Analysis

  • max time kernel
    150s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    22/08/2024, 20:53

General

  • Target

    b91c83f400f4da99dcfd67d6d4be399d_JaffaCakes118.exe

  • Size

    44KB

  • MD5

    b91c83f400f4da99dcfd67d6d4be399d

  • SHA1

    eec3e91b0561d246b3e026e394c811d784374900

  • SHA256

    c3e4d3da736b19e4bb4a37c061a861b5cd10b28e0e5b5aa090ffa6c2042ed37b

  • SHA512

    1c48ae02b326a464bc5c2c86696290471af5ff9e8ab764a6b4d52b5957088e4cdf0d503d2dbd4b0c989d583adb6a1060bd7f5fdcbc9d74a0978cabee6b7449f7

  • SSDEEP

    768:f4IYUB5VhCob0GTmcYDj0BSHhAV02SRpPY:wzUB5VQob07cYs0s0J2

Malware Config

Signatures

  • UAC bypass 3 TTPs 2 IoCs
  • Drops file in Drivers directory 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Hijack Execution Flow: Executable Installer File Permissions Weakness 1 TTPs 1 IoCs

    Possible Turn off User Account Control's privilege elevation for standard users.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • System policy modification 1 TTPs 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b91c83f400f4da99dcfd67d6d4be399d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b91c83f400f4da99dcfd67d6d4be399d_JaffaCakes118.exe"
    1⤵
    • UAC bypass
    • Drops file in Drivers directory
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Hijack Execution Flow: Executable Installer File Permissions Weakness
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • System policy modification
    PID:1052

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1052-4-0x000007FEF5A60000-0x000007FEF63FD000-memory.dmp

    Filesize

    9.6MB

  • memory/1052-3-0x000007FEF5A60000-0x000007FEF63FD000-memory.dmp

    Filesize

    9.6MB

  • memory/1052-2-0x000007FEF5A60000-0x000007FEF63FD000-memory.dmp

    Filesize

    9.6MB

  • memory/1052-1-0x000007FEF5A60000-0x000007FEF63FD000-memory.dmp

    Filesize

    9.6MB

  • memory/1052-0-0x000007FEF5D1E000-0x000007FEF5D1F000-memory.dmp

    Filesize

    4KB

  • memory/1052-5-0x000007FEF5A60000-0x000007FEF63FD000-memory.dmp

    Filesize

    9.6MB

  • memory/1052-9-0x000007FEF5D1E000-0x000007FEF5D1F000-memory.dmp

    Filesize

    4KB

  • memory/1052-10-0x000007FEF5A60000-0x000007FEF63FD000-memory.dmp

    Filesize

    9.6MB

  • memory/1052-11-0x000007FEF5A60000-0x000007FEF63FD000-memory.dmp

    Filesize

    9.6MB

  • memory/1052-12-0x000007FEF5A60000-0x000007FEF63FD000-memory.dmp

    Filesize

    9.6MB

  • memory/1052-13-0x000007FEF5A60000-0x000007FEF63FD000-memory.dmp

    Filesize

    9.6MB

  • memory/1052-14-0x000007FEF5A60000-0x000007FEF63FD000-memory.dmp

    Filesize

    9.6MB