Analysis
-
max time kernel
144s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-09-2024 00:14
Static task
static1
Behavioral task
behavioral1
Sample
f96312e9f0378702d2d7f0a1873f3c40_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f96312e9f0378702d2d7f0a1873f3c40_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f96312e9f0378702d2d7f0a1873f3c40_JaffaCakes118.exe
-
Size
283KB
-
MD5
f96312e9f0378702d2d7f0a1873f3c40
-
SHA1
0d73654709f1288d91fc8c270097ba6bc15f7ef5
-
SHA256
45e60b28944266ca9e34bd3177022a4d94822dd2685609fdb0ecf90cd00c688d
-
SHA512
48598cb13af2100dd595d5091880b1ec5a7621d8fa447c8867bdaffe66407935df3cc39a832da4e6698adbf6c59eef077d3fad514f47df1fd94cf72e59a3b23d
-
SSDEEP
6144:OaTXCv8JAnSmN3j51mRW+hHKCwRpZoManuphWAJVPA0Y8Yk:LzCvcU391mM+ZKFjJanuqOZY
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" f96312e9f0378702d2d7f0a1873f3c40_JaffaCakes118.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 324 6519.tmp -
Loads dropped DLL 2 IoCs
pid Process 1980 f96312e9f0378702d2d7f0a1873f3c40_JaffaCakes118.exe 1980 f96312e9f0378702d2d7f0a1873f3c40_JaffaCakes118.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\5C1.exe = "C:\\Program Files (x86)\\LP\\B3E0\\5C1.exe" f96312e9f0378702d2d7f0a1873f3c40_JaffaCakes118.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
resource yara_rule behavioral1/memory/1980-2-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1980-3-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1980-4-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1676-16-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1980-17-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2168-117-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1980-119-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1980-194-0x0000000000400000-0x000000000046B000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\LP\B3E0\5C1.exe f96312e9f0378702d2d7f0a1873f3c40_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\LP\B3E0\6519.tmp f96312e9f0378702d2d7f0a1873f3c40_JaffaCakes118.exe File created C:\Program Files (x86)\LP\B3E0\5C1.exe f96312e9f0378702d2d7f0a1873f3c40_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6519.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f96312e9f0378702d2d7f0a1873f3c40_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f96312e9f0378702d2d7f0a1873f3c40_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f96312e9f0378702d2d7f0a1873f3c40_JaffaCakes118.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1980 f96312e9f0378702d2d7f0a1873f3c40_JaffaCakes118.exe 1980 f96312e9f0378702d2d7f0a1873f3c40_JaffaCakes118.exe 1980 f96312e9f0378702d2d7f0a1873f3c40_JaffaCakes118.exe 1980 f96312e9f0378702d2d7f0a1873f3c40_JaffaCakes118.exe 1980 f96312e9f0378702d2d7f0a1873f3c40_JaffaCakes118.exe 1980 f96312e9f0378702d2d7f0a1873f3c40_JaffaCakes118.exe 1980 f96312e9f0378702d2d7f0a1873f3c40_JaffaCakes118.exe 1980 f96312e9f0378702d2d7f0a1873f3c40_JaffaCakes118.exe 1980 f96312e9f0378702d2d7f0a1873f3c40_JaffaCakes118.exe 1980 f96312e9f0378702d2d7f0a1873f3c40_JaffaCakes118.exe 1980 f96312e9f0378702d2d7f0a1873f3c40_JaffaCakes118.exe 1980 f96312e9f0378702d2d7f0a1873f3c40_JaffaCakes118.exe 1980 f96312e9f0378702d2d7f0a1873f3c40_JaffaCakes118.exe 1980 f96312e9f0378702d2d7f0a1873f3c40_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1960 explorer.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeRestorePrivilege 2480 msiexec.exe Token: SeTakeOwnershipPrivilege 2480 msiexec.exe Token: SeSecurityPrivilege 2480 msiexec.exe Token: SeShutdownPrivilege 1960 explorer.exe Token: SeShutdownPrivilege 1960 explorer.exe Token: SeShutdownPrivilege 1960 explorer.exe Token: SeShutdownPrivilege 1960 explorer.exe Token: SeShutdownPrivilege 1960 explorer.exe Token: SeShutdownPrivilege 1960 explorer.exe Token: SeShutdownPrivilege 1960 explorer.exe Token: SeShutdownPrivilege 1960 explorer.exe Token: SeShutdownPrivilege 1960 explorer.exe Token: SeShutdownPrivilege 1960 explorer.exe Token: SeShutdownPrivilege 1960 explorer.exe Token: SeShutdownPrivilege 1960 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 1960 explorer.exe 1960 explorer.exe 1960 explorer.exe 1960 explorer.exe 1960 explorer.exe 1960 explorer.exe 1960 explorer.exe 1960 explorer.exe 1960 explorer.exe 1960 explorer.exe 1960 explorer.exe 1960 explorer.exe 1960 