Analysis
-
max time kernel
48s -
max time network
37s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
10-10-2024 16:18
Static task
static1
Behavioral task
behavioral1
Sample
30cca8ca72cbea56569021a9aa60cf8a_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
30cca8ca72cbea56569021a9aa60cf8a_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
30cca8ca72cbea56569021a9aa60cf8a_JaffaCakes118.exe
-
Size
240KB
-
MD5
30cca8ca72cbea56569021a9aa60cf8a
-
SHA1
2c87920018c948c2084a18082d8f90d5c44bf7ee
-
SHA256
f7b322d2a2fef23f10a5c6e9227b9fb6596ca0b84242cdb2fd6271035b04f919
-
SHA512
6a605d0df6456579db7ade217157d3a7d869ec722151c0a8d35eb54c0f83596a59489984c76deb67243c9d35ea908dbe619e3deeb9ef0adb1f019265c1ec2007
-
SSDEEP
6144:cYGRV9w7dJOp8tYrZK0TO3rab+/C5RXfPcF68YchRhf:cYGRkdJOpTKEv0F6S
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2740 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1212 iloader.exe -
Loads dropped DLL 1 IoCs
pid Process 2804 30cca8ca72cbea56569021a9aa60cf8a_JaffaCakes118.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Win.exe" 30cca8ca72cbea56569021a9aa60cf8a_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1968 set thread context of 2804 1968 30cca8ca72cbea56569021a9aa60cf8a_JaffaCakes118.exe 31 -
Drops file in Program Files directory 9 IoCs
description ioc Process File created C:\Program Files (x86)\LimeWire\Shared\ 30cca8ca72cbea56569021a9aa60cf8a_JaffaCakes118.exe File created C:\Program Files (x86)\kazaa\my shared folder\ 30cca8ca72cbea56569021a9aa60cf8a_JaffaCakes118.exe File created C:\Program Files (x86)\morpheus\my shared folder\ 30cca8ca72cbea56569021a9aa60cf8a_JaffaCakes118.exe File created C:\Program Files (x86)\tesla\files\ 30cca8ca72cbea56569021a9aa60cf8a_JaffaCakes118.exe File created C:\Program Files (x86)\eDonkey2000\incoming\ 30cca8ca72cbea56569021a9aa60cf8a_JaffaCakes118.exe File created C:\Program Files (x86)\kazaa lite\my shared folder\ 30cca8ca72cbea56569021a9aa60cf8a_JaffaCakes118.exe File created C:\Program Files (x86)\kazaa lite k++\my shared folder\ 30cca8ca72cbea56569021a9aa60cf8a_JaffaCakes118.exe File created C:\Program Files (x86)\grokster\my grokster\ 30cca8ca72cbea56569021a9aa60cf8a_JaffaCakes118.exe File created C:\Program Files (x86)\emule\incoming\ 30cca8ca72cbea56569021a9aa60cf8a_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 30cca8ca72cbea56569021a9aa60cf8a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 30cca8ca72cbea56569021a9aa60cf8a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iloader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2332 timeout.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1968 30cca8ca72cbea56569021a9aa60cf8a_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1968 wrote to memory of 2804 1968 30cca8ca72cbea56569021a9aa60cf8a_JaffaCakes118.exe 31 PID 1968 wrote to memory of 2804 1968 30cca8ca72cbea56569021a9aa60cf8a_JaffaCakes118.exe 31 PID 1968 wrote to memory of 2804 1968 30cca8ca72cbea56569021a9aa60cf8a_JaffaCakes118.exe 31 PID 1968 wrote to memory of 2804 1968 30cca8ca72cbea56569021a9aa60cf8a_JaffaCakes118.exe 31 PID 1968 wrote to memory of 2804 1968 30cca8ca72cbea56569021a9aa60cf8a_JaffaCakes118.exe 31 PID 1968 wrote to memory of 2804 1968 30cca8ca72cbea56569021a9aa60cf8a_JaffaCakes118.exe 31 PID 1968 wrote to memory of 2804 1968 30cca8ca72cbea56569021a9aa60cf8a_JaffaCakes118.exe 31 PID 1968 wrote to memory of 2804 1968 30cca8ca72cbea56569021a9aa60cf8a_JaffaCakes118.exe 31 PID 1968 wrote to memory of 2804 1968 30cca8ca72cbea56569021a9aa60cf8a_JaffaCakes118.exe 31 PID 1968 wrote to memory of 2804 1968 30cca8ca72cbea56569021a9aa60cf8a_JaffaCakes118.exe 31 PID 2804 wrote to memory of 1212 2804 30cca8ca72cbea56569021a9aa60cf8a_JaffaCakes118.exe 32 PID 2804 wrote to memory of 1212 2804 30cca8ca72cbea56569021a9aa60cf8a_JaffaCakes118.exe 32 PID 2804 wrote to memory of 1212 2804 30cca8ca72cbea56569021a9aa60cf8a_JaffaCakes118.exe 32 PID 2804 wrote to memory of 1212 2804 30cca8ca72cbea56569021a9aa60cf8a_JaffaCakes118.exe 32 PID 2804 wrote to memory of 2740 2804 30cca8ca72cbea56569021a9aa60cf8a_JaffaCakes118.exe 33 PID 2804 wrote to memory of 2740 2804 30cca8ca72cbea56569021a9aa60cf8a_JaffaCakes118.exe 33 PID 2804 wrote to memory of 2740 2804 30cca8ca72cbea56569021a9aa60cf8a_JaffaCakes118.exe 33 PID 2804 wrote to memory of 2740 2804 30cca8ca72cbea56569021a9aa60cf8a_JaffaCakes118.exe 33 PID 2740 wrote to memory of 2332 2740 cmd.exe 35 PID 2740 wrote to memory of 2332 2740 cmd.exe 35 PID 2740 wrote to memory of 2332 2740 cmd.exe 35 PID 2740 wrote to memory of 2332 2740 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\30cca8ca72cbea56569021a9aa60cf8a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\30cca8ca72cbea56569021a9aa60cf8a_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\30cca8ca72cbea56569021a9aa60cf8a_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30cca8ca72cbea56569021a9aa60cf8a_JaffaCakes118.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\iloader.exe"C:\Users\Admin\AppData\Local\Temp\iloader.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1212
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 5 && del C:\Users\Admin\AppData\Local\Temp\30CCA8~1.EXE3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\timeout.exetimeout 54⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2332
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD549f39ab7739189cc365f8770659a38ce
SHA1a05a0cee3a5799c19ab8e6b13ee4848fc23cd9aa
SHA2563dc5fc8c3c4fd20c391509dd0a79c287c617c7bb9b1449516cf2ec50ec9d410b
SHA512c7ba916deb9152fda695c6293a62ac6a1329c151e7c0bd005c82145bd630d29485d63556344e7f3e128c6210fd66c2b4d6a0dfae87acf42f328714540f4ce129