Analysis
-
max time kernel
141s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
27-01-2025 20:11
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_4345594553efe9baf55374ea56b8eb14.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_4345594553efe9baf55374ea56b8eb14.exe
-
Size
239KB
-
MD5
4345594553efe9baf55374ea56b8eb14
-
SHA1
9dd1e554b2df92c7aa5d7e46201dcca0d5b79d14
-
SHA256
755f0b3c27d68bb4e6b05a92bd8c68c8d32b2adf6143739a07a116a3db7b066f
-
SHA512
69ed00d785e53c2704f3c066177250e737379eeb1443c8e0e17a3189c8d11676e01596471bcd8d8a8a189c5f055ba30fdc321293d06be74439f0c3f7cf47da5b
-
SSDEEP
6144:dR6XZeWvkIejI92jcRCRHYl+jr92KcRCWS0P:qpJejI93CRw+jr9sCxS
Malware Config
Signatures
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload 4 IoCs
resource yara_rule behavioral1/files/0x0008000000018b05-86762.dat family_isrstealer behavioral1/memory/124536-89384-0x0000000000400000-0x0000000000414000-memory.dmp family_isrstealer behavioral1/memory/124536-89381-0x0000000000400000-0x0000000000414000-memory.dmp family_isrstealer behavioral1/memory/124536-89395-0x0000000000400000-0x0000000000414000-memory.dmp family_isrstealer -
Isrstealer family
-
Executes dropped EXE 4 IoCs
pid Process 2784 [keygen].exe 2912 pk.exe 103920 259544557.exe 124536 pk.exe -
Loads dropped DLL 20 IoCs
pid Process 2856 JaffaCakes118_4345594553efe9baf55374ea56b8eb14.exe 2784 [keygen].exe 2784 [keygen].exe 2856 JaffaCakes118_4345594553efe9baf55374ea56b8eb14.exe 2856 JaffaCakes118_4345594553efe9baf55374ea56b8eb14.exe 2912 pk.exe 2912 pk.exe 2912 pk.exe 2912 pk.exe 2912 pk.exe 2912 pk.exe 2912 pk.exe 2912 pk.exe 103920 259544557.exe 103920 259544557.exe 103920 259544557.exe 2912 pk.exe 124536 pk.exe 124536 pk.exe 124536 pk.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2912 set thread context of 124536 2912 pk.exe 33 -
resource yara_rule behavioral1/files/0x000e000000012263-3.dat upx behavioral1/memory/2784-9-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/2784-12-0x0000000000020000-0x0000000000030000-memory.dmp upx behavioral1/memory/2784-31990-0x0000000000400000-0x0000000000410000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 259544557.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_4345594553efe9baf55374ea56b8eb14.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language [keygen].exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 103920 259544557.exe 103920 259544557.exe 103920 259544557.exe 103920 259544557.exe 124536 pk.exe 124536 pk.exe 124536 pk.exe 124536 pk.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2912 pk.exe 103920 259544557.exe 124536 pk.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2856 wrote to memory of 2784 2856 JaffaCakes118_4345594553efe9baf55374ea56b8eb14.exe 30 PID 2856 wrote to memory of 2784 2856 JaffaCakes118_4345594553efe9baf55374ea56b8eb14.exe 30 PID 2856 wrote to memory of 2784 2856 JaffaCakes118_4345594553efe9baf55374ea56b8eb14.exe 30 PID 2856 wrote to memory of 2784 2856 JaffaCakes118_4345594553efe9baf55374ea56b8eb14.exe 30 PID 2856 wrote to memory of 2784 2856 JaffaCakes118_4345594553efe9baf55374ea56b8eb14.exe 30 PID 2856 wrote to memory of 2784 2856 JaffaCakes118_4345594553efe9baf55374ea56b8eb14.exe 30 PID 2856 wrote to memory of 2784 2856 