Analysis
-
max time kernel
117s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29-11-2024 08:01
Static task
static1
Behavioral task
behavioral1
Sample
afe792e92c8def79c88d16479c8f9051_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
afe792e92c8def79c88d16479c8f9051_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
afe792e92c8def79c88d16479c8f9051_JaffaCakes118.exe
-
Size
364KB
-
MD5
afe792e92c8def79c88d16479c8f9051
-
SHA1
c7ba86acd3435e4242092e607f4007ffe7f8cef5
-
SHA256
e9bc6d9a2f1beee9a1bc7cd7a5f244fd72f4bececf7799f8b3788491aacee67a
-
SHA512
0440b9aeacd9718c7f6e277cfb095e7bcf698159fe505863f878c61b00e308a7ec2421660227e7e11c14d1f0d97379ba87a1b4fe2ede50d9cfb4031a8db34da1
-
SSDEEP
6144:vdBavOW+2/czOW+2/cxsgz3qm5N7cjh6lHSkJrcOR63mFi9gYR73:vdBavVcDVcjz3/86tAOgiuXb
Malware Config
Signatures
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload 1 IoCs
resource yara_rule behavioral1/memory/2156-0-0x0000000000400000-0x0000000000435000-memory.dmp family_isrstealer -
Isrstealer family
-
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\MACHINE\Software\Wow6432Node\Wine afe792e92c8def79c88d16479c8f9051_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1976 set thread context of 2156 1976 afe792e92c8def79c88d16479c8f9051_JaffaCakes118.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language afe792e92c8def79c88d16479c8f9051_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "439029244" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{57C37981-AE28-11EF-B33F-CE9644F3BBBD} = "0" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1976 afe792e92c8def79c88d16479c8f9051_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2156 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2156 iexplore.exe 2156 iexplore.exe 2312 IEXPLORE.EXE 2312 IEXPLORE.EXE 2312 IEXPLORE.EXE 2312 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1976 wrote to memory of 2156 1976 afe792e92c8def79c88d16479c8f9051_JaffaCakes118.exe 31 PID 1976 wrote to memory of 2156 1976 afe792e92c8def79c88d16479c8f9051_JaffaCakes118.exe 31 PID 1976 wrote to memory of 2156 1976 afe792e92c8def79c88d16479c8f9051_JaffaCakes118.exe 31 PID 1976 wrote to memory of 2156 1976 afe792e92c8def79c88d16479c8f9051_JaffaCakes118.exe 31 PID 1976 wrote to memory of 2156 1976 afe792e92c8def79c88d16479c8f9051_JaffaCakes118.exe 31 PID 1976 wrote to memory of 2156 1976 afe792e92c8def79c88d16479c8f9051_JaffaCakes118.exe 31 PID 1976 wrote to memory of 2156 1976 afe792e92c8def79c88d16479c8f9051_JaffaCakes118.exe 31 PID 2156 wrote to memory of 2312 2156 iexplore.exe 32 PID 2156 wrote to memory of 2312 2156 iexplore.exe 32 PID 2156 wrote to memory of 2312 2156 iexplore.exe 32 PID 2156 wrote to memory of 2312 2156 iexplore.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\afe792e92c8def79c88d16479c8f9051_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\afe792e92c8def79c88d16479c8f9051_JaffaCakes118.exe"1⤵
- Identifies Wine through registry keys
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2156 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2312
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5065112c667fb90c42ed01c671f0f0464
