Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26-09-2024 21:41
Static task
static1
Behavioral task
behavioral1
Sample
f9367630697814df89999cbfae96c849_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
f9367630697814df89999cbfae96c849_JaffaCakes118.exe
-
Size
350KB
-
MD5
f9367630697814df89999cbfae96c849
-
SHA1
96da64fdd9cb2f5df599cae8ded1e4792b241c17
-
SHA256
8b55db1cd1a5e7dd38027210d81689c20b31b28d934e5e6abced2e2a8c317feb
-
SHA512
5768f0251ec89008b7150027df36b8d3614ad0ff717adde7a7ca9a5a0592fa4e59b418e1ec9aaee185e270f0be7de188d7d7d1bb01c13d65756abca6da6c8abe
-
SSDEEP
3072:mRyuT71ZNMEHzbphQQl/nE9iOYdsODyV3jxSlWMAj:mRyuT5x7hnE9vYNDyVY
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat dialarestore.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f9367630697814df89999cbfae96c849_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dialarestore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dialarestore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f9367630697814df89999cbfae96c849_JaffaCakes118.exe -
Modifies data under HKEY_USERS 19 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings dialarestore.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\7e-b1-cd-cd-02-98\WpadDecisionReason = "1" dialarestore.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 dialarestore.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0193000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 dialarestore.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{89775F6E-043E-4E39-BFEF-ABAE45D89BF8} dialarestore.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{89775F6E-043E-4E39-BFEF-ABAE45D89BF8}\WpadDecisionTime = 60a62be85c10db01 dialarestore.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\7e-b1-cd-cd-02-98 dialarestore.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{89775F6E-043E-4E39-BFEF-ABAE45D89BF8}\7e-b1-cd-cd-02-98 dialarestore.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings dialarestore.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{89775F6E-043E-4E39-BFEF-ABAE45D89BF8}\WpadDecision = "0" dialarestore.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\7e-b1-cd-cd-02-98\WpadDecisionTime = 60a62be85c10db01 dialarestore.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\7e-b1-cd-cd-02-98\WpadDecision = "0" dialarestore.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\7e-b1-cd-cd-02-98\WpadDetectedUrl dialarestore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections dialarestore.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" dialarestore.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 dialarestore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad dialarestore.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{89775F6E-043E-4E39-BFEF-ABAE45D89BF8}\WpadDecisionReason = "1" dialarestore.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{89775F6E-043E-4E39-BFEF-ABAE45D89BF8}\WpadNetworkName = "Network 3" dialarestore.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2688 f9367630697814df89999cbfae96c849_JaffaCakes118.exe 2204 f9367630697814df89999cbfae96c849_JaffaCakes118.exe 2404 dialarestore.exe 744 dialarestore.exe 744 dialarestore.exe 744 dialarestore.exe 744 dialarestore.exe 744 dialarestore.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2204 f9367630697814df89999cbfae96c849_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2688 wrote to memory of 2204 2688 f9367630697814df89999cbfae96c849_JaffaCakes118.exe 30 PID 2688 wrote to memory of 2204 2688 f9367630697814df89999cbfae96c849_JaffaCakes118.exe 30 PID 2688 wrote to memory of 2204 2688 f9367630697814df89999cbfae96c849_JaffaCakes118.exe 30 PID 2688 wrote to memory of 2204 2688 f9367630697814df89999cbfae96c849_JaffaCakes118.exe 30 PID 2404 wrote to memory of 744 2404 dialarestore.exe 33 PID 2404 wrote to memory of 744 2404 dialarestore.exe 33 PID 2404 wrote to memory of 744 2404 dialarestore.exe 33 PID 2404 wrote to memory of 744 2404 dialarestore.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\f9367630697814df89999cbfae96c849_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f9367630697814df89999cbfae96c849_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\f9367630697814df89999cbfae96c849_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f9367630697814df89999cbfae96c849_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:2204
-
-
C:\Windows\SysWOW64\dialarestore.exe"C:\Windows\SysWOW64\dialarestore.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\SysWOW64\dialarestore.exe"C:\Windows\SysWOW64\dialarestore.exe"2⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:744
-