Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-09-2024 21:43
Static task
static1
Behavioral task
behavioral1
Sample
ff5f36bf9fc4dbdd66f60889380fc65f_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
ff5f36bf9fc4dbdd66f60889380fc65f_JaffaCakes118.exe
-
Size
127KB
-
MD5
ff5f36bf9fc4dbdd66f60889380fc65f
-
SHA1
35ecb1e48f0fc8849768d7bef789546ba4d1d659
-
SHA256
7629bd60ebf2d6c60e861c463c1eca3e4a3d9e719934010ea560028b304c47f9
-
SHA512
7bb178d311b1bdf6100734ebc2b4ff8e42786117c2fe34ab4139775bcccf97ed6dd8a6a98b93b2dfb52117e94cfdd5b64a6c982bfad534542324ea1a6902474f
-
SSDEEP
3072:1GHzFEhTHHIUjCgArLEZXApH3UHE360bSYUeQF4rzB:1eFWHIU2Y9KEHE36uSA
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat sitkacloud.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ff5f36bf9fc4dbdd66f60889380fc65f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ff5f36bf9fc4dbdd66f60889380fc65f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sitkacloud.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sitkacloud.exe -
Modifies data under HKEY_USERS 21 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 sitkacloud.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" sitkacloud.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00fa000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 sitkacloud.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3326A172-8694-4A10-8B22-30CCE1B66BAA}\WpadDecisionTime = a0ede0a7b812db01 sitkacloud.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3326A172-8694-4A10-8B22-30CCE1B66BAA}\WpadNetworkName = "Network 3" sitkacloud.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\26-51-66-76-0b-0e\WpadDecisionReason = "1" sitkacloud.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\26-51-66-76-0b-0e\WpadDecisionTime = a0ede0a7b812db01 sitkacloud.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix sitkacloud.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" sitkacloud.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings sitkacloud.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 sitkacloud.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad sitkacloud.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3326A172-8694-4A10-8B22-30CCE1B66BAA}\WpadDecision = "0" sitkacloud.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\26-51-66-76-0b-0e sitkacloud.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3326A172-8694-4A10-8B22-30CCE1B66BAA}\26-51-66-76-0b-0e sitkacloud.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\26-51-66-76-0b-0e\WpadDecision = "0" sitkacloud.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings sitkacloud.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections sitkacloud.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3326A172-8694-4A10-8B22-30CCE1B66BAA} sitkacloud.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" sitkacloud.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{3326A172-8694-4A10-8B22-30CCE1B66BAA}\WpadDecisionReason = "1" sitkacloud.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2732 sitkacloud.exe 2732 sitkacloud.exe 2732 sitkacloud.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2944 ff5f36bf9fc4dbdd66f60889380fc65f_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 4 IoCs
pid Process 2080 ff5f36bf9fc4dbdd66f60889380fc65f_JaffaCakes118.exe 2944 ff5f36bf9fc4dbdd66f60889380fc65f_JaffaCakes118.exe 2696 sitkacloud.exe 2732 sitkacloud.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2944 2080 ff5f36bf9fc4dbdd66f60889380fc65f_JaffaCakes118.exe 28 PID 2080 wrote to memory of 2944 2080 ff5f36bf9fc4dbdd66f60889380fc65f_JaffaCakes118.exe 28 PID 2080 wrote to memory of 2944 2080 ff5f36bf9fc4dbdd66f60889380fc65f_JaffaCakes118.exe 28 PID 2080 wrote to memory of 2944 2080 ff5f36bf9fc4dbdd66f60889380fc65f_JaffaCakes118.exe 28 PID 2696 wrote to memory of 2732 2696 sitkacloud.exe 30 PID 2696 wrote to memory of 2732 2696 sitkacloud.exe 30 PID 2696 wrote to memory of 2732 2696 sitkacloud.exe 30 PID 2696 wrote to memory of 2732 2696 sitkacloud.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff5f36bf9fc4dbdd66f60889380fc65f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ff5f36bf9fc4dbdd66f60889380fc65f_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\ff5f36bf9fc4dbdd66f60889380fc65f_JaffaCakes118.exe--461d39982⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
PID:2944
-
-
C:\Windows\SysWOW64\sitkacloud.exe"C:\Windows\SysWOW64\sitkacloud.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\sitkacloud.exe--1111e2332⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:2732
-