Analysis
-
max time kernel
95s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/09/2024, 04:22
Behavioral task
behavioral1
Sample
fb7f311c724b5634fbff8893c90caa7e_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
fb7f311c724b5634fbff8893c90caa7e_JaffaCakes118.exe
-
Size
32KB
-
MD5
fb7f311c724b5634fbff8893c90caa7e
-
SHA1
b699d65d4d6cc19832bd277d8eb824b5c454c9a9
-
SHA256
26d1c17627cace8b1de05fa5c542e5934ee8f79c12235048a5a865174c50b229
-
SHA512
6f4bfd1e458e1c8fa48bd7620440aab9e3cbfe2d356c38c123b973b7408485b9afaebe0961c70de607fda456f72a3c79e941270216964b4b43ae292908855e12
-
SSDEEP
768:JGCFhVReQmX4OzZWXl9oII879e8xtZbKKEw/+3fb:JTHReTXXzsXl9gQDZOVfb
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 560 rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 560 rundll32.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory 8 IoCs
description ioc Process File created C:\Windows\SysWOW64\ksuser.dll fb7f311c724b5634fbff8893c90caa7e_JaffaCakes118.exe File created C:\Windows\SysWOW64\dllcache\ksuser.dll fb7f311c724b5634fbff8893c90caa7e_JaffaCakes118.exe File created C:\Windows\SysWOW64\YUmidimap.dll fb7f311c724b5634fbff8893c90caa7e_JaffaCakes118.exe File created C:\Windows\SysWOW64\midimap.dll fb7f311c724b5634fbff8893c90caa7e_JaffaCakes118.exe File created C:\Windows\SysWOW64\dllcache\midimap.dll fb7f311c724b5634fbff8893c90caa7e_JaffaCakes118.exe File created C:\Windows\SysWOW64\sysapp7.dll fb7f311c724b5634fbff8893c90caa7e_JaffaCakes118.exe File created C:\Windows\SysWOW64\YUksuser.dll fb7f311c724b5634fbff8893c90caa7e_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\YUksuser.dll fb7f311c724b5634fbff8893c90caa7e_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/4404-0-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/memory/4404-4-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/memory/4404-14-0x0000000000400000-0x0000000000416000-memory.dmp upx -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4800 sc.exe 1592 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fb7f311c724b5634fbff8893c90caa7e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4404 fb7f311c724b5634fbff8893c90caa7e_JaffaCakes118.exe 4404 fb7f311c724b5634fbff8893c90caa7e_JaffaCakes118.exe 4404 fb7f311c724b5634fbff8893c90caa7e_JaffaCakes118.exe 4404 fb7f311c724b5634fbff8893c90caa7e_JaffaCakes118.exe 4404 fb7f311c724b5634fbff8893c90caa7e_JaffaCakes118.exe 4404 fb7f311c724b5634fbff8893c90caa7e_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4404 fb7f311c724b5634fbff8893c90caa7e_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4404 wrote to memory of 3164 4404 fb7f311c724b5634fbff8893c90caa7e_JaffaCakes118.exe 89 PID 4404 wrote to memory of 3164 4404 fb7f311c724b5634fbff8893c90caa7e_JaffaCakes118.exe 89 PID 4404 wrote to memory of 3164 4404 fb7f311c724b5634fbff8893c90caa7e_JaffaCakes118.exe 89 PID 4404 wrote to memory of 4800 4404 fb7f311c724b5634fbff8893c90caa7e_JaffaCakes118.exe 90 PID 4404 wrote to memory of 4800 4404 fb7f311c724b5634fbff8893c90caa7e_JaffaCakes118.exe 90 PID 4404 wrote to memory of 4800 4404 fb7f311c724b5634fbff8893c90caa7e_JaffaCakes118.exe 90 PID 4404 wrote to memory of 1592 4404 fb7f311c724b5634fbff8893c90caa7e_JaffaCakes118.exe 91 PID 4404 wrote to memory of 1592 4404 fb7f311c724b5634fbff8893c90caa7e_JaffaCakes118.exe 91 PID 4404 wrote to memory of 1592 4404 fb7f311c724b5634fbff8893c90caa7e_JaffaCakes118.exe 91 PID 4404 wrote to memory of 560 4404 fb7f311c724b5634fbff8893c90caa7e_JaffaCakes118.exe 93 PID 4404 wrote to memory of 560 4404 fb7f311c724b5634fbff8893c90caa7e_JaffaCakes118.exe 93 PID 4404 wrote to memory of 560 4404 fb7f311c724b5634fbff8893c90caa7e_JaffaCakes118.exe 93 PID 3164 wrote to memory of 2556 3164 net.exe 96 PID 3164 wrote to memory of 2556 3164 net.exe 96 PID 3164 wrote to memory of 2556 3164 net.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb7f311c724b5634fbff8893c90caa7e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fb7f311c724b5634fbff8893c90caa7e_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Windows\SysWOW64\net.exenet stop cryptsvc2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop cryptsvc3⤵
- System Location Discovery: System Language Discovery
PID:2556
-
-
-
C:\Windows\SysWOW64\sc.exesc config cryptsvc start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4800
-
-
C:\Windows\SysWOW64\sc.exesc delete cryptsvc2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1592
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Users\Admin\AppData\Local\Temp\1727497369.dat, ServerMain c:\users\admin\appdata\local\temp\fb7f311c724b5634fbff8893c90caa7e_jaffacakes118.exe2⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD5e9d7e6762699f3cc6130de1bd9ac83e8
SHA1dbbead7817bedb750d3f17f528c27e4029405a5b
SHA2560c353ad80eb741c20db555c77e72a8ea0b97d657859c3b633c148b0da9de27a9
SHA51271fa3ddac0390dbe945d0bd841445cc6a1cd33a727252031f60c79bf2db5f8ba3f6e9240a366da199e0bd02c85d1bdcdf713980d7b066c53c2305e18a1f270dd