Analysis
-
max time kernel
141s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 02:49
Static task
static1
Behavioral task
behavioral1
Sample
7250e33ed2a84b56846221dd42fb714e_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
7250e33ed2a84b56846221dd42fb714e_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
7250e33ed2a84b56846221dd42fb714e_JaffaCakes118.exe
-
Size
297KB
-
MD5
7250e33ed2a84b56846221dd42fb714e
-
SHA1
2d114ca1e946edf060af190bf29a213e22b50e9a
-
SHA256
008b7a5a2879e583bcb52a34fc70a4a9fe4fc7abc205883860e458cba7cb3275
-
SHA512
059b57224b31e1a4cea99f946c598c3e7e117ac77a90efcbe6999b3255f05ff35a2d687de9570429981007fff5c39a290517c90f057b0ba5ec1601fb2887a68c
-
SSDEEP
6144:FurqlRlRKXCVhz1CZMYOeAFyhFmd7wYITnpF1qlY:uqRlsXUxC6PeAKmd7HITVAY
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2784 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2832 win321.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat win321.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\win321.exe 7250e33ed2a84b56846221dd42fb714e_JaffaCakes118.exe File opened for modification C:\Windows\win321.exe 7250e33ed2a84b56846221dd42fb714e_JaffaCakes118.exe File created C:\Windows\uninstal.bat 7250e33ed2a84b56846221dd42fb714e_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7250e33ed2a84b56846221dd42fb714e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language win321.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies data under HKEY_USERS 28 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" win321.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ win321.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\de-ed-43-ae-e0-c6\WpadDecision = "0" win321.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00a7000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 win321.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" win321.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\de-ed-43-ae-e0-c6\WpadDecisionTime = 905c46920bdfda01 win321.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections win321.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{1A026D9E-800E-41D8-83A6-DC7DD4EE05DC} win321.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{1A026D9E-800E-41D8-83A6-DC7DD4EE05DC}\WpadNetworkName = "Network 2" win321.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" win321.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{1A026D9E-800E-41D8-83A6-DC7DD4EE05DC}\WpadDecisionTime = 905c46920bdfda01 win321.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 win321.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" win321.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 win321.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad win321.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings win321.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{1A026D9E-800E-41D8-83A6-DC7DD4EE05DC}\WpadDecisionReason = "1" win321.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" win321.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000004000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00a7000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 win321.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix win321.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\de-ed-43-ae-e0-c6\WpadDecisionReason = "1" win321.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\de-ed-43-ae-e0-c6\WpadDetectedUrl win321.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\de-ed-43-ae-e0-c6\WpadDecisionTime = d006ca600bdfda01 win321.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings win321.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{1A026D9E-800E-41D8-83A6-DC7DD4EE05DC}\WpadDecisionTime = d006ca600bdfda01 win321.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{1A026D9E-800E-41D8-83A6-DC7DD4EE05DC}\WpadDecision = "0" win321.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\de-ed-43-ae-e0-c6 win321.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{1A026D9E-800E-41D8-83A6-DC7DD4EE05DC}\de-ed-43-ae-e0-c6 win321.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2480 7250e33ed2a84b56846221dd42fb714e_JaffaCakes118.exe Token: SeDebugPrivilege 2832 win321.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2832 win321.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2832 wrote to memory of 2124 2832 win321.exe 31 PID 2832 wrote to memory of 2124 2832 win321.exe 31 PID 2832 wrote to memory of 2124 2832 win321.exe 31 PID 2832 wrote to memory of 2124 2832 win321.exe 31 PID 2480 wrote to memory of 2784 2480 7250e33ed2a84b56846221dd42fb714e_JaffaCakes118.exe 32 PID 2480 wrote to memory of 2784 2480 7250e33ed2a84b56846221dd42fb714e_JaffaCakes118.exe 32 PID 2480 wrote to memory of 2784 2480 7250e33ed2a84b56846221dd42fb714e_JaffaCakes118.exe 32 PID 2480 wrote to memory of 2784 2480 7250e33ed2a84b56846221dd42fb714e_JaffaCakes118.exe 32 PID 2480 wrote to memory of 2784 2480 7250e33ed2a84b56846221dd42fb714e_JaffaCakes118.exe 32 PID 2480 wrote to memory of 2784 2480 7250e33ed2a84b56846221dd42fb714e_JaffaCakes118.exe 32 PID 2480 wrote to memory of 2784 2480 7250e33ed2a84b56846221dd42fb714e_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\7250e33ed2a84b56846221dd42fb714e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7250e33ed2a84b56846221dd42fb714e_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\uninstal.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2784
-
-
C:\Windows\win321.exeC:\Windows\win321.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:2124
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
218B
MD5fe1050bdf092a79a133ad2edc7f7dbd8
SHA179cdcc89d69319cfe3ad58b3fdc6b71f143ca814
SHA256e57b85307a087c58187909a0c78b2037586d0c77b5a6181639d470d795e013f6
SHA512a281ef59f8c797f1961ba8476f336d7673216bcbd87e6b5a16b81037222687b6e77e3b0ce3487ddab7677de97ade662dc87bc444b50a3a2fa9e11175e905bad0
-
Filesize
297KB
MD57250e33ed2a84b56846221dd42fb714e
SHA12d114ca1e946edf060af190bf29a213e22b50e9a
SHA256008b7a5a2879e583bcb52a34fc70a4a9fe4fc7abc205883860e458cba7cb3275
SHA512059b57224b31e1a4cea99f946c598c3e7e117ac77a90efcbe6999b3255f05ff35a2d687de9570429981007fff5c39a290517c90f057b0ba5ec1601fb2887a68c