Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2024, 03:56
Behavioral task
behavioral1
Sample
2d3782f2f01538588c13de083e2d73d8_JaffaCakes118.exe
Resource
win7-20240221-en
7 signatures
150 seconds
General
-
Target
2d3782f2f01538588c13de083e2d73d8_JaffaCakes118.exe
-
Size
433KB
-
MD5
2d3782f2f01538588c13de083e2d73d8
-
SHA1
3cf40de3902404ff8dbe58634266dff130e43d3b
-
SHA256
fb9228bc91fe6e28a14d8df485ba7e1e12dfd30a111e828fe465cf672f0eb40b
-
SHA512
5befb1d4f4fd17b50d26b3de18b7220593ea33c1cb024da2af1cc703f414c69d7365fd73c3d54f94f0aa1ab0f1daab07d5fc27029c521e6f2cecf30148144e96
-
SSDEEP
6144:4LV6Bta6dtJmakIM54I59M+KwOPv0ebfvEqtN1sz+5N7y59w5W:4LV6Btpmk3P3bHEqv1H29wQ
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DDP Host = "C:\\Program Files (x86)\\DDP Host\\ddphost.exe" 2d3782f2f01538588c13de083e2d73d8_JaffaCakes118.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 2d3782f2f01538588c13de083e2d73d8_JaffaCakes118.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\DDP Host\ddphost.exe 2d3782f2f01538588c13de083e2d73d8_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\DDP Host\ddphost.exe 2d3782f2f01538588c13de083e2d73d8_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4912 2d3782f2f01538588c13de083e2d73d8_JaffaCakes118.exe 4912 2d3782f2f01538588c13de083e2d73d8_JaffaCakes118.exe 4912 2d3782f2f01538588c13de083e2d73d8_JaffaCakes118.exe 4912 2d3782f2f01538588c13de083e2d73d8_JaffaCakes118.exe 4912 2d3782f2f01538588c13de083e2d73d8_JaffaCakes118.exe 4912 2d3782f2f01538588c13de083e2d73d8_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4912 2d3782f2f01538588c13de083e2d73d8_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4912 2d3782f2f01538588c13de083e2d73d8_JaffaCakes118.exe Token: SeDebugPrivilege 4912 2d3782f2f01538588c13de083e2d73d8_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d3782f2f01538588c13de083e2d73d8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2d3782f2f01538588c13de083e2d73d8_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:4912