Analysis
-
max time kernel
140s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 12:57
Static task
static1
Behavioral task
behavioral1
Sample
f610168dd093baed15771066a95edd8d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f610168dd093baed15771066a95edd8d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f610168dd093baed15771066a95edd8d_JaffaCakes118.exe
-
Size
284KB
-
MD5
f610168dd093baed15771066a95edd8d
-
SHA1
d6658df776b557f8f0fd476ce1861e0f5cd98aef
-
SHA256
818ce65d890b43fc0dafe2830559fb3facdda895563cb39abdcc8a1d78550b9f
-
SHA512
ad61ceb72211c6c0933978f1edf5845c251a2a5a54db34983d46043ab857eff1c7f46994e6c67f99f970a3da3bb878d7b64b344e9d891e9d79d253c7341e65c4
-
SSDEEP
6144:Nx9Mm80qzrcmZ6MEgzxv0iizS5PzjDOYPCo9FjW/PdKL:Nx9Mm80qzrLOgOELPCKAPcL
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" f610168dd093baed15771066a95edd8d_JaffaCakes118.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 2072 CBE7.tmp -
Loads dropped DLL 2 IoCs
pid Process 1056 f610168dd093baed15771066a95edd8d_JaffaCakes118.exe 1056 f610168dd093baed15771066a95edd8d_JaffaCakes118.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\BDB.exe = "C:\\Program Files (x86)\\LP\\DCB6\\BDB.exe" f610168dd093baed15771066a95edd8d_JaffaCakes118.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
resource yara_rule behavioral1/memory/1056-2-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1056-3-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1056-56-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/1056-57-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/680-61-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/336-171-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1056-226-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1056-354-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1056-360-0x0000000000400000-0x000000000046C000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\LP\DCB6\BDB.exe f610168dd093baed15771066a95edd8d_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\LP\DCB6\BDB.exe f610168dd093baed15771066a95edd8d_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\LP\DCB6\CBE7.tmp f610168dd093baed15771066a95edd8d_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CBE7.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f610168dd093baed15771066a95edd8d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f610168dd093baed15771066a95edd8d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f610168dd093baed15771066a95edd8d_JaffaCakes118.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1056 f610168dd093baed15771066a95edd8d_JaffaCakes118.exe 1056 f610168dd093baed15771066a95edd8d_JaffaCakes118.exe 1056 f610168dd093baed15771066a95edd8d_JaffaCakes118.exe 1056 f610168dd093baed15771066a95edd8d_JaffaCakes118.exe 1056 f610168dd093baed15771066a95edd8d_JaffaCakes118.exe 1056 f610168dd093baed15771066a95edd8d_JaffaCakes118.exe 1056 f610168dd093baed15771066a95edd8d_JaffaCakes118.exe 1056 f610168dd093baed15771066a95edd8d_JaffaCakes118.exe 1056 f610168dd093baed15771066a95edd8d_JaffaCakes118.exe 1056 f610168dd093baed15771066a95edd8d_JaffaCakes118.exe 1056 f610168dd093baed15771066a95edd8d_JaffaCakes118.exe 1056 f610168dd093baed15771066a95edd8d_JaffaCakes118.exe 1056 f610168dd093baed15771066a95edd8d_JaffaCakes118.exe 1056 f610168dd093baed15771066a95edd8d_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1156 explorer.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeRestorePrivilege 2696 msiexec.exe Token: SeTakeOwnershipPrivilege 2696 msiexec.exe Token: SeSecurityPrivilege 2696 msiexec.exe Token: SeShutdownPrivilege 1156 explorer.exe Token: SeShutdownPrivilege 1156 explorer.exe Token: SeShutdownPrivilege 1156 explorer.exe Token: SeShutdownPrivilege 1156 explorer.exe Token: SeShutdownPrivilege 1156 explorer.exe Token: SeShutdownPrivilege 1156 explorer.exe Token: SeShutdownPrivilege 1156 explorer.exe Token: SeShutdownPrivilege 1156 explorer.exe Token: SeShutdownPrivilege 1156 explorer.exe Token: SeShutdownPrivilege 1156 explorer.exe Token: SeShutdownPrivilege 1156 explorer.exe Token: SeShutdownPrivilege 1156 explorer.exe -
Suspicious use of FindShellTrayWindow 30 IoCs
pid Process 1156 explorer.exe 1156 explorer.exe 1156 explorer.exe 1156 explorer.exe 1156 explorer.exe 1156 explorer.exe 1156 explorer.exe 1156 explorer.exe 1156 explorer.exe 1156 explorer.exe 1156 explorer.exe 1156 explorer.exe 1156 explorer.exe 1156 explorer.exe 1156 explorer.exe 1156 explorer.exe 1156 explorer.exe 1156 explorer.exe 1156 explorer.exe 1156 explorer.exe 1156 explorer.exe 1156 explorer.exe 1156 explorer.exe 1156 explorer.exe 1156 explorer.exe 1156 explorer.exe 1156 explorer.exe 1156 explorer.exe 1156 explorer.exe 1156 explorer.exe -
