Analysis
-
max time kernel
150s -
max time network
65s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 23:59
Behavioral task
behavioral1
Sample
916c129a8fb2db8eaa0c59fa6e2fb09c_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
916c129a8fb2db8eaa0c59fa6e2fb09c_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
916c129a8fb2db8eaa0c59fa6e2fb09c_JaffaCakes118.exe
-
Size
869KB
-
MD5
916c129a8fb2db8eaa0c59fa6e2fb09c
-
SHA1
da6474359c6df22ccb2204a7789abac9e333fb64
-
SHA256
b6596a3044cd0adf0597d6a693761a4d3f6a173ca7b2bdd474de02a7541ad8a9
-
SHA512
08ae1dac96c1eaf1d7e789f05f17877b6098b8a62519459264ced684cb3ec10ba83e56d51495f0f32bb06c5afbccd829045d932cace08f13803074c3fe25270e
-
SSDEEP
12288:uTxoIoMSC5feDyNcrCJc5jmwUIC+xvlFRiawBjnSgKLTK7Jmh9Ukz+OxIcHDLEUg:uTxxSoLcrCJcU0V5Kj7+OJmhPzgRlK
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
defender.exepid process 2464 defender.exe -
Loads dropped DLL 3 IoCs
Processes:
916c129a8fb2db8eaa0c59fa6e2fb09c_JaffaCakes118.exepid process 2308 916c129a8fb2db8eaa0c59fa6e2fb09c_JaffaCakes118.exe 2308 916c129a8fb2db8eaa0c59fa6e2fb09c_JaffaCakes118.exe 2308 916c129a8fb2db8eaa0c59fa6e2fb09c_JaffaCakes118.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
defender.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\Malware Protection = "C:\\ProgramData\\defender.exe" defender.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
defender.exedescription ioc process File opened (read-only) \??\Y: defender.exe File opened (read-only) \??\E: defender.exe File opened (read-only) \??\J: defender.exe File opened (read-only) \??\K: defender.exe File opened (read-only) \??\O: defender.exe File opened (read-only) \??\U: defender.exe File opened (read-only) \??\V: defender.exe File opened (read-only) \??\H: defender.exe File opened (read-only) \??\I: defender.exe File opened (read-only) \??\N: defender.exe File opened (read-only) \??\Q: defender.exe File opened (read-only) \??\S: defender.exe File opened (read-only) \??\W: defender.exe File opened (read-only) \??\G: defender.exe File opened (read-only) \??\L: defender.exe File opened (read-only) \??\M: defender.exe File opened (read-only) \??\P: defender.exe File opened (read-only) \??\R: defender.exe File opened (read-only) \??\T: defender.exe File opened (read-only) \??\X: defender.exe File opened (read-only) \??\Z: defender.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
defender.exedescription ioc process File opened for modification \??\PhysicalDrive0 defender.exe -
Processes:
resource yara_rule behavioral1/memory/2308-0-0x0000000000400000-0x000000000069C000-memory.dmp upx \ProgramData\defender.exe upx behavioral1/memory/2308-22-0x0000000002F10000-0x0000000003532000-memory.dmp upx behavioral1/memory/2464-23-0x0000000000400000-0x0000000000A22000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
916c129a8fb2db8eaa0c59fa6e2fb09c_JaffaCakes118.exedefender.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 916c129a8fb2db8eaa0c59fa6e2fb09c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language defender.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
916c129a8fb2db8eaa0c59fa6e2fb09c_JaffaCakes118.exedefender.exepid process 2308 916c129a8fb2db8eaa0c59fa6e2fb09c_JaffaCakes118.exe 2464 defender.exe 2464 defender.exe 2464 defender.exe 2464 defender.exe 2464 defender.exe 2464 defender.exe 2464 defender.exe 2464 defender.exe 2464 defender.exe 2464 defender.exe 2464 defender.exe 2464 defender.exe 2464 defender.exe 2464 defender.exe 2464 defender.exe 2464 defender.exe 2464 defender.exe 2464 defender.exe 2464 defender.exe 2464 defender.exe 2464 defender.exe 2464 defender.exe 2464 defender.exe 2464 defender.exe 2464 defender.exe 2464 defender.exe 2464 defender.exe 2464 defender.exe 2464 defender.exe 2464 defender.exe 2464 defender.exe 2464 defender.exe 2464 defender.exe 2464 defender.exe 2464 defender.exe 2464 defender.exe 2464 defender.exe 2464 defender.exe 2464 defender.exe 2464 defender.exe 2464 defender.exe 2464 defender.exe 2464 defender.exe 2464 defender.exe 2464 defender.exe 2464 defender.exe 2464 defender.exe 2464 defender.exe 2464 defender.exe 2464 defender.exe 2464 defender.exe 2464 defender.exe 2464 defender.exe 2464 defender.exe 2464 defender.exe 2464 defender.exe 2464 defender.exe 2464 defender.exe 2464 defender.exe 2464 defender.exe 2464 defender.exe 2464 defender.exe 2464 defender.exe -
Suspicious use of FindShellTrayWindow 12 IoCs
Processes:
defender.exepid process 2464 defender.exe 2464 defender.exe 2464 defender.exe 2464 defender.exe 2464 defender.exe 2464 defender.exe 2464 defender.exe 2464 defender.exe 2464 defender.exe 2464 defender.exe 2464 defender.exe 2464 defender.exe -
Suspicious use of SendNotifyMessage 12 IoCs
Processes:
defender.exepid process 2464 defender.exe 2464 defender.exe 2464 defender.exe 2464 defender.exe 2464 defender.exe 2464 defender.exe 2464 defender.exe 2464 defender.exe 2464 defender.exe 2464 defender.exe 2464 defender.exe 2464 defender.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
defender.exepid process 2464 defender.exe 2464 defender.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
916c129a8fb2db8eaa0c59fa6e2fb09c_JaffaCakes118.exedescription pid process target process PID 2308 wrote to memory of 2464 2308 916c129a8fb2db8eaa0c59fa6e2fb09c_JaffaCakes118.exe defender.exe PID 2308 wrote to memory of 2464 2308 916c129a8fb2db8eaa0c59fa6e2fb09c_JaffaCakes118.exe defender.exe PID 2308 wrote to memory of 2464 2308 916c129a8fb2db8eaa0c59fa6e2fb09c_JaffaCakes118.exe defender.exe PID 2308 wrote to memory of 2464 2308 916c129a8fb2db8eaa0c59fa6e2fb09c_JaffaCakes118.exe defender.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\916c129a8fb2db8eaa0c59fa6e2fb09c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\916c129a8fb2db8eaa0c59fa6e2fb09c_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\ProgramData\defender.exeC:\ProgramData\defender.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2464
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
819KB
MD53719cbb8edfc521c44344d2cc924b4e8
SHA1759c21aee7a3e5d6057c81bd7a8ae46c180db3c1
SHA2568923eb179e005215e101a1873ed8fb05e17f141dac206105ffe499a31fd18594
SHA512ca02a13911933a31f5e566191dfb47872e8608d8df38574554ea5fcb51913e6bdd2fed7d77d8f0900543a24822e075ad936b191c1dfc38f8316897b17cac78db