Analysis
-
max time kernel
130s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19-05-2024 02:15
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
5810cb4fee212c13f3300a6ae54e791d_JaffaCakes118.exe
Resource
win7-20240221-en
windows7-x64
7 signatures
150 seconds
General
-
Target
5810cb4fee212c13f3300a6ae54e791d_JaffaCakes118.exe
-
Size
718KB
-
MD5
5810cb4fee212c13f3300a6ae54e791d
-
SHA1
e968629fece2594d3eb9a2304b9d133fc5070f9e
-
SHA256
b2994dd9a0134b56802b5783c4601f7b5133ce147e91f6f78eecccf376bfc0d9
-
SHA512
d380b2b7ce5dd177a8b4a238b3672cea87b464cb82512c59de6504f90f35c0752654878f0ed878c6556f7d86d15571e5c76392ef2e53a8f3fd2d04ab88ba08a4
-
SSDEEP
3072:B61MNCCQd/A6i+6zbzRNEtc+E1jA4yWIlqZg+LDRfjirr:3w5/5gzbzRfVyrZ+pir
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
Processes:
compilesendand.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat compilesendand.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 22 IoCs
Processes:
compilesendand.exedescription ioc process Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fa-e4-f0-2f-e0-05\WpadDecisionTime = 3067f78f92a9da01 compilesendand.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections compilesendand.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings compilesendand.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" compilesendand.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F9DBF1C2-A267-4BDF-BC41-36009C6F337A} compilesendand.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F9DBF1C2-A267-4BDF-BC41-36009C6F337A}\fa-e4-f0-2f-e0-05 compilesendand.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 compilesendand.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F9DBF1C2-A267-4BDF-BC41-36009C6F337A}\WpadDecisionReason = "1" compilesendand.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fa-e4-f0-2f-e0-05 compilesendand.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000004000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0118000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 compilesendand.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fa-e4-f0-2f-e0-05\WpadDecisionTime = b0365dcb92a9da01 compilesendand.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fa-e4-f0-2f-e0-05\WpadDecisionReason = "1" compilesendand.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 compilesendand.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0118000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 compilesendand.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F9DBF1C2-A267-4BDF-BC41-36009C6F337A}\WpadDecisionTime = 3067f78f92a9da01 compilesendand.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F9DBF1C2-A267-4BDF-BC41-36009C6F337A}\WpadDecision = "0" compilesendand.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F9DBF1C2-A267-4BDF-BC41-36009C6F337A}\WpadNetworkName = "Network 3" compilesendand.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings compilesendand.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad compilesendand.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fa-e4-f0-2f-e0-05\WpadDecision = "0" compilesendand.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fa-e4-f0-2f-e0-05\WpadDetectedUrl compilesendand.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F9DBF1C2-A267-4BDF-BC41-36009C6F337A}\WpadDecisionTime = b0365dcb92a9da01 compilesendand.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
5810cb4fee212c13f3300a6ae54e791d_JaffaCakes118.exe5810cb4fee212c13f3300a6ae54e791d_JaffaCakes118.execompilesendand.execompilesendand.exepid process 1752 5810cb4fee212c13f3300a6ae54e791d_JaffaCakes118.exe 2420 5810cb4fee212c13f3300a6ae54e791d_JaffaCakes118.exe 2608 compilesendand.exe 2748 compilesendand.exe 2748 compilesendand.exe 2748 compilesendand.exe 2748 compilesendand.exe 2748 compilesendand.exe 2748 compilesendand.exe 2748 compilesendand.exe 2748 compilesendand.exe 2748 compilesendand.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
5810cb4fee212c13f3300a6ae54e791d_JaffaCakes118.exepid process 2420 5810cb4fee212c13f3300a6ae54e791d_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
5810cb4fee212c13f3300a6ae54e791d_JaffaCakes118.execompilesendand.exedescription pid process target process PID 1752 wrote to memory of 2420 1752 5810cb4fee212c13f3300a6ae54e791d_JaffaCakes118.exe 5810cb4fee212c13f3300a6ae54e791d_JaffaCakes118.exe PID 1752 wrote to memory of 2420 1752 5810cb4fee212c13f3300a6ae54e791d_JaffaCakes118.exe 5810cb4fee212c13f3300a6ae54e791d_JaffaCakes118.exe PID 1752 wrote to memory of 2420 1752 5810cb4fee212c13f3300a6ae54e791d_JaffaCakes118.exe 5810cb4fee212c13f3300a6ae54e791d_JaffaCakes118.exe PID 1752 wrote to memory of 2420 1752 5810cb4fee212c13f3300a6ae54e791d_JaffaCakes118.exe 5810cb4fee212c13f3300a6ae54e791d_JaffaCakes118.exe PID 2608 wrote to memory of 2748 2608 compilesendand.exe compilesendand.exe PID 2608 wrote to memory of 2748 2608 compilesendand.exe compilesendand.exe PID 2608 wrote to memory of 2748 2608 compilesendand.exe compilesendand.exe PID 2608 wrote to memory of 2748 2608 compilesendand.exe compilesendand.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5810cb4fee212c13f3300a6ae54e791d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5810cb4fee212c13f3300a6ae54e791d_JaffaCakes118.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\5810cb4fee212c13f3300a6ae54e791d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5810cb4fee212c13f3300a6ae54e791d_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:2420
-
C:\Windows\SysWOW64\compilesendand.exe"C:\Windows\SysWOW64\compilesendand.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\compilesendand.exe"C:\Windows\SysWOW64\compilesendand.exe"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:2748