Analysis
-
max time kernel
132s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
15-09-2024 21:56
Static task
static1
Behavioral task
behavioral1
Sample
e36fa261697b3d09989d9f37b4eaf7b8_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
e36fa261697b3d09989d9f37b4eaf7b8_JaffaCakes118.exe
-
Size
168KB
-
MD5
e36fa261697b3d09989d9f37b4eaf7b8
-
SHA1
f24520d28abf7755e13c11595be4d2875e7b1e8a
-
SHA256
7ff74dfe2aea2073e698eb489a20ef687450dfce2a9b87fb588a5e9314ceeee0
-
SHA512
7796c4dae8d81a86b6a3c36c4fd4fc15ba29b47ca675ab4eef55b5d76dd31f2a7c8458b43cadb2acb6191fb433090eb7203607cd3ce04e35add899492f3368d6
-
SSDEEP
3072:AOcwqx2eHI6ptwmAm/TnxZ7xZ2sz0CXmA/:AOheHI6ptwvOTxFHACd/
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat layouthei.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language layouthei.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e36fa261697b3d09989d9f37b4eaf7b8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e36fa261697b3d09989d9f37b4eaf7b8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language layouthei.exe -
Modifies data under HKEY_USERS 18 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad layouthei.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{9D9421D3-DDFD-4F5A-A6E0-282D7C20C8B2}\fe-b5-7d-4e-08-22 layouthei.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fe-b5-7d-4e-08-22\WpadDecisionTime = d0591022ba07db01 layouthei.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections layouthei.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 layouthei.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{9D9421D3-DDFD-4F5A-A6E0-282D7C20C8B2}\WpadDecisionTime = d0591022ba07db01 layouthei.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{9D9421D3-DDFD-4F5A-A6E0-282D7C20C8B2}\WpadDecision = "0" layouthei.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fe-b5-7d-4e-08-22 layouthei.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" layouthei.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{9D9421D3-DDFD-4F5A-A6E0-282D7C20C8B2} layouthei.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{9D9421D3-DDFD-4F5A-A6E0-282D7C20C8B2}\WpadDecisionReason = "1" layouthei.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 layouthei.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f018f000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 layouthei.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{9D9421D3-DDFD-4F5A-A6E0-282D7C20C8B2}\WpadNetworkName = "Network 3" layouthei.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fe-b5-7d-4e-08-22\WpadDecisionReason = "1" layouthei.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fe-b5-7d-4e-08-22\WpadDecision = "0" layouthei.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings layouthei.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings layouthei.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 2112 e36fa261697b3d09989d9f37b4eaf7b8_JaffaCakes118.exe 2524 e36fa261697b3d09989d9f37b4eaf7b8_JaffaCakes118.exe 2824 layouthei.exe 2468 layouthei.exe 2468 layouthei.exe 2468 layouthei.exe 2468 layouthei.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2524 e36fa261697b3d09989d9f37b4eaf7b8_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2112 wrote to memory of 2524 2112 e36fa261697b3d09989d9f37b4eaf7b8_JaffaCakes118.exe 30 PID 2112 wrote to memory of 2524 2112 e36fa261697b3d09989d9f37b4eaf7b8_JaffaCakes118.exe 30 PID 2112 wrote to memory of 2524 2112 e36fa261697b3d09989d9f37b4eaf7b8_JaffaCakes118.exe 30 PID 2112 wrote to memory of 2524 2112 e36fa261697b3d09989d9f37b4eaf7b8_JaffaCakes118.exe 30 PID 2824 wrote to memory of 2468 2824 layouthei.exe 32 PID 2824 wrote to memory of 2468 2824 layouthei.exe 32 PID 2824 wrote to memory of 2468 2824 layouthei.exe 32 PID 2824 wrote to memory of 2468 2824 layouthei.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\e36fa261697b3d09989d9f37b4eaf7b8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e36fa261697b3d09989d9f37b4eaf7b8_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\e36fa261697b3d09989d9f37b4eaf7b8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e36fa261697b3d09989d9f37b4eaf7b8_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:2524
-
-
C:\Windows\SysWOW64\layouthei.exe"C:\Windows\SysWOW64\layouthei.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\layouthei.exe"C:\Windows\SysWOW64\layouthei.exe"2⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:2468
-