabd2a8215d5dae2fa4_JaffaCakes118.exe 1120 dd6320b125131dabd2a8215d5dae2fa4_JaffaCakes118.exe 2516 ffl.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 844 explorer.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeShutdownPrivilege 844 explorer.exe Token: SeShutdownPrivilege 844 explorer.exe Token: SeShutdownPrivilege 844 explorer.exe Token: SeShutdownPrivilege 844 explorer.exe Token: SeShutdownPrivilege 844 explorer.exe Token: SeShutdownPrivilege 844 explorer.exe Token: SeShutdownPrivilege 844 explorer.exe Token: SeShutdownPrivilege 844 explorer.exe Token: SeShutdownPrivilege 844 explorer.exe Token: SeShutdownPrivilege 844 explorer.exe Token: SeShutdownPrivilege 844 explorer.exe Token: SeShutdownPrivilege 844 explorer.exe Token: SeShutdownPrivilege 844 explorer.exe Token: SeShutdownPrivilege 844 explorer.exe -
Suspicious use of FindShellTrayWindow 32 IoCs
pid Process 844 explorer.exe 844 explorer.exe 844 explorer.exe 844 explorer.exe 844 explorer.exe 844 explorer.exe 844 explorer.exe 844 explorer.exe 844 explorer.exe 844 explorer.exe 844 explorer.exe 844 explorer.exe 844 explorer.exe 844 explorer.exe 844 explorer.exe 844 explorer.exe 844 explorer.exe 844 explorer.exe 844 explorer.exe 844 explorer.exe 844 explorer.exe 844 explorer.exe 844 explorer.exe 844 explorer.exe 844 explorer.exe 844 explorer.exe 2516 ffl.exe 2516 ffl.exe 844 explorer.exe 2516 ffl.exe 844 explorer.exe 844 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 844 explorer.exe 844 explorer.exe 844 explorer.exe 844 explorer.exe 844 explorer.exe 844 explorer.exe 844 explorer.exe 844 explorer.exe 844 explorer.exe 844 explorer.exe 844 explorer.exe 844 explorer.exe 844 explorer.exe 844 explorer.exe 844 explorer.exe 844 explorer.exe 844 explorer.exe 844 explorer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2516 ffl.exe 2516 ffl.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1120 wrote to memory of 2516 1120 dd6320b125131dabd2a8215d5dae2fa4_JaffaCakes118.exe 28 PID 1120 wrote to memory of 2516 1120 dd6320b125131dabd2a8215d5dae2fa4_JaffaCakes118.exe 28 PID 1120 wrote to memory of 2516 1120 dd6320b125131dabd2a8215d5dae2fa4_JaffaCakes118.exe 28 PID 1120 wrote to memory of 2516 1120 dd6320b125131dabd2a8215d5dae2fa4_JaffaCakes118.exe 28 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\dd6320b125131dabd2a8215d5dae2fa4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dd6320b125131dabd2a8215d5dae2fa4_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Users\Admin\AppData\Local\ffl.exe"C:\Users\Admin\AppData\Local\ffl.exe" -gav C:\Users\Admin\AppData\Local\Temp\dd6320b125131dabd2a8215d5dae2fa4_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system executable filetype association
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2516
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:844
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255B
MD5851036f09f7c92f0504dbe76d4811257
SHA1bc474cd19121b61daf8f832414dcf1aaf166122d
SHA25601c50a506269ee8dd40b2b6461671267afec440f0d2f8133f4a444869141ed4f
SHA512ec4e9a45a2bbe9950d336b498d0dbd7a59015bd04ab46b0d91914b7007dfc56f44e93dcd2749c9e2b921618d6c4e683955f69fcc0384d49fdb9e965e5378b8ce
-
Filesize
361KB
MD5dd6320b125131dabd2a8215d5dae2fa4
SHA18ad8efc9d656d4525b9d00743774fbbed79bacda
SHA256c24c7641930fef4c547f3fe70a8a9adf1eb5318876f1dece044f640377b5c01a
SHA512abeb8162720d6f9d4fd112146a9b5b5f76463258740daedfa6e2b1d22d89cae5abe5e1a8f3931b6979a4714250883b3cac862ae33dd430cebd24538a888af1a7