Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
02-12-2024 02:52
Static task
static1
Behavioral task
behavioral1
Sample
b6702cda80a4d3509d2e55688c05c9b5_JaffaCakes118.exe
Resource
win7-20241010-en
General
-
Target
b6702cda80a4d3509d2e55688c05c9b5_JaffaCakes118.exe
-
Size
420KB
-
MD5
b6702cda80a4d3509d2e55688c05c9b5
-
SHA1
741c0c7a1132eaa8cbdbfca3ccf525270674dedc
-
SHA256
848f7ba6105563c59127e9bd0eda01bf75271fc1a1570584c98cabf7057bbcf1
-
SHA512
be3cf06539bd2ea3653d3f509eaa38e19754430795f6540f914d71808da6938e563fb45d2da8ee936953c42d63ad6786893b572cb523afb257df58b1ce0356a5
-
SSDEEP
6144:uRwPY8LCpho2fDgej7X0tuNC/Kx9APf8ERgFFvpb1V9qrVwe3ru8cPj:nPY8LCp1h7T/kSFFvjVfMu8cPj
Malware Config
Signatures
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload 2 IoCs
resource yara_rule behavioral1/memory/1952-28-0x0000000000400000-0x0000000000414000-memory.dmp family_isrstealer behavioral1/memory/1952-37-0x0000000000400000-0x0000000000414000-memory.dmp family_isrstealer -
Isrstealer family
-
Executes dropped EXE 3 IoCs
pid Process 1512 NIS-2012-Crack.exe 2560 12.exe 1952 12.exe -
Loads dropped DLL 12 IoCs
pid Process 2372 b6702cda80a4d3509d2e55688c05c9b5_JaffaCakes118.exe 2372 b6702cda80a4d3509d2e55688c05c9b5_JaffaCakes118.exe 2372 b6702cda80a4d3509d2e55688c05c9b5_JaffaCakes118.exe 1512 NIS-2012-Crack.exe 1512 NIS-2012-Crack.exe 2560 12.exe 2560 12.exe 2560 12.exe 2560 12.exe 1952 12.exe 1952 12.exe 1952 12.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1512-39-0x0000000000400000-0x00000000004C3000-memory.dmp autoit_exe behavioral1/memory/1512-41-0x0000000000400000-0x00000000004C3000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2560 set thread context of 1952 2560 12.exe 32 -
resource yara_rule behavioral1/files/0x000b00000001202c-3.dat upx behavioral1/memory/2372-5-0x0000000002AD0000-0x0000000002B93000-memory.dmp upx behavioral1/memory/1512-18-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/1512-39-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/1512-41-0x0000000000400000-0x00000000004C3000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NIS-2012-Crack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 12.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 12.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b6702cda80a4d3509d2e55688c05c9b5_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1952 12.exe 1952 12.exe 1952 12.exe 1952 12.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1512 NIS-2012-Crack.exe -
Suspicious use of FindShellTrayWindow 19 IoCs
pid Process 1512 NIS-2012-Crack.exe 1512 NIS-2012-Crack.exe 1512 NIS-2012-Crack.exe 1512 NIS-2012-Crack.exe 1512 NIS-2012-Crack.exe 1512 NIS-2012-Crack.exe 1512 NIS-2012-Crack.exe 1512 NIS-2012-Crack.exe 1512 NIS-2012-Crack.exe 1512 NIS-2012-Crack.exe 1512 NIS-2012-Crack.exe 1512 NIS-2012-Crack.exe 1512 NIS-2012-Crack.exe 1512 NIS-2012-Crack.exe 1512 NIS-2012-Crack.exe 1512 NIS-2012-Crack.exe 1512 NIS-2012-Crack.exe 1512 NIS-2012-Crack.exe 1512 NIS-2012-Crack.exe -
Suspicious use of SendNotifyMessage 19 IoCs
