Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/10/2024, 12:24
Behavioral task
behavioral1
Sample
1811f857108561f2efebe9cf57d501ff_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1811f857108561f2efebe9cf57d501ff_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
1811f857108561f2efebe9cf57d501ff_JaffaCakes118.exe
-
Size
201KB
-
MD5
1811f857108561f2efebe9cf57d501ff
-
SHA1
1862725b5aea2788e7d33af0a88a13e15b12c397
-
SHA256
9644ca2e6839d42aa3e6ddc4d1c09e5e105b9588665a2a23e512e81ccce8f7cf
-
SHA512
a7af5ae79410aa2d778c95fe346eedabf073dc6e4e1b0a721ab127774d920af08f395b2f8516e916bb79af90b5b65f7767dc1e924ed99984f9d4db8eaf024432
-
SSDEEP
6144:Amh0LXJZk4khK3D6Gib9cmJ69SuwVzgF:Amh0b3oKTbiJhJ69H24
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2732 pagess.sys.exe 3056 pagess.sys.exe 2480 AB65A60.exe -
Loads dropped DLL 4 IoCs
pid Process 2944 1811f857108561f2efebe9cf57d501ff_JaffaCakes118.exe 2944 1811f857108561f2efebe9cf57d501ff_JaffaCakes118.exe 3056 pagess.sys.exe 3056 pagess.sys.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\UU9G4E9I4A9I4UXAKOTC = "C:\\pagess.sys\\pagess.sys.exe" AB65A60.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2316 set thread context of 2944 2316 1811f857108561f2efebe9cf57d501ff_JaffaCakes118.exe 28 PID 2732 set thread context of 3056 2732 pagess.sys.exe 30 -
resource yara_rule behavioral1/memory/2316-0-0x0000000000400000-0x00000000004AB000-memory.dmp upx behavioral1/memory/2944-4-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral1/memory/2944-11-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral1/memory/2944-10-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral1/memory/2316-13-0x0000000000400000-0x00000000004AB000-memory.dmp upx behavioral1/memory/2944-9-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral1/memory/2944-8-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral1/memory/2944-7-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral1/memory/2944-6-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral1/memory/2944-19-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral1/files/0x0031000000014737-26.dat upx behavioral1/memory/3056-45-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral1/memory/2732-39-0x0000000000400000-0x00000000004AB000-memory.dmp upx behavioral1/memory/3056-38-0x0000000000400000-0x0000000000459000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pagess.sys.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pagess.sys.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AB65A60.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1811f857108561f2efebe9cf57d501ff_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1811f857108561f2efebe9cf57d501ff_JaffaCakes118.exe -
Modifies Internet Explorer Phishing Filter 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PhishingFilter\ShownServiceDownBalloon = "0" AB65A60.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PhishingFilter AB65A60.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PhishingFilter\EnabledV8 = "0" AB65A60.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery AB65A60.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\ClearBrowsingHistoryOnExit = "0" AB65A60.