Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
10-07-2024 12:55
Static task
static1
Behavioral task
behavioral1
Sample
34cf3f90fbca2331141d09572a949231_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
34cf3f90fbca2331141d09572a949231_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
34cf3f90fbca2331141d09572a949231_JaffaCakes118.exe
-
Size
3.6MB
-
MD5
34cf3f90fbca2331141d09572a949231
-
SHA1
a875597befae9b3b7d939f722b80734b88dead8f
-
SHA256
991deb6b96f925d8643139635a4c37f909da8892e86556b013a86c418aed2b3c
-
SHA512
54f3a421827513a3a7dd75e8bf67e4514975e444f13871423c22c5fa2f2883fc62419252916d3e8cbc20312655690a3bab8bee6e4b01542bc0fd8c33ec8d14bd
-
SSDEEP
49152:PrJt/IkD2BltGvN+YqHqroeUNPTSwC9ETk1VfydvP9r9WxWD/W:PFhExLHqHUNWr/ydvTKy
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 34cf3f90fbca2331141d09572a949231_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\PowerPointView = "C:\\PowerPointView.exe" 34cf3f90fbca2331141d09572a949231_JaffaCakes118.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 34cf3f90fbca2331141d09572a949231_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5060 34cf3f90fbca2331141d09572a949231_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5060 wrote to memory of 860 5060 34cf3f90fbca2331141d09572a949231_JaffaCakes118.exe 89 PID 5060 wrote to memory of 860 5060 34cf3f90fbca2331141d09572a949231_JaffaCakes118.exe 89 PID 5060 wrote to memory of 860 5060 34cf3f90fbca2331141d09572a949231_JaffaCakes118.exe 89 PID 860 wrote to memory of 4092 860 cmd.exe 91 PID 860 wrote to memory of 4092 860 cmd.exe 91 PID 860 wrote to memory of 4092 860 cmd.exe 91 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 34cf3f90fbca2331141d09572a949231_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 34cf3f90fbca2331141d09572a949231_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\34cf3f90fbca2331141d09572a949231_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\34cf3f90fbca2331141d09572a949231_JaffaCakes118.exe"1⤵
- UAC bypass
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
- System policy modification
PID:5060 -
C:\Windows\SysWOW64\cmd.execmd /k regsvr32 /u /s "C:\Arquivos de programas\Scpad\scpsssh2.dll"2⤵
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /u /s "C:\Arquivos de programas\Scpad\scpsssh2.dll"3⤵PID:4092
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1