Analysis
-
max time kernel
141s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07-04-2024 21:46
Static task
static1
Behavioral task
behavioral1
Sample
e5ed6dbdeb7754f7fad7427c1dd6007c_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e5ed6dbdeb7754f7fad7427c1dd6007c_JaffaCakes118.exe
Resource
win10v2004-20240319-en
General
-
Target
e5ed6dbdeb7754f7fad7427c1dd6007c_JaffaCakes118.exe
-
Size
856KB
-
MD5
e5ed6dbdeb7754f7fad7427c1dd6007c
-
SHA1
9fcde531902ddc849c0a565c41e780bfcca00707
-
SHA256
844a48b6f4257a94d563db0038bb9478968cf8b6208a3b7c1cb7bb244d0be4c0
-
SHA512
b8bf700ce0af188eb52acc595d2fa73c5b1e041d05ba0363bdce514b31df6ff7bf6463b6308fbbd7c01dd261e3afe507624e802b352c4eab3ab619a2986c7d09
-
SSDEEP
12288:Z+oNficcDBhKhxjm/1OFYmRXEwoqA7BjWjlh5ChVMfC8566nkRaCTKKkH8GE4nsA:Z+oJqAxjm/otEJ7BjY5lfncfwHRYRgp
Malware Config
Signatures
-
Processes:
e5ed6dbdeb7754f7fad7427c1dd6007c_JaffaCakes118.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e5ed6dbdeb7754f7fad7427c1dd6007c_JaffaCakes118.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
e5ed6dbdeb7754f7fad7427c1dd6007c_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Wine e5ed6dbdeb7754f7fad7427c1dd6007c_JaffaCakes118.exe -
Processes:
e5ed6dbdeb7754f7fad7427c1dd6007c_JaffaCakes118.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e5ed6dbdeb7754f7fad7427c1dd6007c_JaffaCakes118.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
e5ed6dbdeb7754f7fad7427c1dd6007c_JaffaCakes118.exepid process 1936 e5ed6dbdeb7754f7fad7427c1dd6007c_JaffaCakes118.exe -
Drops file in Program Files directory 1 IoCs
Processes:
e5ed6dbdeb7754f7fad7427c1dd6007c_JaffaCakes118.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe e5ed6dbdeb7754f7fad7427c1dd6007c_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
e5ed6dbdeb7754f7fad7427c1dd6007c_JaffaCakes118.exepid process 1936 e5ed6dbdeb7754f7fad7427c1dd6007c_JaffaCakes118.exe 1936 e5ed6dbdeb7754f7fad7427c1dd6007c_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
e5ed6dbdeb7754f7fad7427c1dd6007c_JaffaCakes118.exedescription pid process Token: SeDebugPrivilege 1936 e5ed6dbdeb7754f7fad7427c1dd6007c_JaffaCakes118.exe Token: SeShutdownPrivilege 1936 e5ed6dbdeb7754f7fad7427c1dd6007c_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
e5ed6dbdeb7754f7fad7427c1dd6007c_JaffaCakes118.exepid process 1936 e5ed6dbdeb7754f7fad7427c1dd6007c_JaffaCakes118.exe -
System policy modification 1 TTPs 2 IoCs
Processes:
e5ed6dbdeb7754f7fad7427c1dd6007c_JaffaCakes118.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System e5ed6dbdeb7754f7fad7427c1dd6007c_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e5ed6dbdeb7754f7fad7427c1dd6007c_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e5ed6dbdeb7754f7fad7427c1dd6007c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e5ed6dbdeb7754f7fad7427c1dd6007c_JaffaCakes118.exe"1⤵
- UAC bypass
- Identifies Wine through registry keys
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
Network
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
2Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1936-0-0x0000000000400000-0x00000000005E1000-memory.dmpFilesize
