Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
25-06-2024 13:36
Static task
static1
Behavioral task
behavioral1
Sample
0e44d93012cc78cabf2d992a608bff56_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
0e44d93012cc78cabf2d992a608bff56_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
0e44d93012cc78cabf2d992a608bff56_JaffaCakes118.exe
-
Size
357KB
-
MD5
0e44d93012cc78cabf2d992a608bff56
-
SHA1
875faa5333e3ebd334e19b5b7edd3d711f38365c
-
SHA256
b0bebc565449beb9f3b4c23adec30e603026a04db6126a7e5e1cac1bc4f97655
-
SHA512
aa4849ee4c3d6b1c84e6ea4d6ba9c7f30987c2ad3b68350e8cda5cce9b0c32e0e839df48fb6abcbd0ce43192411aba03464c27e06b7d551f75d36052133dd813
-
SSDEEP
6144:Bmnm9nFK7Ax+LYBrtSRbIqz+WSrLGj+wvjG+qhloMHDjFN6naDzsJK:BhMAxQ1bH8azq0SFNGaPsJK
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 043A6A5B00014973000A64BEB4EB2331.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 043A6A5B00014973000A64BEB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 043A6A5B00014973000A64BEB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 043A6A5B00014973000A64BEB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 043A6A5B00014973000A64BEB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 043A6A5B00014973000A64BEB4EB2331.exe -
Disables taskbar notifications via registry modification
-
Deletes itself 1 IoCs
pid Process 2472 043A6A5B00014973000A64BEB4EB2331.exe -
Executes dropped EXE 1 IoCs
pid Process 2472 043A6A5B00014973000A64BEB4EB2331.exe -
Loads dropped DLL 2 IoCs
pid Process 2184 0e44d93012cc78cabf2d992a608bff56_JaffaCakes118.exe 2184 0e44d93012cc78cabf2d992a608bff56_JaffaCakes118.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 043A6A5B00014973000A64BEB4EB2331.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc 043A6A5B00014973000A64BEB4EB2331.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc 043A6A5B00014973000A64BEB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 043A6A5B00014973000A64BEB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 043A6A5B00014973000A64BEB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 043A6A5B00014973000A64BEB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 043A6A5B00014973000A64BEB4EB2331.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 043A6A5B00014973000A64BEB4EB2331.exe -
Modifies registry class 22 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\043A6 043A6A5B00014973000A64BEB4EB2331.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\043A6\DefaultIcon 043A6A5B00014973000A64BEB4EB2331.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\043A6\shell\open 043A6A5B00014973000A64BEB4EB2331.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\043A6\shell\start\command\ = "\"%1\" %*" 043A6A5B00014973000A64BEB4EB2331.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\043A6\shell\runas\command 043A6A5B00014973000A64BEB4EB2331.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\043A6\shell\runas\command\IsolatedCommand = "\"%1\" %*" 043A6A5B00014973000A64BEB4EB2331.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\.exe 043A6A5B00014973000A64BEB4EB2331.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\043A6\shell\runas 043A6A5B00014973000A64BEB4EB2331.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\%s 043A6A5B00014973000A64BEB4EB2331.