Analysis
-
max time kernel
141s -
max time network
89s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22-09-2024 13:36
Static task
static1
Behavioral task
behavioral1
Sample
f22095e315e9a8d364df659c91890745_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f22095e315e9a8d364df659c91890745_JaffaCakes118.exe
Resource
win10v2004-20240910-en
General
-
Target
f22095e315e9a8d364df659c91890745_JaffaCakes118.exe
-
Size
765KB
-
MD5
f22095e315e9a8d364df659c91890745
-
SHA1
9d7e615f2155034bdf74ff114ddeab0354e71057
-
SHA256
2eb0b39b1afcb3606a5929fc0fc4416ba64f9acb4b3a8ef928fbce5ff681749a
-
SHA512
7ff3a6c5e97bdcaf3dbd35cc47fe35ba915f84ca8bf3e41a1a194a4d3f6887356417d6bc4058c6f9bce30714b18ca9a5233c687b2d9e8d8655479639611f4a05
-
SSDEEP
12288:LLoWy905qiQrmUwykYZP3qx5fBfvoROkaWSBiThz/CHKiSsPNzI2qiHRSYT4TLxb:vy0ercPkPC5Jfvo4ahz/LiSsPRDjgLKz
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" vbc.exe -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 3 IoCs
pid Process 324 skidrow.exe 2268 SKIDRO~3.EXE 1576 1610.tmp -
Loads dropped DLL 8 IoCs
pid Process 2972 f22095e315e9a8d364df659c91890745_JaffaCakes118.exe 2972 f22095e315e9a8d364df659c91890745_JaffaCakes118.exe 324 skidrow.exe 2972 f22095e315e9a8d364df659c91890745_JaffaCakes118.exe 2972 f22095e315e9a8d364df659c91890745_JaffaCakes118.exe 2268 SKIDRO~3.EXE 2092 vbc.exe 2092 vbc.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2092-30-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2092-32-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2092-31-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2028-39-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2092-41-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2092-45-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2092-49-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2092-50-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2092-51-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2092-117-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2092-167-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2092-272-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2092-276-0x0000000000400000-0x000000000046A000-memory.dmp upx -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f22095e315e9a8d364df659c91890745_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\E53.exe = "C:\\Program Files (x86)\\LP\\8895\\E53.exe" vbc.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 324 set thread context of 2092 324 skidrow.exe 30 PID 2268 set thread context of 2028 2268 SKIDRO~3.EXE 32 -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\LP\8895\E53.exe vbc.exe File opened for modification C:\Program Files (x86)\LP\8895\E53.exe vbc.exe File opened for modification C:\Program Files (x86)\LP\8895\1610.tmp vbc.exe -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1610.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f22095e315e9a8d364df659c91890745_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skidrow.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SKIDRO~3.EXE -
Modifies registry class 5 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2092 vbc.exe 2092 vbc.exe 2092 vbc.exe 2092 vbc.exe 2092 vbc.exe 2092 vbc.exe 2092 vbc.exe 2092 vbc.exe 2092 vbc.exe 2092 vbc.exe 2092 vbc.exe 2092 vbc.exe 2092 vbc.exe 2092 vbc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 636 explorer.exe -
Suspicious use of AdjustPrivilegeToken 19 IoCs
