Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/03/2025, 11:45
Behavioral task
behavioral1
Sample
JaffaCakes118_4003458329d4ffc9c6cc59c517ee61d4.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_4003458329d4ffc9c6cc59c517ee61d4.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_4003458329d4ffc9c6cc59c517ee61d4.exe
-
Size
1.8MB
-
MD5
4003458329d4ffc9c6cc59c517ee61d4
-
SHA1
429db292a18b71b7a64678fd90d72875cd6c65bf
-
SHA256
c5c65f8081ace93fdb27c429951bab9afc3b56c3227c64fedc32049edbfdcadb
-
SHA512
ff1684b6a7f99accd1ef7aac09e83a5b0dc3accc8717bf8a6333b81b45e55c01153102395a88148a2b9ed0f07470d6d8cef072b011061103c6274c1b98d8aef8
-
SSDEEP
49152:KFlk6aIlk6oDD5IgbbMqulscpYmACnYQw/iTVU3vijkDAU5tjY:KFlk6aIlk6IRCYd
Malware Config
Signatures
-
Panda Stealer payload 6 IoCs
resource yara_rule behavioral1/files/0x0008000000019227-16.dat family_pandastealer behavioral1/memory/2308-21-0x0000000000400000-0x0000000000596000-memory.dmp family_pandastealer behavioral1/memory/2308-23-0x0000000000400000-0x0000000000596000-memory.dmp family_pandastealer behavioral1/memory/352-20-0x00000000025D0000-0x0000000002766000-memory.dmp family_pandastealer behavioral1/memory/2308-28-0x0000000000400000-0x0000000000596000-memory.dmp family_pandastealer behavioral1/memory/2308-29-0x0000000000400000-0x0000000000596000-memory.dmp family_pandastealer -
PandaStealer
Panda Stealer is a fork of CollectorProject Stealer written in C++.
-
Pandastealer family
-
Deletes itself 1 IoCs
pid Process 2308 CCleaner.exe -
Executes dropped EXE 3 IoCs
pid Process 2440 Crypted.exe 1920 Crypted.exe 2308 CCleaner.exe -
Loads dropped DLL 7 IoCs
pid Process 352 JaffaCakes118_4003458329d4ffc9c6cc59c517ee61d4.exe 352 JaffaCakes118_4003458329d4ffc9c6cc59c517ee61d4.exe 2440 Crypted.exe 352 JaffaCakes118_4003458329d4ffc9c6cc59c517ee61d4.exe 2012 WerFault.exe 2012 WerFault.exe 2012 WerFault.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\Key33 = "C:\\Windows\\system32\\file.exe" JaffaCakes118_4003458329d4ffc9c6cc59c517ee61d4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Key33 = "C:\\Windows\\system32\\file.exe" JaffaCakes118_4003458329d4ffc9c6cc59c517ee61d4.exe -
Checks for any installed AV software in registry 1 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Avira\AntiVir Desktop CCleaner.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Avira\AntiVir Desktop CCleaner.exe -
Drops desktop.ini file(s) 6 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\09OB1FV8\desktop.ini CCleaner.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\desktop.ini CCleaner.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\SK4ZQZYF\desktop.ini CCleaner.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WMBPAEF9\desktop.ini CCleaner.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Y07CWM3B\desktop.ini CCleaner.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\desktop.ini CCleaner.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2440 set thread context of 1920 2440 Crypted.exe 31 -
Drops file in Windows directory 10 IoCs
description ioc Process File opened for modification C:\Windows\TSSysprep.log CCleaner.exe File opened for modification C:\Windows\WindowsUpdate.log CCleaner.exe File opened for modification C:\Windows\Debug\PASSWD.LOG CCleaner.exe File opened for modification C:\Windows\Debug\sammui.log CCleaner.exe File opened for modification C:\Windows\security\logs\scesetup.log CCleaner.exe File opened for modification C:\Windows\security\logs\scecomp.old CCleaner.exe File opened for modification C:\Windows\DtcInstall.log CCleaner.exe File opened for modification C:\Windows\PFRO.log CCleaner.exe File opened for modification C:\Windows\setupact.log CCleaner.exe File opened for modification C:\Windows\setuperr.log CCleaner.