Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-12-2024 02:52
Static task
static1
Behavioral task
behavioral1
Sample
b6702cda80a4d3509d2e55688c05c9b5_JaffaCakes118.exe
Resource
win7-20241010-en
General
-
Target
b6702cda80a4d3509d2e55688c05c9b5_JaffaCakes118.exe
-
Size
420KB
-
MD5
b6702cda80a4d3509d2e55688c05c9b5
-
SHA1
741c0c7a1132eaa8cbdbfca3ccf525270674dedc
-
SHA256
848f7ba6105563c59127e9bd0eda01bf75271fc1a1570584c98cabf7057bbcf1
-
SHA512
be3cf06539bd2ea3653d3f509eaa38e19754430795f6540f914d71808da6938e563fb45d2da8ee936953c42d63ad6786893b572cb523afb257df58b1ce0356a5
-
SSDEEP
6144:uRwPY8LCpho2fDgej7X0tuNC/Kx9APf8ERgFFvpb1V9qrVwe3ru8cPj:nPY8LCp1h7T/kSFFvjVfMu8cPj
Malware Config
Signatures
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload 3 IoCs
resource yara_rule behavioral2/memory/5052-25-0x0000000000400000-0x0000000000414000-memory.dmp family_isrstealer behavioral2/memory/5052-28-0x0000000000400000-0x0000000000414000-memory.dmp family_isrstealer behavioral2/memory/5052-33-0x0000000000400000-0x0000000000414000-memory.dmp family_isrstealer -
Isrstealer family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation b6702cda80a4d3509d2e55688c05c9b5_JaffaCakes118.exe -
Executes dropped EXE 3 IoCs
pid Process 4444 NIS-2012-Crack.exe 456 12.exe 5052 12.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/4444-34-0x0000000000400000-0x00000000004C3000-memory.dmp autoit_exe behavioral2/memory/4444-35-0x0000000000400000-0x00000000004C3000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 456 set thread context of 5052 456 12.exe 86 -
resource yara_rule behavioral2/files/0x000e000000023a68-5.dat upx behavioral2/memory/4444-18-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral2/memory/4444-34-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral2/memory/4444-35-0x0000000000400000-0x00000000004C3000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NIS-2012-Crack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 12.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 12.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b6702cda80a4d3509d2e55688c05c9b5_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 5052 12.exe 5052 12.exe 5052 12.exe 5052 12.exe 5052 12.exe 5052 12.exe 5052 12.exe 5052 12.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4444 NIS-2012-Crack.exe -
Suspicious use of FindShellTrayWindow 19 IoCs
pid Process 4444 NIS-2012-Crack.exe 4444 NIS-2012-Crack.exe 4444 NIS-2012-Crack.exe 4444 NIS-2012-Crack.exe 4444 NIS-2012-Crack.exe 4444 NIS-2012-Crack.exe 4444 NIS-2012-Crack.exe 4444 NIS-2012-Crack.exe 4444 NIS-2012-Crack.exe 4444 NIS-2012-Crack.exe 4444 NIS-2012-Crack.exe 4444 NIS-2012-Crack.exe 4444 NIS-2012-Crack.exe 4444 NIS-2012-Crack.exe 4444 NIS-2012-Crack.exe 4444 NIS-2012-Crack.exe 4444 NIS-2012-Crack.exe 4444 NIS-2012-Crack.exe 4444 NIS-2012-Crack.exe -
Suspicious use of SendNotifyMessage 19 IoCs
pid Process 4444 NIS-2012-Crack.exe 4444 NIS-2012-Crack.exe 4444 NIS-2012-Crack.exe 4444 NIS-2012-Crack.exe 4444 NIS-2012-Crack.exe 4444 NIS-2012-Crack.exe 4444 NIS-2012-Crack.exe 4444 NIS-2012-Crack.exe 4444 NIS-2012-Crack.exe 4444 NIS-2012-Crack.exe 4444 NIS-2012-Crack.exe 4444 NIS-2012-Crack.exe 4444 NIS-2012-Crack.exe 4444 NIS-2012-Crack.exe 4444 NIS-2012-Crack.exe 4444 NIS-2012-Crack.exe 4444 NIS-2012-Crack.exe 4444 NIS-2012-Crack.exe 4444 NIS-2012-Crack.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 456 12.exe 5052 12.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3944 wrote to memory of 4444 3944 b6702cda80a4d3509d2e55688c05c9b5_JaffaCakes118.exe 84 PID 3944 wrote to memory of 4444 3944 b6702cda80a4d3509d2e55688c05c9b5_JaffaCakes118.exe 84 PID 3944 wrote to memory of 4444 3944 b6702cda80a4d3509d2e55688c05c9b5_JaffaCakes118.exe 84 PID 3944 wrote to memory of 456 3944 b6702cda80a4d3509d2e55688c05c9b5_JaffaCakes118.exe 85 PID 3944 wrote to memory of 456 3944 b6702cda80a4d3509d2e55688c05c9b5_JaffaCakes118.exe 85 PID 3944 wrote to memory of 456 3944 b6702cda80a4d3509d2e55688c05c9b5_JaffaCakes118.exe 85 PID 456 wrote to memory of 5052 456 12.exe 86 PID 456 wrote to memory of 5052 456 12.exe 86 PID 456 wrote to memory of 5052 456 12.exe 86 PID 456 wrote to memory of 5052 456 12.exe 86 PID 456 wrote to memory of 5052 456 12.exe 86 PID 456 wrote to memory of 5052 456 12.exe 86 PID 456 wrote to memory of 5052 456 12.exe 86 PID 456 wrote to memory of 5052 456 12.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\b6702cda80a4d3509d2e55688c05c9b5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b6702cda80a4d3509d2e55688c05c9b5_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Users\Admin\AppData\Local\Temp\NIS-2012-Crack.exe"C:\Users\Admin\AppData\Local\Temp\NIS-2012-Crack.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4444
-
-
C:\Users\Admin\AppData\Local\Temp\12.exe"C:\Users\Admin\AppData\Local\Temp\12.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Users\Admin\AppData\Local\Temp\12.exeC:\Users\Admin\AppData\Local\Temp\12.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5052
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152KB
MD517d4bf5aa5a964763f61de2671f693d5
SHA1a17dc284c0fa20c60dfc910d08ce87d3bb90a6f5
SHA256f6acf42f09869e6b9871782b2b766a5eebf9437ef0289fd323745c165815efb3
SHA512c4c608f573bd0d4c18555107ca2617db2dd02b2cb3611eb427b0d7cf3a32285ebf2bcba38954ec888b13afa4d2e4dadd9b0dc514a269803b6ce3890a5c55ddd1
-
Filesize
316KB
MD565f08bbfff6f19b13b051d56be4233bc
SHA1784c0e1b19469cdcf16d3a5f23c76e0b0f32f0ac
SHA256203ee3b4988fbd6d406c6ae593775609b3e655af0af9fdb3e3c253437d522e0d
SHA5123dbeb5c8f5943fc0f95aac95831108b850823e3aa9356e47e54fc0fc63bea62a612d300a8ddb4ab6c71dbf37af788d0ee5932fe53bbc93b03fd59e4ae42682ab