Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-10-2024 07:45
Static task
static1
Behavioral task
behavioral1
Sample
2d72ab489772fec104b9d6c9a7ce2027_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
2d72ab489772fec104b9d6c9a7ce2027_JaffaCakes118.exe
-
Size
652KB
-
MD5
2d72ab489772fec104b9d6c9a7ce2027
-
SHA1
8a0a6650b9a7887465818ab79007185cfe2b0969
-
SHA256
edf33064c4c3e2966fa8243f8e3a3b48402174696d6b19c5803219639952059b
-
SHA512
0a0e7ef31a464e1c299579fdc7a282be930ad69fae115e4ae049db30cf5fc5e0084334e55ad79fcebe1c1a2a6269bdff0abd128e600516ca1a097e984e089787
-
SSDEEP
12288:i0SlJmmF99W7CQV1POhmmp+ZGnTtmg3Fxx7JvdakTNacsvH:rJw9g7CQjcmi+QnTN3vJxdjpaD
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2640 hpet.exe -
Loads dropped DLL 4 IoCs
pid Process 2664 2d72ab489772fec104b9d6c9a7ce2027_JaffaCakes118.exe 2664 2d72ab489772fec104b9d6c9a7ce2027_JaffaCakes118.exe 2664 2d72ab489772fec104b9d6c9a7ce2027_JaffaCakes118.exe 2664 2d72ab489772fec104b9d6c9a7ce2027_JaffaCakes118.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2d72ab489772fec104b9d6c9a7ce2027_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hpet.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Start Page Before = "http://go.microsoft.com/fwlink/?LinkId=69157" hpet.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Search Page Before = "http://go.microsoft.com/fwlink/?LinkId=54896" hpet.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://search.b1.org/?bsrc=hmior&chid=c162341" hpet.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://search.b1.org/?bsrc=hmior&chid=c162341" hpet.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2640 hpet.exe 2640 hpet.exe 2640 hpet.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2664 2d72ab489772fec104b9d6c9a7ce2027_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2664 wrote to memory of 2640 2664 2d72ab489772fec104b9d6c9a7ce2027_JaffaCakes118.exe 31 PID 2664 wrote to memory of 2640 2664 2d72ab489772fec104b9d6c9a7ce2027_JaffaCakes118.exe 31 PID 2664 wrote to memory of 2640 2664 2d72ab489772fec104b9d6c9a7ce2027_JaffaCakes118.exe 31 PID 2664 wrote to memory of 2640 2664 2d72ab489772fec104b9d6c9a7ce2027_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d72ab489772fec104b9d6c9a7ce2027_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2d72ab489772fec104b9d6c9a7ce2027_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Admin\AppData\Roaming\B1Toolbar\hpet.exe"C:\Users\Admin\AppData\Roaming\B1Toolbar\hpet.exe" -home -home2 -hie -hff -hgc -et -channel 1623412⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
PID:2640
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
467KB
MD597bc7c2a98ee92297fcb2cecf1b222f9
SHA1b3e08065fff002513c36cfe85e0ca607c68fbce3
SHA2560effc6288b6ce1f933c8b97dc8ec5e6ee883f0628bea176538f65b0b2297d1fe
SHA512a53e1220dfba16fe44f20bfc32dd986054751fb124a1c0917af4c34a45e7a2187ae05098a7681f9ed65cee852e3fbecf8fa49cc015b224dc50566659859986cc