Analysis
-
max time kernel
145s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-11-2024 14:13
Static task
static1
Behavioral task
behavioral1
Sample
ac9a80407f6f6975e1a0b365aac4d2f5_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
ac9a80407f6f6975e1a0b365aac4d2f5_JaffaCakes118.exe
-
Size
349KB
-
MD5
ac9a80407f6f6975e1a0b365aac4d2f5
-
SHA1
00ed26fedba781185d97f2a60e86a0a7bb907721
-
SHA256
f9926543c9ffa3eb205ca43a50ae6cc19bc37220ddbcdb5a6183b6eb26403b57
-
SHA512
1c57fa076f1c1121473b033b0d1086a4fb72928b3f8ded82c24693534dfe8cddd192c06f913f9a7059278090463caec12661ef1efd368999931bf89f8709ed08
-
SSDEEP
6144:W08dxS0rwvwW+RjEgrjkfMFh5JeTB/K12QNR+ilTnShVFauEPveXG8:er7WijaAha/KNzfTShVFGD8
Malware Config
Signatures
-
Pony family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Deletes itself 1 IoCs
pid Process 2176 rpt.exe -
Executes dropped EXE 1 IoCs
pid Process 2176 rpt.exe -
Loads dropped DLL 2 IoCs
pid Process 1724 ac9a80407f6f6975e1a0b365aac4d2f5_JaffaCakes118.exe 1724 ac9a80407f6f6975e1a0b365aac4d2f5_JaffaCakes118.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\ctfmon.exe = "C:\\WINDOWS\\system32\\ctfmon.exe" ac9a80407f6f6975e1a0b365aac4d2f5_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\47841949 = "C:\\Users\\Admin\\AppData\\Local\\rpt.exe" ac9a80407f6f6975e1a0b365aac4d2f5_JaffaCakes118.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
resource yara_rule behavioral1/memory/1724-52-0x0000000002FA0000-0x0000000002FB6000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ac9a80407f6f6975e1a0b365aac4d2f5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rpt.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1724 ac9a80407f6f6975e1a0b365aac4d2f5_JaffaCakes118.exe 1724 ac9a80407f6f6975e1a0b365aac4d2f5_JaffaCakes118.exe 1724 ac9a80407f6f6975e1a0b365aac4d2f5_JaffaCakes118.exe 1724 ac9a80407f6f6975e1a0b365aac4d2f5_JaffaCakes118.exe 1724 ac9a80407f6f6975e1a0b365aac4d2f5_JaffaCakes118.exe 1724 ac9a80407f6f6975e1a0b365aac4d2f5_JaffaCakes118.exe 1724 ac9a80407f6f6975e1a0b365aac4d2f5_JaffaCakes118.exe 1724 ac9a80407f6f6975e1a0b365aac4d2f5_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2936 explorer.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 2936 explorer.exe Token: SeShutdownPrivilege 2936 explorer.exe Token: SeShutdownPrivilege 2936 explorer.exe Token: SeShutdownPrivilege 2936 explorer.exe Token: SeShutdownPrivilege 2936 explorer.exe Token: SeShutdownPrivilege 2936 explorer.exe Token: SeShutdownPrivilege 2936 explorer.exe Token: SeShutdownPrivilege 2936 explorer.exe Token: SeShutdownPrivilege 2936 explorer.exe Token: SeShutdownPrivilege 2936 explorer.exe Token: SeShutdownPrivilege 2936 explorer.exe Token: SeShutdownPrivilege 2936 explorer.exe -
Suspicious use of FindShellTrayWindow 30 IoCs
pid Process 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe -
Suspicious use of SendNotifyMessage 23 IoCs
pid Process 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1724 wrote to memory of 2176 1724 ac9a80407f6f6975e1a0b365aac4d2f5_JaffaCakes118.exe 30 PID 1724 wrote to memory of 2176 1724 ac9a80407f6f6975e1a0b365aac4d2f5_JaffaCakes118.exe 30 PID 1724 wrote to memory of 2176 1724 ac9a80407f6f6975e1a0b365aac4d2f5_JaffaCakes118.exe 30 PID 1724 wrote to memory of 2176 1724 ac9a80407f6f6975e1a0b365aac4d2f5_JaffaCakes118.exe 30 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac9a80407f6f6975e1a0b365aac4d2f5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ac9a80407f6f6975e1a0b365aac4d2f5_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\AppData\Local\rpt.exe"C:\Users\Admin\AppData\Local\rpt.exe" -gav C:\Users\Admin\AppData\Local\Temp\ac9a80407f6f6975e1a0b365aac4d2f5_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2176
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2936
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
179B
MD5dd651173e05adab9c51005e4a24a7faf
SHA1d99cd41268c697fc63ae44bcb0e4cb2c48243ebf
SHA25616db5d0d3dfd2168b6fec75e038723555b10c0b799d43dc396913be795ddf8c6
SHA512898e458a3a6be30850bf27fc499dd54d3860237ccd931f869d2420d307a595e26e7d16f93285bb13eaa4462673bc8095449dc8ec942e0b52f75623d0ad33c415
-
Filesize
349KB
MD5ac9a80407f6f6975e1a0b365aac4d2f5
SHA100ed26fedba781185d97f2a60e86a0a7bb907721
SHA256f9926543c9ffa3eb205ca43a50ae6cc19bc37220ddbcdb5a6183b6eb26403b57
SHA5121c57fa076f1c1121473b033b0d1086a4fb72928b3f8ded82c24693534dfe8cddd192c06f913f9a7059278090463caec12661ef1efd368999931bf89f8709ed08