Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-10-2024 22:06
Static task
static1
Behavioral task
behavioral1
Sample
31fff390b4cc19f4ca8d02f144a83b57_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
31fff390b4cc19f4ca8d02f144a83b57_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
31fff390b4cc19f4ca8d02f144a83b57_JaffaCakes118.exe
-
Size
1.7MB
-
MD5
31fff390b4cc19f4ca8d02f144a83b57
-
SHA1
acb9c42c46abf42d45e05625ccd398a44a114d7b
-
SHA256
a6b6337806bf52b04474c98ed8b0051d8b1949c11755966d233bf60854505583
-
SHA512
9383ec427243058b82fffda7e4f9ec733cb9baae06cb6aafa97a66aa39c65454c423a33e65a265127eb2c6fa3d4c0cbeae3e3fc8b379ab4a1f0806ac5c7ecf14
-
SSDEEP
24576:FbpadCJ8XnNbXUMCDouesiqN4AiJB3g791v4QDhlnOBvBO:RpadCJNbPiJBI94QDhlK5O
Malware Config
Signatures
-
Detected Nirsoft tools 7 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral2/memory/2276-34-0x0000000000400000-0x0000000000484000-memory.dmp Nirsoft behavioral2/memory/372-63-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral2/memory/372-64-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral2/memory/372-66-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral2/memory/460-67-0x0000000000400000-0x0000000000458000-memory.dmp Nirsoft behavioral2/memory/460-68-0x0000000000400000-0x0000000000458000-memory.dmp Nirsoft behavioral2/memory/460-75-0x0000000000400000-0x0000000000458000-memory.dmp Nirsoft -
NirSoft MailPassView 4 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral2/memory/2276-34-0x0000000000400000-0x0000000000484000-memory.dmp MailPassView behavioral2/memory/372-63-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView behavioral2/memory/372-64-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView behavioral2/memory/372-66-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 4 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral2/memory/2276-34-0x0000000000400000-0x0000000000484000-memory.dmp WebBrowserPassView behavioral2/memory/460-67-0x0000000000400000-0x0000000000458000-memory.dmp WebBrowserPassView behavioral2/memory/460-68-0x0000000000400000-0x0000000000458000-memory.dmp WebBrowserPassView behavioral2/memory/460-75-0x0000000000400000-0x0000000000458000-memory.dmp WebBrowserPassView -
System Binary Proxy Execution: InstallUtil 1 TTPs 2 IoCs
Abuse InstallUtil to proxy execution of malicious code.
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe 31fff390b4cc19f4ca8d02f144a83b57_JaffaCakes118.exe Key opened \Registry\Machine\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Custom\InstallUtil.exe GOOGLE CHROME.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 31fff390b4cc19f4ca8d02f144a83b57_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation GOOGLE CHROME.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation COPYRIGHT.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\VCL CHROME\GOOGLE CHROME.exe 31fff390b4cc19f4ca8d02f144a83b57_JaffaCakes118.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\VCL CHROME\GOOGLE CHROME.exe 31fff390b4cc19f4ca8d02f144a83b57_JaffaCakes118.exe -
Executes dropped EXE 4 IoCs
