Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
30/08/2024, 20:08
Static task
static1
Behavioral task
behavioral1
Sample
cb9428c8965c8d48f5f3ca0236fcc28c_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
cb9428c8965c8d48f5f3ca0236fcc28c_JaffaCakes118.exe
-
Size
306KB
-
MD5
cb9428c8965c8d48f5f3ca0236fcc28c
-
SHA1
e222e2ac35dec32973c554b1502a1719460d68a2
-
SHA256
cf0fd5544c94b0b45d7168ad5c2fcc28502eaeb0a7f89656eb726e9fa89e32e4
-
SHA512
80264af772509c1ce7aa2c6954c53b230c318f9a51a6f399ccd5ac45fdab6bedce4063aeefdd404c3fe2109051faace528b870fe0a77873bbbc8ce7f1468576d
-
SSDEEP
6144:63LEppKQUTtvh2VuL6g8+fGKrQ3+toJFihLt3A++:+EpITVAuL6gvfGBdJFihLt3A++
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat ipropwfp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cb9428c8965c8d48f5f3ca0236fcc28c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cb9428c8965c8d48f5f3ca0236fcc28c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipropwfp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipropwfp.exe -
Modifies data under HKEY_USERS 19 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\6a-de-cf-00-b1-89\WpadDecisionTime = b0e7a17b18fbda01 ipropwfp.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\6a-de-cf-00-b1-89\WpadDecision = "0" ipropwfp.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 ipropwfp.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" ipropwfp.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\6a-de-cf-00-b1-89 ipropwfp.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\6a-de-cf-00-b1-89\WpadDecisionReason = "1" ipropwfp.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings ipropwfp.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{1EE4CE08-4345-4229-961A-D8C3780196CB}\WpadNetworkName = "Network 3" ipropwfp.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{1EE4CE08-4345-4229-961A-D8C3780196CB}\6a-de-cf-00-b1-89 ipropwfp.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\6a-de-cf-00-b1-89\WpadDetectedUrl ipropwfp.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections ipropwfp.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad ipropwfp.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{1EE4CE08-4345-4229-961A-D8C3780196CB}\WpadDecisionTime = b0e7a17b18fbda01 ipropwfp.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{1EE4CE08-4345-4229-961A-D8C3780196CB}\WpadDecision = "0" ipropwfp.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{1EE4CE08-4345-4229-961A-D8C3780196CB}\WpadDecisionReason = "1" ipropwfp.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings ipropwfp.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 ipropwfp.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f007a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 ipropwfp.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{1EE4CE08-4345-4229-961A-D8C3780196CB} ipropwfp.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1480 cb9428c8965c8d48f5f3ca0236fcc28c_JaffaCakes118.exe 1888 cb9428c8965c8d48f5f3ca0236fcc28c_JaffaCakes118.exe 2944 ipropwfp.exe 2736 ipropwfp.exe 2736 ipropwfp.exe 2736 ipropwfp.exe 2736 ipropwfp.exe 2736 ipropwfp.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1888 cb9428c8965c8d48f5f3ca0236fcc28c_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 4 IoCs
pid Process 1480 cb9428c8965c8d48f5f3ca0236fcc28c_JaffaCakes118.exe 1888 cb9428c8965c8d48f5f3ca0236fcc28c_JaffaCakes118.exe 2944 ipropwfp.exe 2736 ipropwfp.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1480 wrote to memory of 1888 1480 cb9428c8965c8d48f5f3ca0236fcc28c_JaffaCakes118.exe 30 PID 1480 wrote to memory of 1888 1480 cb9428c8965c8d48f5f3ca0236fcc28c_JaffaCakes118.exe 30 PID 1480 wrote to memory of 1888 1480 cb9428c8965c8d48f5f3ca0236fcc28c_JaffaCakes118.exe 30 PID 1480 wrote to memory of 1888 1480 cb9428c8965c8d48f5f3ca0236fcc28c_JaffaCakes118.exe 30 PID 2944 wrote to memory of 2736 2944 ipropwfp.exe 32 PID 2944 wrote to memory of 2736 2944 ipropwfp.exe 32 PID 2944 wrote to memory of 2736 2944 ipropwfp.exe 32 PID 2944 wrote to memory of 2736 2944 ipropwfp.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb9428c8965c8d48f5f3ca0236fcc28c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cb9428c8965c8d48f5f3ca0236fcc28c_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\cb9428c8965c8d48f5f3ca0236fcc28c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cb9428c8965c8d48f5f3ca0236fcc28c_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
PID:1888
-
-
C:\Windows\SysWOW64\ipropwfp.exe"C:\Windows\SysWOW64\ipropwfp.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\SysWOW64\ipropwfp.exe"C:\Windows\SysWOW64\ipropwfp.exe"2⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:2736
-