Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19-05-2024 23:58
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
5c28338e70876ee5fbd5a58de4708015_JaffaCakes118.exe
Resource
win7-20240221-en
windows7-x64
7 signatures
150 seconds
General
-
Target
5c28338e70876ee5fbd5a58de4708015_JaffaCakes118.exe
-
Size
353KB
-
MD5
5c28338e70876ee5fbd5a58de4708015
-
SHA1
83d78468bfd2c0990c5290fdd61fc93cf76a9773
-
SHA256
e34e9e47076e85ed927db634fcc99216387cb2dd13a7f087ae4a733d2f7add43
-
SHA512
9d44d73ecd0a0662ff636601996137d07a59accdb9ddb672f0bfd7464dc78cae6f14d202b4b8bd239fe93adb725078498d5c42e1a2081e9b80889b4279a0d1d9
-
SSDEEP
3072:Oe2mnzu9plMHn7Sa/CrMX8CPWwchhWRlG2wrnFbWrLkVbF+Por3CDI30:Ik22gnFCrYVbFR3CD
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
Processes:
slideenroll.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat slideenroll.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 19 IoCs
Processes:
slideenroll.exedescription ioc process Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{19673D18-DAFA-4605-B56D-BC1802E9DA95}\WpadDecision = "0" slideenroll.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{19673D18-DAFA-4605-B56D-BC1802E9DA95}\WpadNetworkName = "Network 3" slideenroll.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\1e-df-f8-96-1a-a3\WpadDecision = "0" slideenroll.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings slideenroll.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" slideenroll.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 slideenroll.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{19673D18-DAFA-4605-B56D-BC1802E9DA95}\WpadDecisionTime = c024218548aada01 slideenroll.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 slideenroll.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\1e-df-f8-96-1a-a3 slideenroll.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{19673D18-DAFA-4605-B56D-BC1802E9DA95} slideenroll.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{19673D18-DAFA-4605-B56D-BC1802E9DA95}\WpadDecisionReason = "1" slideenroll.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\1e-df-f8-96-1a-a3\WpadDecisionReason = "1" slideenroll.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\1e-df-f8-96-1a-a3\WpadDetectedUrl slideenroll.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{19673D18-DAFA-4605-B56D-BC1802E9DA95}\1e-df-f8-96-1a-a3 slideenroll.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\1e-df-f8-96-1a-a3\WpadDecisionTime = c024218548aada01 slideenroll.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings slideenroll.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections slideenroll.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad slideenroll.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0078000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 slideenroll.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
5c28338e70876ee5fbd5a58de4708015_JaffaCakes118.exe5c28338e70876ee5fbd5a58de4708015_JaffaCakes118.exeslideenroll.exeslideenroll.exepid process 1688 5c28338e70876ee5fbd5a58de4708015_JaffaCakes118.exe 2428 5c28338e70876ee5fbd5a58de4708015_JaffaCakes118.exe 2480 slideenroll.exe 2612 slideenroll.exe 2612 slideenroll.exe 2612 slideenroll.exe 2612 slideenroll.exe 2612 slideenroll.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
5c28338e70876ee5fbd5a58de4708015_JaffaCakes118.exepid process 2428 5c28338e70876ee5fbd5a58de4708015_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
5c28338e70876ee5fbd5a58de4708015_JaffaCakes118.exeslideenroll.exedescription pid process target process PID 1688 wrote to memory of 2428 1688 5c28338e70876ee5fbd5a58de4708015_JaffaCakes118.exe 5c28338e70876ee5fbd5a58de4708015_JaffaCakes118.exe PID 1688 wrote to memory of 2428 1688 5c28338e70876ee5fbd5a58de4708015_JaffaCakes118.exe 5c28338e70876ee5fbd5a58de4708015_JaffaCakes118.exe PID 1688 wrote to memory of 2428 1688 5c28338e70876ee5fbd5a58de4708015_JaffaCakes118.exe 5c28338e70876ee5fbd5a58de4708015_JaffaCakes118.exe PID 1688 wrote to memory of 2428 1688 5c28338e70876ee5fbd5a58de4708015_JaffaCakes118.exe 5c28338e70876ee5fbd5a58de4708015_JaffaCakes118.exe PID 2480 wrote to memory of 2612 2480 slideenroll.exe slideenroll.exe PID 2480 wrote to memory of 2612 2480 slideenroll.exe slideenroll.exe PID 2480 wrote to memory of 2612 2480 slideenroll.exe slideenroll.exe PID 2480 wrote to memory of 2612 2480 slideenroll.exe slideenroll.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c28338e70876ee5fbd5a58de4708015_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5c28338e70876ee5fbd5a58de4708015_JaffaCakes118.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\5c28338e70876ee5fbd5a58de4708015_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5c28338e70876ee5fbd5a58de4708015_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:2428
-
C:\Windows\SysWOW64\slideenroll.exe"C:\Windows\SysWOW64\slideenroll.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\SysWOW64\slideenroll.exe"C:\Windows\SysWOW64\slideenroll.exe"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:2612