Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 10:08
Static task
static1
Behavioral task
behavioral1
Sample
0a238d4825cbf981766421b6c13786b4_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
0a238d4825cbf981766421b6c13786b4_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0a238d4825cbf981766421b6c13786b4_JaffaCakes118.exe
-
Size
276KB
-
MD5
0a238d4825cbf981766421b6c13786b4
-
SHA1
e8869b02df3858e485f5f104fdc45d6644911900
-
SHA256
622f79330bda2080671671ffcdcef09069c31093dbb9c0721329230fe11645c2
-
SHA512
a6e63446cc7dcafe2436cb60f7a73743304a058aa164eb8793c75135e061d95cbf5ac6ddb6ac09f1c6cefd148f0c5d933c162bd7bbb05dc4b617840a88fe4e86
-
SSDEEP
6144:8TPCUHeUYr5kj1OdOKRU64X9bGB7UqFoCevShTJVa0n/4:8OUZYr2jMoaUtXQBgCo3uJV7n/
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" 0a238d4825cbf981766421b6c13786b4_JaffaCakes118.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 1584 61DF.tmp -
Loads dropped DLL 2 IoCs
pid Process 2640 0a238d4825cbf981766421b6c13786b4_JaffaCakes118.exe 2640 0a238d4825cbf981766421b6c13786b4_JaffaCakes118.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\EA7.exe = "C:\\Program Files (x86)\\LP\\D3A8\\EA7.exe" 0a238d4825cbf981766421b6c13786b4_JaffaCakes118.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
resource yara_rule behavioral1/memory/2640-2-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/1700-49-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1700-48-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2640-51-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/2640-52-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/640-120-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/640-118-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2640-121-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2640-235-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2640-240-0x0000000000400000-0x0000000000469000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\LP\D3A8\61DF.tmp 0a238d4825cbf981766421b6c13786b4_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\LP\D3A8\EA7.exe 0a238d4825cbf981766421b6c13786b4_JaffaCakes118.exe File created C:\Program Files (x86)\LP\D3A8\EA7.exe 0a238d4825cbf981766421b6c13786b4_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0a238d4825cbf981766421b6c13786b4_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0a238d4825cbf981766421b6c13786b4_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0a238d4825cbf981766421b6c13786b4_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 61DF.tmp -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_Classes\Local Settings explorer.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2640 0a238d4825cbf981766421b6c13786b4_JaffaCakes118.exe 2640 0a238d4825cbf981766421b6c13786b4_JaffaCakes118.exe 2640 0a238d4825cbf981766421b6c13786b4_JaffaCakes118.exe 2640 0a238d4825cbf981766421b6c13786b4_JaffaCakes118.exe 2640 0a238d4825cbf981766421b6c13786b4_JaffaCakes118.exe 2640 0a238d4825cbf981766421b6c13786b4_JaffaCakes118.exe 2640 0a238d4825cbf981766421b6c13786b4_JaffaCakes118.exe 2640 0a238d4825cbf981766421b6c13786b4_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2280 explorer.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeRestorePrivilege 2772 msiexec.exe Token: SeTakeOwnershipPrivilege 2772 msiexec.exe Token: SeSecurityPrivilege 2772 msiexec.exe Token: SeShutdownPrivilege 2280 explorer.exe Token: SeShutdownPrivilege 2280 explorer.exe Token: SeShutdownPrivilege 2280 explorer.exe Token: SeShutdownPrivilege 2280 explorer.exe Token: SeShutdownPrivilege 2280 explorer.exe Token: SeShutdownPrivilege 2280 explorer.exe Token: SeShutdownPrivilege 2280 explorer.exe Token: SeShutdownPrivilege 2280 explorer.exe Token: SeShutdownPrivilege 2280 explorer.exe Token: SeShutdownPrivilege 2280 explorer.exe Token: SeShutdownPrivilege 2280 explorer.exe Token: SeShutdownPrivilege 2280 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 2280 explorer.exe 2280 explorer.exe 2280 explorer.exe 2280 explorer.exe 2280 explorer.exe 2280 explorer.exe 2280 explorer.exe 2280 explorer.exe 2280 explorer.exe 2280 explorer.exe 2280 explorer.exe 2280 explorer.exe 2280 explorer.exe 2280 explorer.exe 2280 explorer.exe 2280 explorer.exe 2280 explorer.exe 2280 explorer.exe 2280 explorer.exe 2280 explorer.exe 2280 explorer.exe 2280 explorer.exe 2280 explorer.exe 2280 explorer.exe 2280 explorer.exe 2280 explorer.exe 2280 explorer.exe 2280 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 2280 explorer.exe 2280 explorer.exe 2280 explorer.exe 2280 explorer.exe 2280 explorer.exe 2280 explorer.exe 2280 explorer.exe 2280 explorer.exe 2280 explorer.exe 2280 explorer.exe 2280 explorer.exe 2280 explorer.exe 