JaffaCakes118_4345594553efe9baf55374ea56b8eb14.exe 30 PID 2856 wrote to memory of 2912 2856 JaffaCakes118_4345594553efe9baf55374ea56b8eb14.exe 31 PID 2856 wrote to memory of 2912 2856 JaffaCakes118_4345594553efe9baf55374ea56b8eb14.exe 31 PID 2856 wrote to memory of 2912 2856 JaffaCakes118_4345594553efe9baf55374ea56b8eb14.exe 31 PID 2856 wrote to memory of 2912 2856 JaffaCakes118_4345594553efe9baf55374ea56b8eb14.exe 31 PID 2856 wrote to memory of 2912 2856 JaffaCakes118_4345594553efe9baf55374ea56b8eb14.exe 31 PID 2856 wrote to memory of 2912 2856 JaffaCakes118_4345594553efe9baf55374ea56b8eb14.exe 31 PID 2856 wrote to memory of 2912 2856 JaffaCakes118_4345594553efe9baf55374ea56b8eb14.exe 31 PID 2912 wrote to memory of 103920 2912 pk.exe 32 PID 2912 wrote to memory of 103920 2912 pk.exe 32 PID 2912 wrote to memory of 103920 2912 pk.exe 32 PID 2912 wrote to memory of 103920 2912 pk.exe 32 PID 2912 wrote to memory of 103920 2912 pk.exe 32 PID 2912 wrote to memory of 103920 2912 pk.exe 32 PID 2912 wrote to memory of 103920 2912 pk.exe 32 PID 2912 wrote to memory of 124536 2912 pk.exe 33 PID 2912 wrote to memory of 124536 2912 pk.exe 33 PID 2912 wrote to memory of 124536 2912 pk.exe 33 PID 2912 wrote to memory of 124536 2912 pk.exe 33 PID 2912 wrote to memory of 124536 2912 pk.exe 33 PID 2912 wrote to memory of 124536 2912 pk.exe 33 PID 2912 wrote to memory of 124536 2912 pk.exe 33 PID 2912 wrote to memory of 124536 2912 pk.exe 33 PID 2912 wrote to memory of 124536 2912 pk.exe 33 PID 2912 wrote to memory of 124536 2912 pk.exe 33 PID 2912 wrote to memory of 124536 2912 pk.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4345594553efe9baf55374ea56b8eb14.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4345594553efe9baf55374ea56b8eb14.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\[keygen].exe"C:\Users\Admin\AppData\Local\Temp\[keygen].exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2784
-
-
C:\Users\Admin\AppData\Local\Temp\pk.exe"C:\Users\Admin\AppData\Local\Temp\pk.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\259544557.exe"C:\Users\Admin\AppData\Local\Temp\259544557.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:103920
-
-
C:\Users\Admin\AppData\Local\Temp\pk.exe"C:\Users\Admin\AppData\Local\Temp\pk.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:124536
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD5729be215886e52acf1b9468eb72acfcf
SHA13cecedf384efbf2eeb78324cc9b7eeb2af8ab038
SHA256808cf749a25dc9c1e6b8894776ab84157591cde8890589104827583a6d455a82
SHA5122ca5a1c95af58c6e7f39996595918c2bf838bce3a2b7318bd27338f826d2a9f951da6f8b7ab33abf87517db23a3f3332398d8b60b4d2834611fecf8ed1c56935
-
Filesize
25KB
MD5c4d8b216912194fc830c0a212de4c4e7
SHA1eb24098e3489e70cbc0f3c505e7d32825da72c95
SHA256490c784af00478dc88eddb9743ae84c54b7227f2c0bf277f23502c60c945c3b3
SHA512aa3c7fc5bfd6628d6769e4a4cb8437bd6646cb04010ca5b962bd9f1c6376b5d70c68325181e66ab5d0c92c51d24cbaa1f68fc15e9de9e58d1bb81eb99d5aa256
-
Filesize
280KB
MD548721461e7452369c7dbc485b7ddb79b
SHA124ab65e1637d5fff51b3a329fedd2578a03bebcb
SHA25687acc62eb7e794bfab31118aa32f7002cab51258d55d46e9c1dd57377849633a
SHA51266d733620e907486a072db34fafbbdcb2989fdddc6af8a635979ad21c177ccca66eab2ba910bf1117cf631d29a5c9dfe647d4654a1f6ad81bf265e70065654f6