Analysis
-
max time kernel
63s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 08:31
Behavioral task
behavioral1
Sample
eaf2c492ac5261e9615911a755bf0f37_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
eaf2c492ac5261e9615911a755bf0f37_JaffaCakes118.exe
-
Size
424KB
-
MD5
eaf2c492ac5261e9615911a755bf0f37
-
SHA1
c4221a29c422628f70fb9f0380068286662e0f03
-
SHA256
398b69864c84106edd3005b5ffbf65a986f5249bcbadfef2e8b026c5e7e17e70
-
SHA512
b231763676616d48001d35fe8a0cde81c4d79dfe991e38256f7150de794aa50c5ab05d83caa1f4e5ac366edca0a8bb39cdd8639897b4bf5cf590b72081e819c9
-
SSDEEP
12288:VEJjzjvAIEoRaUQZZoNT+9ca1JfFVj1QoS:VIbAIEzUNCSaDj1
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1424-0-0x0000000000400000-0x0000000000543000-memory.dmp upx behavioral1/memory/1424-9-0x0000000000400000-0x0000000000543000-memory.dmp upx behavioral1/memory/1424-10-0x0000000000400000-0x0000000000543000-memory.dmp upx behavioral1/memory/1424-11-0x0000000000400000-0x0000000000543000-memory.dmp upx behavioral1/memory/1424-12-0x0000000000400000-0x0000000000543000-memory.dmp upx behavioral1/memory/1424-13-0x0000000000400000-0x0000000000543000-memory.dmp upx behavioral1/memory/1424-14-0x0000000000400000-0x0000000000543000-memory.dmp upx behavioral1/memory/1424-15-0x0000000000400000-0x0000000000543000-memory.dmp upx behavioral1/memory/1424-16-0x0000000000400000-0x0000000000543000-memory.dmp upx -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 eaf2c492ac5261e9615911a755bf0f37_JaffaCakes118.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2840 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eaf2c492ac5261e9615911a755bf0f37_JaffaCakes118.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 1424 eaf2c492ac5261e9615911a755bf0f37_JaffaCakes118.exe 1424 eaf2c492ac5261e9615911a755bf0f37_JaffaCakes118.exe 1424 eaf2c492ac5261e9615911a755bf0f37_JaffaCakes118.exe 1424 eaf2c492ac5261e9615911a755bf0f37_JaffaCakes118.exe 1424 eaf2c492ac5261e9615911a755bf0f37_JaffaCakes118.exe 1424 eaf2c492ac5261e9615911a755bf0f37_JaffaCakes118.exe 1424 eaf2c492ac5261e9615911a755bf0f37_JaffaCakes118.exe 1424 eaf2c492ac5261e9615911a755bf0f37_JaffaCakes118.exe 1424 eaf2c492ac5261e9615911a755bf0f37_JaffaCakes118.exe 1424 eaf2c492ac5261e9615911a755bf0f37_JaffaCakes118.exe 1424 eaf2c492ac5261e9615911a755bf0f37_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1424 eaf2c492ac5261e9615911a755bf0f37_JaffaCakes118.exe 1424 eaf2c492ac5261e9615911a755bf0f37_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1424 eaf2c492ac5261e9615911a755bf0f37_JaffaCakes118.exe 1424 eaf2c492ac5261e9615911a755bf0f37_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1424 wrote to memory of 2272 1424 eaf2c492ac5261e9615911a755bf0f37_JaffaCakes118.exe 29 PID 1424 wrote to memory of 2272 1424 eaf2c492ac5261e9615911a755bf0f37_JaffaCakes118.exe 29 PID 1424 wrote to memory of 2272 1424 eaf2c492ac5261e9615911a755bf0f37_JaffaCakes118.exe 29 PID 1424 wrote to memory of 2272 1424 eaf2c492ac5261e9615911a755bf0f37_JaffaCakes118.exe 29 PID 2272 wrote to memory of 2760 2272 cmd.exe 31 PID 2272 wrote to memory of 2760 2272 cmd.exe 31 PID 2272 wrote to memory of 2760 2272 cmd.exe 31 PID 2272 wrote to memory of 2760 2272 cmd.exe 31 PID 2760 wrote to memory of 2836 2760 net.exe 32 PID 2760 wrote to memory of 2836 2760 net.exe 32 PID 2760 wrote to memory of 2836 2760 net.exe 32 PID 2760 wrote to memory of 2836 2760 net.exe 32 PID 2272 wrote to memory of 2840 2272 cmd.exe 33 PID 2272 wrote to memory of 2840 2272 cmd.exe 33 PID 2272 wrote to memory of 2840 2272 cmd.exe 33 PID 2272 wrote to memory of 2840 2272 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\eaf2c492ac5261e9615911a755bf0f37_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eaf2c492ac5261e9615911a755bf0f37_JaffaCakes118.exe"1⤵
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\eaf2c492ac5261e9615911a755bf0f37_JaffaCakes118.exe.CuCHW\dis.bat2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\SysWOW64\net.exenet stop "PolicyAgent"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "PolicyAgent"4⤵
- System Location Discovery: System Language Discovery
PID:2836
-
-
-
C:\Windows\SysWOW64\sc.exesc config PolicyAgent start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2840
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63B
MD5070f1025dc93f20d1b28896c8ab01ff3
SHA13a646f02dbf445ea75f331d1128e711ea2463d64
SHA256e6374bfc2301536dc06ce5e26b299fad2c630cde8a47548cd31edd86deed38b3
SHA512c5017b2ad1b76b55ad49c41ea06decf71b5ee00934c583d919c489e6d4da506174dd7be62b36af6c3b77c6ae0fd6825fe3fbe86e881ef47bc1749e2c86c6edef