Analysis
-
max time kernel
132s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 06:07
Static task
static1
Behavioral task
behavioral1
Sample
f55c1c625747ee1084a5f636443ca5cf_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
f55c1c625747ee1084a5f636443ca5cf_JaffaCakes118.exe
-
Size
164KB
-
MD5
f55c1c625747ee1084a5f636443ca5cf
-
SHA1
9f70658daf4e97f150f82d93f4806e0d6df93f76
-
SHA256
1e24a4956139ab7799250afab49e77806e577cd15f731374cdbd84c1ab1fe041
-
SHA512
e690d7e5a5eb24813c65a15266d630b6db051f1fe191ad3b49572f54e2f0d39c114d543d21455805ff7f12c581b26c150927738232e62ab640f7c5bee6018759
-
SSDEEP
1536:SHmJDIOlXrkZR0Nk6YZUkFBLaKFcdSlGVsYXhZVBrs19CQkC00B7UCXdoircDOu:bhrkZRok6AUVp7/55ENmCXdoiA6u
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat shimsmnu.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f55c1c625747ee1084a5f636443ca5cf_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f55c1c625747ee1084a5f636443ca5cf_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shimsmnu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shimsmnu.exe -
Modifies data under HKEY_USERS 18 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6032EFC0-238F-45E7-B363-9A50D32008F0}\WpadDecisionReason = "1" shimsmnu.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6032EFC0-238F-45E7-B363-9A50D32008F0}\WpadNetworkName = "Network 3" shimsmnu.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6032EFC0-238F-45E7-B363-9A50D32008F0}\WpadDecisionTime = c0899c4e110fdb01 shimsmnu.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\9a-18-69-6b-73-40 shimsmnu.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings shimsmnu.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections shimsmnu.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings shimsmnu.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" shimsmnu.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00bc000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 shimsmnu.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6032EFC0-238F-45E7-B363-9A50D32008F0} shimsmnu.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 shimsmnu.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 shimsmnu.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6032EFC0-238F-45E7-B363-9A50D32008F0}\WpadDecision = "0" shimsmnu.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6032EFC0-238F-45E7-B363-9A50D32008F0}\9a-18-69-6b-73-40 shimsmnu.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\9a-18-69-6b-73-40\WpadDecisionTime = c0899c4e110fdb01 shimsmnu.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\9a-18-69-6b-73-40\WpadDecision = "0" shimsmnu.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad shimsmnu.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\9a-18-69-6b-73-40\WpadDecisionReason = "1" shimsmnu.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 2356 f55c1c625747ee1084a5f636443ca5cf_JaffaCakes118.exe 2656 f55c1c625747ee1084a5f636443ca5cf_JaffaCakes118.exe 2840 shimsmnu.exe 2880 shimsmnu.exe 2880 shimsmnu.exe 2880 shimsmnu.exe 2880 shimsmnu.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2656 f55c1c625747ee1084a5f636443ca5cf_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2356 wrote to memory of 2656 2356 f55c1c625747ee1084a5f636443ca5cf_JaffaCakes118.exe 30 PID 2356 wrote to memory of 2656 2356 f55c1c625747ee1084a5f636443ca5cf_JaffaCakes118.exe 30 PID 2356 wrote to memory of 2656 2356 f55c1c625747ee1084a5f636443ca5cf_JaffaCakes118.exe 30 PID 2356 wrote to memory of 2656 2356 f55c1c625747ee1084a5f636443ca5cf_JaffaCakes118.exe 30 PID 2840 wrote to memory of 2880 2840 shimsmnu.exe 32 PID 2840 wrote to memory of 2880 2840 shimsmnu.exe 32 PID 2840 wrote to memory of 2880 2840 shimsmnu.exe 32 PID 2840 wrote to memory of 2880 2840 shimsmnu.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\f55c1c625747ee1084a5f636443ca5cf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f55c1c625747ee1084a5f636443ca5cf_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\f55c1c625747ee1084a5f636443ca5cf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f55c1c625747ee1084a5f636443ca5cf_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:2656
-
-
C:\Windows\SysWOW64\shimsmnu.exe"C:\Windows\SysWOW64\shimsmnu.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\shimsmnu.exe"C:\Windows\SysWOW64\shimsmnu.exe"2⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:2880
-