Analysis
-
max time kernel
134s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 19:51
Static task
static1
Behavioral task
behavioral1
Sample
757a509eab6c477df1e16f558400f920_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
757a509eab6c477df1e16f558400f920_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
757a509eab6c477df1e16f558400f920_JaffaCakes118.exe
-
Size
270KB
-
MD5
757a509eab6c477df1e16f558400f920
-
SHA1
d8690a6e2e478e6388a49ce51ab21c5860eef679
-
SHA256
50a5a1ad84a8238ad0baae9be2aaad2f054d2a37207b663d6de1f251263dc3d0
-
SHA512
cfbe5f90bcec37167bfc59f9aea81235d7a4908874c950a1f3af7597822b111a3ccd896283f9ea016dd294b6323f665db36d7f4251440796a4115f64b0c57bda
-
SSDEEP
6144:M8nBj6B6kQu1WTminflPN80PxpkJP9sF2GtxvEvCO0HF7:1Q6k+Tmin80PPesFFxMvS7
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2372 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2316 Hacker.com.cn.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat Hacker.com.cn.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\Hacker.com.cn.exe 757a509eab6c477df1e16f558400f920_JaffaCakes118.exe File created C:\Windows\uninstal.bat 757a509eab6c477df1e16f558400f920_JaffaCakes118.exe File created C:\Windows\Hacker.com.cn.exe 757a509eab6c477df1e16f558400f920_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 757a509eab6c477df1e16f558400f920_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hacker.com.cn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies data under HKEY_USERS 28 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections Hacker.com.cn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings Hacker.com.cn.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0192000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Hacker.com.cn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ Hacker.com.cn.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings Hacker.com.cn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6E2D96F0-611C-4250-9EC0-A6753815BE17} Hacker.com.cn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" Hacker.com.cn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8a-59-60-74-d6-3d\WpadDetectedUrl Hacker.com.cn.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6E2D96F0-611C-4250-9EC0-A6753815BE17}\WpadDecisionTime = 6053703bfddfda01 Hacker.com.cn.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6E2D96F0-611C-4250-9EC0-A6753815BE17}\WpadDecisionTime = 203c0c06fddfda01 Hacker.com.cn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6E2D96F0-611C-4250-9EC0-A6753815BE17}\8a-59-60-74-d6-3d Hacker.com.cn.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8a-59-60-74-d6-3d\WpadDecisionTime = 203c0c06fddfda01 Hacker.com.cn.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000004000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0192000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Hacker.com.cn.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Hacker.com.cn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad Hacker.com.cn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix Hacker.com.cn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" Hacker.com.cn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" Hacker.com.cn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6E2D96F0-611C-4250-9EC0-A6753815BE17}\WpadDecision = "0" Hacker.com.cn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8a-59-60-74-d6-3d Hacker.com.cn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8a-59-60-74-d6-3d\WpadDecisionReason = "1" Hacker.com.cn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" Hacker.com.cn.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8a-59-60-74-d6-3d\WpadDecisionTime = 6053703bfddfda01 Hacker.com.cn.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Hacker.com.cn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6E2D96F0-611C-4250-9EC0-A6753815BE17}\WpadDecisionReason = "1" Hacker.com.cn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6E2D96F0-611C-4250-9EC0-A6753815BE17}\WpadNetworkName = "Network 3" Hacker.com.cn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8a-59-60-74-d6-3d\WpadDecision = "0" Hacker.com.cn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" Hacker.com.cn.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2480 757a509eab6c477df1e16f558400f920_JaffaCakes118.exe Token: SeDebugPrivilege 2316 Hacker.com.cn.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2316 Hacker.com.cn.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2196 2316 Hacker.com.cn.exe 31 PID 2316 wrote to memory of 2196 2316 Hacker.com.cn.exe 31 PID 2316 wrote to memory of 2196 2316 Hacker.com.cn.exe 31 PID 2316 wrote to memory of 2196 2316 Hacker.com.cn.exe 31 PID 2480 wrote to memory of 2372 2480 757a509eab6c477df1e16f558400f920_JaffaCakes118.exe 32 PID 2480 wrote to memory of 2372 2480 757a509eab6c477df1e16f558400f920_JaffaCakes118.exe 32 PID 2480 wrote to memory of 2372 2480 757a509eab6c477df1e16f558400f920_JaffaCakes118.exe 32 PID 2480 wrote to memory of 2372 2480 757a509eab6c477df1e16f558400f920_JaffaCakes118.exe 32 PID 2480 wrote to memory of 2372 2480 757a509eab6c477df1e16f558400f920_JaffaCakes118.exe 32 PID 2480 wrote to memory of 2372 2480 757a509eab6c477df1e16f558400f920_JaffaCakes118.exe 32 PID 2480 wrote to memory of 2372 2480 757a509eab6c477df1e16f558400f920_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\757a509eab6c477df1e16f558400f920_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\757a509eab6c477df1e16f558400f920_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\uninstal.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2372
-
-
C:\Windows\Hacker.com.cn.exeC:\Windows\Hacker.com.cn.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:2196
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
270KB
MD5757a509eab6c477df1e16f558400f920
SHA1d8690a6e2e478e6388a49ce51ab21c5860eef679
SHA25650a5a1ad84a8238ad0baae9be2aaad2f054d2a37207b663d6de1f251263dc3d0
SHA512cfbe5f90bcec37167bfc59f9aea81235d7a4908874c950a1f3af7597822b111a3ccd896283f9ea016dd294b6323f665db36d7f4251440796a4115f64b0c57bda
-
Filesize
218B
MD5401d6c4ebb81110678ac6d935a1576b2
SHA15268bf9bd2bfb638c505274d435fc17738d3e2a0
SHA2560917cd2139d33cc8f1eb4ede0a43c999dcef6646c8e86ebb5663af0f8ca83811
SHA51234ed6264daf2e54e29d9daf2ae505895c625dc10e6c2733bde4fc6592608a0bb6e90e02440c304edf2743fc9f5f491823a98c744d07333bba6e249b96e574c2e