pid Process 4204 GOOGLE CHROME.exe 2276 InstallUtil.exe 3856 COPYRIGHT.exe 2808 COPYRIGHT.exe -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral2/memory/1356-7-0x0000000005530000-0x0000000005558000-memory.dmp agile_net -
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts vbc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HGDJDCBFJDJVCNDCVHDJHDJCHDNJVCHDFCNBXCHDCDHG = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\VCL CHROME\\GOOGLE CHROME.exe" reg.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 33 whatismyipaddress.com 35 whatismyipaddress.com -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4204 set thread context of 2276 4204 GOOGLE CHROME.exe 96 PID 2276 set thread context of 372 2276 InstallUtil.exe 104 PID 2276 set thread context of 460 2276 InstallUtil.exe 106 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GOOGLE CHROME.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language COPYRIGHT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language COPYRIGHT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 31fff390b4cc19f4ca8d02f144a83b57_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe -
Suspicious behavior: EnumeratesProcesses 37 IoCs
pid Process 1356 31fff390b4cc19f4ca8d02f144a83b57_JaffaCakes118.exe 1356 31fff390b4cc19f4ca8d02f144a83b57_JaffaCakes118.exe 1356 31fff390b4cc19f4ca8d02f144a83b57_JaffaCakes118.exe 1356 31fff390b4cc19f4ca8d02f144a83b57_JaffaCakes118.exe 1356 31fff390b4cc19f4ca8d02f144a83b57_JaffaCakes118.exe 1356 31fff390b4cc19f4ca8d02f144a83b57_JaffaCakes118.exe 1356 31fff390b4cc19f4ca8d02f144a83b57_JaffaCakes118.exe 1356 31fff390b4cc19f4ca8d02f144a83b57_JaffaCakes118.exe 1356 31fff390b4cc19f4ca8d02f144a83b57_JaffaCakes118.exe 1356 31fff390b4cc19f4ca8d02f144a83b57_JaffaCakes118.exe 1356 31fff390b4cc19f4ca8d02f144a83b57_JaffaCakes118.exe 1356 31fff390b4cc19f4ca8d02f144a83b57_JaffaCakes118.exe 1356 31fff390b4cc19f4ca8d02f144a83b57_JaffaCakes118.exe 1356 31fff390b4cc19f4ca8d02f144a83b57_JaffaCakes118.exe 1356 31fff390b4cc19f4ca8d02f144a83b57_JaffaCakes118.exe 1356 31fff390b4cc19f4ca8d02f144a83b57_JaffaCakes118.exe 1356 31fff390b4cc19f4ca8d02f144a83b57_JaffaCakes118.exe 1356 31fff390b4cc19f4ca8d02f144a83b57_JaffaCakes118.exe 1356 31fff390b4cc19f4ca8d02f144a83b57_JaffaCakes118.exe 1356 31fff390b4cc19f4ca8d02f144a83b57_JaffaCakes118.exe 1356 31fff390b4cc19f4ca8d02f144a83b57_JaffaCakes118.exe 1356 31fff390b4cc19f4ca8d02f144a83b57_JaffaCakes118.exe 1356 31fff390b4cc19f4ca8d02f144a83b57_JaffaCakes118.exe 4204 GOOGLE CHROME.exe 4204 GOOGLE CHROME.exe 4204 GOOGLE CHROME.exe 4204 GOOGLE CHROME.exe 3856 COPYRIGHT.exe 2808 COPYRIGHT.exe 2808 COPYRIGHT.exe 2808 COPYRIGHT.exe 4204 GOOGLE CHROME.exe 4204 GOOGLE CHROME.exe 4204 GOOGLE CHROME.exe 4204 GOOGLE CHROME.exe 460 vbc.exe 460 vbc.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1356 31fff390b4cc19f4ca8d02f144a83b57_JaffaCakes118.exe Token: SeDebugPrivilege 4204 GOOGLE CHROME.exe Token: SeDebugPrivilege 2276 InstallUtil.exe Token: SeDebugPrivilege 3856 COPYRIGHT.exe Token: SeDebugPrivilege 2808 COPYRIGHT.