Analysis
-
max time kernel
142s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 14:03
Static task
static1
Behavioral task
behavioral1
Sample
bc07899230e691a19e19c4108dc02594_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bc07899230e691a19e19c4108dc02594_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bc07899230e691a19e19c4108dc02594_JaffaCakes118.exe
-
Size
398KB
-
MD5
bc07899230e691a19e19c4108dc02594
-
SHA1
6d0dd0c16958f7bc5c82f395372b42dc8ced1644
-
SHA256
b72a998b8c5e3c11ceeb2bf1d48e04169093a7eda1d73753b2b54bdb61cca51c
-
SHA512
1b27121eb74683700391db979a2d4ebe72415e0720a85481be9ed76d9f74b275fad4c0ae6e760988bd563196bfe57f9dade88db14437e15b28c504d3b702ffa2
-
SSDEEP
12288:SYPkprgbbZEE4bRyzuI2IHloFvyF8p42tSv:1P6rgb9EouEoFaF8pDt
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\sysdt.sys bc07899230e691a19e19c4108dc02594_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 2356 tempdir.exe 1428 Hacker.com.cn.ini -
Loads dropped DLL 2 IoCs
pid Process 2548 bc07899230e691a19e19c4108dc02594_JaffaCakes118.exe 2548 bc07899230e691a19e19c4108dc02594_JaffaCakes118.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat Hacker.com.cn.ini -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Hacker.com.cn.ini tempdir.exe File opened for modification C:\Windows\Hacker.com.cn.ini tempdir.exe File created C:\Windows\UNINSTAL.BAT tempdir.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bc07899230e691a19e19c4108dc02594_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tempdir.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hacker.com.cn.ini Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies data under HKEY_USERS 28 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2DF11958-30E6-4C36-842F-32F17D145DDE}\WpadDecision = "0" Hacker.com.cn.ini Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\f2-84-2a-70-ba-bc\WpadDecisionReason = "1" Hacker.com.cn.ini Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" Hacker.com.cn.ini Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" Hacker.com.cn.ini Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" Hacker.com.cn.ini Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\f2-84-2a-70-ba-bc\WpadDetectedUrl Hacker.com.cn.ini Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections Hacker.com.cn.ini Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2DF11958-30E6-4C36-842F-32F17D145DDE}\WpadDecisionTime = 703e683965f5da01 Hacker.com.cn.ini Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad Hacker.com.cn.ini Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\f2-84-2a-70-ba-bc\WpadDecisionTime = 703e683965f5da01 Hacker.com.cn.ini Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings Hacker.com.cn.ini Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Hacker.com.cn.ini Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2DF11958-30E6-4C36-842F-32F17D145DDE}\WpadDecisionReason = "1" Hacker.com.cn.ini Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" Hacker.com.cn.ini Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix Hacker.com.cn.ini Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2DF11958-30E6-4C36-842F-32F17D145DDE}\WpadDecisionTime = 50f4c96e65f5da01 Hacker.com.cn.ini Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\f2-84-2a-70-ba-bc\WpadDecisionTime = 50f4c96e65f5da01 Hacker.com.cn.ini Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings Hacker.com.cn.ini Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Hacker.com.cn.ini Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2DF11958-30E6-4C36-842F-32F17D145DDE}\WpadNetworkName = "Network 3" Hacker.com.cn.ini Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\f2-84-2a-70-ba-bc Hacker.com.cn.ini Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000004000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f001f000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Hacker.com.cn.ini Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2DF11958-30E6-4C36-842F-32F17D145DDE} Hacker.com.cn.ini Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\f2-84-2a-70-ba-bc\WpadDecision = "0" Hacker.com.cn.ini Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ Hacker.com.cn.ini Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" Hacker.com.cn.ini Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f001f000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Hacker.com.cn.ini Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2DF11958-30E6-4C36-842F-32F17D145DDE}\f2-84-2a-70-ba-bc Hacker.com.cn.ini -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2356 tempdir.exe Token: SeDebugPrivilege 1428 Hacker.com.cn.ini -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1428 Hacker.com.cn.ini -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2548 wrote to memory of 2356 2548 bc07899230e691a19e19c4108dc02594_JaffaCakes118.exe 30 PID 2548 wrote to memory of 2356 2548 bc07899230e691a19e19c4108dc02594_JaffaCakes118.exe 30 PID 2548 wrote to memory of 2356 2548 bc07899230e691a19e19c4108dc02594_JaffaCakes118.exe 30 PID 2548 wrote to memory of 2356 2548 bc07899230e691a19e19c4108dc02594_JaffaCakes118.exe 30 PID 1428 wrote to memory of 2756 1428 Hacker.com.cn.ini 32 PID 1428 wrote to memory of 2756 1428 Hacker.com.cn.ini 32 PID 1428 wrote to memory of 2756 1428 Hacker.com.cn.ini 32 PID 1428 wrote to memory of 2756 1428 Hacker.com.cn.ini 32 PID 2356 wrote to memory of 2836 2356 tempdir.exe 33 PID 2356 wrote to memory of 2836 2356 tempdir.exe 33 PID 2356 wrote to memory of 2836 2356 tempdir.exe 33 PID 2356 wrote to memory of 2836 2356 tempdir.exe 33 PID 2356 wrote to memory of 2836 2356 tempdir.exe 33 PID 2356 wrote to memory of 2836 2356 tempdir.exe 33 PID 2356 wrote to memory of 2836 2356 tempdir.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc07899230e691a19e19c4108dc02594_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bc07899230e691a19e19c4108dc02594_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\tempdir.exeC:\Users\Admin\AppData\Local\Temp\tempdir.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\UNINSTAL.BAT3⤵
- System Location Discovery: System Language Discovery
PID:2836
-
-
-
C:\Windows\Hacker.com.cn.iniC:\Windows\Hacker.com.cn.ini1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:2756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
140B
MD54e7b230401dca85f23df61baa1a95322
SHA1cea9cb695394756afb82ad3090611130b9c92df7
SHA2564896becf71b02a2cad1af0b17e3d86c556e15a4a7e4584e2429d47250b2c71ee
SHA512f98425f89e10f3f54c62ee9e2a3dce1bbd706f6cb9c0b3e51e020447b3250c63133744ae046e754a568ee0ef33488aeb235289d00775f6bc509cf5e01523f464
-
Filesize
756KB
MD5c8f41624ea3242f443b3f632d02e911d
SHA10fda79e2e5487de6e4be036d313c39318102acf5
SHA256fe67f6eb1b70353faa57db887683a62ccfe8043e0cf0c2ed61ab53a2d6c13176
SHA51295ba027db10aba61eb9564d484fc0ea59eaa6fb02ad896a1cb8a1c087f7edf1183bb497d40bec89e310dea9acfd46a259fc0596cd39da17cf14563cdb1a568a6