Analysis
-
max time kernel
141s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 02:55
Static task
static1
Behavioral task
behavioral1
Sample
76cc12369fda4754e4e977c6f280c8f9_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
76cc12369fda4754e4e977c6f280c8f9_JaffaCakes118.exe
Resource
win10v2004-20240729-en
General
-
Target
76cc12369fda4754e4e977c6f280c8f9_JaffaCakes118.exe
-
Size
765KB
-
MD5
76cc12369fda4754e4e977c6f280c8f9
-
SHA1
b145575360eeec86c6d43b27dc5fd69a5d8ec88e
-
SHA256
29ebb3bbce5a331bfcd55369030dd1d9686d6719c250d0346661e888f3cfb688
-
SHA512
81d12a68769e80137485eb61b11fa74583a52a77831b5bfa8ccff2a5aa4682886b06633bf240d2bf20935c2ed3d4e4f2842f8a2aabadc6e07902a14de163d7d4
-
SSDEEP
12288:R5kZMBLchejasXVijR9sYh7KYc0JEKknSIT6y3vZJJjb9/M5ytdt7LSMn9Q:R9LDasX8jDWMytz
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2412 ¸´¼þ Server_Setup.exe 2284 Hacker.com.cn.exe -
Loads dropped DLL 4 IoCs
pid Process 2384 76cc12369fda4754e4e977c6f280c8f9_JaffaCakes118.exe 2412 ¸´¼þ Server_Setup.exe 2412 ¸´¼þ Server_Setup.exe 2412 ¸´¼þ Server_Setup.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\¸´¼þ Server_Setup.jpg 76cc12369fda4754e4e977c6f280c8f9_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\¸´¼þ Server_Setup.exe ¸´¼þ Server_Setup.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat Hacker.com.cn.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Hacker.com.cn.exe ¸´¼þ Server_Setup.exe File opened for modification C:\Windows\Hacker.com.cn.exe ¸´¼þ Server_Setup.exe File created C:\Windows\uninstal.bat ¸´¼þ Server_Setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hacker.com.cn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 76cc12369fda4754e4e977c6f280c8f9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ¸´¼þ Server_Setup.exe -
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections Hacker.com.cn.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Hacker.com.cn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings Hacker.com.cn.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f009f000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Hacker.com.cn.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F1D04F48-03D3-437C-A674-67DD7F1414E8}\WpadDecision = "0" Hacker.com.cn.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F1D04F48-03D3-437C-A674-67DD7F1414E8}\WpadNetworkName = "Network 3" Hacker.com.cn.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\02-58-b6-51-25-c2 Hacker.com.cn.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" Hacker.com.cn.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Hacker.com.cn.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F1D04F48-03D3-437C-A674-67DD7F1414E8}\WpadDecisionReason = "1" Hacker.com.cn.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F1D04F48-03D3-437C-A674-67DD7F1414E8}\02-58-b6-51-25-c2 Hacker.com.cn.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\02-58-b6-51-25-c2\WpadDecision = "0" Hacker.com.cn.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" Hacker.com.cn.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" Hacker.com.cn.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings Hacker.com.cn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad Hacker.com.cn.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F1D04F48-03D3-437C-A674-67DD7F1414E8} Hacker.com.cn.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" Hacker.com.cn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ Hacker.com.cn.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F1D04F48-03D3-437C-A674-67DD7F1414E8}\WpadDecisionTime = b0887d2f42e2da01 Hacker.com.cn.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\02-58-b6-51-25-c2\WpadDecisionReason = "1" Hacker.com.cn.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\02-58-b6-51-25-c2\WpadDecisionTime = b0887d2f42e2da01 Hacker.com.cn.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" Hacker.com.cn.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix Hacker.com.cn.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2412 ¸´¼þ Server_Setup.exe Token: SeDebugPrivilege 2284 Hacker.com.cn.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2284 Hacker.com.cn.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2384 wrote to memory of 2412 2384 76cc12369fda4754e4e977c6f280c8f9_JaffaCakes118.exe 30 PID 2384 wrote to memory of 2412 2384 76cc12369fda4754e4e977c6f280c8f9_JaffaCakes118.exe 30 PID 2384 wrote to memory of 2412 2384 76cc12369fda4754e4e977c6f280c8f9_JaffaCakes118.exe 30 PID 2384 wrote to memory of 2412 2384 76cc12369fda4754e4e977c6f280c8f9_JaffaCakes118.exe 30 PID 2384 wrote to memory of 2412 2384 76cc12369fda4754e4e977c6f280c8f9_JaffaCakes118.exe 30 PID 2384 wrote to memory of 2412 2384 76cc12369fda4754e4e977c6f280c8f9_JaffaCakes118.exe 30 PID 2384 wrote to memory of 2412 2384 76cc12369fda4754e4e977c6f280c8f9_JaffaCakes118.exe 30 PID 2284 wrote to memory of 968 2284 Hacker.com.cn.exe 32 PID 2284 wrote to memory of 968 2284 Hacker.com.cn.exe 32 PID 2284 wrote to memory of 968 2284 Hacker.com.cn.exe 32 PID 2284 wrote to memory of 968 2284 Hacker.com.cn.exe 32 PID 2412 wrote to memory of 2696 2412 ¸´¼þ Server_Setup.exe 33 PID 2412 wrote to memory of 2696 2412 ¸´¼þ Server_Setup.exe 33 PID 2412 wrote to memory of 2696 2412 ¸´¼þ Server_Setup.exe 33 PID 2412 wrote to memory of 2696 2412 ¸´¼þ Server_Setup.exe 33 PID 2412 wrote to memory of 2696 2412 ¸´¼þ Server_Setup.exe 33 PID 2412 wrote to memory of 2696 2412 ¸´¼þ Server_Setup.exe 33 PID 2412 wrote to memory of 2696 2412 ¸´¼þ Server_Setup.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\76cc12369fda4754e4e977c6f280c8f9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\76cc12369fda4754e4e977c6f280c8f9_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\¸´¼þ Server_Setup.exe"C:\Windows\system32\¸´¼þ Server_Setup.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\uninstal.bat3⤵
- System Location Discovery: System Language Discovery
PID:2696
-
-
-
C:\Windows\Hacker.com.cn.exeC:\Windows\Hacker.com.cn.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:968
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
132B
MD5f8453b629980dcd844bb6a2d051a06b5
SHA15b2e6122583c5e3abe4de9b85d96ded38d1dcf04
SHA25692781ba41504370c3a859b35913e9c6f1bc7b3f13acdf06a6d607a79c499f737
SHA512227c4671523542b206e56d950a636a0a79f5fabebb21d18ed0ee171d5aab4895ab7a0e5138f0dd35a323d9fdf574634f29ee917e6dc5e01a24953a3e0ab784c2
-
Filesize
749KB
MD54291c6fcc182b48bd180575b01b38310
SHA1af885b9507771de724c430d7e2f34e281fbf4da7
SHA25622f806bc5e864f7dfbb34720a5358927581a35a569fa5a31042486d425c1f5db
SHA512d4aa52bee14fd78d3ab994e03369ab9817a9c5ab91826dea2e1ac4000b49bcc813a0053d0726ecdbfa9af11ee5ac7a74f4a1a752a8d8703b026fd684729fa489