Analysis
-
max time kernel
141s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
26/06/2024, 01:23
Static task
static1
Behavioral task
behavioral1
Sample
103d18d4ca3d3bce05d6a0d399e89b55_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
103d18d4ca3d3bce05d6a0d399e89b55_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
103d18d4ca3d3bce05d6a0d399e89b55_JaffaCakes118.exe
-
Size
840KB
-
MD5
103d18d4ca3d3bce05d6a0d399e89b55
-
SHA1
b7fee845cc3bc0b796388e0b4fc8fe89c3f0132a
-
SHA256
44444cadc3f79e4e0c1c3f13931ef9e7b53a2ec4c6e0ab26e08ac046aa55f4eb
-
SHA512
88a1bd0de4c23ba791d0faac37080d28534dff285ac4f9e2e0268138b4c01922b8c6c34eac6c225f36b11fc6a9a3a7c5d1a9a0b1d3cae6b82e93a4a1316b07ab
-
SSDEEP
12288:AyuOvyavYs227xJqrWBeR8omqOigMBfdaYrWCeGc96rrnCrVlN/EAakP+i6Jsiho:AyLLvo27PSW0lpwKfdaRCaPEAJalhup5
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 103d18d4ca3d3bce05d6a0d399e89b55_JaffaCakes118.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Wine 103d18d4ca3d3bce05d6a0d399e89b55_JaffaCakes118.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 103d18d4ca3d3bce05d6a0d399e89b55_JaffaCakes118.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2328 103d18d4ca3d3bce05d6a0d399e89b55_JaffaCakes118.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe 103d18d4ca3d3bce05d6a0d399e89b55_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2328 103d18d4ca3d3bce05d6a0d399e89b55_JaffaCakes118.exe 2328 103d18d4ca3d3bce05d6a0d399e89b55_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2328 103d18d4ca3d3bce05d6a0d399e89b55_JaffaCakes118.exe Token: SeShutdownPrivilege 2328 103d18d4ca3d3bce05d6a0d399e89b55_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2328 103d18d4ca3d3bce05d6a0d399e89b55_JaffaCakes118.exe -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 103d18d4ca3d3bce05d6a0d399e89b55_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 103d18d4ca3d3bce05d6a0d399e89b55_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\103d18d4ca3d3bce05d6a0d399e89b55_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\103d18d4ca3d3bce05d6a0d399e89b55_JaffaCakes118.exe"1⤵
- UAC bypass
- Identifies Wine through registry keys
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2328
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
2Virtualization/Sandbox Evasion
1