Analysis
-
max time kernel
140s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-09-2024 06:09
Static task
static1
Behavioral task
behavioral1
Sample
e87b199e8f7303fb45649a6d6646273a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e87b199e8f7303fb45649a6d6646273a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e87b199e8f7303fb45649a6d6646273a_JaffaCakes118.exe
-
Size
279KB
-
MD5
e87b199e8f7303fb45649a6d6646273a
-
SHA1
dc472035a12093f7a6011c89da9f9edee7535b49
-
SHA256
d5f1de70c29666a28ce504843460aa41f5dbb451f133a984af35911a1678bd0e
-
SHA512
3088643af8becd60d87207b3597c29a9cbe0155cbbafa61e8e7d5e01a76b5bc896738ba38bf8ca077260f37b9b8af127fc6bedf4adb1ff1f8d785e38e470514b
-
SSDEEP
6144:u7Op0l65RAHqjeEnoz5OEKS64y5eUSqX5kdpfkQr7ZBfE9M:u7aRGgdoz5LDsOddkUBc9M
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" e87b199e8f7303fb45649a6d6646273a_JaffaCakes118.exe -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 2340 A0C2.tmp -
Loads dropped DLL 2 IoCs
pid Process 2676 e87b199e8f7303fb45649a6d6646273a_JaffaCakes118.exe 2676 e87b199e8f7303fb45649a6d6646273a_JaffaCakes118.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2676-2-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2676-12-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2676-15-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2052-18-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2052-16-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2676-82-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2436-84-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2676-197-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2676-201-0x0000000000400000-0x000000000046B000-memory.dmp upx -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\A42.exe = "C:\\Program Files (x86)\\LP\\1DB7\\A42.exe" e87b199e8f7303fb45649a6d6646273a_JaffaCakes118.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\LP\1DB7\A42.exe e87b199e8f7303fb45649a6d6646273a_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\LP\1DB7\A0C2.tmp e87b199e8f7303fb45649a6d6646273a_JaffaCakes118.exe File created C:\Program Files (x86)\LP\1DB7\A42.exe e87b199e8f7303fb45649a6d6646273a_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e87b199e8f7303fb45649a6d6646273a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e87b199e8f7303fb45649a6d6646273a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A0C2.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e87b199e8f7303fb45649a6d6646273a_JaffaCakes118.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2676 e87b199e8f7303fb45649a6d6646273a_JaffaCakes118.exe 2676 e87b199e8f7303fb45649a6d6646273a_JaffaCakes118.exe 2676 e87b199e8f7303fb45649a6d6646273a_JaffaCakes118.exe 2676 e87b199e8f7303fb45649a6d6646273a_JaffaCakes118.exe 2676 e87b199e8f7303fb45649a6d6646273a_JaffaCakes118.exe 2676 e87b199e8f7303fb45649a6d6646273a_JaffaCakes118.exe 2676 e87b199e8f7303fb45649a6d6646273a_JaffaCakes118.exe 2676 e87b199e8f7303fb45649a6d6646273a_JaffaCakes118.exe 2676 e87b199e8f7303fb45649a6d6646273a_JaffaCakes118.exe 2676 e87b199e8f7303fb45649a6d6646273a_JaffaCakes118.exe 2676 e87b199e8f7303fb45649a6d6646273a_JaffaCakes118.exe 2676 e87b199e8f7303fb45649a6d6646273a_JaffaCakes118.exe 2676 e87b199e8f7303fb45649a6d6646273a_JaffaCakes118.exe 2676 e87b199e8f7303fb45649a6d6646273a_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1300 explorer.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeRestorePrivilege 2772 msiexec.exe Token: SeTakeOwnershipPrivilege 2772 msiexec.exe Token: SeSecurityPrivilege 2772 msiexec.exe Token: SeShutdownPrivilege 1300 explorer.exe Token: SeShutdownPrivilege 1300 explorer.exe Token: SeShutdownPrivilege 1300 explorer.exe Token: SeShutdownPrivilege 1300 explorer.exe Token: SeShutdownPrivilege 1300 explorer.exe Token: SeShutdownPrivilege 1300 explorer.exe Token: SeShutdownPrivilege 1300 explorer.exe Token: SeShutdownPrivilege 1300 explorer.exe Token: SeShutdownPrivilege 1300 explorer.exe Token: SeShutdownPrivilege 1300 explorer.exe Token: SeShutdownPrivilege 1300 explorer.exe Token: SeShutdownPrivilege 1300 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 1300 explorer.exe 1300 explorer.exe 1300 explorer.exe 1300 explorer.exe 1300 explorer.exe 1300 explorer.exe 1300 explorer.exe 1300 explorer.exe 1300 explorer.exe 1300 explorer.exe 1300 explorer.exe 1300 explorer.exe 1300 explorer.exe 1300 explorer.exe 1300 explorer.exe 1300 explorer.exe 1300 explorer.exe 1300 explorer.exe 1300 explorer.exe 1300 explorer.exe 