Analysis
-
max time kernel
141s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
25/06/2024, 13:30
Behavioral task
behavioral1
Sample
0e4119242ecd2b48204c697a11595f98_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0e4119242ecd2b48204c697a11595f98_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
0e4119242ecd2b48204c697a11595f98_JaffaCakes118.exe
-
Size
2.7MB
-
MD5
0e4119242ecd2b48204c697a11595f98
-
SHA1
bf0848ff2a8fd223639916b33cb71136377a8986
-
SHA256
8ba48377fe96fe2c99717b5b5f1c8df66226b96d87a46f4dbb361e9c1c61e612
-
SHA512
62cea921c0545bbb3ef4a95ee9792c7ab27f01c547c3dee93cb5db9fc832113c26080b560133d73b87c0ffdde96bd7cf520a95456f7ad9fe79acfd62c70b9133
-
SSDEEP
49152:FnX2elzv9gARZQFM5wo3kxP0p8qf9bbJ/KToQqB3v:TxHAMTkep8qFbEToQqB3v
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 0e4119242ecd2b48204c697a11595f98_JaffaCakes118.exe -
Executes dropped EXE 4 IoCs
pid Process 3016 XcoderX.exe 1316 XcoderX.exe 544 XcoderX.exe 3132 XcoderX.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\Software\Wine 0e4119242ecd2b48204c697a11595f98_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/4868-0-0x0000000000400000-0x0000000000E96000-memory.dmp themida behavioral2/memory/4868-29-0x0000000000400000-0x0000000000E96000-memory.dmp themida behavioral2/memory/4868-30-0x0000000000400000-0x0000000000E96000-memory.dmp themida behavioral2/memory/4868-81-0x0000000000400000-0x0000000000E96000-memory.dmp themida behavioral2/memory/4868-82-0x0000000000400000-0x0000000000E96000-memory.dmp themida behavioral2/memory/4868-83-0x0000000000400000-0x0000000000E96000-memory.dmp themida behavioral2/memory/4868-84-0x0000000000400000-0x0000000000E96000-memory.dmp themida behavioral2/memory/4868-85-0x0000000000400000-0x0000000000E96000-memory.dmp themida behavioral2/memory/4868-86-0x0000000000400000-0x0000000000E96000-memory.dmp themida behavioral2/memory/4868-87-0x0000000000400000-0x0000000000E96000-memory.dmp themida behavioral2/memory/4868-88-0x0000000000400000-0x0000000000E96000-memory.dmp themida behavioral2/memory/4868-89-0x0000000000400000-0x0000000000E96000-memory.dmp themida behavioral2/memory/4868-90-0x0000000000400000-0x0000000000E96000-memory.dmp themida behavioral2/memory/4868-91-0x0000000000400000-0x0000000000E96000-memory.dmp themida behavioral2/memory/4868-92-0x0000000000400000-0x0000000000E96000-memory.dmp themida behavioral2/memory/4868-93-0x0000000000400000-0x0000000000E96000-memory.dmp themida -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AVG Internet = "C:\\Users\\Admin\\AppData\\Local\\nod32.exe" 0e4119242ecd2b48204c697a11595f98_JaffaCakes118.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 0e4119242ecd2b48204c697a11595f98_JaffaCakes118.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4868 0e4119242ecd2b48204c697a11595f98_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4868 0e4119242ecd2b48204c697a11595f98_JaffaCakes118.exe 4868 0e4119242ecd2b48204c697a11595f98_JaffaCakes118.exe 3016 XcoderX.exe 3016 XcoderX.exe 3016 XcoderX.exe 3016 XcoderX.exe 3016 XcoderX.exe 3016 XcoderX.exe 3016 XcoderX.exe 3016 XcoderX.exe 3016 XcoderX.exe 3016 XcoderX.exe 3016 XcoderX.exe 3016 XcoderX.exe 3016 XcoderX.exe 3016 XcoderX.exe 3016 XcoderX.exe 3016 XcoderX.exe 3016 XcoderX.exe 3016 XcoderX.exe 3016 XcoderX.exe 3016 XcoderX.exe 3016 XcoderX.exe 3016 XcoderX.exe 3016 XcoderX.exe 3016 XcoderX.exe 3016 XcoderX.exe 