Analysis
-
max time kernel
141s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25-07-2024 21:40
Static task
static1
Behavioral task
behavioral1
Sample
71582d8546ea6ee53ee9ce8bfca380f4_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
71582d8546ea6ee53ee9ce8bfca380f4_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
71582d8546ea6ee53ee9ce8bfca380f4_JaffaCakes118.exe
-
Size
1.5MB
-
MD5
71582d8546ea6ee53ee9ce8bfca380f4
-
SHA1
6b52f8677041db3ac07e0baa0271a2bd0476f2cb
-
SHA256
cc8621e466bb18e25b1eb7f63fac0132483249a6ef4fedc56b8e14cec0f1842e
-
SHA512
8afe0ce93d3cb3578f088534bb32c47290f1ab4f7d5fd1083dffffd7fdc6f0035ab821b7af88e246a59b6f15401cdd8b7ae586a858eb75f79eb9358fec937402
-
SSDEEP
24576:2/1d25dSdfHfiL8j0Ar3E3RBFShSuU0xMVS90hQMhbze0aeU1IWuu63zOFNQ7Yrm:IQCfWk3UnSnxMVSwaT1IPpOFNUYr
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RUN\JavaUpdater = "C:\\Users\\Admin\\AppData\\Local\\Temp\\71582d8546ea6ee53ee9ce8bfca380f4_JaffaCakes118.exe" 71582d8546ea6ee53ee9ce8bfca380f4_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 71582d8546ea6ee53ee9ce8bfca380f4_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2908 reg.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1628 wrote to memory of 2932 1628 71582d8546ea6ee53ee9ce8bfca380f4_JaffaCakes118.exe 30 PID 1628 wrote to memory of 2932 1628 71582d8546ea6ee53ee9ce8bfca380f4_JaffaCakes118.exe 30 PID 1628 wrote to memory of 2932 1628 71582d8546ea6ee53ee9ce8bfca380f4_JaffaCakes118.exe 30 PID 1628 wrote to memory of 2932 1628 71582d8546ea6ee53ee9ce8bfca380f4_JaffaCakes118.exe 30 PID 2932 wrote to memory of 2908 2932 cmd.exe 32 PID 2932 wrote to memory of 2908 2932 cmd.exe 32 PID 2932 wrote to memory of 2908 2932 cmd.exe 32 PID 2932 wrote to memory of 2908 2932 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\71582d8546ea6ee53ee9ce8bfca380f4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\71582d8546ea6ee53ee9ce8bfca380f4_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\System32\cmd.exe /c %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2908
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1