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 1356 wrote to memory of 4116 1356 31fff390b4cc19f4ca8d02f144a83b57_JaffaCakes118.exe 86 PID 1356 wrote to memory of 4116 1356 31fff390b4cc19f4ca8d02f144a83b57_JaffaCakes118.exe 86 PID 1356 wrote to memory of 4116 1356 31fff390b4cc19f4ca8d02f144a83b57_JaffaCakes118.exe 86 PID 4116 wrote to memory of 3856 4116 cmd.exe 88 PID 4116 wrote to memory of 3856 4116 cmd.exe 88 PID 4116 wrote to memory of 3856 4116 cmd.exe 88 PID 1356 wrote to memory of 4204 1356 31fff390b4cc19f4ca8d02f144a83b57_JaffaCakes118.exe 89 PID 1356 wrote to memory of 4204 1356 31fff390b4cc19f4ca8d02f144a83b57_JaffaCakes118.exe 89 PID 1356 wrote to memory of 4204 1356 31fff390b4cc19f4ca8d02f144a83b57_JaffaCakes118.exe 89 PID 4204 wrote to memory of 2276 4204 GOOGLE CHROME.exe 96 PID 4204 wrote to memory of 2276 4204 GOOGLE CHROME.exe 96 PID 4204 wrote to memory of 2276 4204 GOOGLE CHROME.exe 96 PID 4204 wrote to memory of 2276 4204 GOOGLE CHROME.exe 96 PID 4204 wrote to memory of 2276 4204 GOOGLE CHROME.exe 96 PID 4204 wrote to memory of 2276 4204 GOOGLE CHROME.exe 96 PID 4204 wrote to memory of 2276 4204 GOOGLE CHROME.exe 96 PID 4204 wrote to memory of 2276 4204 GOOGLE CHROME.exe 96 PID 4204 wrote to memory of 3856 4204 GOOGLE CHROME.exe 102 PID 4204 wrote to memory of 3856 4204 GOOGLE CHROME.exe 102 PID 4204 wrote to memory of 3856 4204 GOOGLE CHROME.exe 102 PID 3856 wrote to memory of 2808 3856 COPYRIGHT.exe 103 PID 3856 wrote to memory of 2808 3856 COPYRIGHT.exe 103 PID 3856 wrote to memory of 2808 3856 COPYRIGHT.exe 103 PID 2276 wrote to memory of 372 2276 InstallUtil.exe 104 PID 2276 wrote to memory of 372 2276 InstallUtil.exe 104 PID 2276 wrote to memory of 372 2276 InstallUtil.exe 104 PID 2276 wrote to memory of 372 2276 InstallUtil.exe 104 PID 2276 wrote to memory of 372 2276 InstallUtil.exe 104 PID 2276 wrote to memory of 372 2276 InstallUtil.exe 104 PID 2276 wrote to memory of 372 2276 InstallUtil.exe 104 PID 2276 wrote to memory of 372 2276 InstallUtil.exe 104 PID 2276 wrote to memory of 372 2276 InstallUtil.exe 104 PID 2276 wrote to memory of 460 2276 InstallUtil.exe 106 PID 2276 wrote to memory of 460 2276 InstallUtil.exe 106 PID 2276 wrote to memory of 460 2276 InstallUtil.exe 106 PID 2276 wrote to memory of 460 2276 InstallUtil.exe 106 PID 2276 wrote to memory of 460 2276 InstallUtil.exe 106 PID 2276 wrote to memory of 460 2276 InstallUtil.exe 106 PID 2276 wrote to memory of 460 2276 InstallUtil.exe 106 PID 2276 wrote to memory of 460 2276 InstallUtil.exe 106 PID 2276 wrote to memory of 460 2276 InstallUtil.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\31fff390b4cc19f4ca8d02f144a83b57_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\31fff390b4cc19f4ca8d02f144a83b57_JaffaCakes118.exe"1⤵
- System Binary Proxy Execution: InstallUtil
- Checks computer location settings
- Drops startup file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "HGDJDCBFJDJVCNDCVHDJHDJCHDNJVCHDFCNBXCHDCDHG" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\VCL CHROME\GOOGLE CHROME.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "HGDJDCBFJDJVCNDCVHDJHDJCHDNJVCHDFCNBXCHDCDHG" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\VCL CHROME\GOOGLE CHROME.exe"3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3856
