Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 09:12
Static task
static1
Behavioral task
behavioral1
Sample
2e7daa684422ec801f1456a8278b28e8_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2e7daa684422ec801f1456a8278b28e8_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2e7daa684422ec801f1456a8278b28e8_JaffaCakes118.exe
-
Size
55KB
-
MD5
2e7daa684422ec801f1456a8278b28e8
-
SHA1
375a1e51e8a4171a15c9c1a3d215497efcb6bd8b
-
SHA256
64c6c2c3e29a17d4ebe3835c302d82b363f544a6244cf44e16f64bf82494eb59
-
SHA512
1915a981f1ba7f681b7bebe3d4bd983cc38a92b780a04fcf02d2bfcfe0373e7969be974b51f18ff4b892fc3d14aaaf64723968453b609112aeefc89383a31a21
-
SSDEEP
768:5aW710mtOV6i1T3yLKcr8oHfssft46Ieo133C0jBQxR2G:YoJtg6AjyVrhHfvtZw1Htm
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2824 Windows Update v.961090.exe -
Executes dropped EXE 1 IoCs
pid Process 2824 Windows Update v.961090.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Drops autorun.inf file 1 TTPs 4 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created F:\autorun.inf 2e7daa684422ec801f1456a8278b28e8_JaffaCakes118.exe File opened for modification F:\autorun.inf 2e7daa684422ec801f1456a8278b28e8_JaffaCakes118.exe File created C:\autorun.inf 2e7daa684422ec801f1456a8278b28e8_JaffaCakes118.exe File opened for modification C:\autorun.inf 2e7daa684422ec801f1456a8278b28e8_JaffaCakes118.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\system32\Windows Update v.961090.exe 2e7daa684422ec801f1456a8278b28e8_JaffaCakes118.exe File created C:\Windows\system32\SytemInformation.txt 2e7daa684422ec801f1456a8278b28e8_JaffaCakes118.exe File opened for modification C:\Windows\system32\SytemInformation.txt 2e7daa684422ec801f1456a8278b28e8_JaffaCakes118.exe -
Drops file in Program Files directory 20 IoCs
description ioc Process File created C:\Program Files\emule\incoming\setup.exe 2e7daa684422ec801f1456a8278b28e8_JaffaCakes118.exe File created C:\Program Files\tesla\files\setup.exe 2e7daa684422ec801f1456a8278b28e8_JaffaCakes118.exe File created C:\Program Files\kazaa\my shared folder\setup.exe 2e7daa684422ec801f1456a8278b28e8_JaffaCakes118.exe File created C:\Program Files\kazaa lite\my shared folder\setup.exe Windows Update v.961090.exe File created C:\Program Files\morpheus\my shared folder\setup.exe Windows Update v.961090.exe File created C:\Program Files\LimeWire\Shared\setup.exe Windows Update v.961090.exe File created C:\Program Files\emule\incoming\setup.exe Windows Update v.961090.exe File created C:\Program Files\LimeWire\Shared\setup.exe 2e7daa684422ec801f1456a8278b28e8_JaffaCakes118.exe File created C:\Program Files\kazaa lite\my shared folder\setup.exe 2e7daa684422ec801f1456a8278b28e8_JaffaCakes118.exe File created C:\Program Files\kazaa lite k++\my shared folder\setup.exe 2e7daa684422ec801f1456a8278b28e8_JaffaCakes118.exe File created C:\Program Files\grokster\my grokster\setup.exe 2e7daa684422ec801f1456a8278b28e8_JaffaCakes118.exe File created C:\Program Files\morpheus\my shared folder\setup.exe 2e7daa684422ec801f1456a8278b28e8_JaffaCakes118.exe File created C:\Program Files\winmx\shared\setup.exe 2e7daa684422ec801f1456a8278b28e8_JaffaCakes118.exe File created C:\Program Files\eDonkey2000\incoming\setup.exe Windows Update v.961090.exe File created C:\Program Files\kazaa\my shared folder\setup.exe Windows Update v.961090.exe File created C:\Program Files\eDonkey2000\incoming\setup.exe 2e7daa684422ec801f1456a8278b28e8_JaffaCakes118.exe File created C:\Program Files\grokster\my grokster\setup.exe Windows Update v.961090.exe File created C:\Program Files\tesla\files\setup.exe Windows Update v.961090.exe File created C:\Program Files\winmx\shared\setup.exe Windows Update v.961090.exe File created C:\Program Files\kazaa lite k++\my shared folder\setup.exe Windows Update v.961090.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\VORHPBAB.txt 2e7daa684422ec801f1456a8278b28e8_JaffaCakes118.exe File opened for modification C:\Windows\VORHPBAB.txt Windows Update v.961090.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3056 wrote to memory of 2824 3056 2e7daa684422ec801f1456a8278b28e8_JaffaCakes118.exe 30 PID 3056 wrote to memory of 2824 3056 2e7daa684422ec801f1456a8278b28e8_JaffaCakes118.exe 30 PID 3056 wrote to memory of 2824 3056 2e7daa684422ec801f1456a8278b28e8_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2e7daa684422ec801f1456a8278b28e8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2e7daa684422ec801f1456a8278b28e8_JaffaCakes118.exe"1⤵
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\system32\Windows Update v.961090.exe"C:\Windows\system32\Windows Update v.961090.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
PID:2824
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
55KB
MD52e7daa684422ec801f1456a8278b28e8
SHA1375a1e51e8a4171a15c9c1a3d215497efcb6bd8b
SHA25664c6c2c3e29a17d4ebe3835c302d82b363f544a6244cf44e16f64bf82494eb59
SHA5121915a981f1ba7f681b7bebe3d4bd983cc38a92b780a04fcf02d2bfcfe0373e7969be974b51f18ff4b892fc3d14aaaf64723968453b609112aeefc89383a31a21
-
Filesize
235B
MD58f42ce84e4ab200fe9ecb16cdf0be053
SHA1e17cca6a0b778ad9d9c138463453825da2e139bd
SHA256bca23bdfa3550ff70080fdf68f0dd8290ee8452e2bd50455b4e02826f6780ee0
SHA5123a498959f7e899ae7c1425f6606103ef81e0a4d1c7886ccf16542f2d8b51552a7108cf73eb851d910813d483f03d5315ff7bbab053261a709bd1c7f7ef07db67
-
Filesize
86B
MD5f28b0566555639d1d48e242a6e15ad59
SHA16c7f5a2a86ab2f897ca38336329ffafbdf7fd85b
SHA2562315e65f552e1c00066030eb51f25d41a7d3cb10e7892f1451614fde5b032400
SHA512c36e4ba80d1d7e51b5bd60f92dc0e917170883912463dddab7cc82e3406c7d1fdb4d6e50add0840d44cc1a22a0c6d389fba0649b3d70f80b799b04413e8d86bd