Analysis
-
max time kernel
137s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18-05-2024 20:44
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
56b2a7238056159a10fd14f0ac42434a_JaffaCakes118.exe
Resource
win7-20240221-en
windows7-x64
7 signatures
150 seconds
General
-
Target
56b2a7238056159a10fd14f0ac42434a_JaffaCakes118.exe
-
Size
176KB
-
MD5
56b2a7238056159a10fd14f0ac42434a
-
SHA1
95d1756a7f5f7cc1dd4c0f832400c0675dd01106
-
SHA256
52832fdccdac5bf5c69c220720af7958db6e180be67440561005ac8b1727bde8
-
SHA512
4f04254567cf02fdcff7e974e07307a205886b40288994d33f6f3a764612a01f879dbc903ad626cc41aa8022deba82b4fc266be2f4ccdebd11a5d6f0bda4c9b3
-
SSDEEP
3072:mm10x9UrjJVmChGya8lw0ECrRwCSGdictpdhCWY86bIWLu4Nrme/1Z9:B10xOV+La/2CFd1jdy
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
Processes:
defineavatar.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat defineavatar.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 18 IoCs
Processes:
defineavatar.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{BB2EAF90-A9C8-4D33-81CC-68495072DB13}\3e-e3-d0-4c-ca-45 defineavatar.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 defineavatar.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" defineavatar.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{BB2EAF90-A9C8-4D33-81CC-68495072DB13}\WpadDecisionTime = 10c6953b64a9da01 defineavatar.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\3e-e3-d0-4c-ca-45 defineavatar.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings defineavatar.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings defineavatar.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 defineavatar.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad defineavatar.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f008f000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 defineavatar.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\3e-e3-d0-4c-ca-45\WpadDecisionReason = "1" defineavatar.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections defineavatar.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{BB2EAF90-A9C8-4D33-81CC-68495072DB13} defineavatar.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{BB2EAF90-A9C8-4D33-81CC-68495072DB13}\WpadDecisionReason = "1" defineavatar.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{BB2EAF90-A9C8-4D33-81CC-68495072DB13}\WpadDecision = "0" defineavatar.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{BB2EAF90-A9C8-4D33-81CC-68495072DB13}\WpadNetworkName = "Network 3" defineavatar.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\3e-e3-d0-4c-ca-45\WpadDecisionTime = 10c6953b64a9da01 defineavatar.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\3e-e3-d0-4c-ca-45\WpadDecision = "0" defineavatar.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
56b2a7238056159a10fd14f0ac42434a_JaffaCakes118.exe56b2a7238056159a10fd14f0ac42434a_JaffaCakes118.exedefineavatar.exedefineavatar.exepid process 2772 56b2a7238056159a10fd14f0ac42434a_JaffaCakes118.exe 2968 56b2a7238056159a10fd14f0ac42434a_JaffaCakes118.exe 2920 defineavatar.exe 2664 defineavatar.exe 2664 defineavatar.exe 2664 defineavatar.exe 2664 defineavatar.exe 2664 defineavatar.exe 2664 defineavatar.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
56b2a7238056159a10fd14f0ac42434a_JaffaCakes118.exepid process 2968 56b2a7238056159a10fd14f0ac42434a_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
56b2a7238056159a10fd14f0ac42434a_JaffaCakes118.exedefineavatar.exedescription pid process target process PID 2772 wrote to memory of 2968 2772 56b2a7238056159a10fd14f0ac42434a_JaffaCakes118.exe 56b2a7238056159a10fd14f0ac42434a_JaffaCakes118.exe PID 2772 wrote to memory of 2968 2772 56b2a7238056159a10fd14f0ac42434a_JaffaCakes118.exe 56b2a7238056159a10fd14f0ac42434a_JaffaCakes118.exe PID 2772 wrote to memory of 2968 2772 56b2a7238056159a10fd14f0ac42434a_JaffaCakes118.exe 56b2a7238056159a10fd14f0ac42434a_JaffaCakes118.exe PID 2772 wrote to memory of 2968 2772 56b2a7238056159a10fd14f0ac42434a_JaffaCakes118.exe 56b2a7238056159a10fd14f0ac42434a_JaffaCakes118.exe PID 2920 wrote to memory of 2664 2920 defineavatar.exe defineavatar.exe PID 2920 wrote to memory of 2664 2920 defineavatar.exe defineavatar.exe PID 2920 wrote to memory of 2664 2920 defineavatar.exe defineavatar.exe PID 2920 wrote to memory of 2664 2920 defineavatar.exe defineavatar.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\56b2a7238056159a10fd14f0ac42434a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\56b2a7238056159a10fd14f0ac42434a_JaffaCakes118.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\56b2a7238056159a10fd14f0ac42434a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\56b2a7238056159a10fd14f0ac42434a_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:2968
-
C:\Windows\SysWOW64\defineavatar.exe"C:\Windows\SysWOW64\defineavatar.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\SysWOW64\defineavatar.exe"C:\Windows\SysWOW64\defineavatar.exe"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:2664