Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 08:04
Static task
static1
Behavioral task
behavioral1
Sample
ef60121099754fda0908867f7b58c5e3_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ef60121099754fda0908867f7b58c5e3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ef60121099754fda0908867f7b58c5e3_JaffaCakes118.exe
-
Size
176KB
-
MD5
ef60121099754fda0908867f7b58c5e3
-
SHA1
24e57a931dc6fa15ed33dd410f4cfccc5ad0b5ee
-
SHA256
912a5fc6f834551282b6a522a852d8323bb1946ce094b0aad498cef735e17656
-
SHA512
9e0cd7c57f66d2287bd8cb9fe18968c1d7a0a61c7df134fda4944543fca799d4aea2356456e4700d7d6533e5dedb28cbafe4735f6dce4e2cb733d80fa66c9a0c
-
SSDEEP
3072:TYEROFLyOcz6fHcALi1lr+rdN1hB87fTIwHCX0SAWacMh4YaM5iRqHZzibwte8AP:TY3F+OlJi1N+rtWFspQXeqRMXP
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2060 B6232F3A95A.exe 2392 PaBCF6F.exe -
Loads dropped DLL 4 IoCs
pid Process 1968 ef60121099754fda0908867f7b58c5e3_JaffaCakes118.exe 1968 ef60121099754fda0908867f7b58c5e3_JaffaCakes118.exe 2060 B6232F3A95A.exe 2060 B6232F3A95A.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1968-1-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/1968-2-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/1968-10-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/2060-17-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/2060-16-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/2060-21-0x0000000000400000-0x0000000000482000-memory.dmp upx behavioral1/memory/2060-24-0x0000000000400000-0x0000000000482000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\4Y3Y0C3A9F7XZE6DDBNXK = "C:\\Recycle.Bin\\B6232F3A95A.exe" PaBCF6F.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language B6232F3A95A.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PaBCF6F.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ef60121099754fda0908867f7b58c5e3_JaffaCakes118.exe -
Modifies Internet Explorer Phishing Filter 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PhishingFilter PaBCF6F.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PhishingFilter\EnabledV8 = "0" PaBCF6F.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PhishingFilter\ShownServiceDownBalloon = "0" PaBCF6F.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery PaBCF6F.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\ClearBrowsingHistoryOnExit = "0" PaBCF6F.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1968 ef60121099754fda0908867f7b58c5e3_JaffaCakes118.exe 1968 ef60121099754fda0908867f7b58c5e3_JaffaCakes118.exe 2060 B6232F3A95A.exe 2392 PaBCF6F.exe 2392 PaBCF6F.exe 2392 PaBCF6F.exe 2392 PaBCF6F.exe 2392 PaBCF6F.exe 2392 PaBCF6F.exe 2392 PaBCF6F.exe 2392 PaBCF6F.exe 2392 PaBCF6F.exe 2392 PaBCF6F.exe 2392 PaBCF6F.exe 2392 PaBCF6F.exe 2392 PaBCF6F.exe 2392 PaBCF6F.exe 2392 PaBCF6F.exe 2392 PaBCF6F.exe 2392 PaBCF6F.exe 2392 PaBCF6F.exe 2392 PaBCF6F.exe 2392 PaBCF6F.exe 2392 PaBCF6F.exe 2392 PaBCF6F.exe 