Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 08:46
Static task
static1
Behavioral task
behavioral1
Sample
f5a162427a33530dafcb9238047794e7_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f5a162427a33530dafcb9238047794e7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f5a162427a33530dafcb9238047794e7_JaffaCakes118.exe
-
Size
356KB
-
MD5
f5a162427a33530dafcb9238047794e7
-
SHA1
d8be6bb4f72fc8bfd8347c3cecec556707b7c8f4
-
SHA256
6184f67ad148cf24a8ae32bc72f35a72a29d4ff550d99bca06127c4da2879669
-
SHA512
4b070db138a8b75f4092939b6b75e343038745efe2565d4a6caa0be95878650ee5b30bf0b38a0acc1ed286906c4d62edaa6b1dfb9f66fbe2ec6249f683b598d5
-
SSDEEP
6144:ccQ5xCanyOtSFKrLl4oAntKZ4JuiMMPMAkNZLdiJp:ccQWOtSFKSntKKMMDKJ
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Deletes itself 1 IoCs
pid Process 2740 jfq.exe -
Executes dropped EXE 1 IoCs
pid Process 2740 jfq.exe -
Loads dropped DLL 2 IoCs
pid Process 3064 f5a162427a33530dafcb9238047794e7_JaffaCakes118.exe 3064 f5a162427a33530dafcb9238047794e7_JaffaCakes118.exe -
Modifies system executable filetype association 2 TTPs 17 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\exefile\Content Type = "application/x-msdownload" jfq.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\exefile\shell\open jfq.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\exefile\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\jfq.exe\" -a \"%1\" %*" jfq.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\exefile\shell\open\command\IsolatedCommand = "\"%1\" %*" jfq.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\exefile\shell\runas jfq.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\exefile\shell\start jfq.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\exefile\shell\start\command\ = "\"%1\" %*" jfq.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\exefile\shell jfq.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\exefile\shell\open\command jfq.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\exefile\shell\runas\command jfq.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\exefile\shell\runas\command\ = "\"%1\" %*" jfq.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\exefile\ = "Application" jfq.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\exefile\DefaultIcon jfq.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\exefile\DefaultIcon\ = "%1" jfq.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\exefile\shell\runas\command\IsolatedCommand = "\"%1\" %*" jfq.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\exefile\shell\start\command jfq.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\exefile\shell\start\command\IsolatedCommand = "\"%1\" %*" jfq.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\ctfmon.exe = "C:\\WINDOWS\\system32\\ctfmon.exe" f5a162427a33530dafcb9238047794e7_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\891995592 = "C:\\Users\\Admin\\AppData\\Local\\jfq.exe" f5a162427a33530dafcb9238047794e7_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f5a162427a33530dafcb9238047794e7_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jfq.exe -
Modifies registry class 41 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\exefile jfq.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\exefile\shell\runas\command\IsolatedCommand = "\"%1\" %*" jfq.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\exefile\shell\start\command jfq.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" jfq.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\.exe\shell\start jfq.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\exefile\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\jfq.exe\" -a \"%1\" %*" jfq.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\exefile\shell\start jfq.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\.exe\shell\runas jfq.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\.exe\shell\open jfq.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\exefile\DefaultIcon jfq.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\exefile\shell\open jfq.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\exefile\shell\runas jfq.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\.exe\DefaultIcon\ = "%1" jfq.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\.exe\shell\runas\command jfq.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\.exe\shell\start\command\ = "\"%1\" %*" jfq.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\exefile\ = "Application" jfq.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\exefile\Content Type = "application/x-msdownload" jfq.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\exefile\shell\open\command jfq.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\exefile\shell\open\command\IsolatedCommand = "\"%1\" %*" jfq.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\.exe jfq.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\.exe\shell\runas\command\ = "\"%1\" %*" jfq.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\.exe\shell\start\command jfq.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\exefile\DefaultIcon\ = "%1" jfq.