Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/03/2024, 13:50
Static task
static1
Behavioral task
behavioral1
Sample
072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe
-
Size
399KB
-
MD5
072f42c0a2815729c9411c4470b6d6f4
-
SHA1
6cb4f79e6a5f2ddcddbbe8e11f02dd0749f331cd
-
SHA256
6d02c6eafd84c920450d1b2e5a7e0fa456bed0c7135294c9813e6b756789d7f6
-
SHA512
d2e5360b27408c4f6a108034f81a968abeec58ae5a6ea618c32492494e8204a657c483fd38519597ca6c13abb46277d470d38144415b4275cb671f9e7cb2deef
-
SSDEEP
12288:a37nmvNn8ftQsi31qhoMqNkNOEv540hx:IzmvNetfyHnNsv5px
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows_Update.exe 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows_Update.exe 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 2936 powershell.exe Token: SeDebugPrivilege 2948 powershell.exe Token: SeDebugPrivilege 1612 powershell.exe Token: SeDebugPrivilege 1856 powershell.exe Token: SeDebugPrivilege 1128 powershell.exe Token: SeDebugPrivilege 2020 powershell.exe Token: SeDebugPrivilege 1956 powershell.exe -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 1212 wrote to memory of 2488 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 28 PID 1212 wrote to memory of 2488 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 28 PID 1212 wrote to memory of 2488 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 28 PID 1212 wrote to memory of 2488 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 28 PID 2488 wrote to memory of 2936 2488 cmd.exe 30 PID 2488 wrote to memory of 2936 2488 cmd.exe 30 PID 2488 wrote to memory of 2936 2488 cmd.exe 30 PID 2488 wrote to memory of 2936 2488 cmd.exe 30 PID 1212 wrote to memory of 2644 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 31 PID 1212 wrote to memory of 2644 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 31 PID 1212 wrote to memory of 2644 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 31 PID 1212 wrote to memory of 2644 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 31 PID 2644 wrote to memory of 2948 2644 cmd.exe 33 PID 2644 wrote to memory of 2948 2644 cmd.exe 33 PID 2644 wrote to memory of 2948 2644 cmd.exe 33 PID 2644 wrote to memory of 2948 2644 cmd.exe 33 PID 1212 wrote to memory of 2692 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 36 PID 1212 wrote to memory of 2692 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 36 PID 1212 wrote to memory of 2692 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 36 PID 1212 wrote to memory of 2692 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 36 PID 1212 wrote to memory of 2768 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 38 PID 1212 wrote to memory of 2768 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 38 PID 1212 wrote to memory of 2768 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 38 PID 1212 wrote to memory of 2768 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 38 PID 2692 wrote to memory of 1612 2692 cmd.exe 40 PID 2692 wrote to memory of 1612 2692 cmd.exe 40 PID 2692 wrote to memory of 1612 2692 cmd.exe 40 PID 2692 wrote to memory of 1612 2692 cmd.exe 40 PID 2768 wrote to memory of 1856 2768 cmd.exe 41 PID 2768 wrote to memory of 1856 2768 cmd.exe 41 PID 2768 wrote to memory of 1856 2768 cmd.exe 41 PID 2768 wrote to memory of 1856 2768 cmd.exe 41 PID 1212 wrote to memory of 1280 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 42 PID 1212 wrote to memory of 1280 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 42 PID 1212 wrote to memory of 1280 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 42 PID 1212 wrote to memory of 1280 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 42 PID 1280 wrote to memory of 1128 1280 cmd.exe 44 PID 1280 wrote to memory of 1128 1280 cmd.exe 44 PID 1280 wrote to memory of 1128 1280 cmd.exe 44 PID 1280 wrote to memory of 1128 1280 cmd.exe 44 PID 1212 wrote to memory of 1916 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 45 PID 1212 wrote to memory of 1916 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 45 PID 1212 wrote to memory of 1916 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 45 PID 1212 wrote to memory of 1916 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 45 PID 1212 wrote to memory of 892 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 47 PID 1212 wrote to memory of 892 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 47 PID 1212 wrote to memory of 892 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 47 PID 1212 wrote to memory of 892 1212 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe 47 PID 1916 wrote to memory of 1956 1916 cmd.exe 49 PID 1916 wrote to memory of 1956 1916 cmd.exe 49 PID 1916 wrote to memory of 1956 1916 cmd.exe 49 PID 1916 wrote to memory of 1956 1916 cmd.exe 49 PID 892 wrote to memory of 2020 892 cmd.exe 50 PID 892 wrote to memory of 2020 892 cmd.exe 50 PID 892 wrote to memory of 2020 892 cmd.exe 50 PID 892 wrote to memory of 2020 892 cmd.exe 50 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\072f42c0a2815729c9411c4470b6d6f4_JaffaCakes118.exe"1⤵
- UAC bypass
- Drops startup file
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1212 -
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start` Menu\Programs\Startup\Update.cmd2⤵
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start` Menu\Programs\Startup\Update.cmd3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2936
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start` Menu\Programs\Startup\Update.cmd2⤵
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start` Menu\Programs\Startup\Update.cmd3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2948
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start` Menu\Programs\Startup\Update.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start` Menu\Programs\Startup\Update.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1612
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start` Menu\Programs\Startup\Update.cmd2⤵
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start` Menu\Programs\Startup\Update.cmd3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1856
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start` Menu\Programs\Startup\Update.cmd2⤵
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start` Menu\Programs\Startup\Update.cmd3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1128
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start` Menu\Programs\Startup\Update.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start` Menu\Programs\Startup\Update.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1956
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start` Menu\Programs\Startup\Update.cmd2⤵
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start` Menu\Programs\Startup\Update.cmd3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2020
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD58465addd8d4ca9df6b3a5619c903393d
SHA109ce41379485d00b6cbb7a3d5f8a0f41ed618c7e
SHA2563a137837d8712a726f1aa54787f397541b9468d91bfff05d6f732a9eff0549a2
SHA512ac366e610797845ac562524cc9e73aff09d79591c3401b7d9e835c7655ec5109fb0d6669b6ad9ec5cf389b0e1a5f21dd9948857cc9bd84f00efc74f37391f44e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5d8c96e61862aad74dfdc44993de331e9
SHA13ffe8ff8e51460e7e08769802e4596132d306d2a
SHA256ac92dd17527c2e475276658754a6eafc88c89554767d20e6e413e18e51cea1d3
SHA512eb5d06a714ba103d010c2387402cf1203a465c6c710f6a1f283d6f3433e3d35ae3139df95b9f7a1e9970264b8c377bf4c21ae13741975b2ec92d57037a763037