Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-10-2024 06:28
Static task
static1
Behavioral task
behavioral1
Sample
72af77c56d3b97a9b7a20d64f2eccbdb_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
72af77c56d3b97a9b7a20d64f2eccbdb_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
72af77c56d3b97a9b7a20d64f2eccbdb_JaffaCakes118.exe
-
Size
270KB
-
MD5
72af77c56d3b97a9b7a20d64f2eccbdb
-
SHA1
d9728f6cb916b80d5025c97e1962f2702cfd85b0
-
SHA256
cbe4304b53299ee4a4efde997098002b12eecd8561f9f185bc79a38c0cb07f5f
-
SHA512
486782d515c20e510ff55ec7682af9f168153a175b20594f3acd3e0cd78c262c95d56868987f531c05cd9e6a3a791df4013b44a14b32446f806e03eebddee63e
-
SSDEEP
6144:aMj3EykWU+WNLtZa2XNQCZ3x2jRDXe6qzif0froq:5jUyw+u7a2XpB2dTVqziao
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" 72af77c56d3b97a9b7a20d64f2eccbdb_JaffaCakes118.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 480 57D.tmp -
Loads dropped DLL 2 IoCs
pid Process 1352 72af77c56d3b97a9b7a20d64f2eccbdb_JaffaCakes118.exe 1352 72af77c56d3b97a9b7a20d64f2eccbdb_JaffaCakes118.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\A42.exe = "C:\\Program Files (x86)\\LP\\1DB2\\A42.exe" 72af77c56d3b97a9b7a20d64f2eccbdb_JaffaCakes118.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
resource yara_rule behavioral1/memory/1352-2-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1352-11-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1352-12-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1728-14-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1728-15-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1728-17-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1352-83-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1204-85-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1352-206-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1352-211-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1352-212-0x0000000000400000-0x000000000046B000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\LP\1DB2\A42.exe 72af77c56d3b97a9b7a20d64f2eccbdb_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\LP\1DB2\A42.exe 72af77c56d3b97a9b7a20d64f2eccbdb_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\LP\1DB2\57D.tmp 72af77c56d3b97a9b7a20d64f2eccbdb_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 72af77c56d3b97a9b7a20d64f2eccbdb_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 57D.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 72af77c56d3b97a9b7a20d64f2eccbdb_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 72af77c56d3b97a9b7a20d64f2eccbdb_JaffaCakes118.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_Classes\Local Settings explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1352 72af77c56d3b97a9b7a20d64f2eccbdb_JaffaCakes118.exe 1352 72af77c56d3b97a9b7a20d64f2eccbdb_JaffaCakes118.exe 1352 72af77c56d3b97a9b7a20d64f2eccbdb_JaffaCakes118.exe 1352 72af77c56d3b97a9b7a20d64f2eccbdb_JaffaCakes118.exe 1352 72af77c56d3b97a9b7a20d64f2eccbdb_JaffaCakes118.exe 1352 72af77c56d3b97a9b7a20d64f2eccbdb_JaffaCakes118.exe 1352 72af77c56d3b97a9b7a20d64f2eccbdb_JaffaCakes118.exe 1352 72af77c56d3b97a9b7a20d64f2eccbdb_JaffaCakes118.exe 1352 72af77c56d3b97a9b7a20d64f2eccbdb_JaffaCakes118.exe 1352 72af77c56d3b97a9b7a20d64f2eccbdb_JaffaCakes118.exe 1352 72af77c56d3b97a9b7a20d64f2eccbdb_JaffaCakes118.exe 1352 72af77c56d3b97a9b7a20d64f2eccbdb_JaffaCakes118.exe 1352 72af77c56d3b97a9b7a20d64f2eccbdb_JaffaCakes118.exe 1352 72af77c56d3b97a9b7a20d64f2eccbdb_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2276 explorer.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeRestorePrivilege 1960 msiexec.exe Token: SeTakeOwnershipPrivilege 1960 msiexec.exe Token: SeSecurityPrivilege 1960 msiexec.exe Token: SeShutdownPrivilege 2276 explorer.exe Token: SeShutdownPrivilege 2276 explorer.exe Token: SeShutdownPrivilege 2276 explorer.exe Token: SeShutdownPrivilege 2276 explorer.exe Token: SeShutdownPrivilege 2276 explorer.exe Token: SeShutdownPrivilege 2276 explorer.exe Token: SeShutdownPrivilege 2276 explorer.exe Token: SeShutdownPrivilege 2276 explorer.exe Token: SeShutdownPrivilege 2276 explorer.exe Token: SeShutdownPrivilege 2276 explorer.exe Token: SeShutdownPrivilege 2276 explorer.exe Token: SeShutdownPrivilege 2276 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe -