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\exefile\shell\runas\command jfq.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\.exe\shell\open\command jfq.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\.exe\shell\start\command\IsolatedCommand = "\"%1\" %*" jfq.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\exefile\shell\start\command\IsolatedCommand = "\"%1\" %*" jfq.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\jfq.exe\" -a \"%1\" %*" jfq.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\.exe\DefaultIcon jfq.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" jfq.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\exefile\shell\runas\command\ = "\"%1\" %*" jfq.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\exefile\shell\start\command\ = "\"%1\" %*" jfq.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\.exe\Content Type = "application/x-msdownload" jfq.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\.exe\shell jfq.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\exefile\shell jfq.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\.exe\ = "exefile" jfq.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 3064 f5a162427a33530dafcb9238047794e7_JaffaCakes118.exe 3064 f5a162427a33530dafcb9238047794e7_JaffaCakes118.exe 3064 f5a162427a33530dafcb9238047794e7_JaffaCakes118.exe 3064 f5a162427a33530dafcb9238047794e7_JaffaCakes118.exe 3064 f5a162427a33530dafcb9238047794e7_JaffaCakes118.exe 3064 f5a162427a33530dafcb9238047794e7_JaffaCakes118.exe 3064 f5a162427a33530dafcb9238047794e7_JaffaCakes118.exe 3064 f5a162427a33530dafcb9238047794e7_JaffaCakes118.exe 3064 f5a162427a33530dafcb9238047794e7_JaffaCakes118.exe 3064 f5a162427a33530dafcb9238047794e7_JaffaCakes118.exe 3064 f5a162427a33530dafcb9238047794e7_JaffaCakes118.exe 3064 f5a162427a33530dafcb9238047794e7_JaffaCakes118.exe 3064 f5a162427a33530dafcb9238047794e7_JaffaCakes118.exe 2740 jfq.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2008 explorer.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeShutdownPrivilege 2008 explorer.exe Token: SeShutdownPrivilege 2008 explorer.exe Token: SeShutdownPrivilege 2008 explorer.exe Token: SeShutdownPrivilege 2008 explorer.exe Token: SeShutdownPrivilege 2008 explorer.exe Token: SeShutdownPrivilege 2008 explorer.exe Token: SeShutdownPrivilege 2008 explorer.exe Token: SeShutdownPrivilege 2008 explorer.exe Token: SeShutdownPrivilege 2008 explorer.exe Token: SeShutdownPrivilege 2008 explorer.exe Token: SeShutdownPrivilege 2008 explorer.exe Token: SeShutdownPrivilege 2008 explorer.exe Token: SeShutdownPrivilege 2008 explorer.exe Token: SeShutdownPrivilege 2008 explorer.exe -
Suspicious use of FindShellTrayWindow 37 IoCs
pid Process 2740 jfq.exe 2740 jfq.exe 2740 jfq.exe 2008 explorer.exe 2008 explorer.exe 2008 explorer.exe 2008 explorer.exe 2008 explorer.exe 2008 explorer.exe 2008 explorer.exe 2008 explorer.exe 2008 explorer.exe 2008 explorer.exe 2008 explorer.exe 2008 explorer.exe 2008 explorer.exe 2008 explorer.exe 2008 explorer.exe 2008 explorer.exe 2008 explorer.exe 2008 explorer.exe 2008 explorer.exe 2008 explorer.exe 2008 explorer.exe 2008 explorer.exe 2008 explorer.exe 2008 explorer.exe 2008 explorer.exe 2008 explorer.exe 2008 explorer.exe 2008 explorer.exe 2740 jfq.exe 2008 explorer.exe 2008 explorer.exe 2740 jfq.exe 2740 jfq.exe 2008 explorer.exe -
Suspicious use of SendNotifyMessage 20 IoCs
pid Process 2008 explorer.exe 2008 explorer.exe 2008 explorer.exe 2008 explorer.exe 2008 explorer.exe 2008 explorer.exe 2008 explorer.exe 2008 explorer.exe 2008 explorer.exe 2008 explorer.exe 2008 explorer.exe 2008 explorer.exe 2008 explorer.exe 2008 explorer.exe 2008 explorer.exe 2008 explorer.exe 2008 explorer.exe 2008 explorer.exe 2740 jfq.exe 2740 jfq.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2740 jfq.exe 2740 jfq.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3064 wrote to memory of 2740 3064 f5a162427a33530dafcb9238047794e7_JaffaCakes118.exe 30 PID 3064 wrote to memory of 2740 3064 f5a162427a33530dafcb9238047794e7_JaffaCakes118.exe 30 PID 3064 wrote to memory of 2740 3064 f5a162427a33530dafcb9238047794e7_JaffaCakes118.exe 30 PID 3064 wrote to memory of 2740 3064 f5a162427a33530dafcb9238047794e7_JaffaCakes118.exe 30 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\f5a162427a33530dafcb9238047794e7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f5a162427a33530dafcb9238047794e7_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Users\Admin\AppData\Local\jfq.exe"C:\Users\Admin\AppData\Local\jfq.exe" -gav C:\Users\Admin\AppData\Local\Temp\f5a162427a33530dafcb9238047794e7_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system executable filetype association
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2740
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2008
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
356KB
MD5f5a162427a33530dafcb9238047794e7
SHA1d8be6bb4f72fc8bfd8347c3cecec556707b7c8f4
SHA2566184f67ad148cf24a8ae32bc72f35a72a29d4ff550d99bca06127c4da2879669
SHA5124b070db138a8b75f4092939b6b75e343038745efe2565d4a6caa0be95878650ee5b30bf0b38a0acc1ed286906c4d62edaa6b1dfb9f66fbe2ec6249f683b598d5