Analysis
-
max time kernel
131s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
20-09-2024 05:10
Static task
static1
Behavioral task
behavioral1
Sample
ece6da6784cf8a772cb73a37b02ba4a5_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
ece6da6784cf8a772cb73a37b02ba4a5_JaffaCakes118.exe
-
Size
140KB
-
MD5
ece6da6784cf8a772cb73a37b02ba4a5
-
SHA1
aa15cc324a36cad5a549a6e4ca5c6dabff5b0d2a
-
SHA256
b3eb40865a7bbf708dad012a168aae4003b455d90891d92a340b2087e1b96ea7
-
SHA512
11dad06c82db5a21e0cbfbb96f2475b436f79becd570420f7160c7bf7dfc451ed317c28fda1387beac5e5a47da43c4825eeeba0a9ce514b2544093ca95d9e962
-
SSDEEP
3072:njWGlM5RaoCcQXUbs10tqSbE0ZivIpGI/zsvYb:njOBS0tq/ReGIwv
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat minimetagen.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ece6da6784cf8a772cb73a37b02ba4a5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language minimetagen.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language minimetagen.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ece6da6784cf8a772cb73a37b02ba4a5_JaffaCakes118.exe -
Modifies data under HKEY_USERS 18 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections minimetagen.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" minimetagen.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 minimetagen.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad minimetagen.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\76-c1-f0-52-6f-17\WpadDecisionTime = a03efa731b0bdb01 minimetagen.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 minimetagen.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{376C01D5-8CD7-4CAD-8C77-8E04F10D503D}\WpadDecisionReason = "1" minimetagen.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{376C01D5-8CD7-4CAD-8C77-8E04F10D503D}\WpadDecisionTime = a03efa731b0bdb01 minimetagen.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\76-c1-f0-52-6f-17\WpadDecisionReason = "1" minimetagen.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{376C01D5-8CD7-4CAD-8C77-8E04F10D503D} minimetagen.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{376C01D5-8CD7-4CAD-8C77-8E04F10D503D}\WpadDecision = "0" minimetagen.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\76-c1-f0-52-6f-17 minimetagen.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\76-c1-f0-52-6f-17\WpadDecision = "0" minimetagen.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings minimetagen.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings minimetagen.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0199000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 minimetagen.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{376C01D5-8CD7-4CAD-8C77-8E04F10D503D}\WpadNetworkName = "Network 3" minimetagen.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{376C01D5-8CD7-4CAD-8C77-8E04F10D503D}\76-c1-f0-52-6f-17 minimetagen.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 304 ece6da6784cf8a772cb73a37b02ba4a5_JaffaCakes118.exe 1572 ece6da6784cf8a772cb73a37b02ba4a5_JaffaCakes118.exe 2500 minimetagen.exe 2364 minimetagen.exe 2364 minimetagen.exe 2364 minimetagen.exe 2364 minimetagen.exe 2364 minimetagen.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1572 ece6da6784cf8a772cb73a37b02ba4a5_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 304 wrote to memory of 1572 304 ece6da6784cf8a772cb73a37b02ba4a5_JaffaCakes118.exe 30 PID 304 wrote to memory of 1572 304 ece6da6784cf8a772cb73a37b02ba4a5_JaffaCakes118.exe 30 PID 304 wrote to memory of 1572 304 ece6da6784cf8a772cb73a37b02ba4a5_JaffaCakes118.exe 30 PID 304 wrote to memory of 1572 304 ece6da6784cf8a772cb73a37b02ba4a5_JaffaCakes118.exe 30 PID 2500 wrote to memory of 2364 2500 minimetagen.exe 32 PID 2500 wrote to memory of 2364 2500 minimetagen.exe 32 PID 2500 wrote to memory of 2364 2500 minimetagen.exe 32 PID 2500 wrote to memory of 2364 2500 minimetagen.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\ece6da6784cf8a772cb73a37b02ba4a5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ece6da6784cf8a772cb73a37b02ba4a5_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:304 -
C:\Users\Admin\AppData\Local\Temp\ece6da6784cf8a772cb73a37b02ba4a5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ece6da6784cf8a772cb73a37b02ba4a5_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:1572
-
-
C:\Windows\SysWOW64\minimetagen.exe"C:\Windows\SysWOW64\minimetagen.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\SysWOW64\minimetagen.exe"C:\Windows\SysWOW64\minimetagen.exe"2⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:2364
-