Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/09/2024, 05:20
Behavioral task
behavioral1
Sample
ecea1b9ef4553b388a822cd4634706ed_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
ecea1b9ef4553b388a822cd4634706ed_JaffaCakes118.exe
-
Size
33KB
-
MD5
ecea1b9ef4553b388a822cd4634706ed
-
SHA1
527fd2fa760a20a0ebf0beba2dd36f53b54f5ff6
-
SHA256
470b50bc328ed4fc1a1a0f71178eb731eb5c00efdeeffac5daef4e369f86537a
-
SHA512
85581d305609ee9c20f6fa3412b9d2dd90f453cc12403fb45482cc8829fe469102c69ec71778585e1257e6be4bf1e28f7e8890a70eac9fa455dc23a3490f8939
-
SSDEEP
384:96Tp0OfNRSZe+1i3o0UI/BUgInq+AQBOXzn3q+pWNAkSmyb2ss7vYhuwwP8R8ERv:9ax49s40bSBfIzpWN9abK7vahBzHc
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1780 rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 1780 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1708-0-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral1/memory/1708-3-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral1/memory/1708-10-0x0000000000400000-0x0000000000416000-memory.dmp upx -
Drops file in System32 directory 8 IoCs
description ioc Process File created C:\Windows\SysWOW64\YUmidimap.dll ecea1b9ef4553b388a822cd4634706ed_JaffaCakes118.exe File created C:\Windows\SysWOW64\midimap.dll ecea1b9ef4553b388a822cd4634706ed_JaffaCakes118.exe File created C:\Windows\SysWOW64\dllcache\midimap.dll ecea1b9ef4553b388a822cd4634706ed_JaffaCakes118.exe File created C:\Windows\SysWOW64\sysapp19.dll ecea1b9ef4553b388a822cd4634706ed_JaffaCakes118.exe File created C:\Windows\SysWOW64\YUksuser.dll ecea1b9ef4553b388a822cd4634706ed_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\YUksuser.dll ecea1b9ef4553b388a822cd4634706ed_JaffaCakes118.exe File created C:\Windows\SysWOW64\ksuser.dll ecea1b9ef4553b388a822cd4634706ed_JaffaCakes118.exe File created C:\Windows\SysWOW64\dllcache\ksuser.dll ecea1b9ef4553b388a822cd4634706ed_JaffaCakes118.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2244 sc.exe 1792 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ecea1b9ef4553b388a822cd4634706ed_JaffaCakes118.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1708 ecea1b9ef4553b388a822cd4634706ed_JaffaCakes118.exe 1708 ecea1b9ef4553b388a822cd4634706ed_JaffaCakes118.exe 1708 ecea1b9ef4553b388a822cd4634706ed_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1708 ecea1b9ef4553b388a822cd4634706ed_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 1708 wrote to memory of 1444 1708 ecea1b9ef4553b388a822cd4634706ed_JaffaCakes118.exe 31 PID 1708 wrote to memory of 1444 1708 ecea1b9ef4553b388a822cd4634706ed_JaffaCakes118.exe 31 PID 1708 wrote to memory of 1444 1708 ecea1b9ef4553b388a822cd4634706ed_JaffaCakes118.exe 31 PID 1708 wrote to memory of 1444 1708 ecea1b9ef4553b388a822cd4634706ed_JaffaCakes118.exe 31 PID 1708 wrote to memory of 2244 1708 ecea1b9ef4553b388a822cd4634706ed_JaffaCakes118.exe 33 PID 1708 wrote to memory of 2244 1708 ecea1b9ef4553b388a822cd4634706ed_JaffaCakes118.exe 33 PID 1708 wrote to memory of 2244 1708 ecea1b9ef4553b388a822cd4634706ed_JaffaCakes118.exe 33 PID 1708 wrote to memory of 2244 1708 ecea1b9ef4553b388a822cd4634706ed_JaffaCakes118.exe 33 PID 1708 wrote to memory of 1792 1708 ecea1b9ef4553b388a822cd4634706ed_JaffaCakes118.exe 34 PID 1708 wrote to memory of 1792 1708 ecea1b9ef4553b388a822cd4634706ed_JaffaCakes118.exe 34 PID 1708 wrote to memory of 1792 1708 ecea1b9ef4553b388a822cd4634706ed_JaffaCakes118.exe 34 PID 1708 wrote to memory of 1792 1708 ecea1b9ef4553b388a822cd4634706ed_JaffaCakes118.exe 34 PID 1708 wrote to memory of 1780 1708 ecea1b9ef4553b388a822cd4634706ed_JaffaCakes118.exe 36 PID 1708 wrote to memory of 1780 1708 ecea1b9ef4553b388a822cd4634706ed_JaffaCakes118.exe 36 PID 1708 wrote to memory of 1780 1708 ecea1b9ef4553b388a822cd4634706ed_JaffaCakes118.exe 36 PID 1708 wrote to memory of 1780 1708 ecea1b9ef4553b388a822cd4634706ed_JaffaCakes118.exe 36 PID 1708 wrote to memory of 1780 1708 ecea1b9ef4553b388a822cd4634706ed_JaffaCakes118.exe 36 PID 1708 wrote to memory of 1780 1708 ecea1b9ef4553b388a822cd4634706ed_JaffaCakes118.exe 36 PID 1708 wrote to memory of 1780 1708 ecea1b9ef4553b388a822cd4634706ed_JaffaCakes118.exe 36 PID 1444 wrote to memory of 2624 1444 net.exe 38 PID 1444 wrote to memory of 2624 1444 net.exe 38 PID 1444 wrote to memory of 2624 1444 net.exe 38 PID 1444 wrote to memory of 2624 1444 net.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\ecea1b9ef4553b388a822cd4634706ed_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ecea1b9ef4553b388a822cd4634706ed_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\net.exenet stop cryptsvc2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop cryptsvc3⤵
- System Location Discovery: System Language Discovery
PID:2624
-
-
-
C:\Windows\SysWOW64\sc.exesc config cryptsvc start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2244
-
-
C:\Windows\SysWOW64\sc.exesc delete cryptsvc2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1792
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Users\Admin\AppData\Local\Temp\1726809612.dat, ServerMain c:\users\admin\appdata\local\temp\ecea1b9ef4553b388a822cd4634706ed_jaffacakes118.exe2⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1780
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD5c8231ddee76d543b53802dc4880022fb
SHA1a21bef1e579ed74fafa1f8075e5c96f78b341655
SHA25692887113a0418ca24942dd35b0d15f04ee35aadac83fefb8251d70aab242beac
SHA5122503492f54ed0398d581f8d00c8462d1ade63ea98c384f5b2aa1aaac1ad1daae05648947f29a252a69edec75a837523346282fe2572ca19b6ec6ab5d163d70eb