Analysis
-
max time kernel
93s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2024, 06:49
Static task
static1
Behavioral task
behavioral1
Sample
096692157b97dabeb52e7326a10758a9_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
096692157b97dabeb52e7326a10758a9_JaffaCakes118.exe
-
Size
1024KB
-
MD5
096692157b97dabeb52e7326a10758a9
-
SHA1
7df2d5a0be37851e94ab5bc617356bfe58607ab9
-
SHA256
c7613d8345e3c1d61a83a0b238b972811169a2dbf2dca3a3f801ed7a3793d408
-
SHA512
7989cfc86f1d6c16920d48d23aa624ef2dbf826ed7e620a1d941c7378a6a633d503a291c005c0b7b9415089271036451d100981553dcaab3f5854cb31e4d9c1e
-
SSDEEP
6144:d25mswOyIZjyMrmhc2TawGaOt2da2k78qh90GiTwXw35lk9jgvy89:d2wRIZgZOJDz9fA35lk9N
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 8 whatismyip.com 16 ip-address.domaintools.com 21 ip-address.domaintools.com -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 096692157b97dabeb52e7326a10758a9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 3796 reg.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5004 096692157b97dabeb52e7326a10758a9_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5004 096692157b97dabeb52e7326a10758a9_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5004 wrote to memory of 3460 5004 096692157b97dabeb52e7326a10758a9_JaffaCakes118.exe 82 PID 5004 wrote to memory of 3460 5004 096692157b97dabeb52e7326a10758a9_JaffaCakes118.exe 82 PID 5004 wrote to memory of 3460 5004 096692157b97dabeb52e7326a10758a9_JaffaCakes118.exe 82 PID 3460 wrote to memory of 3796 3460 cmd.exe 84 PID 3460 wrote to memory of 3796 3460 cmd.exe 84 PID 3460 wrote to memory of 3796 3460 cmd.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\096692157b97dabeb52e7326a10758a9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\096692157b97dabeb52e7326a10758a9_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\System32\cmd.exe /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3796
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
2