Suspicious use of SendNotifyMessage 17 IoCs
pid Process 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1352 wrote to memory of 1728 1352 72af77c56d3b97a9b7a20d64f2eccbdb_JaffaCakes118.exe 31 PID 1352 wrote to memory of 1728 1352 72af77c56d3b97a9b7a20d64f2eccbdb_JaffaCakes118.exe 31 PID 1352 wrote to memory of 1728 1352 72af77c56d3b97a9b7a20d64f2eccbdb_JaffaCakes118.exe 31 PID 1352 wrote to memory of 1728 1352 72af77c56d3b97a9b7a20d64f2eccbdb_JaffaCakes118.exe 31 PID 1352 wrote to memory of 1204 1352 72af77c56d3b97a9b7a20d64f2eccbdb_JaffaCakes118.exe 34 PID 1352 wrote to memory of 1204 1352 72af77c56d3b97a9b7a20d64f2eccbdb_JaffaCakes118.exe 34 PID 1352 wrote to memory of 1204 1352 72af77c56d3b97a9b7a20d64f2eccbdb_JaffaCakes118.exe 34 PID 1352 wrote to memory of 1204 1352 72af77c56d3b97a9b7a20d64f2eccbdb_JaffaCakes118.exe 34 PID 1352 wrote to memory of 480 1352 72af77c56d3b97a9b7a20d64f2eccbdb_JaffaCakes118.exe 37 PID 1352 wrote to memory of 480 1352 72af77c56d3b97a9b7a20d64f2eccbdb_JaffaCakes118.exe 37 PID 1352 wrote to memory of 480 1352 72af77c56d3b97a9b7a20d64f2eccbdb_JaffaCakes118.exe 37 PID 1352 wrote to memory of 480 1352 72af77c56d3b97a9b7a20d64f2eccbdb_JaffaCakes118.exe 37 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 72af77c56d3b97a9b7a20d64f2eccbdb_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" 72af77c56d3b97a9b7a20d64f2eccbdb_JaffaCakes118.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\72af77c56d3b97a9b7a20d64f2eccbdb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\72af77c56d3b97a9b7a20d64f2eccbdb_JaffaCakes118.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1352 -
C:\Users\Admin\AppData\Local\Temp\72af77c56d3b97a9b7a20d64f2eccbdb_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\72af77c56d3b97a9b7a20d64f2eccbdb_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\26BB4\1F41D.exe%C:\Users\Admin\AppData\Roaming\26BB42⤵
- System Location Discovery: System Language Discovery
PID:1728
-
-
C:\Users\Admin\AppData\Local\Temp\72af77c56d3b97a9b7a20d64f2eccbdb_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\72af77c56d3b97a9b7a20d64f2eccbdb_JaffaCakes118.exe startC:\Program Files (x86)\B4132\lvvm.exe%C:\Program Files (x86)\B41322⤵
- System Location Discovery: System Language Discovery
PID:1204
-
-
C:\Program Files (x86)\LP\1DB2\57D.tmp"C:\Program Files (x86)\LP\1DB2\57D.tmp"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:480
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1960
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2276
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD577ffa84be9ee91fa3b9fb2a55b0e53ba
SHA1b30bf329c98b3e59acc5a4714f7fafdb301980fb
SHA256722469ec60533b24de9056fa7eb8768bfd26cab49d191aee89dabf2582fb8f6a
SHA5124579e79cfcff9489f80974fab9103137a00ce20620e96161f046ff850ce5e9eaca95b672d6d34f85998aeff9f1eb98dee2d5d326d768afef604138203758f339
-
Filesize
600B
MD57c1b101a10e4b9d12ee9fef103357e7f
SHA1e3a0e8248a83d403ad5857a1374a964c5e2707ca
SHA25606f09b85b1caba8d91cc52d5557e9acc351c074c25f58a68b5eea5b0107caf3e
SHA5129961c37b975dcce75ef636112f1ad89ae2ce57f14fd81a888d51437be02df260e79c45d518613db86c05cce0c0d9dd64e9b7adddebe916b66a14ca2b68d9dcb7
-
Filesize
996B
MD569b2c8d51cf774a407cf97063f75db08
SHA1ce92047d7bb68dddcfc715698c86a8bfd53dc9c8
SHA2561432ebbf7920d423b23bef23f41ff41b218a2c7e9916acd06c17e4bf9db1a7f0
SHA5125e43b4c8ea57f5451c98fcef9c1e760016ae09ca22dc320874aed840625c0c83c3b56289db76af606ef86ef4035cfefe56f6c949960e02081ed56a2833489780
-
Filesize
96KB
MD52b1fb0d9666b92e0cce43e75dcb92c59
SHA17b239a3858b6ea3d1a0813280bbdddc2072a7938
SHA256d6b7b1532090214fc5a7d7346ba844635a6b581c760ac045c9a712fdf06cd66b
SHA512927fd2105b63387c0c16ca3b608e3a9a120d5ba8605fc0556535b580536d0d33acd3b0c914d157af57974438d4b06d0945cfdcd92859de24bbd3348186b99087