SHA130698e76370f724880f4d9c160679c82c0ff56de
SHA25647d61ad53d5c1ebbba50a4748e3b8d54d1fa7ba72b75f1dff818294965a60335
SHA5124c0bd2efef70abbe598f1ddfd0405d9e5318beab92dd0d79479c4bea8a6ed5a1ac44d2e982980285a7842cc8add7ccca619bc950f3cc33f263f5cf7eccc080bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59101e9eacbace736764ca6a8bb209ef3
SHA13e5640da360a58afd3d082f19d740138c80da26f
SHA256b765475b7ca94d57ea0f2a052ad5460d8ca43832cb9a02fa774b8f0937d2db47
SHA512e43d494ad823c0ca5c1cfcd1da4c596684ad642205ffd0439d74e6abbdb781b9db24a8b1c7f8ce568e6118bf8fd3e71a5b3863d83c1945c57046a2c513e6929b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b445637dd4405f3df11418d7bcd9a2e
SHA163c665362607eb578ea01333b359049573d8446b
SHA2569ccbf0074d0fc0bb69d475927ac0540713ce126787dd63b4fd42660a444f7539
SHA512ac15c3bcef810ff48ed6a5c3c8683a0ac15db756ab1aff863644595e156c7eed485867de4004b73c4cfdaf0810c190193fcc663b5557bcece97bd8bd3e2cec36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd761defd6d1855ce2fa1b688ffc86c6
SHA1bc676e8a6e82ad7ba4d60a8a21569f3eb4deebbb
SHA256f98ceae44920dce06a7002a0aedf79d2d4766af7fc1e1620177e5090b40e41bb
SHA512cd1c9c3e945ec9a3c3b00d041109ad4fd1ff0451260318ebc3c9a85329aa5ce9a0763b45223f2fb8b32d3b9f556b8342997f11ddff6fed9110a1df8e4403a7ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dafc3a407a655882acdb6d65132fd168
SHA117304bae1e7e77ad54754eb6b47a48556e5e232b
SHA256bf953868b4b3ff7bfe0d1c4e4d14e5a0b68fe4bbb7aa80603277db73811264d5
SHA5121bf2858db2eaf61290f4d6730b4de92d62babf7dfe9df33b4803120ac9662fa402d5db3fe94a3f2168198e40ea8f9065602104d07e8bc6dd0e295a14e47692df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e063e19130cfdfe38e613d2b6400a307
SHA14aa272430a4e3ff795507dece593fbe600039a3d
SHA25609ffac5e81a1f610c35bf80d9cd1ecad5ffab581e881666a0316a80dfba6a794
SHA512a589927767dd2964c2fd689e277e32d4e83d432a2f16ce7bcf6f9f066bd808df325cbb1bb7c80427a495f94575536d09ac5f2b2e15cc880c247d8ce3a934bd2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583ef717f6d77ff725bee3117eb0b2ed8
SHA1eb673682b4e408fe6294fccf4325a19b18cb674d
SHA256e122935f6bde2b53059663523d7d34076d789bf12e34c3aed7abcd4b82532f7e
SHA51215e884b8e24cd052b2216f9e98d1f90fefcbc3b571ba09a4d165e4953419ef1dc1db7972ad7746ee2129b03a05e33e0f6680d4ef6121f64cd5597390ff3c4518
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560d6aaf196de8684257fe6900ac67912
SHA13e68cb3288b63dabf96a4eef4b0865d91bb8d5ec
SHA256dda6ac0cd50e1b89e1b14098b09f2f90cf8dfe84a894bd99b2c712443bb2790d
SHA512de04be558b5231219d893fb1024437c6dbd0d144e611566b5c0a160aabd8df23732f53b4786ace82bf21283fe99e724e7d83e97d8431fcf76299228082597c3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569abb376cffb0e89517c56fff91c70ef
SHA18b2c0856d63ca8fc7d536d9090cf188eb697fa83
SHA256265d6cd719f55d575fc7261c15de9b601d158ad1dc5b6f5f1694c51a55ff9164
SHA512fd1fa9aebc7300b7e767d3d41640c66d66b2064f464b070e2da8b650bece8186c2ea8cbc5fde84c7fed869c1fa93088afac94302436f07164b15078dbd4c47a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a490f52533c4d274fac2c5e804578fd
SHA186cea20ba053253e2b377f58fd2e285dce4c4420
SHA256a9dfefe58c58fe27c8a21610866c72eb438de650fe48acca383e9abeb3db6d12
