Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
08-09-2024 05:20
Behavioral task
behavioral1
Sample
d3a225b52a96a561e17679a714f8f0ae_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
d3a225b52a96a561e17679a714f8f0ae_JaffaCakes118.exe
-
Size
349KB
-
MD5
d3a225b52a96a561e17679a714f8f0ae
-
SHA1
bf8dbcd17973d23f89622203dcd1c41340656150
-
SHA256
38a389ae3b625c324dd44b8707169407bf5a39a3310841da29db13f30a3a41ec
-
SHA512
f11b80f20eb6482fe8ebc3dada8612d31d9e6727b91275bd9b8f28dcf6cb1cd07943afde13bf4ef46316fe1119d0dd6ca6205a61abc4fddbaa3baa6e490d3735
-
SSDEEP
6144:bBf46wO7HK3Uwo5VUg+4sEjoKnun1Knun1Knun1Knun1Knun1Knun1Knun1Knun0:9f9oWVp2WOWOWOWOWOWOWOWOW1oPx/s
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat wfpsingle.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d3a225b52a96a561e17679a714f8f0ae_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wfpsingle.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wfpsingle.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d3a225b52a96a561e17679a714f8f0ae_JaffaCakes118.exe -
Modifies data under HKEY_USERS 21 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections wfpsingle.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" wfpsingle.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" wfpsingle.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A7BFCE0B-1293-4EFE-9844-29826F954C0A}\WpadDecision = "0" wfpsingle.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0a-84-80-90-f2-bd wfpsingle.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0a-84-80-90-f2-bd\WpadDecisionReason = "1" wfpsingle.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings wfpsingle.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" wfpsingle.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings wfpsingle.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A7BFCE0B-1293-4EFE-9844-29826F954C0A} wfpsingle.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A7BFCE0B-1293-4EFE-9844-29826F954C0A}\WpadDecisionTime = 909eebf8ae01db01 wfpsingle.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A7BFCE0B-1293-4EFE-9844-29826F954C0A}\WpadNetworkName = "Network 3" wfpsingle.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0a-84-80-90-f2-bd\WpadDecisionTime = 909eebf8ae01db01 wfpsingle.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad wfpsingle.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 wfpsingle.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix wfpsingle.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 wfpsingle.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f018a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 wfpsingle.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A7BFCE0B-1293-4EFE-9844-29826F954C0A}\WpadDecisionReason = "1" wfpsingle.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A7BFCE0B-1293-4EFE-9844-29826F954C0A}\0a-84-80-90-f2-bd wfpsingle.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0a-84-80-90-f2-bd\WpadDecision = "0" wfpsingle.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2520 wfpsingle.exe 2520 wfpsingle.exe 2520 wfpsingle.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1960 d3a225b52a96a561e17679a714f8f0ae_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 4 IoCs
pid Process 1700 d3a225b52a96a561e17679a714f8f0ae_JaffaCakes118.exe 1960 d3a225b52a96a561e17679a714f8f0ae_JaffaCakes118.exe 2544 wfpsingle.exe 2520 wfpsingle.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1700 wrote to memory of 1960 1700 d3a225b52a96a561e17679a714f8f0ae_JaffaCakes118.exe 30 PID 1700 wrote to memory of 1960 1700 d3a225b52a96a561e17679a714f8f0ae_JaffaCakes118.exe 30 PID 1700 wrote to memory of 1960 1700 d3a225b52a96a561e17679a714f8f0ae_JaffaCakes118.exe 30 PID 1700 wrote to memory of 1960 1700 d3a225b52a96a561e17679a714f8f0ae_JaffaCakes118.exe 30 PID 2544 wrote to memory of 2520 2544 wfpsingle.exe 33 PID 2544 wrote to memory of 2520 2544 wfpsingle.exe 33 PID 2544 wrote to memory of 2520 2544 wfpsingle.exe 33 PID 2544 wrote to memory of 2520 2544 wfpsingle.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3a225b52a96a561e17679a714f8f0ae_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d3a225b52a96a561e17679a714f8f0ae_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\d3a225b52a96a561e17679a714f8f0ae_JaffaCakes118.exe--3028d6032⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
PID:1960
-
-
C:\Windows\SysWOW64\wfpsingle.exe"C:\Windows\SysWOW64\wfpsingle.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\SysWOW64\wfpsingle.exe--7e9a8a5f2⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:2520
-