description pid Process Token: SeRestorePrivilege 2052 msiexec.exe Token: SeTakeOwnershipPrivilege 2052 msiexec.exe Token: SeSecurityPrivilege 2052 msiexec.exe Token: SeShutdownPrivilege 636 explorer.exe Token: SeShutdownPrivilege 636 explorer.exe Token: SeShutdownPrivilege 636 explorer.exe Token: SeShutdownPrivilege 636 explorer.exe Token: SeShutdownPrivilege 636 explorer.exe Token: SeShutdownPrivilege 636 explorer.exe Token: SeShutdownPrivilege 636 explorer.exe Token: SeShutdownPrivilege 636 explorer.exe Token: SeShutdownPrivilege 636 explorer.exe Token: SeShutdownPrivilege 636 explorer.exe Token: 33 2556 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2556 AUDIODG.EXE Token: 33 2556 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2556 AUDIODG.EXE Token: SeShutdownPrivilege 636 explorer.exe Token: SeShutdownPrivilege 636 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe -
Suspicious use of WriteProcessMemory 61 IoCs
description pid Process procid_target PID 2972 wrote to memory of 324 2972 f22095e315e9a8d364df659c91890745_JaffaCakes118.exe 29 PID 2972 wrote to memory of 324 2972 f22095e315e9a8d364df659c91890745_JaffaCakes118.exe 29 PID 2972 wrote to memory of 324 2972 f22095e315e9a8d364df659c91890745_JaffaCakes118.exe 29 PID 2972 wrote to memory of 324 2972 f22095e315e9a8d364df659c91890745_JaffaCakes118.exe 29 PID 2972 wrote to memory of 324 2972 f22095e315e9a8d364df659c91890745_JaffaCakes118.exe 29 PID 2972 wrote to memory of 324 2972 f22095e315e9a8d364df659c91890745_JaffaCakes118.exe 29 PID 2972 wrote to memory of 324 2972 f22095e315e9a8d364df659c91890745_JaffaCakes118.exe 29 PID 324 wrote to memory of 2092 324 skidrow.exe 30 PID 324 wrote to memory of 2092 324 skidrow.exe 30 PID 324 wrote to memory of 2092 324 skidrow.exe 30 PID 324 wrote to memory of 2092 324 skidrow.exe 30 PID 324 wrote to memory of 2092 324 skidrow.exe 30 PID 324 wrote to memory of 2092 324 skidrow.exe 30 PID 324 wrote to memory of 2092 324 skidrow.exe 30 PID 324 wrote to memory of 2092 324 skidrow.exe 30 PID 324 wrote to memory of 2092 324 skidrow.exe 30 PID 324 wrote to memory of 2092 324 skidrow.exe 30 PID 324 wrote to memory of 2092 324 skidrow.exe 30 PID 324 wrote to memory of 2092 324 skidrow.exe 30 PID 324 wrote to memory of 2092 324 skidrow.exe 30 PID 2972 wrote to memory of 2268 2972 f22095e315e9a8d364df659c91890745_JaffaCakes118.exe 31 PID 2972 wrote to memory of 2268 2972 f22095e315e9a8d364df659c91890745_JaffaCakes118.exe 31 PID 2972 wrote to memory of 2268 2972 f22095e315e9a8d364df659c91890745_JaffaCakes118.exe 31 PID 2972 wrote to memory of 2268 2972 f22095e315e9a8d364df659c91890745_JaffaCakes118.exe 31 PID 2972 wrote to memory of 2268 2972 f22095e315e9a8d364df659c91890745_JaffaCakes118.exe 31 PID 2972 wrote to memory of 2268 2972 f22095e315e9a8d364df659c91890745_JaffaCakes118.exe 31 PID 2972 wrote to memory of 2268 2972 f22095e315e9a8d364df659c91890745_JaffaCakes118.exe 31 PID 2268 wrote to memory of 2028 2268 SKIDRO~3.EXE 32 PID 2268 wrote to memory of 2028 2268 SKIDRO~3.EXE 32 PID 2268 wrote to memory of 2028 2268 SKIDRO~3.EXE 32 PID 2268 wrote to memory of 2028 2268 SKIDRO~3.EXE 32 PID 2268 wrote to memory of 2028 2268 SKIDRO~3.EXE 32 PID 2268 wrote to memory of 2028 2268 SKIDRO~3.EXE 32 PID 2268 wrote to memory of 2028 2268 SKIDRO~3.EXE 32 PID 2268 wrote to memory of 2028 2268 SKIDRO~3.EXE 32 PID 2268 wrote to memory of 2028 2268 SKIDRO~3.EXE 32 PID 2268 wrote to memory of 2028 2268 SKIDRO~3.EXE 32 PID 2268 wrote to memory of 2028 2268 SKIDRO~3.EXE 32 PID 2268 wrote to memory of 2028 2268 SKIDRO~3.EXE 32 PID 2268 wrote to memory of 2028 2268 SKIDRO~3.EXE 32 PID 2092 wrote to memory of 2804 2092 vbc.exe 34 PID 2092 wrote to memory of 2804 2092 vbc.exe 34 PID 2092 wrote to memory of 2804 2092 vbc.exe 34 PID 2092 wrote to memory of 2804 2092 vbc.exe 34 PID 2092 wrote to memory of 2804 2092 vbc.exe 34 PID 2092 wrote to memory of 2804 2092 vbc.exe 34 PID 2092 wrote to memory of 2804 2092 vbc.exe 34 PID 2092 wrote to memory of 2192 2092 vbc.exe 36 PID 2092 wrote to memory of 2192 2092 vbc.exe 36 PID 2092 wrote to memory of 2192 2092 vbc.exe 