Analysis
-
max time kernel
95s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-09-2024 09:33
Static task
static1
Behavioral task
behavioral1
Sample
f5b693e65bb05bd6916e29cbb1adb1cc_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
f5b693e65bb05bd6916e29cbb1adb1cc_JaffaCakes118.exe
-
Size
1.2MB
-
MD5
f5b693e65bb05bd6916e29cbb1adb1cc
-
SHA1
8ed9365deb17627a4d5ff4fb5a1467c8beab2031
-
SHA256
3dd24bfc6728959f084de536645e2bd20318e4a709b41cddb9245147922da1d0
-
SHA512
df8444288514c3da117ba5115ca357851af7ecdea8d73299a944a0694ffb7de57b39cee92fc827c994b550de58089316df5c5bcc5c96c43178dc5f57c6e0bf68
-
SSDEEP
24576:oaPADnvDHtyGnOJlIqeJC6e0ZVmPGZK40Nx1O97P6iaSVVu1kqE27:iDnrHIGnulIJC6L4uZf0D1BuV+EI
Malware Config
Extracted
vidar
24
93
http://wrangellse.com/
-
profile_id
93
Signatures
-
Vidar Stealer 2 IoCs
resource yara_rule behavioral2/memory/3284-32-0x0000000000400000-0x000000000048D000-memory.dmp family_vidar behavioral2/memory/3284-33-0x0000000000400000-0x000000000048D000-memory.dmp family_vidar -
Manipulates Digital Signatures 1 TTPs 3 IoCs
Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\OID\EncodingType 0\CryptDllFindOIDInfo\1.3.6.1.4.1.311.60.3.1!7\Name = "szOID_ROOT_PROGRAM_AUTO_UPDATE_CA_REVOCATION" certutil.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\OID\EncodingType 0\CryptDllFindOIDInfo\1.3.6.1.4.1.311.60.3.2!7\Name = "szOID_ROOT_PROGRAM_AUTO_UPDATE_END_REVOCATION" certutil.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\OID\EncodingType 0\CryptDllFindOIDInfo\1.3.6.1.4.1.311.60.3.3!7\Name = "szOID_ROOT_PROGRAM_NO_OCSP_FAILOVER_TO_CRL" certutil.exe -
Executes dropped EXE 2 IoCs
pid Process 396 dwm.com 1248 dwm.com -
Loads dropped DLL 3 IoCs
pid Process 548 f5b693e65bb05bd6916e29cbb1adb1cc_JaffaCakes118.exe 548 f5b693e65bb05bd6916e29cbb1adb1cc_JaffaCakes118.exe 548 f5b693e65bb05bd6916e29cbb1adb1cc_JaffaCakes118.exe -
pid Process 928 cmd.exe 1836 certutil.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1248 set thread context of 3284 1248 dwm.com 96 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2192 3284 WerFault.exe 96 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language certutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwm.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwm.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dllhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f5b693e65bb05bd6916e29cbb1adb1cc_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1976 PING.EXE -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 f5b693e65bb05bd6916e29cbb1adb1cc_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString f5b693e65bb05bd6916e29cbb1adb1cc_JaffaCakes118.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1976 PING.EXE -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3284 dllhost.exe 3284 dllhost.exe 3284 dllhost.exe 3284 dllhost.exe 3284 dllhost.exe 3284 dllhost.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1248 dwm.com 1248 dwm.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 548 f5b693e65bb05bd6916e29cbb1adb1cc_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 396 dwm.com 396 dwm.com 396 dwm.com 1248 dwm.com 1248 dwm.com 1248 dwm.com -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 396 dwm.com 396 dwm.com 396 dwm.com 1248 dwm.com 1248 dwm.com 1248 dwm.com -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 548 wrote to memory of 928 548 f5b693e65bb05bd6916e29cbb1adb1cc_JaffaCakes118.exe 82 PID 548 wrote to memory of 928 548 f5b693e65bb05bd6916e29cbb1adb1cc_JaffaCakes118.exe 82 PID 548 wrote to memory of 928 548 f5b693e65bb05bd6916e29cbb1adb1cc_JaffaCakes118.exe 82 PID 928 wrote to memory of 1836 928 cmd.exe 84 PID 928 wrote to memory of 1836 928 cmd.exe 84 PID 928 wrote to memory of 1836 928 cmd.exe 84 PID 928 wrote to memory of 396 928 cmd.exe 85 PID 928 wrote to memory of 396 928 cmd.exe 85 PID 928 wrote to memory of 396 928 cmd.exe 85 PID 396 wrote to memory of 1248 396 dwm.com 86 PID 396 wrote to memory of 1248 396 dwm.com 86 PID 396 wrote to memory of 1248 396 dwm.com 86 PID 928 wrote to memory of 1976 928 