Analysis
-
max time kernel
131s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15-05-2024 13:20
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
465c7fb95c45008ddc6b940624745430_JaffaCakes118.exe
Resource
win7-20240221-en
windows7-x64
7 signatures
150 seconds
General
-
Target
465c7fb95c45008ddc6b940624745430_JaffaCakes118.exe
-
Size
120KB
-
MD5
465c7fb95c45008ddc6b940624745430
-
SHA1
c5cb7ac12964118a02bf42081948f7b337596caf
-
SHA256
21355753a277813cf58a348e389fa4feebca3f819ba7c78a8ab679a4f63d1953
-
SHA512
47da7a30600b53ec7f769280e62b108d5b36bc8d8fa3323ebac17456707cd141b031ae97ff66cf74637da9ff1683b7b14d0f2b7a978cece6d82f8e85f90b688f
-
SSDEEP
1536:iE+/4PkghqS5MVkW31G8KaEaoiXzCll4xArk/HvqbzFerKdNhaaXXr:iE+/4sxVz3EaoiDQ4CtFN/hXr
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
Processes:
msradsm.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat msradsm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 18 IoCs
Processes:
msradsm.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings msradsm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" msradsm.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 msradsm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A4877036-7BA5-424E-A337-371AA4D3D5B4} msradsm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\72-16-0e-00-7c-ec\WpadDecision = "0" msradsm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections msradsm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A4877036-7BA5-424E-A337-371AA4D3D5B4}\WpadDecisionReason = "1" msradsm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\72-16-0e-00-7c-ec msradsm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\72-16-0e-00-7c-ec\WpadDecisionReason = "1" msradsm.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\72-16-0e-00-7c-ec\WpadDecisionTime = 30ce8ec5caa6da01 msradsm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings msradsm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad msradsm.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A4877036-7BA5-424E-A337-371AA4D3D5B4}\WpadDecisionTime = 30ce8ec5caa6da01 msradsm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A4877036-7BA5-424E-A337-371AA4D3D5B4}\WpadDecision = "0" msradsm.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 msradsm.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f007e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 msradsm.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A4877036-7BA5-424E-A337-371AA4D3D5B4}\WpadNetworkName = "Network 3" msradsm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A4877036-7BA5-424E-A337-371AA4D3D5B4}\72-16-0e-00-7c-ec msradsm.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
465c7fb95c45008ddc6b940624745430_JaffaCakes118.exe465c7fb95c45008ddc6b940624745430_JaffaCakes118.exemsradsm.exemsradsm.exepid process 2020 465c7fb95c45008ddc6b940624745430_JaffaCakes118.exe 2052 465c7fb95c45008ddc6b940624745430_JaffaCakes118.exe 1068 msradsm.exe 2780 msradsm.exe 2780 msradsm.exe 2780 msradsm.exe 2780 msradsm.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
465c7fb95c45008ddc6b940624745430_JaffaCakes118.exepid process 2052 465c7fb95c45008ddc6b940624745430_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
465c7fb95c45008ddc6b940624745430_JaffaCakes118.exemsradsm.exedescription pid process target process PID 2020 wrote to memory of 2052 2020 465c7fb95c45008ddc6b940624745430_JaffaCakes118.exe 465c7fb95c45008ddc6b940624745430_JaffaCakes118.exe PID 2020 wrote to memory of 2052 2020 465c7fb95c45008ddc6b940624745430_JaffaCakes118.exe 465c7fb95c45008ddc6b940624745430_JaffaCakes118.exe PID 2020 wrote to memory of 2052 2020 465c7fb95c45008ddc6b940624745430_JaffaCakes118.exe 465c7fb95c45008ddc6b940624745430_JaffaCakes118.exe PID 2020 wrote to memory of 2052 2020 465c7fb95c45008ddc6b940624745430_JaffaCakes118.exe 465c7fb95c45008ddc6b940624745430_JaffaCakes118.exe PID 1068 wrote to memory of 2780 1068 msradsm.exe msradsm.exe PID 1068 wrote to memory of 2780 1068 msradsm.exe msradsm.exe PID 1068 wrote to memory of 2780 1068 msradsm.exe msradsm.exe PID 1068 wrote to memory of 2780 1068 msradsm.exe msradsm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\465c7fb95c45008ddc6b940624745430_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\465c7fb95c45008ddc6b940624745430_JaffaCakes118.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\465c7fb95c45008ddc6b940624745430_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\465c7fb95c45008ddc6b940624745430_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:2052
-
C:\Windows\SysWOW64\msradsm.exe"C:\Windows\SysWOW64\msradsm.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Windows\SysWOW64\msradsm.exe"C:\Windows\SysWOW64\msradsm.exe"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:2780