Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01-04-2024 10:30
Static task
static1
Behavioral task
behavioral1
Sample
6f93266c889081b9e855cf7dee21ac46_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6f93266c889081b9e855cf7dee21ac46_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
6f93266c889081b9e855cf7dee21ac46_JaffaCakes118.exe
-
Size
908KB
-
MD5
6f93266c889081b9e855cf7dee21ac46
-
SHA1
64e880c2da5643fb68b00f0d00ba5b3eb9773333
-
SHA256
26a6855a944cf1fea1704b1895b3ecca0f6bc9ff80e02125e4e874e7396dd122
-
SHA512
cc1d219c1296a567b56a1ac1003494087f9e98c49d3ef8ef3d4fc6e5c6945b13a69d1526d1c27eb2aa795ea44a425a6f7ea3883e1a756b01c1a774f2663e3941
-
SSDEEP
12288:gTHLJWRQ/izhJ9vzgAYYR/Iu8We84ldBES1xvDxiqq:xRQ/IhYATwu3eVldyEbxiqq
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6f93266c889081b9e855cf7dee21ac46_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6f93266c889081b9e855cf7dee21ac46_jaffacakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2812 6f93266c889081b9e855cf7dee21ac46_jaffacakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 2876 6f93266c889081b9e855cf7dee21ac46_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinApp = "\\Windows\\helpar.exe" 6f93266c889081b9e855cf7dee21ac46_jaffacakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinApp = "C:\\Users\\Admin\\AppData\\Roaming\\Windows\\helpar.exe" 6f93266c889081b9e855cf7dee21ac46_jaffacakes118.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 6f93266c889081b9e855cf7dee21ac46_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6f93266c889081b9e855cf7dee21ac46_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 6f93266c889081b9e855cf7dee21ac46_jaffacakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6f93266c889081b9e855cf7dee21ac46_jaffacakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\helpar.exe 6f93266c889081b9e855cf7dee21ac46_jaffacakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2472 PING.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2812 6f93266c889081b9e855cf7dee21ac46_jaffacakes118.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2876 6f93266c889081b9e855cf7dee21ac46_JaffaCakes118.exe Token: SeDebugPrivilege 2812 6f93266c889081b9e855cf7dee21ac46_jaffacakes118.exe Token: SeDebugPrivilege 2812 6f93266c889081b9e855cf7dee21ac46_jaffacakes118.exe Token: 33 2812 6f93266c889081b9e855cf7dee21ac46_jaffacakes118.exe Token: SeIncBasePriorityPrivilege 2812 6f93266c889081b9e855cf7dee21ac46_jaffacakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2812 6f93266c889081b9e855cf7dee21ac46_jaffacakes118.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2876 wrote to memory of 2812 2876 6f93266c889081b9e855cf7dee21ac46_JaffaCakes118.exe 28 PID 2876 wrote to memory of 2812 2876 6f93266c889081b9e855cf7dee21ac46_JaffaCakes118.exe 28 PID 2876 wrote to memory of 2812 2876 6f93266c889081b9e855cf7dee21ac46_JaffaCakes118.exe 28 PID 2876 wrote to memory of 2812 2876 6f93266c889081b9e855cf7dee21ac46_JaffaCakes118.exe 28 PID 2876 wrote to memory of 2736 2876 6f93266c889081b9e855cf7dee21ac46_JaffaCakes118.exe 29 PID 2876 wrote to memory of 2736 2876 6f93266c889081b9e855cf7dee21ac46_JaffaCakes118.exe 29 PID 2876 wrote to memory of 2736 2876 6f93266c889081b9e855cf7dee21ac46_JaffaCakes118.exe 29 PID 2876 wrote to memory of 2736 2876 6f93266c889081b9e855cf7dee21ac46_JaffaCakes118.exe 29 PID 2736 wrote to memory of 2472 2736 cmd.exe 31 PID 2736 wrote to memory of 2472 2736 cmd.exe 31 PID 2736 wrote to memory of 2472 2736 cmd.exe 31 PID 2736 wrote to memory of 2472 2736 cmd.exe 31 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6f93266c889081b9e855cf7dee21ac46_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6f93266c889081b9e855cf7dee21ac46_jaffacakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f93266c889081b9e855cf7dee21ac46_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6f93266c889081b9e855cf7dee21ac46_JaffaCakes118.exe"1⤵
- UAC bypass
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\6f93266c889081b9e855cf7dee21ac46_jaffacakes118\6f93266c889081b9e855cf7dee21ac46_jaffacakes118.exe"C:\Users\Admin\AppData\Local\Temp\6f93266c889081b9e855cf7dee21ac46_jaffacakes118\6f93266c889081b9e855cf7dee21ac46_jaffacakes118.exe"2⤵
- UAC bypass
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2812
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 1000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\6f93266c889081b9e855cf7dee21ac46_JaffaCakes118.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 10003⤵
- Runs ping.exe
PID:2472
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
49B
MD50374882e69c67182a2b1797f21d6afa0
SHA121bfcf389eaa2f10aeb98a06f6d938f2b75ad4a5
SHA256b1a405f8a8473ab69613cae5dbea9ca005d13afe24665c4d8b9e3e7ec4b98a18
SHA5124a0ca4336520b9e77fda9fc69d25070f1e413d8597eda874d4740b2f31e6f7e76116369c4fb326199752d17d647aadc6c2fbbd819ee4d183fbdb2b1f3e83eb89
-
\Users\Admin\AppData\Local\Temp\6f93266c889081b9e855cf7dee21ac46_jaffacakes118\6f93266c889081b9e855cf7dee21ac46_jaffacakes118.exe
Filesize908KB
MD56f93266c889081b9e855cf7dee21ac46
SHA164e880c2da5643fb68b00f0d00ba5b3eb9773333
SHA25626a6855a944cf1fea1704b1895b3ecca0f6bc9ff80e02125e4e874e7396dd122
SHA512cc1d219c1296a567b56a1ac1003494087f9e98c49d3ef8ef3d4fc6e5c6945b13a69d1526d1c27eb2aa795ea44a425a6f7ea3883e1a756b01c1a774f2663e3941