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\043A6\Content Type = "application/x-msdownload" 043A6A5B00014973000A64BEB4EB2331.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\043A6\DefaultIcon\ = "%1" 043A6A5B00014973000A64BEB4EB2331.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\043A6\shell\start\command 043A6A5B00014973000A64BEB4EB2331.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\043A6\shell\start 043A6A5B00014973000A64BEB4EB2331.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\043A6\shell\start\command\IsolatedCommand = "\"%1\" %*" 043A6A5B00014973000A64BEB4EB2331.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\043A6\shell\runas\command\ = "\"%1\" %*" 043A6A5B00014973000A64BEB4EB2331.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\%s\ = "043A6" 043A6A5B00014973000A64BEB4EB2331.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\043A6\ = "Application" 043A6A5B00014973000A64BEB4EB2331.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\043A6\shell\open\command 043A6A5B00014973000A64BEB4EB2331.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\043A6\shell 043A6A5B00014973000A64BEB4EB2331.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\043A6\shell\open\command\ = "\"C:\\ProgramData\\043A6A5B00014973000A64BEB4EB2331\\043A6A5B00014973000A64BEB4EB2331.exe\" -s \"%1\" %*" 043A6A5B00014973000A64BEB4EB2331.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\043A6\shell\open\command\IsolatedCommand = "\"%1\" %*" 043A6A5B00014973000A64BEB4EB2331.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\.exe\ = "043A6" 043A6A5B00014973000A64BEB4EB2331.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2184 0e44d93012cc78cabf2d992a608bff56_JaffaCakes118.exe 2472 043A6A5B00014973000A64BEB4EB2331.exe 2472 043A6A5B00014973000A64BEB4EB2331.exe 2472 043A6A5B00014973000A64BEB4EB2331.exe 2472 043A6A5B00014973000A64BEB4EB2331.exe 2472 043A6A5B00014973000A64BEB4EB2331.exe 2472 043A6A5B00014973000A64BEB4EB2331.exe 2472 043A6A5B00014973000A64BEB4EB2331.exe 2472 043A6A5B00014973000A64BEB4EB2331.exe 2472 043A6A5B00014973000A64BEB4EB2331.exe 2472 043A6A5B00014973000A64BEB4EB2331.exe 2472 043A6A5B00014973000A64BEB4EB2331.exe 2472 043A6A5B00014973000A64BEB4EB2331.exe 2472 043A6A5B00014973000A64BEB4EB2331.exe 2472 043A6A5B00014973000A64BEB4EB2331.exe 2472 043A6A5B00014973000A64BEB4EB2331.exe 2472 043A6A5B00014973000A64BEB4EB2331.exe 2472 043A6A5B00014973000A64BEB4EB2331.exe 2472 043A6A5B00014973000A64BEB4EB2331.exe 2472 043A6A5B00014973000A64BEB4EB2331.exe 2472 043A6A5B00014973000A64BEB4EB2331.exe 2472 043A6A5B00014973000A64BEB4EB2331.exe 2472 043A6A5B00014973000A64BEB4EB2331.exe 2472 043A6A5B00014973000A64BEB4EB2331.exe 2472 043A6A5B00014973000A64BEB4EB2331.exe 2472 043A6A5B00014973000A64BEB4EB2331.exe 2472 043A6A5B00014973000A64BEB4EB2331.exe 2472 043A6A5B00014973000A64BEB4EB2331.exe 2472 043A6A5B00014973000A64BEB4EB2331.exe 2472 043A6A5B00014973000A64BEB4EB2331.exe 2472 043A6A5B00014973000A64BEB4EB2331.exe 2472 043A6A5B00014973000A64BEB4EB2331.exe 2472 043A6A5B00014973000A64BEB4EB2331.exe 2472 043A6A5B00014973000A64BEB4EB2331.exe 2472 043A6A5B00014973000A64BEB4EB2331.exe 2472 043A6A5B00014973000A64BEB4EB2331.exe 2472 043A6A5B00014973000A64BEB4EB2331.exe 2472 