Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 23:07
Static task
static1
Behavioral task
behavioral1
Sample
f709e53677f5a43e3f131df9a4743268_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f709e53677f5a43e3f131df9a4743268_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f709e53677f5a43e3f131df9a4743268_JaffaCakes118.exe
-
Size
848KB
-
MD5
f709e53677f5a43e3f131df9a4743268
-
SHA1
4dd217c84923141cdfa068eaa73d900f3eee6bd0
-
SHA256
7ffd701d64ae8425c8413f0aa351b8f71e3d80d0bc8b5a7155e1beb8f6894746
-
SHA512
3c92ce47926924ab0c45df3bc4024d8fbab1a5bf515923592f5bbc204ab467ff47afa3d0bfa92a33f2bf83600290156263c12494249d7ff121c54f8319c8b35e
-
SSDEEP
24576:kYxuneNOy1mqr4B0PBz0pXlwUe2PQ0MN:oeNOy1IBYBz0p155Q0i
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2208 isecurity.exe -
Loads dropped DLL 3 IoCs
pid Process 1724 f709e53677f5a43e3f131df9a4743268_JaffaCakes118.exe 1724 f709e53677f5a43e3f131df9a4743268_JaffaCakes118.exe 1724 f709e53677f5a43e3f131df9a4743268_JaffaCakes118.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\Internet Security = "C:\\ProgramData\\isecurity.exe" isecurity.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\O: isecurity.exe File opened (read-only) \??\R: isecurity.exe File opened (read-only) \??\X: isecurity.exe File opened (read-only) \??\Z: isecurity.exe File opened (read-only) \??\G: isecurity.exe File opened (read-only) \??\L: isecurity.exe File opened (read-only) \??\N: isecurity.exe File opened (read-only) \??\Q: isecurity.exe File opened (read-only) \??\U: isecurity.exe File opened (read-only) \??\W: isecurity.exe File opened (read-only) \??\E: isecurity.exe File opened (read-only) \??\H: isecurity.exe File opened (read-only) \??\J: isecurity.exe File opened (read-only) \??\S: isecurity.exe File opened (read-only) \??\T: isecurity.exe File opened (read-only) \??\Y: isecurity.exe File opened (read-only) \??\I: isecurity.exe File opened (read-only) \??\K: isecurity.exe File opened (read-only) \??\P: isecurity.exe File opened (read-only) \??\M: isecurity.exe File opened (read-only) \??\V: isecurity.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 isecurity.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f709e53677f5a43e3f131df9a4743268_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language isecurity.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1724 f709e53677f5a43e3f131df9a4743268_JaffaCakes118.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe -
Suspicious use of FindShellTrayWindow 15 IoCs
pid Process 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe -
Suspicious use of SendNotifyMessage 15 IoCs
pid Process 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe 2208 isecurity.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2208 isecurity.exe 2208 isecurity.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1724 wrote to memory of 2208 1724 f709e53677f5a43e3f131df9a4743268_JaffaCakes118.exe 30 PID 1724 wrote to memory of 2208 1724 f709e53677f5a43e3f131df9a4743268_JaffaCakes118.exe 30 PID 1724 wrote to memory of 2208 1724 f709e53677f5a43e3f131df9a4743268_JaffaCakes118.exe 30 PID 1724 wrote to memory of 2208 1724 f709e53677f5a43e3f131df9a4743268_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\f709e53677f5a43e3f131df9a4743268_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f709e53677f5a43e3f131df9a4743268_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\ProgramData\isecurity.exeC:\ProgramData\isecurity.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2208
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
842KB
MD5b81089b9fd9864f4792d4f81075ca4dc
SHA1f7de58702bd19efa1c797c66652e8a7923968f6f
SHA256ecd45863993019c1d0e4ef3dbb38bbc084b1a9717a2af1e19dec239bda5e5586
SHA51223f76bcab132ffe30f8707a3ef0306ddf128e33f1e97631ac65a4d4eff2d4a29ceb6879d782fceff92b6a8895a0e940821914b320ce3048f1bbf47267fdcbdbc