36 PID 2092 wrote to memory of 2192 2092 vbc.exe 36 PID 2092 wrote to memory of 2192 2092 vbc.exe 36 PID 2092 wrote to memory of 2192 2092 vbc.exe 36 PID 2092 wrote to memory of 2192 2092 vbc.exe 36 PID 2092 wrote to memory of 1576 2092 vbc.exe 40 PID 2092 wrote to memory of 1576 2092 vbc.exe 40 PID 2092 wrote to memory of 1576 2092 vbc.exe 40 PID 2092 wrote to memory of 1576 2092 vbc.exe 40 PID 2092 wrote to memory of 1576 2092 vbc.exe 40 PID 2092 wrote to memory of 1576 2092 vbc.exe 40 PID 2092 wrote to memory of 1576 2092 vbc.exe 40 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\f22095e315e9a8d364df659c91890745_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f22095e315e9a8d364df659c91890745_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\skidrow.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\skidrow.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:324 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe startC:\Users\Admin\AppData\Roaming\5295B\C7688.exe%C:\Users\Admin\AppData\Roaming\5295B4⤵
- System Location Discovery: System Language Discovery
PID:2804
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe startC:\Program Files (x86)\5BB73\lvvm.exe%C:\Program Files (x86)\5BB734⤵
- System Location Discovery: System Language Discovery
PID:2192
-
-
C:\Program Files (x86)\LP\8895\1610.tmp"C:\Program Files (x86)\LP\8895\1610.tmp"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1576
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SKIDRO~3.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SKIDRO~3.EXE2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- System Location Discovery: System Language Discovery
PID:2028
-
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2052
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:636
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5a41⤵
- Suspicious use of AdjustPrivilegeToken
PID:2556
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
388KB
MD5ad24722609e1771cab3b1e89efbd6dc9
SHA16979250571cd91a4ba039b02b1b7079f9b76bc09
SHA25684d3017fff463f002b35dd8aa51e096c755af4cf8c9562292d22beb9592cd1cc
SHA51298f3127ff99bbe54b92b4dab37f9335e6e1aee2b9ef3f00608c5b98982229888ac15af24ec02339ae2ef7554a04fa5ce53a973966a9e255fb819f196e3ce19d1
-
Filesize
996B
MD5763e4b51e208eede932dfa2ce5f5e902
SHA1cc8222bcfb8af348b207915eb56063e6a3ebfc4f
SHA25647a62e2578e3c18df0562911b304cf89d3cd0ec7a5b426559a68ae39884a83fb
SHA512f6d28a7558911b8df9b90c12063046807c1259b922e61d06756b87147469f3cbd59b0f90eb75e47a634e7be778b5c74b5fb7d17c31d6f55b2d9f2d318ac61706
-
Filesize
1KB
MD5ba4e364252270ba554f87739f5152007
SHA141a6525469e35541ca3f43ea638729c7ae030178
SHA256afd6b7392976c9593ebccccfa09e6672dce49cec7a57f30fae9fa78351aa90f7
SHA512c4a43a1a03f3a17971fdb4717bd9ce5321ecb81e02c64486ed321d86e51855732a49dbe2abae6bc0803ee8109a17bfdd28257008869005bbdd20314ef7ba6217
-
Filesize
600B
MD5559c9590f8bc4dc201cb1efa2b562f63
SHA1f124eecf53667995b96b34d3bde6d8a6045a3bdf
SHA25644fdce6b8c910acb1d7f0351cf97e1c447ce2915e6f7219a5ef3cd21ea7cbfc1
SHA51256a0511d82b984fb6c13e1a1ac26c20f6555bd4d9900132f8de183c4cb7ff23e0bf4a31c4c57b7b2d503826e0e92b170190de6c11d4a18d1c3e2dd7688b92163
-
Filesize
98KB
MD5452ca0be44887092384b55fbb84d79c7
SHA1c51135c52fdff98dacc66b1bbb5dd215b90d3a8b
SHA256fe1aa7fbb7f031ee7e5213dd6656d1502f127f6ddbd5b9aab8f6d880031ea688
SHA5129fb18a250f93fba63cf40e8efe58ef687ad197f764f1f16b23a9cbf6efc64fe60a75b523ff1c8876fa70f597f8149139410396c03db58294fce5019ea627ff07
-
Filesize
388KB
MD5b0ce26b05fd6228f0225f22e1d071e74
SHA18930a49802bd5d7e4cdde50e0e3cc9afcf91b683
SHA256cdc49b4fb77aa408e0483cb0f185b36988c63f152d6f3f4b272e37095c4a6d48
SHA512f0dbe1ef9a2b574988c9389bfd8561b108eecce3cef12088a8a4c1aa5f1123c8afa338342c2559c11ddbf27433e042a10ab6ff62f132c27f01ed21de03200b73