Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
09-12-2024 21:50
Static task
static1
Behavioral task
behavioral1
Sample
dbb411b31c2f2beb3cf20e5f428c6100_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
dbb411b31c2f2beb3cf20e5f428c6100_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
dbb411b31c2f2beb3cf20e5f428c6100_JaffaCakes118.exe
-
Size
1.2MB
-
MD5
dbb411b31c2f2beb3cf20e5f428c6100
-
SHA1
4d61b3d4bf11f05b05f55f6014056f6c6b28dab1
-
SHA256
bb64e688ed77464721aed2f6ccf8a730d5cdd5ae6bb2884e9d3ee46ae41fcdad
-
SHA512
d5120df6db4dce07b37c15c405e156507bf8b08e3013f939741d1a6af63b7c51cc6923981b1973961b3a2e86dc736565cfdeb33bb27654da717682bba8c46f2a
-
SSDEEP
24576:BRmJkcoQricOIQxiZY1WN9G4aEMuoKqWlOAXzxaA:uJZoQrbTFZY1WN9G4aEMbgOADkA
Malware Config
Signatures
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload 2 IoCs
resource yara_rule behavioral1/memory/2464-11-0x0000000000400000-0x0000000000432000-memory.dmp family_isrstealer behavioral1/memory/2464-23-0x0000000000400000-0x0000000000432000-memory.dmp family_isrstealer -
Isrstealer family
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2360-0-0x0000000000400000-0x0000000000509000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2360 set thread context of 2464 2360 dbb411b31c2f2beb3cf20e5f428c6100_JaffaCakes118.exe 30 PID 2464 set thread context of 2312 2464 calc.exe 31 -
resource yara_rule behavioral1/memory/2312-16-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/2312-18-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/2312-19-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/2312-21-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/2312-24-0x0000000000400000-0x0000000000453000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dbb411b31c2f2beb3cf20e5f428c6100_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language calc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language calc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2464 calc.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2360 wrote to memory of 2464 2360 dbb411b31c2f2beb3cf20e5f428c6100_JaffaCakes118.exe 30 PID 2360 wrote to memory of 2464 2360 dbb411b31c2f2beb3cf20e5f428c6100_JaffaCakes118.exe 30 PID 2360 wrote to memory of 2464 2360 dbb411b31c2f2beb3cf20e5f428c6100_JaffaCakes118.exe 30 PID 2360 wrote to memory of 2464 2360 dbb411b31c2f2beb3cf20e5f428c6100_JaffaCakes118.exe 30 PID 2360 wrote to memory of 2464 2360 dbb411b31c2f2beb3cf20e5f428c6100_JaffaCakes118.exe 30 PID 2360 wrote to memory of 2464 2360 dbb411b31c2f2beb3cf20e5f428c6100_JaffaCakes118.exe 30 PID 2464 wrote to memory of 2312 2464 calc.exe 31 PID 2464 wrote to memory of 2312 2464 calc.exe 31 PID 2464 wrote to memory of 2312 2464 calc.exe 31 PID 2464 wrote to memory of 2312 2464 calc.exe 31 PID 2464 wrote to memory of 2312 2464 calc.exe 31 PID 2464 wrote to memory of 2312 2464 calc.exe 31 PID 2464 wrote to memory of 2312 2464 calc.exe 31 PID 2464 wrote to memory of 2312 2464 calc.exe 31 PID 2464 wrote to memory of 2312 2464 calc.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\dbb411b31c2f2beb3cf20e5f428c6100_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dbb411b31c2f2beb3cf20e5f428c6100_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\calc.exe"C:\Windows\SysWOW64\calc.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\SysWOW64\calc.exe/scomma "C:\Users\Admin\AppData\Local\Temp\tmp.ini"3⤵
- System Location Discovery: System Language Discovery
PID:2312
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
196KB
MD5341c286009802e630bb2c2fadc192d4b
SHA1982341dec725fffe13d7fc81d5b2f9112622af4c
SHA256b5c600cf2a879be00fb957fdd54b0b08ffb5f46d1b9e2d65be66690d389ed9e4
SHA512870625d59e068720b5175ff458958578de080c7fee46b789e84b2a25309fd688015a85917c0ebff99138eaab06f829965ca320691d93e2f6c15f4856d1d1d32a