Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-09-2024 22:34
Static task
static1
Behavioral task
behavioral1
Sample
e37e9301316e68d379f7da55037f19e7_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
e37e9301316e68d379f7da55037f19e7_JaffaCakes118.exe
-
Size
458KB
-
MD5
e37e9301316e68d379f7da55037f19e7
-
SHA1
8fc17b88fd5f2df6c33b420b44d495c4dc2eff19
-
SHA256
6e1beeca97fd9f3fc3bb6007aa56ca99503e2564da3fb4d70b4420794af06810
-
SHA512
9cac90e8e45ff25dbc9ec0d80712f66aae1ca4bae79069ff460f0654dca2ae1b3aac6812d80d315d04c564fe713bcff4e8f796e466091cfd676a33cfd3171601
-
SSDEEP
3072:BbgGwgZ3AmoU3FakRbkJoqxQgYUaDdZWhDdloHljiu92ePsaT2pOfKWkY+hYDQ6/:BlwOvomak6yP/jZslw5kaTwfLX6x6TM
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat cabinetfooter.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e37e9301316e68d379f7da55037f19e7_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e37e9301316e68d379f7da55037f19e7_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cabinetfooter.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cabinetfooter.exe -
Modifies data under HKEY_USERS 19 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{1482025B-F8D8-4C20-8FBA-7076BCEF5D52} cabinetfooter.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{1482025B-F8D8-4C20-8FBA-7076BCEF5D52}\WpadNetworkName = "Network 3" cabinetfooter.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{1482025B-F8D8-4C20-8FBA-7076BCEF5D52}\d6-48-b6-2b-f5-03 cabinetfooter.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 cabinetfooter.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings cabinetfooter.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\d6-48-b6-2b-f5-03\WpadDetectedUrl cabinetfooter.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{1482025B-F8D8-4C20-8FBA-7076BCEF5D52}\WpadDecisionTime = 5062cc78bf07db01 cabinetfooter.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\d6-48-b6-2b-f5-03\WpadDecision = "0" cabinetfooter.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad cabinetfooter.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00de000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 cabinetfooter.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{1482025B-F8D8-4C20-8FBA-7076BCEF5D52}\WpadDecisionReason = "1" cabinetfooter.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{1482025B-F8D8-4C20-8FBA-7076BCEF5D52}\WpadDecision = "0" cabinetfooter.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\d6-48-b6-2b-f5-03 cabinetfooter.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\d6-48-b6-2b-f5-03\WpadDecisionReason = "1" cabinetfooter.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings cabinetfooter.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections cabinetfooter.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\d6-48-b6-2b-f5-03\WpadDecisionTime = 5062cc78bf07db01 cabinetfooter.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" cabinetfooter.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 cabinetfooter.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1920 e37e9301316e68d379f7da55037f19e7_JaffaCakes118.exe 2328 e37e9301316e68d379f7da55037f19e7_JaffaCakes118.exe 2708 cabinetfooter.exe 2816 cabinetfooter.exe 2816 cabinetfooter.exe 2816 cabinetfooter.exe 2816 cabinetfooter.exe 2816 cabinetfooter.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2328 e37e9301316e68d379f7da55037f19e7_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1920 wrote to memory of 2328 1920 e37e9301316e68d379f7da55037f19e7_JaffaCakes118.exe 30 PID 1920 wrote to memory of 2328 1920 e37e9301316e68d379f7da55037f19e7_JaffaCakes118.exe 30 PID 1920 wrote to memory of 2328 1920 e37e9301316e68d379f7da55037f19e7_JaffaCakes118.exe 30 PID 1920 wrote to memory of 2328 1920 e37e9301316e68d379f7da55037f19e7_JaffaCakes118.exe 30 PID 2708 wrote to memory of 2816 2708 cabinetfooter.exe 32 PID 2708 wrote to memory of 2816 2708 cabinetfooter.exe 32 PID 2708 wrote to memory of 2816 2708 cabinetfooter.exe 32 PID 2708 wrote to memory of 2816 2708 cabinetfooter.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\e37e9301316e68d379f7da55037f19e7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e37e9301316e68d379f7da55037f19e7_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\e37e9301316e68d379f7da55037f19e7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e37e9301316e68d379f7da55037f19e7_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:2328
-
-
C:\Windows\SysWOW64\cabinetfooter.exe"C:\Windows\SysWOW64\cabinetfooter.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\cabinetfooter.exe"C:\Windows\SysWOW64\cabinetfooter.exe"2⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:2816
-