Analysis
-
max time kernel
140s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-09-2024 08:47
Static task
static1
Behavioral task
behavioral1
Sample
de15811312aa16266f81d85e9d3f5749_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
de15811312aa16266f81d85e9d3f5749_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
de15811312aa16266f81d85e9d3f5749_JaffaCakes118.exe
-
Size
287KB
-
MD5
de15811312aa16266f81d85e9d3f5749
-
SHA1
5233c9193fa6c059fe10a41e5d066ff4361fe70b
-
SHA256
a4b43db80753b0dde3fe246908e7134907a7b04f0aa17b447f4991855e634beb
-
SHA512
3bda60703d66328a788be9e49e09c78ce561a1b34ec0a42ea6560b1008c696990e9d5febd99609cc88fa4e1125cc51681a64f8f4df8c9bf10255233083b91c0f
-
SSDEEP
6144:mB9xBR18BSOGG+Bk8jbMRkFBE4pOd0Bkfcqw9tpx4MLQrXALw:gUSjJk8fMRoE4pOdmkfcr97xd/
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" de15811312aa16266f81d85e9d3f5749_JaffaCakes118.exe -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 600 5570.tmp -
Loads dropped DLL 2 IoCs
pid Process 1848 de15811312aa16266f81d85e9d3f5749_JaffaCakes118.exe 1848 de15811312aa16266f81d85e9d3f5749_JaffaCakes118.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1848-2-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1848-58-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1848-61-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1740-64-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1740-62-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1848-160-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/3068-163-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1848-354-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1848-359-0x0000000000400000-0x000000000046A000-memory.dmp upx -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\D5A.exe = "C:\\Program Files (x86)\\LP\\8E3C\\D5A.exe" de15811312aa16266f81d85e9d3f5749_JaffaCakes118.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\LP\8E3C\D5A.exe de15811312aa16266f81d85e9d3f5749_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\LP\8E3C\D5A.exe de15811312aa16266f81d85e9d3f5749_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\LP\8E3C\5570.tmp de15811312aa16266f81d85e9d3f5749_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language de15811312aa16266f81d85e9d3f5749_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5570.tmp -
Modifies registry class 5 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1848 de15811312aa16266f81d85e9d3f5749_JaffaCakes118.exe 1848 de15811312aa16266f81d85e9d3f5749_JaffaCakes118.exe 1848 de15811312aa16266f81d85e9d3f5749_JaffaCakes118.exe 1848 de15811312aa16266f81d85e9d3f5749_JaffaCakes118.exe 1848 de15811312aa16266f81d85e9d3f5749_JaffaCakes118.exe 1848 de15811312aa16266f81d85e9d3f5749_JaffaCakes118.exe 1848 de15811312aa16266f81d85e9d3f5749_JaffaCakes118.exe 1848 de15811312aa16266f81d85e9d3f5749_JaffaCakes118.exe 1848 de15811312aa16266f81d85e9d3f5749_JaffaCakes118.exe 1848 de15811312aa16266f81d85e9d3f5749_JaffaCakes118.exe 1848 de15811312aa16266f81d85e9d3f5749_JaffaCakes118.exe 1848 de15811312aa16266f81d85e9d3f5749_JaffaCakes118.exe 1848 de15811312aa16266f81d85e9d3f5749_JaffaCakes118.exe 1848 de15811312aa16266f81d85e9d3f5749_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1360 explorer.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeRestorePrivilege 2392 msiexec.exe Token: SeTakeOwnershipPrivilege 2392 msiexec.exe Token: SeSecurityPrivilege 2392 msiexec.exe Token: SeShutdownPrivilege 1360 explorer.exe Token: SeShutdownPrivilege 1360 explorer.exe Token: SeShutdownPrivilege 1360 explorer.exe Token: SeShutdownPrivilege 1360 explorer.exe Token: SeShutdownPrivilege 1360 explorer.exe Token: SeShutdownPrivilege 1360 explorer.exe Token: SeShutdownPrivilege 1360 explorer.exe Token: SeShutdownPrivilege 1360 explorer.exe Token: SeShutdownPrivilege 1360 explorer.exe Token: SeShutdownPrivilege 1360 explorer.exe Token: SeShutdownPrivilege 1360 explorer.exe Token: SeShutdownPrivilege 1360 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 1360 explorer.exe 1360 explorer.exe 1360 explorer.exe 1360 explorer.exe 1360 explorer.exe 1360 explorer.exe 1360 explorer.exe 1360 explorer.exe 1360 explorer.exe 1360 explorer.exe 1360 explorer.exe 1360 explorer.exe 1360 explorer.exe 1360 explorer.exe 1360 explorer.exe 1360 explorer.exe 1360 explorer.exe 1360 explorer.exe 1360 explorer.exe 1360 explorer.exe 1360 explorer.exe 1360 