Analysis
-
max time kernel
144s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-10-2024 20:20
Static task
static1
Behavioral task
behavioral1
Sample
106291b88427f5fcf309d80afac46c10_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
106291b88427f5fcf309d80afac46c10_JaffaCakes118.exe
-
Size
670KB
-
MD5
106291b88427f5fcf309d80afac46c10
-
SHA1
a19c9edfdd6d3f057543d35fc380a5459a878c3f
-
SHA256
09e8d691d046440631c14952b1533c3bf482f4b6fa9587bd229eb2e39c648f9c
-
SHA512
fa040c8361a5c221be13ef3672ca01f1cd28147b6144b269e58fbcd43840c80d5c026fb63c3918e7f9ad00f36c78e484121e3d01671dc4bf9feb9b2532712671
-
SSDEEP
12288:8hdsll5H+iYbHW7CQV1POhmmp+ZGnTtmg3Fxx7JvdakTNacsvHN:8hiH+iYb27CQjcmi+QnTN3vJxdjpaDN
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2728 hpet.exe -
Loads dropped DLL 4 IoCs
pid Process 2240 106291b88427f5fcf309d80afac46c10_JaffaCakes118.exe 2240 106291b88427f5fcf309d80afac46c10_JaffaCakes118.exe 2240 106291b88427f5fcf309d80afac46c10_JaffaCakes118.exe 2240 106291b88427f5fcf309d80afac46c10_JaffaCakes118.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 106291b88427f5fcf309d80afac46c10_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hpet.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://search.b1.org/?bsrc=hmior&chid=c167991" hpet.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Start Page Before = "http://go.microsoft.com/fwlink/?LinkId=69157" hpet.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Search Page Before = "http://go.microsoft.com/fwlink/?LinkId=54896" hpet.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://search.b1.org/?bsrc=hmior&chid=c167991" hpet.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2728 hpet.exe 2728 hpet.exe 2728 hpet.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2240 106291b88427f5fcf309d80afac46c10_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2728 2240 106291b88427f5fcf309d80afac46c10_JaffaCakes118.exe 32 PID 2240 wrote to memory of 2728 2240 106291b88427f5fcf309d80afac46c10_JaffaCakes118.exe 32 PID 2240 wrote to memory of 2728 2240 106291b88427f5fcf309d80afac46c10_JaffaCakes118.exe 32 PID 2240 wrote to memory of 2728 2240 106291b88427f5fcf309d80afac46c10_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\106291b88427f5fcf309d80afac46c10_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\106291b88427f5fcf309d80afac46c10_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Roaming\B1Toolbar\hpet.exe"C:\Users\Admin\AppData\Roaming\B1Toolbar\hpet.exe" -home -home2 -hie -hff -hgc -et -channel 1679912⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
PID:2728
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
467KB
MD597bc7c2a98ee92297fcb2cecf1b222f9
SHA1b3e08065fff002513c36cfe85e0ca607c68fbce3
SHA2560effc6288b6ce1f933c8b97dc8ec5e6ee883f0628bea176538f65b0b2297d1fe
SHA512a53e1220dfba16fe44f20bfc32dd986054751fb124a1c0917af4c34a45e7a2187ae05098a7681f9ed65cee852e3fbecf8fa49cc015b224dc50566659859986cc