Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-10-2024 20:47
Static task
static1
Behavioral task
behavioral1
Sample
441c29beb785825773565a52f663ab64_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
441c29beb785825773565a52f663ab64_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
441c29beb785825773565a52f663ab64_JaffaCakes118.exe
-
Size
1.2MB
-
MD5
441c29beb785825773565a52f663ab64
-
SHA1
310041ea7b3fc883df2b81516f42b0ae311bf6cd
-
SHA256
a7c204f16dbae8eb221bb143d67e5f926dd5fe71a0c07b4ee19d0893872061a3
-
SHA512
cb4d8ae091cb07a441041e824f3ef1d2b2d606eac3be3c57d96c8dde5b259f1b5dbe0714ff4639df0d12ba7fc1b7c2b486479197316c9521ca48b85a4ee05021
-
SSDEEP
24576:1Lxy7ZcQ7wAXRAbhDdAGLMMiw4Fj0qN+x4QCO490V94fYgtvGk6GA:u7ZpFi8j5O497oDGA
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1188 Chrome.exe -
Loads dropped DLL 2 IoCs
pid Process 1416 441c29beb785825773565a52f663ab64_JaffaCakes118.exe 1416 441c29beb785825773565a52f663ab64_JaffaCakes118.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\Chrome.exe = "C:\\Users\\Admin\\AppData\\Roaming\\oaqtwo\\oaqtwo\\0.0.0.0\\Chrome.exe" Chrome.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1188 set thread context of 2868 1188 Chrome.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 441c29beb785825773565a52f663ab64_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Chrome.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1416 wrote to memory of 1188 1416 441c29beb785825773565a52f663ab64_JaffaCakes118.exe 31 PID 1416 wrote to memory of 1188 1416 441c29beb785825773565a52f663ab64_JaffaCakes118.exe 31 PID 1416 wrote to memory of 1188 1416 441c29beb785825773565a52f663ab64_JaffaCakes118.exe 31 PID 1416 wrote to memory of 1188 1416 441c29beb785825773565a52f663ab64_JaffaCakes118.exe 31 PID 1188 wrote to memory of 2868 1188 Chrome.exe 32 PID 1188 wrote to memory of 2868 1188 Chrome.exe 32 PID 1188 wrote to memory of 2868 1188 Chrome.exe 32 PID 1188 wrote to memory of 2868 1188 Chrome.exe 32 PID 1188 wrote to memory of 2868 1188 Chrome.exe 32 PID 1188 wrote to memory of 2868 1188 Chrome.exe 32 PID 1188 wrote to memory of 2868 1188 Chrome.exe 32 PID 1188 wrote to memory of 2868 1188 Chrome.exe 32 PID 1188 wrote to memory of 2868 1188 Chrome.exe 32 PID 1188 wrote to memory of 2868 1188 Chrome.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\441c29beb785825773565a52f663ab64_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\441c29beb785825773565a52f663ab64_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Users\Admin\AppData\Local\Temp\Chrome.exe"C:\Users\Admin\AppData\Local\Temp\Chrome.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- System Location Discovery: System Language Discovery
PID:2868
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
668KB
MD56e03fe57b39bd38c95a5af9bbd4a3033
SHA1ed1576d786e7d9c3e221b348b1cad07f69525d11
SHA256f6eaa228dfc989344033ce5af6bbed9fbaedaa57fb5bf8485d073582ca65c6c7
SHA51229f9f4770df2f4ffbc3d9816b58549c7d1e18991541955d435c8087631dbec18debc5d21171f1080ad989d9490337fa0fc79bb51b207356195bd7ae6e90ce7b6