Analysis
-
max time kernel
133s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
16-05-2024 13:14
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
4b3ed36c5debd8c3a0fe511faab8c523_JaffaCakes118.exe
Resource
win7-20240419-en
windows7-x64
7 signatures
150 seconds
General
-
Target
4b3ed36c5debd8c3a0fe511faab8c523_JaffaCakes118.exe
-
Size
129KB
-
MD5
4b3ed36c5debd8c3a0fe511faab8c523
-
SHA1
6b79a9bb47815e3a7d46d24f778498c55a73e99e
-
SHA256
c1ad53643f650c43905e3c944fe4c0299a93aafc419c8344eebc7f523f525487
-
SHA512
e4a05cac21d02b460e69ba2255412c09da7cf8c2744992e3727e413b836df38b61073380fa8b546794df8326b086b4b7c05d6e17ac75d00e25673ff4504b0c18
-
SSDEEP
3072:cIfHEs4E0dK0jYVa4/lCWQe2ji6W+q1s+2:c4ks4E0o00VaMavW+b
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat examplemheg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 18 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{5E87A428-798C-4E5F-B890-657F5DAF008D}\WpadDecisionReason = "1" examplemheg.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{5E87A428-798C-4E5F-B890-657F5DAF008D}\WpadDecision = "0" examplemheg.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 examplemheg.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 examplemheg.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00dd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 examplemheg.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{5E87A428-798C-4E5F-B890-657F5DAF008D}\WpadDecisionTime = 00ee4e0193a7da01 examplemheg.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fe-99-13-52-c7-4d\WpadDecisionReason = "1" examplemheg.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fe-99-13-52-c7-4d\WpadDecisionTime = 00ee4e0193a7da01 examplemheg.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fe-99-13-52-c7-4d\WpadDecision = "0" examplemheg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings examplemheg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad examplemheg.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{5E87A428-798C-4E5F-B890-657F5DAF008D}\WpadNetworkName = "Network 3" examplemheg.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{5E87A428-798C-4E5F-B890-657F5DAF008D}\fe-99-13-52-c7-4d examplemheg.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" examplemheg.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{5E87A428-798C-4E5F-B890-657F5DAF008D} examplemheg.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fe-99-13-52-c7-4d examplemheg.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings examplemheg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections examplemheg.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1936 4b3ed36c5debd8c3a0fe511faab8c523_JaffaCakes118.exe 1996 4b3ed36c5debd8c3a0fe511faab8c523_JaffaCakes118.exe 2052 examplemheg.exe 2788 examplemheg.exe 2788 examplemheg.exe 2788 examplemheg.exe 2788 examplemheg.exe 2788 examplemheg.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1996 4b3ed36c5debd8c3a0fe511faab8c523_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1936 wrote to memory of 1996 1936 4b3ed36c5debd8c3a0fe511faab8c523_JaffaCakes118.exe 28 PID 1936 wrote to memory of 1996 1936 4b3ed36c5debd8c3a0fe511faab8c523_JaffaCakes118.exe 28 PID 1936 wrote to memory of 1996 1936 4b3ed36c5debd8c3a0fe511faab8c523_JaffaCakes118.exe 28 PID 1936 wrote to memory of 1996 1936 4b3ed36c5debd8c3a0fe511faab8c523_JaffaCakes118.exe 28 PID 2052 wrote to memory of 2788 2052 examplemheg.exe 30 PID 2052 wrote to memory of 2788 2052 examplemheg.exe 30 PID 2052 wrote to memory of 2788 2052 examplemheg.exe 30 PID 2052 wrote to memory of 2788 2052 examplemheg.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b3ed36c5debd8c3a0fe511faab8c523_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4b3ed36c5debd8c3a0fe511faab8c523_JaffaCakes118.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Users\Admin\AppData\Local\Temp\4b3ed36c5debd8c3a0fe511faab8c523_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4b3ed36c5debd8c3a0fe511faab8c523_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:1996
-
-
C:\Windows\SysWOW64\examplemheg.exe"C:\Windows\SysWOW64\examplemheg.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\SysWOW64\examplemheg.exe"C:\Windows\SysWOW64\examplemheg.exe"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:2788
-