Analysis

  • max time kernel
    141s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    07-04-2024 21:46

General

  • Target

    e5ed6dbdeb7754f7fad7427c1dd6007c_JaffaCakes118.exe

  • Size

    856KB

  • MD5

    e5ed6dbdeb7754f7fad7427c1dd6007c

  • SHA1

    9fcde531902ddc849c0a565c41e780bfcca00707

  • SHA256

    844a48b6f4257a94d563db0038bb9478968cf8b6208a3b7c1cb7bb244d0be4c0

  • SHA512

    b8bf700ce0af188eb52acc595d2fa73c5b1e041d05ba0363bdce514b31df6ff7bf6463b6308fbbd7c01dd261e3afe507624e802b352c4eab3ab619a2986c7d09

  • SSDEEP

    12288:Z+oNficcDBhKhxjm/1OFYmRXEwoqA7BjWjlh5ChVMfC8566nkRaCTKKkH8GE4nsA:Z+oJqAxjm/otEJ7BjY5lfncfwHRYRgp

Score
10/10

Malware Config

Signatures

  • UAC bypass 3 TTPs 1 IoCs
  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e5ed6dbdeb7754f7fad7427c1dd6007c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e5ed6dbdeb7754f7fad7427c1dd6007c_JaffaCakes118.exe"
    1⤵
    • UAC bypass
    • Identifies Wine through registry keys
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • System policy modification
    PID:1936

Network

MITRE ATT&CK Matrix ATT&CK v13

Privilege Escalation

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Defense Evasion

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Impair Defenses

1
T1562

Disable or Modify Tools

1
T1562.001

Modify Registry

2
T1112

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

1
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1936-0-0x0000000000400000-0x00000000005E1000-memory.dmp
    Filesize

    1.9MB

  • memory/1936-1-0x0000000000400000-0x00000000005E1000-memory.dmp
    Filesize

    1.9MB

  • memory/1936-17-0x00000000045A0000-0x00000000045A2000-memory.dmp
    Filesize

    8KB

  • memory/1936-16-0x00000000042C0000-0x00000000042C1000-memory.dmp
    Filesize

    4KB

  • memory/1936-15-0x0000000004390000-0x0000000004392000-memory.dmp
    Filesize

    8KB

  • memory/1936-14-0x0000000004000000-0x0000000004001000-memory.dmp
    Filesize

    4KB

  • memory/1936-13-0x0000000003FD0000-0x0000000003FD1000-memory.dmp
    Filesize

    4KB

  • memory/1936-12-0x0000000004020000-0x0000000004021000-memory.dmp
    Filesize

    4KB

  • memory/1936-11-0x00000000042F0000-0x00000000042F1000-memory.dmp
    Filesize

    4KB

  • memory/1936-10-0x0000000004220000-0x0000000004221000-memory.dmp
    Filesize

    4KB

  • memory/1936-9-0x0000000004030000-0x0000000004031000-memory.dmp
    Filesize

    4KB

  • memory/1936-8-0x0000000004250000-0x0000000004251000-memory.dmp
    Filesize

    4KB

  • memory/1936-7-0x0000000004240000-0x0000000004241000-memory.dmp
    Filesize

    4KB

  • memory/1936-6-0x0000000003FC0000-0x0000000003FC1000-memory.dmp
    Filesize

    4KB

  • memory/1936-5-0x0000000004190000-0x0000000004192000-memory.dmp
    Filesize

    8KB

  • memory/1936-4-0x00000000042D0000-0x00000000042D1000-memory.dmp
    Filesize

    4KB

  • memory/1936-2-0x0000000003FB0000-0x0000000003FB1000-memory.dmp
    Filesize

    4KB

  • memory/1936-3-0x00000000042E0000-0x00000000042E1000-memory.dmp
    Filesize

    4KB

  • memory/1936-18-0x0000000004200000-0x0000000004201000-memory.dmp
    Filesize

    4KB

  • memory/1936-19-0x00000000041D0000-0x00000000041D2000-memory.dmp
    Filesize

    8KB

  • memory/1936-20-0x00000000041C0000-0x00000000041C1000-memory.dmp
    Filesize

    4KB

  • memory/1936-21-0x0000000004260000-0x0000000004261000-memory.dmp
    Filesize

    4KB

  • memory/1936-22-0x00000000041E0000-0x00000000041E1000-memory.dmp
    Filesize

    4KB

  • memory/1936-23-0x00000000041F0000-0x00000000041F1000-memory.dmp
    Filesize

    4KB

  • memory/1936-25-0x0000000000400000-0x00000000005E1000-memory.dmp
    Filesize

    1.9MB

  • memory/1936-26-0x0000000000400000-0x00000000005E1000-memory.dmp
    Filesize

    1.9MB

  • memory/1936-27-0x0000000000400000-0x00000000005E1000-memory.dmp
    Filesize

    1.9MB

  • memory/1936-28-0x0000000000400000-0x00000000005E1000-memory.dmp
    Filesize

    1.9MB

  • memory/1936-29-0x0000000000400000-0x00000000005E1000-memory.dmp
    Filesize

    1.9MB

  • memory/1936-30-0x0000000000400000-0x00000000005E1000-memory.dmp
    Filesize

    1.9MB

  • memory/1936-31-0x0000000000400000-0x00000000005E1000-memory.dmp
    Filesize

    1.9MB

  • memory/1936-32-0x0000000000400000-0x00000000005E1000-memory.dmp
    Filesize

    1.9MB

  • memory/1936-33-0x0000000000400000-0x00000000005E1000-memory.dmp
    Filesize

    1.9MB

  • memory/1936-34-0x0000000000400000-0x00000000005E1000-memory.dmp
    Filesize

    1.9MB

  • memory/1936-35-0x0000000000400000-0x00000000005E1000-memory.dmp
    Filesize

    1.9MB

  • memory/1936-36-0x0000000000400000-0x00000000005E1000-memory.dmp
    Filesize

    1.9MB

  • memory/1936-37-0x0000000000400000-0x00000000005E1000-memory.dmp
    Filesize

    1.9MB

  • memory/1936-38-0x0000000000400000-0x00000000005E1000-memory.dmp
    Filesize

    1.9MB

  • memory/1936-39-0x0000000000400000-0x00000000005E1000-memory.dmp
    Filesize

    1.9MB

  • memory/1936-40-0x0000000000400000-0x00000000005E1000-memory.dmp
    Filesize

    1.9MB