Analysis
-
max time kernel
142s -
max time network
73s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 21:06
Behavioral task
behavioral1
Sample
a835422db73bd9fb6c427afac47d596f_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
a835422db73bd9fb6c427afac47d596f_JaffaCakes118.exe
-
Size
284KB
-
MD5
a835422db73bd9fb6c427afac47d596f
-
SHA1
bd263170726b57320f0ddda1723dd11600b6ab02
-
SHA256
fff0290e60052f5dc8fd647c85ea36da0f1bd11d38a948460022d1b98baf5890
-
SHA512
e889bf6a36eddc9400e91de3a809f910ae505f08bf675794895bf8337d323a6dcf660c845d2ac252b229c846a3e2bda186a146140f6f4f358c7dbd217c01d4ab
-
SSDEEP
6144:jCbwGiXbFc/MqJ+u/8S0VJG7xwvlbs1J/kJT2sVr2utPh7TbE0QiwLj:GbKBc5l/bIv+1xkZ20xhvbJfwLj
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2792 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2900 systemstups.exe -
resource yara_rule behavioral1/memory/2120-0-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/files/0x000c000000015635-4.dat upx behavioral1/memory/2120-15-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral1/memory/2900-17-0x0000000000400000-0x00000000004B4000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat systemstups.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\systemstups.exe a835422db73bd9fb6c427afac47d596f_JaffaCakes118.exe File opened for modification C:\Windows\systemstups.exe a835422db73bd9fb6c427afac47d596f_JaffaCakes118.exe File created C:\Windows\Delete.bat a835422db73bd9fb6c427afac47d596f_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a835422db73bd9fb6c427afac47d596f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systemstups.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies data under HKEY_USERS 37 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\MediaProperties systemstups.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\MediaProperties\PrivateProperties\Joystick systemstups.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\16-17-37-bf-92-4e systemstups.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\16-17-37-bf-92-4e\WpadDecisionReason = "1" systemstups.exe Key created \REGISTRY\USER\.DEFAULT\System systemstups.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings systemstups.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{83911FBC-500A-4491-8D70-7B1595728210}\WpadDecisionReason = "1" systemstups.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" systemstups.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\16-17-37-bf-92-4e\WpadDecisionTime = 10099e9fb2f1da01 systemstups.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet systemstups.exe Set value (int) \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\MediaProperties\PrivateProperties\Joystick\Winmm\wheel = "1" systemstups.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{83911FBC-500A-4491-8D70-7B1595728210} systemstups.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" systemstups.exe Key created \REGISTRY\USER\.DEFAULT\System\CurrentControlSet\Control\MediaProperties\PrivateProperties\Joystick\Winmm systemstups.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\MediaProperties\PrivateProperties systemstups.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad systemstups.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\16-17-37-bf-92-4e\WpadDecisionTime = d018127ab2f1da01 systemstups.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" systemstups.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\16-17-37-bf-92-4e\WpadDetectedUrl systemstups.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000004000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f007b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 systemstups.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{83911FBC-500A-4491-8D70-7B1595728210}\WpadDecisionTime = 10099e9fb2f1da01 systemstups.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings systemstups.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections systemstups.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f007b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 systemstups.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ systemstups.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{83911FBC-500A-4491-8D70-7B1595728210}\16-17-37-bf-92-4e systemstups.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\16-17-37-bf-92-4e\WpadDecision = "0" systemstups.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\MediaProperties\PrivateProperties\Joystick\Winmm systemstups.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 systemstups.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{83911FBC-500A-4491-8D70-7B1595728210}\WpadDecisionTime = d018127ab2f1da01 systemstups.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{83911FBC-500A-4491-8D70-7B1595728210}\WpadDecision = "0" systemstups.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control systemstups.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" systemstups.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 systemstups.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{83911FBC-500A-4491-8D70-7B1595728210}\WpadNetworkName = "Network 3" systemstups.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix systemstups.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" systemstups.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2900 systemstups.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2900 wrote to memory of 2224 2900 systemstups.exe 30 PID 2900 wrote to memory of 2224 2900 systemstups.exe 30 PID 2900 wrote to memory of 2224 2900 systemstups.exe 30 PID 2900 wrote to memory of 2224 2900 systemstups.exe 30 PID 2120 wrote to memory of 2792 2120 a835422db73bd9fb6c427afac47d596f_JaffaCakes118.exe 31 PID 2120 wrote to memory of 2792 2120 a835422db73bd9fb6c427afac47d596f_JaffaCakes118.exe 31 PID 2120 wrote to memory of 2792 2120 a835422db73bd9fb6c427afac47d596f_JaffaCakes118.exe 31 PID 2120 wrote to memory of 2792 2120 a835422db73bd9fb6c427afac47d596f_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\a835422db73bd9fb6c427afac47d596f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a835422db73bd9fb6c427afac47d596f_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\Delete.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2792
-
-
C:\Windows\systemstups.exeC:\Windows\systemstups.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:2224
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x1881⤵PID:2892
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
214B
MD5fcc6e8bb6d7948650a3d9aa79337977d
SHA117d3295210980158673521af9460d7ee4271624e
SHA2560b695b1547ce48a665b759b92bf62f4cdae804853f758891bf0239169f7f5f06
SHA512b77b788f298ff735c9face804a636bc0f92ee53ee5556e63fd9092fbef1f3547a0fd07f387c3ea828e64cdfa825942c9ab8bbd0c8ec318f03a6455c6c3df6766
-
Filesize
284KB
MD5a835422db73bd9fb6c427afac47d596f
SHA1bd263170726b57320f0ddda1723dd11600b6ab02
SHA256fff0290e60052f5dc8fd647c85ea36da0f1bd11d38a948460022d1b98baf5890
SHA512e889bf6a36eddc9400e91de3a809f910ae505f08bf675794895bf8337d323a6dcf660c845d2ac252b229c846a3e2bda186a146140f6f4f358c7dbd217c01d4ab