Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/09/2024, 10:14
Static task
static1
Behavioral task
behavioral1
Sample
dffbcb725ff00f7014fd7d7856d527a7_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dffbcb725ff00f7014fd7d7856d527a7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dffbcb725ff00f7014fd7d7856d527a7_JaffaCakes118.exe
-
Size
196KB
-
MD5
dffbcb725ff00f7014fd7d7856d527a7
-
SHA1
5d03aecc0bc76134c1225d86ebf179f1cc52b573
-
SHA256
6ad721bd5cafd52c589d3c87c3612303a7573862b28abec8649f5af73583fe07
-
SHA512
6fce91f74fc79fb288ce0bd2d2a065d8d0fd5f4cdf0081ba691ddcb52a869eb241765ab5b0801941fd98df4012481ba2d657fbed4835455dba51393229532430
-
SSDEEP
6144:V1qcw5cc7UTKvNA1rxGkqdreVRQmUVCF6:j3IMW1OxGkqdCHQmU4F6
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4968 B6232F3AC2C.exe 4712 XN28925.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/4544-1-0x0000000000400000-0x0000000000484000-memory.dmp upx behavioral2/memory/4544-2-0x0000000000400000-0x0000000000484000-memory.dmp upx behavioral2/memory/4544-3-0x0000000000400000-0x0000000000484000-memory.dmp upx behavioral2/memory/4544-9-0x0000000000400000-0x0000000000484000-memory.dmp upx behavioral2/memory/4968-13-0x0000000000400000-0x0000000000484000-memory.dmp upx behavioral2/memory/4968-18-0x0000000000400000-0x0000000000484000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\4Y3Y0C3AVF7W1W5VXLRHHEX = "C:\\Recycle.Bin\\B6232F3AC2C.exe /q" XN28925.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dffbcb725ff00f7014fd7d7856d527a7_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language B6232F3AC2C.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XN28925.exe -
Modifies Internet Explorer Phishing Filter 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Software\Microsoft\Internet Explorer\PhishingFilter XN28925.exe Set value (int) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Internet Explorer\PhishingFilter\EnabledV8 = "0" XN28925.exe Set value (int) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Internet Explorer\PhishingFilter\ShownServiceDownBalloon = "0" XN28925.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Software\Microsoft\Internet Explorer\Recovery XN28925.exe Set value (int) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\ClearBrowsingHistoryOnExit = "0" XN28925.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4544 dffbcb725ff00f7014fd7d7856d527a7_JaffaCakes118.exe 4544 dffbcb725ff00f7014fd7d7856d527a7_JaffaCakes118.exe 4544 dffbcb725ff00f7014fd7d7856d527a7_JaffaCakes118.exe 4544 dffbcb725ff00f7014fd7d7856d527a7_JaffaCakes118.exe 4968 B6232F3AC2C.exe 4968 B6232F3AC2C.exe 4712 XN28925.exe 4712 XN28925.exe 4712 XN28925.exe 4712 XN28925.exe 4712 XN28925.exe 4712 XN28925.exe 4712 XN28925.exe 4712 XN28925.exe 4712 XN28925.exe 4712 XN28925.exe 4712 XN28925.exe 4712 XN28925.exe 4712 XN28925.exe 4712 XN28925.exe 4712 XN28925.exe 4712 