Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 04:11
Static task
static1
Behavioral task
behavioral1
Sample
08d23d928b86fc4b201c77b6e41a1d3b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
08d23d928b86fc4b201c77b6e41a1d3b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
08d23d928b86fc4b201c77b6e41a1d3b_JaffaCakes118.exe
-
Size
300KB
-
MD5
08d23d928b86fc4b201c77b6e41a1d3b
-
SHA1
b5d593f76d2c79f5c1f7ae5149c29030b4b74f80
-
SHA256
bce829bbed72893ebb0053992ae105028ecaada344d6c27f2b01281839bf9cb6
-
SHA512
48230fbd4eaa0a27146ab3d9811ffb537d05a9f4166bca1badd65d15a2938626343d804808ed1b8c3f8fc33be0c812c9e8ca2dfc476816e484ecc2bf15a00df0
-
SSDEEP
6144:IQE50eRNsaxhYdg0KzT32OTnjVOmsnmg5MrYvTUaco:ApR+agW2ODj50MMv9co
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1584 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2884 mowy.exe -
Loads dropped DLL 2 IoCs
pid Process 2372 08d23d928b86fc4b201c77b6e41a1d3b_JaffaCakes118.exe 2372 08d23d928b86fc4b201c77b6e41a1d3b_JaffaCakes118.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\Ifpyliaw = "C:\\Users\\Admin\\AppData\\Roaming\\Vymek\\mowy.exe" mowy.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2372 set thread context of 1584 2372 08d23d928b86fc4b201c77b6e41a1d3b_JaffaCakes118.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 08d23d928b86fc4b201c77b6e41a1d3b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mowy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Privacy 08d23d928b86fc4b201c77b6e41a1d3b_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 08d23d928b86fc4b201c77b6e41a1d3b_JaffaCakes118.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\51852B6A-00000001.eml:OECustomProperty WinMail.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2884 mowy.exe 2884 mowy.exe 2884 mowy.exe 2884 mowy.exe 2884 mowy.exe 2884 mowy.exe 2884 mowy.exe 2884 mowy.exe 2884 mowy.exe 2884 mowy.exe 2884 mowy.exe 2884 mowy.exe 2884 mowy.exe 2884 mowy.exe 2884 mowy.exe 2884 mowy.exe 2884 mowy.exe 2884 mowy.exe 2884 mowy.exe 2884 mowy.exe 2884 mowy.exe 2884 mowy.exe 2884 mowy.exe 2884 mowy.exe 2884 mowy.exe 2884 mowy.exe 2884 mowy.exe 2884 mowy.exe 2884 mowy.exe 2884 mowy.exe 2884 mowy.exe 2884 mowy.exe 2884 mowy.exe 2884 mowy.exe 2884 mowy.exe 2884 mowy.exe 2884 mowy.exe 2884 mowy.exe 2884 mowy.exe 2884 mowy.exe 2884 mowy.exe 2884 mowy.exe 2884 mowy.exe 2884 mowy.exe 2884 mowy.exe 2884 mowy.exe 2884 mowy.exe 2884 mowy.exe 2884 mowy.exe 2884 mowy.exe 2884 mowy.exe 2884 mowy.exe 2884 mowy.exe 2884 mowy.exe 2884 mowy.exe 2884 mowy.exe 2884 mowy.exe 2884 mowy.exe 2884 mowy.exe 2884 mowy.exe 2884 mowy.exe 2884 mowy.exe 2884 mowy.exe 2884 mowy.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeSecurityPrivilege 2372 08d23d928b86fc4b201c77b6e41a1d3b_JaffaCakes118.exe Token: SeSecurityPrivilege 2372 08d23d928b86fc4b201c77b6e41a1d3b_JaffaCakes118.exe Token: SeSecurityPrivilege 2372 08d23d928b86fc4b201c77b6e41a1d3b_JaffaCakes118.exe Token: SeSecurityPrivilege 2372 08d23d928b86fc4b201c77b6e41a1d3b_JaffaCakes118.exe Token: SeSecurityPrivilege 2372 08d23d928b86fc4b201c77b6e41a1d3b_JaffaCakes118.exe Token: SeSecurityPrivilege 2372 08d23d928b86fc4b201c77b6e41a1d3b_JaffaCakes118.exe Token: SeSecurityPrivilege 2372 08d23d928b86fc4b201c77b6e41a1d3b_JaffaCakes118.exe Token: SeSecurityPrivilege 2372 08d23d928b86fc4b201c77b6e41a1d3b_JaffaCakes118.exe Token: SeSecurityPrivilege 2372 08d23d928b86fc4b201c77b6e41a1d3b_JaffaCakes118.exe Token: SeSecurityPrivilege 2372 08d23d928b86fc4b201c77b6e41a1d3b_JaffaCakes118.exe Token: SeManageVolumePrivilege 2228 WinMail.