Analysis
-
max time kernel
143s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 12:19
Static task
static1
Behavioral task
behavioral1
Sample
74069a13d82ef37535b78882d1aff5ef_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
74069a13d82ef37535b78882d1aff5ef_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
74069a13d82ef37535b78882d1aff5ef_JaffaCakes118.exe
-
Size
298KB
-
MD5
74069a13d82ef37535b78882d1aff5ef
-
SHA1
b66b0e7bc09370e46be4e5938881e42d004ee409
-
SHA256
c78d754b63fe18e9fad70f8a203e9bbbe66912ff48ed0f8bb9cc96b249db9f60
-
SHA512
516a88ea4726a89c322e7a688389efeb84bb746b24f759e3b8346fc9d21f2a393fa4f5f4aeb9149a3c1d80ee8c750b93ff07b51a0204e67742020923493116a3
-
SSDEEP
6144:Nu71bw8IbvtdgZ+k0ELRnuj83Q+5iGH25fIXID8dFjElHVDvo6qoS:Nu7SvLYIkve8QCiGHc1D8dEA6qoS
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2836 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2212 time.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat time.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\time.exe 74069a13d82ef37535b78882d1aff5ef_JaffaCakes118.exe File opened for modification C:\Windows\time.exe 74069a13d82ef37535b78882d1aff5ef_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 74069a13d82ef37535b78882d1aff5ef_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language time.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies data under HKEY_USERS 14 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{920E6DB1-9907-4370-B3A0-BAFC03D81399} {0C6C4200-C589-11D0-999A-00C04FD655E1} 0xFFFF = 010000000000000070bda85856dfda01 time.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{16F3DD56-1AF5-4347-846D-7C10C4192619} {0C6C4200-C589-11D0-999A-00C04FD655E1} 0xFFFF = 010000000000000070bda85856dfda01 time.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached time.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{D9144DCD-E998-4ECA-AB6A-DCD83CCBA16D} {0C6C4200-C589-11D0-999A-00C04FD655E1} 0xFFFF = 01000000000000005099a15856dfda01 time.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" time.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 time.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{99FD978C-D287-4F50-827F-B2C658EDA8E7} {0C6C4200-C589-11D0-999A-00C04FD655E1} 0xFFFF = 0100000000000000105ca65856dfda01 time.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{AB5C5600-7E6E-4B06-9197-9ECEF74D31CC} {0C6C4200-C589-11D0-999A-00C04FD655E1} 0xFFFF = 010000000000000070bda85856dfda01 time.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings time.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings time.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{2916C86E-86A6-43FE-8112-43ABE6BF8DCC} {0C6C4200-C589-11D0-999A-00C04FD655E1} 0xFFFF = 0100000000000000d01eab5856dfda01 time.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{08244EE6-92F0-47F2-9FC9-929BAA2E7235} {0C6C4200-C589-11D0-999A-00C04FD655E1} 0xFFFF = 0100000000000000d01eab5856dfda01 time.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections time.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 time.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2212 time.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2468 wrote to memory of 2836 2468 74069a13d82ef37535b78882d1aff5ef_JaffaCakes118.exe 31 PID 2468 wrote to memory of 2836 2468 74069a13d82ef37535b78882d1aff5ef_JaffaCakes118.exe 31 PID 2468 wrote to memory of 2836 2468 74069a13d82ef37535b78882d1aff5ef_JaffaCakes118.exe 31 PID 2468 wrote to memory of 2836 2468 74069a13d82ef37535b78882d1aff5ef_JaffaCakes118.exe 31 PID 2212 wrote to memory of 2820 2212 time.exe 30 PID 2212 wrote to memory of 2820 2212 time.exe 30 PID 2212 wrote to memory of 2820 2212 time.exe 30 PID 2212 wrote to memory of 2820 2212 time.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\74069a13d82ef37535b78882d1aff5ef_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\74069a13d82ef37535b78882d1aff5ef_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\XAPEHW.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2836
-
-
C:\Windows\time.exeC:\Windows\time.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\explorer.exe"C:\Windows\explorer.exe" 603672⤵PID:2820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
218B
MD544ccadbb12f4d062e8de016e247e2079
SHA10655092f5b4743abc8cd1a13da0727b21fdb73b1
SHA256b454617a61a5058d0212f38cdcc6ee252a360b6998ccd17702d8a369d01e749e
SHA5126f827d1ebe1c7bfd7840ee47593d8a7e2a9f57fca80e339ac96d0ad4524850ee01332791561dece308f4a674d8f447a77d64a69c7a820bc1ce6b7b9d1e62852b
-
Filesize
298KB
MD574069a13d82ef37535b78882d1aff5ef
SHA1b66b0e7bc09370e46be4e5938881e42d004ee409
SHA256c78d754b63fe18e9fad70f8a203e9bbbe66912ff48ed0f8bb9cc96b249db9f60
SHA512516a88ea4726a89c322e7a688389efeb84bb746b24f759e3b8346fc9d21f2a393fa4f5f4aeb9149a3c1d80ee8c750b93ff07b51a0204e67742020923493116a3