Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    21/04/2024, 16:50

General

  • Target

    ffbcc78612502da6d4b7061ec1487fcd_JaffaCakes118.exe

  • Size

    199KB

  • MD5

    ffbcc78612502da6d4b7061ec1487fcd

  • SHA1

    8d28ceb24558aadca7b9e0bac15a8e2615182945

  • SHA256

    8e7eba92ab038f6a5ae941c56c76cb88152c82f9077d4e86131457a9b196c080

  • SHA512

    31673ecbd58a79f36f6ee881300548a25bbfd2690b307de2a13eb48c35e11f481c8a00214ab0beca196a4cdcaf6d9589526ed0f2de13d33bd5d669d714343ee1

  • SSDEEP

    6144:sqoD6y5v1FrCTViWtfoV21ehSiuODnxwt:sqq6y5vfslxoYEhSLOTy

Malware Config

Signatures

  • UAC bypass 3 TTPs 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies Internet Explorer start page 1 TTPs 1 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs
  • System policy modification 1 TTPs 3 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ffbcc78612502da6d4b7061ec1487fcd_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ffbcc78612502da6d4b7061ec1487fcd_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2184
    • C:\Users\Admin\AppData\Local\Temp\ffbcc78612502da6d4b7061ec1487fcd_JaffaCakes118.exe
      ffbcc78612502da6d4b7061ec1487fcd_JaffaCakes118.exe
      2⤵
        PID:2712
      • C:\Users\Admin\AppData\Local\Temp\ffbcc78612502da6d4b7061ec1487fcd_JaffaCakes118.exe
        ffbcc78612502da6d4b7061ec1487fcd_JaffaCakes118.exe
        2⤵
        • Loads dropped DLL
        • Drops file in System32 directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2568
        • C:\Windows\SysWOW64\regsvr32.exe
          regsvr32 /s C:\windows\system32\msinet.ocx
          3⤵
          • Loads dropped DLL
          • Modifies registry class
          PID:2800
        • C:\windows\SysWOW64\svshost.exe
          C:\windows\system32\svshost.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2540
          • C:\windows\SysWOW64\svshost.exe
            svshost.exe
            4⤵
              PID:2744
            • C:\windows\SysWOW64\svshost.exe
              svshost.exe
              4⤵
              • UAC bypass
              • Executes dropped EXE
              • Loads dropped DLL
              • Adds Run key to start application
              • Checks whether UAC is enabled
              • Modifies Internet Explorer settings
              • Modifies Internet Explorer start page
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              • System policy modification
              PID:2748
          • C:\Windows\SysWOW64\attrib.exe
            attrib +h +s C:\windows\system32\svshost.exe
            3⤵
            • Drops file in System32 directory
            • Views/modifies file attributes
            PID:2392

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\windows\SysWOW64\msinet.ocx

              Filesize

              112KB

              MD5

              7bec181a21753498b6bd001c42a42722

              SHA1

              3249f233657dc66632c0539c47895bfcee5770cc

              SHA256

              73da54b69911bdd08ea8bbbd508f815ef7cfa59c4684d75c1c602252ec88ee31

              SHA512

              d671e25ae5e02a55f444d253f0e4a42af6a5362d9759fb243ad6d2c333976ab3e98669621ec0850ad915ee06acbe8e70d77b084128fc275462223f4f5ab401bc

            • \Windows\SysWOW64\svshost.exe

              Filesize

              49KB

              MD5

              07001fd2f0f017c1ce69a4d051a4b488

              SHA1

              ea4fbf47cb6aa918f91c9247ff8092dbbcb9a231

              SHA256

              2676c94d297703fe26587d8a314a561198eb64192c401adb5a10c65a705b0201

              SHA512

              93bb95adde4e5d5c58c4bfb9df6b344e91cf54d266c9162d6396d3a527ffb8be8d169eb49ea98b087b9627cc9074117c66991ed81bd766079afdedff5bba4b15

            • memory/2184-2-0x0000000000BD0000-0x0000000000C10000-memory.dmp

              Filesize

              256KB

            • memory/2184-1-0x0000000074270000-0x000000007481B000-memory.dmp

              Filesize

              5.7MB

            • memory/2184-0-0x0000000074270000-0x000000007481B000-memory.dmp

              Filesize

              5.7MB

            • memory/2184-16-0x0000000074270000-0x000000007481B000-memory.dmp

              Filesize

              5.7MB

            • memory/2540-43-0x0000000073BA0000-0x000000007414B000-memory.dmp

              Filesize

              5.7MB

            • memory/2540-31-0x0000000073BA0000-0x000000007414B000-memory.dmp

              Filesize

              5.7MB

            • memory/2540-28-0x0000000073BA0000-0x000000007414B000-memory.dmp

              Filesize

              5.7MB

            • memory/2540-29-0x0000000000700000-0x0000000000740000-memory.dmp

              Filesize

              256KB

            • memory/2568-11-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

              Filesize

              4KB

            • memory/2568-7-0x0000000000400000-0x000000000042E000-memory.dmp

              Filesize

              184KB

            • memory/2568-13-0x0000000000400000-0x000000000042E000-memory.dmp

              Filesize

              184KB

            • memory/2568-3-0x0000000000400000-0x000000000042E000-memory.dmp

              Filesize

              184KB

            • memory/2568-5-0x0000000000400000-0x000000000042E000-memory.dmp

              Filesize

              184KB

            • memory/2568-57-0x0000000000400000-0x000000000042E000-memory.dmp

              Filesize

              184KB

            • memory/2568-15-0x0000000000400000-0x000000000042E000-memory.dmp

              Filesize

              184KB

            • memory/2748-35-0x0000000000400000-0x000000000040C000-memory.dmp

              Filesize

              48KB

            • memory/2748-39-0x0000000000400000-0x000000000040C000-memory.dmp

              Filesize

              48KB

            • memory/2748-30-0x0000000000400000-0x000000000040C000-memory.dmp

              Filesize

              48KB

            • memory/2748-37-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

              Filesize

              4KB

            • memory/2748-42-0x0000000000400000-0x000000000040C000-memory.dmp

              Filesize

              48KB

            • memory/2748-46-0x0000000002B70000-0x000000000362A000-memory.dmp

              Filesize

              10.7MB

            • memory/2748-48-0x00000000055A0000-0x0000000006602000-memory.dmp

              Filesize

              16.4MB

            • memory/2748-33-0x0000000000400000-0x000000000040C000-memory.dmp

              Filesize

              48KB

            • memory/2748-58-0x0000000000400000-0x000000000040C000-memory.dmp

              Filesize

              48KB