1.9MB
-
memory/1936-1-0x0000000000400000-0x00000000005E1000-memory.dmpFilesize
1.9MB
-
memory/1936-17-0x00000000045A0000-0x00000000045A2000-memory.dmpFilesize
8KB
-
memory/1936-16-0x00000000042C0000-0x00000000042C1000-memory.dmpFilesize
4KB
-
memory/1936-15-0x0000000004390000-0x0000000004392000-memory.dmpFilesize
8KB
-
memory/1936-14-0x0000000004000000-0x0000000004001000-memory.dmpFilesize
4KB
-
memory/1936-13-0x0000000003FD0000-0x0000000003FD1000-memory.dmpFilesize
4KB
-
memory/1936-12-0x0000000004020000-0x0000000004021000-memory.dmpFilesize
4KB
-
memory/1936-11-0x00000000042F0000-0x00000000042F1000-memory.dmpFilesize
4KB
-
memory/1936-10-0x0000000004220000-0x0000000004221000-memory.dmpFilesize
4KB
-
memory/1936-9-0x0000000004030000-0x0000000004031000-memory.dmpFilesize
4KB
-
memory/1936-8-0x0000000004250000-0x0000000004251000-memory.dmpFilesize
4KB
-
memory/1936-7-0x0000000004240000-0x0000000004241000-memory.dmpFilesize
4KB
-
memory/1936-6-0x0000000003FC0000-0x0000000003FC1000-memory.dmpFilesize
4KB
-
memory/1936-5-0x0000000004190000-0x0000000004192000-memory.dmpFilesize
8KB
-
memory/1936-4-0x00000000042D0000-0x00000000042D1000-memory.dmpFilesize
4KB
-
memory/1936-2-0x0000000003FB0000-0x0000000003FB1000-memory.dmpFilesize
4KB
-
memory/1936-3-0x00000000042E0000-0x00000000042E1000-memory.dmpFilesize
4KB
-
memory/1936-18-0x0000000004200000-0x0000000004201000-memory.dmpFilesize
4KB
-
memory/1936-19-0x00000000041D0000-0x00000000041D2000-memory.dmpFilesize
8KB
-
memory/1936-20-0x00000000041C0000-0x00000000041C1000-memory.dmpFilesize
4KB
-
memory/1936-21-0x0000000004260000-0x0000000004261000-memory.dmpFilesize
4KB
-
memory/1936-22-0x00000000041E0000-0x00000000041E1000-memory.dmpFilesize
4KB
-
memory/1936-23-0x00000000041F0000-0x00000000041F1000-memory.dmpFilesize
4KB
-
memory/1936-25-0x0000000000400000-0x00000000005E1000-memory.dmpFilesize
1.9MB
-
memory/1936-26-0x0000000000400000-0x00000000005E1000-memory.dmpFilesize
1.9MB
-
memory/1936-27-0x0000000000400000-0x00000000005E1000-memory.dmpFilesize
1.9MB
-
memory/1936-28-0x0000000000400000-0x00000000005E1000-memory.dmpFilesize
1.9MB
-
memory/1936-29-0x0000000000400000-0x00000000005E1000-memory.dmpFilesize
1.9MB
-
memory/1936-30-0x0000000000400000-0x00000000005E1000-memory.dmpFilesize
1.9MB
-
memory/1936-31-0x0000000000400000-0x00000000005E1000-memory.dmpFilesize
1.9MB
-
memory/1936-32-0x0000000000400000-0x00000000005E1000-memory.dmpFilesize
1.9MB
-
memory/1936-33-0x0000000000400000-0x00000000005E1000-memory.dmpFilesize
1.9MB
-
memory/1936-34-0x0000000000400000-0x00000000005E1000-memory.dmpFilesize
1.9MB
-
memory/1936-35-0x0000000000400000-0x00000000005E1000-memory.dmpFilesize
1.9MB
-
memory/1936-36-0x0000000000400000-0x00000000005E1000-memory.dmpFilesize
1.9MB
-
memory/1936-37-0x0000000000400000-0x00000000005E1000-memory.dmpFilesize
1.9MB
-
memory/1936-38-0x0000000000400000-0x00000000005E1000-memory.dmpFilesize
1.9MB
-
memory/1936-39-0x0000000000400000-0x00000000005E1000-memory.dmpFilesize
1.9MB
-
memory/1936-40-0x0000000000400000-0x00000000005E1000-memory.dmpFilesize
1.9MB