Analysis
-
max time kernel
147s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/08/2024, 19:42
Static task
static1
Behavioral task
behavioral1
Sample
976a33974f490b31cf4864282ecdabbb_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
976a33974f490b31cf4864282ecdabbb_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
976a33974f490b31cf4864282ecdabbb_JaffaCakes118.exe
-
Size
102KB
-
MD5
976a33974f490b31cf4864282ecdabbb
-
SHA1
08f8b3de263abfabc61544c9a0caf3f7cff56b2c
-
SHA256
121a65e9f750c4edd373304119e3860892e0d9faf0cad9b23233e80fe943bc39
-
SHA512
820f65471eb2540c54bcc3db5a002ef35a13ff2ebad59ef64f867b94c85b4c0bdf7ca9c3eeccc64c1aef3aa90ef3b953c8a0dee344ad1d8c1629234a6176dbbb
-
SSDEEP
1536:/NLrBTxdDJ0PGFa04C1kPYRWnsDJT9XDJf/:z/DJrQ04C1kPbsFhDJ3
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile 976a33974f490b31cf4864282ecdabbb_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" 976a33974f490b31cf4864282ecdabbb_JaffaCakes118.exe -
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 976a33974f490b31cf4864282ecdabbb_JaffaCakes118.exe -
Disables Task Manager via registry modification
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run = "C:\\WINDOWS\\FacSystem.exe" 976a33974f490b31cf4864282ecdabbb_JaffaCakes118.exe -
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 976a33974f490b31cf4864282ecdabbb_JaffaCakes118.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: 976a33974f490b31cf4864282ecdabbb_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\FacSystem.exe 976a33974f490b31cf4864282ecdabbb_JaffaCakes118.exe File opened for modification C:\WINDOWS\FacSystem.exe 976a33974f490b31cf4864282ecdabbb_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 976a33974f490b31cf4864282ecdabbb_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 1084 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1084 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3056 976a33974f490b31cf4864282ecdabbb_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3056 976a33974f490b31cf4864282ecdabbb_JaffaCakes118.exe -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 976a33974f490b31cf4864282ecdabbb_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 976a33974f490b31cf4864282ecdabbb_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\976a33974f490b31cf4864282ecdabbb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\976a33974f490b31cf4864282ecdabbb_JaffaCakes118.exe"1⤵
- Modifies firewall policy service
- UAC bypass
- Adds Run key to start application
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3056
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4b4 0x3dc1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1084
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
4