Analysis
-
max time kernel
141s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-01-2025 20:11
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_4345594553efe9baf55374ea56b8eb14.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_4345594553efe9baf55374ea56b8eb14.exe
-
Size
239KB
-
MD5
4345594553efe9baf55374ea56b8eb14
-
SHA1
9dd1e554b2df92c7aa5d7e46201dcca0d5b79d14
-
SHA256
755f0b3c27d68bb4e6b05a92bd8c68c8d32b2adf6143739a07a116a3db7b066f
-
SHA512
69ed00d785e53c2704f3c066177250e737379eeb1443c8e0e17a3189c8d11676e01596471bcd8d8a8a189c5f055ba30fdc321293d06be74439f0c3f7cf47da5b
-
SSDEEP
6144:dR6XZeWvkIejI92jcRCRHYl+jr92KcRCWS0P:qpJejI93CRw+jr9sCxS
Malware Config
Signatures
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload 4 IoCs
resource yara_rule behavioral2/files/0x000b000000023bb2-38.dat family_isrstealer behavioral2/memory/2540-45-0x0000000000400000-0x0000000000414000-memory.dmp family_isrstealer behavioral2/memory/2540-48-0x0000000000400000-0x0000000000414000-memory.dmp family_isrstealer behavioral2/memory/2540-57-0x0000000000400000-0x0000000000414000-memory.dmp family_isrstealer -
Isrstealer family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation JaffaCakes118_4345594553efe9baf55374ea56b8eb14.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation pk.exe -
Executes dropped EXE 4 IoCs
pid Process 1988 [keygen].exe 4888 pk.exe 2456 240621656.exe 2540 pk.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4888 set thread context of 2540 4888 pk.exe 86 -
resource yara_rule behavioral2/files/0x000c000000023bab-5.dat upx behavioral2/memory/1988-9-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/1988-26-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/4888-30-0x0000000002810000-0x0000000002811000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 240621656.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_4345594553efe9baf55374ea56b8eb14.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language [keygen].exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pk.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 2540 pk.exe 2540 pk.exe 2456 240621656.exe 2456 240621656.exe 2540 pk.exe 2540 pk.exe 2456 240621656.exe 2456 240621656.exe 2540 pk.exe 2540 pk.exe 2456 240621656.exe 2456 240621656.exe 2540 pk.exe 2540 pk.exe 2456 240621656.exe 2456 240621656.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4888 pk.exe 2540 pk.exe 2456 240621656.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4380 wrote to memory of 1988 4380 JaffaCakes118_4345594553efe9baf55374ea56b8eb14.exe 82 PID 4380 wrote to memory of 1988 4380 JaffaCakes118_4345594553efe9baf55374ea56b8eb14.exe 82 PID 4380 wrote to memory of 1988 4380 JaffaCakes118_4345594553efe9baf55374ea56b8eb14.exe 82 PID 4380 wrote to memory of 4888 4380 JaffaCakes118_4345594553efe9baf55374ea56b8eb14.exe 83 PID 4380 wrote to memory of 4888 4380 JaffaCakes118_4345594553efe9baf55374ea56b8eb14.exe 83 PID 4380 wrote to memory of 4888 4380 JaffaCakes118_4345594553efe9baf55374ea56b8eb14.exe 83 PID 4888 wrote to memory of 2456 4888 pk.exe 84 PID 4888 wrote to memory of 2456 4888 pk.exe 84 PID 4888 wrote to memory of 2456 4888 pk.exe 84 PID 4888 wrote to memory of 2540 4888 pk.exe 86 PID 4888 wrote to memory of 2540 4888 pk.exe 86 PID 4888 wrote to memory of 2540 4888 pk.exe 86 PID 4888 wrote to memory of 2540 4888 pk.exe 86 PID 4888 wrote to memory of 2540 4888 pk.exe 86 PID 4888 wrote to memory of 2540 4888 pk.exe 86 PID 4888 wrote to memory of 2540 4888 pk.exe 86 PID 4888 wrote to memory of 2540 4888 pk.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4345594553efe9baf55374ea56b8eb14.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4345594553efe9baf55374ea56b8eb14.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Users\Admin\AppData\Local\Temp\[keygen].exe"C:\Users\Admin\AppData\Local\Temp\[keygen].exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1988
-
-
C:\Users\Admin\AppData\Local\Temp\pk.exe"C:\Users\Admin\AppData\Local\Temp\pk.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Users\Admin\AppData\Local\Temp\240621656.exe"C:\Users\Admin\AppData\Local\Temp\240621656.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2456
-
-
C:\Users\Admin\AppData\Local\Temp\pk.exe"C:\Users\Admin\AppData\Local\Temp\pk.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2540
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD5729be215886e52acf1b9468eb72acfcf
SHA13cecedf384efbf2eeb78324cc9b7eeb2af8ab038
SHA256808cf749a25dc9c1e6b8894776ab84157591cde8890589104827583a6d455a82
SHA5122ca5a1c95af58c6e7f39996595918c2bf838bce3a2b7318bd27338f826d2a9f951da6f8b7ab33abf87517db23a3f3332398d8b60b4d2834611fecf8ed1c56935
-
Filesize
25KB
MD5c4d8b216912194fc830c0a212de4c4e7
SHA1eb24098e3489e70cbc0f3c505e7d32825da72c95
SHA256490c784af00478dc88eddb9743ae84c54b7227f2c0bf277f23502c60c945c3b3
SHA512aa3c7fc5bfd6628d6769e4a4cb8437bd6646cb04010ca5b962bd9f1c6376b5d70c68325181e66ab5d0c92c51d24cbaa1f68fc15e9de9e58d1bb81eb99d5aa256
-
Filesize
280KB
MD548721461e7452369c7dbc485b7ddb79b
SHA124ab65e1637d5fff51b3a329fedd2578a03bebcb
SHA25687acc62eb7e794bfab31118aa32f7002cab51258d55d46e9c1dd57377849633a
SHA51266d733620e907486a072db34fafbbdcb2989fdddc6af8a635979ad21c177ccca66eab2ba910bf1117cf631d29a5c9dfe647d4654a1f6ad81bf265e70065654f6