Analysis
-
max time kernel
124s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
03/07/2024, 10:37
Static task
static1
Behavioral task
behavioral1
Sample
220e43fd9346713b5cdb86cecd91dc78_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
220e43fd9346713b5cdb86cecd91dc78_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
220e43fd9346713b5cdb86cecd91dc78_JaffaCakes118.exe
-
Size
1.0MB
-
MD5
220e43fd9346713b5cdb86cecd91dc78
-
SHA1
725c0ad9da614da0ec7bd567bfff2cb313d8c2f9
-
SHA256
432cb176f3409b81eb25e575778db18894a4b831a58e38654b8c838c4e49b878
-
SHA512
a72f1296d2795433701d820c30b6e7c2db0e0a30bc018c8ac13c30e09958afd38f23d10cd2ba3b28248a3c81d6c72accf13023233cc18b1b51c7e5d406a2674c
-
SSDEEP
24576:QCoXu2+s67JT+tJB+Ql3G6HkJrgQ2bJ1IWf:8OENG6HkJrcJ1I
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\svvhost.exe" 220e43fd9346713b5cdb86cecd91dc78_JaffaCakes118.exe -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 whatismyip.com 9 ip-address.domaintools.com 11 ip-address.domaintools.com 12 ip-address.domaintools.com -
Modifies registry key 1 TTPs 1 IoCs
pid Process 4636 reg.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1724 220e43fd9346713b5cdb86cecd91dc78_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1724 wrote to memory of 4588 1724 220e43fd9346713b5cdb86cecd91dc78_JaffaCakes118.exe 28 PID 1724 wrote to memory of 4588 1724 220e43fd9346713b5cdb86cecd91dc78_JaffaCakes118.exe 28 PID 1724 wrote to memory of 4588 1724 220e43fd9346713b5cdb86cecd91dc78_JaffaCakes118.exe 28 PID 1724 wrote to memory of 4588 1724 220e43fd9346713b5cdb86cecd91dc78_JaffaCakes118.exe 28 PID 4588 wrote to memory of 4636 4588 cmd.exe 30 PID 4588 wrote to memory of 4636 4588 cmd.exe 30 PID 4588 wrote to memory of 4636 4588 cmd.exe 30 PID 4588 wrote to memory of 4636 4588 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\220e43fd9346713b5cdb86cecd91dc78_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\220e43fd9346713b5cdb86cecd91dc78_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\System32\cmd.exe /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f2⤵
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- UAC bypass
- Modifies registry key
PID:4636
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1