Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 05:47
Static task
static1
Behavioral task
behavioral1
Sample
eab2df02d7c5647e4b2838349d81f7d2_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eab2df02d7c5647e4b2838349d81f7d2_JaffaCakes118.exe
Resource
win10v2004-20240910-en
General
-
Target
eab2df02d7c5647e4b2838349d81f7d2_JaffaCakes118.exe
-
Size
845KB
-
MD5
eab2df02d7c5647e4b2838349d81f7d2
-
SHA1
f10d2e0ed5c13f04190cc141b51f1f60368f8164
-
SHA256
e6c88149ac0c62690a6416eb46c5af8f790c2f25da974737ae7cb196e40b5f2b
-
SHA512
5bbae44eb653d659528df12ba81022df23f055dff81fa45cff6ea1fecb8aaa87e23a46ce7f004c904251d62344f5a28e1364db523abb9e62fafa5c03feb96cac
-
SSDEEP
24576:1fUT67H4f6l1iIf9mT9SiwDzZr+pHlgQzlxn68bpVFnh:1fi6LJ/5nZr+VlgQzlxhFVFnh
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2820 isecurity.exe -
Loads dropped DLL 3 IoCs
pid Process 2968 eab2df02d7c5647e4b2838349d81f7d2_JaffaCakes118.exe 2968 eab2df02d7c5647e4b2838349d81f7d2_JaffaCakes118.exe 2968 eab2df02d7c5647e4b2838349d81f7d2_JaffaCakes118.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\Internet Security = "C:\\ProgramData\\isecurity.exe" isecurity.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\S: isecurity.exe File opened (read-only) \??\T: isecurity.exe File opened (read-only) \??\U: isecurity.exe File opened (read-only) \??\L: isecurity.exe File opened (read-only) \??\N: isecurity.exe File opened (read-only) \??\P: isecurity.exe File opened (read-only) \??\R: isecurity.exe File opened (read-only) \??\O: isecurity.exe File opened (read-only) \??\Y: isecurity.exe File opened (read-only) \??\W: isecurity.exe File opened (read-only) \??\Z: isecurity.exe File opened (read-only) \??\G: isecurity.exe File opened (read-only) \??\H: isecurity.exe File opened (read-only) \??\I: isecurity.exe File opened (read-only) \??\M: isecurity.exe File opened (read-only) \??\V: isecurity.exe File opened (read-only) \??\X: isecurity.exe File opened (read-only) \??\E: isecurity.exe File opened (read-only) \??\J: isecurity.exe File opened (read-only) \??\K: isecurity.exe File opened (read-only) \??\Q: isecurity.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 isecurity.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eab2df02d7c5647e4b2838349d81f7d2_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language isecurity.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2968 eab2df02d7c5647e4b2838349d81f7d2_JaffaCakes118.exe 2820 isecurity.exe 2820 isecurity.exe 2820 isecurity.exe 2820 isecurity.exe 2820 isecurity.exe 2820 isecurity.exe 2820 isecurity.exe 2820 isecurity.exe 2820 isecurity.exe 2820 isecurity.exe 2820 isecurity.exe 2820 isecurity.exe 2820 isecurity.exe 2820 isecurity.exe 2820 isecurity.exe 2820 isecurity.exe 2820 isecurity.exe 2820 isecurity.exe 2820 isecurity.exe 2820 isecurity.exe 2820 isecurity.exe 2820 isecurity.exe 2820 isecurity.exe 2820 isecurity.exe 2820 isecurity.exe 2820 isecurity.exe 2820 isecurity.exe 2820 isecurity.exe 2820 isecurity.exe 2820 isecurity.exe 2820 isecurity.exe 2820 isecurity.exe 2820 isecurity.exe 2820 isecurity.exe 2820 isecurity.exe 2820 isecurity.exe 2820 isecurity.exe 2820 isecurity.exe 2820 isecurity.exe 2820 isecurity.exe 2820 isecurity.exe 2820 isecurity.exe 2820 isecurity.exe 2820 isecurity.exe 2820 isecurity.exe 2820 isecurity.exe 2820 isecurity.exe 2820 isecurity.exe 2820 isecurity.exe 2820 isecurity.exe 2820 isecurity.exe 2820 isecurity.exe 2820 isecurity.exe 2820 isecurity.exe 2820 isecurity.exe 2820 isecurity.exe 2820 isecurity.exe 2820 isecurity.exe 2820 isecurity.exe 2820 isecurity.exe 2820 isecurity.exe 2820 isecurity.exe 2820 isecurity.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2968 eab2df02d7c5647e4b2838349d81f7d2_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 9 IoCs
pid Process 2820 isecurity.exe 2820 isecurity.exe 2820 isecurity.exe 2820 isecurity.exe 2820 isecurity.exe 2820 isecurity.exe 2820 isecurity.exe 2820 isecurity.exe 2820 isecurity.exe -
Suspicious use of SendNotifyMessage 9 IoCs
pid Process 2820 isecurity.exe 2820 isecurity.exe 2820 isecurity.exe 2820 isecurity.exe 2820 isecurity.exe 2820 isecurity.exe 2820 isecurity.exe 2820 isecurity.exe 2820 isecurity.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2820 isecurity.exe 2820 isecurity.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2968 wrote to memory of 2820 2968 eab2df02d7c5647e4b2838349d81f7d2_JaffaCakes118.exe 30 PID 2968 wrote to memory of 2820 2968 eab2df02d7c5647e4b2838349d81f7d2_JaffaCakes118.exe 30 PID 2968 wrote to memory of 2820 2968 eab2df02d7c5647e4b2838349d81f7d2_JaffaCakes118.exe 30 PID 2968 wrote to memory of 2820 2968 eab2df02d7c5647e4b2838349d81f7d2_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\eab2df02d7c5647e4b2838349d81f7d2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eab2df02d7c5647e4b2838349d81f7d2_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\ProgramData\isecurity.exeC:\ProgramData\isecurity.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2820
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
840KB
MD5f51011d03e45d9b3a68940ce3d6d90f3
SHA1b77669e69f8be58f18cd6771cc3862cd02d62963
SHA256e7465c386bf4c717dc457062e438920fbaec75cf20473d71403def2e531a391e
SHA512adab8c7cbf9cb8be7f43f651d5664e9e3d989cf81b1167897ecbeb890d10a8a432561e129109b28213844e5e836a5390b895112fc3bc1e192a97ed1e1c765724