Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
03-11-2024 02:27
Static task
static1
Behavioral task
behavioral1
Sample
892fcf8f389201c5fdc5160b5890ef06_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
892fcf8f389201c5fdc5160b5890ef06_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
892fcf8f389201c5fdc5160b5890ef06_JaffaCakes118.exe
-
Size
265KB
-
MD5
892fcf8f389201c5fdc5160b5890ef06
-
SHA1
55f9ee83bc8303e2846f84894caf47db0debf4af
-
SHA256
6628116f31ea0cd6550b8e958d59f381ec4b11bb02a80f581dbe8245a8e692d9
-
SHA512
b521d0d011219c537411ee2ce184ed6208afed336e0fa928ff79680b57479adcb083b9881604fa130552f2cdc0958f7ae422c14f646084e7a76812403e6ca78e
-
SSDEEP
6144:DjlEr6enAu/9YPcu3EOsvlOhXiYkFkaoMoV0PYDcWkCWQ71vXcQS:DFenl/9YN3EPOpiYQk4XCVWw1Pc
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" 892fcf8f389201c5fdc5160b5890ef06_JaffaCakes118.exe -
Pony family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 2376 368B.tmp -
Loads dropped DLL 2 IoCs
pid Process 1304 892fcf8f389201c5fdc5160b5890ef06_JaffaCakes118.exe 1304 892fcf8f389201c5fdc5160b5890ef06_JaffaCakes118.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\826.exe = "C:\\Program Files (x86)\\LP\\B668\\826.exe" 892fcf8f389201c5fdc5160b5890ef06_JaffaCakes118.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
resource yara_rule behavioral1/memory/1304-3-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1304-13-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1644-17-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1644-18-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1304-16-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/1304-115-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1588-117-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1304-313-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1304-317-0x0000000000400000-0x000000000046A000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\LP\B668\826.exe 892fcf8f389201c5fdc5160b5890ef06_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\LP\B668\826.exe 892fcf8f389201c5fdc5160b5890ef06_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\LP\B668\368B.tmp 892fcf8f389201c5fdc5160b5890ef06_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 892fcf8f389201c5fdc5160b5890ef06_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 892fcf8f389201c5fdc5160b5890ef06_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 892fcf8f389201c5fdc5160b5890ef06_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 368B.tmp -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1304 892fcf8f389201c5fdc5160b5890ef06_JaffaCakes118.exe 1304 892fcf8f389201c5fdc5160b5890ef06_JaffaCakes118.exe 1304 892fcf8f389201c5fdc5160b5890ef06_JaffaCakes118.exe 1304 892fcf8f389201c5fdc5160b5890ef06_JaffaCakes118.exe 1304 892fcf8f389201c5fdc5160b5890ef06_JaffaCakes118.exe 1304 892fcf8f389201c5fdc5160b5890ef06_JaffaCakes118.exe 1304 892fcf8f389201c5fdc5160b5890ef06_JaffaCakes118.exe 1304 892fcf8f389201c5fdc5160b5890ef06_JaffaCakes118.exe 1304 892fcf8f389201c5fdc5160b5890ef06_JaffaCakes118.exe 1304 892fcf8f389201c5fdc5160b5890ef06_JaffaCakes118.exe 1304 892fcf8f389201c5fdc5160b5890ef06_JaffaCakes118.exe 1304 892fcf8f389201c5fdc5160b5890ef06_JaffaCakes118.exe 1304 892fcf8f389201c5fdc5160b5890ef06_JaffaCakes118.exe 1304 892fcf8f389201c5fdc5160b5890ef06_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1660 explorer.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeRestorePrivilege 576 msiexec.exe Token: SeTakeOwnershipPrivilege 576 msiexec.exe Token: SeSecurityPrivilege 576 msiexec.exe Token: SeShutdownPrivilege 1660 explorer.exe Token: SeShutdownPrivilege 1660 explorer.exe Token: SeShutdownPrivilege 1660 explorer.exe Token: SeShutdownPrivilege 1660 explorer.exe Token: SeShutdownPrivilege 1660 explorer.exe Token: SeShutdownPrivilege 1660 explorer.exe Token: SeShutdownPrivilege 1660 explorer.exe Token: SeShutdownPrivilege 1660 explorer.exe Token: SeShutdownPrivilege 1660 explorer.exe Token: SeShutdownPrivilege 1660 explorer.exe Token: SeShutdownPrivilege 1660 explorer.exe Token: SeShutdownPrivilege 1660 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe -
