Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 04:32
Static task
static1
Behavioral task
behavioral1
Sample
ddadccb06dd3535f04acc27f0e27b855_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
ddadccb06dd3535f04acc27f0e27b855_JaffaCakes118.exe
-
Size
368KB
-
MD5
ddadccb06dd3535f04acc27f0e27b855
-
SHA1
5c7f33dae7c5866e1efb4048b8c51f2ed9c39f26
-
SHA256
855e2e58915abfd690b5643ec822c1d629986a88dbbea8bd7d5df56671ecdf2d
-
SHA512
29b9981f1635390bb43d0b06b128867a7ba93ba117a4a7c50d6224417b09aa98235b2440ad9032c52de44a82131689942bc7119466b7a653b380e9a37fd93500
-
SSDEEP
6144:y64R1xbxpyndBCKQL8c/8jEpTN2KcZ/Gu2cNB:y64R1xbxMGL/8jaAZ2cN
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat wdicookies.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wdicookies.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddadccb06dd3535f04acc27f0e27b855_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddadccb06dd3535f04acc27f0e27b855_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wdicookies.exe -
Modifies data under HKEY_USERS 19 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections wdicookies.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings wdicookies.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 wdicookies.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{7B4F330F-418D-4F0A-9BA3-DE307D02709F} wdicookies.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\06-53-e1-5b-f7-56\WpadDecisionReason = "1" wdicookies.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings wdicookies.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 wdicookies.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{7B4F330F-418D-4F0A-9BA3-DE307D02709F}\WpadDecisionReason = "1" wdicookies.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{7B4F330F-418D-4F0A-9BA3-DE307D02709F}\06-53-e1-5b-f7-56 wdicookies.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{7B4F330F-418D-4F0A-9BA3-DE307D02709F}\WpadDecisionTime = 60cbd6fd9505db01 wdicookies.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{7B4F330F-418D-4F0A-9BA3-DE307D02709F}\WpadNetworkName = "Network 3" wdicookies.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\06-53-e1-5b-f7-56 wdicookies.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\06-53-e1-5b-f7-56\WpadDecisionTime = 60cbd6fd9505db01 wdicookies.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\06-53-e1-5b-f7-56\WpadDecision = "0" wdicookies.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\06-53-e1-5b-f7-56\WpadDetectedUrl wdicookies.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" wdicookies.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad wdicookies.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 wdicookies.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{7B4F330F-418D-4F0A-9BA3-DE307D02709F}\WpadDecision = "0" wdicookies.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1732 ddadccb06dd3535f04acc27f0e27b855_JaffaCakes118.exe 280 ddadccb06dd3535f04acc27f0e27b855_JaffaCakes118.exe 2156 wdicookies.exe 2908 wdicookies.exe 2908 wdicookies.exe 2908 wdicookies.exe 2908 wdicookies.exe 2908 wdicookies.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 280 ddadccb06dd3535f04acc27f0e27b855_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1732 wrote to memory of 280 1732 ddadccb06dd3535f04acc27f0e27b855_JaffaCakes118.exe 30 PID 1732 wrote to memory of 280 1732 ddadccb06dd3535f04acc27f0e27b855_JaffaCakes118.exe 30 PID 1732 wrote to memory of 280 1732 ddadccb06dd3535f04acc27f0e27b855_JaffaCakes118.exe 30 PID 1732 wrote to memory of 280 1732 ddadccb06dd3535f04acc27f0e27b855_JaffaCakes118.exe 30 PID 2156 wrote to memory of 2908 2156 wdicookies.exe 32 PID 2156 wrote to memory of 2908 2156 wdicookies.exe 32 PID 2156 wrote to memory of 2908 2156 wdicookies.exe 32 PID 2156 wrote to memory of 2908 2156 wdicookies.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\ddadccb06dd3535f04acc27f0e27b855_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ddadccb06dd3535f04acc27f0e27b855_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\ddadccb06dd3535f04acc27f0e27b855_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ddadccb06dd3535f04acc27f0e27b855_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:280
-
-
C:\Windows\SysWOW64\wdicookies.exe"C:\Windows\SysWOW64\wdicookies.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\SysWOW64\wdicookies.exe"C:\Windows\SysWOW64\wdicookies.exe"2⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:2908
-