Analysis
-
max time kernel
131s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/09/2024, 05:20
Behavioral task
behavioral1
Sample
ecea1b9ef4553b388a822cd4634706ed_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
ecea1b9ef4553b388a822cd4634706ed_JaffaCakes118.exe
-
Size
33KB
-
MD5
ecea1b9ef4553b388a822cd4634706ed
-
SHA1
527fd2fa760a20a0ebf0beba2dd36f53b54f5ff6
-
SHA256
470b50bc328ed4fc1a1a0f71178eb731eb5c00efdeeffac5daef4e369f86537a
-
SHA512
85581d305609ee9c20f6fa3412b9d2dd90f453cc12403fb45482cc8829fe469102c69ec71778585e1257e6be4bf1e28f7e8890a70eac9fa455dc23a3490f8939
-
SSDEEP
384:96Tp0OfNRSZe+1i3o0UI/BUgInq+AQBOXzn3q+pWNAkSmyb2ss7vYhuwwP8R8ERv:9ax49s40bSBfIzpWN9abK7vahBzHc
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1032 rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 1032 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/1496-0-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/memory/1496-4-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/memory/1496-14-0x0000000000400000-0x0000000000416000-memory.dmp upx -
Drops file in System32 directory 8 IoCs
description ioc Process File created C:\Windows\SysWOW64\dllcache\midimap.dll ecea1b9ef4553b388a822cd4634706ed_JaffaCakes118.exe File created C:\Windows\SysWOW64\sysapp19.dll ecea1b9ef4553b388a822cd4634706ed_JaffaCakes118.exe File created C:\Windows\SysWOW64\YUksuser.dll ecea1b9ef4553b388a822cd4634706ed_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\YUksuser.dll ecea1b9ef4553b388a822cd4634706ed_JaffaCakes118.exe File created C:\Windows\SysWOW64\ksuser.dll ecea1b9ef4553b388a822cd4634706ed_JaffaCakes118.exe File created C:\Windows\SysWOW64\dllcache\ksuser.dll ecea1b9ef4553b388a822cd4634706ed_JaffaCakes118.exe File created C:\Windows\SysWOW64\YUmidimap.dll ecea1b9ef4553b388a822cd4634706ed_JaffaCakes118.exe File created C:\Windows\SysWOW64\midimap.dll ecea1b9ef4553b388a822cd4634706ed_JaffaCakes118.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4276 sc.exe 4704 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ecea1b9ef4553b388a822cd4634706ed_JaffaCakes118.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1496 ecea1b9ef4553b388a822cd4634706ed_JaffaCakes118.exe 1496 ecea1b9ef4553b388a822cd4634706ed_JaffaCakes118.exe 1496 ecea1b9ef4553b388a822cd4634706ed_JaffaCakes118.exe 1496 ecea1b9ef4553b388a822cd4634706ed_JaffaCakes118.exe 1496 ecea1b9ef4553b388a822cd4634706ed_JaffaCakes118.exe 1496 ecea1b9ef4553b388a822cd4634706ed_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1496 ecea1b9ef4553b388a822cd4634706ed_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1496 wrote to memory of 3928 1496 ecea1b9ef4553b388a822cd4634706ed_JaffaCakes118.exe 97 PID 1496 wrote to memory of 3928 1496 ecea1b9ef4553b388a822cd4634706ed_JaffaCakes118.exe 97 PID 1496 wrote to memory of 3928 1496 ecea1b9ef4553b388a822cd4634706ed_JaffaCakes118.exe 97 PID 1496 wrote to memory of 4276 1496 ecea1b9ef4553b388a822cd4634706ed_JaffaCakes118.exe 98 PID 1496 wrote to memory of 4276 1496 ecea1b9ef4553b388a822cd4634706ed_JaffaCakes118.exe 98 PID 1496 wrote to memory of 4276 1496 ecea1b9ef4553b388a822cd4634706ed_JaffaCakes118.exe 98 PID 1496 wrote to memory of 4704 1496 ecea1b9ef4553b388a822cd4634706ed_JaffaCakes118.exe 99 PID 1496 wrote to memory of 4704 1496 ecea1b9ef4553b388a822cd4634706ed_JaffaCakes118.exe 99 PID 1496 wrote to memory of 4704 1496 ecea1b9ef4553b388a822cd4634706ed_JaffaCakes118.exe 99 PID 1496 wrote to memory of 1032 1496 ecea1b9ef4553b388a822cd4634706ed_JaffaCakes118.exe 103 PID 1496 wrote to memory of 1032 1496 ecea1b9ef4553b388a822cd4634706ed_JaffaCakes118.exe 103 PID 1496 wrote to memory of 1032 1496 ecea1b9ef4553b388a822cd4634706ed_JaffaCakes118.exe 103 PID 3928 wrote to memory of 5008 3928 net.exe 104 PID 3928 wrote to memory of 5008 3928 net.exe 104 PID 3928 wrote to memory of 5008 3928 net.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\ecea1b9ef4553b388a822cd4634706ed_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ecea1b9ef4553b388a822cd4634706ed_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\SysWOW64\net.exenet stop cryptsvc2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop cryptsvc3⤵
- System Location Discovery: System Language Discovery
PID:5008
-
-
-
C:\Windows\SysWOW64\sc.exesc config cryptsvc start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4276
-
-
C:\Windows\SysWOW64\sc.exesc delete cryptsvc2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4704
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Users\Admin\AppData\Local\Temp\1726809613.dat, ServerMain c:\users\admin\appdata\local\temp\ecea1b9ef4553b388a822cd4634706ed_jaffacakes118.exe2⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4356,i,16316361669272684588,6171287487746154806,262144 --variations-seed-version --mojo-platform-channel-handle=4080 /prefetch:81⤵PID:2352
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD593eab151681f6524ca618092739536b6
SHA1bcd4c9470258b02138b43d76c8a01643f16855ce
SHA256ec57aa2eb000268b46e389fb37d4e9996323773ba9dd50df38ab734d73eff574
SHA51231b1b80a20226d1341e67255bf62b970e29f8bf5fff080d7d320b2885f704f5bdbe1cb35d7673a799a3cca39946a39c76949041d51b959d48a9b12581873c005