Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09-04-2024 05:27
Static task
static1
Behavioral task
behavioral1
Sample
e9530aac236ab40d5367665b55ac3bf9_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
e9530aac236ab40d5367665b55ac3bf9_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
e9530aac236ab40d5367665b55ac3bf9_JaffaCakes118.exe
-
Size
612KB
-
MD5
e9530aac236ab40d5367665b55ac3bf9
-
SHA1
ccd887876fcee56286d31701ecb7f247c4be561c
-
SHA256
033884253a7a0d50221370381907ecaf9e2170da522a214b270ca5409d8f55e8
-
SHA512
b83f1a2bc0f69c86a070b15ceb534cd8b7eaf9dfdf0e427607279458b40697b2ff651c567d5f7787649f04de8352fc199b567fa3956b4d74c3253fc0e75a9a8e
-
SSDEEP
12288:fiWaUgkDhOPo0VdfG1mIn0sSelRnlUZrHQ:fiWDgkAJH6m0hl9lUtw
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate wauclt.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e9530aac236ab40d5367665b55ac3bf9_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate e9530aac236ab40d5367665b55ac3bf9_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion wauclt.exe -
Executes dropped EXE 1 IoCs
pid Process 4272 wauclt.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Generic Host = "wauclt.exe" e9530aac236ab40d5367665b55ac3bf9_JaffaCakes118.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\wauclt.exe wauclt.exe File created C:\Windows\SysWOW64\wauclt.exe wauclt.exe File created C:\Windows\SysWOW64\wauclt.exe e9530aac236ab40d5367665b55ac3bf9_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wauclt.exe e9530aac236ab40d5367665b55ac3bf9_JaffaCakes118.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA} e9530aac236ab40d5367665b55ac3bf9_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\AVIFile e9530aac236ab40d5367665b55ac3bf9_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\AVIFile\ = "7" e9530aac236ab40d5367665b55ac3bf9_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\InprocServer32\ = "C:\\Windows\\SysWOW64\\avifil32.dll" e9530aac236ab40d5367665b55ac3bf9_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\llyV = "pXMblZ~^aTCqd{XBjvYLxD" wauclt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\ = "Microsoft AVI Files" e9530aac236ab40d5367665b55ac3bf9_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\coAVgDa = "FdhtfB{jlkh^I^llDPf^jB" wauclt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\hRzx = "qFoIKahbHulentG_bwNVKr\x7fnAv{STJP" wauclt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\uaviwrsiqfnq = "@bWX^TOL\\IHsjV_L" wauclt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\InprocServer32 e9530aac236ab40d5367665b55ac3bf9_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\rivybzBOg = "iK^MFU_FMlfgXi@iTMWmH[bKBQeUR_ii" wauclt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\hRzx = "qFoIKahbHulentG_bGNVKr\x7fnAF{STJP" wauclt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\WEwiJsdaEzvbE = "AULIBvCneUgHMNA_jd\\gEN|S" wauclt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\uaviwrsiqfnq = "@bWXYTOL\\IH|pL@`" wauclt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\InprocServer32\ThreadingModel = "Both" e9530aac236ab40d5367665b55ac3bf9_JaffaCakes118.exe -
NTFS ADS 2 IoCs
description ioc Process File created C:\ProgramData\TEMP:C980DA7D wauclt.exe File opened for modification C:\ProgramData\TEMP:C980DA7D wauclt.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 1888 e9530aac236ab40d5367665b55ac3bf9_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 1888 e9530aac236ab40d5367665b55ac3bf9_JaffaCakes118.exe Token: 33 4272 wauclt.exe Token: SeIncBasePriorityPrivilege 4272 wauclt.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1888 wrote to memory of 4272 1888 e9530aac236ab40d5367665b55ac3bf9_JaffaCakes118.exe 93 PID 1888 wrote to memory of 4272 1888 e9530aac236ab40d5367665b55ac3bf9_JaffaCakes118.exe 93 PID 1888 wrote to memory of 4272 1888 e9530aac236ab40d5367665b55ac3bf9_JaffaCakes118.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\e9530aac236ab40d5367665b55ac3bf9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e9530aac236ab40d5367665b55ac3bf9_JaffaCakes118.exe"1⤵
- Checks BIOS information in registry
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\SysWOW64\wauclt.exe"C:\Windows/system32\wauclt.exe"2⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
PID:4272
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
109B
MD5a7ad3226b21f36879769b7c69d5d7913
SHA19ffe7c4ee73c760e0f48b1ce652c4eb789f3efb1
SHA256ed28f01c882041a34740e4d1ca96086212b418a83211317e3f399295d0488e47
SHA512bf92a954b9d84e931ea43f6059eeab80e0e7fcf8a867ffba1e0016c72d7b215a0cb8d0b23ec909ab25cd9993a98013a0b5dba9d9d2c4f9e6ed54f9b6acb24538
-
Filesize
612KB
MD5e9530aac236ab40d5367665b55ac3bf9
SHA1ccd887876fcee56286d31701ecb7f247c4be561c
SHA256033884253a7a0d50221370381907ecaf9e2170da522a214b270ca5409d8f55e8
SHA512b83f1a2bc0f69c86a070b15ceb534cd8b7eaf9dfdf0e427607279458b40697b2ff651c567d5f7787649f04de8352fc199b567fa3956b4d74c3253fc0e75a9a8e