Analysis
-
max time kernel
141s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
27/06/2024, 23:11
Static task
static1
Behavioral task
behavioral1
Sample
17e3836682ffb0913459ece7c3f0786d_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
17e3836682ffb0913459ece7c3f0786d_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
17e3836682ffb0913459ece7c3f0786d_JaffaCakes118.exe
-
Size
633KB
-
MD5
17e3836682ffb0913459ece7c3f0786d
-
SHA1
bd67d4a7cecb335c35dcd68136dc6412d13a344b
-
SHA256
8fdc3181c3af927fdeeb75e58678913f4a00649e47b7a657a913a1b86c07bcf8
-
SHA512
ab0c3e5c341f4f35056b4ee2ef8368041a0948a680a3df51f03c4d37e223ee6e3ea5d81109e7473714b47aab5ef4240c2004ed836fc93b4a8058c9f3b2c8738e
-
SSDEEP
12288:O6ZMgk8+gdxsHL1CUSDF3Z4mxxWDqVTVOC7bs:b2qxsr8DQmX1VTz7bs
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2676 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2420 Internet Explorer.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat Internet Explorer.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Internet Explorer.exe 17e3836682ffb0913459ece7c3f0786d_JaffaCakes118.exe File opened for modification C:\Windows\Internet Explorer.exe 17e3836682ffb0913459ece7c3f0786d_JaffaCakes118.exe File created C:\Windows\uninstal.bat 17e3836682ffb0913459ece7c3f0786d_JaffaCakes118.exe -
Modifies data under HKEY_USERS 28 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" Internet Explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{57956499-CB62-440B-A7E0-7A8A5637D329}\WpadDecision = "0" Internet Explorer.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings Internet Explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{57956499-CB62-440B-A7E0-7A8A5637D329}\WpadDecisionTime = c0d888afe8c8da01 Internet Explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Internet Explorer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\22-02-74-56-ff-ee\WpadDetectedUrl Internet Explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" Internet Explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0182000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Internet Explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{57956499-CB62-440B-A7E0-7A8A5637D329} Internet Explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{57956499-CB62-440B-A7E0-7A8A5637D329}\WpadDecisionTime = 8008167ee8c8da01 Internet Explorer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix Internet Explorer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" Internet Explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings Internet Explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{57956499-CB62-440B-A7E0-7A8A5637D329}\22-02-74-56-ff-ee Internet Explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\22-02-74-56-ff-ee\WpadDecisionTime = 8008167ee8c8da01 Internet Explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\22-02-74-56-ff-ee\WpadDecision = "0" Internet Explorer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" Internet Explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections Internet Explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ Internet Explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad Internet Explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\22-02-74-56-ff-ee\WpadDecisionReason = "1" Internet Explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" Internet Explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\22-02-74-56-ff-ee\WpadDecisionTime = c0d888afe8c8da01 Internet Explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Internet Explorer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{57956499-CB62-440B-A7E0-7A8A5637D329}\WpadNetworkName = "Network 3" Internet Explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\22-02-74-56-ff-ee Internet Explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000004000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0182000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Internet Explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{57956499-CB62-440B-A7E0-7A8A5637D329}\WpadDecisionReason = "1" Internet Explorer.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2480 17e3836682ffb0913459ece7c3f0786d_JaffaCakes118.exe Token: SeDebugPrivilege 2420 Internet Explorer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2420 Internet Explorer.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2480 wrote to memory of 2676 2480 17e3836682ffb0913459ece7c3f0786d_JaffaCakes118.exe 30 PID 2480 wrote to memory of 2676 2480 17e3836682ffb0913459ece7c3f0786d_JaffaCakes118.exe 30 PID 2480 wrote to memory of 2676 2480 17e3836682ffb0913459ece7c3f0786d_JaffaCakes118.exe 30 PID 2480 wrote to memory of 2676 2480 17e3836682ffb0913459ece7c3f0786d_JaffaCakes118.exe 30 PID 2480 wrote to memory of 2676 2480 17e3836682ffb0913459ece7c3f0786d_JaffaCakes118.exe 30 PID 2480 wrote to memory of 2676 2480 17e3836682ffb0913459ece7c3f0786d_JaffaCakes118.exe 30 PID 2480 wrote to memory of 2676 2480 17e3836682ffb0913459ece7c3f0786d_JaffaCakes118.exe 30 PID 2420 wrote to memory of 2704 2420 Internet Explorer.exe 29 PID 2420 wrote to memory of 2704 2420 Internet Explorer.exe 29 PID 2420 wrote to memory of 2704 2420 Internet Explorer.exe 29 PID 2420 wrote to memory of 2704 2420 Internet Explorer.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\17e3836682ffb0913459ece7c3f0786d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\17e3836682ffb0913459ece7c3f0786d_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\uninstal.bat2⤵
- Deletes itself
PID:2676
-
-
C:\Windows\Internet Explorer.exe"C:\Windows\Internet Explorer.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:2704
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
633KB
MD517e3836682ffb0913459ece7c3f0786d
SHA1bd67d4a7cecb335c35dcd68136dc6412d13a344b
SHA2568fdc3181c3af927fdeeb75e58678913f4a00649e47b7a657a913a1b86c07bcf8
SHA512ab0c3e5c341f4f35056b4ee2ef8368041a0948a680a3df51f03c4d37e223ee6e3ea5d81109e7473714b47aab5ef4240c2004ed836fc93b4a8058c9f3b2c8738e
-
Filesize
218B
MD53b4163af271f2f3c7c7c7ea3b5834210
SHA18a58b0ca94524dc1610e2debb97ba9b164e18e36
SHA2565cda881c63bee4ac526e4fb2490dd07575ae983cd6a43f4976a83182d0841286
SHA512f4d0fbe33183f4b66997228f9ff73d17f7d1a0955c8834357317e99a18a47987e88fe2c7a8595cd2e790a28906cfbf93d4e68ec383f96410bd717c8b669abd93