Analysis
-
max time kernel
140s -
max time network
66s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20/09/2024, 09:20
Static task
static1
Behavioral task
behavioral1
Sample
ed498471068c50ccdad664f698b56f4a_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ed498471068c50ccdad664f698b56f4a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ed498471068c50ccdad664f698b56f4a_JaffaCakes118.exe
-
Size
172KB
-
MD5
ed498471068c50ccdad664f698b56f4a
-
SHA1
26587940f0d41b1cc6dd2954b7d1cad0e77dd765
-
SHA256
20913ed5548410745729c3f425f22bdf4e6acb47afa79756911fe5946b5f835c
-
SHA512
a0f71dcfb163560032e883b69930c2240a695e50bb3f36693106b0144202067f321247bfa61effd84565fe89dcecce40d3d45c8a5629aeb734e25876ade86afd
-
SSDEEP
3072:6UijtdFH9aEdozWO/sn3IFEUEckt5kFxmjmfGZKKXZxvpDNR4Cb/jteHV:6JFo/1FEUjk20mOZfZxvpBbVeHV
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" ed498471068c50ccdad664f698b56f4a_JaffaCakes118.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2104-2-0x0000000000400000-0x000000000044D000-memory.dmp upx behavioral1/memory/2076-14-0x0000000000400000-0x000000000044D000-memory.dmp upx behavioral1/memory/2076-12-0x0000000000400000-0x000000000044D000-memory.dmp upx behavioral1/memory/2104-15-0x0000000000400000-0x000000000044D000-memory.dmp upx behavioral1/memory/2104-78-0x0000000000400000-0x000000000044D000-memory.dmp upx behavioral1/memory/2644-80-0x0000000000400000-0x000000000044D000-memory.dmp upx behavioral1/memory/2644-81-0x0000000000400000-0x000000000044D000-memory.dmp upx behavioral1/memory/2104-187-0x0000000000400000-0x000000000044D000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\CEA.exe = "C:\\Program Files (x86)\\Internet Explorer\\D3A2\\CEA.exe" ed498471068c50ccdad664f698b56f4a_JaffaCakes118.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Internet Explorer\D3A2\CEA.exe ed498471068c50ccdad664f698b56f4a_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Internet Explorer\D3A2\CEA.exe ed498471068c50ccdad664f698b56f4a_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ed498471068c50ccdad664f698b56f4a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ed498471068c50ccdad664f698b56f4a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ed498471068c50ccdad664f698b56f4a_JaffaCakes118.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2104 ed498471068c50ccdad664f698b56f4a_JaffaCakes118.exe 2104 ed498471068c50ccdad664f698b56f4a_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 852 explorer.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeShutdownPrivilege 852 explorer.exe Token: SeShutdownPrivilege 852 explorer.exe Token: SeShutdownPrivilege 852 explorer.exe Token: SeShutdownPrivilege 852 explorer.exe Token: SeShutdownPrivilege 852 explorer.exe Token: SeShutdownPrivilege 852 explorer.exe Token: SeShutdownPrivilege 852 explorer.exe Token: SeShutdownPrivilege 852 explorer.exe Token: SeShutdownPrivilege 852 explorer.exe Token: SeShutdownPrivilege 852 explorer.exe Token: 33 2304 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2304 AUDIODG.EXE Token: 33 2304 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2304 AUDIODG.EXE Token: SeShutdownPrivilege 852 explorer.exe Token: SeShutdownPrivilege 852 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe -
Suspicious use of SendNotifyMessage 22 IoCs
pid Process 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe 852 explorer.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2104 wrote to memory of 2076 2104 ed498471068c50ccdad664f698b56f4a_JaffaCakes118.exe 29 PID 2104 wrote to memory of 2076 2104 ed498471068c50ccdad664f698b56f4a_JaffaCakes118.exe 29 PID 2104 wrote to memory of 2076 2104 ed498471068c50ccdad664f698b56f4a_JaffaCakes118.exe 29 PID 2104 wrote to memory of 2076 2104 ed498471068c50ccdad664f698b56f4a_JaffaCakes118.exe 29 PID 2104 wrote to memory of 2644 2104 ed498471068c50ccdad664f698b56f4a_JaffaCakes118.exe 31 PID 2104 wrote to memory of 2644 2104 ed498471068c50ccdad664f698b56f4a_JaffaCakes118.exe 31 PID 2104 wrote to memory of 2644 2104 ed498471068c50ccdad664f698b56f4a_JaffaCakes118.exe 31 PID 2104 wrote to memory of 2644 2104 ed498471068c50ccdad664f698b56f4a_JaffaCakes118.exe 31 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" ed498471068c50ccdad664f698b56f4a_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer ed498471068c50ccdad664f698b56f4a_JaffaCakes118.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed498471068c50ccdad664f698b56f4a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ed498471068c50ccdad664f698b56f4a_JaffaCakes118.exe"1⤵
- Modifies security service
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\ed498471068c50ccdad664f698b56f4a_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\ed498471068c50ccdad664f698b56f4a_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\2286A\67ED3.exe%C:\Users\Admin\AppData\Roaming\2286A2⤵
- System Location Discovery: System Language Discovery
PID:2076
-
-
C:\Users\Admin\AppData\Local\Temp\ed498471068c50ccdad664f698b56f4a_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\ed498471068c50ccdad664f698b56f4a_JaffaCakes118.exe startC:\Program Files (x86)\6A068\lvvm.exe%C:\Program Files (x86)\6A0682⤵
- System Location Discovery: System Language Discovery
PID:2644
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:852
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4741⤵
- Suspicious use of AdjustPrivilegeToken
PID:2304
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b71d2c65ae31ad0ce42c77f7a95d614e
SHA111d9188f2b0de98bdc09c800d0ec1fde880d9752
SHA256291223557c205772895957e1a32bdb3cb6e48a8f3d9d3a1330bfd61c579cf7b7
SHA512abc939f1a43ca3d9dafd2c2c5a1e1f82837e1a586cf17980356cf98e8d36f3f9a40930c02ef519c8b060668a64a1199e778e3e8462a09ffb38bdac5979817fd7
-
Filesize
600B
MD55c02387fdf7a9e73e20b5a74fed4f476
SHA19e0d6e6a07d723785fd25499a43ea5d9eb881962
SHA2564948110d157cd1c1afe375c2e61c2ff5d43650cafb9732b50549b124eb2d7544
SHA512c76150da5b9be1c43e3ff87dcc38ae9f3eab80df258bfc85ef58ef7e8b8be571537cc7200b11d5861936527745738b940f841a7c77d5864e253153694d6271c0
-
Filesize
996B
MD5c063cee0a8cb2810acddfad5a7be7b42
SHA192f7a6a9c9d28e8bbd7af030ca876b8c5758a09b
SHA2569c8ad7dd891fc6b5130762fcf5c6d53df4a8242ac5037c9700101c40957ebe04
SHA5127dc976e5bc43d3c343352f243c411572db9d7263a376eaa05ddeb0bf71b7bc2ac9928d37ea59ac744d0b8f6d564510e7d875599b2cbb79c8af636051681af6e8