2392 PaBCF6F.exe 2392 PaBCF6F.exe 2392 PaBCF6F.exe 2392 PaBCF6F.exe 2392 PaBCF6F.exe 2392 PaBCF6F.exe 2392 PaBCF6F.exe 2392 PaBCF6F.exe 2392 PaBCF6F.exe 2392 PaBCF6F.exe 2392 PaBCF6F.exe 2392 PaBCF6F.exe 2392 PaBCF6F.exe 2392 PaBCF6F.exe 2392 PaBCF6F.exe 2392 PaBCF6F.exe 2392 PaBCF6F.exe 2392 PaBCF6F.exe 2392 PaBCF6F.exe 2392 PaBCF6F.exe 2392 PaBCF6F.exe 2392 PaBCF6F.exe 2392 PaBCF6F.exe 2392 PaBCF6F.exe 2392 PaBCF6F.exe 2392 PaBCF6F.exe 2392 PaBCF6F.exe 2392 PaBCF6F.exe 2392 PaBCF6F.exe 2392 PaBCF6F.exe 2392 PaBCF6F.exe 2392 PaBCF6F.exe 2392 PaBCF6F.exe 2392 PaBCF6F.exe 2392 PaBCF6F.exe 2392 PaBCF6F.exe 2392 PaBCF6F.exe 2392 PaBCF6F.exe 2392 PaBCF6F.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1968 ef60121099754fda0908867f7b58c5e3_JaffaCakes118.exe Token: SeDebugPrivilege 1968 ef60121099754fda0908867f7b58c5e3_JaffaCakes118.exe Token: SeDebugPrivilege 1968 ef60121099754fda0908867f7b58c5e3_JaffaCakes118.exe Token: SeDebugPrivilege 1968 ef60121099754fda0908867f7b58c5e3_JaffaCakes118.exe Token: SeDebugPrivilege 2060 B6232F3A95A.exe Token: SeDebugPrivilege 2060 B6232F3A95A.exe Token: SeDebugPrivilege 2392 PaBCF6F.exe Token: SeDebugPrivilege 2392 PaBCF6F.exe Token: SeDebugPrivilege 2392 PaBCF6F.exe Token: SeDebugPrivilege 2392 PaBCF6F.exe Token: SeDebugPrivilege 2392 PaBCF6F.exe Token: SeDebugPrivilege 2392 PaBCF6F.exe Token: SeDebugPrivilege 2392 PaBCF6F.exe Token: SeDebugPrivilege 2392 PaBCF6F.exe Token: SeDebugPrivilege 2392 PaBCF6F.exe Token: SeDebugPrivilege 2392 PaBCF6F.exe Token: SeDebugPrivilege 2392 PaBCF6F.exe Token: SeDebugPrivilege 2392 PaBCF6F.exe Token: SeDebugPrivilege 2392 PaBCF6F.exe Token: SeDebugPrivilege 2392 PaBCF6F.exe Token: SeDebugPrivilege 2392 PaBCF6F.exe Token: SeDebugPrivilege 2392 PaBCF6F.exe Token: SeDebugPrivilege 2392 PaBCF6F.exe Token: SeDebugPrivilege 2392 PaBCF6F.exe Token: SeDebugPrivilege 2392 PaBCF6F.exe Token: SeDebugPrivilege 2392 PaBCF6F.exe Token: SeDebugPrivilege 2392 PaBCF6F.exe Token: SeDebugPrivilege 2392 PaBCF6F.exe Token: SeDebugPrivilege 2392 PaBCF6F.exe Token: SeDebugPrivilege 2392 PaBCF6F.exe Token: SeDebugPrivilege 2392 PaBCF6F.exe Token: SeDebugPrivilege 2392 PaBCF6F.exe Token: SeDebugPrivilege 2392 PaBCF6F.exe Token: SeDebugPrivilege 2392 PaBCF6F.exe Token: SeDebugPrivilege 2392 PaBCF6F.exe Token: SeDebugPrivilege 2392 PaBCF6F.exe Token: SeDebugPrivilege 2392 PaBCF6F.exe Token: SeDebugPrivilege 2392 PaBCF6F.exe Token: SeDebugPrivilege 2392 PaBCF6F.exe Token: SeDebugPrivilege 2392 PaBCF6F.exe Token: SeDebugPrivilege 2392 PaBCF6F.exe Token: SeDebugPrivilege 2392 PaBCF6F.exe Token: SeDebugPrivilege 2392 PaBCF6F.exe Token: SeDebugPrivilege 2392 PaBCF6F.exe Token: SeDebugPrivilege 2392 PaBCF6F.exe Token: SeDebugPrivilege 2392 PaBCF6F.exe Token: SeDebugPrivilege 2392 PaBCF6F.exe Token: SeDebugPrivilege 2392 PaBCF6F.exe Token: SeDebugPrivilege 2392 PaBCF6F.exe Token: SeDebugPrivilege 2392 PaBCF6F.exe Token: