Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 05:29
Static task
static1
Behavioral task
behavioral1
Sample
f54a9db119590767f3794aaa5535892f_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
f54a9db119590767f3794aaa5535892f_JaffaCakes118.exe
-
Size
200KB
-
MD5
f54a9db119590767f3794aaa5535892f
-
SHA1
a9d9002a57044a83d6f580d22194845fc92a00c9
-
SHA256
c89f1e55b418a4447394994498971c6e6f3848bfe39ef9ba6fb255791358b00c
-
SHA512
d7b84b60e6370ae1b5c6f8b379da9c49d6a3ba125b98583fe1f2b19f7cf363af94a7a0c049ddcdde69d3ed1ffe747800e70b41b7230e842c55029ef342c23a15
-
SSDEEP
768:FH5frvbEOM9VGVVXzLbRu/7069GtaPejb2W7ifJ+WZ3dmechOQE0M+E2luUyy1mE:h5X+9VGfpa70QuifFZwTMOubYh
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat evtdevice.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f54a9db119590767f3794aaa5535892f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f54a9db119590767f3794aaa5535892f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language evtdevice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language evtdevice.exe -
Modifies data under HKEY_USERS 21 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings evtdevice.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix evtdevice.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" evtdevice.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 evtdevice.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6D800F1A-0E69-452F-AEEE-47F7FA174BAC}\WpadDecisionTime = 40d9e4e60b0fdb01 evtdevice.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" evtdevice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad evtdevice.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6D800F1A-0E69-452F-AEEE-47F7FA174BAC}\WpadDecisionReason = "1" evtdevice.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6D800F1A-0E69-452F-AEEE-47F7FA174BAC}\WpadNetworkName = "Network 3" evtdevice.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\4a-a9-90-00-b0-f0\WpadDecisionReason = "1" evtdevice.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\4a-a9-90-00-b0-f0\WpadDecisionTime = 40d9e4e60b0fdb01 evtdevice.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" evtdevice.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6D800F1A-0E69-452F-AEEE-47F7FA174BAC} evtdevice.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\4a-a9-90-00-b0-f0 evtdevice.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\4a-a9-90-00-b0-f0\WpadDecision = "0" evtdevice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections evtdevice.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 evtdevice.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings evtdevice.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00b4000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 evtdevice.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6D800F1A-0E69-452F-AEEE-47F7FA174BAC}\WpadDecision = "0" evtdevice.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6D800F1A-0E69-452F-AEEE-47F7FA174BAC}\4a-a9-90-00-b0-f0 evtdevice.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2776 evtdevice.exe 2776 evtdevice.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2092 f54a9db119590767f3794aaa5535892f_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2656 wrote to memory of 2092 2656 f54a9db119590767f3794aaa5535892f_JaffaCakes118.exe 30 PID 2656 wrote to memory of 2092 2656 f54a9db119590767f3794aaa5535892f_JaffaCakes118.exe 30 PID 2656 wrote to memory of 2092 2656 f54a9db119590767f3794aaa5535892f_JaffaCakes118.exe 30 PID 2656 wrote to memory of 2092 2656 f54a9db119590767f3794aaa5535892f_JaffaCakes118.exe 30 PID 2620 wrote to memory of 2776 2620 evtdevice.exe 32 PID 2620 wrote to memory of 2776 2620 evtdevice.exe 32 PID 2620 wrote to memory of 2776 2620 evtdevice.exe 32 PID 2620 wrote to memory of 2776 2620 evtdevice.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\f54a9db119590767f3794aaa5535892f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f54a9db119590767f3794aaa5535892f_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\f54a9db119590767f3794aaa5535892f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f54a9db119590767f3794aaa5535892f_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:2092
-
-
C:\Windows\SysWOW64\evtdevice.exeC:\Windows\SysWOW64\evtdevice.exe1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\SysWOW64\evtdevice.exe"C:\Windows\SysWOW64\evtdevice.exe"2⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:2776
-