Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 11:35
Static task
static1
Behavioral task
behavioral1
Sample
39cb61f15277625fe0095548d779fc6f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
39cb61f15277625fe0095548d779fc6f_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
39cb61f15277625fe0095548d779fc6f_JaffaCakes118.exe
-
Size
286KB
-
MD5
39cb61f15277625fe0095548d779fc6f
-
SHA1
3355e827c98ada0f21a796ca392929f2093f5880
-
SHA256
062b0001871ab05a0889ecb421c26cc2b449ece3d3a14d9e12736cd16c9d6ea4
-
SHA512
4f6ba78d93918bfe15ab47b77cd79327c520f279c6173d460ed6f341ce34207fd09892f08550da16860bdc4c8c43b04f5a368336f85aa118a361e792f3b6e732
-
SSDEEP
6144:Uh11KV5oTsZNyh0p9/gIb4Cb2Th1wCcLfMdMGqKQuKzDg:UZKV0GZ3Md1wRmMKgg
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" 39cb61f15277625fe0095548d779fc6f_JaffaCakes118.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 1608 898.tmp -
Loads dropped DLL 2 IoCs
pid Process 2872 39cb61f15277625fe0095548d779fc6f_JaffaCakes118.exe 2872 39cb61f15277625fe0095548d779fc6f_JaffaCakes118.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\18D.exe = "C:\\Program Files (x86)\\LP\\D058\\18D.exe" 39cb61f15277625fe0095548d779fc6f_JaffaCakes118.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
resource yara_rule behavioral1/memory/2872-2-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2872-70-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2264-75-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2872-74-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/2872-187-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2216-189-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2872-356-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2872-360-0x0000000000400000-0x000000000046B000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\LP\D058\18D.exe 39cb61f15277625fe0095548d779fc6f_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\LP\D058\18D.exe 39cb61f15277625fe0095548d779fc6f_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\LP\D058\898.tmp 39cb61f15277625fe0095548d779fc6f_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 39cb61f15277625fe0095548d779fc6f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 898.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 39cb61f15277625fe0095548d779fc6f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 39cb61f15277625fe0095548d779fc6f_JaffaCakes118.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2872 39cb61f15277625fe0095548d779fc6f_JaffaCakes118.exe 2872 39cb61f15277625fe0095548d779fc6f_JaffaCakes118.exe 2872 39cb61f15277625fe0095548d779fc6f_JaffaCakes118.exe 2872 39cb61f15277625fe0095548d779fc6f_JaffaCakes118.exe 2872 39cb61f15277625fe0095548d779fc6f_JaffaCakes118.exe 2872 39cb61f15277625fe0095548d779fc6f_JaffaCakes118.exe 2872 39cb61f15277625fe0095548d779fc6f_JaffaCakes118.exe 2872 39cb61f15277625fe0095548d779fc6f_JaffaCakes118.exe 2872 39cb61f15277625fe0095548d779fc6f_JaffaCakes118.exe 2872 39cb61f15277625fe0095548d779fc6f_JaffaCakes118.exe 2872 39cb61f15277625fe0095548d779fc6f_JaffaCakes118.exe 2872 39cb61f15277625fe0095548d779fc6f_JaffaCakes118.exe 2872 39cb61f15277625fe0095548d779fc6f_JaffaCakes118.exe 2872 39cb61f15277625fe0095548d779fc6f_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1628 explorer.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeRestorePrivilege 2792 msiexec.exe Token: SeTakeOwnershipPrivilege 2792 msiexec.exe Token: SeSecurityPrivilege 2792 msiexec.exe Token: SeShutdownPrivilege 1628 explorer.exe Token: SeShutdownPrivilege 1628 explorer.exe Token: SeShutdownPrivilege 1628 explorer.exe Token: SeShutdownPrivilege 1628 explorer.exe Token: SeShutdownPrivilege 1628 explorer.exe Token: SeShutdownPrivilege 1628 explorer.exe Token: SeShutdownPrivilege 1628 explorer.exe Token: SeShutdownPrivilege 1628 explorer.exe Token: SeShutdownPrivilege 1628 explorer.exe Token: SeShutdownPrivilege 1628 explorer.exe Token: SeShutdownPrivilege 1628 explorer.exe Token: SeShutdownPrivilege 1628 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe -
