Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-09-2024 17:29
Behavioral task
behavioral1
Sample
ee1688de2b64a3936f74f74abb3563d6_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
ee1688de2b64a3936f74f74abb3563d6_JaffaCakes118.exe
-
Size
424KB
-
MD5
ee1688de2b64a3936f74f74abb3563d6
-
SHA1
897e17d5772f02051789e451a71a906f028fd67e
-
SHA256
511132cac2b56f90b8e600eb1a71bcd0efcaafb7810257fb4d393f4be58b2f5e
-
SHA512
700abbc123369d65c8a3c42bc6cd5e7563e5341032fb783d2793cc64fddaf9135bed497eb571919115f710f6eeb60a0a60308f6cad6154daea0517e90dd98414
-
SSDEEP
12288:QEJjzjvAIEoRaUQZZoNGI/TW2woGi8wxXyoS:QIbAIEzUNG4bwoj8wx
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/2128-0-0x0000000000400000-0x0000000000543000-memory.dmp upx behavioral2/memory/2128-4-0x0000000000400000-0x0000000000543000-memory.dmp upx behavioral2/memory/2128-5-0x0000000000400000-0x0000000000543000-memory.dmp upx behavioral2/memory/2128-6-0x0000000000400000-0x0000000000543000-memory.dmp upx behavioral2/memory/2128-7-0x0000000000400000-0x0000000000543000-memory.dmp upx behavioral2/memory/2128-8-0x0000000000400000-0x0000000000543000-memory.dmp upx behavioral2/memory/2128-9-0x0000000000400000-0x0000000000543000-memory.dmp upx -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 ee1688de2b64a3936f74f74abb3563d6_JaffaCakes118.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4120 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ee1688de2b64a3936f74f74abb3563d6_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2128 ee1688de2b64a3936f74f74abb3563d6_JaffaCakes118.exe 2128 ee1688de2b64a3936f74f74abb3563d6_JaffaCakes118.exe 2128 ee1688de2b64a3936f74f74abb3563d6_JaffaCakes118.exe 2128 ee1688de2b64a3936f74f74abb3563d6_JaffaCakes118.exe 2128 ee1688de2b64a3936f74f74abb3563d6_JaffaCakes118.exe 2128 ee1688de2b64a3936f74f74abb3563d6_JaffaCakes118.exe 2128 ee1688de2b64a3936f74f74abb3563d6_JaffaCakes118.exe 2128 ee1688de2b64a3936f74f74abb3563d6_JaffaCakes118.exe 2128 ee1688de2b64a3936f74f74abb3563d6_JaffaCakes118.exe 2128 ee1688de2b64a3936f74f74abb3563d6_JaffaCakes118.exe 2128 ee1688de2b64a3936f74f74abb3563d6_JaffaCakes118.exe 2128 ee1688de2b64a3936f74f74abb3563d6_JaffaCakes118.exe 2128 ee1688de2b64a3936f74f74abb3563d6_JaffaCakes118.exe 2128 ee1688de2b64a3936f74f74abb3563d6_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2128 ee1688de2b64a3936f74f74abb3563d6_JaffaCakes118.exe 2128 ee1688de2b64a3936f74f74abb3563d6_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2128 ee1688de2b64a3936f74f74abb3563d6_JaffaCakes118.exe 2128 ee1688de2b64a3936f74f74abb3563d6_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2128 wrote to memory of 1648 2128 ee1688de2b64a3936f74f74abb3563d6_JaffaCakes118.exe 82 PID 2128 wrote to memory of 1648 2128 ee1688de2b64a3936f74f74abb3563d6_JaffaCakes118.exe 82 PID 2128 wrote to memory of 1648 2128 ee1688de2b64a3936f74f74abb3563d6_JaffaCakes118.exe 82 PID 1648 wrote to memory of 4496 1648 cmd.exe 84 PID 1648 wrote to memory of 4496 1648 cmd.exe 84 PID 1648 wrote to memory of 4496 1648 cmd.exe 84 PID 4496 wrote to memory of 432 4496 net.exe 85 PID 4496 wrote to memory of 432 4496 net.exe 85 PID 4496 wrote to memory of 432 4496 net.exe 85 PID 1648 wrote to memory of 4120 1648 cmd.exe 86 PID 1648 wrote to memory of 4120 1648 cmd.exe 86 PID 1648 wrote to memory of 4120 1648 cmd.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee1688de2b64a3936f74f74abb3563d6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ee1688de2b64a3936f74f74abb3563d6_JaffaCakes118.exe"1⤵
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\ee1688de2b64a3936f74f74abb3563d6_JaffaCakes118.exe.BD5Ud\dis.bat2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\net.exenet stop "PolicyAgent"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "PolicyAgent"4⤵
- System Location Discovery: System Language Discovery
PID:432
-
-
-
C:\Windows\SysWOW64\sc.exesc config PolicyAgent start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4120
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63B
MD5070f1025dc93f20d1b28896c8ab01ff3
SHA13a646f02dbf445ea75f331d1128e711ea2463d64
SHA256e6374bfc2301536dc06ce5e26b299fad2c630cde8a47548cd31edd86deed38b3
SHA512c5017b2ad1b76b55ad49c41ea06decf71b5ee00934c583d919c489e6d4da506174dd7be62b36af6c3b77c6ae0fd6825fe3fbe86e881ef47bc1749e2c86c6edef