Analysis

  • max time kernel
    141s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20/09/2024, 08:07

General

  • Target

    ed2b0b7ce80f2bb96287375bdbbb94be_JaffaCakes118.exe

  • Size

    31KB

  • MD5

    ed2b0b7ce80f2bb96287375bdbbb94be

  • SHA1

    3f12f4ee68850366cc304286d2df6e4cfcc0579c

  • SHA256

    25268c705039aa0e6244cc144887b54ff76e1fafabd2bcf32e9d9f4f2611ee8f

  • SHA512

    8ee765e07c800b600b80db95bab2d827d8266de5e6ddd429f79bfea586bd9aa9848af05d70dee09f616e0c60878ebb98d2648f14d0c0a7e8d327ef6423b8ddec

  • SSDEEP

    768:ZzKPF9N7wNFHTM5IuWABIpcg8NgoLhn0a/nbcuyD7UoNWGb:JKPDN7sFzyZWAg8NgWR/nouy84t

Malware Config

Signatures

  • UAC bypass 3 TTPs 3 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 63 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • System policy modification 1 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ed2b0b7ce80f2bb96287375bdbbb94be_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ed2b0b7ce80f2bb96287375bdbbb94be_JaffaCakes118.exe"
    1⤵
    • UAC bypass
    • Loads dropped DLL
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • System policy modification
    PID:2904

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Windows\SysWOW64\259444654.DEP

    Filesize

    12.1MB

    MD5

    67c884dc6b5482f10ef8039fa6b9d92b

    SHA1

    6f2d30e613f7a1496ab90446a7f5f06e3917af31

    SHA256

    6726c21268bd384ab916591b4624d6dffbe6a5815ee96cc1ed9b7f6a846818eb

    SHA512

    39655cadb929b5813c1ef9fb7c59fbf117e74de6ebe27cd21838ebef1b346b0aac2c1952994f0ab4e8db52440775f4911819b7ad5362687dba338f9a9f161b1f

  • memory/2904-1-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB

  • memory/2904-5-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB