Analysis
-
max time kernel
141s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/09/2024, 14:26
Static task
static1
Behavioral task
behavioral1
Sample
edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe
-
Size
31KB
-
MD5
edc89e437810ad2dd25408506be22aee
-
SHA1
24f081c3e122d180a3fd0064674ab65d73108a75
-
SHA256
77fd9e57ce0253b4e336530a37206b3cc6334a1bf12116a891e2887624cb6e18
-
SHA512
09e07a04d93ae32dfd8771d7b738d88deef3e89f6fcb669cc5b4b65c4a22faec95e17c245b16542de57da84cff1e527354167e0fc7fca1b0860098c36b58e92b
-
SSDEEP
768:5dOUS/ijAceYdW2k7GfOmBFtOYu9IezVDy0SunbcuyD7UINWGO:5PS/ijAk5kSmK+Yu9I4Sunouy8Yo
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 2384 edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\360se = "C:\\Users\\Admin\\AppData\\Local\\Temp\\edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe" edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\e: edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe File opened (read-only) \??\n: edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe File opened (read-only) \??\u: edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe File opened (read-only) \??\z: edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe File opened (read-only) \??\g: edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe File opened (read-only) \??\l: edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe File opened (read-only) \??\y: edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe File opened (read-only) \??\t: edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe File opened (read-only) \??\w: edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe File opened (read-only) \??\i: edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe File opened (read-only) \??\j: edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe File opened (read-only) \??\r: edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe File opened (read-only) \??\s: edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe File opened (read-only) \??\p: edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe File opened (read-only) \??\q: edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe File opened (read-only) \??\v: edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe File opened (read-only) \??\x: edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe File opened (read-only) \??\h: edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe File opened (read-only) \??\k: edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe File opened (read-only) \??\m: edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe File opened (read-only) \??\o: edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\259444248.DEP edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\rgdltecq\ohoifz.pif edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Common Files\rgdltecq\ohoifz.pif edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 63 IoCs
pid Process 2384 edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe 2384 edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe 2384 edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe 2384 edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe 2384 edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe 2384 edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe 2384 edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe 2384 edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe 2384 edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe 2384 edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe 2384 edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe 2384 edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe 2384 edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe 2384 edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe 2384 edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe 2384 edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe 2384 edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe 2384 edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe 2384 edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe 2384 edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe 2384 edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe 2384 edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe 2384 edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe 2384 edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe 2384 edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe 2384 edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe 2384 edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe 2384 edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe 2384 edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe 2384 edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe 2384 edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe 2384 edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe 2384 edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe 2384 edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe 2384 edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe 2384 edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe 2384 edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe 2384 edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe 2384 edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe 2384 edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe 2384 edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe 2384 edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe 2384 edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe 2384 edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe 2384 edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe 2384 edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe 2384 edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe 2384 edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe 2384 edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe 2384 edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe 2384 edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe 2384 edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe 2384 edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe 2384 edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe 2384 edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe 2384 edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe 2384 edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe 2384 edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe 2384 edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe 2384 edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe 2384 edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe 2384 edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe 2384 edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2384 edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe Token: SeDebugPrivilege 2384 edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe -
System policy modification 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\edc89e437810ad2dd25408506be22aee_JaffaCakes118.exe"1⤵
- UAC bypass
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:2384
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12.1MB
MD56e7ab36ac4450a868af12796e005b9d8
SHA133f45a43d00417ddce28e45b4befd10f26e4d441
SHA256896525da70b0d0d29f63e3693a007957fd30e56b6746b2c585b4c0d205797d2e
SHA512b281b49d5f3ab0f98dff1231c5982320524f25dc73ff7a1ac28490254cd27cf8bde59ca1811c30e73848bd117522bcb753002aeaada39f8b244e9a5a7515217a