Analysis
-
max time kernel
141s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20/09/2024, 09:09
Static task
static1
Behavioral task
behavioral1
Sample
ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe
-
Size
31KB
-
MD5
ed45150e1eef23433b6687dec3db5018
-
SHA1
9f9f71dcbc36a19113175782aa19bb7bc68e846e
-
SHA256
88a3975f27c51e8276df1cf4eac16f675a76f5a07906d0c4fafb173616444f15
-
SHA512
b930b30a38497128a3c3d85058717eb7b90b165b5372058db3c003be076f042dee8787518a609d9fcbd9c42864fbf0845cdea3dbc0013c1528ac96528795203a
-
SSDEEP
768:421zJp4kJzsQEv/OgRzTC/IRI9inA+L3nbcuyD7UDNWGF:42iEQQEv/OGzUYnTTnouy8pX
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 3052 ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\360se = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe" ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\g: ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe File opened (read-only) \??\y: ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe File opened (read-only) \??\e: ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe File opened (read-only) \??\k: ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe File opened (read-only) \??\l: ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe File opened (read-only) \??\m: ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe File opened (read-only) \??\p: ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe File opened (read-only) \??\v: ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe File opened (read-only) \??\x: ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe File opened (read-only) \??\z: ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe File opened (read-only) \??\w: ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe File opened (read-only) \??\j: ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe File opened (read-only) \??\n: ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe File opened (read-only) \??\q: ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe File opened (read-only) \??\r: ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe File opened (read-only) \??\s: ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe File opened (read-only) \??\t: ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe File opened (read-only) \??\u: ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe File opened (read-only) \??\h: ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe File opened (read-only) \??\i: ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe File opened (read-only) \??\o: ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\259481065.DLL ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\rgdltecq\nhoifz.pif ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Common Files\rgdltecq\nhoifz.pif ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 63 IoCs
pid Process 3052 ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe 3052 ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe 3052 ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe 3052 ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe 3052 ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe 3052 ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe 3052 ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe 3052 ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe 3052 ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe 3052 ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe 3052 ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe 3052 ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe 3052 ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe 3052 ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe 3052 ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe 3052 ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe 3052 ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe 3052 ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe 3052 ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe 3052 ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe 3052 ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe 3052 ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe 3052 ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe 3052 ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe 3052 ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe 3052 ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe 3052 ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe 3052 ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe 3052 ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe 3052 ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe 3052 ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe 3052 ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe 3052 ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe 3052 ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe 3052 ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe 3052 ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe 3052 ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe 3052 ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe 3052 ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe 3052 ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe 3052 ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe 3052 ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe 3052 ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe 3052 ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe 3052 ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe 3052 ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe 3052 ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe 3052 ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe 3052 ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe 3052 ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe 3052 ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe 3052 ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe 3052 ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe 3052 ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe 3052 ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe 3052 ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe 3052 ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe 3052 ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe 3052 ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe 3052 ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe 3052 ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe 3052 ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe 3052 ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3052 ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe Token: SeDebugPrivilege 3052 ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe -
System policy modification 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ed45150e1eef23433b6687dec3db5018_JaffaCakes118.exe"1⤵
- UAC bypass
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:3052
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12.1MB
MD512a370da90c92b613babb5c506d96373
SHA12e128f5f14a285ab30e420d875c1f17f7989109f
SHA256148a49494607ce4b274f1aef90a5bc3e7ba2ef2f54e556fab0f95aa294b0144c
SHA51292289dd3a15846f5105d5afb0912810a857e2aed605c7665f7a304df749bc39f64900ef103c4112edb9f2d89f1a4747af26b8dec05198ddac9c5070541a50851