Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22-09-2024 12:19
Static task
static1
Behavioral task
behavioral1
Sample
f201ccf75b52afa7295b6c662092f451_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
f201ccf75b52afa7295b6c662092f451_JaffaCakes118.exe
-
Size
286KB
-
MD5
f201ccf75b52afa7295b6c662092f451
-
SHA1
eae01e6b635b96eb094ae64af49b6cac4c7656a5
-
SHA256
151cdb9a2bb9dea69dddce861966ad521df75afe5a93a7992d90a64cac35d0a5
-
SHA512
8ade91f3731fd8fe35586be58f706c00ef9844f733fbe1cbf8a16e87d48a4a585453d6dcae2c57571f0ded91ebc838cf870e936db7e08997c15792ee96d32353
-
SSDEEP
3072:vcGI33VwvcFRl1cRLBu35vMVkX/cgNYPskOVwNw92J:UGoFrl1chBupMkUgN6A
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat moreentry.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f201ccf75b52afa7295b6c662092f451_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f201ccf75b52afa7295b6c662092f451_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language moreentry.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language moreentry.exe -
Modifies data under HKEY_USERS 22 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 moreentry.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{4F0F7CB8-C4A2-48AD-BCAC-60A12B712265}\WpadDecision = "0" moreentry.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 moreentry.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" moreentry.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000004000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00b3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 moreentry.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{4F0F7CB8-C4A2-48AD-BCAC-60A12B712265}\WpadDecisionTime = d01e7af0e90cdb01 moreentry.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\06-a0-79-7d-60-5b\WpadDecisionTime = d01e7af0e90cdb01 moreentry.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings moreentry.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{4F0F7CB8-C4A2-48AD-BCAC-60A12B712265}\06-a0-79-7d-60-5b moreentry.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{4F0F7CB8-C4A2-48AD-BCAC-60A12B712265}\WpadNetworkName = "Network 3" moreentry.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\06-a0-79-7d-60-5b\WpadDecisionReason = "1" moreentry.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\06-a0-79-7d-60-5b\WpadDecisionTime = f090ef9de90cdb01 moreentry.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad moreentry.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{4F0F7CB8-C4A2-48AD-BCAC-60A12B712265} moreentry.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00b3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 moreentry.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{4F0F7CB8-C4A2-48AD-BCAC-60A12B712265}\WpadDecisionReason = "1" moreentry.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{4F0F7CB8-C4A2-48AD-BCAC-60A12B712265}\WpadDecisionTime = f090ef9de90cdb01 moreentry.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\06-a0-79-7d-60-5b moreentry.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\06-a0-79-7d-60-5b\WpadDecision = "0" moreentry.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\06-a0-79-7d-60-5b\WpadDetectedUrl moreentry.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings moreentry.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections moreentry.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 3020 f201ccf75b52afa7295b6c662092f451_JaffaCakes118.exe 2896 f201ccf75b52afa7295b6c662092f451_JaffaCakes118.exe 2316 moreentry.exe 2644 moreentry.exe 2644 moreentry.exe 2644 moreentry.exe 2644 moreentry.exe 2644 moreentry.exe 2644 moreentry.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2896 f201ccf75b52afa7295b6c662092f451_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3020 wrote to memory of 2896 3020 f201ccf75b52afa7295b6c662092f451_JaffaCakes118.exe 31 PID 3020 wrote to memory of 2896 3020 f201ccf75b52afa7295b6c662092f451_JaffaCakes118.exe 31 PID 3020 wrote to memory of 2896 3020 f201ccf75b52afa7295b6c662092f451_JaffaCakes118.exe 31 PID 3020 wrote to memory of 2896 3020 f201ccf75b52afa7295b6c662092f451_JaffaCakes118.exe 31 PID 2316 wrote to memory of 2644 2316 moreentry.exe 33 PID 2316 wrote to memory of 2644 2316 moreentry.exe 33 PID 2316 wrote to memory of 2644 2316 moreentry.exe 33 PID 2316 wrote to memory of 2644 2316 moreentry.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\f201ccf75b52afa7295b6c662092f451_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f201ccf75b52afa7295b6c662092f451_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\f201ccf75b52afa7295b6c662092f451_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f201ccf75b52afa7295b6c662092f451_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:2896
-
-
C:\Windows\SysWOW64\moreentry.exe"C:\Windows\SysWOW64\moreentry.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\moreentry.exe"C:\Windows\SysWOW64\moreentry.exe"2⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:2644
-