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2012 1920 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_4003458329d4ffc9c6cc59c517ee61d4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Crypted.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Crypted.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CCleaner.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor CCleaner.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor CCleaner.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 CCleaner.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString CCleaner.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch CCleaner.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" CCleaner.exe Key deleted \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TYPEDURLS CCleaner.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2308 CCleaner.exe 2308 CCleaner.exe 2308 CCleaner.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 352 wrote to memory of 2440 352 JaffaCakes118_4003458329d4ffc9c6cc59c517ee61d4.exe 30 PID 352 wrote to memory of 2440 352 JaffaCakes118_4003458329d4ffc9c6cc59c517ee61d4.exe 30 PID 352 wrote to memory of 2440 352 JaffaCakes118_4003458329d4ffc9c6cc59c517ee61d4.exe 30 PID 352 wrote to memory of 2440 352 JaffaCakes118_4003458329d4ffc9c6cc59c517ee61d4.exe 30 PID 2440 wrote to memory of 1920 2440 Crypted.exe 31 PID 2440 wrote to memory of 1920 2440 Crypted.exe 31 PID 2440 wrote to memory of 1920 2440 Crypted.exe 31 PID 2440 wrote to memory of 1920 2440 Crypted.exe 31 PID 2440 wrote to memory of 1920 2440 Crypted.exe 31 PID 2440 wrote to memory of 1920 2440 Crypted.exe 31 PID 352 wrote to memory of 2308 352 JaffaCakes118_4003458329d4ffc9c6cc59c517ee61d4.exe 32 PID 352 wrote to memory of 2308 352 JaffaCakes118_4003458329d4ffc9c6cc59c517ee61d4.exe 32 PID 352 wrote to memory of 2308 352 JaffaCakes118_4003458329d4ffc9c6cc59c517ee61d4.exe 32 PID 352 wrote to memory of 2308 352 JaffaCakes118_4003458329d4ffc9c6cc59c517ee61d4.exe 32 PID 1920 wrote to memory of 2012 1920 Crypted.exe 33 PID 1920 wrote to memory of 2012 1920 Crypted.exe 33 PID 1920 wrote to memory of 2012 1920 Crypted.exe 33 PID 1920 wrote to memory of 2012 1920 Crypted.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4003458329d4ffc9c6cc59c517ee61d4.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4003458329d4ffc9c6cc59c517ee61d4.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:352 -
C:\Users\Admin\AppData\Local\Temp\Crypted.exe"C:\Users\Admin\AppData\Local\Temp\Crypted.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\Crypted.exe"C:\Users\Admin\AppData\Local\Temp\Crypted.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1920 -s 1804⤵
- Loads dropped DLL
- Program crash
PID:2012
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CCleaner.exe"C:\Users\Admin\AppData\Local\Temp\CCleaner.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Checks for any installed AV software in registry
- Drops desktop.ini file(s)
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:2308
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD580baa9c95ef5e0eb3da7db06b48023d4
SHA14a717610dba20e0d1668d6b79014b8c9439b4a6e
SHA2564a1724ab0c30ac35aa1f5a3c0212a3e23c906e85879b70722cc320191a3adc64
SHA51201e7f8addd31936977d867f122f76bc5bce64c7658e5fd3b45bb11653573b0e462421fa1b22166b0513aa09b52d031b68a75461c50fa850c0858a0cc829dea5c
-
Filesize
131KB
MD5bea9463dc85408c0087967bbb2588791
SHA160fc8133bf3522aa34321877153d20ce934a7fca
SHA2567daf07ecac4a2a5f64415602e2ff669a6f33eb5e1c33e1c41262958752119504
SHA512e0062e5303cc467cf2b5768803a6b945a716bf69a668d616388532179f56164a612ce7fc5e9519521a1b7d28c0e55e67b83ddd365e555dff6453b6c3b43aa949