Analysis
-
max time kernel
140s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2024, 18:15
Static task
static1
Behavioral task
behavioral1
Sample
02a865b167b5088f909441f34eb46dd8_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
02a865b167b5088f909441f34eb46dd8_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
02a865b167b5088f909441f34eb46dd8_JaffaCakes118.exe
-
Size
470KB
-
MD5
02a865b167b5088f909441f34eb46dd8
-
SHA1
ad00d83f7dee2404846a0ec338b7cbc3c70961ce
-
SHA256
aea492182ac46cb4b0a4eb5b309257aa71fa63d7eaad740b9085eb2837a6e50f
-
SHA512
b223850833ed96816f0b494bfa3264a8ba92bb820ff5078f1b31179acda691a6ed72f80618bdce0ce916fa248e0be4de88f0cfc81bcfb853e89a1c46922a7963
-
SSDEEP
12288:5F5uZ3eVh7Gxk7Mef6chlgO3vw/4La/SXgHzMDVlt:5qeVh7u+7fPgO3Y0QzM5
Malware Config
Signatures
-
Detected Nirsoft tools 2 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral2/memory/4756-19-0x0000000000400000-0x000000000041D000-memory.dmp Nirsoft behavioral2/memory/3120-35-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft -
NirSoft MailPassView 1 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral2/memory/4756-19-0x0000000000400000-0x000000000041D000-memory.dmp MailPassView -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation 02a865b167b5088f909441f34eb46dd8_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 4756 C5B2.exe 3120 C7A7.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts C5B2.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RegistryMonitor1 = "C:\\Windows\\system32\\qtplugin.exe" 02a865b167b5088f909441f34eb46dd8_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\qtplugin.exe 02a865b167b5088f909441f34eb46dd8_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\qtplugin.exe 02a865b167b5088f909441f34eb46dd8_JaffaCakes118.exe -
resource yara_rule behavioral2/files/0x00070000000234e0-10.dat upx behavioral2/memory/4756-17-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/4756-19-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/files/0x00080000000234e0-25.dat upx behavioral2/memory/3120-31-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral2/memory/3120-35-0x0000000000400000-0x000000000041B000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 02a865b167b5088f909441f34eb46dd8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C5B2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C7A7.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeLoadDriverPrivilege 3400 02a865b167b5088f909441f34eb46dd8_JaffaCakes118.exe Token: SeDebugPrivilege 3120 C7A7.exe Token: SeRestorePrivilege 3120 C7A7.exe Token: SeBackupPrivilege 3120 C7A7.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3400 02a865b167b5088f909441f34eb46dd8_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3400 wrote to memory of 4756 3400 02a865b167b5088f909441f34eb46dd8_JaffaCakes118.exe 82 PID 3400 wrote to memory of 4756 3400 02a865b167b5088f909441f34eb46dd8_JaffaCakes118.exe 82 PID 3400 wrote to memory of 4756 3400 02a865b167b5088f909441f34eb46dd8_JaffaCakes118.exe 82 PID 3400 wrote to memory of 3120 3400 02a865b167b5088f909441f34eb46dd8_JaffaCakes118.exe 84 PID 3400 wrote to memory of 3120 3400 02a865b167b5088f909441f34eb46dd8_JaffaCakes118.exe 84 PID 3400 wrote to memory of 3120 3400 02a865b167b5088f909441f34eb46dd8_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\02a865b167b5088f909441f34eb46dd8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\02a865b167b5088f909441f34eb46dd8_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Users\Admin\AppData\Local\Temp\C5B2.exe"C:\Users\Admin\AppData\Local\Temp\C5B2.exe" /stab "C:\Users\Admin\AppData\Local\Temp\C5B2.tmp"2⤵
- Executes dropped EXE
- Accesses Microsoft Outlook accounts
- System Location Discovery: System Language Discovery
PID:4756
-
-
C:\Users\Admin\AppData\Local\Temp\C7A7.exe"C:\Users\Admin\AppData\Local\Temp\C7A7.exe" /stab "C:\Users\Admin\AppData\Local\Temp\C7A7.tmp" /no_pass_cred2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3120
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
47KB
MD558a96adf790b82bdab58cc501f3a1318
SHA1ffe5f1d9a3e09b5311e823f562043fd31cfe6738
SHA2564e38a0fc72a1f6bb32f78fc78ab925e12a5be19794c90e428a632ae79d719d36
SHA5129cac2e5a7e60583cb9e8c082e0db7d734b9417208db525b2297706bb62b22fedc2cf8bbc2e4c85efba28a7eb92221453df95a8ad4b8439ece789d5255ce4014c
-
Filesize
42KB
MD528c110b8d0ad095131c8d06043678086
SHA1c684cf321e890e0e766a97609a4cde866156d6c5
SHA256dbc2216d5f31f5218e940e3d802998dee90eeb69af69cbeb063c69c6a5a3f1e1
SHA512065e043b76b0e1163e73f4a1c257bae793ae9b46bff1951956c2174ef91deb2528730da77aab76b9e7246d705c3b8c1d23f05dc3b161cacabf3e52d0f563c922
-
Filesize
186B
MD5762c597cbf0458242b32a770b29830ab
SHA1079c64621c88414e9e59239eec0c789c0071dd68
SHA256efacaa084e12cf26bc25ad83742b6ae9b1df4a537f13df802563af2270462cd4
SHA512c0c4edc550b8f1fc36ef74b233b0e85a3669cb913057b4854d99d517554b6a8d17201938e7c3225eb6c87e9eb3277c9044f0013f28bd27bd644ee8fd5802d661