Analysis
-
max time kernel
136s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
27/05/2024, 13:33
Static task
static1
Behavioral task
behavioral1
Sample
79452e059c2883b88843e4ebe6520c25_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
79452e059c2883b88843e4ebe6520c25_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
79452e059c2883b88843e4ebe6520c25_JaffaCakes118.exe
-
Size
304KB
-
MD5
79452e059c2883b88843e4ebe6520c25
-
SHA1
67b4ccc50c318bba1e521a3f5d232427efd9ac15
-
SHA256
4d188166549552d9162a9287445cdac86b83800adff3908adc1b5c3a4fe2e0a7
-
SHA512
777bf97df3ea7bf25454ece0e7be0f4be64260fc07772418e8dd1cde10997501c00820cd83551113737bab679e29f07c2d2e5e997a09f39b9a8ecd8579987c87
-
SSDEEP
6144:rDdvoTyl7Zh4uYrmjoDaNQXOVJkiEdEPURbFqoU:rRHl7Zh4Vrmj2aNQefkRZhqf
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" msiexec.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" msiexec.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\Policies\Explorer\Run msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\488865889 = "C:\\ProgramData\\msvsosp.exe" msiexec.exe -
Disables taskbar notifications via registry modification
-
Deletes itself 1 IoCs
pid Process 1708 msiexec.exe -
Blocklisted process makes network request 28 IoCs
flow pid Process 3 1708 msiexec.exe 4 1708 msiexec.exe 5 1708 msiexec.exe 6 1708 msiexec.exe 8 1708 msiexec.exe 10 1708 msiexec.exe 11 1708 msiexec.exe 12 1708 msiexec.exe 14 1708 msiexec.exe 15 1708 msiexec.exe 16 1708 msiexec.exe 17 1708 msiexec.exe 18 1708 msiexec.exe 19 1708 msiexec.exe 20 1708 msiexec.exe 21 1708 msiexec.exe 22 1708 msiexec.exe 23 1708 msiexec.exe 24 1708 msiexec.exe 25 1708 msiexec.exe 26 1708 msiexec.exe 27 1708 msiexec.exe 28 1708 msiexec.exe 29 1708 msiexec.exe 30 1708 msiexec.exe 31 1708 msiexec.exe 32 1708 msiexec.exe 33 1708 msiexec.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2228 79452e059c2883b88843e4ebe6520c25_JaffaCakes118.exe 1708 msiexec.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 2228 79452e059c2883b88843e4ebe6520c25_JaffaCakes118.exe 2228 79452e059c2883b88843e4ebe6520c25_JaffaCakes118.exe 2228 79452e059c2883b88843e4ebe6520c25_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1708 msiexec.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2228 wrote to memory of 2420 2228 79452e059c2883b88843e4ebe6520c25_JaffaCakes118.exe 28 PID 2228 wrote to memory of 2420 2228 79452e059c2883b88843e4ebe6520c25_JaffaCakes118.exe 28 PID 2228 wrote to memory of 2420 2228 79452e059c2883b88843e4ebe6520c25_JaffaCakes118.exe 28 PID 2228 wrote to memory of 2420 2228 79452e059c2883b88843e4ebe6520c25_JaffaCakes118.exe 28 PID 2228 wrote to memory of 2420 2228 79452e059c2883b88843e4ebe6520c25_JaffaCakes118.exe 28 PID 2228 wrote to memory of 2420 2228 79452e059c2883b88843e4ebe6520c25_JaffaCakes118.exe 28 PID 2228 wrote to memory of 2420 2228 79452e059c2883b88843e4ebe6520c25_JaffaCakes118.exe 28 PID 2228 wrote to memory of 1708 2228 79452e059c2883b88843e4ebe6520c25_JaffaCakes118.exe 29 PID 2228 wrote to memory of 1708 2228 79452e059c2883b88843e4ebe6520c25_JaffaCakes118.exe 29 PID 2228 wrote to memory of 1708 2228 79452e059c2883b88843e4ebe6520c25_JaffaCakes118.exe 29 PID 2228 wrote to memory of 1708 2228 79452e059c2883b88843e4ebe6520c25_JaffaCakes118.exe 29 PID 2228 wrote to memory of 1708 2228 79452e059c2883b88843e4ebe6520c25_JaffaCakes118.exe 29 PID 2228 wrote to memory of 1708 2228 79452e059c2883b88843e4ebe6520c25_JaffaCakes118.exe 29 PID 2228 wrote to memory of 1708 2228 79452e059c2883b88843e4ebe6520c25_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\79452e059c2883b88843e4ebe6520c25_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\79452e059c2883b88843e4ebe6520c25_JaffaCakes118.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe"2⤵PID:2420
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Adds policy Run key to start application
- Deletes itself
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1708
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1