Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 18:19
Static task
static1
Behavioral task
behavioral1
Sample
e0c2ac9ab787d6b76160c9f6da9dd859_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e0c2ac9ab787d6b76160c9f6da9dd859_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e0c2ac9ab787d6b76160c9f6da9dd859_JaffaCakes118.exe
-
Size
274KB
-
MD5
e0c2ac9ab787d6b76160c9f6da9dd859
-
SHA1
0132d8559f3cc3a019d1effeef2a46a8ab9cebe0
-
SHA256
0a4ecb9bd2b1fda79b92f339ac66f60afffabf84b13e0b561ae947d49aba3e09
-
SHA512
894c27abbb7c0641caed6f7a715824c92317dbf3fa4cff3601cc4e1092a8d3ad95c92e2003d1c928ea82bfff122e122961ea4b5c8f594e5609c63e036508d86b
-
SSDEEP
6144:maeACrvpKo3oDY68SLvHseVAoDrxf+2WDzE+T+VWVG8IQbF:m5vph+Y68SLRNDrxf+2uzR+VANIQbF
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" e0c2ac9ab787d6b76160c9f6da9dd859_JaffaCakes118.exe -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 2264 BE3.tmp -
Loads dropped DLL 2 IoCs
pid Process 2236 e0c2ac9ab787d6b76160c9f6da9dd859_JaffaCakes118.exe 2236 e0c2ac9ab787d6b76160c9f6da9dd859_JaffaCakes118.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2236-3-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2236-13-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2608-16-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2608-18-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2236-15-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral1/memory/2236-143-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1396-145-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1396-146-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2236-325-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2236-329-0x0000000000400000-0x000000000046A000-memory.dmp upx -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\BF8.exe = "C:\\Program Files (x86)\\LP\\43C9\\BF8.exe" e0c2ac9ab787d6b76160c9f6da9dd859_JaffaCakes118.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\LP\43C9\BF8.exe e0c2ac9ab787d6b76160c9f6da9dd859_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\LP\43C9\BF8.exe e0c2ac9ab787d6b76160c9f6da9dd859_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\LP\43C9\BE3.tmp e0c2ac9ab787d6b76160c9f6da9dd859_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BE3.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e0c2ac9ab787d6b76160c9f6da9dd859_JaffaCakes118.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2236 e0c2ac9ab787d6b76160c9f6da9dd859_JaffaCakes118.exe 2236 e0c2ac9ab787d6b76160c9f6da9dd859_JaffaCakes118.exe 2236 e0c2ac9ab787d6b76160c9f6da9dd859_JaffaCakes118.exe 2236 e0c2ac9ab787d6b76160c9f6da9dd859_JaffaCakes118.exe 2236 e0c2ac9ab787d6b76160c9f6da9dd859_JaffaCakes118.exe 2236 e0c2ac9ab787d6b76160c9f6da9dd859_JaffaCakes118.exe 2236 e0c2ac9ab787d6b76160c9f6da9dd859_JaffaCakes118.exe 2236 e0c2ac9ab787d6b76160c9f6da9dd859_JaffaCakes118.exe 2236 e0c2ac9ab787d6b76160c9f6da9dd859_JaffaCakes118.exe 2236 e0c2ac9ab787d6b76160c9f6da9dd859_JaffaCakes118.exe 2236 e0c2ac9ab787d6b76160c9f6da9dd859_JaffaCakes118.exe 2236 e0c2ac9ab787d6b76160c9f6da9dd859_JaffaCakes118.exe 2236 e0c2ac9ab787d6b76160c9f6da9dd859_JaffaCakes118.exe 2236 e0c2ac9ab787d6b76160c9f6da9dd859_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1284 explorer.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeRestorePrivilege 316 msiexec.exe Token: SeTakeOwnershipPrivilege 316 msiexec.exe Token: SeSecurityPrivilege 316 msiexec.exe Token: SeShutdownPrivilege 1284 explorer.exe Token: SeShutdownPrivilege 1284 explorer.exe Token: SeShutdownPrivilege 1284 explorer.exe Token: SeShutdownPrivilege 1284 explorer.exe Token: SeShutdownPrivilege 1284 explorer.exe Token: SeShutdownPrivilege 1284 explorer.exe Token: SeShutdownPrivilege 1284 explorer.exe Token: SeShutdownPrivilege 1284 explorer.exe Token: SeShutdownPrivilege 1284 explorer.exe Token: SeShutdownPrivilege 1284 explorer.exe Token: SeShutdownPrivilege 1284 explorer.exe Token: SeShutdownPrivilege 1284 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 1284 explorer.exe 1284 explorer.exe 1284 explorer.exe 