Suspicious use of SendNotifyMessage 19 IoCs
pid Process 1156 explorer.exe 1156 explorer.exe 1156 explorer.exe 1156 explorer.exe 1156 explorer.exe 1156 explorer.exe 1156 explorer.exe 1156 explorer.exe 1156 explorer.exe 1156 explorer.exe 1156 explorer.exe 1156 explorer.exe 1156 explorer.exe 1156 explorer.exe 1156 explorer.exe 1156 explorer.exe 1156 explorer.exe 1156 explorer.exe 1156 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1056 wrote to memory of 680 1056 f610168dd093baed15771066a95edd8d_JaffaCakes118.exe 31 PID 1056 wrote to memory of 680 1056 f610168dd093baed15771066a95edd8d_JaffaCakes118.exe 31 PID 1056 wrote to memory of 680 1056 f610168dd093baed15771066a95edd8d_JaffaCakes118.exe 31 PID 1056 wrote to memory of 680 1056 f610168dd093baed15771066a95edd8d_JaffaCakes118.exe 31 PID 1056 wrote to memory of 336 1056 f610168dd093baed15771066a95edd8d_JaffaCakes118.exe 33 PID 1056 wrote to memory of 336 1056 f610168dd093baed15771066a95edd8d_JaffaCakes118.exe 33 PID 1056 wrote to memory of 336 1056 f610168dd093baed15771066a95edd8d_JaffaCakes118.exe 33 PID 1056 wrote to memory of 336 1056 f610168dd093baed15771066a95edd8d_JaffaCakes118.exe 33 PID 1056 wrote to memory of 2072 1056 f610168dd093baed15771066a95edd8d_JaffaCakes118.exe 36 PID 1056 wrote to memory of 2072 1056 f610168dd093baed15771066a95edd8d_JaffaCakes118.exe 36 PID 1056 wrote to memory of 2072 1056 f610168dd093baed15771066a95edd8d_JaffaCakes118.exe 36 PID 1056 wrote to memory of 2072 1056 f610168dd093baed15771066a95edd8d_JaffaCakes118.exe 36 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer f610168dd093baed15771066a95edd8d_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" f610168dd093baed15771066a95edd8d_JaffaCakes118.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\f610168dd093baed15771066a95edd8d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f610168dd093baed15771066a95edd8d_JaffaCakes118.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1056 -
C:\Users\Admin\AppData\Local\Temp\f610168dd093baed15771066a95edd8d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f610168dd093baed15771066a95edd8d_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\6397E\1F0DC.exe%C:\Users\Admin\AppData\Roaming\6397E2⤵
- System Location Discovery: System Language Discovery
PID:680
-
-
C:\Users\Admin\AppData\Local\Temp\f610168dd093baed15771066a95edd8d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f610168dd093baed15771066a95edd8d_JaffaCakes118.exe startC:\Program Files (x86)\7E252\lvvm.exe%C:\Program Files (x86)\7E2522⤵
- System Location Discovery: System Language Discovery
PID:336
-
-
C:\Program Files (x86)\LP\DCB6\CBE7.tmp"C:\Program Files (x86)\LP\DCB6\CBE7.tmp"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2072
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2696
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1156
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD5669cc20a3c35828919df235ca92a40b9
SHA12152dde81d4baf67e76e2eeef99d2cfc3043aade
SHA2566492d1827cc5445545083e6f36f3623231206336be461ea6c5ee64c62dbe4d81
SHA51291b180a2e8adc5adb054b3c71e0aadea4989db6376bf2f32e824fdf53352e74a111dd496ed2541c8ea4304b91a19d515bc98aaeb2b8a3a6a5cc4bff544654003
-
Filesize
1KB
MD577d99df281151ab1a3d68e78f3319d72
SHA1b633074f9203c0916527578748b3f9c444ccc1a9
SHA256f2e6b6d662ac939fe8684a01d5120ebf16f015ec26306f2a13d80addc4944d04
SHA5121b908653dd12344dfaadee4135bda3c7773f394029bece6486b79cd9e3b7d5f78fe24987adbd2eb19e67772ee06f0eada55666a2c3844f5ab5963f6db1399922
-
Filesize
600B
MD5d47e4c832649f65c4bf7ae97cf48c6cd
SHA143b2b54c11173949f94e0713f23a299b3b63934c
SHA2566cb87fb0307ce756a214e4ced00be936ad5b744e96d191c7ae4c2dd135c5900e
SHA5123b2b83b5a8dcf231c019bac11b112a9b4fb8c6cfb3c1b2a66f087092245f65f8e187b39b850c843b173d0408ecd1706454f51c85f425a77b8668db3cf463cd9c
-
Filesize
300B
MD5e85f465e8a6c66c69ffc62ad770c849b
SHA1d8a911314681ea46b2514dcf13ffe6d6fe66ff2c
SHA25607887258bb539c1e03db829b0d89354a16d83d1198f1ada3570d468ccac2d81a
SHA512fa06dacf0c964c504b0c1d34518d379ad3742f1ca029b57a70fe759bf82bf2bef15974907156938d43ca0a329304dcb9abe990967a55854b68217ba144a396d5
-
Filesize
101KB
MD5d6bfe1586b8332d08719505e8eccd54f
SHA1635b05994661c54fdc263f8a4202af491f120ded
SHA256aa2e7c0f6a1699b7423c70d3fa7d7121303012081cbe81078497b08b65c7bb62
SHA5129f0c0df10192ab42128bd44ae50941f67c913df8a11db9f5b1db601505bd3fbb6787106d46498b32639c30e538f40c8f1b62d1619d48cbd29d74ccb3070f44ba