Analysis
-
max time kernel
93s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-12-2024 21:50
Static task
static1
Behavioral task
behavioral1
Sample
dbb411b31c2f2beb3cf20e5f428c6100_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
dbb411b31c2f2beb3cf20e5f428c6100_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
dbb411b31c2f2beb3cf20e5f428c6100_JaffaCakes118.exe
-
Size
1.2MB
-
MD5
dbb411b31c2f2beb3cf20e5f428c6100
-
SHA1
4d61b3d4bf11f05b05f55f6014056f6c6b28dab1
-
SHA256
bb64e688ed77464721aed2f6ccf8a730d5cdd5ae6bb2884e9d3ee46ae41fcdad
-
SHA512
d5120df6db4dce07b37c15c405e156507bf8b08e3013f939741d1a6af63b7c51cc6923981b1973961b3a2e86dc736565cfdeb33bb27654da717682bba8c46f2a
-
SSDEEP
24576:BRmJkcoQricOIQxiZY1WN9G4aEMuoKqWlOAXzxaA:uJZoQrbTFZY1WN9G4aEMbgOADkA
Malware Config
Signatures
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload 3 IoCs
resource yara_rule behavioral2/memory/4752-9-0x0000000000400000-0x0000000000432000-memory.dmp family_isrstealer behavioral2/memory/4752-11-0x0000000000400000-0x0000000000432000-memory.dmp family_isrstealer behavioral2/memory/4752-23-0x0000000000400000-0x0000000000432000-memory.dmp family_isrstealer -
Isrstealer family
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/2876-0-0x0000000000400000-0x0000000000509000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2876 set thread context of 4752 2876 dbb411b31c2f2beb3cf20e5f428c6100_JaffaCakes118.exe 83 PID 4752 set thread context of 3552 4752 calc.exe 84 -
resource yara_rule behavioral2/memory/3552-14-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral2/memory/3552-17-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral2/memory/3552-18-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral2/memory/3552-19-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral2/memory/3552-21-0x0000000000400000-0x0000000000453000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dbb411b31c2f2beb3cf20e5f428c6100_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language calc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language calc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4752 calc.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2876 wrote to memory of 4752 2876 dbb411b31c2f2beb3cf20e5f428c6100_JaffaCakes118.exe 83 PID 2876 wrote to memory of 4752 2876 dbb411b31c2f2beb3cf20e5f428c6100_JaffaCakes118.exe 83 PID 2876 wrote to memory of 4752 2876 dbb411b31c2f2beb3cf20e5f428c6100_JaffaCakes118.exe 83 PID 2876 wrote to memory of 4752 2876 dbb411b31c2f2beb3cf20e5f428c6100_JaffaCakes118.exe 83 PID 2876 wrote to memory of 4752 2876 dbb411b31c2f2beb3cf20e5f428c6100_JaffaCakes118.exe 83 PID 4752 wrote to memory of 3552 4752 calc.exe 84 PID 4752 wrote to memory of 3552 4752 calc.exe 84 PID 4752 wrote to memory of 3552 4752 calc.exe 84 PID 4752 wrote to memory of 3552 4752 calc.exe 84 PID 4752 wrote to memory of 3552 4752 calc.exe 84 PID 4752 wrote to memory of 3552 4752 calc.exe 84 PID 4752 wrote to memory of 3552 4752 calc.exe 84 PID 4752 wrote to memory of 3552 4752 calc.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\dbb411b31c2f2beb3cf20e5f428c6100_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dbb411b31c2f2beb3cf20e5f428c6100_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\SysWOW64\calc.exe"C:\Windows\SysWOW64\calc.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Windows\SysWOW64\calc.exe/scomma "C:\Users\Admin\AppData\Local\Temp\tmp.ini"3⤵
- System Location Discovery: System Language Discovery
PID:3552
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
196KB
MD5341c286009802e630bb2c2fadc192d4b
SHA1982341dec725fffe13d7fc81d5b2f9112622af4c
SHA256b5c600cf2a879be00fb957fdd54b0b08ffb5f46d1b9e2d65be66690d389ed9e4
SHA512870625d59e068720b5175ff458958578de080c7fee46b789e84b2a25309fd688015a85917c0ebff99138eaab06f829965ca320691d93e2f6c15f4856d1d1d32a
-
Filesize
5B
MD5d1ea279fb5559c020a1b4137dc4de237
SHA1db6f8988af46b56216a6f0daf95ab8c9bdb57400
SHA256fcdcc2c46896915a1c695d6231f0fee336a668531b7a3da46178c80362546dba
SHA512720e9c284f0559015312df7fe977563e5e16f48d3506e51eb4016adf7971924d352f740b030aa3adc81b6f65fd1dba12df06d10fa6c115074e5097e7ee0f08b3