Analysis
-
max time kernel
141s -
max time network
100s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 16:09
Static task
static1
Behavioral task
behavioral1
Sample
f66066cd08af3bf3a3cfef3cbb0547db_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f66066cd08af3bf3a3cfef3cbb0547db_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f66066cd08af3bf3a3cfef3cbb0547db_JaffaCakes118.exe
-
Size
286KB
-
MD5
f66066cd08af3bf3a3cfef3cbb0547db
-
SHA1
9270e900ccc918e5edb22d20244561de8b1a5f05
-
SHA256
a9e1e8da378d55d5e58322dbf5660a4ed83a4ec090abd7dc6cea1f4519f482d9
-
SHA512
82c0df0795cdabae6391a564c463724b4a86095cda56451674b2e7a3733f4d26a7150d29272a530c86733afbf150e56b52e6facc65e582215cc754a7d1669e45
-
SSDEEP
6144:zXF4+3H9SCXHeN5ezDJIgwDQ/Q2BfVZYND:z19tSqeNgIcQ83QD
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" f66066cd08af3bf3a3cfef3cbb0547db_JaffaCakes118.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 2152 1C09.tmp -
Loads dropped DLL 2 IoCs
pid Process 1480 f66066cd08af3bf3a3cfef3cbb0547db_JaffaCakes118.exe 1480 f66066cd08af3bf3a3cfef3cbb0547db_JaffaCakes118.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\F8C.exe = "C:\\Program Files (x86)\\LP\\EA34\\F8C.exe" f66066cd08af3bf3a3cfef3cbb0547db_JaffaCakes118.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
resource yara_rule behavioral1/memory/1480-2-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1480-3-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1480-12-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/1480-13-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1444-15-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1444-18-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1444-16-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1444-143-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1512-145-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1480-204-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1480-343-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1480-349-0x0000000000400000-0x000000000046C000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\LP\EA34\F8C.exe f66066cd08af3bf3a3cfef3cbb0547db_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\LP\EA34\1C09.tmp f66066cd08af3bf3a3cfef3cbb0547db_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\LP\EA34\F8C.exe f66066cd08af3bf3a3cfef3cbb0547db_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f66066cd08af3bf3a3cfef3cbb0547db_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1C09.tmp -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1480 f66066cd08af3bf3a3cfef3cbb0547db_JaffaCakes118.exe 1480 f66066cd08af3bf3a3cfef3cbb0547db_JaffaCakes118.exe 1480 f66066cd08af3bf3a3cfef3cbb0547db_JaffaCakes118.exe 1480 f66066cd08af3bf3a3cfef3cbb0547db_JaffaCakes118.exe 1480 f66066cd08af3bf3a3cfef3cbb0547db_JaffaCakes118.exe 1480 f66066cd08af3bf3a3cfef3cbb0547db_JaffaCakes118.exe 1480 f66066cd08af3bf3a3cfef3cbb0547db_JaffaCakes118.exe 1480 f66066cd08af3bf3a3cfef3cbb0547db_JaffaCakes118.exe 1480 f66066cd08af3bf3a3cfef3cbb0547db_JaffaCakes118.exe 1480 f66066cd08af3bf3a3cfef3cbb0547db_JaffaCakes118.exe 1480 f66066cd08af3bf3a3cfef3cbb0547db_JaffaCakes118.exe 1480 f66066cd08af3bf3a3cfef3cbb0547db_JaffaCakes118.exe 1480 f66066cd08af3bf3a3cfef3cbb0547db_JaffaCakes118.exe 1480 f66066cd08af3bf3a3cfef3cbb0547db_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1644 explorer.exe -
Suspicious use of AdjustPrivilegeToken 19 IoCs
description pid Process Token: SeRestorePrivilege 2120 msiexec.exe Token: SeTakeOwnershipPrivilege 2120 msiexec.exe Token: SeSecurityPrivilege 2120 msiexec.exe Token: SeShutdownPrivilege 1644 explorer.exe Token: SeShutdownPrivilege 1644 explorer.exe Token: SeShutdownPrivilege 1644 explorer.exe Token: SeShutdownPrivilege 1644 explorer.exe Token: SeShutdownPrivilege 1644 explorer.exe Token: SeShutdownPrivilege 1644 explorer.exe Token: SeShutdownPrivilege 1644 explorer.exe Token: SeShutdownPrivilege 1644 explorer.exe Token: SeShutdownPrivilege 1644 explorer.exe Token: SeShutdownPrivilege 1644 explorer.exe Token: 33 1476 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1476 AUDIODG.EXE Token: 33 1476 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1476 AUDIODG.EXE Token: SeShutdownPrivilege 1644 explorer.exe Token: SeShutdownPrivilege 1644 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 1644 explorer.exe 1644 explorer.exe 1644 explorer.exe 1644 explorer.exe 1644 explorer.exe 1644 explorer.exe 1644 explorer.exe 1644 explorer.exe 1644 explorer.exe 1644 explorer.exe 1644 explorer.exe 1644 explorer.exe 1644 explorer.exe 1644 explorer.exe 1644 explorer.exe 1644 explorer.exe 1644 explorer.exe 1644 explorer.exe 1644 explorer.exe 1644 explorer.exe 1644 explorer.exe 1644 explorer.exe 1644 explorer.exe 1644 explorer.exe 1644 explorer.exe 1644 explorer.exe 1644 explorer.exe 1644 explorer.exe -
