Analysis
-
max time kernel
148s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
16/08/2024, 22:52
Behavioral task
behavioral1
Sample
a040033e4b0591f46ec02d3bd2e57071_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
a040033e4b0591f46ec02d3bd2e57071_JaffaCakes118.exe
-
Size
344KB
-
MD5
a040033e4b0591f46ec02d3bd2e57071
-
SHA1
afe73adb0f0585ccf6df29eff7899555fe4e46af
-
SHA256
e851ceae9e8a50dddb1fa88b19159cfab209e2b9738acd00d7011ed9e74748e8
-
SHA512
bd3d0e34c7993baef72808ff7b1e5dae0cf3ae026c3c1e38816613f4944466550ac0ba1907549fc64cfa6713bf8c43cd5ac8d9fbf7c19194180ccf3304fcbe28
-
SSDEEP
6144:vCxOET2PRA8A3bLeQh81uhTx8+WYbwWVJqjhLzgAmw7V0pm2vMtI6FSg952P+T8V:v1PO8MeQh81uhNmq+jhfgKBovMtIu2OW
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" mplayer2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" mplayer2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" a040033e4b0591f46ec02d3bd2e57071_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" a040033e4b0591f46ec02d3bd2e57071_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" a040033e4b0591f46ec02d3bd2e57071_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" mplayer2.exe -
Executes dropped EXE 2 IoCs
pid Process 2128 mplayer2.exe 2420 mplayer2.exe -
Loads dropped DLL 2 IoCs
pid Process 2196 a040033e4b0591f46ec02d3bd2e57071_JaffaCakes118.exe 2128 mplayer2.exe -
resource yara_rule behavioral1/memory/2152-0-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral1/memory/2152-11-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral1/files/0x0008000000015e4e-17.dat upx behavioral1/memory/2128-21-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral1/memory/2128-26-0x0000000003B10000-0x0000000003BC6000-memory.dmp upx behavioral1/memory/2128-40-0x0000000000400000-0x00000000004B6000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" mplayer2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" a040033e4b0591f46ec02d3bd2e57071_JaffaCakes118.exe -
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2152-11-0x0000000000400000-0x00000000004B6000-memory.dmp autoit_exe behavioral1/memory/2128-26-0x0000000003B10000-0x0000000003BC6000-memory.dmp autoit_exe behavioral1/memory/2128-40-0x0000000000400000-0x00000000004B6000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2152 set thread context of 2196 2152 a040033e4b0591f46ec02d3bd2e57071_JaffaCakes118.exe 28 PID 2128 set thread context of 2420 2128 mplayer2.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a040033e4b0591f46ec02d3bd2e57071_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a040033e4b0591f46ec02d3bd2e57071_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mplayer2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mplayer2.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Download\CheckExeSignatures = "no" a040033e4b0591f46ec02d3bd2e57071_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Download\RunInvalidSignatures = "00000001" a040033e4b0591f46ec02d3bd2e57071_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Download mplayer2.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Download\CheckExeSignatures = "no" mplayer2.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Download\RunInvalidSignatures = "00000001" mplayer2.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Download a040033e4b0591f46ec02d3bd2e57071_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 2152 a040033e4b0591f46ec02d3bd2e57071_JaffaCakes118.exe 2152 a040033e4b0591f46ec02d3bd2e57071_JaffaCakes118.exe 2152 a040033e4b0591f46ec02d3bd2e57071_JaffaCakes118.exe 2128 mplayer2.exe 2128 mplayer2.exe 2128 mplayer2.exe -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 2152 a040033e4b0591f46ec02d3bd2e57071_JaffaCakes118.exe 2152 a040033e4b0591f46ec02d3bd2e57071_JaffaCakes118.exe 2152 a040033e4b0591f46ec02d3bd2e57071_JaffaCakes118.exe 2128 mplayer2.exe 2128 mplayer2.exe 2128 mplayer2.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2196 a040033e4b0591f46ec02d3bd2e57071_JaffaCakes118.exe 2420 mplayer2.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2152 wrote to memory of 2196 2152 a040033e4b0591f46ec02d3bd2e57071_JaffaCakes118.exe 28 PID 2152 wrote to memory of 2196 2152 a040033e4b0591f46ec02d3bd2e57071_JaffaCakes118.exe 28 PID 2152 wrote to memory of 2196 2152 a040033e4b0591f46ec02d3bd2e57071_JaffaCakes118.exe 28 PID 2152 wrote to memory of 2196 2152 a040033e4b0591f46ec02d3bd2e57071_JaffaCakes118.exe 28 PID 2152 wrote to memory of 2196 2152 a040033e4b0591f46ec02d3bd2e57071_JaffaCakes118.exe 28 PID 2152 wrote to memory of 2196 2152 a040033e4b0591f46ec02d3bd2e57071_JaffaCakes118.exe 28 PID 2152 wrote to memory of 2196 2152 a040033e4b0591f46ec02d3bd2e57071_JaffaCakes118.exe 28 PID 2152 wrote to memory of 2196 2152 a040033e4b0591f46ec02d3bd2e57071_JaffaCakes118.exe 28 PID 2196 wrote to memory of 2128 2196 a040033e4b0591f46ec02d3bd2e57071_JaffaCakes118.exe 29 PID 2196 wrote to memory of 2128 2196 a040033e4b0591f46ec02d3bd2e57071_JaffaCakes118.exe 29 PID 2196 wrote to memory of 2128 2196 a040033e4b0591f46ec02d3bd2e57071_JaffaCakes118.exe 29 PID 2196 wrote to memory of 2128 2196 a040033e4b0591f46ec02d3bd2e57071_JaffaCakes118.exe 29 PID 2128 wrote to memory of 2420 2128 mplayer2.exe 30 PID 2128 wrote to memory of 2420 2128 mplayer2.exe 30 PID 2128 wrote to memory of 2420 2128 mplayer2.exe 30 PID 2128 wrote to memory of 2420 2128 mplayer2.exe 30 PID 2128 wrote to memory of 2420 2128 mplayer2.exe 30 PID 2128 wrote to memory of 2420 2128 mplayer2.exe 30 PID 2128 wrote to memory of 2420 2128 mplayer2.exe 30 PID 2128 wrote to memory of 2420 2128 mplayer2.exe 30 -
System policy modification 1 TTPs 8 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" mplayer2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System a040033e4b0591f46ec02d3bd2e57071_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" a040033e4b0591f46ec02d3bd2e57071_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" a040033e4b0591f46ec02d3bd2e57071_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" a040033e4b0591f46ec02d3bd2e57071_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System mplayer2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" mplayer2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" mplayer2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a040033e4b0591f46ec02d3bd2e57071_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a040033e4b0591f46ec02d3bd2e57071_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\a040033e4b0591f46ec02d3bd2e57071_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a040033e4b0591f46ec02d3bd2e57071_JaffaCakes118.exe"2⤵
- UAC bypass
- Loads dropped DLL
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2196 -
C:\muyddiis\mplayer2.exe"C:\muyddiis\mplayer2.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\muyddiis\mplayer2.exe"C:\muyddiis\mplayer2.exe"4⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2420
-
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
344KB
MD5a040033e4b0591f46ec02d3bd2e57071
SHA1afe73adb0f0585ccf6df29eff7899555fe4e46af
SHA256e851ceae9e8a50dddb1fa88b19159cfab209e2b9738acd00d7011ed9e74748e8
SHA512bd3d0e34c7993baef72808ff7b1e5dae0cf3ae026c3c1e38816613f4944466550ac0ba1907549fc64cfa6713bf8c43cd5ac8d9fbf7c19194180ccf3304fcbe28