Analysis
-
max time kernel
140s -
max time network
64s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
26-09-2024 20:31
Static task
static1
Behavioral task
behavioral1
Sample
f922dfcae3c78e0ccb9af7bc40f8a127_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
f922dfcae3c78e0ccb9af7bc40f8a127_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f922dfcae3c78e0ccb9af7bc40f8a127_JaffaCakes118.exe
-
Size
274KB
-
MD5
f922dfcae3c78e0ccb9af7bc40f8a127
-
SHA1
7c926d3c5549802e1569474059b9a34c5b8e493d
-
SHA256
7fe706aab8099dd056af4403b5fe90a70ea61e8ce2c5b9d5f3435b55832e60be
-
SHA512
d3c6502e5fff374ae73ee4f91707221452c7a305dff00500addc639f4865cb358e01209e30099c132b6a9b97216a3d593dc18f0a08b95ebdc0529dbbcd612689
-
SSDEEP
6144:rL++5L0S92a4r0y0vN6O9aE2xh0DYX9vPcTIMwM:rFSSoCAOL2xh0DYXtPCzw
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" f922dfcae3c78e0ccb9af7bc40f8a127_JaffaCakes118.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 2496 3BD8.tmp -
Loads dropped DLL 2 IoCs
pid Process 2316 f922dfcae3c78e0ccb9af7bc40f8a127_JaffaCakes118.exe 2316 f922dfcae3c78e0ccb9af7bc40f8a127_JaffaCakes118.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\8F9.exe = "C:\\Program Files (x86)\\LP\\D3AE\\8F9.exe" f922dfcae3c78e0ccb9af7bc40f8a127_JaffaCakes118.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
resource yara_rule behavioral1/memory/2316-2-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2392-9-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2316-14-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2316-15-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2108-85-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2108-86-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2316-87-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2316-178-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2316-180-0x0000000000400000-0x0000000000469000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\LP\D3AE\8F9.exe f922dfcae3c78e0ccb9af7bc40f8a127_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\LP\D3AE\8F9.exe f922dfcae3c78e0ccb9af7bc40f8a127_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\LP\D3AE\3BD8.tmp f922dfcae3c78e0ccb9af7bc40f8a127_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f922dfcae3c78e0ccb9af7bc40f8a127_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f922dfcae3c78e0ccb9af7bc40f8a127_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f922dfcae3c78e0ccb9af7bc40f8a127_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3BD8.tmp -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2316 f922dfcae3c78e0ccb9af7bc40f8a127_JaffaCakes118.exe 2316 f922dfcae3c78e0ccb9af7bc40f8a127_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1228 explorer.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeShutdownPrivilege 1228 explorer.exe Token: SeShutdownPrivilege 1228 explorer.exe Token: SeShutdownPrivilege 1228 explorer.exe Token: SeShutdownPrivilege 1228 explorer.exe Token: SeShutdownPrivilege 1228 explorer.exe Token: SeShutdownPrivilege 1228 explorer.exe Token: SeShutdownPrivilege 1228 explorer.exe Token: SeShutdownPrivilege 1228 explorer.exe Token: SeShutdownPrivilege 1228 explorer.exe Token: SeShutdownPrivilege 1228 explorer.exe Token: 33 696 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 696 AUDIODG.EXE Token: 33 696 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 696 AUDIODG.EXE Token: SeShutdownPrivilege 1228 explorer.exe Token: SeShutdownPrivilege 1228 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 1228 explorer.exe 1228 explorer.exe 1228 explorer.exe 1228 explorer.exe 1228 explorer.exe 1228 explorer.exe 1228 explorer.exe 1228 explorer.exe 1228 explorer.exe 1228 explorer.exe 1228 explorer.exe 1228 explorer.exe 1228 explorer.exe 1228 explorer.exe 1228 explorer.exe 1228 explorer.exe 1228 explorer.exe 1228 explorer.exe 1228 explorer.exe 1228 explorer.exe 1228 explorer.exe 1228 explorer.exe 1228 explorer.exe 1228 explorer.exe 1228 explorer.exe 1228 explorer.exe 1228 explorer.exe 1228 explorer.exe -
Suspicious use of SendNotifyMessage 22 IoCs