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2944 1811f857108561f2efebe9cf57d501ff_JaffaCakes118.exe 2944 1811f857108561f2efebe9cf57d501ff_JaffaCakes118.exe 3056 pagess.sys.exe 2480 AB65A60.exe 2480 AB65A60.exe 2480 AB65A60.exe 2480 AB65A60.exe 2480 AB65A60.exe 2480 AB65A60.exe 2480 AB65A60.exe 2480 AB65A60.exe 2480 AB65A60.exe 2480 AB65A60.exe 2480 AB65A60.exe 2480 AB65A60.exe 2480 AB65A60.exe 2480 AB65A60.exe 2480 AB65A60.exe 2480 AB65A60.exe 2480 AB65A60.exe 2480 AB65A60.exe 2480 AB65A60.exe 2480 AB65A60.exe 2480 AB65A60.exe 2480 AB65A60.exe 2480 AB65A60.exe 2480 AB65A60.exe 2480 AB65A60.exe 2480 AB65A60.exe 2480 AB65A60.exe 2480 AB65A60.exe 2480 AB65A60.exe 2480 AB65A60.exe 2480 AB65A60.exe 2480 AB65A60.exe 2480 AB65A60.exe 2480 AB65A60.exe 2480 AB65A60.exe 2480 AB65A60.exe 2480 AB65A60.exe 2480 AB65A60.exe 2480 AB65A60.exe 2480 AB65A60.exe 2480 AB65A60.exe 2480 AB65A60.exe 2480 AB65A60.exe 2480 AB65A60.exe 2480 AB65A60.exe 2480 AB65A60.exe 2480 AB65A60.exe 2480 AB65A60.exe 2480 AB65A60.exe 2480 AB65A60.exe 2480 AB65A60.exe 2480 AB65A60.exe 2480 AB65A60.exe 2480 AB65A60.exe 2480 AB65A60.exe 2480 AB65A60.exe 2480 AB65A60.exe 2480 AB65A60.exe 2480 AB65A60.exe 2480 AB65A60.exe 2480 AB65A60.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2944 1811f857108561f2efebe9cf57d501ff_JaffaCakes118.exe Token: SeDebugPrivilege 2944 1811f857108561f2efebe9cf57d501ff_JaffaCakes118.exe Token: SeDebugPrivilege 2944 1811f857108561f2efebe9cf57d501ff_JaffaCakes118.exe Token: SeDebugPrivilege 2944 1811f857108561f2efebe9cf57d501ff_JaffaCakes118.exe Token: SeDebugPrivilege 3056 pagess.sys.exe Token: SeDebugPrivilege 3056 pagess.sys.exe Token: SeDebugPrivilege 2480 AB65A60.exe Token: SeDebugPrivilege 2480 AB65A60.exe Token: SeDebugPrivilege 2480 AB65A60.exe Token: SeDebugPrivilege 2480 AB65A60.exe Token: SeDebugPrivilege 2480 AB65A60.exe Token: SeDebugPrivilege 2480 AB65A60.exe Token: SeDebugPrivilege 2480 AB65A60.exe Token: SeDebugPrivilege 2480 AB65A60.exe Token: SeDebugPrivilege 2480 AB65A60.exe Token: SeDebugPrivilege 2480 AB65A60.exe Token: SeDebugPrivilege 2480 AB65A60.exe Token: SeDebugPrivilege 2480 AB65A60.exe Token: SeDebugPrivilege 2480 AB65A60.exe Token: SeDebugPrivilege 2480 AB65A60.exe Token: SeDebugPrivilege 2480 AB65A60.exe Token: SeDebugPrivilege 2480 AB65A60.exe Token: SeDebugPrivilege 2480 AB65A60.exe Token: SeDebugPrivilege 2480 AB65A60.exe Token: SeDebugPrivilege 2480 AB65A60.exe Token: SeDebugPrivilege 2480 AB65A60.exe Token: SeDebugPrivilege 2480 AB65A60.exe Token: SeDebugPrivilege 2480 AB65A60.exe Token: SeDebugPrivilege 2480 AB65A60.exe Token: SeDebugPrivilege 2480 AB65A60.exe Token: SeDebugPrivilege 2480 AB65A60.exe Token: SeDebugPrivilege 2480 AB65A60.exe Token: SeDebugPrivilege 2480 AB65A60.exe Token: SeDebugPrivilege 2480 AB65A60.exe Token: SeDebugPrivilege 2480 AB65A60.exe Token: SeDebugPrivilege 2480 AB65A60.exe Token: SeDebugPrivilege 2480 AB65A60.exe Token: SeDebugPrivilege 2480 AB65A60.exe Token: SeDebugPrivilege 2480 AB65A60.exe Token: SeDebugPrivilege 2480 AB65A60.exe Token: SeDebugPrivilege 2480 AB65A60.exe Token: SeDebugPrivilege 2480 AB65A60.exe Token: SeDebugPrivilege 2480 AB65A60.exe Token: SeDebugPrivilege 2480 AB65A60.exe Token: SeDebugPrivilege 2480 AB65A60.exe Token: SeDebugPrivilege 2480 AB65A60.exe Token: SeDebugPrivilege 2480 AB65A60.exe Token: SeDebugPrivilege 2480 AB65A60.exe Token: SeDebugPrivilege 2480 AB65A60.exe Token: SeDebugPrivilege 2480 AB65A60.exe Token: SeDebugPrivilege 2480 AB65A60.exe Token: SeDebugPrivilege 2480 AB65A60.exe Token: SeDebugPrivilege 2480 AB65A60.exe Token: SeDebugPrivilege 2480 AB65A60.exe Token: SeDebugPrivilege 2480 AB65A60.exe Token: SeDebugPrivilege 2480 AB65A60.exe Token: SeDebugPrivilege 2480 AB65A60.exe Token: SeDebugPrivilege 2480 AB65A60.exe Token: SeDebugPrivilege 2480 AB65A60.exe Token: SeDebugPrivilege 2480 AB65A60.exe Token: SeDebugPrivilege 2480 AB65A60.exe Token: SeDebugPrivilege 2480 AB65A60.exe Token: SeDebugPrivilege 2480 AB65A60.exe Token: SeDebugPrivilege 2480 AB65A60.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2316 1811f857108561f2efebe9cf57d501ff_JaffaCakes118.exe 2732 pagess.sys.