Analysis
-
max time kernel
92s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2024, 14:25
Static task
static1
Behavioral task
behavioral1
Sample
d22519de160f950316a002cb3e9d3ac8_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d22519de160f950316a002cb3e9d3ac8_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d22519de160f950316a002cb3e9d3ac8_JaffaCakes118.exe
-
Size
477KB
-
MD5
d22519de160f950316a002cb3e9d3ac8
-
SHA1
7b831cd2158f833bf6cf905e3ffa26a9dd8e93c4
-
SHA256
38bc320ce3964be59f8fabc044aad696e3d21462317bc6c949b5e74d392becae
-
SHA512
448f606bff483bbc85042b9f287d29c0fd24cbbde7d6d5d0cc11a4e126b6e7da5a36b5df37e8f29e78b663827c02104b7ea3e8acbbcfcb5a289976fe2b9de9a9
-
SSDEEP
12288:dNIQAPGsAqY9IMVYd38sJdpQHlGlY8KfTXeY:aPGSY91VwNJcFMqTh
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" win.exe -
Executes dropped EXE 1 IoCs
pid Process 4564 win.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Extension_Service = "\"C:\\Users\\Admin\\AppData\\Roaming\\win.exe\" -b" win.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" win.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2248 sc.exe 908 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d22519de160f950316a002cb3e9d3ac8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language win.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2092 d22519de160f950316a002cb3e9d3ac8_JaffaCakes118.exe 2092 d22519de160f950316a002cb3e9d3ac8_JaffaCakes118.exe 2092 d22519de160f950316a002cb3e9d3ac8_JaffaCakes118.exe 2092 d22519de160f950316a002cb3e9d3ac8_JaffaCakes118.exe 4564 win.exe 4564 win.exe 4564 win.exe 4564 win.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2092 d22519de160f950316a002cb3e9d3ac8_JaffaCakes118.exe 2092 d22519de160f950316a002cb3e9d3ac8_JaffaCakes118.exe 4564 win.exe 4564 win.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 2092 d22519de160f950316a002cb3e9d3ac8_JaffaCakes118.exe 2092 d22519de160f950316a002cb3e9d3ac8_JaffaCakes118.exe 4564 win.exe 4564 win.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2092 wrote to memory of 4564 2092 d22519de160f950316a002cb3e9d3ac8_JaffaCakes118.exe 85 PID 2092 wrote to memory of 4564 2092 d22519de160f950316a002cb3e9d3ac8_JaffaCakes118.exe 85 PID 2092 wrote to memory of 4564 2092 d22519de160f950316a002cb3e9d3ac8_JaffaCakes118.exe 85 PID 4564 wrote to memory of 2248 4564 win.exe 87 PID 4564 wrote to memory of 2248 4564 win.exe 87 PID 4564 wrote to memory of 2248 4564 win.exe 87 PID 4564 wrote to memory of 908 4564 win.exe 88 PID 4564 wrote to memory of 908 4564 win.exe 88 PID 4564 wrote to memory of 908 4564 win.exe 88 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System win.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" win.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d22519de160f950316a002cb3e9d3ac8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d22519de160f950316a002cb3e9d3ac8_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Users\Admin\AppData\Roaming\win.exe"C:\Users\Admin\AppData\Roaming\win.exe" -b2⤵
- UAC bypass
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4564 -
C:\Windows\SysWOW64\sc.exesc stop windefend3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2248
-
-
C:\Windows\SysWOW64\sc.exesc delete windefend3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:908
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify Tools
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
477KB
MD5d22519de160f950316a002cb3e9d3ac8
SHA17b831cd2158f833bf6cf905e3ffa26a9dd8e93c4
SHA25638bc320ce3964be59f8fabc044aad696e3d21462317bc6c949b5e74d392becae
SHA512448f606bff483bbc85042b9f287d29c0fd24cbbde7d6d5d0cc11a4e126b6e7da5a36b5df37e8f29e78b663827c02104b7ea3e8acbbcfcb5a289976fe2b9de9a9