Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
19-05-2024 07:37
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
59467386a0f8c5af5e2a2c5bab3304ff_JaffaCakes118.exe
Resource
win7-20240215-en
windows7-x64
7 signatures
150 seconds
General
-
Target
59467386a0f8c5af5e2a2c5bab3304ff_JaffaCakes118.exe
-
Size
136KB
-
MD5
59467386a0f8c5af5e2a2c5bab3304ff
-
SHA1
5b516636d640abcecc5d86181ac0edde51078dd1
-
SHA256
c906761eada01b61c5c20a38410d34f767369102366a51b3ee083c09ab0ae838
-
SHA512
1efeb0e873f32e509652615508319ec6995e2ff74482eee3a66d7ea2d87761bbe8729081188d35939319e5549f7fa20fa0c9518d911a1f485d9c229c2aa719f6
-
SSDEEP
1536:RIjBHP4tqJSkydHmJnEYLi2E9QIoJBfcteUwOZXr5sxpXcsYyUZoXR+v9Mcl9:a830JnDqQdbK5BZryjcsYk01l9
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
Processes:
cyanselect.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat cyanselect.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 22 IoCs
Processes:
cyanselect.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{4D1C4E72-B442-446D-98AF-3EB1DF51A2A1} cyanselect.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{4D1C4E72-B442-446D-98AF-3EB1DF51A2A1}\WpadDecisionReason = "1" cyanselect.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{4D1C4E72-B442-446D-98AF-3EB1DF51A2A1}\WpadDecisionTime = 005e8676bfa9da01 cyanselect.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{4D1C4E72-B442-446D-98AF-3EB1DF51A2A1}\WpadNetworkName = "Network 3" cyanselect.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\02-07-0f-7e-9f-26 cyanselect.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\02-07-0f-7e-9f-26\WpadDetectedUrl cyanselect.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 cyanselect.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 cyanselect.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\02-07-0f-7e-9f-26\WpadDecisionTime = 005e8676bfa9da01 cyanselect.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\02-07-0f-7e-9f-26\WpadDecision = "0" cyanselect.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings cyanselect.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\02-07-0f-7e-9f-26\WpadDecisionReason = "1" cyanselect.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{4D1C4E72-B442-446D-98AF-3EB1DF51A2A1}\WpadDecisionTime = 40147fc3bfa9da01 cyanselect.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\02-07-0f-7e-9f-26\WpadDecisionTime = 40147fc3bfa9da01 cyanselect.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0059000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 cyanselect.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{4D1C4E72-B442-446D-98AF-3EB1DF51A2A1}\02-07-0f-7e-9f-26 cyanselect.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" cyanselect.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad cyanselect.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{4D1C4E72-B442-446D-98AF-3EB1DF51A2A1}\WpadDecision = "0" cyanselect.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000004000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0059000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 cyanselect.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections cyanselect.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings cyanselect.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
59467386a0f8c5af5e2a2c5bab3304ff_JaffaCakes118.exe59467386a0f8c5af5e2a2c5bab3304ff_JaffaCakes118.execyanselect.execyanselect.exepid process 2088 59467386a0f8c5af5e2a2c5bab3304ff_JaffaCakes118.exe 3004 59467386a0f8c5af5e2a2c5bab3304ff_JaffaCakes118.exe 2692 cyanselect.exe 2556 cyanselect.exe 2556 cyanselect.exe 2556 cyanselect.exe 2556 cyanselect.exe 2556 cyanselect.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
59467386a0f8c5af5e2a2c5bab3304ff_JaffaCakes118.exepid process 3004 59467386a0f8c5af5e2a2c5bab3304ff_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
59467386a0f8c5af5e2a2c5bab3304ff_JaffaCakes118.execyanselect.exedescription pid process target process PID 2088 wrote to memory of 3004 2088 59467386a0f8c5af5e2a2c5bab3304ff_JaffaCakes118.exe 59467386a0f8c5af5e2a2c5bab3304ff_JaffaCakes118.exe PID 2088 wrote to memory of 3004 2088 59467386a0f8c5af5e2a2c5bab3304ff_JaffaCakes118.exe 59467386a0f8c5af5e2a2c5bab3304ff_JaffaCakes118.exe PID 2088 wrote to memory of 3004 2088 59467386a0f8c5af5e2a2c5bab3304ff_JaffaCakes118.exe 59467386a0f8c5af5e2a2c5bab3304ff_JaffaCakes118.exe PID 2088 wrote to memory of 3004 2088 59467386a0f8c5af5e2a2c5bab3304ff_JaffaCakes118.exe 59467386a0f8c5af5e2a2c5bab3304ff_JaffaCakes118.exe PID 2692 wrote to memory of 2556 2692 cyanselect.exe cyanselect.exe PID 2692 wrote to memory of 2556 2692 cyanselect.exe cyanselect.exe PID 2692 wrote to memory of 2556 2692 cyanselect.exe cyanselect.exe PID 2692 wrote to memory of 2556 2692 cyanselect.exe cyanselect.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\59467386a0f8c5af5e2a2c5bab3304ff_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\59467386a0f8c5af5e2a2c5bab3304ff_JaffaCakes118.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\59467386a0f8c5af5e2a2c5bab3304ff_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\59467386a0f8c5af5e2a2c5bab3304ff_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:3004
-
C:\Windows\SysWOW64\cyanselect.exe"C:\Windows\SysWOW64\cyanselect.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\cyanselect.exe"C:\Windows\SysWOW64\cyanselect.exe"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:2556