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2944 2316 1811f857108561f2efebe9cf57d501ff_JaffaCakes118.exe 28 PID 2316 wrote to memory of 2944 2316 1811f857108561f2efebe9cf57d501ff_JaffaCakes118.exe 28 PID 2316 wrote to memory of 2944 2316 1811f857108561f2efebe9cf57d501ff_JaffaCakes118.exe 28 PID 2316 wrote to memory of 2944 2316 1811f857108561f2efebe9cf57d501ff_JaffaCakes118.exe 28 PID 2316 wrote to memory of 2944 2316 1811f857108561f2efebe9cf57d501ff_JaffaCakes118.exe 28 PID 2316 wrote to memory of 2944 2316 1811f857108561f2efebe9cf57d501ff_JaffaCakes118.exe 28 PID 2316 wrote to memory of 2944 2316 1811f857108561f2efebe9cf57d501ff_JaffaCakes118.exe 28 PID 2316 wrote to memory of 2944 2316 1811f857108561f2efebe9cf57d501ff_JaffaCakes118.exe 28 PID 2316 wrote to memory of 2944 2316 1811f857108561f2efebe9cf57d501ff_JaffaCakes118.exe 28 PID 2944 wrote to memory of 2732 2944 1811f857108561f2efebe9cf57d501ff_JaffaCakes118.exe 29 PID 2944 wrote to memory of 2732 2944 1811f857108561f2efebe9cf57d501ff_JaffaCakes118.exe 29 PID 2944 wrote to memory of 2732 2944 1811f857108561f2efebe9cf57d501ff_JaffaCakes118.exe 29 PID 2944 wrote to memory of 2732 2944 1811f857108561f2efebe9cf57d501ff_JaffaCakes118.exe 29 PID 2732 wrote to memory of 3056 2732 pagess.sys.exe 30 PID 2732 wrote to memory of 3056 2732 pagess.sys.exe 30 PID 2732 wrote to memory of 3056 2732 pagess.sys.exe 30 PID 2732 wrote to memory of 3056 2732 pagess.sys.exe 30 PID 2732 wrote to memory of 3056 2732 pagess.sys.exe 30 PID 2732 wrote to memory of 3056 2732 pagess.sys.exe 30 PID 2732 wrote to memory of 3056 2732 pagess.sys.exe 30 PID 2732 wrote to memory of 3056 2732 pagess.sys.exe 30 PID 2732 wrote to memory of 3056 2732 pagess.sys.exe 30 PID 3056 wrote to memory of 2480 3056 pagess.sys.exe 31 PID 3056 wrote to memory of 2480 3056 pagess.sys.exe 31 PID 3056 wrote to memory of 2480 3056 pagess.sys.exe 31 PID 3056 wrote to memory of 2480 3056 pagess.sys.exe 31 PID 3056 wrote to memory of 2480 3056 pagess.sys.exe 31 PID 3056 wrote to memory of 2480 3056 pagess.sys.exe 31 PID 2480 wrote to memory of 2944 2480 AB65A60.exe 28 PID 2480 wrote to memory of 2944 2480 AB65A60.exe 28 PID 2480 wrote to memory of 2944 2480 AB65A60.exe 28 PID 2480 wrote to memory of 2944 2480 AB65A60.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\1811f857108561f2efebe9cf57d501ff_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1811f857108561f2efebe9cf57d501ff_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\1811f857108561f2efebe9cf57d501ff_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\1811f857108561f2efebe9cf57d501ff_JaffaCakes118.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\pagess.sys\pagess.sys.exe"C:\pagess.sys\pagess.sys.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\pagess.sys\pagess.sys.exeC:\pagess.sys\pagess.sys.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\AB65A60.exe"C:\Users\Admin\AppData\Local\Temp\AB65A60.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2480
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD529090b6b4d6605a97ac760d06436ac2d
SHA1d929d3389642e52bae5ad8512293c9c4d3e4fab5
SHA25698a24f0caf5b578e230e6f1103a5fba6aecb28a9128cad5520fcde546d643272
SHA5129121ec42fa66e14a4fc3932c8dbcc8fb1a93ab9de00da57a82e176faa70b73f6992f8c5e2ab52c02fc28c8f0c59aee73b6fbbd39107db7d15105054f4390e9be
-
Filesize
6KB
MD5a9b31a5ec5cd9a273ada9f2d076cab15
SHA1dff9cbaa2d6fca61372a8c1916a1808d28752da0
SHA256a092f9498e978169e1ed9a1a28022adbd5afe79f2ef872c1c9e74a7b781b4dfd
SHA512de1e9857c20d3375faf42dcb9e318db706a15c0f4263a7d0bf9aae9d5af62828b860db59d4e43e44899dce2321e2ed016f96a73289708af0ec9e0a45694768b4
-
Filesize
201KB
MD51811f857108561f2efebe9cf57d501ff
SHA11862725b5aea2788e7d33af0a88a13e15b12c397
SHA2569644ca2e6839d42aa3e6ddc4d1c09e5e105b9588665a2a23e512e81ccce8f7cf
SHA512a7af5ae79410aa2d778c95fe346eedabf073dc6e4e1b0a721ab127774d920af08f395b2f8516e916bb79af90b5b65f7767dc1e924ed99984f9d4db8eaf024432