Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-09-2024 23:39
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
e5c5ba17d9bb9a06bb1ae7e0ee487738_JaffaCakes118.exe
Resource
win7-20240903-en
windows7-x64
8 signatures
150 seconds
General
-
Target
e5c5ba17d9bb9a06bb1ae7e0ee487738_JaffaCakes118.exe
-
Size
351KB
-
MD5
e5c5ba17d9bb9a06bb1ae7e0ee487738
-
SHA1
4544d3c86ca59cb897779f0f18b7ad66165e895a
-
SHA256
7a193445506edfba002de1305d534512aa052417ebedff3829bf830b5289b528
-
SHA512
be9071b5da7608fc9683213dcf4be0877f7a8f298163d1b3d7733e20878478daf2ab7307f6dfa926c594d82f747f48285f1baa376a3e180ec627f74d559c99a7
-
SSDEEP
3072:HR7jbNafUsiVVCgNgWSagbJMgA7XphMc23x:HR7HY8fuYg/7GvVqc
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat symbolreports.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e5c5ba17d9bb9a06bb1ae7e0ee487738_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e5c5ba17d9bb9a06bb1ae7e0ee487738_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language symbolreports.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language symbolreports.exe -
Modifies data under HKEY_USERS 19 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{C40EB86E-213D-43C4-92F0-569BAFC6281A}\8e-ab-f7-1e-bb-91 symbolreports.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8e-ab-f7-1e-bb-91\WpadDecisionTime = c024dfc49108db01 symbolreports.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" symbolreports.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings symbolreports.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 symbolreports.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00c5000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 symbolreports.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{C40EB86E-213D-43C4-92F0-569BAFC6281A} symbolreports.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{C40EB86E-213D-43C4-92F0-569BAFC6281A}\WpadDecision = "0" symbolreports.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8e-ab-f7-1e-bb-91 symbolreports.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8e-ab-f7-1e-bb-91\WpadDetectedUrl symbolreports.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 symbolreports.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{C40EB86E-213D-43C4-92F0-569BAFC6281A}\WpadDecisionReason = "1" symbolreports.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{C40EB86E-213D-43C4-92F0-569BAFC6281A}\WpadNetworkName = "Network 3" symbolreports.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8e-ab-f7-1e-bb-91\WpadDecisionReason = "1" symbolreports.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8e-ab-f7-1e-bb-91\WpadDecision = "0" symbolreports.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings symbolreports.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad symbolreports.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{C40EB86E-213D-43C4-92F0-569BAFC6281A}\WpadDecisionTime = c024dfc49108db01 symbolreports.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections symbolreports.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2088 e5c5ba17d9bb9a06bb1ae7e0ee487738_JaffaCakes118.exe 2392 e5c5ba17d9bb9a06bb1ae7e0ee487738_JaffaCakes118.exe 2804 symbolreports.exe 2760 symbolreports.exe 2760 symbolreports.exe 2760 symbolreports.exe 2760 symbolreports.exe 2760 symbolreports.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2392 e5c5ba17d9bb9a06bb1ae7e0ee487738_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2392 2088 e5c5ba17d9bb9a06bb1ae7e0ee487738_JaffaCakes118.exe 30 PID 2088 wrote to memory of 2392 2088 e5c5ba17d9bb9a06bb1ae7e0ee487738_JaffaCakes118.exe 30 PID 2088 wrote to memory of 2392 2088 e5c5ba17d9bb9a06bb1ae7e0ee487738_JaffaCakes118.exe 30 PID 2088 wrote to memory of 2392 2088 e5c5ba17d9bb9a06bb1ae7e0ee487738_JaffaCakes118.exe 30 PID 2804 wrote to memory of 2760 2804 symbolreports.exe 32 PID 2804 wrote to memory of 2760 2804 symbolreports.exe 32 PID 2804 wrote to memory of 2760 2804 symbolreports.exe 32 PID 2804 wrote to memory of 2760 2804 symbolreports.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\e5c5ba17d9bb9a06bb1ae7e0ee487738_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e5c5ba17d9bb9a06bb1ae7e0ee487738_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\e5c5ba17d9bb9a06bb1ae7e0ee487738_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e5c5ba17d9bb9a06bb1ae7e0ee487738_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:2392
-
-
C:\Windows\SysWOW64\symbolreports.exe"C:\Windows\SysWOW64\symbolreports.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\symbolreports.exe"C:\Windows\SysWOW64\symbolreports.exe"2⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:2760
-