Suspicious use of SendNotifyMessage 17 IoCs
pid Process 1644 explorer.exe 1644 explorer.exe 1644 explorer.exe 1644 explorer.exe 1644 explorer.exe 1644 explorer.exe 1644 explorer.exe 1644 explorer.exe 1644 explorer.exe 1644 explorer.exe 1644 explorer.exe 1644 explorer.exe 1644 explorer.exe 1644 explorer.exe 1644 explorer.exe 1644 explorer.exe 1644 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1480 wrote to memory of 1444 1480 f66066cd08af3bf3a3cfef3cbb0547db_JaffaCakes118.exe 30 PID 1480 wrote to memory of 1444 1480 f66066cd08af3bf3a3cfef3cbb0547db_JaffaCakes118.exe 30 PID 1480 wrote to memory of 1444 1480 f66066cd08af3bf3a3cfef3cbb0547db_JaffaCakes118.exe 30 PID 1480 wrote to memory of 1444 1480 f66066cd08af3bf3a3cfef3cbb0547db_JaffaCakes118.exe 30 PID 1480 wrote to memory of 1512 1480 f66066cd08af3bf3a3cfef3cbb0547db_JaffaCakes118.exe 32 PID 1480 wrote to memory of 1512 1480 f66066cd08af3bf3a3cfef3cbb0547db_JaffaCakes118.exe 32 PID 1480 wrote to memory of 1512 1480 f66066cd08af3bf3a3cfef3cbb0547db_JaffaCakes118.exe 32 PID 1480 wrote to memory of 1512 1480 f66066cd08af3bf3a3cfef3cbb0547db_JaffaCakes118.exe 32 PID 1480 wrote to memory of 2152 1480 f66066cd08af3bf3a3cfef3cbb0547db_JaffaCakes118.exe 36 PID 1480 wrote to memory of 2152 1480 f66066cd08af3bf3a3cfef3cbb0547db_JaffaCakes118.exe 36 PID 1480 wrote to memory of 2152 1480 f66066cd08af3bf3a3cfef3cbb0547db_JaffaCakes118.exe 36 PID 1480 wrote to memory of 2152 1480 f66066cd08af3bf3a3cfef3cbb0547db_JaffaCakes118.exe 36 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer f66066cd08af3bf3a3cfef3cbb0547db_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" f66066cd08af3bf3a3cfef3cbb0547db_JaffaCakes118.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\f66066cd08af3bf3a3cfef3cbb0547db_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f66066cd08af3bf3a3cfef3cbb0547db_JaffaCakes118.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\f66066cd08af3bf3a3cfef3cbb0547db_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f66066cd08af3bf3a3cfef3cbb0547db_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\4A9EA\ACAEA.exe%C:\Users\Admin\AppData\Roaming\4A9EA2⤵PID:1444
-
-
C:\Users\Admin\AppData\Local\Temp\f66066cd08af3bf3a3cfef3cbb0547db_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f66066cd08af3bf3a3cfef3cbb0547db_JaffaCakes118.exe startC:\Program Files (x86)\EA24D\lvvm.exe%C:\Program Files (x86)\EA24D2⤵PID:1512
-
-
C:\Program Files (x86)\LP\EA34\1C09.tmp"C:\Program Files (x86)\LP\EA34\1C09.tmp"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2152
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2120
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1644
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x1e81⤵
- Suspicious use of AdjustPrivilegeToken
PID:1476
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD5d259d5d0a253643af994684154f8d6a1
SHA10e3489f36aa2c3608ce8083b5287f8d275ef0500
SHA25624946c008cdb27c1b909d4417874e11fe99da7249e4d57476b1146ffa35b9ec4
SHA512f70d668ae05539053e5107d59d5a859a41317749a7d37ecd73ff7408f7f1b54d02449e9d1636a5736b7cb01bd9cfd2ea39bf3d1c792827eead8a00992616453e
-
Filesize
600B
MD5887812eb72cae5bbf92b36dc1a2635ba
SHA10b4752c2cea25c6f9091a5661e9b67dad5630b49
SHA25654f99376c49d66f206035d9fdad163146e132e73a3c85980755a0dc43a103315
SHA512f31f719687626aff454ea2fcae3208977ee23e4aa916d5d55f4fcce505a434e87e13b187c7cbc49770004c266a45409fe60668e7252aa42c0ec43874f4c964ec
-
Filesize
1KB
MD58a7c73d31e4cdffe280e358d05d581bb
SHA186b588d7504c0f4d265ba306b107a2605f0a2ab8
SHA2561c1763d815ff073ba93e0858499115c9e3554e016f69b9dae06f8d246bb60aab
SHA51243fb79911f95ed37e928dcd5a85a7f5b74bb16b97a764f6514a87caed3379f7db0aa9800ec346bed3313c63c3443246ce9d1625025cdbfa03e8a7e2457cd97ff
-
Filesize
101KB
MD580ac92fe81519a42cb9031ea571b7761
SHA1fec55eedbe309ebaa847ae1b9b4680b1e357586b
SHA256510567f9284db5bb61e1697b7befa5d940ad64be5b826db005094077682c42bd
SHA51279e91e92bbb61b546943e3824f0fd56a8cd1b0b5c18d23b129286d12c906dc10a9540876af85268aa6236f3d97af69631d389cf486b6ed45e220e7cf0a35a42e