Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04-06-2024 23:37
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
96a462e5f978902dbbc9ef678c29d7a6_JaffaCakes118.exe
Resource
win7-20240221-en
windows7-x64
7 signatures
150 seconds
General
-
Target
96a462e5f978902dbbc9ef678c29d7a6_JaffaCakes118.exe
-
Size
204KB
-
MD5
96a462e5f978902dbbc9ef678c29d7a6
-
SHA1
f8e3a5addee354188311ebbd572afb062253623f
-
SHA256
5f89899fe13b50da5340cc44f5b7d576e3ff04ee3246cef7959ac46a1561619c
-
SHA512
4fb1a45b4a2bd49c824573f431b4bfde1831680eccec7a6eedd8d12cbf1f726a5b1443a744314d789b84b52b96dadbcb72a65bc6669d61357338efcf359113d8
-
SSDEEP
3072:1JB2nMWYJUAUMZjozQUFMK9M9lkS5jQeQ0NVxXFCRsPPJ8wxsdOqsJ3MBTyv//:sGWFMposUFMrYS3FXaIOOqsJMBmP
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat cabinetfooter.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 19 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{7665CDDC-8190-44D6-AAE2-E8BD16642D8C} cabinetfooter.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{7665CDDC-8190-44D6-AAE2-E8BD16642D8C}\WpadDecisionReason = "1" cabinetfooter.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{7665CDDC-8190-44D6-AAE2-E8BD16642D8C}\7e-cd-4d-6f-45-6b cabinetfooter.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0088000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 cabinetfooter.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\7e-cd-4d-6f-45-6b cabinetfooter.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings cabinetfooter.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 cabinetfooter.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 cabinetfooter.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{7665CDDC-8190-44D6-AAE2-E8BD16642D8C}\WpadDecisionTime = 70f9fc3cd8b6da01 cabinetfooter.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{7665CDDC-8190-44D6-AAE2-E8BD16642D8C}\WpadDecision = "0" cabinetfooter.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{7665CDDC-8190-44D6-AAE2-E8BD16642D8C}\WpadNetworkName = "Network 3" cabinetfooter.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\7e-cd-4d-6f-45-6b\WpadDecisionReason = "1" cabinetfooter.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\7e-cd-4d-6f-45-6b\WpadDecisionTime = 70f9fc3cd8b6da01 cabinetfooter.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections cabinetfooter.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" cabinetfooter.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad cabinetfooter.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\7e-cd-4d-6f-45-6b\WpadDecision = "0" cabinetfooter.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\7e-cd-4d-6f-45-6b\WpadDetectedUrl cabinetfooter.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings cabinetfooter.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3012 96a462e5f978902dbbc9ef678c29d7a6_JaffaCakes118.exe 2552 96a462e5f978902dbbc9ef678c29d7a6_JaffaCakes118.exe 2632 cabinetfooter.exe 2256 cabinetfooter.exe 2256 cabinetfooter.exe 2256 cabinetfooter.exe 2256 cabinetfooter.exe 2256 cabinetfooter.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2552 96a462e5f978902dbbc9ef678c29d7a6_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3012 wrote to memory of 2552 3012 96a462e5f978902dbbc9ef678c29d7a6_JaffaCakes118.exe 28 PID 3012 wrote to memory of 2552 3012 96a462e5f978902dbbc9ef678c29d7a6_JaffaCakes118.exe 28 PID 3012 wrote to memory of 2552 3012 96a462e5f978902dbbc9ef678c29d7a6_JaffaCakes118.exe 28 PID 3012 wrote to memory of 2552 3012 96a462e5f978902dbbc9ef678c29d7a6_JaffaCakes118.exe 28 PID 2632 wrote to memory of 2256 2632 cabinetfooter.exe 30 PID 2632 wrote to memory of 2256 2632 cabinetfooter.exe 30 PID 2632 wrote to memory of 2256 2632 cabinetfooter.exe 30 PID 2632 wrote to memory of 2256 2632 cabinetfooter.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\96a462e5f978902dbbc9ef678c29d7a6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\96a462e5f978902dbbc9ef678c29d7a6_JaffaCakes118.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\96a462e5f978902dbbc9ef678c29d7a6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\96a462e5f978902dbbc9ef678c29d7a6_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:2552
-
-
C:\Windows\SysWOW64\cabinetfooter.exe"C:\Windows\SysWOW64\cabinetfooter.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\SysWOW64\cabinetfooter.exe"C:\Windows\SysWOW64\cabinetfooter.exe"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:2256
-