Analysis
-
max time kernel
140s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-09-2024 18:35
Static task
static1
Behavioral task
behavioral1
Sample
e7758bdf928ea02f6cdd0f5519832836_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e7758bdf928ea02f6cdd0f5519832836_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e7758bdf928ea02f6cdd0f5519832836_JaffaCakes118.exe
-
Size
285KB
-
MD5
e7758bdf928ea02f6cdd0f5519832836
-
SHA1
449fbcfcff89db2b3805597402135b2b7eeb4c29
-
SHA256
f08eab2ac9a885faf009cb25a028207f715ae01fec503d42262680ecb7965966
-
SHA512
6630758d1cc4d2a43c105eda3bd8145e1b2c0f2539e69c62f3e970a4ced06ac5509a1e5831e7969dcf69217cf48b5db9f8ba4d37228418d68ba8660c6bfe76b3
-
SSDEEP
6144:q3OJYTtoMLh+3p26R+7O1ysus4rGLZDPb9fU2Zum:Hwcp2WuvyZDPxfU2ZZ
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" e7758bdf928ea02f6cdd0f5519832836_JaffaCakes118.exe -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 2332 FC9.tmp -
Loads dropped DLL 2 IoCs
pid Process 2792 e7758bdf928ea02f6cdd0f5519832836_JaffaCakes118.exe 2792 e7758bdf928ea02f6cdd0f5519832836_JaffaCakes118.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2792-2-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2792-11-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2792-13-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2148-15-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2148-14-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2792-119-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1220-123-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2792-298-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2792-303-0x0000000000400000-0x000000000046B000-memory.dmp upx -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\01B.exe = "C:\\Program Files (x86)\\LP\\073B\\01B.exe" e7758bdf928ea02f6cdd0f5519832836_JaffaCakes118.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\LP\073B\01B.exe e7758bdf928ea02f6cdd0f5519832836_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\LP\073B\FC9.tmp e7758bdf928ea02f6cdd0f5519832836_JaffaCakes118.exe File created C:\Program Files (x86)\LP\073B\01B.exe e7758bdf928ea02f6cdd0f5519832836_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e7758bdf928ea02f6cdd0f5519832836_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FC9.tmp -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2792 e7758bdf928ea02f6cdd0f5519832836_JaffaCakes118.exe 2792 e7758bdf928ea02f6cdd0f5519832836_JaffaCakes118.exe 2792 e7758bdf928ea02f6cdd0f5519832836_JaffaCakes118.exe 2792 e7758bdf928ea02f6cdd0f5519832836_JaffaCakes118.exe 2792 e7758bdf928ea02f6cdd0f5519832836_JaffaCakes118.exe 2792 e7758bdf928ea02f6cdd0f5519832836_JaffaCakes118.exe 2792 e7758bdf928ea02f6cdd0f5519832836_JaffaCakes118.exe 2792 e7758bdf928ea02f6cdd0f5519832836_JaffaCakes118.exe 2792 e7758bdf928ea02f6cdd0f5519832836_JaffaCakes118.exe 2792 e7758bdf928ea02f6cdd0f5519832836_JaffaCakes118.exe 2792 e7758bdf928ea02f6cdd0f5519832836_JaffaCakes118.exe 2792 e7758bdf928ea02f6cdd0f5519832836_JaffaCakes118.exe 2792 e7758bdf928ea02f6cdd0f5519832836_JaffaCakes118.exe 2792 e7758bdf928ea02f6cdd0f5519832836_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1004 explorer.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeRestorePrivilege 1628 msiexec.exe Token: SeTakeOwnershipPrivilege 1628 msiexec.exe Token: SeSecurityPrivilege 1628 msiexec.exe Token: SeShutdownPrivilege 1004 explorer.exe Token: SeShutdownPrivilege 1004 explorer.exe Token: SeShutdownPrivilege 1004 explorer.exe Token: SeShutdownPrivilege 1004 explorer.exe Token: SeShutdownPrivilege 1004 explorer.exe Token: SeShutdownPrivilege 1004 explorer.exe Token: SeShutdownPrivilege 1004 explorer.exe Token: SeShutdownPrivilege 1004 explorer.exe Token: SeShutdownPrivilege 1004 explorer.exe Token: SeShutdownPrivilege 1004 explorer.exe Token: SeShutdownPrivilege 1004 explorer.exe Token: SeShutdownPrivilege 1004 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 1004 explorer.exe 1004 explorer.exe 1004 explorer.exe 1004 explorer.exe 1004 explorer.exe 1004 explorer.exe 1004 explorer.exe 1004 explorer.exe 1004 explorer.exe 1004 explorer.exe 1004 explorer.exe 1004 explorer.exe 1004 explorer.exe 1004 