Analysis
-
max time kernel
147s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 01:42
Static task
static1
Behavioral task
behavioral1
Sample
b5dde1b6c9a81d5cda0a623d9c5aeadc_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
b5dde1b6c9a81d5cda0a623d9c5aeadc_JaffaCakes118.exe
-
Size
149KB
-
MD5
b5dde1b6c9a81d5cda0a623d9c5aeadc
-
SHA1
36c2d10d74587fa758504c710fbb5a900e0e6c0f
-
SHA256
1518a6c3c826c9e8a8344d9385361234474374e363648978b70b92eb78df7ba2
-
SHA512
29b430ec469cb95b88936b4bb6f12d3cfe7f95096af5032e03f3fddf577d981ed19860441d401488247dadd596d64287ddf022e6457eb379f12e35394eba4d2c
-
SSDEEP
3072:DRQG1hLvAs2J88HTq0+k56kibCu9PSWcBWlJkL/:DJhLoZS8HTq0+G6kltMkL/
Malware Config
Signatures
-
Looks for VMWare Tools registry key 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\VMware, Inc.\VMware Tools b5dde1b6c9a81d5cda0a623d9c5aeadc_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\VMware, Inc.\VMware Tools Ÿ( -
Executes dropped EXE 1 IoCs
pid Process 1312 Ÿ( -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat Ÿ( -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\Ÿ( b5dde1b6c9a81d5cda0a623d9c5aeadc_JaffaCakes118.exe File created C:\Windows\Ÿ( b5dde1b6c9a81d5cda0a623d9c5aeadc_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b5dde1b6c9a81d5cda0a623d9c5aeadc_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ÿ( -
Modifies data under HKEY_USERS 6 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" Ÿ( Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Ÿ( Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings Ÿ( Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections Ÿ( Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Ÿ( Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings Ÿ(
Processes
-
C:\Users\Admin\AppData\Local\Temp\b5dde1b6c9a81d5cda0a623d9c5aeadc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b5dde1b6c9a81d5cda0a623d9c5aeadc_JaffaCakes118.exe"1⤵
- Looks for VMWare Tools registry key
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2024
-
C:\Windows\Ÿ("C:\Windows\Ÿ("1⤵
- Looks for VMWare Tools registry key
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:1312
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
149KB
MD5b5dde1b6c9a81d5cda0a623d9c5aeadc
SHA136c2d10d74587fa758504c710fbb5a900e0e6c0f
SHA2561518a6c3c826c9e8a8344d9385361234474374e363648978b70b92eb78df7ba2
SHA51229b430ec469cb95b88936b4bb6f12d3cfe7f95096af5032e03f3fddf577d981ed19860441d401488247dadd596d64287ddf022e6457eb379f12e35394eba4d2c