Suspicious use of SendNotifyMessage 17 IoCs
pid Process 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe 1628 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2264 2872 39cb61f15277625fe0095548d779fc6f_JaffaCakes118.exe 30 PID 2872 wrote to memory of 2264 2872 39cb61f15277625fe0095548d779fc6f_JaffaCakes118.exe 30 PID 2872 wrote to memory of 2264 2872 39cb61f15277625fe0095548d779fc6f_JaffaCakes118.exe 30 PID 2872 wrote to memory of 2264 2872 39cb61f15277625fe0095548d779fc6f_JaffaCakes118.exe 30 PID 2872 wrote to memory of 2216 2872 39cb61f15277625fe0095548d779fc6f_JaffaCakes118.exe 32 PID 2872 wrote to memory of 2216 2872 39cb61f15277625fe0095548d779fc6f_JaffaCakes118.exe 32 PID 2872 wrote to memory of 2216 2872 39cb61f15277625fe0095548d779fc6f_JaffaCakes118.exe 32 PID 2872 wrote to memory of 2216 2872 39cb61f15277625fe0095548d779fc6f_JaffaCakes118.exe 32 PID 2872 wrote to memory of 1608 2872 39cb61f15277625fe0095548d779fc6f_JaffaCakes118.exe 36 PID 2872 wrote to memory of 1608 2872 39cb61f15277625fe0095548d779fc6f_JaffaCakes118.exe 36 PID 2872 wrote to memory of 1608 2872 39cb61f15277625fe0095548d779fc6f_JaffaCakes118.exe 36 PID 2872 wrote to memory of 1608 2872 39cb61f15277625fe0095548d779fc6f_JaffaCakes118.exe 36 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 39cb61f15277625fe0095548d779fc6f_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" 39cb61f15277625fe0095548d779fc6f_JaffaCakes118.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\39cb61f15277625fe0095548d779fc6f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\39cb61f15277625fe0095548d779fc6f_JaffaCakes118.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\39cb61f15277625fe0095548d779fc6f_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\39cb61f15277625fe0095548d779fc6f_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\89234\D97D0.exe%C:\Users\Admin\AppData\Roaming\892342⤵
- System Location Discovery: System Language Discovery
PID:2264
-
-
C:\Users\Admin\AppData\Local\Temp\39cb61f15277625fe0095548d779fc6f_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\39cb61f15277625fe0095548d779fc6f_JaffaCakes118.exe startC:\Program Files (x86)\3491E\lvvm.exe%C:\Program Files (x86)\3491E2⤵
- System Location Discovery: System Language Discovery
PID:2216
-
-
C:\Program Files (x86)\LP\D058\898.tmp"C:\Program Files (x86)\LP\D058\898.tmp"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1608
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2792
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1628
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD59bf953964901f16f69568808a76b414c
SHA16cb88722765cf84b8e3234ff65dd64de604d9ffc
SHA2569a99981ce9e09cb5d2b9445216f12da156e3e8061d159746598e563a2dc7f0a3
SHA512dd7c2a70eebc2256a15490e1021fa703f9bdb829b73a0eeaad44ac8ceb72374392f0a4226ea9513979eeb2da7b6fb950ba802270cf992e547e12e4cdd60f694b
-
Filesize
1KB
MD5950d38e95d992a6ad8f431965d6f74c1
SHA10df90b597df084ba5dcdf9ccbfe32b743ce9d26a
SHA256f992f1300f64469175cdcc8fa4f2fe3fe71f066e335990e39c87d4118328c972
SHA5125571fa8f77640d9120dd1ea7d949920afa2f518de6ad29d1757797fec977dce296b2ea49edd8fd8fe4f515b7f96c7af1a15dcd4a3506600a27e1123e664a3136
-
Filesize
600B
MD52e5346c14ecf7cda2299217915f40259
SHA18d6f802a3a6e5a40cc25db806bff8b5a3d28578a
SHA256182d551ca1b51e155d92994ab755c9c2dde94e957098dda7c83b4df6cbdca837
SHA512419d3176369bad86f1574bc4aef8f79973d16bb04b0363215b7ea3fcf3fc847dcb1b8fc23cedebb379fa835bf142698267419b86edea811e39ea22493770aa63
-
Filesize
300B
MD5331599cd3179bb723901c8d83b2b26cd
SHA17c0b577d10ee424e477d2ece76c653f49ac46e83
SHA2565f786abe4368004377301e1a293f3d777503e7b7252332a88c1616fd7d7dda80
SHA512ce4d592c1a587cf9ef2cc7b35f5a434bb61c58120daf88716eb062055762b766288ff5f0387d97fa609cf12ec7c8876a186209b2da84f546c41fd441d7f0425b
-
Filesize
101KB
MD512c0ced239fcc13222b68759a59a56e7
SHA1abb40840eec44152511bf2bfe59b0a197be364a5
SHA256890d5c95d1bd858843d6c05d14d1364dc0631ea77990e5b8c82c560d4bc06bbb
SHA51246990d956b1d6074699141f42003f19e9ef7050d74c8f33c1fb6e7052b74699059373a1ebc80008049905e9a216d5eff47c73a73c0ec5f2371beb69b19ad777b