Analysis
-
max time kernel
143s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/10/2024, 23:03
Behavioral task
behavioral1
Sample
26cbb55ba9788bed6f2a5f50df92b546_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
26cbb55ba9788bed6f2a5f50df92b546_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
26cbb55ba9788bed6f2a5f50df92b546_JaffaCakes118.exe
-
Size
61KB
-
MD5
26cbb55ba9788bed6f2a5f50df92b546
-
SHA1
4f9653bc344ef7c64a58d3980ae5e6dff5d5a253
-
SHA256
0190d4d9a8c175957af3cde47ec3eab88ca23316dc96d613ea2554bbe6a379c0
-
SHA512
f35eb634889c7a150044c06d8296210a1e5e62b91df064be0455f799ca35c80605928d25e0d40b9a130abfb4b5cd1b06fb5af45affd1f42b1ae1e779709d836e
-
SSDEEP
1536:WPTkWZZnk+6bvPUiP6lefu0XZIVvgjMIQDErcgYV0j8YW5JVKj:WIWFk+6T4leW0+SMIWErcgYVSWhKj
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 26cbb55ba9788bed6f2a5f50df92b546_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 2760 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2784 bill102.exe 2812 bill102.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\sysfbtray = "c:\\windows\\bill102.exe" bill102.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA bill102.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 26cbb55ba9788bed6f2a5f50df92b546_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2924 set thread context of 2728 2924 26cbb55ba9788bed6f2a5f50df92b546_JaffaCakes118.exe 29 PID 2784 set thread context of 2812 2784 bill102.exe 33 -
resource yara_rule behavioral1/memory/2924-0-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral1/memory/2728-3-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/2924-6-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral1/memory/2728-7-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/2728-9-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/2728-8-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/files/0x000d000000012255-14.dat upx behavioral1/memory/2728-28-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/2784-25-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral1/memory/2784-37-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral1/memory/2812-38-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/2812-39-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/2812-40-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/2812-41-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/2812-42-0x0000000000400000-0x0000000000422000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification \??\c:\windows\bill102.exe 26cbb55ba9788bed6f2a5f50df92b546_JaffaCakes118.exe File created \??\c:\windows\bill102.exe 26cbb55ba9788bed6f2a5f50df92b546_JaffaCakes118.exe File created C:\Windows\dxxdv34567.bat 26cbb55ba9788bed6f2a5f50df92b546_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bill102.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 26cbb55ba9788bed6f2a5f50df92b546_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 26cbb55ba9788bed6f2a5f50df92b546_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bill102.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main bill102.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\tp = "1000" bill102.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2924 26cbb55ba9788bed6f2a5f50df92b546_JaffaCakes118.exe 2784 bill102.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 2924 wrote to memory of 2728 2924 26cbb55ba9788bed6f2a5f50df92b546_JaffaCakes118.exe 29 PID 2924 wrote to memory of 2728 2924 26cbb55ba9788bed6f2a5f50df92b546_JaffaCakes118.exe 29 PID 2924 wrote to memory of 2728 2924 26cbb55ba9788bed6f2a5f50df92b546_JaffaCakes118.exe 29 PID 2924 wrote to memory of 2728 2924 26cbb55ba9788bed6f2a5f50df92b546_JaffaCakes118.exe 29 PID 2924 wrote to memory of 2728 2924 26cbb55ba9788bed6f2a5f50df92b546_JaffaCakes118.exe 29 PID 2924 wrote to memory of 2728 2924 26cbb55ba9788bed6f2a5f50df92b546_JaffaCakes118.exe 29 PID 2924 wrote to memory of 2728 2924 26cbb55ba9788bed6f2a5f50df92b546_JaffaCakes118.exe 29 PID 2924 wrote to memory of 2728 2924 26cbb55ba9788bed6f2a5f50df92b546_JaffaCakes118.exe 29 PID 2924 wrote to memory of 2728 2924 26cbb55ba9788bed6f2a5f50df92b546_JaffaCakes118.exe 29 PID 2728 wrote to memory of 2784 2728 26cbb55ba9788bed6f2a5f50df92b546_JaffaCakes118.exe 30 PID 2728 wrote to memory of 2784 2728 26cbb55ba9788bed6f2a5f50df92b546_JaffaCakes118.exe 30 PID 2728 wrote to memory of 2784 2728 26cbb55ba9788bed6f2a5f50df92b546_JaffaCakes118.exe 30 PID 2728 wrote to memory of 2784 2728 26cbb55ba9788bed6f2a5f50df92b546_JaffaCakes118.exe 30 PID 2728 wrote to memory of 2760 2728 26cbb55ba9788bed6f2a5f50df92b546_JaffaCakes118.exe 31 PID 2728 wrote to memory of 2760 2728 26cbb55ba9788bed6f2a5f50df92b546_JaffaCakes118.exe 31 PID 2728 wrote to memory of 2760 2728 26cbb55ba9788bed6f2a5f50df92b546_JaffaCakes118.exe 31 PID 2728 wrote to memory of 2760 2728 26cbb55ba9788bed6f2a5f50df92b546_JaffaCakes118.exe 31 PID 2784 wrote to memory of 2812 2784 bill102.exe 33 PID 2784 wrote to memory of 2812 2784 bill102.exe 33 PID 2784 wrote to memory of 2812 2784 bill102.exe 33 PID 2784 wrote to memory of 2812 2784 bill102.exe 33 PID 2784 wrote to memory of 2812 2784 bill102.exe 33 PID 2784 wrote to memory of 2812 2784 bill102.exe 33 PID 2784 wrote to memory of 2812 2784 bill102.exe 33 PID 2784 wrote to memory of 2812 2784 bill102.exe 33 PID 2784 wrote to memory of 2812 2784 bill102.exe 33 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 26cbb55ba9788bed6f2a5f50df92b546_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\26cbb55ba9788bed6f2a5f50df92b546_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\26cbb55ba9788bed6f2a5f50df92b546_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\26cbb55ba9788bed6f2a5f50df92b546_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\26cbb55ba9788bed6f2a5f50df92b546_JaffaCakes118.exe2⤵
- UAC bypass
- Checks whether UAC is enabled
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2728 -
\??\c:\windows\bill102.exec:\windows\bill102.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2784 -
\??\c:\windows\bill102.exec:\windows\bill102.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:2812
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\dxxdv34567.bat3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2760
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD526cbb55ba9788bed6f2a5f50df92b546
SHA14f9653bc344ef7c64a58d3980ae5e6dff5d5a253
SHA2560190d4d9a8c175957af3cde47ec3eab88ca23316dc96d613ea2554bbe6a379c0
SHA512f35eb634889c7a150044c06d8296210a1e5e62b91df064be0455f799ca35c80605928d25e0d40b9a130abfb4b5cd1b06fb5af45affd1f42b1ae1e779709d836e
-
Filesize
277B
MD56c82337cbeddfacfb26ffb4816ab8529
SHA1539a0c2ffee5bc4b3d8dd2cce2af6de0a5987512
SHA256b1383e740ed3afde96cba2da099b93a013a656f52e23418540ca5a468b0a4e44
SHA51269ce112dde9d969550b27baeb348079f9cd38cf1076b21944055b10a1143938fc894cc3f1fb6dfe3f5b309d3502760f278d572023c867703f930a1b286cfbb08