Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-09-2024 03:57
Static task
static1
Behavioral task
behavioral1
Sample
d991661bafa251d06be4189c13e36856_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
d991661bafa251d06be4189c13e36856_JaffaCakes118.exe
-
Size
348KB
-
MD5
d991661bafa251d06be4189c13e36856
-
SHA1
9ef63ef5f234c7296f5a67939624de410027755f
-
SHA256
f5b4f89b6b1dc85c733d49b2eef0b2b23dcc1c3a2914a1f01a6b4fc651c231ec
-
SHA512
a0a58043bf13688693006ba1ab990c3406afcb553927f69578f6ad8c1f1b14ff603878459b9ee0f38e7289beb97e95213672430018d9edebbee5054d28b8b649
-
SSDEEP
3072:alJp9tUQmCcTrslffmseKdNZO+SrEtvFkn5mhFvKR8mewZ6LhBojSC0AmYNwmLb:8ZLZ25KFO89y6L8mC0AmYNwQlzp
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat slideeap.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d991661bafa251d06be4189c13e36856_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d991661bafa251d06be4189c13e36856_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language slideeap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language slideeap.exe -
Modifies data under HKEY_USERS 19 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings slideeap.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{B8AB678E-B815-4C67-A6F6-AE0E4F8C0292}\WpadDecision = "0" slideeap.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\82-6f-b7-50-2f-24\WpadDecisionTime = 20dcfdd0fe03db01 slideeap.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{B8AB678E-B815-4C67-A6F6-AE0E4F8C0292}\WpadNetworkName = "Network 3" slideeap.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\82-6f-b7-50-2f-24 slideeap.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections slideeap.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 slideeap.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad slideeap.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00c6000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 slideeap.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{B8AB678E-B815-4C67-A6F6-AE0E4F8C0292}\WpadDecisionReason = "1" slideeap.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{B8AB678E-B815-4C67-A6F6-AE0E4F8C0292}\WpadDecisionTime = 20dcfdd0fe03db01 slideeap.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\82-6f-b7-50-2f-24\WpadDecisionReason = "1" slideeap.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" slideeap.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\82-6f-b7-50-2f-24\WpadDetectedUrl slideeap.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings slideeap.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 slideeap.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{B8AB678E-B815-4C67-A6F6-AE0E4F8C0292} slideeap.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{B8AB678E-B815-4C67-A6F6-AE0E4F8C0292}\82-6f-b7-50-2f-24 slideeap.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\82-6f-b7-50-2f-24\WpadDecision = "0" slideeap.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2784 d991661bafa251d06be4189c13e36856_JaffaCakes118.exe 2736 d991661bafa251d06be4189c13e36856_JaffaCakes118.exe 2852 slideeap.exe 2604 slideeap.exe 2604 slideeap.exe 2604 slideeap.exe 2604 slideeap.exe 2604 slideeap.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2736 d991661bafa251d06be4189c13e36856_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2784 wrote to memory of 2736 2784 d991661bafa251d06be4189c13e36856_JaffaCakes118.exe 30 PID 2784 wrote to memory of 2736 2784 d991661bafa251d06be4189c13e36856_JaffaCakes118.exe 30 PID 2784 wrote to memory of 2736 2784 d991661bafa251d06be4189c13e36856_JaffaCakes118.exe 30 PID 2784 wrote to memory of 2736 2784 d991661bafa251d06be4189c13e36856_JaffaCakes118.exe 30 PID 2852 wrote to memory of 2604 2852 slideeap.exe 32 PID 2852 wrote to memory of 2604 2852 slideeap.exe 32 PID 2852 wrote to memory of 2604 2852 slideeap.exe 32 PID 2852 wrote to memory of 2604 2852 slideeap.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\d991661bafa251d06be4189c13e36856_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d991661bafa251d06be4189c13e36856_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\d991661bafa251d06be4189c13e36856_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d991661bafa251d06be4189c13e36856_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:2736
-
-
C:\Windows\SysWOW64\slideeap.exe"C:\Windows\SysWOW64\slideeap.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\SysWOW64\slideeap.exe"C:\Windows\SysWOW64\slideeap.exe"2⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:2604
-