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\VCL CHROME\GOOGLE CHROME.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\VCL CHROME\GOOGLE CHROME.exe"2⤵
- System Binary Proxy Execution: InstallUtil
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe"C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"4⤵
- Accesses Microsoft Outlook accounts
- System Location Discovery: System Language Discovery
PID:372
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holderwb.txt"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:460
-
-
-
C:\Users\Admin\AppData\Local\Temp\COPYRIGHT.exe"C:\Users\Admin\AppData\Local\Temp\COPYRIGHT.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3856 -
C:\Users\Admin\AppData\Local\Temp\COPYRIGHT.exe"C:\Users\Admin\AppData\Local\Temp\COPYRIGHT.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2808
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57dca233df92b3884663fa5a40db8d49c
SHA1208b8f27b708c4e06ac37f974471cc7b29c29b60
SHA25690c83311e35da0b5f8aa65aa2109745feb68ee9540e863f4ed909872e9c6a84c
SHA512d134b96fd33c79c85407608f76afc5a9f937bff453b1c90727a3ed992006c7d4c8329be6a2b5ba6b11da1a32f7cd60e9bc380be388b586d6cd5c2e6b1f57bd07
-
Filesize
76KB
MD50e362e7005823d0bec3719b902ed6d62
SHA1590d860b909804349e0cdc2f1662b37bd62f7463
SHA2562d0dc6216f613ac7551a7e70a798c22aee8eb9819428b1357e2b8c73bef905ad
SHA512518991b68496b3f8545e418cf9b345e0791e09cc20d177b8aa47e0aba447aa55383c64f5bdaca39f2b061a5d08c16f2ad484af8a9f238ca23ab081618fba3ad3
-
Filesize
116B
MD5b40ac3ef3c632cc210cbd5c2f73d4eca
SHA1fabf16f2fa6964cf2ee3a42df39ac1269ac931f9
SHA256cc4129149a073c9c4dc4e1bf41649c20f051f5481c6c3ee02fa157cfdb7b8d91
SHA5125de8d3dcb51b3c12f8c0406caa3b2c56902053f4c274c3e8543f63557d9c65f19c316e76e3f947264ca872c9b392ba2f7800737ea3f697294c779efd1df76fd5
-
Filesize
119B
MD51d9d15ee7499c784917fb2a5511daa8d
SHA1eefc14cc2e338d23ab44f10ff016662d8488c66c
SHA25676bf15231510cbfc918296bb708ec39b71fa6ab378848a5a5ebafb6a734e8662
SHA512d08791bd3fc4346db781fc21cce0b2cccbedccc188d7b1d07196041535e6b35060012734375d1a29801cb3569ce1ac66d20fd1d1c7881539a1eb98afe0bd87e7
-
Filesize
41KB
MD55d4073b2eb6d217c19f2b22f21bf8d57
SHA1f0209900fbf08d004b886a0b3ba33ea2b0bf9da8
SHA256ac1a3f21fcc88f9cee7bf51581eafba24cc76c924f0821deb2afdf1080ddf3d3
SHA5129ac94880684933ba3407cdc135abc3047543436567af14cd9269c4adc5a6535db7b867d6de0d6238a21b94e69f9890dbb5739155871a624520623a7e56872159
-
Filesize
3KB
MD5f94dc819ca773f1e3cb27abbc9e7fa27
SHA19a7700efadc5ea09ab288544ef1e3cd876255086
SHA256a3377ade83786c2bdff5db19ff4dbfd796da4312402b5e77c4c63e38cc6eff92
SHA51272a2c10d7a53a7f9a319dab66d77ed65639e9aa885b551e0055fc7eaf6ef33bbf109205b42ae11555a0f292563914bc6edb63b310c6f9bda9564095f77ab9196
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\VCL CHROME\GOOGLE CHROME.exe
Filesize1.7MB
MD531fff390b4cc19f4ca8d02f144a83b57
SHA1acb9c42c46abf42d45e05625ccd398a44a114d7b
SHA256a6b6337806bf52b04474c98ed8b0051d8b1949c11755966d233bf60854505583
SHA5129383ec427243058b82fffda7e4f9ec733cb9baae06cb6aafa97a66aa39c65454c423a33e65a265127eb2c6fa3d4c0cbeae3e3fc8b379ab4a1f0806ac5c7ecf14