Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-09-2024 11:42
Static task
static1
Behavioral task
behavioral1
Sample
efb7a3e2cb8f232021f1c5e081073998_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
efb7a3e2cb8f232021f1c5e081073998_JaffaCakes118.exe
-
Size
163KB
-
MD5
efb7a3e2cb8f232021f1c5e081073998
-
SHA1
0f7143d8798ea1ef4a3611410442732a9a23b13a
-
SHA256
273b13b692817e33ad527583c8594e133d378bfc4fdbd09be1c9228253024192
-
SHA512
b6b46eb1addb6598798e220b3727532dff13eb3287da23b6ad42eaca0f4f46c35703cfc4c1e19eb1d47c04fd06003a7c6b01ce1fbf0118125ef27d1c1b90d69e
-
SSDEEP
3072:4WMG0BC83uZtGi5jKJZxgedEZoj53JwU90WZXH6woQnk5+iIg:4XC83nZSedEZoj53lp6Inz
Malware Config
Signatures
-
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 smallnis.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE smallnis.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies smallnis.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 smallnis.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language efb7a3e2cb8f232021f1c5e081073998_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language smallnis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language smallnis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language efb7a3e2cb8f232021f1c5e081073998_JaffaCakes118.exe -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix smallnis.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" smallnis.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" smallnis.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4272 smallnis.exe 4272 smallnis.exe 4272 smallnis.exe 4272 smallnis.exe 4272 smallnis.exe 4272 smallnis.exe 4272 smallnis.exe 4272 smallnis.exe 4272 smallnis.exe 4272 smallnis.exe 4272 smallnis.exe 4272 smallnis.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3432 efb7a3e2cb8f232021f1c5e081073998_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3328 wrote to memory of 3432 3328 efb7a3e2cb8f232021f1c5e081073998_JaffaCakes118.exe 82 PID 3328 wrote to memory of 3432 3328 efb7a3e2cb8f232021f1c5e081073998_JaffaCakes118.exe 82 PID 3328 wrote to memory of 3432 3328 efb7a3e2cb8f232021f1c5e081073998_JaffaCakes118.exe 82 PID 1172 wrote to memory of 4272 1172 smallnis.exe 89 PID 1172 wrote to memory of 4272 1172 smallnis.exe 89 PID 1172 wrote to memory of 4272 1172 smallnis.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\efb7a3e2cb8f232021f1c5e081073998_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\efb7a3e2cb8f232021f1c5e081073998_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3328 -
C:\Users\Admin\AppData\Local\Temp\efb7a3e2cb8f232021f1c5e081073998_JaffaCakes118.exe--ceae77992⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:3432
-
-
C:\Windows\SysWOW64\smallnis.exe"C:\Windows\SysWOW64\smallnis.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Windows\SysWOW64\smallnis.exe--a66d08632⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:4272
-