Analysis
-
max time kernel
132s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19-05-2024 21:15
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
5b82c3d60a56364fb46eaf9f8c5fde74_JaffaCakes118.exe
Resource
win7-20240221-en
windows7-x64
7 signatures
150 seconds
General
-
Target
5b82c3d60a56364fb46eaf9f8c5fde74_JaffaCakes118.exe
-
Size
144KB
-
MD5
5b82c3d60a56364fb46eaf9f8c5fde74
-
SHA1
dd5472f5e822d64a75d1785db0e410e225860059
-
SHA256
9f3a7efeb46f72dbdacb07e409a23cc78055eb7d5c0dacee9d303d1c49bc2540
-
SHA512
a783a88c799591cb98361bcc31c77b1479f9572d60115b0c53413ada538c2a58968179d0bb39f125398c3ef584d021111495273b2939060186725b672fb36a74
-
SSDEEP
3072:D1M+uKOgmkhz0GRSwnCu9yY4leAonHykKQi4YV4+k9M:++xQy/nCYwaSKi4y4D
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
Processes:
loaderdynamic.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat loaderdynamic.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 18 IoCs
Processes:
loaderdynamic.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings loaderdynamic.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad loaderdynamic.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\9a-f0-63-91-8c-ab\WpadDecision = "0" loaderdynamic.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 loaderdynamic.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" loaderdynamic.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{85191947-F687-4FDE-9FC1-10649B01A83A} loaderdynamic.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\9a-f0-63-91-8c-ab\WpadDecisionReason = "1" loaderdynamic.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections loaderdynamic.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{85191947-F687-4FDE-9FC1-10649B01A83A}\WpadDecision = "0" loaderdynamic.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\9a-f0-63-91-8c-ab loaderdynamic.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{85191947-F687-4FDE-9FC1-10649B01A83A}\9a-f0-63-91-8c-ab loaderdynamic.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings loaderdynamic.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 loaderdynamic.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f007d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 loaderdynamic.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{85191947-F687-4FDE-9FC1-10649B01A83A}\WpadDecisionReason = "1" loaderdynamic.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{85191947-F687-4FDE-9FC1-10649B01A83A}\WpadDecisionTime = c0c822b031aada01 loaderdynamic.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{85191947-F687-4FDE-9FC1-10649B01A83A}\WpadNetworkName = "Network 3" loaderdynamic.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\9a-f0-63-91-8c-ab\WpadDecisionTime = c0c822b031aada01 loaderdynamic.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
5b82c3d60a56364fb46eaf9f8c5fde74_JaffaCakes118.exe5b82c3d60a56364fb46eaf9f8c5fde74_JaffaCakes118.exeloaderdynamic.exeloaderdynamic.exepid process 2136 5b82c3d60a56364fb46eaf9f8c5fde74_JaffaCakes118.exe 3016 5b82c3d60a56364fb46eaf9f8c5fde74_JaffaCakes118.exe 1028 loaderdynamic.exe 1720 loaderdynamic.exe 1720 loaderdynamic.exe 1720 loaderdynamic.exe 1720 loaderdynamic.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
5b82c3d60a56364fb46eaf9f8c5fde74_JaffaCakes118.exepid process 3016 5b82c3d60a56364fb46eaf9f8c5fde74_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
5b82c3d60a56364fb46eaf9f8c5fde74_JaffaCakes118.exeloaderdynamic.exedescription pid process target process PID 2136 wrote to memory of 3016 2136 5b82c3d60a56364fb46eaf9f8c5fde74_JaffaCakes118.exe 5b82c3d60a56364fb46eaf9f8c5fde74_JaffaCakes118.exe PID 2136 wrote to memory of 3016 2136 5b82c3d60a56364fb46eaf9f8c5fde74_JaffaCakes118.exe 5b82c3d60a56364fb46eaf9f8c5fde74_JaffaCakes118.exe PID 2136 wrote to memory of 3016 2136 5b82c3d60a56364fb46eaf9f8c5fde74_JaffaCakes118.exe 5b82c3d60a56364fb46eaf9f8c5fde74_JaffaCakes118.exe PID 2136 wrote to memory of 3016 2136 5b82c3d60a56364fb46eaf9f8c5fde74_JaffaCakes118.exe 5b82c3d60a56364fb46eaf9f8c5fde74_JaffaCakes118.exe PID 1028 wrote to memory of 1720 1028 loaderdynamic.exe loaderdynamic.exe PID 1028 wrote to memory of 1720 1028 loaderdynamic.exe loaderdynamic.exe PID 1028 wrote to memory of 1720 1028 loaderdynamic.exe loaderdynamic.exe PID 1028 wrote to memory of 1720 1028 loaderdynamic.exe loaderdynamic.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b82c3d60a56364fb46eaf9f8c5fde74_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5b82c3d60a56364fb46eaf9f8c5fde74_JaffaCakes118.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\5b82c3d60a56364fb46eaf9f8c5fde74_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5b82c3d60a56364fb46eaf9f8c5fde74_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:3016
-
C:\Windows\SysWOW64\loaderdynamic.exe"C:\Windows\SysWOW64\loaderdynamic.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Windows\SysWOW64\loaderdynamic.exe"C:\Windows\SysWOW64\loaderdynamic.exe"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:1720