XN28925.exe 4712 XN28925.exe 4712 XN28925.exe 4712 XN28925.exe 4712 XN28925.exe 4712 XN28925.exe 4712 XN28925.exe 4712 XN28925.exe 4712 XN28925.exe 4712 XN28925.exe 4712 XN28925.exe 4712 XN28925.exe 4712 XN28925.exe 4712 XN28925.exe 4712 XN28925.exe 4712 XN28925.exe 4712 XN28925.exe 4712 XN28925.exe 4712 XN28925.exe 4712 XN28925.exe 4712 XN28925.exe 4712 XN28925.exe 4712 XN28925.exe 4712 XN28925.exe 4712 XN28925.exe 4712 XN28925.exe 4712 XN28925.exe 4712 XN28925.exe 4712 XN28925.exe 4712 XN28925.exe 4712 XN28925.exe 4712 XN28925.exe 4712 XN28925.exe 4712 XN28925.exe 4712 XN28925.exe 4712 XN28925.exe 4712 XN28925.exe 4712 XN28925.exe 4712 XN28925.exe 4712 XN28925.exe 4712 XN28925.exe 4712 XN28925.exe 4712 XN28925.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4544 dffbcb725ff00f7014fd7d7856d527a7_JaffaCakes118.exe Token: SeDebugPrivilege 4544 dffbcb725ff00f7014fd7d7856d527a7_JaffaCakes118.exe Token: SeDebugPrivilege 4544 dffbcb725ff00f7014fd7d7856d527a7_JaffaCakes118.exe Token: SeDebugPrivilege 4544 dffbcb725ff00f7014fd7d7856d527a7_JaffaCakes118.exe Token: SeDebugPrivilege 4968 B6232F3AC2C.exe Token: SeDebugPrivilege 4968 B6232F3AC2C.exe Token: SeDebugPrivilege 4712 XN28925.exe Token: SeDebugPrivilege 4712 XN28925.exe Token: SeDebugPrivilege 4712 XN28925.exe Token: SeDebugPrivilege 4712 XN28925.exe Token: SeDebugPrivilege 4712 XN28925.exe Token: SeDebugPrivilege 4712 XN28925.exe Token: SeDebugPrivilege 4712 XN28925.exe Token: SeDebugPrivilege 4712 XN28925.exe Token: SeDebugPrivilege 4712 XN28925.exe Token: SeDebugPrivilege 4712 XN28925.exe Token: SeDebugPrivilege 4712 XN28925.exe Token: SeDebugPrivilege 4712 XN28925.exe Token: SeDebugPrivilege 4712 XN28925.exe Token: SeDebugPrivilege 4712 XN28925.exe Token: SeDebugPrivilege 4712 XN28925.exe Token: SeDebugPrivilege 4712 XN28925.exe Token: SeDebugPrivilege 4712 XN28925.exe Token: SeDebugPrivilege 4712 XN28925.exe Token: SeDebugPrivilege 4712 XN28925.exe Token: SeDebugPrivilege 4712 XN28925.exe Token: SeDebugPrivilege 4712 XN28925.exe Token: SeDebugPrivilege 4712 XN28925.exe Token: SeDebugPrivilege 4712 XN28925.exe Token: SeDebugPrivilege 4712 XN28925.exe Token: SeDebugPrivilege 4712 XN28925.exe Token: SeDebugPrivilege 4712 XN28925.exe Token: SeDebugPrivilege 4712 XN28925.exe Token: SeDebugPrivilege 4712 XN28925.exe Token: SeDebugPrivilege 4712 XN28925.exe Token: SeDebugPrivilege 4712 XN28925.exe Token: SeDebugPrivilege 4712 XN28925.exe Token: SeDebugPrivilege 4712 XN28925.exe Token: SeDebugPrivilege 4712 XN28925.exe Token: SeDebugPrivilege 4712 XN28925.exe Token: SeDebugPrivilege 4712 XN28925.exe Token: SeDebugPrivilege 4712 XN28925.exe Token: SeDebugPrivilege 4712 XN28925.exe Token: SeDebugPrivilege 4712 XN28925.exe Token: SeDebugPrivilege 4712 XN28925.exe Token: SeDebugPrivilege 4712 XN28925.exe Token: SeDebugPrivilege 4712 XN28925.exe Token: SeDebugPrivilege 4712 XN28925.exe Token: SeDebugPrivilege 4712 XN28925.exe Token: SeDebugPrivilege 4712 XN28925.exe Token: SeDebugPrivilege 4712 XN28925.exe Token: SeDebugPrivilege 4712 XN28925.exe Token: SeDebugPrivilege 4712 XN28925.exe Token: SeDebugPrivilege 4712 XN28925.exe Token: SeDebugPrivilege 4712 XN28925.exe Token: SeDebugPrivilege 4712 XN28925.exe Token: SeDebugPrivilege 4712 XN28925.exe Token: SeDebugPrivilege 4712 XN28925.exe Token: SeDebugPrivilege 4712 XN28925.exe Token: SeDebugPrivilege 4712 XN28925.exe Token: SeDebugPrivilege 4712 XN28925.exe Token: SeDebugPrivilege 4712 XN28925.exe Token: SeDebugPrivilege 4712 XN28925.exe Token: SeDebugPrivilege 4712 XN28925.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4544 wrote to memory of 4968 4544 dffbcb725ff00f7014fd7d7856d527a7_JaffaCakes118.exe 86 PID 4544 wrote to memory of 4968 4544 dffbcb725ff00f7014fd7d7856d527a7_JaffaCakes118.exe 86 PID 4544 wrote to memory of 4968 4544 dffbcb725ff00f7014fd7d7856d527a7_JaffaCakes118.exe 86 PID 4968 wrote to memory of 4712 4968 B6232F3AC2C.exe 88 PID 4968 wrote to memory of 4712 4968 B6232F3AC2C.exe 88 PID 4968 wrote to memory of 4712 4968 B6232F3AC2C.exe 88 PID 4968 wrote to memory of 4712 4968 B6232F3AC2C.exe 88 PID 4968 wrote to memory of 4712 4968 B6232F3AC2C.exe 88 PID 4712 wrote to memory of 4544 4712 XN28925.exe 82 PID 4712 wrote to memory of 4544 4712 XN28925.exe 82 PID 4712 wrote to memory of 4544 4712 XN28925.exe 82 PID 4712 wrote to memory of 4544 4712 XN28925.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\dffbcb725ff00f7014fd7d7856d527a7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dffbcb725ff00f7014fd7d7856d527a7_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Recycle.Bin\B6232F3AC2C.exe"C:\Recycle.Bin\B6232F3AC2C.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Users\Admin\AppData\Local\Temp\XN28925.exe"C:\Users\Admin\AppData\Local\Temp\XN28925.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4712
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25KB
MD50acdcf8c86eacc7a21b7107cf3fdc407
SHA1257a320059881568e23e3bb3f1071b7de272f955
SHA2567708e2ef8125c86c47d8d396a12071caae576b82cc4f14e412a46ec29b2b68c2
SHA51200c03f37e81921efec36d23efa7d7b3b0b23e9e19bea5c6c7182fc292321262e8d203d0f76f2f3754e89170e21ba6fdc5d76530043ff56d665d2c78a4525c00f
-
Filesize
196KB
MD5dffbcb725ff00f7014fd7d7856d527a7
SHA15d03aecc0bc76134c1225d86ebf179f1cc52b573
SHA2566ad721bd5cafd52c589d3c87c3612303a7573862b28abec8649f5af73583fe07
SHA5126fce91f74fc79fb288ce0bd2d2a065d8d0fd5f4cdf0081ba691ddcb52a869eb241765ab5b0801941fd98df4012481ba2d657fbed4835455dba51393229532430
-
Filesize
3KB
MD529090b6b4d6605a97ac760d06436ac2d
SHA1d929d3389642e52bae5ad8512293c9c4d3e4fab5
SHA25698a24f0caf5b578e230e6f1103a5fba6aecb28a9128cad5520fcde546d643272
SHA5129121ec42fa66e14a4fc3932c8dbcc8fb1a93ab9de00da57a82e176faa70b73f6992f8c5e2ab52c02fc28c8f0c59aee73b6fbbd39107db7d15105054f4390e9be