Analysis
-
max time kernel
140s -
max time network
89s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 21:29
Static task
static1
Behavioral task
behavioral1
Sample
faefe3997091f50765f275a86b2f65ae_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
faefe3997091f50765f275a86b2f65ae_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
faefe3997091f50765f275a86b2f65ae_JaffaCakes118.exe
-
Size
286KB
-
MD5
faefe3997091f50765f275a86b2f65ae
-
SHA1
a298ea7383e31346ed115007bd4d4e7eb12a8aa3
-
SHA256
010769402bb51da43f2a111b0b1f86ad6d0cc3add21afbea7dff61b54e0a6829
-
SHA512
f92c17fcc415b88b8997b11942263a96bf66ebabcef970e0d898412f3e4ef22872b6fd99a556e32db6711455523c1763e899cff39abf5fbcb3daec6a662e589b
-
SSDEEP
6144:3J9tPFmx+RLcd7FpigfViBXsVoLBnMq0mPuBK7co4rKX1jz:37tPFmx+RLCFptuYYnPGBrhK
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" faefe3997091f50765f275a86b2f65ae_JaffaCakes118.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 1580 2710.tmp -
Loads dropped DLL 2 IoCs
pid Process 2908 faefe3997091f50765f275a86b2f65ae_JaffaCakes118.exe 2908 faefe3997091f50765f275a86b2f65ae_JaffaCakes118.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\350.exe = "C:\\Program Files (x86)\\LP\\F15F\\350.exe" faefe3997091f50765f275a86b2f65ae_JaffaCakes118.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
resource yara_rule behavioral1/memory/2908-2-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2908-12-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/952-17-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2908-15-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2908-125-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1624-129-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1624-130-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2908-325-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2908-329-0x0000000000400000-0x000000000046B000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\LP\F15F\350.exe faefe3997091f50765f275a86b2f65ae_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\LP\F15F\350.exe faefe3997091f50765f275a86b2f65ae_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\LP\F15F\2710.tmp faefe3997091f50765f275a86b2f65ae_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language faefe3997091f50765f275a86b2f65ae_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2710.tmp -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2908 faefe3997091f50765f275a86b2f65ae_JaffaCakes118.exe 2908 faefe3997091f50765f275a86b2f65ae_JaffaCakes118.exe 2908 faefe3997091f50765f275a86b2f65ae_JaffaCakes118.exe 2908 faefe3997091f50765f275a86b2f65ae_JaffaCakes118.exe 2908 faefe3997091f50765f275a86b2f65ae_JaffaCakes118.exe 2908 faefe3997091f50765f275a86b2f65ae_JaffaCakes118.exe 2908 faefe3997091f50765f275a86b2f65ae_JaffaCakes118.exe 2908 faefe3997091f50765f275a86b2f65ae_JaffaCakes118.exe 2908 faefe3997091f50765f275a86b2f65ae_JaffaCakes118.exe 2908 faefe3997091f50765f275a86b2f65ae_JaffaCakes118.exe 2908 faefe3997091f50765f275a86b2f65ae_JaffaCakes118.exe 2908 faefe3997091f50765f275a86b2f65ae_JaffaCakes118.exe 2908 faefe3997091f50765f275a86b2f65ae_JaffaCakes118.exe 2908 faefe3997091f50765f275a86b2f65ae_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1636 explorer.exe -
Suspicious use of AdjustPrivilegeToken 19 IoCs
description pid Process Token: SeRestorePrivilege 2912 msiexec.exe Token: SeTakeOwnershipPrivilege 2912 msiexec.exe Token: SeSecurityPrivilege 2912 msiexec.exe Token: SeShutdownPrivilege 1636 explorer.exe Token: SeShutdownPrivilege 1636 explorer.exe Token: SeShutdownPrivilege 1636 explorer.exe Token: SeShutdownPrivilege 1636 explorer.exe Token: SeShutdownPrivilege 1636 explorer.exe Token: SeShutdownPrivilege 1636 explorer.exe Token: SeShutdownPrivilege 1636 explorer.exe Token: SeShutdownPrivilege 1636 explorer.exe Token: SeShutdownPrivilege 1636 explorer.exe Token: SeShutdownPrivilege 1636 explorer.exe Token: 33 848 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 848 AUDIODG.EXE Token: 33 848 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 848 AUDIODG.EXE Token: SeShutdownPrivilege 1636 explorer.exe Token: SeShutdownPrivilege 1636 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 1636 explorer.exe 1636 explorer.exe 1636 explorer.exe 1636 explorer.exe 1636 explorer.exe 1636 explorer.exe 1636 explorer.exe 1636 explorer.exe 1636 explorer.exe 1636 explorer.exe 1636 explorer.exe 1636 explorer.exe 1636 explorer.exe 1636 explorer.exe 1636 explorer.exe 1636 explorer.exe 1636 explorer.exe 1636 explorer.exe 1636 explorer.exe 1636 explorer.exe 1636 explorer.exe 1636 explorer.exe 1636 explorer.exe 1636 explorer.exe 1636 explorer.exe 1636 explorer.exe 1636 explorer.exe 1636 explorer.exe -