Suspicious use of SendNotifyMessage 22 IoCs
pid Process 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1304 wrote to memory of 1644 1304 892fcf8f389201c5fdc5160b5890ef06_JaffaCakes118.exe 31 PID 1304 wrote to memory of 1644 1304 892fcf8f389201c5fdc5160b5890ef06_JaffaCakes118.exe 31 PID 1304 wrote to memory of 1644 1304 892fcf8f389201c5fdc5160b5890ef06_JaffaCakes118.exe 31 PID 1304 wrote to memory of 1644 1304 892fcf8f389201c5fdc5160b5890ef06_JaffaCakes118.exe 31 PID 1304 wrote to memory of 1588 1304 892fcf8f389201c5fdc5160b5890ef06_JaffaCakes118.exe 34 PID 1304 wrote to memory of 1588 1304 892fcf8f389201c5fdc5160b5890ef06_JaffaCakes118.exe 34 PID 1304 wrote to memory of 1588 1304 892fcf8f389201c5fdc5160b5890ef06_JaffaCakes118.exe 34 PID 1304 wrote to memory of 1588 1304 892fcf8f389201c5fdc5160b5890ef06_JaffaCakes118.exe 34 PID 1304 wrote to memory of 2376 1304 892fcf8f389201c5fdc5160b5890ef06_JaffaCakes118.exe 37 PID 1304 wrote to memory of 2376 1304 892fcf8f389201c5fdc5160b5890ef06_JaffaCakes118.exe 37 PID 1304 wrote to memory of 2376 1304 892fcf8f389201c5fdc5160b5890ef06_JaffaCakes118.exe 37 PID 1304 wrote to memory of 2376 1304 892fcf8f389201c5fdc5160b5890ef06_JaffaCakes118.exe 37 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 892fcf8f389201c5fdc5160b5890ef06_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" 892fcf8f389201c5fdc5160b5890ef06_JaffaCakes118.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\892fcf8f389201c5fdc5160b5890ef06_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\892fcf8f389201c5fdc5160b5890ef06_JaffaCakes118.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1304 -
C:\Users\Admin\AppData\Local\Temp\892fcf8f389201c5fdc5160b5890ef06_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\892fcf8f389201c5fdc5160b5890ef06_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\813E8\FBEB6.exe%C:\Users\Admin\AppData\Roaming\813E82⤵
- System Location Discovery: System Language Discovery
PID:1644
-
-
C:\Users\Admin\AppData\Local\Temp\892fcf8f389201c5fdc5160b5890ef06_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\892fcf8f389201c5fdc5160b5890ef06_JaffaCakes118.exe startC:\Program Files (x86)\E84D2\lvvm.exe%C:\Program Files (x86)\E84D22⤵
- System Location Discovery: System Language Discovery
PID:1588
-
-
C:\Program Files (x86)\LP\B668\368B.tmp"C:\Program Files (x86)\LP\B668\368B.tmp"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2376
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:576
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1660
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
300B
MD59ef1f1aaa733a5c0bae75315a5b4a493
SHA16680a89698d9d60787e28dbe6179d3bbf682e5c5
SHA256e9c4da9cbc1ffb7f3b2d9afb0effba6c695b298c5a09187e1eb0b8970c91b59b
SHA512180cb6f1d1941f3401b5f1225651326c738c1f452b549c3f98378a926d01b528441e73605314a4fa2d0b4263b3cf20600c99ab3b14d4cff4df60c2ccdc74a970
-
Filesize
996B
MD555cfe13d87e61bdbac3b5445a3827db3
SHA17574c375eba10a99fb060259d02c599f29ad9dc6
SHA25623161fe3e700ea217ffb0f9669c5319e6be05fec2ac16f6f53ed85209ddc88e4
SHA512f6b1e40a76963e2d0f0698d994c11b7aa18b9b914b44685dc3abf84d49a0e4420f5530a530d927be99c66d1ce77c95b6dd4d2e93c6789a63329b008bc1f23f31
-
Filesize
600B
MD570fe26fdbcdd89fe8e023025f94b79ae
SHA175efff95f977b13b88bcf290719c87b7190ec1c8
SHA256b81e406185c14fa919daaa3d3853132f9c3d7e802ad0d7e29284c2ff8521226a
SHA512882e911328f05e078321a4be2922e490ac3fc016d7716e2c1b7257c076a7f721ab02d5be95fb7f874047e5036d0c124e292510e8b143a94f176938e3eb8417d1
-
Filesize
1KB
MD5c36115c28bd100d817901f9f1744e3d5
SHA1b71c08e93462b11baed7bc47d4c0d9513fc66c94
SHA2563d8d9c5dac72605ae8fa232d4a9b60bb34a45ec6a761e7de1ce0049da9cd1eaa
SHA5127d2771f9830e7a5b66b22109aefdda6888a070250948c75b7e6d5fc57dfa8c19226048aceca80dceb3ae1e722eeb94e4a0e21a34e742979026db1b35525d37f3
-
Filesize
96KB
MD5527f2c593a00e7b581780ff5d476c10b
SHA17ec63f793da8694a84dd8b79f5816eb5066c7b8c
SHA2568373bf5cfd979ce99a6639dbc0a672cfedc20415918ac9133a9cbca695725474
SHA512c0ca9e2dbdc643e33e7f35e278ef972e5486b36284b8d75925490250fc1f66e8871401e643677ae54c2fd229730d6196ab70ee975045512279f7b33f48609b02