Analysis
-
max time kernel
140s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2024 02:14
Behavioral task
behavioral1
Sample
3d3d222c524386051a66e0e986f97d16_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3d3d222c524386051a66e0e986f97d16_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3d3d222c524386051a66e0e986f97d16_JaffaCakes118.exe
-
Size
2.2MB
-
MD5
3d3d222c524386051a66e0e986f97d16
-
SHA1
f86b87d976aa9dec28b84eca3fc33350c07020ff
-
SHA256
d218ba00936dea02fd2161f899870997eb919b55621d9b88adf4f557f8c3023d
-
SHA512
eb9590b1d8554aa12dd14e2ca0faec9e3670cb6bdd6e0c118148463214a1d40b499b107dfffb49e1148ee0b16a4309411f7585f7d48045a066ad6b42577415f5
-
SSDEEP
49152:oUz0QnDZBtducPSxAWr7ksSp2WuhkTCzF3KcfMBVuRhTmt9bfm9t:z0QnFdhqtr7kBYkTCt3MBghTmt9be9t
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\drivers\regtoro.sys 3d3d222c524386051a66e0e986f97d16_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/4276-1-0x0000000000400000-0x00000000012D2000-memory.dmp aspack_v212_v242 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Windows\\Tcp_IP.exe" 3d3d222c524386051a66e0e986f97d16_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tcp_IP.exe 3d3d222c524386051a66e0e986f97d16_JaffaCakes118.exe File opened for modification C:\Windows\Tcp_IP.exe 3d3d222c524386051a66e0e986f97d16_JaffaCakes118.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 4528 4276 WerFault.exe 83 2800 4276 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3d3d222c524386051a66e0e986f97d16_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 4076 reg.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4276 wrote to memory of 1160 4276 3d3d222c524386051a66e0e986f97d16_JaffaCakes118.exe 89 PID 4276 wrote to memory of 1160 4276 3d3d222c524386051a66e0e986f97d16_JaffaCakes118.exe 89 PID 4276 wrote to memory of 1160 4276 3d3d222c524386051a66e0e986f97d16_JaffaCakes118.exe 89 PID 1160 wrote to memory of 4076 1160 cmd.exe 91 PID 1160 wrote to memory of 4076 1160 cmd.exe 91 PID 1160 wrote to memory of 4076 1160 cmd.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d3d222c524386051a66e0e986f97d16_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3d3d222c524386051a66e0e986f97d16_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4276 -s 3842⤵
- Program crash
PID:4528
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\System32\cmd.exe /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4076
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4276 -s 9682⤵
- Program crash
PID:2800
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4276 -ip 42761⤵PID:2860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4276 -ip 42761⤵PID:932
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1