Suspicious use of SendNotifyMessage 17 IoCs
pid Process 1636 explorer.exe 1636 explorer.exe 1636 explorer.exe 1636 explorer.exe 1636 explorer.exe 1636 explorer.exe 1636 explorer.exe 1636 explorer.exe 1636 explorer.exe 1636 explorer.exe 1636 explorer.exe 1636 explorer.exe 1636 explorer.exe 1636 explorer.exe 1636 explorer.exe 1636 explorer.exe 1636 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2908 wrote to memory of 952 2908 faefe3997091f50765f275a86b2f65ae_JaffaCakes118.exe 31 PID 2908 wrote to memory of 952 2908 faefe3997091f50765f275a86b2f65ae_JaffaCakes118.exe 31 PID 2908 wrote to memory of 952 2908 faefe3997091f50765f275a86b2f65ae_JaffaCakes118.exe 31 PID 2908 wrote to memory of 952 2908 faefe3997091f50765f275a86b2f65ae_JaffaCakes118.exe 31 PID 2908 wrote to memory of 1624 2908 faefe3997091f50765f275a86b2f65ae_JaffaCakes118.exe 33 PID 2908 wrote to memory of 1624 2908 faefe3997091f50765f275a86b2f65ae_JaffaCakes118.exe 33 PID 2908 wrote to memory of 1624 2908 faefe3997091f50765f275a86b2f65ae_JaffaCakes118.exe 33 PID 2908 wrote to memory of 1624 2908 faefe3997091f50765f275a86b2f65ae_JaffaCakes118.exe 33 PID 2908 wrote to memory of 1580 2908 faefe3997091f50765f275a86b2f65ae_JaffaCakes118.exe 37 PID 2908 wrote to memory of 1580 2908 faefe3997091f50765f275a86b2f65ae_JaffaCakes118.exe 37 PID 2908 wrote to memory of 1580 2908 faefe3997091f50765f275a86b2f65ae_JaffaCakes118.exe 37 PID 2908 wrote to memory of 1580 2908 faefe3997091f50765f275a86b2f65ae_JaffaCakes118.exe 37 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer faefe3997091f50765f275a86b2f65ae_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" faefe3997091f50765f275a86b2f65ae_JaffaCakes118.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\faefe3997091f50765f275a86b2f65ae_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\faefe3997091f50765f275a86b2f65ae_JaffaCakes118.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\faefe3997091f50765f275a86b2f65ae_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\faefe3997091f50765f275a86b2f65ae_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\F5CD6\17FF1.exe%C:\Users\Admin\AppData\Roaming\F5CD62⤵PID:952
-
-
C:\Users\Admin\AppData\Local\Temp\faefe3997091f50765f275a86b2f65ae_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\faefe3997091f50765f275a86b2f65ae_JaffaCakes118.exe startC:\Program Files (x86)\D60C8\lvvm.exe%C:\Program Files (x86)\D60C82⤵PID:1624
-
-
C:\Program Files (x86)\LP\F15F\2710.tmp"C:\Program Files (x86)\LP\F15F\2710.tmp"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1580
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2912
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1636
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x1c81⤵
- Suspicious use of AdjustPrivilegeToken
PID:848
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD54cc30f7a06c71ebf5743172588bf8c6a
SHA177d87d0944f9483628b66520405cf40707e67713
SHA256d029f754070ef3cdb1a1200d515bbf0fed9694a4e9ab9e9fab3088e93bb0ce21
SHA512f9ffcc9bd45ec540285e1830a2e3f8213773eaea67fd45b11a03acdc10b6ce10ab5a0c913f86c0d9b2f70714e8d9d736960392dd109dcdfedc3495dc2a7f7927
-
Filesize
600B
MD5a1e1700a228f79e63c2a86d13ae0c95f
SHA1c411b51a9fd8101f85652c8c0bbe227cbca7235b
SHA256f157453e03af89ad97ecaf799e536d6475ec5ddbf28fcf0c22d530d1240e154e
SHA5127212b69b49e1a592e0c856dff1515e573dda86c258fce93cab9e8af8196c61fb21d72cf6fdf768b133dbfc29d1b7f33d348e844fba652cfadfde8bbc549c763e
-
Filesize
1KB
MD518a257c6492c2d671264d98c15d7cbad
SHA1748b5999c0a374b09d63edb37de37298ff19bfdf
SHA25665256e36d2cc7979bf38c608d33d848e4635814cd6cf92c1c8350df89168a8e8
SHA5125a28138467929751c56105c1b2296a7f85eb6c11424c42a562665a0f7db052db10d41c5e983e4735ae74bd92e6d1ed028cbbde14920229fdfec654ca2f16d893
-
Filesize
102KB
MD56d7f922d6214ef1996346395afd017be
SHA15594d286e8b8e46008426e15ffd53e86f4143d15
SHA2564e58ef597c40404d3286c87cc13ea0563f4d08dacb4b40ea3d8b6744221898ae
SHA5129dc8ac8d33268face5a007dce5cf5c7c1b749f1a656fdc70276ad431392978f47fbbae0e1d625040acc01641d9f7b5341d7b28b68169f39a1df789ea12654626