Analysis
-
max time kernel
92s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2024, 22:16
Static task
static1
Behavioral task
behavioral1
Sample
3aec816eed6ce0553e21084d0f5d216a_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
3aec816eed6ce0553e21084d0f5d216a_JaffaCakes118.exe
-
Size
392KB
-
MD5
3aec816eed6ce0553e21084d0f5d216a
-
SHA1
bd607d0b4a0b9ffd263aafb49cf41b689da9fa05
-
SHA256
1c9fccf7955654c4f890ce64b33833d22258035f82131e26dc6fd3f4c7ef9df9
-
SHA512
a463f24c7ed48371953eb9b0b66d438ccf237716197e7f4b5ce4865d2f5371ccfced359a6eda2217a689c7c977d4b744c978fc2e9d5c882befa3f58760d5baf3
-
SSDEEP
12288:mVJ7URfw9/JYhA8MveSqkyqx61/OQvQ9fog0ghc1:mVJ7URfw9/J7yqx6FOQxkc1
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 3aec816eed6ce0553e21084d0f5d216a_JaffaCakes118.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" 3aec816eed6ce0553e21084d0f5d216a_JaffaCakes118.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" 3aec816eed6ce0553e21084d0f5d216a_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4064 2680 WerFault.exe 82 -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2716 schtasks.exe 1980 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2680 wrote to memory of 2716 2680 3aec816eed6ce0553e21084d0f5d216a_JaffaCakes118.exe 84 PID 2680 wrote to memory of 2716 2680 3aec816eed6ce0553e21084d0f5d216a_JaffaCakes118.exe 84 PID 2680 wrote to memory of 2716 2680 3aec816eed6ce0553e21084d0f5d216a_JaffaCakes118.exe 84 PID 2680 wrote to memory of 1980 2680 3aec816eed6ce0553e21084d0f5d216a_JaffaCakes118.exe 85 PID 2680 wrote to memory of 1980 2680 3aec816eed6ce0553e21084d0f5d216a_JaffaCakes118.exe 85 PID 2680 wrote to memory of 1980 2680 3aec816eed6ce0553e21084d0f5d216a_JaffaCakes118.exe 85 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 3aec816eed6ce0553e21084d0f5d216a_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3aec816eed6ce0553e21084d0f5d216a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3aec816eed6ce0553e21084d0f5d216a_JaffaCakes118.exe"1⤵
- UAC bypass
- Windows security bypass
- Windows security modification
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2680 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn alg /tr C:\Users\Admin\AppData\Roaming\sys\alg.exe /sc onlogon /ru "NT AUTHORITY\SYSTEM"2⤵
- Scheduled Task/Job: Scheduled Task
PID:2716
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn store /tr C:\Users\Admin\AppData\Roaming\sys\store.exe /sc onlogon /ru "NT AUTHORITY\SYSTEM"2⤵
- Scheduled Task/Job: Scheduled Task
PID:1980
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2680 -s 18642⤵
- Program crash
PID:4064
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2680 -ip 26801⤵PID:3956
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Scheduled Task
1