SHA512a4f1b56f55f26cf8bfa162781722a286bc0fb66a2466fdd957e8fe2b13cc7cb8ed2b5a7aab225a69d8268fb6fc4e0339776cf5546eb6b95d8ec7f121621900eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e201a3f01de5c50b71697dc8effd60b
SHA1be73d9c4d9110f793b89f117170b149db64d740f
SHA256e1f6d750012457ca25c3102af5091179b2792366a703938de35a49a7ca920bc4
SHA512f251f40a4c4bcae2874896deda6ab10828ee658729ff9c3a944aea9763af607747f7382480814f62bf7cb05f6c53a3b1856f5d4ec1a854b8d26725791c502a19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54450cbc62808ab89c782ba43ca156991
SHA1d9d8dd3e71d02dc9bdfa7f107b1dcafd826757b6
SHA2566f9ad8e76e05d02fe12893013f576e47ea003b716d1287dd9a48ac2522fd86f1
SHA5121f77ca4f677fc241b572482b2dbd816d4b870b1e512e4dede05d878c52849e75d888604e862cb5f4f35444ec4958781ffe8cec7e9cf8638626c88144dca171f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a0c77dbb8e56b774d32da32888c26ba
SHA1b36a8238d1da89c6bfe2dec4e4023f144d22dc3d
SHA256c6379d605bc5583f19784868b68e088852085d49be920c6f23ad417fff4fbf35
SHA51272d8a543a6dd7d36638d1c236d581294435762f75955e8c7d92c1922042cb86b0c029aa3c35fd2b373139212e4dcd266cdf437ccd9f672a75b01c7b700b82254
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c73e88465a9c0863628225906024d96b
SHA14c2c73b9cbd728b0bc9fc8209bbd5d74013873e9
SHA256f0950b37a695ed7136f6dd8070c2582a6fcd6e06132b041d10e0334659871099
SHA512f6d1bbc0708f89cf41308d8f5f5916281f5c3ef6cb52a9f006877fa91a00912c460a987d5489dbbfb910da006c25d07198eec79531a42852295e0362256a5fde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db3d2b898a8258ed1c9b12d407130458
SHA1a4fd9620765c055421b007804898c62428180df3
SHA256c313cf7f51a4d369dcca5f6a4d06316c626a2ea14738a54a5c95b41395c2ebfe
SHA512821aaac136166e483517a79473bdbcd4d6bc187cedb0b80ef55dd507e11b5a4e96a2898a4965256eae4ef7af64712676f24d72b07ede86c9d966b863a4cd36f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef0a1cf467f1a2e25161526c2c6e3560
SHA1021fa09d3da8f245f1a34461be6d3571415cf29e
SHA256cbbb5754e34da48d8d556c43df788158735565f621f0318adc9260eceffe7644
SHA512035dbc74788b5745494184cb2a572ada7d5add703544012591c2e2506afcfff7199df8298856384158ea82e2ce27d42f9df4042553d81c267674779efe7e1f70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aeb6f129af2615a2467d35b71eae5cfc
SHA18b604a09ad5904c465473697b78a57d2c00bbc05
SHA25692ac1ddc219ef0eee9c57dc015f67a92ad8d7562a2cfd0daf154d809b4b15030
SHA512c34f473ebac2d08fb719b3a14cff4baf7ff81ccf2c3f03977c81d6157b609e37a0a9396191d8c0accdd176af21133480e95ff9516e3fce1e3837cfbae26876e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568e48ff80632da363cff3295075456ea
SHA132546f83c5bedd195f89cacb4a6746c78de4ecd7
SHA2560b6bdc0502979ebf869ad09fc41fffc5b250430eceb75e496ed5fa4aab44c66f
SHA5125b2f2d44e3c35acd81a692feaf77422b9f31e43491810d045c16a92bab7724c55fadd26dcd80039efbf1418801a06ff19a6a2c7aa2fde04927200567fff94a07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc695de825ce13ddcb093210a9988c74
SHA1ccb0f5300fe9be09c103b4ed986b3b70340fe3b4
SHA256ee2d6fa59fae4dab60ddb16e8aeb57161c1d8d4f23602605e5c6d43c26865e24
SHA512c495e590046346c045eb496df13138a2b0d6fc5aecad653f27de22a47fc11c948dcda50a09fb389811e8bc9717e8a976c67158c089d98b2e22b58f1f3b28b1b9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b