Analysis
-
max time kernel
150s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 11:15
Static task
static1
Behavioral task
behavioral1
Sample
aacafb37e82716316348bc915eded882_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
aacafb37e82716316348bc915eded882_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
aacafb37e82716316348bc915eded882_JaffaCakes118.exe
-
Size
434KB
-
MD5
aacafb37e82716316348bc915eded882
-
SHA1
a379986d7e0659ce9304b9ea6dd352dfc7a55147
-
SHA256
f5f52affdf8b9dc042bc5886ea985af021d6db90199478d38129596f3b76688b
-
SHA512
654b974e9fcabda96893405c7e4bd06974cb9d0d7855c981ffc1fd9a223bd599f68f71e3a7fcf518d1f8238cd52aa09fac2bcb9f29e30bacd1c5b616445c7e80
-
SSDEEP
12288:0KVy1W0rSJEGg5Lmw62LGV2ou19dat26KrZ:0KV+W0rSJzgpmwxG
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 2884 uTYNEsbrvPE.exe -
Loads dropped DLL 2 IoCs
pid Process 1140 aacafb37e82716316348bc915eded882_JaffaCakes118.exe 1140 aacafb37e82716316348bc915eded882_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/1140-2-0x0000000000600000-0x0000000000674000-memory.dmp upx behavioral1/memory/1140-4-0x0000000000600000-0x0000000000674000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\uTYNEsbrvPE = "C:\\ProgramData\\uTYNEsbrvPE.exe" aacafb37e82716316348bc915eded882_JaffaCakes118.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum aacafb37e82716316348bc915eded882_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 aacafb37e82716316348bc915eded882_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum uTYNEsbrvPE.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 uTYNEsbrvPE.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uTYNEsbrvPE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aacafb37e82716316348bc915eded882_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Download aacafb37e82716316348bc915eded882_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Download\CheckExeSignatures = "no" aacafb37e82716316348bc915eded882_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1140 aacafb37e82716316348bc915eded882_JaffaCakes118.exe 1140 aacafb37e82716316348bc915eded882_JaffaCakes118.exe 2884 uTYNEsbrvPE.exe 2884 uTYNEsbrvPE.exe 2884 uTYNEsbrvPE.exe 2884 uTYNEsbrvPE.exe 2884 uTYNEsbrvPE.exe 2884 uTYNEsbrvPE.exe 2884 uTYNEsbrvPE.exe 2884 uTYNEsbrvPE.exe 2884 uTYNEsbrvPE.exe 2884 uTYNEsbrvPE.exe 2884 uTYNEsbrvPE.exe 2884 uTYNEsbrvPE.exe 2884 uTYNEsbrvPE.exe 2884 uTYNEsbrvPE.exe 2884 uTYNEsbrvPE.exe 2884 uTYNEsbrvPE.exe 2884 uTYNEsbrvPE.exe 2884 uTYNEsbrvPE.exe 2884 uTYNEsbrvPE.exe 2884 uTYNEsbrvPE.exe 2884 uTYNEsbrvPE.exe 2884 uTYNEsbrvPE.exe 2884 uTYNEsbrvPE.exe 2884 uTYNEsbrvPE.exe 2884 uTYNEsbrvPE.exe 2884 uTYNEsbrvPE.exe 2884 uTYNEsbrvPE.exe 2884 uTYNEsbrvPE.exe 2884 uTYNEsbrvPE.exe 2884 uTYNEsbrvPE.exe 2884 uTYNEsbrvPE.exe 2884 uTYNEsbrvPE.exe 2884 uTYNEsbrvPE.exe 2884 uTYNEsbrvPE.exe 2884 uTYNEsbrvPE.exe 2884 uTYNEsbrvPE.exe 2884 uTYNEsbrvPE.exe 2884 uTYNEsbrvPE.exe 2884 uTYNEsbrvPE.exe 2884 uTYNEsbrvPE.exe 2884 uTYNEsbrvPE.exe 2884 uTYNEsbrvPE.exe 2884 uTYNEsbrvPE.exe 2884 uTYNEsbrvPE.exe 2884 uTYNEsbrvPE.exe 2884 uTYNEsbrvPE.exe 2884 uTYNEsbrvPE.exe 2884 uTYNEsbrvPE.exe 2884 uTYNEsbrvPE.exe 2884 uTYNEsbrvPE.exe 2884 uTYNEsbrvPE.exe 2884 uTYNEsbrvPE.exe 2884 uTYNEsbrvPE.exe 2884 uTYNEsbrvPE.exe 2884 uTYNEsbrvPE.exe 2884 uTYNEsbrvPE.exe 2884 uTYNEsbrvPE.exe 2884 uTYNEsbrvPE.exe 2884 uTYNEsbrvPE.exe 2884 uTYNEsbrvPE.exe 2884 uTYNEsbrvPE.exe 2884 uTYNEsbrvPE.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1140 aacafb37e82716316348bc915eded882_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1140 wrote to memory of 2884 1140 aacafb37e82716316348bc915eded882_JaffaCakes118.exe 30 PID 1140 wrote to memory of 2884 1140 aacafb37e82716316348bc915eded882_JaffaCakes118.exe 30 PID 1140 wrote to memory of 2884 1140 aacafb37e82716316348bc915eded882_JaffaCakes118.exe 30 PID 1140 wrote to memory of 2884 1140 aacafb37e82716316348bc915eded882_JaffaCakes118.exe 30 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System aacafb37e82716316348bc915eded882_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" aacafb37e82716316348bc915eded882_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\aacafb37e82716316348bc915eded882_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\aacafb37e82716316348bc915eded882_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1140 -
C:\ProgramData\uTYNEsbrvPE.exe"C:\ProgramData\uTYNEsbrvPE.exe"2⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2884
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
434KB
MD5aacafb37e82716316348bc915eded882
SHA1a379986d7e0659ce9304b9ea6dd352dfc7a55147
SHA256f5f52affdf8b9dc042bc5886ea985af021d6db90199478d38129596f3b76688b
SHA512654b974e9fcabda96893405c7e4bd06974cb9d0d7855c981ffc1fd9a223bd599f68f71e3a7fcf518d1f8238cd52aa09fac2bcb9f29e30bacd1c5b616445c7e80