SeDebugPrivilege 2392 PaBCF6F.exe Token: SeDebugPrivilege 2392 PaBCF6F.exe Token: SeDebugPrivilege 2392 PaBCF6F.exe Token: SeDebugPrivilege 2392 PaBCF6F.exe Token: SeDebugPrivilege 2392 PaBCF6F.exe Token: SeDebugPrivilege 2392 PaBCF6F.exe Token: SeDebugPrivilege 2392 PaBCF6F.exe Token: SeDebugPrivilege 2392 PaBCF6F.exe Token: SeDebugPrivilege 2392 PaBCF6F.exe Token: SeDebugPrivilege 2392 PaBCF6F.exe Token: SeDebugPrivilege 2392 PaBCF6F.exe Token: SeDebugPrivilege 2392 PaBCF6F.exe Token: SeDebugPrivilege 2392 PaBCF6F.exe Token: SeDebugPrivilege 2392 PaBCF6F.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1968 wrote to memory of 2060 1968 ef60121099754fda0908867f7b58c5e3_JaffaCakes118.exe 30 PID 1968 wrote to memory of 2060 1968 ef60121099754fda0908867f7b58c5e3_JaffaCakes118.exe 30 PID 1968 wrote to memory of 2060 1968 ef60121099754fda0908867f7b58c5e3_JaffaCakes118.exe 30 PID 1968 wrote to memory of 2060 1968 ef60121099754fda0908867f7b58c5e3_JaffaCakes118.exe 30 PID 2060 wrote to memory of 2392 2060 B6232F3A95A.exe 31 PID 2060 wrote to memory of 2392 2060 B6232F3A95A.exe 31 PID 2060 wrote to memory of 2392 2060 B6232F3A95A.exe 31 PID 2060 wrote to memory of 2392 2060 B6232F3A95A.exe 31 PID 2060 wrote to memory of 2392 2060 B6232F3A95A.exe 31 PID 2060 wrote to memory of 2392 2060 B6232F3A95A.exe 31 PID 2392 wrote to memory of 1968 2392 PaBCF6F.exe 29 PID 2392 wrote to memory of 1968 2392 PaBCF6F.exe 29 PID 2392 wrote to memory of 1968 2392 PaBCF6F.exe 29 PID 2392 wrote to memory of 1968 2392 PaBCF6F.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\ef60121099754fda0908867f7b58c5e3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ef60121099754fda0908867f7b58c5e3_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Recycle.Bin\B6232F3A95A.exe"C:\Recycle.Bin\B6232F3A95A.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\PaBCF6F.exe"C:\Users\Admin\AppData\Local\Temp\PaBCF6F.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2392
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD582fa366f2e8db0ec9647793038207722
SHA10bd56f83b082712d7ababde7021b206bb2f8ab51
SHA256721c4fbe76d0da35e9d4db8717f9273270a54939e5bd949d06a96304124f6cbc
SHA5123b9ff47c19961f8f7b53a76a3ef3b2d16379c1307aa518f189f6856d38c683445ab18d4cbb2202cf98caca89b45bbb6c63c50371366e755a6dd90330e5c058ed
-
Filesize
176KB
MD5ef60121099754fda0908867f7b58c5e3
SHA124e57a931dc6fa15ed33dd410f4cfccc5ad0b5ee
SHA256912a5fc6f834551282b6a522a852d8323bb1946ce094b0aad498cef735e17656
SHA5129e0cd7c57f66d2287bd8cb9fe18968c1d7a0a61c7df134fda4944543fca799d4aea2356456e4700d7d6533e5dedb28cbafe4735f6dce4e2cb733d80fa66c9a0c
-
Filesize
3KB
MD529090b6b4d6605a97ac760d06436ac2d
SHA1d929d3389642e52bae5ad8512293c9c4d3e4fab5
SHA25698a24f0caf5b578e230e6f1103a5fba6aecb28a9128cad5520fcde546d643272
SHA5129121ec42fa66e14a4fc3932c8dbcc8fb1a93ab9de00da57a82e176faa70b73f6992f8c5e2ab52c02fc28c8f0c59aee73b6fbbd39107db7d15105054f4390e9be