Analysis
-
max time kernel
143s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/07/2024, 05:11
Static task
static1
Behavioral task
behavioral1
Sample
5a9802a334cfe538cb555e3104eae0f5_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5a9802a334cfe538cb555e3104eae0f5_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5a9802a334cfe538cb555e3104eae0f5_JaffaCakes118.exe
-
Size
691KB
-
MD5
5a9802a334cfe538cb555e3104eae0f5
-
SHA1
4331a0545dbe44d18a002f117743e5e824a36a86
-
SHA256
10c13991c1a80e12eb133fe71677a60afb37a9ac0583455fb16997b77ddd459e
-
SHA512
a6b251cb9383e700d62fdad2b60b932c0a16d5157bb85afb42159988c1492009e38902739698f638e53b7b63ce17bdd10e56adc5fbfd5c649e91420437f14152
-
SSDEEP
12288:6T+2Sn7kkdfjNX4AH6NiCyTB01eu5dF3Z4mxxcWz8eH7ZUveuOLOIq:6TJUH6NiCyTBc9dQmX7zvaWuOL5q
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2752 4.exe 2804 Hacker.com.cn.exe -
Loads dropped DLL 2 IoCs
pid Process 1680 5a9802a334cfe538cb555e3104eae0f5_JaffaCakes118.exe 1680 5a9802a334cfe538cb555e3104eae0f5_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5a9802a334cfe538cb555e3104eae0f5_JaffaCakes118.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat Hacker.com.cn.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Hacker.com.cn.exe 4.exe File opened for modification C:\Windows\Hacker.com.cn.exe 4.exe -
Modifies data under HKEY_USERS 28 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D496DE85-8C5F-4B8D-8DCB-5F9AE7EB0DC3}\WpadDecision = "0" Hacker.com.cn.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" Hacker.com.cn.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000004000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0190000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Hacker.com.cn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings Hacker.com.cn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ Hacker.com.cn.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D496DE85-8C5F-4B8D-8DCB-5F9AE7EB0DC3} Hacker.com.cn.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\b2-a3-e3-73-7c-8b Hacker.com.cn.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\b2-a3-e3-73-7c-8b\WpadDecisionTime = 00052a2b9ad9da01 Hacker.com.cn.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" Hacker.com.cn.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D496DE85-8C5F-4B8D-8DCB-5F9AE7EB0DC3}\WpadDecisionTime = e0ba8b609ad9da01 Hacker.com.cn.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Hacker.com.cn.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Hacker.com.cn.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\b2-a3-e3-73-7c-8b\WpadDecision = "0" Hacker.com.cn.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" Hacker.com.cn.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" Hacker.com.cn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections Hacker.com.cn.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" Hacker.com.cn.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\b2-a3-e3-73-7c-8b\WpadDecisionReason = "1" Hacker.com.cn.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings Hacker.com.cn.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0190000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Hacker.com.cn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad Hacker.com.cn.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D496DE85-8C5F-4B8D-8DCB-5F9AE7EB0DC3}\WpadDecisionReason = "1" Hacker.com.cn.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D496DE85-8C5F-4B8D-8DCB-5F9AE7EB0DC3}\WpadNetworkName = "Network 3" Hacker.com.cn.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D496DE85-8C5F-4B8D-8DCB-5F9AE7EB0DC3}\b2-a3-e3-73-7c-8b Hacker.com.cn.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\b2-a3-e3-73-7c-8b\WpadDetectedUrl Hacker.com.cn.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\b2-a3-e3-73-7c-8b\WpadDecisionTime = e0ba8b609ad9da01 Hacker.com.cn.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D496DE85-8C5F-4B8D-8DCB-5F9AE7EB0DC3}\WpadDecisionTime = 00052a2b9ad9da01 Hacker.com.cn.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix Hacker.com.cn.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2752 4.exe Token: SeDebugPrivilege 2804 Hacker.com.cn.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2804 Hacker.com.cn.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1680 wrote to memory of 2752 1680 5a9802a334cfe538cb555e3104eae0f5_JaffaCakes118.exe 30 PID 1680 wrote to memory of 2752 1680 5a9802a334cfe538cb555e3104eae0f5_JaffaCakes118.exe 30 PID 1680 wrote to memory of 2752 1680 5a9802a334cfe538cb555e3104eae0f5_JaffaCakes118.exe 30 PID 1680 wrote to memory of 2752 1680 5a9802a334cfe538cb555e3104eae0f5_JaffaCakes118.exe 30 PID 2804 wrote to memory of 2668 2804 Hacker.com.cn.exe 32 PID 2804 wrote to memory of 2668 2804 Hacker.com.cn.exe 32 PID 2804 wrote to memory of 2668 2804 Hacker.com.cn.exe 32 PID 2804 wrote to memory of 2668 2804 Hacker.com.cn.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a9802a334cfe538cb555e3104eae0f5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5a9802a334cfe538cb555e3104eae0f5_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2752
-
-
C:\Windows\Hacker.com.cn.exeC:\Windows\Hacker.com.cn.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:2668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
788KB
MD5c4948695d13933c2bf43d2951672587d
SHA15d5f6e35de4b9af76c777fd4104c176b3f9c45be
SHA2569f82f34b2f0614639d420024a87dadb52ed58965400b8c69ce25f5e9ce9c4383
SHA51233ace781bb5b63995cebc820bf589e9539bb66308d816a9fc8d71fefdfa25807e9cdcf0cc90eca12de7499cdf6451b1c812b7a52b6c8763bcd5b2d1804bdbffa