Analysis
-
max time kernel
138s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27/07/2024, 17:30
Behavioral task
behavioral1
Sample
78f6e185cfe1b753b01869acba4f33ff_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
78f6e185cfe1b753b01869acba4f33ff_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
78f6e185cfe1b753b01869acba4f33ff_JaffaCakes118.exe
-
Size
5.4MB
-
MD5
78f6e185cfe1b753b01869acba4f33ff
-
SHA1
b63f4d09298b655fca8278366d4969d16947a3e8
-
SHA256
19eecdf1a5ac0cd871c7a7b04ed23c4bb8f108ae044e82760e004aafd4769508
-
SHA512
ea53fc68f1d9645282b2ec352a320e61bd361a29f3b9dfca7e8536519c3706cb35f1c5a9f781b4cd3e158a8a0821d117f6292037409b1cc03eace34f93563f4b
-
SSDEEP
98304:9GaVoApTrH+hXDryhmoAr0KG56XgySR0IWXtab646IJrOhACu50kSEqWwKU43NX6:91VRp2RdtIcEq2UcNVtpoiOAxGnPBFUW
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Https\ImagePath = "inf\\Https.sys" 78f6e185cfe1b753b01869acba4f33ff_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 4084 78f6e185cfe1b753b01869acba4f33ff_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/4084-0-0x0000000000400000-0x00000000009CE000-memory.dmp upx behavioral2/files/0x000700000002346f-15.dat upx behavioral2/memory/4084-35-0x0000000000400000-0x00000000009CE000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Windows directory 15 IoCs
description ioc Process File created C:\Windows\inf\Https.sys 78f6e185cfe1b753b01869acba4f33ff_JaffaCakes118.exe File opened for modification C:\Windows\inf\Https.dll 78f6e185cfe1b753b01869acba4f33ff_JaffaCakes118.exe File opened for modification C:\Windows\inf\Wdica.sys 78f6e185cfe1b753b01869acba4f33ff_JaffaCakes118.exe File opened for modification C:\Windows\inf\Https.hiv 78f6e185cfe1b753b01869acba4f33ff_JaffaCakes118.exe File opened for modification C:\Windows\inf\ws2hlp.PNF 78f6e185cfe1b753b01869acba4f33ff_JaffaCakes118.exe File opened for modification C:\Windows\inf\Wdica.hiv 78f6e185cfe1b753b01869acba4f33ff_JaffaCakes118.exe File created C:\Windows\inf\Wdica.hiv 78f6e185cfe1b753b01869acba4f33ff_JaffaCakes118.exe File created C:\Windows\inf\ws2hlp.PNF 78f6e185cfe1b753b01869acba4f33ff_JaffaCakes118.exe File created C:\Windows\inf\Https.dll 78f6e185cfe1b753b01869acba4f33ff_JaffaCakes118.exe File created C:\Windows\inf\Wdica.sys 78f6e185cfe1b753b01869acba4f33ff_JaffaCakes118.exe File created C:\Windows\inf\Https.hiv 78f6e185cfe1b753b01869acba4f33ff_JaffaCakes118.exe File opened for modification C:\Windows\inf\Https.sys 78f6e185cfe1b753b01869acba4f33ff_JaffaCakes118.exe File created C:\Windows\inf\Https.pnf 78f6e185cfe1b753b01869acba4f33ff_JaffaCakes118.exe File opened for modification C:\Windows\inf\Https.pnf 78f6e185cfe1b753b01869acba4f33ff_JaffaCakes118.exe File created C:\Windows\IME\1.DLL 78f6e185cfe1b753b01869acba4f33ff_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 78f6e185cfe1b753b01869acba4f33ff_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4084 78f6e185cfe1b753b01869acba4f33ff_JaffaCakes118.exe 4084 78f6e185cfe1b753b01869acba4f33ff_JaffaCakes118.exe 4084 78f6e185cfe1b753b01869acba4f33ff_JaffaCakes118.exe 4084 78f6e185cfe1b753b01869acba4f33ff_JaffaCakes118.exe 4084 78f6e185cfe1b753b01869acba4f33ff_JaffaCakes118.exe 4084 78f6e185cfe1b753b01869acba4f33ff_JaffaCakes118.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 4084 78f6e185cfe1b753b01869acba4f33ff_JaffaCakes118.exe 4084 78f6e185cfe1b753b01869acba4f33ff_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeSystemProfilePrivilege 4084 78f6e185cfe1b753b01869acba4f33ff_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 4084 78f6e185cfe1b753b01869acba4f33ff_JaffaCakes118.exe Token: SeSecurityPrivilege 4084 78f6e185cfe1b753b01869acba4f33ff_JaffaCakes118.exe Token: SeBackupPrivilege 4084 78f6e185cfe1b753b01869acba4f33ff_JaffaCakes118.exe Token: SeRestorePrivilege 4084 78f6e185cfe1b753b01869acba4f33ff_JaffaCakes118.exe Token: SeMachineAccountPrivilege 4084 78f6e185cfe1b753b01869acba4f33ff_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 4084 78f6e185cfe1b753b01869acba4f33ff_JaffaCakes118.exe Token: SeLoadDriverPrivilege 4084 78f6e185cfe1b753b01869acba4f33ff_JaffaCakes118.exe Token: SeDebugPrivilege 4084 78f6e185cfe1b753b01869acba4f33ff_JaffaCakes118.exe -
System policy modification 1 TTPs 5 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Wdica\ErrorControl = "1" 78f6e185cfe1b753b01869acba4f33ff_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Wdica\ImagePath = "inf\\Wdica.sys" 78f6e185cfe1b753b01869acba4f33ff_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Wdica\Start = "2" 78f6e185cfe1b753b01869acba4f33ff_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Wdica\Type = "1" 78f6e185cfe1b753b01869acba4f33ff_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Wdica 78f6e185cfe1b753b01869acba4f33ff_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\78f6e185cfe1b753b01869acba4f33ff_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\78f6e185cfe1b753b01869acba4f33ff_JaffaCakes118.exe"1⤵
- Sets service image path in registry
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:4084
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD598c499fccb739ab23b75c0d8b98e0481
SHA10ef5c464823550d5f53dd485e91dabc5d5a1ba0a
SHA256d9d8ce1b86b3978889466ab1b9f46778942d276922bf7533327a493083913087
SHA5129e64ac13e18ab0a518bb85b6612520645b5ab2c9a5359ced943813ba7344714999f25ba0e52240ad2d0c2fefc76552ff43173adc46334ff0b5dba171fb58e4e6
-
Filesize
109KB
MD5e30f68c5a0971543847895bd993be0cb
SHA1eda2d1bc6d3f89afd96650a0c59d727d5586bd40
SHA25670e641d89fbd4c7e7ba7b3b9e1c1b93b5122ed26bfbed733d78ec45ad7e904f4
SHA512d6736252dce9ffd62dc66f83d1f812d24be5b7a62b95896bed242241fb15cc9fe6b862a1837031491ef8281c74f018ebb3f7b3fdfe380f12d928ff6240f1139f
-
Filesize
16KB
MD52de012f51bb1405de2a0252b9ee956d1
SHA182ce85a4353bad2a76c50f475de51bd4b5aeb226
SHA25654cba28e4813b9e3ee154d68bb77b9b5c14aa0a74549cdbfbbabeeb86ccf17fb
SHA512c7fe6206ea3f3632a19f6c788c77d1d2bc304170b9ebabdc9d398f01e145a8af7ab17973afa3be0c390c2a2e3c3d61babbecbdba504a2b51502d5ff372e79a48