explorer.exe 1960 explorer.exe 1960 explorer.exe 1960 explorer.exe 1960 explorer.exe 1960 explorer.exe 1960 explorer.exe 1960 explorer.exe 1960 explorer.exe 1960 explorer.exe 1960 explorer.exe 1960 explorer.exe 1960 explorer.exe 1960 explorer.exe 1960 explorer.exe 1960 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 1960 explorer.exe 1960 explorer.exe 1960 explorer.exe 1960 explorer.exe 1960 explorer.exe 1960 explorer.exe 1960 explorer.exe 1960 explorer.exe 1960 explorer.exe 1960 explorer.exe 1960 explorer.exe 1960 explorer.exe 1960 explorer.exe 1960 explorer.exe 1960 explorer.exe 1960 explorer.exe 1960 explorer.exe 1960 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1980 wrote to memory of 1676 1980 f96312e9f0378702d2d7f0a1873f3c40_JaffaCakes118.exe 33 PID 1980 wrote to memory of 1676 1980 f96312e9f0378702d2d7f0a1873f3c40_JaffaCakes118.exe 33 PID 1980 wrote to memory of 1676 1980 f96312e9f0378702d2d7f0a1873f3c40_JaffaCakes118.exe 33 PID 1980 wrote to memory of 1676 1980 f96312e9f0378702d2d7f0a1873f3c40_JaffaCakes118.exe 33 PID 1980 wrote to memory of 324 1980 f96312e9f0378702d2d7f0a1873f3c40_JaffaCakes118.exe 36 PID 1980 wrote to memory of 324 1980 f96312e9f0378702d2d7f0a1873f3c40_JaffaCakes118.exe 36 PID 1980 wrote to memory of 324 1980 f96312e9f0378702d2d7f0a1873f3c40_JaffaCakes118.exe 36 PID 1980 wrote to memory of 324 1980 f96312e9f0378702d2d7f0a1873f3c40_JaffaCakes118.exe 36 PID 1980 wrote to memory of 2168 1980 f96312e9f0378702d2d7f0a1873f3c40_JaffaCakes118.exe 37 PID 1980 wrote to memory of 2168 1980 f96312e9f0378702d2d7f0a1873f3c40_JaffaCakes118.exe 37 PID 1980 wrote to memory of 2168 1980 f96312e9f0378702d2d7f0a1873f3c40_JaffaCakes118.exe 37 PID 1980 wrote to memory of 2168 1980 f96312e9f0378702d2d7f0a1873f3c40_JaffaCakes118.exe 37 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer f96312e9f0378702d2d7f0a1873f3c40_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" f96312e9f0378702d2d7f0a1873f3c40_JaffaCakes118.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\f96312e9f0378702d2d7f0a1873f3c40_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f96312e9f0378702d2d7f0a1873f3c40_JaffaCakes118.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\f96312e9f0378702d2d7f0a1873f3c40_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f96312e9f0378702d2d7f0a1873f3c40_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\0E8A9\85DB3.exe%C:\Users\Admin\AppData\Roaming\0E8A92⤵
- System Location Discovery: System Language Discovery
PID:1676
-
-
C:\Program Files (x86)\LP\B3E0\6519.tmp"C:\Program Files (x86)\LP\B3E0\6519.tmp"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:324
-
-
C:\Users\Admin\AppData\Local\Temp\f96312e9f0378702d2d7f0a1873f3c40_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f96312e9f0378702d2d7f0a1873f3c40_JaffaCakes118.exe startC:\Program Files (x86)\A9D2A\lvvm.exe%C:\Program Files (x86)\A9D2A2⤵
- System Location Discovery: System Language Discovery
PID:2168
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2480
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1960
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5887bc52bf7c60d29ff8ea0318577f985
SHA11bcf477f5c19f73338f0877b58a5ac69898a4efa
SHA256622f6de67667c20cac598c87e3621a645a3160136d27d931b7484d470bf8525f
SHA512ac468fe4bdf639f84689372a04cc82b5e6c49a001cc140c891e07e581fb6a376bb8060596a27deb68798cd0ddd967ab392e7282470413dbf07ee31ae47fa301d
-
Filesize
600B
MD5f94faa500ab2e2a406e24145d360794c
SHA1f113b2217acc78b3f9d6c410fef966d47c43549a
SHA256bd96b526ecf397fb5e21cdc9ca6bb9fd549e3f04c2e07b7cf6a769b94347b3fb
SHA51298b7a61185e63d9b7d7c1ea38460ceb5b24fabdf54243551ec200603d027e9f80a0c3d85f57206ab83a11b3690e14b5b9b6ceb8f94b89b64131afc5ad79e9528
-
Filesize
897B
MD5bb346140d401e366b07b939e1c583e14
SHA19e58cb90078ca7da59cbee837d2bb776255dda85
SHA2566f3674edddff379f2490b0007768af718561723e35fb93e75c35ef43029ef214
SHA512823f07dc0d4137a399e842a161e0edb595c259dd4e7251baa73c37e34a2994118bc10daaa3f37cd550480e177bc1784b02c8a61a4f1b0dc17e751604a5b835b6
-
Filesize
99KB
MD582d50af33ff156670a076dc834a99b4d
SHA1d5e3662e28d51a8366fb214d77585b95984541d1
SHA2567f57b37aa39698068271e64bbb42ff74b1a2b6157d233d8bdef1f683a7230a7d
SHA512527986d4cca9998059e278de71989f3f46851eace0370cb2bfd69dc7292d5a1597a373ff2b350137eeea8dd7dd13a0e8de8b6306795e4b5a6428fab6c1b27563