Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-09-2024 21:38
Static task
static1
Behavioral task
behavioral1
Sample
e7c098a75ce01ddea835d4aaaffc49fb_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
e7c098a75ce01ddea835d4aaaffc49fb_JaffaCakes118.exe
-
Size
188KB
-
MD5
e7c098a75ce01ddea835d4aaaffc49fb
-
SHA1
1626bf14a401248ad795a2b745c0e3c1a424bef2
-
SHA256
09f0e8f41f2edc6f2fcb1130dfce6fda5e8f2762c7e3c40b72bf743374818033
-
SHA512
51e4b45e3add17fec7a04d2cb7aa512383f19716b979b9fa94c2dc9b8940f65c55cb47536495c9f052eb8a8058d1aa5aa1eb80c17f8a4c9b3a849e4af910e0ee
-
SSDEEP
3072:/5I6oxzgrhaaHrJrGjJKv+xdE4XT6MmTmPJEl3gyJ4Hw0Emm3pk:/K6BIaHrJ6jJhxdE4GMUmRExCQa
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat moreinitial.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language moreinitial.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language moreinitial.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e7c098a75ce01ddea835d4aaaffc49fb_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e7c098a75ce01ddea835d4aaaffc49fb_JaffaCakes118.exe -
Modifies data under HKEY_USERS 19 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6CA9F2F1-D11F-47EC-B476-543690AB9373}\WpadDecision = "0" moreinitial.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6CA9F2F1-D11F-47EC-B476-543690AB9373}\d6-f8-95-40-c0-30 moreinitial.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\d6-f8-95-40-c0-30\WpadDecisionReason = "1" moreinitial.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6CA9F2F1-D11F-47EC-B476-543690AB9373} moreinitial.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6CA9F2F1-D11F-47EC-B476-543690AB9373}\WpadDecisionReason = "1" moreinitial.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6CA9F2F1-D11F-47EC-B476-543690AB9373}\WpadDecisionTime = 1087ba0f4a09db01 moreinitial.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings moreinitial.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" moreinitial.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 moreinitial.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00d0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 moreinitial.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings moreinitial.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections moreinitial.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\d6-f8-95-40-c0-30\WpadDecision = "0" moreinitial.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\d6-f8-95-40-c0-30\WpadDecisionTime = 1087ba0f4a09db01 moreinitial.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\d6-f8-95-40-c0-30\WpadDetectedUrl moreinitial.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 moreinitial.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad moreinitial.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6CA9F2F1-D11F-47EC-B476-543690AB9373}\WpadNetworkName = "Network 3" moreinitial.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\d6-f8-95-40-c0-30 moreinitial.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2612 e7c098a75ce01ddea835d4aaaffc49fb_JaffaCakes118.exe 2724 e7c098a75ce01ddea835d4aaaffc49fb_JaffaCakes118.exe 2272 moreinitial.exe 2876 moreinitial.exe 2876 moreinitial.exe 2876 moreinitial.exe 2876 moreinitial.exe 2876 moreinitial.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2724 e7c098a75ce01ddea835d4aaaffc49fb_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2612 wrote to memory of 2724 2612 e7c098a75ce01ddea835d4aaaffc49fb_JaffaCakes118.exe 30 PID 2612 wrote to memory of 2724 2612 e7c098a75ce01ddea835d4aaaffc49fb_JaffaCakes118.exe 30 PID 2612 wrote to memory of 2724 2612 e7c098a75ce01ddea835d4aaaffc49fb_JaffaCakes118.exe 30 PID 2612 wrote to memory of 2724 2612 e7c098a75ce01ddea835d4aaaffc49fb_JaffaCakes118.exe 30 PID 2272 wrote to memory of 2876 2272 moreinitial.exe 32 PID 2272 wrote to memory of 2876 2272 moreinitial.exe 32 PID 2272 wrote to memory of 2876 2272 moreinitial.exe 32 PID 2272 wrote to memory of 2876 2272 moreinitial.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\e7c098a75ce01ddea835d4aaaffc49fb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e7c098a75ce01ddea835d4aaaffc49fb_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\e7c098a75ce01ddea835d4aaaffc49fb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e7c098a75ce01ddea835d4aaaffc49fb_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:2724
-
-
C:\Windows\SysWOW64\moreinitial.exe"C:\Windows\SysWOW64\moreinitial.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\SysWOW64\moreinitial.exe"C:\Windows\SysWOW64\moreinitial.exe"2⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:2876
-