043A6A5B00014973000A64BEB4EB2331.exe 2472 043A6A5B00014973000A64BEB4EB2331.exe 2472 043A6A5B00014973000A64BEB4EB2331.exe 2472 043A6A5B00014973000A64BEB4EB2331.exe 2472 043A6A5B00014973000A64BEB4EB2331.exe 2472 043A6A5B00014973000A64BEB4EB2331.exe 2472 043A6A5B00014973000A64BEB4EB2331.exe 2472 043A6A5B00014973000A64BEB4EB2331.exe 2472 043A6A5B00014973000A64BEB4EB2331.exe 2472 043A6A5B00014973000A64BEB4EB2331.exe 2472 043A6A5B00014973000A64BEB4EB2331.exe 2472 043A6A5B00014973000A64BEB4EB2331.exe 2472 043A6A5B00014973000A64BEB4EB2331.exe 2472 043A6A5B00014973000A64BEB4EB2331.exe 2472 043A6A5B00014973000A64BEB4EB2331.exe 2472 043A6A5B00014973000A64BEB4EB2331.exe 2472 043A6A5B00014973000A64BEB4EB2331.exe 2472 043A6A5B00014973000A64BEB4EB2331.exe 2472 043A6A5B00014973000A64BEB4EB2331.exe 2472 043A6A5B00014973000A64BEB4EB2331.exe 2472 043A6A5B00014973000A64BEB4EB2331.exe 2472 043A6A5B00014973000A64BEB4EB2331.exe 2472 043A6A5B00014973000A64BEB4EB2331.exe 2472 043A6A5B00014973000A64BEB4EB2331.exe 2472 043A6A5B00014973000A64BEB4EB2331.exe 2472 043A6A5B00014973000A64BEB4EB2331.exe 2472 043A6A5B00014973000A64BEB4EB2331.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2472 043A6A5B00014973000A64BEB4EB2331.exe 2472 043A6A5B00014973000A64BEB4EB2331.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2472 043A6A5B00014973000A64BEB4EB2331.exe 2472 043A6A5B00014973000A64BEB4EB2331.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2472 043A6A5B00014973000A64BEB4EB2331.exe 2472 043A6A5B00014973000A64BEB4EB2331.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2184 wrote to memory of 2472 2184 0e44d93012cc78cabf2d992a608bff56_JaffaCakes118.exe 28 PID 2184 wrote to memory of 2472 2184 0e44d93012cc78cabf2d992a608bff56_JaffaCakes118.exe 28 PID 2184 wrote to memory of 2472 2184 0e44d93012cc78cabf2d992a608bff56_JaffaCakes118.exe 28 PID 2184 wrote to memory of 2472 2184 0e44d93012cc78cabf2d992a608bff56_JaffaCakes118.exe 28 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 043A6A5B00014973000A64BEB4EB2331.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e44d93012cc78cabf2d992a608bff56_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0e44d93012cc78cabf2d992a608bff56_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\ProgramData\043A6A5B00014973000A64BEB4EB2331\043A6A5B00014973000A64BEB4EB2331.exe"C:\ProgramData\043A6A5B00014973000A64BEB4EB2331\043A6A5B00014973000A64BEB4EB2331.exe" -d "C:\Users\Admin\AppData\Local\Temp\0e44d93012cc78cabf2d992a608bff56_JaffaCakes118.exe"2⤵
- UAC bypass
- Windows security bypass
- Deletes itself
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2472
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
328B
MD5c91120de97a80b82be8521456a3866d1
SHA12cd8aafe66ce5a88591ca752d5a393324b6978b9
SHA256b66f781fcd53933a8f6ec5fe1021b453c53c54ed3e292bd6af89831742909ed6
SHA5129ee112461c98d2eca2a1b53d97ce1d9be1849b25d78212069bc44ddeed27a0b009c2e6ee2c27e5ab20a5caf27406d95a2c7d1d1cc01cd67dda5ed25f3214b5f1
-
Filesize
357KB
MD50e44d93012cc78cabf2d992a608bff56
SHA1875faa5333e3ebd334e19b5b7edd3d711f38365c
SHA256b0bebc565449beb9f3b4c23adec30e603026a04db6126a7e5e1cac1bc4f97655
SHA512aa4849ee4c3d6b1c84e6ea4d6ba9c7f30987c2ad3b68350e8cda5cce9b0c32e0e839df48fb6abcbd0ce43192411aba03464c27e06b7d551f75d36052133dd813