Analysis
-
max time kernel
137s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 02:12
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
df4e8fbaf4e9aea8eba28a773bd68283_JaffaCakes118.exe
Resource
win7-20240729-en
windows7-x64
8 signatures
150 seconds
General
-
Target
df4e8fbaf4e9aea8eba28a773bd68283_JaffaCakes118.exe
-
Size
65KB
-
MD5
df4e8fbaf4e9aea8eba28a773bd68283
-
SHA1
ff6e2a833f6f02f3f1baff03e9c4dd35d086cc2e
-
SHA256
611e4688ec83a89298c8360ab21d3be95d54db67657d3b876c4c459cec4ffd83
-
SHA512
55b957613881748f8e86b93b153f27fdb6b0f330630622b52bb5380739f19c8767d6906ebe5fb36228c529d7788c019403a46467614b4b4e8ad252f461eab1be
-
SSDEEP
1536:35EHpgcVVRF52aEgvWi4Q34FNtOAND4YafN1GK8:kbV7MZM2dH54P6
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat cbswithout.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language df4e8fbaf4e9aea8eba28a773bd68283_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language df4e8fbaf4e9aea8eba28a773bd68283_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cbswithout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cbswithout.exe -
Modifies data under HKEY_USERS 21 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A7989B48-AF7D-454F-A0C2-C1582A834DC4} cbswithout.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A7989B48-AF7D-454F-A0C2-C1582A834DC4}\WpadDecision = "0" cbswithout.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A7989B48-AF7D-454F-A0C2-C1582A834DC4}\WpadNetworkName = "Network 3" cbswithout.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" cbswithout.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad cbswithout.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings cbswithout.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0114000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 cbswithout.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A7989B48-AF7D-454F-A0C2-C1582A834DC4}\WpadDecisionReason = "1" cbswithout.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A7989B48-AF7D-454F-A0C2-C1582A834DC4}\WpadDecisionTime = 20cb0fa94b06db01 cbswithout.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\a6-e4-df-aa-5b-13 cbswithout.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\a6-e4-df-aa-5b-13\WpadDecisionReason = "1" cbswithout.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 cbswithout.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" cbswithout.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\a6-e4-df-aa-5b-13\WpadDecision = "0" cbswithout.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A7989B48-AF7D-454F-A0C2-C1582A834DC4}\a6-e4-df-aa-5b-13 cbswithout.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix cbswithout.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" cbswithout.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 cbswithout.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\a6-e4-df-aa-5b-13\WpadDecisionTime = 20cb0fa94b06db01 cbswithout.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings cbswithout.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections cbswithout.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 1732 df4e8fbaf4e9aea8eba28a773bd68283_JaffaCakes118.exe 2372 df4e8fbaf4e9aea8eba28a773bd68283_JaffaCakes118.exe 1440 cbswithout.exe 2520 cbswithout.exe 2520 cbswithout.exe 2520 cbswithout.exe 2520 cbswithout.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2372 df4e8fbaf4e9aea8eba28a773bd68283_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2372 1732 df4e8fbaf4e9aea8eba28a773bd68283_JaffaCakes118.exe 30 PID 1732 wrote to memory of 2372 1732 df4e8fbaf4e9aea8eba28a773bd68283_JaffaCakes118.exe 30 PID 1732 wrote to memory of 2372 1732 df4e8fbaf4e9aea8eba28a773bd68283_JaffaCakes118.exe 30 PID 1732 wrote to memory of 2372 1732 df4e8fbaf4e9aea8eba28a773bd68283_JaffaCakes118.exe 30 PID 1440 wrote to memory of 2520 1440 cbswithout.exe 33 PID 1440 wrote to memory of 2520 1440 cbswithout.exe 33 PID 1440 wrote to memory of 2520 1440 cbswithout.exe 33 PID 1440 wrote to memory of 2520 1440 cbswithout.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\df4e8fbaf4e9aea8eba28a773bd68283_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\df4e8fbaf4e9aea8eba28a773bd68283_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\df4e8fbaf4e9aea8eba28a773bd68283_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\df4e8fbaf4e9aea8eba28a773bd68283_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:2372
-
-
C:\Windows\SysWOW64\cbswithout.exe"C:\Windows\SysWOW64\cbswithout.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Windows\SysWOW64\cbswithout.exe"C:\Windows\SysWOW64\cbswithout.exe"2⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:2520
-