1300 explorer.exe 1300 explorer.exe 1300 explorer.exe 1300 explorer.exe 1300 explorer.exe 1300 explorer.exe 1300 explorer.exe 1300 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 1300 explorer.exe 1300 explorer.exe 1300 explorer.exe 1300 explorer.exe 1300 explorer.exe 1300 explorer.exe 1300 explorer.exe 1300 explorer.exe 1300 explorer.exe 1300 explorer.exe 1300 explorer.exe 1300 explorer.exe 1300 explorer.exe 1300 explorer.exe 1300 explorer.exe 1300 explorer.exe 1300 explorer.exe 1300 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2676 wrote to memory of 2052 2676 e87b199e8f7303fb45649a6d6646273a_JaffaCakes118.exe 31 PID 2676 wrote to memory of 2052 2676 e87b199e8f7303fb45649a6d6646273a_JaffaCakes118.exe 31 PID 2676 wrote to memory of 2052 2676 e87b199e8f7303fb45649a6d6646273a_JaffaCakes118.exe 31 PID 2676 wrote to memory of 2052 2676 e87b199e8f7303fb45649a6d6646273a_JaffaCakes118.exe 31 PID 2676 wrote to memory of 2436 2676 e87b199e8f7303fb45649a6d6646273a_JaffaCakes118.exe 33 PID 2676 wrote to memory of 2436 2676 e87b199e8f7303fb45649a6d6646273a_JaffaCakes118.exe 33 PID 2676 wrote to memory of 2436 2676 e87b199e8f7303fb45649a6d6646273a_JaffaCakes118.exe 33 PID 2676 wrote to memory of 2436 2676 e87b199e8f7303fb45649a6d6646273a_JaffaCakes118.exe 33 PID 2676 wrote to memory of 2340 2676 e87b199e8f7303fb45649a6d6646273a_JaffaCakes118.exe 36 PID 2676 wrote to memory of 2340 2676 e87b199e8f7303fb45649a6d6646273a_JaffaCakes118.exe 36 PID 2676 wrote to memory of 2340 2676 e87b199e8f7303fb45649a6d6646273a_JaffaCakes118.exe 36 PID 2676 wrote to memory of 2340 2676 e87b199e8f7303fb45649a6d6646273a_JaffaCakes118.exe 36 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer e87b199e8f7303fb45649a6d6646273a_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" e87b199e8f7303fb45649a6d6646273a_JaffaCakes118.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\e87b199e8f7303fb45649a6d6646273a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e87b199e8f7303fb45649a6d6646273a_JaffaCakes118.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\e87b199e8f7303fb45649a6d6646273a_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e87b199e8f7303fb45649a6d6646273a_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\73E07\1F41D.exe%C:\Users\Admin\AppData\Roaming\73E072⤵
- System Location Discovery: System Language Discovery
PID:2052
-
-
C:\Users\Admin\AppData\Local\Temp\e87b199e8f7303fb45649a6d6646273a_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e87b199e8f7303fb45649a6d6646273a_JaffaCakes118.exe startC:\Program Files (x86)\07A73\lvvm.exe%C:\Program Files (x86)\07A732⤵
- System Location Discovery: System Language Discovery
PID:2436
-
-
C:\Program Files (x86)\LP\1DB7\A0C2.tmp"C:\Program Files (x86)\LP\1DB7\A0C2.tmp"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2340
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2772
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1300
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD59f7b85c7f2f92d42b4b4721d7bc91eb2
SHA163e9681a9c6b3bce99551cfd3934f117f03a19c3
SHA256331d6d20fff8d42c4a93d7e37cf435e83fd3c3dde3b4dff33d22599543edc721
SHA512699301ef515b49c3055342a504d25cdade7bbfa300b5b008558a90474b3ed93a5fad11c93a75eca752ee07fff5fdd8c2d9ccbefa8b66653bcc6cf2ba45dcae6b
-
Filesize
600B
MD59671500709f43706a302b66c561e9af7
SHA18c2ae56b398810c4c7fdd346c169e80df908488e
SHA2568ff431767be5f6da10b99038ec2cbe2a248753486c8d0dc254f7fc094624b60b
SHA512561863012d11c96d978e826afebc7c4fff41c8193bf0b6267c7aac5f756255331ba8cd9cc7671526e4cdce7bd2919cb709417d77957f56dcbba4a8d3fa0e2894
-
Filesize
996B
MD558bed65b1b4a80705d10186907c736b4
SHA1321a079bac4167d3028ceaaceee49b9c8e1b1f68
SHA256ef0ffecff4630348f75a28f4ceaed00cb2981657bb202e3caed047a2e4910373
SHA512e58103ea363d006200fec37918dae2e82946b90be246591ea5c84660c0aa393ae2804334b53f74645bfb7a123388006b10997b4d3be9ea0cbf9ee8bcdacba88b
-
Filesize
300B
MD5a603e3df10b0491389f7dca9c1612bce
SHA17c04f8684828ffbb793e4371086fc13d6ab4a832
SHA256eb78e8801c44306e56f8505a21f3f20be4f0dd550e89bd52fa5986f415330a2f
SHA512391a75da6db801d72f71e1785e20d741ae1318964b69749f1d8b6d2e6715b118db86baff20fe09efe5dff67c7a0f98b5287c5f62be12d78ba206c356fdce1cc1
-
Filesize
99KB
MD5cb853d0e676be7b23903aa89175d8d69
SHA12066462d42c45133df60c5e5f9e8956373d191b0
SHA2567291b34528651c542a4e09036bb828f27c9f75c134d2be3aed3e1c5a0db5fe20
SHA512bf96f4c8511929ef380562004211a72821330465538db6da3367cbce387092384265e0bfd4ab54e62b742d68d668ff1457f43381d7a770fd3027f3bab1f36038