Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
30-11-2024 05:04
Static task
static1
Behavioral task
behavioral1
Sample
b4e85da551938c94bf7c6325df57a4af_JaffaCakes118.exe
Resource
win7-20241010-en
General
-
Target
b4e85da551938c94bf7c6325df57a4af_JaffaCakes118.exe
-
Size
96KB
-
MD5
b4e85da551938c94bf7c6325df57a4af
-
SHA1
749016c3beed41004e5439939b2b5e41ac4643ce
-
SHA256
21ea3e0d4e4a57c3833f4c69740997880634ad49b07fae2d9c1b93ac9c3ce60d
-
SHA512
077407c27ad2f7cb3d7d01a3a081950d20296fc342d5ef7e4d7c2b190cc73347c056a33a083d04d524afc2413372ba56a683fdabe589251acfbc915a672d1a0b
-
SSDEEP
1536:rD1i2vPS2G9gpSZmiSjrk1R+7R4I6xqEAHiZfxC4tgGS432a1aDcIS+YD:Ni2Hcg80jg1R+94I6xqEpjm432a1aD3q
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile b4e85da551938c94bf7c6325df57a4af_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" b4e85da551938c94bf7c6325df57a4af_JaffaCakes118.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" b4e85da551938c94bf7c6325df57a4af_JaffaCakes118.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" b4e85da551938c94bf7c6325df57a4af_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\wscntfy.exe b4e85da551938c94bf7c6325df57a4af_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wscntfy.exe b4e85da551938c94bf7c6325df57a4af_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b4e85da551938c94bf7c6325df57a4af_JaffaCakes118.exe -
Modifies Internet Explorer Phishing Filter 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\PhishingFilter b4e85da551938c94bf7c6325df57a4af_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\PhishingFilter\Enabled = "0" b4e85da551938c94bf7c6325df57a4af_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\PhishingFilter b4e85da551938c94bf7c6325df57a4af_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\PhishingFilter\Enabled = "0" b4e85da551938c94bf7c6325df57a4af_JaffaCakes118.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Internet Explorer\PhishingFilter\Enabled = "0" b4e85da551938c94bf7c6325df57a4af_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\PhishingFilter b4e85da551938c94bf7c6325df57a4af_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2164 b4e85da551938c94bf7c6325df57a4af_JaffaCakes118.exe 2164 b4e85da551938c94bf7c6325df57a4af_JaffaCakes118.exe -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System b4e85da551938c94bf7c6325df57a4af_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" b4e85da551938c94bf7c6325df57a4af_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4e85da551938c94bf7c6325df57a4af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b4e85da551938c94bf7c6325df57a4af_JaffaCakes118.exe"1⤵
- Modifies firewall policy service
- UAC bypass
- Checks whether UAC is enabled
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Phishing Filter
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2164
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
4