Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 06:57
Static task
static1
Behavioral task
behavioral1
Sample
ef4701659ecf031b713136fa587388fc_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
ef4701659ecf031b713136fa587388fc_JaffaCakes118.exe
-
Size
204KB
-
MD5
ef4701659ecf031b713136fa587388fc
-
SHA1
23a94c796bc1dce4b34d9dd2434693e1f58db6de
-
SHA256
df8daf3b8f4bfa739108c0ff1b8ba40c9e2be17f7fc8b7a704e3aa777fbaefae
-
SHA512
b8b642f5ec83b8ba055e1235fbd81aaf2be1ca128a2949d6f96a14abbbf1af235cca2c0f639d796ec8348489a71f2481a39360a3f345e513aec5c06981f93ecc
-
SSDEEP
3072:HbrPNCeBvpiVEiVbmxnhxMDcuPaPPJ8wxsdOqsJ3MBTyv//6Qf:HbrNCeBvpieAih2DtCOOqsJMBmP1
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mhegapply.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mhegapply.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mhegapply.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ef4701659ecf031b713136fa587388fc_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ef4701659ecf031b713136fa587388fc_JaffaCakes118.exe -
Modifies data under HKEY_USERS 19 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mhegapply.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mhegapply.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mhegapply.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f018a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mhegapply.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{1EAC05C4-E3A0-4562-AE33-B51979D4EF2E}\WpadDecisionReason = "1" mhegapply.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{1EAC05C4-E3A0-4562-AE33-B51979D4EF2E}\WpadDecision = "0" mhegapply.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fe-36-61-07-cf-2c\WpadDetectedUrl mhegapply.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mhegapply.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mhegapply.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{1EAC05C4-E3A0-4562-AE33-B51979D4EF2E} mhegapply.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fe-36-61-07-cf-2c mhegapply.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fe-36-61-07-cf-2c\WpadDecisionReason = "1" mhegapply.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mhegapply.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{1EAC05C4-E3A0-4562-AE33-B51979D4EF2E}\WpadDecisionTime = 40fa3ea5f30bdb01 mhegapply.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{1EAC05C4-E3A0-4562-AE33-B51979D4EF2E}\WpadNetworkName = "Network 3" mhegapply.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fe-36-61-07-cf-2c\WpadDecisionTime = 40fa3ea5f30bdb01 mhegapply.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mhegapply.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{1EAC05C4-E3A0-4562-AE33-B51979D4EF2E}\fe-36-61-07-cf-2c mhegapply.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fe-36-61-07-cf-2c\WpadDecision = "0" mhegapply.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2084 ef4701659ecf031b713136fa587388fc_JaffaCakes118.exe 2220 ef4701659ecf031b713136fa587388fc_JaffaCakes118.exe 2996 mhegapply.exe 2740 mhegapply.exe 2740 mhegapply.exe 2740 mhegapply.exe 2740 mhegapply.exe 2740 mhegapply.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2220 ef4701659ecf031b713136fa587388fc_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2220 2084 ef4701659ecf031b713136fa587388fc_JaffaCakes118.exe 30 PID 2084 wrote to memory of 2220 2084 ef4701659ecf031b713136fa587388fc_JaffaCakes118.exe 30 PID 2084 wrote to memory of 2220 2084 ef4701659ecf031b713136fa587388fc_JaffaCakes118.exe 30 PID 2084 wrote to memory of 2220 2084 ef4701659ecf031b713136fa587388fc_JaffaCakes118.exe 30 PID 2996 wrote to memory of 2740 2996 mhegapply.exe 32 PID 2996 wrote to memory of 2740 2996 mhegapply.exe 32 PID 2996 wrote to memory of 2740 2996 mhegapply.exe 32 PID 2996 wrote to memory of 2740 2996 mhegapply.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\ef4701659ecf031b713136fa587388fc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ef4701659ecf031b713136fa587388fc_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\ef4701659ecf031b713136fa587388fc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ef4701659ecf031b713136fa587388fc_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:2220
-
-
C:\Windows\SysWOW64\mhegapply.exe"C:\Windows\SysWOW64\mhegapply.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SysWOW64\mhegapply.exe"C:\Windows\SysWOW64\mhegapply.exe"2⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:2740
-