3016 XcoderX.exe 3016 XcoderX.exe 3016 XcoderX.exe 3016 XcoderX.exe 3016 XcoderX.exe 3016 XcoderX.exe 3016 XcoderX.exe 3016 XcoderX.exe 3016 XcoderX.exe 3016 XcoderX.exe 3016 XcoderX.exe 3016 XcoderX.exe 3016 XcoderX.exe 3016 XcoderX.exe 3016 XcoderX.exe 3016 XcoderX.exe 3016 XcoderX.exe 3016 XcoderX.exe 3016 XcoderX.exe 3016 XcoderX.exe 3016 XcoderX.exe 3016 XcoderX.exe 3016 XcoderX.exe 3016 XcoderX.exe 3016 XcoderX.exe 3016 XcoderX.exe 3016 XcoderX.exe 3016 XcoderX.exe 3016 XcoderX.exe 3016 XcoderX.exe 3016 XcoderX.exe 3016 XcoderX.exe 3016 XcoderX.exe 3016 XcoderX.exe 3016 XcoderX.exe 3016 XcoderX.exe 3016 XcoderX.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4868 0e4119242ecd2b48204c697a11595f98_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4868 0e4119242ecd2b48204c697a11595f98_JaffaCakes118.exe 4868 0e4119242ecd2b48204c697a11595f98_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4868 wrote to memory of 3016 4868 0e4119242ecd2b48204c697a11595f98_JaffaCakes118.exe 100 PID 4868 wrote to memory of 3016 4868 0e4119242ecd2b48204c697a11595f98_JaffaCakes118.exe 100 PID 4868 wrote to memory of 3016 4868 0e4119242ecd2b48204c697a11595f98_JaffaCakes118.exe 100 PID 4868 wrote to memory of 1316 4868 0e4119242ecd2b48204c697a11595f98_JaffaCakes118.exe 101 PID 4868 wrote to memory of 1316 4868 0e4119242ecd2b48204c697a11595f98_JaffaCakes118.exe 101 PID 4868 wrote to memory of 1316 4868 0e4119242ecd2b48204c697a11595f98_JaffaCakes118.exe 101 PID 4868 wrote to memory of 544 4868 0e4119242ecd2b48204c697a11595f98_JaffaCakes118.exe 102 PID 4868 wrote to memory of 544 4868 0e4119242ecd2b48204c697a11595f98_JaffaCakes118.exe 102 PID 4868 wrote to memory of 544 4868 0e4119242ecd2b48204c697a11595f98_JaffaCakes118.exe 102 PID 4868 wrote to memory of 3132 4868 0e4119242ecd2b48204c697a11595f98_JaffaCakes118.exe 103 PID 4868 wrote to memory of 3132 4868 0e4119242ecd2b48204c697a11595f98_JaffaCakes118.exe 103 PID 4868 wrote to memory of 3132 4868 0e4119242ecd2b48204c697a11595f98_JaffaCakes118.exe 103 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 0e4119242ecd2b48204c697a11595f98_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 0e4119242ecd2b48204c697a11595f98_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e4119242ecd2b48204c697a11595f98_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0e4119242ecd2b48204c697a11595f98_JaffaCakes118.exe"1⤵
- UAC bypass
- Identifies Wine through registry keys
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4868 -
C:\XcoderX.exeC:\XcoderX.exe explorer.exe gb2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3016
-
-
C:\XcoderX.exeC:\XcoderX.exe explorer.exe scp2⤵
- Executes dropped EXE
PID:1316
-
-
C:\XcoderX.exeC:\XcoderX.exe explorer.exe gb2⤵
- Executes dropped EXE
PID:544
-
-
C:\XcoderX.exeC:\XcoderX.exe explorer.exe scp2⤵
- Executes dropped EXE
PID:3132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3856,i,12594301322143882025,16832588342008839449,262144 --variations-seed-version --mojo-platform-channel-handle=4288 /prefetch:81⤵PID:1036
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD55db92acdc55ba2a3b7354c98f3a5e20d
SHA105c2ede36b80aafb9c29991c44f2799590387e25
SHA256d9fabeeb71d323fe8a4aa9bb0c62989ba42bed0deea5a9d3a11fa609e9221d89
SHA512f1db297674aa61b0ed34183ab15a08dba17bf4e0d915be33017ad096752521e535c6621905d388f04b641ca5585ebefb6e058cccffc5012af97c73c9f24b32c5