Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
12-07-2024 05:15
Static task
static1
Behavioral task
behavioral1
Sample
3c1b1b0997b7708df9dfc922705e27ea_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3c1b1b0997b7708df9dfc922705e27ea_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3c1b1b0997b7708df9dfc922705e27ea_JaffaCakes118.exe
-
Size
422KB
-
MD5
3c1b1b0997b7708df9dfc922705e27ea
-
SHA1
de2ebe17bbd513b34112c1f54383dcd7bff65f3d
-
SHA256
8ba7c0339ddaee9806d54e193c92d03a114fd047c07db9891d27a087bb044689
-
SHA512
4411c66b7cad2d06a0be522b737f0d07e95abb17d1d0db168b46aabf300e35350d1de27355f7cbbef5ae5d07be8e0c4bc1d269ba9f77e0b2c74f8f448ba20937
-
SSDEEP
6144:tl9rOIhjI3Y3by83TdTcQDRcvxCcZXR5sPEHix0IbBBwNt59p0:N99HDTsnsPEHix0II
Malware Config
Signatures
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 3c1b1b0997b7708df9dfc922705e27ea_JaffaCakes118.exe -
Power Settings 1 TTPs 2 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 2388 cmd.exe 2688 powercfg.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2540 3c1b1b0997b7708df9dfc922705e27ea_JaffaCakes118.exe 2540 3c1b1b0997b7708df9dfc922705e27ea_JaffaCakes118.exe 2540 3c1b1b0997b7708df9dfc922705e27ea_JaffaCakes118.exe 2540 3c1b1b0997b7708df9dfc922705e27ea_JaffaCakes118.exe 2112 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeShutdownPrivilege 2688 powercfg.exe Token: SeDebugPrivilege 2540 3c1b1b0997b7708df9dfc922705e27ea_JaffaCakes118.exe Token: SeDebugPrivilege 2112 powershell.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2540 wrote to memory of 2388 2540 3c1b1b0997b7708df9dfc922705e27ea_JaffaCakes118.exe 31 PID 2540 wrote to memory of 2388 2540 3c1b1b0997b7708df9dfc922705e27ea_JaffaCakes118.exe 31 PID 2540 wrote to memory of 2388 2540 3c1b1b0997b7708df9dfc922705e27ea_JaffaCakes118.exe 31 PID 2388 wrote to memory of 2688 2388 cmd.exe 33 PID 2388 wrote to memory of 2688 2388 cmd.exe 33 PID 2388 wrote to memory of 2688 2388 cmd.exe 33 PID 2540 wrote to memory of 1964 2540 3c1b1b0997b7708df9dfc922705e27ea_JaffaCakes118.exe 34 PID 2540 wrote to memory of 1964 2540 3c1b1b0997b7708df9dfc922705e27ea_JaffaCakes118.exe 34 PID 2540 wrote to memory of 1964 2540 3c1b1b0997b7708df9dfc922705e27ea_JaffaCakes118.exe 34 PID 1964 wrote to memory of 2152 1964 cmd.exe 36 PID 1964 wrote to memory of 2152 1964 cmd.exe 36 PID 1964 wrote to memory of 2152 1964 cmd.exe 36 PID 2540 wrote to memory of 1164 2540 3c1b1b0997b7708df9dfc922705e27ea_JaffaCakes118.exe 37 PID 2540 wrote to memory of 1164 2540 3c1b1b0997b7708df9dfc922705e27ea_JaffaCakes118.exe 37 PID 2540 wrote to memory of 1164 2540 3c1b1b0997b7708df9dfc922705e27ea_JaffaCakes118.exe 37 PID 1164 wrote to memory of 2476 1164 cmd.exe 39 PID 1164 wrote to memory of 2476 1164 cmd.exe 39 PID 1164 wrote to memory of 2476 1164 cmd.exe 39 PID 2540 wrote to memory of 2112 2540 3c1b1b0997b7708df9dfc922705e27ea_JaffaCakes118.exe 40 PID 2540 wrote to memory of 2112 2540 3c1b1b0997b7708df9dfc922705e27ea_JaffaCakes118.exe 40 PID 2540 wrote to memory of 2112 2540 3c1b1b0997b7708df9dfc922705e27ea_JaffaCakes118.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c1b1b0997b7708df9dfc922705e27ea_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3c1b1b0997b7708df9dfc922705e27ea_JaffaCakes118.exe"1⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\system32\cmd.exe"cmd" /c powercfg -l2⤵
- Power Settings
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\system32\powercfg.exepowercfg -l3⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:2688
-
-
-
C:\Windows\system32\cmd.exe"cmd" /c bcdedit2⤵
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\system32\bcdedit.exebcdedit3⤵PID:2152
-
-
-
C:\Windows\system32\cmd.exe"cmd" /c fsutil behavior query DisableDeleteNotify2⤵
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Windows\system32\fsutil.exefsutil behavior query DisableDeleteNotify3⤵PID:2476
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" (get-appxpackage -allusers).name2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2112
-