Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
31-08-2024 23:13
Static task
static1
Behavioral task
behavioral1
Sample
cdc7dc0fd5675620eb6239a09065821d_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
cdc7dc0fd5675620eb6239a09065821d_JaffaCakes118.exe
-
Size
457KB
-
MD5
cdc7dc0fd5675620eb6239a09065821d
-
SHA1
87543bbf2e919972b27aefbb9f209c765e00ab6d
-
SHA256
6c5fa1c0a0c3860b2775ed00c52a2959173d04b597528a1f876bc057d417cb45
-
SHA512
a022708f3538e15a024ac421a7c85474aa2f68404b7a68e95936b6eecba18847b6032f0b7bb65f3d37c8fda9539c9e20540ea04431ab1847237f426861e97a33
-
SSDEEP
6144:3huTlwinUnUYTtp6g6ePQcWqXU/i4zo2Tgq3XWgXrCr7tq5UQM:3hkZnUnUYTP6fghW6B4U2M6f+FQM
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat logsexample.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cdc7dc0fd5675620eb6239a09065821d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cdc7dc0fd5675620eb6239a09065821d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language logsexample.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language logsexample.exe -
Modifies data under HKEY_USERS 19 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections logsexample.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" logsexample.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 logsexample.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\c2-e4-44-e7-1c-73\WpadDecision = "0" logsexample.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings logsexample.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{55CB7997-1E69-4927-9576-36687B620A2F}\WpadDecision = "0" logsexample.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{55CB7997-1E69-4927-9576-36687B620A2F}\WpadNetworkName = "Network 3" logsexample.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\c2-e4-44-e7-1c-73\WpadDetectedUrl logsexample.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{55CB7997-1E69-4927-9576-36687B620A2F}\WpadDecisionTime = 4039887ffbfbda01 logsexample.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad logsexample.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f006d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 logsexample.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{55CB7997-1E69-4927-9576-36687B620A2F} logsexample.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{55CB7997-1E69-4927-9576-36687B620A2F}\WpadDecisionReason = "1" logsexample.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\c2-e4-44-e7-1c-73 logsexample.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{55CB7997-1E69-4927-9576-36687B620A2F}\c2-e4-44-e7-1c-73 logsexample.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\c2-e4-44-e7-1c-73\WpadDecisionReason = "1" logsexample.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings logsexample.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\c2-e4-44-e7-1c-73\WpadDecisionTime = 4039887ffbfbda01 logsexample.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 logsexample.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2312 cdc7dc0fd5675620eb6239a09065821d_JaffaCakes118.exe 3060 cdc7dc0fd5675620eb6239a09065821d_JaffaCakes118.exe 2636 logsexample.exe 2276 logsexample.exe 2276 logsexample.exe 2276 logsexample.exe 2276 logsexample.exe 2276 logsexample.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3060 cdc7dc0fd5675620eb6239a09065821d_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2312 wrote to memory of 3060 2312 cdc7dc0fd5675620eb6239a09065821d_JaffaCakes118.exe 30 PID 2312 wrote to memory of 3060 2312 cdc7dc0fd5675620eb6239a09065821d_JaffaCakes118.exe 30 PID 2312 wrote to memory of 3060 2312 cdc7dc0fd5675620eb6239a09065821d_JaffaCakes118.exe 30 PID 2312 wrote to memory of 3060 2312 cdc7dc0fd5675620eb6239a09065821d_JaffaCakes118.exe 30 PID 2636 wrote to memory of 2276 2636 logsexample.exe 32 PID 2636 wrote to memory of 2276 2636 logsexample.exe 32 PID 2636 wrote to memory of 2276 2636 logsexample.exe 32 PID 2636 wrote to memory of 2276 2636 logsexample.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\cdc7dc0fd5675620eb6239a09065821d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cdc7dc0fd5675620eb6239a09065821d_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Users\Admin\AppData\Local\Temp\cdc7dc0fd5675620eb6239a09065821d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cdc7dc0fd5675620eb6239a09065821d_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:3060
-
-
C:\Windows\SysWOW64\logsexample.exe"C:\Windows\SysWOW64\logsexample.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\logsexample.exe"C:\Windows\SysWOW64\logsexample.exe"2⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:2276
-