Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 22:01
Behavioral task
behavioral1
Sample
0ca07fb37ec9b3d35aec82064f1efe5e_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
0ca07fb37ec9b3d35aec82064f1efe5e_JaffaCakes118.exe
-
Size
46KB
-
MD5
0ca07fb37ec9b3d35aec82064f1efe5e
-
SHA1
6255b45e4ef0839ee9d6f76ce19dfc8a0375fafd
-
SHA256
1e4c7bb6792b04b15494bd6b13a14b239fabd670bf98f2be91d002ea6f3fb024
-
SHA512
52b48677a1a91c34cae05176cbf2eb496278f58e351b985756b055b621100a1a683a566aae0b6a114271b4d741d49f02a97bac5907e15cdd6dfbae3200c25935
-
SSDEEP
768:ljjRUT7z0A82AcZ008NyJyUJZV5ALAKwbV2wEwtDTysPeI1apGNbhONO:Xi/8/cZF8NyJymV5dKw5EqDTX1a47
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe \"C:\\Users\\Admin\\AppData\\Roaming\\lxkzefh22111ikdopryapckpwom3ulj2\\csrss.exe\"" 0ca07fb37ec9b3d35aec82064f1efe5e_JaffaCakes118.exe -
Modifies firewall policy service 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List 0ca07fb37ec9b3d35aec82064f1efe5e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\0ca07fb37ec9b3d35aec82064f1efe5e_JaffaCakes118.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\0ca07fb37ec9b3d35aec82064f1efe5e_JaffaCakes118.exe:*:Enabled:ldrsoft" 0ca07fb37ec9b3d35aec82064f1efe5e_JaffaCakes118.exe -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0ca07fb37ec9b3d35aec82064f1efe5e_JaffaCakes118.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2424-0-0x0000000000400000-0x0000000000638000-memory.dmp upx behavioral1/memory/2424-1-0x0000000000400000-0x0000000000488000-memory.dmp upx behavioral1/memory/2424-2-0x0000000000400000-0x0000000000638000-memory.dmp upx behavioral1/memory/2424-3-0x0000000000400000-0x0000000000488000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0ca07fb37ec9b3d35aec82064f1efe5e_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2424 0ca07fb37ec9b3d35aec82064f1efe5e_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ca07fb37ec9b3d35aec82064f1efe5e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0ca07fb37ec9b3d35aec82064f1efe5e_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Modifies firewall policy service
- Checks BIOS information in registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:2424
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1