Analysis
-
max time kernel
137s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26/09/2024, 15:35
Static task
static1
Behavioral task
behavioral1
Sample
f8ae3fc0fa5350d42878cbc2f1305937_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
f8ae3fc0fa5350d42878cbc2f1305937_JaffaCakes118.exe
-
Size
148KB
-
MD5
f8ae3fc0fa5350d42878cbc2f1305937
-
SHA1
5c8aa0e920d6030508fc7c98df66109ceeca376e
-
SHA256
e21182b21b5d112921c5295b73fa70c514b1052b419143f3b23b0e6807727e70
-
SHA512
759d2edb53a9689a49b8c0d1d4af1f7fef2ec2fe31645e3420adaab01cb2cba0ae5f6e6e16af54fb3b1aa45cb034d98bca46568d4f5f0cc46f16b8fb29667fdc
-
SSDEEP
3072:PWbeau1GwgGe4+NRBL/JlZTV4tNCbCv1/tm48El9TqgCgHSiJgIBXgOF+4C:PQeBCkaRV/JlZmPC+9/TtESS2
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat adminguids.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adminguids.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f8ae3fc0fa5350d42878cbc2f1305937_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f8ae3fc0fa5350d42878cbc2f1305937_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adminguids.exe -
Modifies data under HKEY_USERS 18 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{029C75DB-FB22-4519-8626-874DEF20725F}\WpadNetworkName = "Network 3" adminguids.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\b2-09-03-19-60-13\WpadDecisionReason = "1" adminguids.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\b2-09-03-19-60-13\WpadDecisionTime = c03bffd92910db01 adminguids.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\b2-09-03-19-60-13\WpadDecision = "0" adminguids.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 adminguids.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{029C75DB-FB22-4519-8626-874DEF20725F} adminguids.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad adminguids.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\b2-09-03-19-60-13 adminguids.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" adminguids.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00ea000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 adminguids.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{029C75DB-FB22-4519-8626-874DEF20725F}\WpadDecisionReason = "1" adminguids.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections adminguids.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings adminguids.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{029C75DB-FB22-4519-8626-874DEF20725F}\WpadDecisionTime = c03bffd92910db01 adminguids.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{029C75DB-FB22-4519-8626-874DEF20725F}\WpadDecision = "0" adminguids.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{029C75DB-FB22-4519-8626-874DEF20725F}\b2-09-03-19-60-13 adminguids.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings adminguids.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 adminguids.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 1892 f8ae3fc0fa5350d42878cbc2f1305937_JaffaCakes118.exe 1984 f8ae3fc0fa5350d42878cbc2f1305937_JaffaCakes118.exe 3028 adminguids.exe 2592 adminguids.exe 2592 adminguids.exe 2592 adminguids.exe 2592 adminguids.exe 2592 adminguids.exe 2592 adminguids.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1984 f8ae3fc0fa5350d42878cbc2f1305937_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1892 wrote to memory of 1984 1892 f8ae3fc0fa5350d42878cbc2f1305937_JaffaCakes118.exe 28 PID 1892 wrote to memory of 1984 1892 f8ae3fc0fa5350d42878cbc2f1305937_JaffaCakes118.exe 28 PID 1892 wrote to memory of 1984 1892 f8ae3fc0fa5350d42878cbc2f1305937_JaffaCakes118.exe 28 PID 1892 wrote to memory of 1984 1892 f8ae3fc0fa5350d42878cbc2f1305937_JaffaCakes118.exe 28 PID 3028 wrote to memory of 2592 3028 adminguids.exe 30 PID 3028 wrote to memory of 2592 3028 adminguids.exe 30 PID 3028 wrote to memory of 2592 3028 adminguids.exe 30 PID 3028 wrote to memory of 2592 3028 adminguids.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\f8ae3fc0fa5350d42878cbc2f1305937_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f8ae3fc0fa5350d42878cbc2f1305937_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Users\Admin\AppData\Local\Temp\f8ae3fc0fa5350d42878cbc2f1305937_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f8ae3fc0fa5350d42878cbc2f1305937_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:1984
-
-
C:\Windows\SysWOW64\adminguids.exe"C:\Windows\SysWOW64\adminguids.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\adminguids.exe"C:\Windows\SysWOW64\adminguids.exe"2⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:2592
-