Analysis
-
max time kernel
142s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
28/08/2024, 18:13
Static task
static1
Behavioral task
behavioral1
Sample
c76286034161bfb771a311f5238e032b_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c76286034161bfb771a311f5238e032b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c76286034161bfb771a311f5238e032b_JaffaCakes118.exe
-
Size
710KB
-
MD5
c76286034161bfb771a311f5238e032b
-
SHA1
f24a3e262484d837df6633a3b187a2d51c76ee5b
-
SHA256
e569629ea4cdac44d18ebf193b021a4c1d187a97176015c317ee75364ac8533f
-
SHA512
31f1a48c86e598c06e715cc13939a23291f4a5090bcb68243fe8441b2e4b904113919c91441e2769d723c4d8e01e23f37d767a9894fd23f6f216044372bef903
-
SSDEEP
12288:39xEIhI1gi4kRFpKaqkbmgiZmdcccvpohF3Z4mxx4lv1+mRrzMD/QvV:LEIhugi4uFpKQmgigNcsQmXOhKm
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2620 www.hmhk.cn.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat www.hmhk.cn.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\HgzServer\www.hmhk.cn.exe c76286034161bfb771a311f5238e032b_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\HgzServer\www.hmhk.cn.exe c76286034161bfb771a311f5238e032b_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c76286034161bfb771a311f5238e032b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language www.hmhk.cn.exe -
Modifies data under HKEY_USERS 28 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 www.hmhk.cn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{BD7C9D30-E3F1-41A7-A887-23A62A95B01F}\WpadDecisionReason = "1" www.hmhk.cn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{BD7C9D30-E3F1-41A7-A887-23A62A95B01F}\WpadNetworkName = "Network 3" www.hmhk.cn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{BD7C9D30-E3F1-41A7-A887-23A62A95B01F} www.hmhk.cn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix www.hmhk.cn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\a2-d5-75-98-cd-6e\WpadDetectedUrl www.hmhk.cn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\a2-d5-75-98-cd-6e\WpadDecisionReason = "1" www.hmhk.cn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections www.hmhk.cn.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{BD7C9D30-E3F1-41A7-A887-23A62A95B01F}\WpadDecisionTime = 406e931276f9da01 www.hmhk.cn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{BD7C9D30-E3F1-41A7-A887-23A62A95B01F}\WpadDecision = "0" www.hmhk.cn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\a2-d5-75-98-cd-6e www.hmhk.cn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" www.hmhk.cn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" www.hmhk.cn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" www.hmhk.cn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\a2-d5-75-98-cd-6e\WpadDecision = "0" www.hmhk.cn.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{BD7C9D30-E3F1-41A7-A887-23A62A95B01F}\WpadDecisionTime = e094f54376f9da01 www.hmhk.cn.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings www.hmhk.cn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings www.hmhk.cn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad www.hmhk.cn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{BD7C9D30-E3F1-41A7-A887-23A62A95B01F}\a2-d5-75-98-cd-6e www.hmhk.cn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ www.hmhk.cn.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000004000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0194000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 www.hmhk.cn.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\a2-d5-75-98-cd-6e\WpadDecisionTime = e094f54376f9da01 www.hmhk.cn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" www.hmhk.cn.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 www.hmhk.cn.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0194000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 www.hmhk.cn.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\a2-d5-75-98-cd-6e\WpadDecisionTime = 406e931276f9da01 www.hmhk.cn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" www.hmhk.cn.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2640 c76286034161bfb771a311f5238e032b_JaffaCakes118.exe Token: SeDebugPrivilege 2620 www.hmhk.cn.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2620 www.hmhk.cn.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2620 wrote to memory of 3060 2620 www.hmhk.cn.exe 31 PID 2620 wrote to memory of 3060 2620 www.hmhk.cn.exe 31 PID 2620 wrote to memory of 3060 2620 www.hmhk.cn.exe 31 PID 2620 wrote to memory of 3060 2620 www.hmhk.cn.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\c76286034161bfb771a311f5238e032b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c76286034161bfb771a311f5238e032b_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2640
-
C:\Program Files (x86)\HgzServer\www.hmhk.cn.exe"C:\Program Files (x86)\HgzServer\www.hmhk.cn.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:3060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
710KB
MD5c76286034161bfb771a311f5238e032b
SHA1f24a3e262484d837df6633a3b187a2d51c76ee5b
SHA256e569629ea4cdac44d18ebf193b021a4c1d187a97176015c317ee75364ac8533f
SHA51231f1a48c86e598c06e715cc13939a23291f4a5090bcb68243fe8441b2e4b904113919c91441e2769d723c4d8e01e23f37d767a9894fd23f6f216044372bef903