Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
15/07/2024, 06:53
Static task
static1
Behavioral task
behavioral1
Sample
48b047d884d11408c6bed452522a089c_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
48b047d884d11408c6bed452522a089c_JaffaCakes118.exe
-
Size
314KB
-
MD5
48b047d884d11408c6bed452522a089c
-
SHA1
6b254c742511617ceceb9cbc6bd01e08ae0a3f1d
-
SHA256
e3ad085da6b8fe2c81b37584c771d2cc7f80d8f1d777f64e6ae94963a7de69ef
-
SHA512
1dd89a19895a0ee979062ea2a383daf21850f33f9b2cc482c95d2c00f0ebdf28dc1a8ffbcfaf2cd19cb8a4fb1d275f94a6808a4b7cbead033fd9f97efd9a50f5
-
SSDEEP
6144:JYYYYYYYYYYB3GBWW14OWlRmHI0qEbrBlTOhbFCeOk4knq7Z/:JYYYYYYYYYYB2IW1ARmo0NrB2BCbk4km
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 whatismyip.com -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor 48b047d884d11408c6bed452522a089c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 48b047d884d11408c6bed452522a089c_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier 48b047d884d11408c6bed452522a089c_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 48b047d884d11408c6bed452522a089c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor 48b047d884d11408c6bed452522a089c_JaffaCakes118.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2900 reg.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1624 48b047d884d11408c6bed452522a089c_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1624 48b047d884d11408c6bed452522a089c_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1624 48b047d884d11408c6bed452522a089c_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1624 wrote to memory of 2012 1624 48b047d884d11408c6bed452522a089c_JaffaCakes118.exe 30 PID 1624 wrote to memory of 2012 1624 48b047d884d11408c6bed452522a089c_JaffaCakes118.exe 30 PID 1624 wrote to memory of 2012 1624 48b047d884d11408c6bed452522a089c_JaffaCakes118.exe 30 PID 1624 wrote to memory of 2012 1624 48b047d884d11408c6bed452522a089c_JaffaCakes118.exe 30 PID 2012 wrote to memory of 2900 2012 cmd.exe 32 PID 2012 wrote to memory of 2900 2012 cmd.exe 32 PID 2012 wrote to memory of 2900 2012 cmd.exe 32 PID 2012 wrote to memory of 2900 2012 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\48b047d884d11408c6bed452522a089c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\48b047d884d11408c6bed452522a089c_JaffaCakes118.exe"1⤵
- Checks processor information in registry
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\System32\cmd.exe /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f2⤵
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- UAC bypass
- Modifies registry key
PID:2900
-
-