Analysis
-
max time kernel
129s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-09-2024 09:23
Behavioral task
behavioral1
Sample
f352d0ffcbdd0e16445a1753246664ca_JaffaCakes118.exe
Resource
win7-20240903-en
windows7-x64
9 signatures
150 seconds
General
-
Target
f352d0ffcbdd0e16445a1753246664ca_JaffaCakes118.exe
-
Size
360KB
-
MD5
f352d0ffcbdd0e16445a1753246664ca
-
SHA1
2f37c5db726a9db9a0e88c5800f5dfd9f8666457
-
SHA256
894086b75688a1108d0a73f49ad12ca19f718c142222836980293422fba1c172
-
SHA512
8dbe50bbb20e661bcf030b8468b10eb9424a994aef45c42329631ce9ff8a86174e2f7e86147b3df86aa8e166d23eed8e182f01eff83616138775e9f3ef3d3e0e
-
SSDEEP
3072:cA2O3T9702oCXeca1BmaKGDbEJglbr4nSeN5WEghgVI8AFMK/U:bT9702oCOcImaKGDbEOGSerEhgVIXFM5
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat rightresw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f352d0ffcbdd0e16445a1753246664ca_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rightresw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rightresw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f352d0ffcbdd0e16445a1753246664ca_JaffaCakes118.exe -
Modifies data under HKEY_USERS 18 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings rightresw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections rightresw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{74F04B6F-3BBC-4608-983A-AA8B8CA2CC9E} rightresw.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{74F04B6F-3BBC-4608-983A-AA8B8CA2CC9E}\WpadDecisionReason = "1" rightresw.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{74F04B6F-3BBC-4608-983A-AA8B8CA2CC9E}\WpadDecisionTime = b070587e630edb01 rightresw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{74F04B6F-3BBC-4608-983A-AA8B8CA2CC9E}\ea-a1-ea-f9-89-5c rightresw.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ea-a1-ea-f9-89-5c\WpadDecisionTime = b070587e630edb01 rightresw.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 rightresw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings rightresw.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" rightresw.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00c8000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 rightresw.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{74F04B6F-3BBC-4608-983A-AA8B8CA2CC9E}\WpadDecision = "0" rightresw.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ea-a1-ea-f9-89-5c rightresw.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 rightresw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad rightresw.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{74F04B6F-3BBC-4608-983A-AA8B8CA2CC9E}\WpadNetworkName = "Network 3" rightresw.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ea-a1-ea-f9-89-5c\WpadDecisionReason = "1" rightresw.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ea-a1-ea-f9-89-5c\WpadDecision = "0" rightresw.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 1056 f352d0ffcbdd0e16445a1753246664ca_JaffaCakes118.exe 2720 f352d0ffcbdd0e16445a1753246664ca_JaffaCakes118.exe 2780 rightresw.exe 2704 rightresw.exe 2704 rightresw.exe 2704 rightresw.exe 2704 rightresw.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2720 f352d0ffcbdd0e16445a1753246664ca_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 4 IoCs
pid Process 1056 f352d0ffcbdd0e16445a1753246664ca_JaffaCakes118.exe 2720 f352d0ffcbdd0e16445a1753246664ca_JaffaCakes118.exe 2780 rightresw.exe 2704 rightresw.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1056 wrote to memory of 2720 1056 f352d0ffcbdd0e16445a1753246664ca_JaffaCakes118.exe 30 PID 1056 wrote to memory of 2720 1056 f352d0ffcbdd0e16445a1753246664ca_JaffaCakes118.exe 30 PID 1056 wrote to memory of 2720 1056 f352d0ffcbdd0e16445a1753246664ca_JaffaCakes118.exe 30 PID 1056 wrote to memory of 2720 1056 f352d0ffcbdd0e16445a1753246664ca_JaffaCakes118.exe 30 PID 2780 wrote to memory of 2704 2780 rightresw.exe 32 PID 2780 wrote to memory of 2704 2780 rightresw.exe 32 PID 2780 wrote to memory of 2704 2780 rightresw.exe 32 PID 2780 wrote to memory of 2704 2780 rightresw.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\f352d0ffcbdd0e16445a1753246664ca_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f352d0ffcbdd0e16445a1753246664ca_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Users\Admin\AppData\Local\Temp\f352d0ffcbdd0e16445a1753246664ca_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f352d0ffcbdd0e16445a1753246664ca_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
PID:2720
-
-
C:\Windows\SysWOW64\rightresw.exe"C:\Windows\SysWOW64\rightresw.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\rightresw.exe"C:\Windows\SysWOW64\rightresw.exe"2⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:2704
-