Analysis
-
max time kernel
141s -
max time network
98s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 02:35
Static task
static1
Behavioral task
behavioral1
Sample
eee9d71cb5b67d3de45b0e08f30ebc94_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eee9d71cb5b67d3de45b0e08f30ebc94_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eee9d71cb5b67d3de45b0e08f30ebc94_JaffaCakes118.exe
-
Size
287KB
-
MD5
eee9d71cb5b67d3de45b0e08f30ebc94
-
SHA1
096aa85eee5ca5594e9b860d3b75e42e6f070e25
-
SHA256
b1f7334583a539325f6924375866a57c7c38e4d4bb5c05a006e79417878336a3
-
SHA512
0802b832c04dcd643df187d4b6c4b47f38419608b09bd66eff87e7ed3dc3a936b954a4b66ab341b2f668e41f24161ae5728b5cde5dc84eb50ad57e035694d39c
-
SSDEEP
6144:BXQ/QGnG9/CWXlyJMyi8lRXkM3HdpCdrhmKEZEwHojcR0NaXcWPdBl:BMGBr1AbxHdkd1fMEaypWP
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" eee9d71cb5b67d3de45b0e08f30ebc94_JaffaCakes118.exe -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 1488 7A00.tmp -
Loads dropped DLL 2 IoCs
pid Process 2248 eee9d71cb5b67d3de45b0e08f30ebc94_JaffaCakes118.exe 2248 eee9d71cb5b67d3de45b0e08f30ebc94_JaffaCakes118.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2248-2-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2248-3-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2248-12-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2248-13-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2344-15-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2344-17-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2168-107-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2248-150-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2248-278-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2248-284-0x0000000000400000-0x000000000046B000-memory.dmp upx -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\95C.exe = "C:\\Program Files (x86)\\LP\\1A39\\95C.exe" eee9d71cb5b67d3de45b0e08f30ebc94_JaffaCakes118.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\LP\1A39\95C.exe eee9d71cb5b67d3de45b0e08f30ebc94_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\LP\1A39\95C.exe eee9d71cb5b67d3de45b0e08f30ebc94_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\LP\1A39\7A00.tmp eee9d71cb5b67d3de45b0e08f30ebc94_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eee9d71cb5b67d3de45b0e08f30ebc94_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7A00.tmp -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2248 eee9d71cb5b67d3de45b0e08f30ebc94_JaffaCakes118.exe 2248 eee9d71cb5b67d3de45b0e08f30ebc94_JaffaCakes118.exe 2248 eee9d71cb5b67d3de45b0e08f30ebc94_JaffaCakes118.exe 2248 eee9d71cb5b67d3de45b0e08f30ebc94_JaffaCakes118.exe 2248 eee9d71cb5b67d3de45b0e08f30ebc94_JaffaCakes118.exe 2248 eee9d71cb5b67d3de45b0e08f30ebc94_JaffaCakes118.exe 2248 eee9d71cb5b67d3de45b0e08f30ebc94_JaffaCakes118.exe 2248 eee9d71cb5b67d3de45b0e08f30ebc94_JaffaCakes118.exe 2248 eee9d71cb5b67d3de45b0e08f30ebc94_JaffaCakes118.exe 2248 eee9d71cb5b67d3de45b0e08f30ebc94_JaffaCakes118.exe 2248 eee9d71cb5b67d3de45b0e08f30ebc94_JaffaCakes118.exe 2248 eee9d71cb5b67d3de45b0e08f30ebc94_JaffaCakes118.exe 2248 eee9d71cb5b67d3de45b0e08f30ebc94_JaffaCakes118.exe 2248 eee9d71cb5b67d3de45b0e08f30ebc94_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1768 explorer.exe -
Suspicious use of AdjustPrivilegeToken 19 IoCs
description pid Process Token: SeRestorePrivilege 2872 msiexec.exe Token: SeTakeOwnershipPrivilege 2872 msiexec.exe Token: SeSecurityPrivilege 2872 msiexec.exe Token: SeShutdownPrivilege 1768 explorer.exe Token: SeShutdownPrivilege 1768 explorer.exe Token: SeShutdownPrivilege 1768 explorer.exe Token: SeShutdownPrivilege 1768 explorer.exe Token: SeShutdownPrivilege 1768 explorer.exe Token: SeShutdownPrivilege 1768 explorer.exe Token: SeShutdownPrivilege 1768 explorer.exe Token: SeShutdownPrivilege 1768 explorer.exe Token: SeShutdownPrivilege 1768 explorer.exe Token: SeShutdownPrivilege 1768 explorer.exe Token: 33 548 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 548 AUDIODG.EXE Token: 33 548 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 548 AUDIODG.EXE Token: SeShutdownPrivilege 1768 explorer.exe Token: SeShutdownPrivilege 1768 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe -
Suspicious use of SendNotifyMessage 23 IoCs
pid Process 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2248 wrote to memory of 2344 2248 eee9d71cb5b67d3de45b0e08f30ebc94_JaffaCakes118.exe 30 PID 2248 wrote to memory of 2344 2248 eee9d71cb5b67d3de45b0e08f30ebc94_JaffaCakes118.exe 30 PID 2248 wrote to memory of 2344 2248 eee9d71cb5b67d3de45b0e08f30ebc94_JaffaCakes118.exe 30 PID 2248 wrote to memory of 2344 2248 eee9d71cb5b67d3de45b0e08f30ebc94_JaffaCakes118.exe 30 PID 2248 wrote to memory of 2168 2248 eee9d71cb5b67d3de45b0e08f30ebc94_JaffaCakes118.exe 32 PID 2248 wrote to memory of 2168 2248 eee9d71cb5b67d3de45b0e08f30ebc94_JaffaCakes118.exe 32 PID 2248 wrote to memory of 2168 2248 eee9d71cb5b67d3de45b0e08f30ebc94_JaffaCakes118.exe 32 PID 2248 wrote to memory of 2168 2248 eee9d71cb5b67d3de45b0e08f30ebc94_JaffaCakes118.exe 32 PID 2248 wrote to memory of 1488 2248 eee9d71cb5b67d3de45b0e08f30ebc94_JaffaCakes118.exe 36 PID 2248 wrote to memory of 1488 2248 eee9d71cb5b67d3de45b0e08f30ebc94_JaffaCakes118.exe 36 PID 2248 wrote to memory of 1488 2248 eee9d71cb5b67d3de45b0e08f30ebc94_JaffaCakes118.exe 36 PID 2248 wrote to memory of 1488 2248 eee9d71cb5b67d3de45b0e08f30ebc94_JaffaCakes118.exe 36 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer eee9d71cb5b67d3de45b0e08f30ebc94_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" eee9d71cb5b67d3de45b0e08f30ebc94_JaffaCakes118.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\eee9d71cb5b67d3de45b0e08f30ebc94_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eee9d71cb5b67d3de45b0e08f30ebc94_JaffaCakes118.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\eee9d71cb5b67d3de45b0e08f30ebc94_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\eee9d71cb5b67d3de45b0e08f30ebc94_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\956DD\7D81A.exe%C:\Users\Admin\AppData\Roaming\956DD2⤵PID:2344
-
-
C:\Users\Admin\AppData\Local\Temp\eee9d71cb5b67d3de45b0e08f30ebc94_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\eee9d71cb5b67d3de45b0e08f30ebc94_JaffaCakes118.exe startC:\Program Files (x86)\DD851\lvvm.exe%C:\Program Files (x86)\DD8512⤵PID:2168
-
-
C:\Program Files (x86)\LP\1A39\7A00.tmp"C:\Program Files (x86)\LP\1A39\7A00.tmp"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1488
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2872
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1768
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5981⤵
- Suspicious use of AdjustPrivilegeToken
PID:548
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD56d96db3da92fdc67733362793af375a3
SHA18dc777c333310f0b8cd9327d428ea647fe868156
SHA2564af3700d2ae6820b50d7ec9ac746fd4ff78145e58a1ee2a16ffb68e5d80157d0
SHA512f551e634323f72f539daaae64311cac5fc41c8d23338cb7d24dca12de216e7fd4da70fdd323b3dda84c98546b68f1a5e9f8a6ff80c68d768203236b853e17eb3
-
Filesize
600B
MD52893c0b4f003901d45be838e7e04ce58
SHA1eb32312ee31a95baac0088255ab0b16d9fd0cfbe
SHA25609d30d4c5b24ca2d42e37eea25534747afc3ad87d66d7f965d097c4581715f67
SHA5120f17e89d590d510dd011a1ea7c34f4f7e26f3c4278cd263bf86049f1480e52efc66e709318765eae13858931ab750118efe51e5271244bdfbd1425dbd0582fc6
-
Filesize
1KB
MD54ba4b9c79e43e3122010e184cd60956d
SHA13db7b633306139cccbfde8c6f57ea7f805ee25d4
SHA256f1865a902c451c6af32e4d2a47d3b99c93a5a5e486d6dd2c7a28d4620be6ce34
SHA512a221ff735ea90afecd04cf1e5910334e2216cc007c6a789b4e6a569a105872c8246c7b8ab63741b6a43c3383f56b89420051644e9ad2b432d7dda1bf30f66b74
-
Filesize
102KB
MD571ae17f353fa13cddf32b08039cc0598
SHA1a06b153b0d04f70adae95e2e927a2edbe897734c
SHA256edc2f4729fde00691d5d9d8a691141e4809eb88cefecb4dd59a7266b173792cb
SHA512641eb0b4267fde60eeca0d6011dd744bb2ff903eae3fdf9c1505bed8103b43c3b738c1a8c81909d796c915582877e5787ab6c4d207ab5e2dd825a73240ccb495