Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
27-06-2024 13:02
Static task
static1
Behavioral task
behavioral1
Sample
16199e7c7f4d360a143a17e5860fcf49_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
16199e7c7f4d360a143a17e5860fcf49_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
16199e7c7f4d360a143a17e5860fcf49_JaffaCakes118.exe
-
Size
348KB
-
MD5
16199e7c7f4d360a143a17e5860fcf49
-
SHA1
8b68750b4f803c27a79c4d1f25fedb3bae0ddefc
-
SHA256
483b237b460cb26f476aaf4b62a3fb5f60b04f90216b79f8c2270198d2d9119e
-
SHA512
2674d58ee81f540a507f57328d2d9d606e9c23dc6790b7598c73ac06f23690b475dd71a169fd84cb03fcac66b4839ecdeab562df653ab52f6e7a278f5a98bffd
-
SSDEEP
6144:v05fXinu2/sQe+wLd2wcrrE2iPismhJmP:gaf/sQVEd2wcrI2iasowP
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 043A6A5B00014973000C17F1B4EB2331.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 043A6A5B00014973000C17F1B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 043A6A5B00014973000C17F1B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 043A6A5B00014973000C17F1B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 043A6A5B00014973000C17F1B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 043A6A5B00014973000C17F1B4EB2331.exe -
Disables taskbar notifications via registry modification
-
Deletes itself 1 IoCs
pid Process 1672 043A6A5B00014973000C17F1B4EB2331.exe -
Executes dropped EXE 1 IoCs
pid Process 1672 043A6A5B00014973000C17F1B4EB2331.exe -
Loads dropped DLL 2 IoCs
pid Process 1848 16199e7c7f4d360a143a17e5860fcf49_JaffaCakes118.exe 1848 16199e7c7f4d360a143a17e5860fcf49_JaffaCakes118.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 043A6A5B00014973000C17F1B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 043A6A5B00014973000C17F1B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 043A6A5B00014973000C17F1B4EB2331.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc 043A6A5B00014973000C17F1B4EB2331.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc 043A6A5B00014973000C17F1B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 043A6A5B00014973000C17F1B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 043A6A5B00014973000C17F1B4EB2331.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 043A6A5B00014973000C17F1B4EB2331.exe -
Modifies registry class 22 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\043A6\ = "Application" 043A6A5B00014973000C17F1B4EB2331.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\043A6\DefaultIcon 043A6A5B00014973000C17F1B4EB2331.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\043A6\DefaultIcon\ = "%1" 043A6A5B00014973000C17F1B4EB2331.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\043A6\shell\open\command 043A6A5B00014973000C17F1B4EB2331.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\043A6\shell 043A6A5B00014973000C17F1B4EB2331.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\043A6\shell\start 043A6A5B00014973000C17F1B4EB2331.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\043A6 043A6A5B00014973000C17F1B4EB2331.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\043A6\shell\runas\command 043A6A5B00014973000C17F1B4EB2331.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\%s\ = "043A6" 043A6A5B00014973000C17F1B4EB2331.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\043A6\Content Type = "application/x-msdownload" 043A6A5B00014973000C17F1B4EB2331.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\043A6\shell\open\command\IsolatedCommand = "\"%1\" %*" 043A6A5B00014973000C17F1B4EB2331.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\043A6\shell\start\command\ = "\"%1\" %*" 043A6A5B00014973000C17F1B4EB2331.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\043A6\shell\runas 043A6A5B00014973000C17F1B4EB2331.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\043A6\shell\runas\command\ = "\"%1\" %*" 043A6A5B00014973000C17F1B4EB2331.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\.exe 043A6A5B00014973000C17F1B4EB2331.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\%s 043A6A5B00014973000C17F1B4EB2331.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\043A6\shell\open 043A6A5B00014973000C17F1B4EB2331.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\043A6\shell\open\command\ = "\"C:\\ProgramData\\043A6A5B00014973000C17F1B4EB2331\\043A6A5B00014973000C17F1B4EB2331.exe\" -s \"%1\" %*" 043A6A5B00014973000C17F1B4EB2331.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\043A6\shell\start\command 043A6A5B00014973000C17F1B4EB2331.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\043A6\shell\start\command\IsolatedCommand = "\"%1\" %*" 043A6A5B00014973000C17F1B4EB2331.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\043A6\shell\runas\command\IsolatedCommand = "\"%1\" %*" 043A6A5B00014973000C17F1B4EB2331.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\.exe\ = "043A6" 043A6A5B00014973000C17F1B4EB2331.