Analysis
-
max time kernel
131s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04-06-2024 06:32
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
93e0b7c2503a696023ea625edc7ea579_JaffaCakes118.exe
Resource
win7-20240221-en
windows7-x64
7 signatures
150 seconds
General
-
Target
93e0b7c2503a696023ea625edc7ea579_JaffaCakes118.exe
-
Size
180KB
-
MD5
93e0b7c2503a696023ea625edc7ea579
-
SHA1
3eaa9d87467f74d4217994ac9154bcd3add91b4d
-
SHA256
7a2ff8a264c5abdfda9f649bec1fef838000f728a922ca9e938fe6c9c240ff27
-
SHA512
23e8915f20ceefed4601ca63b9cdeba1d9025c286e603a826f6af471fbe49f7272e2622a9ea70934c0ee2dfc99713f9d8abb03ae174918a4be056baf478ae32a
-
SSDEEP
1536:x/Yodh1lwPLag6kMgXI4y2+XTB28cq4THu6vNxeVtgvjQQfh+Oo1auDN1AZ/X27t:xQIX4AV6vGVq84hnoJK/ay6BvueT
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat appxcabinet.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 18 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings appxcabinet.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 appxcabinet.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad appxcabinet.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{974DB7FB-DEA0-4725-ABFC-DE14367C97F5}\WpadDecisionTime = 6079390c49b6da01 appxcabinet.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\86-17-ac-eb-a0-1b appxcabinet.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{974DB7FB-DEA0-4725-ABFC-DE14367C97F5}\86-17-ac-eb-a0-1b appxcabinet.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\86-17-ac-eb-a0-1b\WpadDecision = "0" appxcabinet.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings appxcabinet.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\86-17-ac-eb-a0-1b\WpadDecisionTime = 6079390c49b6da01 appxcabinet.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections appxcabinet.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 appxcabinet.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{974DB7FB-DEA0-4725-ABFC-DE14367C97F5}\WpadNetworkName = "Network 3" appxcabinet.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" appxcabinet.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00f1000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 appxcabinet.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{974DB7FB-DEA0-4725-ABFC-DE14367C97F5} appxcabinet.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{974DB7FB-DEA0-4725-ABFC-DE14367C97F5}\WpadDecisionReason = "1" appxcabinet.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{974DB7FB-DEA0-4725-ABFC-DE14367C97F5}\WpadDecision = "0" appxcabinet.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\86-17-ac-eb-a0-1b\WpadDecisionReason = "1" appxcabinet.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2248 93e0b7c2503a696023ea625edc7ea579_JaffaCakes118.exe 2012 93e0b7c2503a696023ea625edc7ea579_JaffaCakes118.exe 2188 appxcabinet.exe 2700 appxcabinet.exe 2700 appxcabinet.exe 2700 appxcabinet.exe 2700 appxcabinet.exe 2700 appxcabinet.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2012 93e0b7c2503a696023ea625edc7ea579_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2248 wrote to memory of 2012 2248 93e0b7c2503a696023ea625edc7ea579_JaffaCakes118.exe 28 PID 2248 wrote to memory of 2012 2248 93e0b7c2503a696023ea625edc7ea579_JaffaCakes118.exe 28 PID 2248 wrote to memory of 2012 2248 93e0b7c2503a696023ea625edc7ea579_JaffaCakes118.exe 28 PID 2248 wrote to memory of 2012 2248 93e0b7c2503a696023ea625edc7ea579_JaffaCakes118.exe 28 PID 2188 wrote to memory of 2700 2188 appxcabinet.exe 30 PID 2188 wrote to memory of 2700 2188 appxcabinet.exe 30 PID 2188 wrote to memory of 2700 2188 appxcabinet.exe 30 PID 2188 wrote to memory of 2700 2188 appxcabinet.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\93e0b7c2503a696023ea625edc7ea579_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\93e0b7c2503a696023ea625edc7ea579_JaffaCakes118.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\93e0b7c2503a696023ea625edc7ea579_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\93e0b7c2503a696023ea625edc7ea579_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:2012
-
-
C:\Windows\SysWOW64\appxcabinet.exe"C:\Windows\SysWOW64\appxcabinet.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\appxcabinet.exe"C:\Windows\SysWOW64\appxcabinet.exe"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:2700
-