2280 explorer.exe 2280 explorer.exe 2280 explorer.exe 2280 explorer.exe 2280 explorer.exe 2280 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2640 wrote to memory of 1700 2640 0a238d4825cbf981766421b6c13786b4_JaffaCakes118.exe 32 PID 2640 wrote to memory of 1700 2640 0a238d4825cbf981766421b6c13786b4_JaffaCakes118.exe 32 PID 2640 wrote to memory of 1700 2640 0a238d4825cbf981766421b6c13786b4_JaffaCakes118.exe 32 PID 2640 wrote to memory of 1700 2640 0a238d4825cbf981766421b6c13786b4_JaffaCakes118.exe 32 PID 2640 wrote to memory of 640 2640 0a238d4825cbf981766421b6c13786b4_JaffaCakes118.exe 34 PID 2640 wrote to memory of 640 2640 0a238d4825cbf981766421b6c13786b4_JaffaCakes118.exe 34 PID 2640 wrote to memory of 640 2640 0a238d4825cbf981766421b6c13786b4_JaffaCakes118.exe 34 PID 2640 wrote to memory of 640 2640 0a238d4825cbf981766421b6c13786b4_JaffaCakes118.exe 34 PID 2640 wrote to memory of 1584 2640 0a238d4825cbf981766421b6c13786b4_JaffaCakes118.exe 36 PID 2640 wrote to memory of 1584 2640 0a238d4825cbf981766421b6c13786b4_JaffaCakes118.exe 36 PID 2640 wrote to memory of 1584 2640 0a238d4825cbf981766421b6c13786b4_JaffaCakes118.exe 36 PID 2640 wrote to memory of 1584 2640 0a238d4825cbf981766421b6c13786b4_JaffaCakes118.exe 36 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 0a238d4825cbf981766421b6c13786b4_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" 0a238d4825cbf981766421b6c13786b4_JaffaCakes118.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a238d4825cbf981766421b6c13786b4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0a238d4825cbf981766421b6c13786b4_JaffaCakes118.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\0a238d4825cbf981766421b6c13786b4_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\0a238d4825cbf981766421b6c13786b4_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\8DCBE\C8ED3.exe%C:\Users\Admin\AppData\Roaming\8DCBE2⤵
- System Location Discovery: System Language Discovery
PID:1700
-
-
C:\Users\Admin\AppData\Local\Temp\0a238d4825cbf981766421b6c13786b4_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\0a238d4825cbf981766421b6c13786b4_JaffaCakes118.exe startC:\Program Files (x86)\BE2E4\lvvm.exe%C:\Program Files (x86)\BE2E42⤵
- System Location Discovery: System Language Discovery
PID:640
-
-
C:\Program Files (x86)\LP\D3A8\61DF.tmp"C:\Program Files (x86)\LP\D3A8\61DF.tmp"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1584
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2772
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2280
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
104KB
MD5296365f98338c7267752451423e72be1
SHA1951728a38cf1824967b036cfa2ea701912541e61
SHA25612ea8a3c0368375a8690de8439051576677a4b818f5599b57eb00264882a8bb0
SHA51283e37ecaee17f464f89b0c1437660b7856fc4bd35f28e355d6edd7b3424d2f8f95f6f3b9f7871f631051ed013cf35c544748b2d6c083c07ac095945cad4fe15c
-
Filesize
1KB
MD52a5bab586dfc27cd38dc85af41b9917c
SHA15cac3cf89d377ce241662b16e29525e3319871eb
SHA256ecc828cda622dcdfa6b2514dc37f8d9073664e836ee6d5c8a520baebb652d6c9
SHA512fba313a4705aa751428a6c816301d5247405337f343523cce12572f886bcbb07968a23604df3adeb52d62d7bf65306edf7f71b57b2e87df9bc482cbbd92ddd49
-
Filesize
1KB
MD5a3de7c4646a0962b9300e5219b04fb6e
SHA1326b77facb4da04a09c850e5400854a489d7cc86
SHA256f80c41e094d128d20f20fa2405e3e2da2e576e29c2db21f39884014b47aa609b
SHA512283120bfe92063f0d8521d23b435eda68209d61dd0225bb9209b2ecbabd83fdb6fdec8bd9e03927149864f396ec58e8cd2e36f112590ef5ad9d47871e25a32e8
-
Filesize
2KB
MD5a1ac26df7b625a147c55de4bf105bfe7
SHA1145d06c6d44a414918fb7ca6ed7319950f492573
SHA256b791702aa8e6facf87376dee16aba13f385e22416c4a332a2382758336cd40ed
SHA512ffb25c10ec5ecc1d3a2731ca06ba70b2e23594a6c042a96d3bdb22bfbd23c278c8fbb966b137e41b8bb7f2075157cff50cb541d98c1a132f643465d636aa6786
-
Filesize
597B
MD584e6271bb86de6516d03f0e82d9bb1ab
SHA1490d64d70de336a11d64d7913817974555c89283
SHA256e34cecd3b0d5a2f9c7c54caddd4491c99ccc75bc18f47a2c7e045b8283209976
SHA512fe95cb292ba4b1096a73d39e0afc85db3305d92e67166b8669129b7a405182104e7ce9b4f99a3c44dec479c9034a682c9020bd7db65a8b44f55ccb971c36596a
-
Filesize
897B
MD528ec5e260daae019704616ad94819404
SHA1b3147c22b5d9103e642f25d20274206d8853c73e
SHA256d094c0543f4bfa2fb89caea5dbf514a23e0b7648f20a3a206661a699f33e4b65
SHA512cf090cfb4e01d6a978e4813952ceda6eeb848576ba49817974ee81bebc39dcf614566691461ba2b930ea9f07d6b734e2437bf2bb9a764b486d8500ae954d4b81
-
Filesize
297B
MD5b2ae80505b435a5bba86306d3b1e8564
SHA1353c5b4a0ddc6f48520a05c6701f0ec5151a2cea
SHA256a34225188f739e2f1db325cd28ca33d8d01b9d9eb5e1b8964d91f3d702f73514
SHA512c03f4cd8716173e540e990462ac601de4154155d4c1e28550b9da90051d8906a669979437c3a6074670e80653b1b8744c49208a70d2d251a84c44ca6858c364b