Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/09/2024, 07:27
Static task
static1
Behavioral task
behavioral1
Sample
dfbce0bec667584d5f5ce99a1eb3ab04_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
dfbce0bec667584d5f5ce99a1eb3ab04_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dfbce0bec667584d5f5ce99a1eb3ab04_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
dfbce0bec667584d5f5ce99a1eb3ab04
-
SHA1
c7ba9a12f4583aa0ab344a8098181330caf1df50
-
SHA256
b56307df423c2d43b1b3aefdd17305f6590c07cf71fe8ed7a9fe70a62f35b39f
-
SHA512
705a901acf11ce869334d3dd8bd8daffa786a6276eb041dd106e4c445c79f9a0f8f244531f9ae4ebaad4f0769a6f6e8f3e19074a628fdae588894b13fb4e68ff
-
SSDEEP
24576:NykGfBrYqa2HX7lUXsX7Mjgn4VmqtrzCKcIs8VDKchf94:ok8B0OX78I7l4Vmm6AKch2
Malware Config
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 3340 928928.EXE 3052 927927.EXE 4624 926926.EXE 976 925925.EXE 4904 924924.EXE 1312 923923.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" dfbce0bec667584d5f5ce99a1eb3ab04_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" 928928.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" 927927.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" 926926.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" 925925.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup5 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP005.TMP\\\"" 924924.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 924924.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 923923.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dfbce0bec667584d5f5ce99a1eb3ab04_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 928928.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 927927.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 926926.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 925925.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2260 wrote to memory of 3340 2260 dfbce0bec667584d5f5ce99a1eb3ab04_JaffaCakes118.exe 83 PID 2260 wrote to memory of 3340 2260 dfbce0bec667584d5f5ce99a1eb3ab04_JaffaCakes118.exe 83 PID 2260 wrote to memory of 3340 2260 dfbce0bec667584d5f5ce99a1eb3ab04_JaffaCakes118.exe 83 PID 3340 wrote to memory of 3052 3340 928928.EXE 84 PID 3340 wrote to memory of 3052 3340 928928.EXE 84 PID 3340 wrote to memory of 3052 3340 928928.EXE 84 PID 3052 wrote to memory of 4624 3052 927927.EXE 85 PID 3052 wrote to memory of 4624 3052 927927.EXE 85 PID 3052 wrote to memory of 4624 3052 927927.EXE 85 PID 4624 wrote to memory of 976 4624 926926.EXE 86 PID 4624 wrote to memory of 976 4624 926926.EXE 86 PID 4624 wrote to memory of 976 4624 926926.EXE 86 PID 976 wrote to memory of 4904 976 925925.EXE 88 PID 976 wrote to memory of 4904 976 925925.EXE 88 PID 976 wrote to memory of 4904 976 925925.EXE 88 PID 4904 wrote to memory of 1312 4904 924924.EXE 90 PID 4904 wrote to memory of 1312 4904 924924.EXE 90 PID 4904 wrote to memory of 1312 4904 924924.EXE 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\dfbce0bec667584d5f5ce99a1eb3ab04_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dfbce0bec667584d5f5ce99a1eb3ab04_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\928928.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\928928.EXE2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3340 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\927927.EXEC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\927927.EXE3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\926926.EXEC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\926926.EXE4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\925925.EXEC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\925925.EXE5⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\924924.EXEC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\924924.EXE6⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\923923.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\923923.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1312
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5d66d88b5dd0256bc6a29b647a3c11cd2
SHA17420788c22f1694a077471fc3545c11f3b2537a6
SHA256cf829d079af6dd8090e5ca1498ca06430b3c110b78d51746c1a41cdaa828e9d3
SHA5128f2adbdc4876c04dde3ff251073282897136cd145f7c5aa4827cda31df06cb7507b564403fcfede9a267da959381073039922b2674cf6c53aece165ca6c3a22b
-
Filesize
928KB
MD59cb397a6891beb8eb1d81d70f2ff99c2
SHA185d94254218583d25d4bcff6c2985c19b10c5522
SHA2565acbcf6ef2a47075ee02086f162e3444786854d559807d1035d5c05b9224fbff
SHA51201191748a62728ddf16be3c779288955d4a7d4d7075f4577a1c12e342ecf065dee1706c1c85043f9b6778b1392ad076a8d37c803b9b77cf5b1bf776c075eba94
-
Filesize
823KB
MD52e366e651dc92d7d05b9c1a888418ea2
SHA12f01e9383d42e70657a11606be003afbbc16fbf9
SHA25650668bade1797f47f9a69b6bc8425c17d5d769b73251eabf650ef64ba6969e87
SHA5129d9c945d7bddb9ce403fe3492cfd21da290fb87fbb44f1a6f5f309474dce36d5f59fb9a5b65b2ccbfbe731afa8ab0c9ecbb7b0ed35a04cd66650ae9102a16f85
-
Filesize
718KB
MD56b3d8fe55696d68f378eead12e1e4c44
SHA1a1e637c2761957a7d77962ee0b4dfadcf76b87d9
SHA256c24643e8f4705a7c579ba1c91661a980e435a5351d25adfe17c561b8b1ed983a
SHA512aaaf05b88afbcad4a9e7c26143a2f09d654d29c1b6f9294e04a2005b084881e68311e3d69f3fdf48103296fe96e21ef206a9a9e7b40692c7669a25c7066c47bc
-
Filesize
613KB
MD58fbfefea02c769df0e2f60b8c115a71d
SHA10dda6dab7d4aed7b08ef7e08a7b79de4d8637b70
SHA25610132a213f8540699f7e978b68e634993740c8b266d49c13557d77c15e15d2e9
SHA5127fe0e255a5253e71c0759f1f9a4ee1ec573182606d47eaa6ad76769688ef926678450b68f90e0865904111e31080f2ecb42060f474dfc2f5648b0e438581e70e
-
Filesize
483KB
MD52c0c11f4108db83f6b6eab0d92440b83
SHA1a20c8f54056f55c818c1862f5322501f89a35b62
SHA256cce147fa7eb25b7d3b70daa553125eb58c9c03b7975269a3e50de19b1aca0c6e
SHA51241349c6b9c84e44130b4d4c4f8548568965ab336dffcab53a4fd240f8406c233e3348009def4d387aa0004f5d513f4300bf1844ac7d1a81da622ff501a62e1cd