Analysis
-
max time kernel
142s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
10-07-2024 16:07
Static task
static1
Behavioral task
behavioral1
Sample
3570e429401a91e49c9f78a63b0dfd30_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3570e429401a91e49c9f78a63b0dfd30_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3570e429401a91e49c9f78a63b0dfd30_JaffaCakes118.exe
-
Size
74KB
-
MD5
3570e429401a91e49c9f78a63b0dfd30
-
SHA1
ce704faac303206fcf847fc0eac825871f3f3eac
-
SHA256
da7888d98bd5231810b3c30b957bb442a46a91649df5d6b77b5d09958d83d4f5
-
SHA512
e35e3558c7434533e6d37872de997c190219b4b89520cc542b64f48474a8de99b7d18774fc3e408852283952d339938bb7edec43be40295a2216d56851d3675e
-
SSDEEP
1536:T6CHQGWSGy/p7MocYIlqNxzWX0ITXi/m6eR5D2KdXhsL/H:hHQGWJCMdTlqNxo0mX4m6KDzDszH
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2412 mspprztn.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: mspprztn.exe File opened (read-only) \??\M: mspprztn.exe File opened (read-only) \??\N: mspprztn.exe File opened (read-only) \??\U: mspprztn.exe File opened (read-only) \??\W: mspprztn.exe File opened (read-only) \??\H: mspprztn.exe File opened (read-only) \??\Q: mspprztn.exe File opened (read-only) \??\T: mspprztn.exe File opened (read-only) \??\V: mspprztn.exe File opened (read-only) \??\Z: mspprztn.exe File opened (read-only) \??\E: mspprztn.exe File opened (read-only) \??\K: mspprztn.exe File opened (read-only) \??\P: mspprztn.exe File opened (read-only) \??\R: mspprztn.exe File opened (read-only) \??\X: mspprztn.exe File opened (read-only) \??\Y: mspprztn.exe File opened (read-only) \??\B: mspprztn.exe File opened (read-only) \??\G: mspprztn.exe File opened (read-only) \??\J: mspprztn.exe File opened (read-only) \??\L: mspprztn.exe File opened (read-only) \??\O: mspprztn.exe File opened (read-only) \??\S: mspprztn.exe File opened (read-only) \??\A: mspprztn.exe -
Modifies WinLogon 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList mspprztn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts mspprztn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList\SUPPORT_8712 = "0" mspprztn.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\mspprztn.exe 3570e429401a91e49c9f78a63b0dfd30_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\mspprztn.exe 3570e429401a91e49c9f78a63b0dfd30_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mspprztn.exe -
Hide Artifacts: Hidden Users 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList\SUPPORT_8712 = "0" mspprztn.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier 3570e429401a91e49c9f78a63b0dfd30_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier mspprztn.exe -
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mspprztn.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mspprztn.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mspprztn.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mspprztn.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f008e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mspprztn.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{5316665A-BC2F-4A8F-BE7E-3A52E913654E}\WpadDecision = "0" mspprztn.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ce-4c-1b-7a-f0-e2 mspprztn.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{5316665A-BC2F-4A8F-BE7E-3A52E913654E}\WpadDecisionTime = 80ec7756e3d2da01 mspprztn.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{5316665A-BC2F-4A8F-BE7E-3A52E913654E}\WpadNetworkName = "Network 3" mspprztn.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{5316665A-BC2F-4A8F-BE7E-3A52E913654E}\ce-4c-1b-7a-f0-e2 mspprztn.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ce-4c-1b-7a-f0-e2\WpadDecisionReason = "1" mspprztn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mspprztn.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mspprztn.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mspprztn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mspprztn.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mspprztn.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{5316665A-BC2F-4A8F-BE7E-3A52E913654E}\WpadDecisionReason = "1" mspprztn.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ce-4c-1b-7a-f0-e2\WpadDecisionTime = 80ec7756e3d2da01 mspprztn.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ce-4c-1b-7a-f0-e2\WpadDecision = "0" mspprztn.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mspprztn.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mspprztn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mspprztn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mspprztn.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{5316665A-BC2F-4A8F-BE7E-3A52E913654E} mspprztn.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3570e429401a91e49c9f78a63b0dfd30_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3570e429401a91e49c9f78a63b0dfd30_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Enumerates system info in registry
PID:1888
-
C:\Windows\SysWOW64\mspprztn.exeC:\Windows\SysWOW64\mspprztn.exe /service1⤵
- Executes dropped EXE
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Hide Artifacts: Hidden Users
- Enumerates system info in registry
- Modifies data under HKEY_USERS
PID:2412
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74KB
MD53570e429401a91e49c9f78a63b0dfd30
SHA1ce704faac303206fcf847fc0eac825871f3f3eac
SHA256da7888d98bd5231810b3c30b957bb442a46a91649df5d6b77b5d09958d83d4f5
SHA512e35e3558c7434533e6d37872de997c190219b4b89520cc542b64f48474a8de99b7d18774fc3e408852283952d339938bb7edec43be40295a2216d56851d3675e