pid Process 1512 NIS-2012-Crack.exe 1512 NIS-2012-Crack.exe 1512 NIS-2012-Crack.exe 1512 NIS-2012-Crack.exe 1512 NIS-2012-Crack.exe 1512 NIS-2012-Crack.exe 1512 NIS-2012-Crack.exe 1512 NIS-2012-Crack.exe 1512 NIS-2012-Crack.exe 1512 NIS-2012-Crack.exe 1512 NIS-2012-Crack.exe 1512 NIS-2012-Crack.exe 1512 NIS-2012-Crack.exe 1512 NIS-2012-Crack.exe 1512 NIS-2012-Crack.exe 1512 NIS-2012-Crack.exe 1512 NIS-2012-Crack.exe 1512 NIS-2012-Crack.exe 1512 NIS-2012-Crack.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2560 12.exe 1952 12.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 2372 wrote to memory of 1512 2372 b6702cda80a4d3509d2e55688c05c9b5_JaffaCakes118.exe 30 PID 2372 wrote to memory of 1512 2372 b6702cda80a4d3509d2e55688c05c9b5_JaffaCakes118.exe 30 PID 2372 wrote to memory of 1512 2372 b6702cda80a4d3509d2e55688c05c9b5_JaffaCakes118.exe 30 PID 2372 wrote to memory of 1512 2372 b6702cda80a4d3509d2e55688c05c9b5_JaffaCakes118.exe 30 PID 2372 wrote to memory of 1512 2372 b6702cda80a4d3509d2e55688c05c9b5_JaffaCakes118.exe 30 PID 2372 wrote to memory of 1512 2372 b6702cda80a4d3509d2e55688c05c9b5_JaffaCakes118.exe 30 PID 2372 wrote to memory of 1512 2372 b6702cda80a4d3509d2e55688c05c9b5_JaffaCakes118.exe 30 PID 2372 wrote to memory of 2560 2372 b6702cda80a4d3509d2e55688c05c9b5_JaffaCakes118.exe 31 PID 2372 wrote to memory of 2560 2372 b6702cda80a4d3509d2e55688c05c9b5_JaffaCakes118.exe 31 PID 2372 wrote to memory of 2560 2372 b6702cda80a4d3509d2e55688c05c9b5_JaffaCakes118.exe 31 PID 2372 wrote to memory of 2560 2372 b6702cda80a4d3509d2e55688c05c9b5_JaffaCakes118.exe 31 PID 2372 wrote to memory of 2560 2372 b6702cda80a4d3509d2e55688c05c9b5_JaffaCakes118.exe 31 PID 2372 wrote to memory of 2560 2372 b6702cda80a4d3509d2e55688c05c9b5_JaffaCakes118.exe 31 PID 2372 wrote to memory of 2560 2372 b6702cda80a4d3509d2e55688c05c9b5_JaffaCakes118.exe 31 PID 2560 wrote to memory of 1952 2560 12.exe 32 PID 2560 wrote to memory of 1952 2560 12.exe 32 PID 2560 wrote to memory of 1952 2560 12.exe 32 PID 2560 wrote to memory of 1952 2560 12.exe 32 PID 2560 wrote to memory of 1952 2560 12.exe 32 PID 2560 wrote to memory of 1952 2560 12.exe 32 PID 2560 wrote to memory of 1952 2560 12.exe 32 PID 2560 wrote to memory of 1952 2560 12.exe 32 PID 2560 wrote to memory of 1952 2560 12.exe 32 PID 2560 wrote to memory of 1952 2560 12.exe 32 PID 2560 wrote to memory of 1952 2560 12.exe 32 PID 2560 wrote to memory of 1952 2560 12.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\b6702cda80a4d3509d2e55688c05c9b5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b6702cda80a4d3509d2e55688c05c9b5_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\NIS-2012-Crack.exe"C:\Users\Admin\AppData\Local\Temp\NIS-2012-Crack.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1512
-
-
C:\Users\Admin\AppData\Local\Temp\12.exe"C:\Users\Admin\AppData\Local\Temp\12.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\12.exeC:\Users\Admin\AppData\Local\Temp\12.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1952
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152KB
MD517d4bf5aa5a964763f61de2671f693d5
SHA1a17dc284c0fa20c60dfc910d08ce87d3bb90a6f5
SHA256f6acf42f09869e6b9871782b2b766a5eebf9437ef0289fd323745c165815efb3
SHA512c4c608f573bd0d4c18555107ca2617db2dd02b2cb3611eb427b0d7cf3a32285ebf2bcba38954ec888b13afa4d2e4dadd9b0dc514a269803b6ce3890a5c55ddd1
-
Filesize
316KB
MD565f08bbfff6f19b13b051d56be4233bc
SHA1784c0e1b19469cdcf16d3a5f23c76e0b0f32f0ac
SHA256203ee3b4988fbd6d406c6ae593775609b3e655af0af9fdb3e3c253437d522e0d
SHA5123dbeb5c8f5943fc0f95aac95831108b850823e3aa9356e47e54fc0fc63bea62a612d300a8ddb4ab6c71dbf37af788d0ee5932fe53bbc93b03fd59e4ae42682ab