1284 explorer.exe 1284 explorer.exe 1284 explorer.exe 1284 explorer.exe 1284 explorer.exe 1284 explorer.exe 1284 explorer.exe 1284 explorer.exe 1284 explorer.exe 1284 explorer.exe 1284 explorer.exe 1284 explorer.exe 1284 explorer.exe 1284 explorer.exe 1284 explorer.exe 1284 explorer.exe 1284 explorer.exe 1284 explorer.exe 1284 explorer.exe 1284 explorer.exe 1284 explorer.exe 1284 explorer.exe 1284 explorer.exe 1284 explorer.exe 1284 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 1284 explorer.exe 1284 explorer.exe 1284 explorer.exe 1284 explorer.exe 1284 explorer.exe 1284 explorer.exe 1284 explorer.exe 1284 explorer.exe 1284 explorer.exe 1284 explorer.exe 1284 explorer.exe 1284 explorer.exe 1284 explorer.exe 1284 explorer.exe 1284 explorer.exe 1284 explorer.exe 1284 explorer.exe 1284 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2608 2236 e0c2ac9ab787d6b76160c9f6da9dd859_JaffaCakes118.exe 30 PID 2236 wrote to memory of 2608 2236 e0c2ac9ab787d6b76160c9f6da9dd859_JaffaCakes118.exe 30 PID 2236 wrote to memory of 2608 2236 e0c2ac9ab787d6b76160c9f6da9dd859_JaffaCakes118.exe 30 PID 2236 wrote to memory of 2608 2236 e0c2ac9ab787d6b76160c9f6da9dd859_JaffaCakes118.exe 30 PID 2236 wrote to memory of 1396 2236 e0c2ac9ab787d6b76160c9f6da9dd859_JaffaCakes118.exe 32 PID 2236 wrote to memory of 1396 2236 e0c2ac9ab787d6b76160c9f6da9dd859_JaffaCakes118.exe 32 PID 2236 wrote to memory of 1396 2236 e0c2ac9ab787d6b76160c9f6da9dd859_JaffaCakes118.exe 32 PID 2236 wrote to memory of 1396 2236 e0c2ac9ab787d6b76160c9f6da9dd859_JaffaCakes118.exe 32 PID 2236 wrote to memory of 2264 2236 e0c2ac9ab787d6b76160c9f6da9dd859_JaffaCakes118.exe 36 PID 2236 wrote to memory of 2264 2236 e0c2ac9ab787d6b76160c9f6da9dd859_JaffaCakes118.exe 36 PID 2236 wrote to memory of 2264 2236 e0c2ac9ab787d6b76160c9f6da9dd859_JaffaCakes118.exe 36 PID 2236 wrote to memory of 2264 2236 e0c2ac9ab787d6b76160c9f6da9dd859_JaffaCakes118.exe 36 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer e0c2ac9ab787d6b76160c9f6da9dd859_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" e0c2ac9ab787d6b76160c9f6da9dd859_JaffaCakes118.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\e0c2ac9ab787d6b76160c9f6da9dd859_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e0c2ac9ab787d6b76160c9f6da9dd859_JaffaCakes118.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\e0c2ac9ab787d6b76160c9f6da9dd859_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e0c2ac9ab787d6b76160c9f6da9dd859_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\9758A\3CD43.exe%C:\Users\Admin\AppData\Roaming\9758A2⤵PID:2608
-
-
C:\Users\Admin\AppData\Local\Temp\e0c2ac9ab787d6b76160c9f6da9dd859_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e0c2ac9ab787d6b76160c9f6da9dd859_JaffaCakes118.exe startC:\Program Files (x86)\8AB3C\lvvm.exe%C:\Program Files (x86)\8AB3C2⤵PID:1396
-
-
C:\Program Files (x86)\LP\43C9\BE3.tmp"C:\Program Files (x86)\LP\43C9\BE3.tmp"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2264
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:316
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1284
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD5c03840902454e51dfb2077d751f4b576
SHA11742242da419369bf18798f359e94c8588a01b76
SHA256f38cab942d37ccaf32e9a64738663475bdc6afb1795bb4f05ee5be94f38c5f14
SHA512137b88ff3afe221bec723d3cd217cf3638700a3e32a8472e6a9e67850a254946d56e4f3c817f5decff4c907ee056dc11a1570da93e8ea04032220f540ffb0a73
-
Filesize
600B
MD584ca51ab85015ea1163ee3a2e3b5da95
SHA1ff8abea29b5db7bf4e70413a81fae448daa78ee7
SHA256988d67114360ae4bff98a85edc3b87933faa31acc3c5db777a4555c7438afb0b
SHA512c7be69c1255fe98cccccb4379f5cdc99a4ab46692568357b5c4e99e70ff2a35ac67500e15dd328c4242d7bc7f67b9df5e5336849ca269e7abfe620c4361dd8b0
-
Filesize
97KB
MD5994f0bd73981d99eeb7919713db347b7
SHA13d98c89a85297d0ed683fdce7b5df3e213c32df8
SHA25609aa2af67111b1bd6b3195a3f47d5ed4f98cc0b80a8d2bc27f4ec591b6ae92c0
SHA512a1b091ca45ed3618785f06505cf5485af742ab538d9f449ef4693f981c63a932ca393f04b9dcbd68f82df1ec32d7955d709eb63ab144e41f258bb3c972d5d1ba