explorer.exe 1004 explorer.exe 1004 explorer.exe 1004 explorer.exe 1004 explorer.exe 1004 explorer.exe 1004 explorer.exe 1004 explorer.exe 1004 explorer.exe 1004 explorer.exe 1004 explorer.exe 1004 explorer.exe 1004 explorer.exe 1004 explorer.exe 1004 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 1004 explorer.exe 1004 explorer.exe 1004 explorer.exe 1004 explorer.exe 1004 explorer.exe 1004 explorer.exe 1004 explorer.exe 1004 explorer.exe 1004 explorer.exe 1004 explorer.exe 1004 explorer.exe 1004 explorer.exe 1004 explorer.exe 1004 explorer.exe 1004 explorer.exe 1004 explorer.exe 1004 explorer.exe 1004 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2792 wrote to memory of 2148 2792 e7758bdf928ea02f6cdd0f5519832836_JaffaCakes118.exe 30 PID 2792 wrote to memory of 2148 2792 e7758bdf928ea02f6cdd0f5519832836_JaffaCakes118.exe 30 PID 2792 wrote to memory of 2148 2792 e7758bdf928ea02f6cdd0f5519832836_JaffaCakes118.exe 30 PID 2792 wrote to memory of 2148 2792 e7758bdf928ea02f6cdd0f5519832836_JaffaCakes118.exe 30 PID 2792 wrote to memory of 1220 2792 e7758bdf928ea02f6cdd0f5519832836_JaffaCakes118.exe 33 PID 2792 wrote to memory of 1220 2792 e7758bdf928ea02f6cdd0f5519832836_JaffaCakes118.exe 33 PID 2792 wrote to memory of 1220 2792 e7758bdf928ea02f6cdd0f5519832836_JaffaCakes118.exe 33 PID 2792 wrote to memory of 1220 2792 e7758bdf928ea02f6cdd0f5519832836_JaffaCakes118.exe 33 PID 2792 wrote to memory of 2332 2792 e7758bdf928ea02f6cdd0f5519832836_JaffaCakes118.exe 36 PID 2792 wrote to memory of 2332 2792 e7758bdf928ea02f6cdd0f5519832836_JaffaCakes118.exe 36 PID 2792 wrote to memory of 2332 2792 e7758bdf928ea02f6cdd0f5519832836_JaffaCakes118.exe 36 PID 2792 wrote to memory of 2332 2792 e7758bdf928ea02f6cdd0f5519832836_JaffaCakes118.exe 36 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer e7758bdf928ea02f6cdd0f5519832836_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" e7758bdf928ea02f6cdd0f5519832836_JaffaCakes118.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\e7758bdf928ea02f6cdd0f5519832836_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e7758bdf928ea02f6cdd0f5519832836_JaffaCakes118.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\e7758bdf928ea02f6cdd0f5519832836_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e7758bdf928ea02f6cdd0f5519832836_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\BE8C6\AFE07.exe%C:\Users\Admin\AppData\Roaming\BE8C62⤵PID:2148
-
-
C:\Users\Admin\AppData\Local\Temp\e7758bdf928ea02f6cdd0f5519832836_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e7758bdf928ea02f6cdd0f5519832836_JaffaCakes118.exe startC:\Program Files (x86)\C6852\lvvm.exe%C:\Program Files (x86)\C68522⤵PID:1220
-
-
C:\Program Files (x86)\LP\073B\FC9.tmp"C:\Program Files (x86)\LP\073B\FC9.tmp"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2332
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1628
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1004
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD51c84940a72c7ec2064c98d2e900b1104
SHA1450da3911c0778c523ae0f17b7101ec426b2011c
SHA2564b8a63c2e21e8e1a6c8e4cf3cb85bd434894d27554a9ca5340553ffe9b71f5ce
SHA512591b12c0daea44797e9b41408208ce2363f04b7ab74c660da91b8674f1bf7beb8766a5774dec47c2754567c3fa027cd96aca0baec01713a1bf6f56f698f19b9b
-
Filesize
600B
MD5c0a01cd20f94f41871465f3b185a8040
SHA10ab255b178df276f3669b474a305deb96c99a220
SHA25699d78df14dfa06adb548fd0fefc63e1341f17278341b55afe04b2d2f2d8b5053
SHA512be0354d3184beab758b206414a90ad755d79b5c7dd7e324b1d972ab67dc75b8b82bf896bb76a3182454fe948a2c4133ac9219b28c7a1b49995915c0e59cc8814
-
Filesize
1KB
MD5db39003ca08faf11f67c4ee0984f8786
SHA137fefb98297a667335920dd168699a2eb63e4135
SHA2569119f594c0d068f5993ff06775594d9e66377246490bbd3052e6bd52483d8583
SHA512672dc6b5872b531389a4aa9deffe98eb3e9d3a0f563fdc548e61e55a2d641f7e1bc38e0417e805a32ae2224448c56eb312926d1aa4686f19b753ec0fe2c26108
-
Filesize
101KB
MD5d05e213f1756ab068c1d0c2ff369f13f
SHA1d4fd2de345b7cd63a60f74529cef21c2ef1ddd02
SHA256e66de59c866eb7d4576a153630b056450c79ca0a1063c09e3f46223c144d4db7
SHA512f713d260921e07b8521de257548630439375f574e2fc68bec305809e80df6d70a1674642e94572aecd6e3692a64587f3e9e5f3506ea6dadfd9cc46aa3f7e8422