Analysis
-
max time kernel
142s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 23:50
Static task
static1
Behavioral task
behavioral1
Sample
36e65384ecca1d1f0e4f88e0be3a400b_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
36e65384ecca1d1f0e4f88e0be3a400b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
36e65384ecca1d1f0e4f88e0be3a400b_JaffaCakes118.exe
-
Size
778KB
-
MD5
36e65384ecca1d1f0e4f88e0be3a400b
-
SHA1
b4ab8bc4a59edc872e03312c35e70ea793e59b91
-
SHA256
a0f0cbc0bd2377ee8a06f8774f537145f4e4fbe8d5bff8b136b064d2bd6b7b18
-
SHA512
bb2aac9f949f9a004cac7408136422bcd819886fd60207dede9facf65c04f50581f07ebf55dcde83224a39750a89431c4539e6371278ccbc1e584d27b17b35b5
-
SSDEEP
12288:1COSnclIgZQxVJ2p2AltRtphv7kO6KUqx2E9pAJDU44GLChfCZT:o8IJ28AltLpl7KypyU4pChaZT
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2316 1.exe 2796 heimao.exe -
Loads dropped DLL 2 IoCs
pid Process 2780 36e65384ecca1d1f0e4f88e0be3a400b_JaffaCakes118.exe 2780 36e65384ecca1d1f0e4f88e0be3a400b_JaffaCakes118.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat heimao.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\heimao.exe 1.exe File opened for modification C:\Windows\heimao.exe 1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 28 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{62A47EA4-AC94-4661-90BE-567F88E0E3CE}\6a-48-8c-cb-1d-e1 heimao.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ heimao.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\6a-48-8c-cb-1d-e1 heimao.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" heimao.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{62A47EA4-AC94-4661-90BE-567F88E0E3CE}\WpadNetworkName = "Network 3" heimao.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 heimao.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{62A47EA4-AC94-4661-90BE-567F88E0E3CE} heimao.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\6a-48-8c-cb-1d-e1\WpadDetectedUrl heimao.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{62A47EA4-AC94-4661-90BE-567F88E0E3CE}\WpadDecisionTime = 500ca4bc24d3da01 heimao.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings heimao.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 heimao.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{62A47EA4-AC94-4661-90BE-567F88E0E3CE}\WpadDecision = "0" heimao.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" heimao.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\6a-48-8c-cb-1d-e1\WpadDecisionTime = 70401c8724d3da01 heimao.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\6a-48-8c-cb-1d-e1\WpadDecision = "0" heimao.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" heimao.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections heimao.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00b5000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 heimao.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" heimao.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad heimao.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix heimao.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" heimao.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\6a-48-8c-cb-1d-e1\WpadDecisionTime = 500ca4bc24d3da01 heimao.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings heimao.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{62A47EA4-AC94-4661-90BE-567F88E0E3CE}\WpadDecisionTime = 70401c8724d3da01 heimao.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\6a-48-8c-cb-1d-e1\WpadDecisionReason = "1" heimao.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000004000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00b5000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 heimao.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{62A47EA4-AC94-4661-90BE-567F88E0E3CE}\WpadDecisionReason = "1" heimao.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2316 1.exe Token: SeDebugPrivilege 2796 heimao.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2796 heimao.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2780 wrote to memory of 2316 2780 36e65384ecca1d1f0e4f88e0be3a400b_JaffaCakes118.exe 30 PID 2780 wrote to memory of 2316 2780 36e65384ecca1d1f0e4f88e0be3a400b_JaffaCakes118.exe 30 PID 2780 wrote to memory of 2316 2780 36e65384ecca1d1f0e4f88e0be3a400b_JaffaCakes118.exe 30 PID 2780 wrote to memory of 2316 2780 36e65384ecca1d1f0e4f88e0be3a400b_JaffaCakes118.exe 30 PID 2796 wrote to memory of 2620 2796 heimao.exe 32 PID 2796 wrote to memory of 2620 2796 heimao.exe 32 PID 2796 wrote to memory of 2620 2796 heimao.exe 32 PID 2796 wrote to memory of 2620 2796 heimao.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\36e65384ecca1d1f0e4f88e0be3a400b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\36e65384ecca1d1f0e4f88e0be3a400b_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2316
-
-
C:\Windows\heimao.exeC:\Windows\heimao.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:2620
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
739KB
MD56c6799bd60d05224c2509a139350db72
SHA1e1dac8ef09200e755985444953726def85978512
SHA256b6330cfc0f65ea960a133f1a3eff8bb90bc38ce386f8473932804331743482f3
SHA512ad380167952c2e60b8ea96ad1516561bb614d09dc33e086522b1078f10cf265ce874a90ecd7354dc743e12554e8628944526dff56236b62085e77381043e5e79