Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-01-2025 01:27
Behavioral task
behavioral1
Sample
JaffaCakes118_8283cec57699a2836b4c85785a6a2ddb.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_8283cec57699a2836b4c85785a6a2ddb.exe
-
Size
1.4MB
-
MD5
8283cec57699a2836b4c85785a6a2ddb
-
SHA1
f2af2fe2acff956329a33083161885e15ca0088d
-
SHA256
466a7a4bfd7d7bd3a21da0a70eba84be27533dd1f42b44cb50b559524870b4fb
-
SHA512
816fee014a0d774c317d708dcba5111fe46ab40d5b31e2b718da79f7f16b4119eeae13dc3bbc350ba65f8b71fcba8dd9ac07c6b9ec2ca0b532e885195e139b95
-
SSDEEP
24576:cxpXPaR2J33o3S7P5zuHHOF2ahfehMHsGKzOYf8EEvX3CZ1zo0:spy+VDa8rtPvX3CZlo0
Malware Config
Signatures
-
Socelars family
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 3 iplogger.org 4 iplogger.org -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_8283cec57699a2836b4c85785a6a2ddb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Kills process with taskkill 1 IoCs
pid Process 2576 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: SeCreateTokenPrivilege 2124 JaffaCakes118_8283cec57699a2836b4c85785a6a2ddb.exe Token: SeAssignPrimaryTokenPrivilege 2124 JaffaCakes118_8283cec57699a2836b4c85785a6a2ddb.exe Token: SeLockMemoryPrivilege 2124 JaffaCakes118_8283cec57699a2836b4c85785a6a2ddb.exe Token: SeIncreaseQuotaPrivilege 2124 JaffaCakes118_8283cec57699a2836b4c85785a6a2ddb.exe Token: SeMachineAccountPrivilege 2124 JaffaCakes118_8283cec57699a2836b4c85785a6a2ddb.exe Token: SeTcbPrivilege 2124 JaffaCakes118_8283cec57699a2836b4c85785a6a2ddb.exe Token: SeSecurityPrivilege 2124 JaffaCakes118_8283cec57699a2836b4c85785a6a2ddb.exe Token: SeTakeOwnershipPrivilege 2124 JaffaCakes118_8283cec57699a2836b4c85785a6a2ddb.exe Token: SeLoadDriverPrivilege 2124 JaffaCakes118_8283cec57699a2836b4c85785a6a2ddb.exe Token: SeSystemProfilePrivilege 2124 JaffaCakes118_8283cec57699a2836b4c85785a6a2ddb.exe Token: SeSystemtimePrivilege 2124 JaffaCakes118_8283cec57699a2836b4c85785a6a2ddb.exe Token: SeProfSingleProcessPrivilege 2124 JaffaCakes118_8283cec57699a2836b4c85785a6a2ddb.exe Token: SeIncBasePriorityPrivilege 2124 JaffaCakes118_8283cec57699a2836b4c85785a6a2ddb.exe Token: SeCreatePagefilePrivilege 2124 JaffaCakes118_8283cec57699a2836b4c85785a6a2ddb.exe Token: SeCreatePermanentPrivilege 2124 JaffaCakes118_8283cec57699a2836b4c85785a6a2ddb.exe Token: SeBackupPrivilege 2124 JaffaCakes118_8283cec57699a2836b4c85785a6a2ddb.exe Token: SeRestorePrivilege 2124 JaffaCakes118_8283cec57699a2836b4c85785a6a2ddb.exe Token: SeShutdownPrivilege 2124 JaffaCakes118_8283cec57699a2836b4c85785a6a2ddb.exe Token: SeDebugPrivilege 2124 JaffaCakes118_8283cec57699a2836b4c85785a6a2ddb.exe Token: SeAuditPrivilege 2124 JaffaCakes118_8283cec57699a2836b4c85785a6a2ddb.exe Token: SeSystemEnvironmentPrivilege 2124 JaffaCakes118_8283cec57699a2836b4c85785a6a2ddb.exe Token: SeChangeNotifyPrivilege 2124 JaffaCakes118_8283cec57699a2836b4c85785a6a2ddb.exe Token: SeRemoteShutdownPrivilege 2124 JaffaCakes118_8283cec57699a2836b4c85785a6a2ddb.exe Token: SeUndockPrivilege 2124 JaffaCakes118_8283cec57699a2836b4c85785a6a2ddb.exe Token: SeSyncAgentPrivilege 2124 JaffaCakes118_8283cec57699a2836b4c85785a6a2ddb.exe Token: SeEnableDelegationPrivilege 2124 JaffaCakes118_8283cec57699a2836b4c85785a6a2ddb.exe Token: SeManageVolumePrivilege 2124 JaffaCakes118_8283cec57699a2836b4c85785a6a2ddb.exe Token: SeImpersonatePrivilege 2124 JaffaCakes118_8283cec57699a2836b4c85785a6a2ddb.exe Token: SeCreateGlobalPrivilege 2124 JaffaCakes118_8283cec57699a2836b4c85785a6a2ddb.exe Token: 31 2124 JaffaCakes118_8283cec57699a2836b4c85785a6a2ddb.exe Token: 32 2124 JaffaCakes118_8283cec57699a2836b4c85785a6a2ddb.exe Token: 33 2124 JaffaCakes118_8283cec57699a2836b4c85785a6a2ddb.exe Token: 34 2124 JaffaCakes118_8283cec57699a2836b4c85785a6a2ddb.exe Token: 35 2124 JaffaCakes118_8283cec57699a2836b4c85785a6a2ddb.exe Token: SeDebugPrivilege 2576 taskkill.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2124 wrote to memory of 2668 2124 JaffaCakes118_8283cec57699a2836b4c85785a6a2ddb.exe 30 PID 2124 wrote to memory of 2668 2124 JaffaCakes118_8283cec57699a2836b4c85785a6a2ddb.exe 30 PID 2124 wrote to memory of 2668 2124 JaffaCakes118_8283cec57699a2836b4c85785a6a2ddb.exe 30 PID 2124 wrote to memory of 2668 2124 JaffaCakes118_8283cec57699a2836b4c85785a6a2ddb.exe 30 PID 2668 wrote to memory of 2576 2668 cmd.exe 32 PID 2668 wrote to memory of 2576 2668 cmd.exe 32 PID 2668 wrote to memory of 2576 2668 cmd.exe 32 PID 2668 wrote to memory of 2576 2668 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8283cec57699a2836b4c85785a6a2ddb.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8283cec57699a2836b4c85785a6a2ddb.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2576
-
-