explorer.exe 1360 explorer.exe 1360 explorer.exe 1360 explorer.exe 1360 explorer.exe 1360 explorer.exe 1360 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 1360 explorer.exe 1360 explorer.exe 1360 explorer.exe 1360 explorer.exe 1360 explorer.exe 1360 explorer.exe 1360 explorer.exe 1360 explorer.exe 1360 explorer.exe 1360 explorer.exe 1360 explorer.exe 1360 explorer.exe 1360 explorer.exe 1360 explorer.exe 1360 explorer.exe 1360 explorer.exe 1360 explorer.exe 1360 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1848 wrote to memory of 1740 1848 de15811312aa16266f81d85e9d3f5749_JaffaCakes118.exe 32 PID 1848 wrote to memory of 1740 1848 de15811312aa16266f81d85e9d3f5749_JaffaCakes118.exe 32 PID 1848 wrote to memory of 1740 1848 de15811312aa16266f81d85e9d3f5749_JaffaCakes118.exe 32 PID 1848 wrote to memory of 1740 1848 de15811312aa16266f81d85e9d3f5749_JaffaCakes118.exe 32 PID 1848 wrote to memory of 3068 1848 de15811312aa16266f81d85e9d3f5749_JaffaCakes118.exe 34 PID 1848 wrote to memory of 3068 1848 de15811312aa16266f81d85e9d3f5749_JaffaCakes118.exe 34 PID 1848 wrote to memory of 3068 1848 de15811312aa16266f81d85e9d3f5749_JaffaCakes118.exe 34 PID 1848 wrote to memory of 3068 1848 de15811312aa16266f81d85e9d3f5749_JaffaCakes118.exe 34 PID 1848 wrote to memory of 600 1848 de15811312aa16266f81d85e9d3f5749_JaffaCakes118.exe 37 PID 1848 wrote to memory of 600 1848 de15811312aa16266f81d85e9d3f5749_JaffaCakes118.exe 37 PID 1848 wrote to memory of 600 1848 de15811312aa16266f81d85e9d3f5749_JaffaCakes118.exe 37 PID 1848 wrote to memory of 600 1848 de15811312aa16266f81d85e9d3f5749_JaffaCakes118.exe 37 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer de15811312aa16266f81d85e9d3f5749_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" de15811312aa16266f81d85e9d3f5749_JaffaCakes118.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\de15811312aa16266f81d85e9d3f5749_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\de15811312aa16266f81d85e9d3f5749_JaffaCakes118.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1848 -
C:\Users\Admin\AppData\Local\Temp\de15811312aa16266f81d85e9d3f5749_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\de15811312aa16266f81d85e9d3f5749_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\CA1DC\DBD8E.exe%C:\Users\Admin\AppData\Roaming\CA1DC2⤵PID:1740
-
-
C:\Users\Admin\AppData\Local\Temp\de15811312aa16266f81d85e9d3f5749_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\de15811312aa16266f81d85e9d3f5749_JaffaCakes118.exe startC:\Program Files (x86)\DC1EC\lvvm.exe%C:\Program Files (x86)\DC1EC2⤵PID:3068
-
-
C:\Program Files (x86)\LP\8E3C\5570.tmp"C:\Program Files (x86)\LP\8E3C\5570.tmp"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:600
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2392
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1360
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD53ea27b267466b9358ef7d7a8720785f8
SHA14d559ee61f9196f0701a645545156ba0358a1830
SHA25639ae0496027c466abc6fbd165d48f67bc4adc58e6d18e2910374644ce47ea020
SHA512b52486c25a614bac7fb98eda89b19df85bd1fbfa601bd32696b10ae0daffb78ab2770d363188741303ae888e057129ca27e26f122cb03ce85e86074bd417004d
-
Filesize
1KB
MD52479157535bda105d10cf0d3eef3e993
SHA1a7b7ea28277eba164e7faebc3a8550b8dc7b8b51
SHA256a92a86cfdd69742a8061203e6c048e41cb17c65d23c0f5c1bb3528b6727ef683
SHA512f085b46bf8baac6e1cf00ce33a357fd28160d2a806a19a0dd2d213b45ab618f23e36b044e6beb7a0bc6a7a6132326b3dc697f24ba9f47f3316a838ba66b8610d
-
Filesize
600B
MD5235eb123eea9afecf9ee5f385855e5d3
SHA12c158d1b3e48c4e40ce687e9e945c7d32dd81866
SHA25601e29a10f96b5861481c42b939673b935e1d95587f60102cc85e73afcce52726
SHA512e584ea2eb0c44f1a0c6eb30789203404df68675b43e70421021f9f84689afea9f38afca4580e364fb7aa4b08bf01a8faf8c15c95fbfabe90b91ea1bb36d30fce
-
Filesize
300B
MD53fcc6ce725f113b85be436499b79bcaf
SHA1c4790521339651a76de78f6c6e3c5fb2ef5bd97a
SHA256539ab1ea21afb2b7dacc5c1473d0383f3cabad89084733f53b23e20e600180fc
SHA512fd883e42ecf9ad3cfea24440b90ed9ba15d4596ff6344b8c5b6be814d1be24ff1bde641b9a2d72eb4e9fb171f8e59b2099cad91140877a73d6b48f7f06931e89
-
Filesize
101KB
MD5c932041a7e800a1a80890dbe7d984243
SHA1275e521889eaca58e193a5e7a6675fd08a6b6418
SHA2562890d67e3a1b817a45e95fb5d7238c2761fad5a0c9fec3280e1be2c1a00d5c02
SHA512b111ade33c5982232722d81f9c1329c3d875aa1be7a8870371cff9eba51390c05d70b9ce680241932463459fb550ded667a702e754a762f88d88e73b850275ef