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1848 16199e7c7f4d360a143a17e5860fcf49_JaffaCakes118.exe 1672 043A6A5B00014973000C17F1B4EB2331.exe 1672 043A6A5B00014973000C17F1B4EB2331.exe 1672 043A6A5B00014973000C17F1B4EB2331.exe 1672 043A6A5B00014973000C17F1B4EB2331.exe 1672 043A6A5B00014973000C17F1B4EB2331.exe 1672 043A6A5B00014973000C17F1B4EB2331.exe 1672 043A6A5B00014973000C17F1B4EB2331.exe 1672 043A6A5B00014973000C17F1B4EB2331.exe 1672 043A6A5B00014973000C17F1B4EB2331.exe 1672 043A6A5B00014973000C17F1B4EB2331.exe 1672 043A6A5B00014973000C17F1B4EB2331.exe 1672 043A6A5B00014973000C17F1B4EB2331.exe 1672 043A6A5B00014973000C17F1B4EB2331.exe 1672 043A6A5B00014973000C17F1B4EB2331.exe 1672 043A6A5B00014973000C17F1B4EB2331.exe 1672 043A6A5B00014973000C17F1B4EB2331.exe 1672 043A6A5B00014973000C17F1B4EB2331.exe 1672 043A6A5B00014973000C17F1B4EB2331.exe 1672 043A6A5B00014973000C17F1B4EB2331.exe 1672 043A6A5B00014973000C17F1B4EB2331.exe 1672 043A6A5B00014973000C17F1B4EB2331.exe 1672 043A6A5B00014973000C17F1B4EB2331.exe 1672 043A6A5B00014973000C17F1B4EB2331.exe 1672 043A6A5B00014973000C17F1B4EB2331.exe 1672 043A6A5B00014973000C17F1B4EB2331.exe 1672 043A6A5B00014973000C17F1B4EB2331.exe 1672 043A6A5B00014973000C17F1B4EB2331.exe 1672 043A6A5B00014973000C17F1B4EB2331.exe 1672 043A6A5B00014973000C17F1B4EB2331.exe 1672 043A6A5B00014973000C17F1B4EB2331.exe 1672 043A6A5B00014973000C17F1B4EB2331.exe 1672 043A6A5B00014973000C17F1B4EB2331.exe 1672 043A6A5B00014973000C17F1B4EB2331.exe 1672 043A6A5B00014973000C17F1B4EB2331.exe 1672 043A6A5B00014973000C17F1B4EB2331.exe 1672 043A6A5B00014973000C17F1B4EB2331.exe 1672 043A6A5B00014973000C17F1B4EB2331.exe 1672 043A6A5B00014973000C17F1B4EB2331.exe 1672 043A6A5B00014973000C17F1B4EB2331.exe 1672 043A6A5B00014973000C17F1B4EB2331.exe 1672 043A6A5B00014973000C17F1B4EB2331.exe 1672 043A6A5B00014973000C17F1B4EB2331.exe 1672 043A6A5B00014973000C17F1B4EB2331.exe 1672 043A6A5B00014973000C17F1B4EB2331.exe 1672 043A6A5B00014973000C17F1B4EB2331.exe 1672 043A6A5B00014973000C17F1B4EB2331.exe 1672 043A6A5B00014973000C17F1B4EB2331.exe 1672 043A6A5B00014973000C17F1B4EB2331.exe 1672 043A6A5B00014973000C17F1B4EB2331.exe 1672 043A6A5B00014973000C17F1B4EB2331.exe 1672 043A6A5B00014973000C17F1B4EB2331.exe 1672 043A6A5B00014973000C17F1B4EB2331.exe 1672 043A6A5B00014973000C17F1B4EB2331.exe 1672 043A6A5B00014973000C17F1B4EB2331.exe 1672 043A6A5B00014973000C17F1B4EB2331.exe 1672 043A6A5B00014973000C17F1B4EB2331.exe 1672 043A6A5B00014973000C17F1B4EB2331.exe 1672 043A6A5B00014973000C17F1B4EB2331.exe 1672 043A6A5B00014973000C17F1B4EB2331.exe 1672 043A6A5B00014973000C17F1B4EB2331.exe 1672 043A6A5B00014973000C17F1B4EB2331.exe 1672 043A6A5B00014973000C17F1B4EB2331.exe 1672 043A6A5B00014973000C17F1B4EB2331.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1672 043A6A5B00014973000C17F1B4EB2331.exe 1672 043A6A5B00014973000C17F1B4EB2331.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1672 043A6A5B00014973000C17F1B4EB2331.exe 1672 043A6A5B00014973000C17F1B4EB2331.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1672 043A6A5B00014973000C17F1B4EB2331.exe 1672 043A6A5B00014973000C17F1B4EB2331.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1848 wrote to memory of 1672 1848 16199e7c7f4d360a143a17e5860fcf49_JaffaCakes118.exe 28 PID 1848 wrote to memory of 1672 1848 16199e7c7f4d360a143a17e5860fcf49_JaffaCakes118.exe 28 PID 1848 wrote to memory of 1672 1848 16199e7c7f4d360a143a17e5860fcf49_JaffaCakes118.exe 28 PID 1848 wrote to memory of 1672 1848 16199e7c7f4d360a143a17e5860fcf49_JaffaCakes118.exe 28 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 043A6A5B00014973000C17F1B4EB2331.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\16199e7c7f4d360a143a17e5860fcf49_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\16199e7c7f4d360a143a17e5860fcf49_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\ProgramData\043A6A5B00014973000C17F1B4EB2331\043A6A5B00014973000C17F1B4EB2331.exe"C:\ProgramData\043A6A5B00014973000C17F1B4EB2331\043A6A5B00014973000C17F1B4EB2331.exe" -d "C:\Users\Admin\AppData\Local\Temp\16199e7c7f4d360a143a17e5860fcf49_JaffaCakes118.exe"2⤵
- UAC bypass
- Windows security bypass
- Deletes itself
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1672
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
328B
MD5058256d3dcd7bef405af99bde468e6c2
SHA13f7f5af99b418712ef9cb6961d8a27a3ea472db5
SHA256a79e1ffe37cff739672245e83362e8af450fbc9e8414bcb4d254ad6f3f30ae60
SHA512210bfb8dacc57cd46b4294f388044350f09bf01cb35944938a53b6915d6dccfa19eabda7777ae269e858d92f905a88e5cfef6fc231e08d50568b64d2e0c75c0e
-
Filesize
348KB
MD516199e7c7f4d360a143a17e5860fcf49
SHA18b68750b4f803c27a79c4d1f25fedb3bae0ddefc
SHA256483b237b460cb26f476aaf4b62a3fb5f60b04f90216b79f8c2270198d2d9119e
SHA5122674d58ee81f540a507f57328d2d9d606e9c23dc6790b7598c73ac06f23690b475dd71a169fd84cb03fcac66b4839ecdeab562df653ab52f6e7a278f5a98bffd