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2228 WinMail.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2228 WinMail.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2228 WinMail.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2372 08d23d928b86fc4b201c77b6e41a1d3b_JaffaCakes118.exe 2884 mowy.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2884 2372 08d23d928b86fc4b201c77b6e41a1d3b_JaffaCakes118.exe 30 PID 2372 wrote to memory of 2884 2372 08d23d928b86fc4b201c77b6e41a1d3b_JaffaCakes118.exe 30 PID 2372 wrote to memory of 2884 2372 08d23d928b86fc4b201c77b6e41a1d3b_JaffaCakes118.exe 30 PID 2372 wrote to memory of 2884 2372 08d23d928b86fc4b201c77b6e41a1d3b_JaffaCakes118.exe 30 PID 2884 wrote to memory of 1040 2884 mowy.exe 17 PID 2884 wrote to memory of 1040 2884 mowy.exe 17 PID 2884 wrote to memory of 1040 2884 mowy.exe 17 PID 2884 wrote to memory of 1040 2884 mowy.exe 17 PID 2884 wrote to memory of 1040 2884 mowy.exe 17 PID 2884 wrote to memory of 1068 2884 mowy.exe 18 PID 2884 wrote to memory of 1068 2884 mowy.exe 18 PID 2884 wrote to memory of 1068 2884 mowy.exe 18 PID 2884 wrote to memory of 1068 2884 mowy.exe 18 PID 2884 wrote to memory of 1068 2884 mowy.exe 18 PID 2884 wrote to memory of 1124 2884 mowy.exe 20 PID 2884 wrote to memory of 1124 2884 mowy.exe 20 PID 2884 wrote to memory of 1124 2884 mowy.exe 20 PID 2884 wrote to memory of 1124 2884 mowy.exe 20 PID 2884 wrote to memory of 1124 2884 mowy.exe 20 PID 2884 wrote to memory of 804 2884 mowy.exe 25 PID 2884 wrote to memory of 804 2884 mowy.exe 25 PID 2884 wrote to memory of 804 2884 mowy.exe 25 PID 2884 wrote to memory of 804 2884 mowy.exe 25 PID 2884 wrote to memory of 804 2884 mowy.exe 25 PID 2884 wrote to memory of 2372 2884 mowy.exe 29 PID 2884 wrote to memory of 2372 2884 mowy.exe 29 PID 2884 wrote to memory of 2372 2884 mowy.exe 29 PID 2884 wrote to memory of 2372 2884 mowy.exe 29 PID 2884 wrote to memory of 2372 2884 mowy.exe 29 PID 2372 wrote to memory of 1584 2372 08d23d928b86fc4b201c77b6e41a1d3b_JaffaCakes118.exe 32 PID 2372 wrote to memory of 1584 2372 08d23d928b86fc4b201c77b6e41a1d3b_JaffaCakes118.exe 32 PID 2372 wrote to memory of 1584 2372 08d23d928b86fc4b201c77b6e41a1d3b_JaffaCakes118.exe 32 PID 2372 wrote to memory of 1584 2372 08d23d928b86fc4b201c77b6e41a1d3b_JaffaCakes118.exe 32 PID 2372 wrote to memory of 1584 2372 08d23d928b86fc4b201c77b6e41a1d3b_JaffaCakes118.exe 32 PID 2372 wrote to memory of 1584 2372 08d23d928b86fc4b201c77b6e41a1d3b_JaffaCakes118.exe 32 PID 2372 wrote to memory of 1584 2372 08d23d928b86fc4b201c77b6e41a1d3b_JaffaCakes118.exe 32 PID 2372 wrote to memory of 1584 2372 08d23d928b86fc4b201c77b6e41a1d3b_JaffaCakes118.exe 32 PID 2372 wrote to memory of 1584 2372 08d23d928b86fc4b201c77b6e41a1d3b_JaffaCakes118.exe 32 PID 2884 wrote to memory of 1452 2884 mowy.exe 34 PID 2884 wrote to memory of 1452 2884 mowy.exe 34 PID 2884 wrote to memory of 1452 2884 mowy.exe 34 PID 2884 wrote to memory of 1452 2884 mowy.exe 34 PID 2884 wrote to memory of 1452 2884 mowy.exe 34 PID 2884 wrote to memory of 1420 2884 mowy.exe 35 PID 2884 wrote to memory of 1420 2884 mowy.exe 35 PID 2884 wrote to memory of 1420 2884 mowy.exe 35 PID 2884 wrote to memory of 1420 2884 mowy.exe 35 PID 2884 wrote to memory of 1420 2884 mowy.exe 35 PID 2884 wrote to