Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-10-2024 00:54
Static task
static1
Behavioral task
behavioral1
Sample
280a0d8dfd3db1c96e5bdfddd9d0c5d0_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
280a0d8dfd3db1c96e5bdfddd9d0c5d0_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
280a0d8dfd3db1c96e5bdfddd9d0c5d0_JaffaCakes118.exe
-
Size
4.1MB
-
MD5
280a0d8dfd3db1c96e5bdfddd9d0c5d0
-
SHA1
dc557eb4bdf628a1ac7b41ff1c6ceb18c620e374
-
SHA256
f0c26ef9e345f719c8ba18801eaee491ab578bcbf85bff4180a65b10d861e074
-
SHA512
59131206574fc7f05d709d21e563ff88076dd990d539a2820d9d31ddae8dee015ea7dfab4e057079e4457c0ad7cefddf1e6fa8db86a5f3b3a19df43b5d99ab5b
-
SSDEEP
1536:BOghaZcYZqJC3xdTNC9dhoh8SHsNqJH25UzX/gcvh1Ft0WCseXkpl:BPaZ0JKQ3hPSMNczX/r3e0
Malware Config
Extracted
Protocol: ftp- Host:
tecktonick.ucoz.com - Port:
21 - Username:
dtecktonick - Password:
groove
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 280a0d8dfd3db1c96e5bdfddd9d0c5d0_JaffaCakes118.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3364 set thread context of 2372 3364 280a0d8dfd3db1c96e5bdfddd9d0c5d0_JaffaCakes118.exe 84 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64 280a0d8dfd3db1c96e5bdfddd9d0c5d0_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 280a0d8dfd3db1c96e5bdfddd9d0c5d0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 280a0d8dfd3db1c96e5bdfddd9d0c5d0_JaffaCakes118.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 280a0d8dfd3db1c96e5bdfddd9d0c5d0_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 280a0d8dfd3db1c96e5bdfddd9d0c5d0_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 280a0d8dfd3db1c96e5bdfddd9d0c5d0_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2372 280a0d8dfd3db1c96e5bdfddd9d0c5d0_JaffaCakes118.exe 2372 280a0d8dfd3db1c96e5bdfddd9d0c5d0_JaffaCakes118.exe 2372 280a0d8dfd3db1c96e5bdfddd9d0c5d0_JaffaCakes118.exe 2372 280a0d8dfd3db1c96e5bdfddd9d0c5d0_JaffaCakes118.exe 2372 280a0d8dfd3db1c96e5bdfddd9d0c5d0_JaffaCakes118.exe 2372 280a0d8dfd3db1c96e5bdfddd9d0c5d0_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3364 280a0d8dfd3db1c96e5bdfddd9d0c5d0_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3364 wrote to memory of 2372 3364 280a0d8dfd3db1c96e5bdfddd9d0c5d0_JaffaCakes118.exe 84 PID 3364 wrote to memory of 2372 3364 280a0d8dfd3db1c96e5bdfddd9d0c5d0_JaffaCakes118.exe 84 PID 3364 wrote to memory of 2372 3364 280a0d8dfd3db1c96e5bdfddd9d0c5d0_JaffaCakes118.exe 84 PID 3364 wrote to memory of 2372 3364 280a0d8dfd3db1c96e5bdfddd9d0c5d0_JaffaCakes118.exe 84 PID 3364 wrote to memory of 2372 3364 280a0d8dfd3db1c96e5bdfddd9d0c5d0_JaffaCakes118.exe 84 PID 3364 wrote to memory of 2372 3364 280a0d8dfd3db1c96e5bdfddd9d0c5d0_JaffaCakes118.exe 84 PID 3364 wrote to memory of 2372 3364 280a0d8dfd3db1c96e5bdfddd9d0c5d0_JaffaCakes118.exe 84 PID 3364 wrote to memory of 2372 3364 280a0d8dfd3db1c96e5bdfddd9d0c5d0_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\280a0d8dfd3db1c96e5bdfddd9d0c5d0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\280a0d8dfd3db1c96e5bdfddd9d0c5d0_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Users\Admin\AppData\Local\Temp\280a0d8dfd3db1c96e5bdfddd9d0c5d0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\280a0d8dfd3db1c96e5bdfddd9d0c5d0_JaffaCakes118.exe"2⤵
- Checks BIOS information in registry
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2372
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a2d917127297a162f63d197ac189a2e8
SHA178d95d6f40f24ae538e3e4b1240cabcb19cc3026
SHA2560ddee437671f0e8e88925acc516406f0c70d7d54ba0328d05a4fdea824f549f8
SHA51222ea9a87ce72c4c5f552cb6a46f672ad738078f3c4f3b02f589d7a4048e9af302c4c7b0da3c6fc18fe8ccc0d4d5cabd20bb2c957d727136242486f0dd7a33df1