Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03-07-2024 19:54
Static task
static1
Behavioral task
behavioral1
Sample
238faf0b598e66dc9404cbe78b481d3d_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
238faf0b598e66dc9404cbe78b481d3d_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
238faf0b598e66dc9404cbe78b481d3d_JaffaCakes118.exe
-
Size
98KB
-
MD5
238faf0b598e66dc9404cbe78b481d3d
-
SHA1
b97730563a9be6c40b1b7901928e679c17e2793b
-
SHA256
237e3316006e3022fc11b1db8943af0c9734d06aedd4937e2978c89ecc6a0210
-
SHA512
6a43902410aa60b2d9f21f18c1076446c56bb42c999b89186a6cc1721f9298963644accfe7fff1a705f11cf09153b84a5f713874f205d82ae408421226273907
-
SSDEEP
3072:NeUC2iXSDRGS9UL2F2Hr2HjFt6HAi7lSw2H8I:NecYIbfvS4
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLua = "0" 238faf0b598e66dc9404cbe78b481d3d_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\OptionalComponents\MSFS 238faf0b598e66dc9404cbe78b481d3d_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\OptionalComponents\MAPI 238faf0b598e66dc9404cbe78b481d3d_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\OptionalComponents\IMAIL 238faf0b598e66dc9404cbe78b481d3d_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\OptionalComponents 238faf0b598e66dc9404cbe78b481d3d_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run 238faf0b598e66dc9404cbe78b481d3d_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run 238faf0b598e66dc9404cbe78b481d3d_JaffaCakes118.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLua = "0" 238faf0b598e66dc9404cbe78b481d3d_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1976 wrote to memory of 2728 1976 238faf0b598e66dc9404cbe78b481d3d_JaffaCakes118.exe 28 PID 1976 wrote to memory of 2728 1976 238faf0b598e66dc9404cbe78b481d3d_JaffaCakes118.exe 28 PID 1976 wrote to memory of 2728 1976 238faf0b598e66dc9404cbe78b481d3d_JaffaCakes118.exe 28 PID 1976 wrote to memory of 2728 1976 238faf0b598e66dc9404cbe78b481d3d_JaffaCakes118.exe 28 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 238faf0b598e66dc9404cbe78b481d3d_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLua = "0" 238faf0b598e66dc9404cbe78b481d3d_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\238faf0b598e66dc9404cbe78b481d3d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\238faf0b598e66dc9404cbe78b481d3d_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\238faf0b598e66dc9404cbe78b481d3d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\238faf0b598e66dc9404cbe78b481d3d_JaffaCakes118.exe" Administrator2⤵
- UAC bypass
- Adds Run key to start application
- Checks whether UAC is enabled
- System policy modification
PID:2728
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1