Analysis
-
max time kernel
147s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-10-2024 17:11
Static task
static1
Behavioral task
behavioral1
Sample
3b2b355c80a79da3a42109b327c95576_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3b2b355c80a79da3a42109b327c95576_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3b2b355c80a79da3a42109b327c95576_JaffaCakes118.exe
-
Size
17.3MB
-
MD5
3b2b355c80a79da3a42109b327c95576
-
SHA1
0ec369f9459658346ff48941fd531ec94b41e18e
-
SHA256
ba05970dbe169411a8b77b2b5fb3c8572acb7447051e4a034b59f1d87127f905
-
SHA512
2ca16c93672706e06af68e089702a492d3a1f0c3c3bd1ce98271ccc3e7f34fd51d93b885bba103c8280a6b84ec74d68fe514e1107a0b508979f49fe88483c93a
-
SSDEEP
12288:1KK8QCgFYvJDQHa+Pu1wdrtiJeeeeeveeeeee:v5GlQHTm1wqJeeeeeveeeeee
Malware Config
Signatures
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload 3 IoCs
resource yara_rule behavioral1/memory/2536-11-0x0000000000400000-0x0000000000432000-memory.dmp family_isrstealer behavioral1/memory/2536-7-0x0000000000400000-0x0000000000432000-memory.dmp family_isrstealer behavioral1/memory/2536-25-0x0000000000400000-0x0000000000432000-memory.dmp family_isrstealer -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3004 set thread context of 2536 3004 3b2b355c80a79da3a42109b327c95576_JaffaCakes118.exe 30 PID 2536 set thread context of 2940 2536 vbc.exe 31 -
resource yara_rule behavioral1/memory/2940-19-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/2940-17-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/2940-21-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/2940-20-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/2940-24-0x0000000000400000-0x0000000000453000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3b2b355c80a79da3a42109b327c95576_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2536 vbc.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3004 wrote to memory of 2536 3004 3b2b355c80a79da3a42109b327c95576_JaffaCakes118.exe 30 PID 3004 wrote to memory of 2536 3004 3b2b355c80a79da3a42109b327c95576_JaffaCakes118.exe 30 PID 3004 wrote to memory of 2536 3004 3b2b355c80a79da3a42109b327c95576_JaffaCakes118.exe 30 PID 3004 wrote to memory of 2536 3004 3b2b355c80a79da3a42109b327c95576_JaffaCakes118.exe 30 PID 3004 wrote to memory of 2536 3004 3b2b355c80a79da3a42109b327c95576_JaffaCakes118.exe 30 PID 3004 wrote to memory of 2536 3004 3b2b355c80a79da3a42109b327c95576_JaffaCakes118.exe 30 PID 3004 wrote to memory of 2536 3004 3b2b355c80a79da3a42109b327c95576_JaffaCakes118.exe 30 PID 3004 wrote to memory of 2536 3004 3b2b355c80a79da3a42109b327c95576_JaffaCakes118.exe 30 PID 2536 wrote to memory of 2940 2536 vbc.exe 31 PID 2536 wrote to memory of 2940 2536 vbc.exe 31 PID 2536 wrote to memory of 2940 2536 vbc.exe 31 PID 2536 wrote to memory of 2940 2536 vbc.exe 31 PID 2536 wrote to memory of 2940 2536 vbc.exe 31 PID 2536 wrote to memory of 2940 2536 vbc.exe 31 PID 2536 wrote to memory of 2940 2536 vbc.exe 31 PID 2536 wrote to memory of 2940 2536 vbc.exe 31 PID 2536 wrote to memory of 2940 2536 vbc.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b2b355c80a79da3a42109b327c95576_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3b2b355c80a79da3a42109b327c95576_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe/scomma "C:\Users\Admin\AppData\Local\Temp\tmp.ini"3⤵
- System Location Discovery: System Language Discovery
PID:2940
-
-