memory of 1976 2884 mowy.exe 37 PID 2884 wrote to memory of 1976 2884 mowy.exe 37 PID 2884 wrote to memory of 1976 2884 mowy.exe 37 PID 2884 wrote to memory of 1976 2884 mowy.exe 37 PID 2884 wrote to memory of 1976 2884 mowy.exe 37 PID 2884 wrote to memory of 2604 2884 mowy.exe 38 PID 2884 wrote to memory of 2604 2884 mowy.exe 38 PID 2884 wrote to memory of 2604 2884 mowy.exe 38 PID 2884 wrote to memory of 2604 2884 mowy.exe 38 PID 2884 wrote to memory of 2604 2884 mowy.exe 38 PID 2884 wrote to memory of 2700 2884 mowy.exe 39 PID 2884 wrote to memory of 2700 2884 mowy.exe 39 PID 2884 wrote to memory of 2700 2884 mowy.exe 39 PID 2884 wrote to memory of 2700 2884 mowy.exe 39 PID 2884 wrote to memory of 2700 2884 mowy.exe 39 PID 2884 wrote to memory of 2652 2884 mowy.exe 40
Processes
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1040
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1068
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1124
-
C:\Users\Admin\AppData\Local\Temp\08d23d928b86fc4b201c77b6e41a1d3b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\08d23d928b86fc4b201c77b6e41a1d3b_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Roaming\Vymek\mowy.exe"C:\Users\Admin\AppData\Roaming\Vymek\mowy.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2884
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpb267fbf1.bat"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1584
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:804
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" -Embedding1⤵
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2228
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1452
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1420
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1976
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2604
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2700
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2652
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2992
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2080
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2864
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
1Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD5ebaa28a99398d1b361c936cc5f629919
SHA14bb29a47a2cce24dce26584d1d20f0620d9a619b
SHA256ed9963801640a5343954e75974c354e58fb26f47d2c0f8329f1035f4f12afb2d
SHA512fdab4fbac378f9b156f5267fdbd9a0a24b1158b189e55beb11dfe6555fcfadc86d9edae882f89b11377db0d0a11a9f584d0000cc59fbca9a6cebbe07e37431f3
-
Filesize
271B
MD54253d509024148875d0a45d18bd1d032
SHA10dc991cf5e9236292a59834d5f2b504a2c1b6612
SHA256c275c6217de33fc632ebe69191a6527ca82ae544821e91bb33db3d5263edd6e3
SHA512660c758876b904c08a7b653997e35ebf0f162d253b6c1522465bca708bb116efde5260168a30a23821b80d01ef81a30267ab4283627d1349f84dfc562a816113
-
Filesize
4KB
MD5dedd081c079709c5c788f4d86262cbd2
SHA16a652d0271fc8d5e7aa8374602d017875a11b823
SHA256d8cb014f6c512e628e1243320e4f7986d2ab62db5226d4a11016b6451e06e73e
SHA512d8c5558df57b9bce57e33e9e3d2795560cd93a979bca28458746681df369b6477126c37be275800d367bbfc82b64cb7e838c5f9b4b8172911e6f98864d459303
-
Filesize
300KB
MD5bc6644f121bcf8a238bd3edebe4e78e9
SHA174f97f5f9ba89dc220bab2fb800f143c673f4422
SHA25653c5cc0650d5e8346a006378f0682264861d396c63c257f9f74da749b5c6721f
SHA5124a518ccfcc1d5498ff7744ae03e6c91d3de7b83eae123ae354f9792bb357f3d92c536dc4e54a5aecccf68488291f1e55ddd5adfb1125a765ea39adfbdc9ce449