pid Process 1228 explorer.exe 1228 explorer.exe 1228 explorer.exe 1228 explorer.exe 1228 explorer.exe 1228 explorer.exe 1228 explorer.exe 1228 explorer.exe 1228 explorer.exe 1228 explorer.exe 1228 explorer.exe 1228 explorer.exe 1228 explorer.exe 1228 explorer.exe 1228 explorer.exe 1228 explorer.exe 1228 explorer.exe 1228 explorer.exe 1228 explorer.exe 1228 explorer.exe 1228 explorer.exe 1228 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2392 2316 f922dfcae3c78e0ccb9af7bc40f8a127_JaffaCakes118.exe 30 PID 2316 wrote to memory of 2392 2316 f922dfcae3c78e0ccb9af7bc40f8a127_JaffaCakes118.exe 30 PID 2316 wrote to memory of 2392 2316 f922dfcae3c78e0ccb9af7bc40f8a127_JaffaCakes118.exe 30 PID 2316 wrote to memory of 2392 2316 f922dfcae3c78e0ccb9af7bc40f8a127_JaffaCakes118.exe 30 PID 2316 wrote to memory of 2108 2316 f922dfcae3c78e0ccb9af7bc40f8a127_JaffaCakes118.exe 32 PID 2316 wrote to memory of 2108 2316 f922dfcae3c78e0ccb9af7bc40f8a127_JaffaCakes118.exe 32 PID 2316 wrote to memory of 2108 2316 f922dfcae3c78e0ccb9af7bc40f8a127_JaffaCakes118.exe 32 PID 2316 wrote to memory of 2108 2316 f922dfcae3c78e0ccb9af7bc40f8a127_JaffaCakes118.exe 32 PID 2316 wrote to memory of 2496 2316 f922dfcae3c78e0ccb9af7bc40f8a127_JaffaCakes118.exe 33 PID 2316 wrote to memory of 2496 2316 f922dfcae3c78e0ccb9af7bc40f8a127_JaffaCakes118.exe 33 PID 2316 wrote to memory of 2496 2316 f922dfcae3c78e0ccb9af7bc40f8a127_JaffaCakes118.exe 33 PID 2316 wrote to memory of 2496 2316 f922dfcae3c78e0ccb9af7bc40f8a127_JaffaCakes118.exe 33 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer f922dfcae3c78e0ccb9af7bc40f8a127_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" f922dfcae3c78e0ccb9af7bc40f8a127_JaffaCakes118.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\f922dfcae3c78e0ccb9af7bc40f8a127_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f922dfcae3c78e0ccb9af7bc40f8a127_JaffaCakes118.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\f922dfcae3c78e0ccb9af7bc40f8a127_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f922dfcae3c78e0ccb9af7bc40f8a127_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\E7954\A2ED3.exe%C:\Users\Admin\AppData\Roaming\E79542⤵
- System Location Discovery: System Language Discovery
PID:2392
-
-
C:\Users\Admin\AppData\Local\Temp\f922dfcae3c78e0ccb9af7bc40f8a127_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f922dfcae3c78e0ccb9af7bc40f8a127_JaffaCakes118.exe startC:\Program Files (x86)\544A2\lvvm.exe%C:\Program Files (x86)\544A22⤵
- System Location Discovery: System Language Discovery
PID:2108
-
-
C:\Program Files (x86)\LP\D3AE\3BD8.tmp"C:\Program Files (x86)\LP\D3AE\3BD8.tmp"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2496
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1228
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x55c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:696
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD518e32cb79fa91dc0fcbc194e8d9461be
SHA13c20d4d4222598d53dc856e11601cbf53d3f4a3d
SHA2564a2a0b30dfae1fcbd17bcd0dd2cd5dfd88f58708a52b9914b727c1ea13a0ae7e
SHA5120bfbf438219a9d158bde5e4e3dd5808f868c1ec20cf31da0fc02bc36a8936852b28b353a89d3c61613453af9868a902be3defd4ad8232a13bbcc3abda2dcd8ff
-
Filesize
600B
MD53429f90b67702efbacf5da47abbf6ae1
SHA10807db4ac337cf7eb99a2591869809c3bb9b8e41
SHA256f1d6ed341d145ad7802a99b58a35a1f1848836182c69dd84e3abbd8642967b60
SHA512ce3343d2c51fd4274c9bc359e1bf1ad9343a04cb5002264f5cec724bd74e5d62b368d692a9b7d44e6d08c987e261f2838dd7cb935caf68e2b981cfd5014e8565
-
Filesize
1KB
MD542c3b6ff637fe2c5c46e83e904d0c6eb
SHA1eac8087bf02789557ed63e983088f53344371246
SHA256cf87fcb2e97f561b5b2a39137a32b3f0df3176fc9211d4167ec3e7cfb554cb2b
SHA512f0124b0487d4caf10fbf46bd90db9c9acf22ac8388b8a3fcefa241cb5190fb8fe5047a469a3a8d72a1b13ce6d74bf5d675f5956857bfabb3fc7bb6a7f870446f
-
Filesize
996B
MD5c61b8f9212e199efcede3634e70c16da
SHA103b407b843cf0361f1b88a0b0fd327c4c89fb940
SHA256a1f188e1953a5894340794e3ef992c6a25221209e2d2422c957852b140bea08c
SHA512ba080df106b563ded51016e8f6c0b97aaa1f73079b929c81f041fdf801d2f216e3cf81f6927569665d5a0966c6a185e73ed7222cecca1307ec98539b050806e9
-
Filesize
103KB
MD51b8013e3242c22443b376a7e20f59fc2
SHA1a1b2506288776baa4ad1c84bbed785ecd74d65b9
SHA256c207bf949a5785e284bd028eb6c39edd96bf33d40aeeeccffa06a15a19c030c5
SHA5125e70ac9cb23ece429a6716115ea89031fc6bbee677a217078de6108f68062aa6efa331654bb614f2f8b49953bf88ff3b6512d76dbc31e3bbfa47d23779e69594