cmd.exe 87 PID 928 wrote to memory of 1976 928 cmd.exe 87 PID 928 wrote to memory of 1976 928 cmd.exe 87 PID 1248 wrote to memory of 5092 1248 dwm.com 95 PID 1248 wrote to memory of 5092 1248 dwm.com 95 PID 1248 wrote to memory of 5092 1248 dwm.com 95 PID 1248 wrote to memory of 3284 1248 dwm.com 96 PID 1248 wrote to memory of 3284 1248 dwm.com 96 PID 1248 wrote to memory of 3284 1248 dwm.com 96 PID 1248 wrote to memory of 3284 1248 dwm.com 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\f5b693e65bb05bd6916e29cbb1adb1cc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f5b693e65bb05bd6916e29cbb1adb1cc_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c <nul set /p ="M" > dwm.com & type SmdLPo.com >> dwm.com & del SmdLPo.com & certutil -decode zje.com F & dwm.com F & ping 127.0.0.1 -n 2 > nul & del zje.com & del F2⤵
- Deobfuscate/Decode Files or Information
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Windows\SysWOW64\certutil.execertutil -decode zje.com F3⤵
- Manipulates Digital Signatures
- Deobfuscate/Decode Files or Information
- System Location Discovery: System Language Discovery
PID:1836
-
-
C:\Users\Admin\AppData\Local\Temp\dwm.comdwm.com F3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Users\Admin\AppData\Local\Temp\dwm.comC:\Users\Admin\AppData\Local\Temp\dwm.com F4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"5⤵PID:5092
-
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"5⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3284 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3284 -s 12486⤵
- Program crash
PID:2192
-
-
-
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 23⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1976
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3284 -ip 32841⤵PID:3064
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Deobfuscate/Decode Files or Information
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD5d82d5bba1efff5f3f16c44fa7367d138
SHA12eec25a2b861817104e5b099f0e46d8a89a04ef8
SHA256a8f444fa060af6fa08e6bb49477459562afceb382363cc6319c0c752c65a1621
SHA51224bf57cb3c5945e3f5c4027c4d4bbf627ff2dfac6a9f351ff22fbdad82d1dae321313117aa029bc87aefada7a0565a6b991112bc6550a003f58e44d6e4a66b8b
-
Filesize
872KB
MD5d86ab2aeeac2553c7857ece4492eda5d
SHA10828db56b556f3f0486a9de9d2c728216035e8e6
SHA2568861365fb619dbb90da0027db93d041681c30deb93071ec588121a8f8ba08436
SHA5128c0154d80fb47ea5225816e95db0126d02950f0ec7909a68205ee67a0d1c4dbff971933ee5ba0307c24658ce52400e144cde720e514acf3024fbdb2505345cfe
-
Filesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
Filesize
6KB
MD5293165db1e46070410b4209519e67494
SHA1777b96a4f74b6c34d43a4e7c7e656757d1c97f01
SHA25649b7477db8dd22f8cf2d41ee2d79ce57797f02e8c7b9e799951a6c710384349a
SHA51297012139f2da5868fe8731c0b0bcb3cfda29ed10c2e6e2336b504480c9cd9fb8f4728cca23f1e0bd577d75daa542e59f94d1d341f4e8aaeebc7134bf61288c19
-
Filesize
68KB
MD544e5c77cae3ae434d1e4e619bdb1c39b
SHA19988f020eac45207d148668227b6819a38bdafa0
SHA256326c406116026019a41c94b2e6b4c1061154f3bc9a395638063dae349f8a7579
SHA512c3e40499d1296bebd2b1a770d9cd1f025859963a0f6dff002eb336f069f057ac4b3d2f5819232af6d2802ba1a3770f62440136030eb37355fa6f5b6ee0bc0470
-
Filesize
11KB
MD50063d48afe5a0cdc02833145667b6641
SHA1e7eb614805d183ecb1127c62decb1a6be1b4f7a8
SHA256ac9dfe3b35ea4b8932536ed7406c29a432976b685cc5322f94ef93df920fede7
SHA51271cbbcaeb345e09306e368717ea0503fe8df485be2e95200febc61bcd8ba74fb4211cd263c232f148c0123f6c6f2e3fd4ea20bdecc4070f5208c35c6920240f0
-
Filesize
541KB
MD5b6fb845a94115b7583ecc5223b45f8ef
SHA1780294d122e9e4f520173ff36c31bd08ba1df259
SHA25699870c51d7f5d3dde7314f9b7df5755b59bbc48f6c483dcc3de0fa788553a02e
SHA5120d69c3243a6d50fae320b20e8f1d4b71437b8a13b354b4146fd2104998e0fee34202382d3d6a0d52735f596a104576f0f1862ab1777dcaaa84ec63005252d6b9
-
Filesize
308KB
MD5cdfc8eee32871d7c15ad00e135dc4a48
SHA192d9341cc1fc013325504b5abd0318df059869a6
SHA2565a8257ee7b6d4808356e561a7525f24b006337bb9d0d106cd24239ccf8ca6ca6
SHA512237b18708fc994771ada63b52427af556e3a9c9279553164a8bf5b394b894413fad23f1a70da85eff53e23d3822ffbc38aae66da233572bc21897e564e9558fe