Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
15-06-2024 09:39
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
adce284377cd66d0b73e10e7d01c20c1_JaffaCakes118.exe
Resource
win7-20240508-en
windows7-x64
7 signatures
150 seconds
General
-
Target
adce284377cd66d0b73e10e7d01c20c1_JaffaCakes118.exe
-
Size
148KB
-
MD5
adce284377cd66d0b73e10e7d01c20c1
-
SHA1
83f73b3e5add87fda0ea1b1962ab282122118687
-
SHA256
0d4177b3616d93464ba2f0a20849e9e79e5e190789ea17a74b9c6d787a92561c
-
SHA512
375af3e19e4a54f27343781207347248afff18bbfd52fe93e3f2666e88e5aca931f8e64d71d7e91136e32bd4769046b62379b4cebaee8598a2e3d14dca196d0f
-
SSDEEP
3072:2JRiGimmC0HZKYH1BuSqSlWkKoWCe7o021uw:2JREAqZdH1BuSqCWkKRC89
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
Processes:
mfidladam.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mfidladam.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 19 IoCs
Processes:
mfidladam.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mfidladam.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mfidladam.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mfidladam.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0025000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mfidladam.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{4F7821FD-AC83-4AB3-B942-EBFDAC83AC41}\0e-f3-aa-75-1f-a0 mfidladam.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0e-f3-aa-75-1f-a0\WpadDecision = "0" mfidladam.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mfidladam.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{4F7821FD-AC83-4AB3-B942-EBFDAC83AC41}\WpadDecisionReason = "1" mfidladam.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0e-f3-aa-75-1f-a0 mfidladam.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mfidladam.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{4F7821FD-AC83-4AB3-B942-EBFDAC83AC41} mfidladam.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{4F7821FD-AC83-4AB3-B942-EBFDAC83AC41}\WpadDecisionTime = f08cd4f107bfda01 mfidladam.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0e-f3-aa-75-1f-a0\WpadDecisionReason = "1" mfidladam.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mfidladam.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mfidladam.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{4F7821FD-AC83-4AB3-B942-EBFDAC83AC41}\WpadDecision = "0" mfidladam.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{4F7821FD-AC83-4AB3-B942-EBFDAC83AC41}\WpadNetworkName = "Network 3" mfidladam.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0e-f3-aa-75-1f-a0\WpadDecisionTime = f08cd4f107bfda01 mfidladam.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0e-f3-aa-75-1f-a0\WpadDetectedUrl mfidladam.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
adce284377cd66d0b73e10e7d01c20c1_JaffaCakes118.exeadce284377cd66d0b73e10e7d01c20c1_JaffaCakes118.exemfidladam.exemfidladam.exepid process 2400 adce284377cd66d0b73e10e7d01c20c1_JaffaCakes118.exe 2736 adce284377cd66d0b73e10e7d01c20c1_JaffaCakes118.exe 2572 mfidladam.exe 2672 mfidladam.exe 2672 mfidladam.exe 2672 mfidladam.exe 2672 mfidladam.exe 2672 mfidladam.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
adce284377cd66d0b73e10e7d01c20c1_JaffaCakes118.exepid process 2736 adce284377cd66d0b73e10e7d01c20c1_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
adce284377cd66d0b73e10e7d01c20c1_JaffaCakes118.exemfidladam.exedescription pid process target process PID 2400 wrote to memory of 2736 2400 adce284377cd66d0b73e10e7d01c20c1_JaffaCakes118.exe adce284377cd66d0b73e10e7d01c20c1_JaffaCakes118.exe PID 2400 wrote to memory of 2736 2400 adce284377cd66d0b73e10e7d01c20c1_JaffaCakes118.exe adce284377cd66d0b73e10e7d01c20c1_JaffaCakes118.exe PID 2400 wrote to memory of 2736 2400 adce284377cd66d0b73e10e7d01c20c1_JaffaCakes118.exe adce284377cd66d0b73e10e7d01c20c1_JaffaCakes118.exe PID 2400 wrote to memory of 2736 2400 adce284377cd66d0b73e10e7d01c20c1_JaffaCakes118.exe adce284377cd66d0b73e10e7d01c20c1_JaffaCakes118.exe PID 2572 wrote to memory of 2672 2572 mfidladam.exe mfidladam.exe PID 2572 wrote to memory of 2672 2572 mfidladam.exe mfidladam.exe PID 2572 wrote to memory of 2672 2572 mfidladam.exe mfidladam.exe PID 2572 wrote to memory of 2672 2572 mfidladam.exe mfidladam.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\adce284377cd66d0b73e10e7d01c20c1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\adce284377cd66d0b73e10e7d01c20c1_JaffaCakes118.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\adce284377cd66d0b73e10e7d01c20c1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\adce284377cd66d0b73e10e7d01c20c1_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:2736
-
C:\Windows\SysWOW64\mfidladam.exe"C:\Windows\SysWOW64\mfidladam.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\mfidladam.exe"C:\Windows\SysWOW64\mfidladam.exe"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:2672