Analysis
-
max time kernel
133s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
15/05/2024, 10:02
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
45a7339a8c7deaa2503f8343e6e6fd03_JaffaCakes118.exe
Resource
win7-20240508-en
8 signatures
150 seconds
General
-
Target
45a7339a8c7deaa2503f8343e6e6fd03_JaffaCakes118.exe
-
Size
225KB
-
MD5
45a7339a8c7deaa2503f8343e6e6fd03
-
SHA1
03c4e6d50c91a53ff5299343131fa95265dbe526
-
SHA256
02ecffe82918f17ba1fcef2303a266e43db1f110c0760e1d41fd036dfd799afa
-
SHA512
fe21a8bbc16268c844ff8a00ed9a913bebb3eb2984f4893aaf86a45df516b751cab54bdc8c8b4186b048982837383ba3973e9b45fd39db55e684bb8c11f15be2
-
SSDEEP
3072:hreM18hNfd2Qn0n5DP0YSyo6Q2P8Y8h/ttG5E0NF6/ZaIXXXHbg32S:71iNfdBn0tSyfQc8Y8hFt
Malware Config
Signatures
-
Unexpected DNS network traffic destination 2 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 190.138.221.70 Destination IP 190.138.221.70 -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat rightiprop.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 18 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8e-27-2d-32-ba-d3\WpadDecisionTime = c0879801afa6da01 rightiprop.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections rightiprop.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" rightiprop.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 rightiprop.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0026000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 rightiprop.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F38CB632-1FA1-4A4D-ABFF-D12F6707007A}\WpadDecisionTime = c0879801afa6da01 rightiprop.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings rightiprop.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad rightiprop.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F38CB632-1FA1-4A4D-ABFF-D12F6707007A}\WpadDecision = "0" rightiprop.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings rightiprop.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F38CB632-1FA1-4A4D-ABFF-D12F6707007A}\WpadNetworkName = "Network 3" rightiprop.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8e-27-2d-32-ba-d3\WpadDecision = "0" rightiprop.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8e-27-2d-32-ba-d3\WpadDecisionReason = "1" rightiprop.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 rightiprop.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F38CB632-1FA1-4A4D-ABFF-D12F6707007A} rightiprop.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F38CB632-1FA1-4A4D-ABFF-D12F6707007A}\WpadDecisionReason = "1" rightiprop.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8e-27-2d-32-ba-d3 rightiprop.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F38CB632-1FA1-4A4D-ABFF-D12F6707007A}\8e-27-2d-32-ba-d3 rightiprop.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 2936 45a7339a8c7deaa2503f8343e6e6fd03_JaffaCakes118.exe 3040 45a7339a8c7deaa2503f8343e6e6fd03_JaffaCakes118.exe 2776 rightiprop.exe 2532 rightiprop.exe 2532 rightiprop.exe 2532 rightiprop.exe 2532 rightiprop.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3040 45a7339a8c7deaa2503f8343e6e6fd03_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2936 wrote to memory of 3040 2936 45a7339a8c7deaa2503f8343e6e6fd03_JaffaCakes118.exe 28 PID 2936 wrote to memory of 3040 2936 45a7339a8c7deaa2503f8343e6e6fd03_JaffaCakes118.exe 28 PID 2936 wrote to memory of 3040 2936 45a7339a8c7deaa2503f8343e6e6fd03_JaffaCakes118.exe 28 PID 2936 wrote to memory of 3040 2936 45a7339a8c7deaa2503f8343e6e6fd03_JaffaCakes118.exe 28 PID 2776 wrote to memory of 2532 2776 rightiprop.exe 30 PID 2776 wrote to memory of 2532 2776 rightiprop.exe 30 PID 2776 wrote to memory of 2532 2776 rightiprop.exe 30 PID 2776 wrote to memory of 2532 2776 rightiprop.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\45a7339a8c7deaa2503f8343e6e6fd03_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\45a7339a8c7deaa2503f8343e6e6fd03_JaffaCakes118.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\45a7339a8c7deaa2503f8343e6e6fd03_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\45a7339a8c7deaa2503f8343e6e6fd03_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:3040
-
-
C:\Windows\SysWOW64\rightiprop.exe"C:\Windows\SysWOW64\rightiprop.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\rightiprop.exe"C:\Windows\SysWOW64\rightiprop.exe"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:2532
-