Analysis
-
max time kernel
111s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
07/04/2025, 05:19
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_9dfd283c4620d082ee28d02f872e3741.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_9dfd283c4620d082ee28d02f872e3741.exe
-
Size
3.6MB
-
MD5
9dfd283c4620d082ee28d02f872e3741
-
SHA1
c9305d0ef5bc095d8befb957e3c710986de25852
-
SHA256
ab700a925751c21710ddf713c7c09e61a0822029db8d2a70b063dda6bc457e34
-
SHA512
abbd37a470315bea56aa43631cc1d07667579a35b122a67f339a1bc40dcace208d00fc29c97c471dfff66dc02bd9e67df71ad2086584fd7bd2ccbea2ebb7652d
-
SSDEEP
49152:9eeiQPIcX6TsOgeqm4ihDYLxVp92r7z/p3t3qLw8l2/Pic:9egOF4iVaN9GXx359kqKc
Malware Config
Signatures
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Banload family
-
UAC bypass 3 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" JaffaCakes118_9dfd283c4620d082ee28d02f872e3741.exe -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 4664 netsh.exe -
Stops running service(s) 4 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion JaffaCakes118_9dfd283c4620d082ee28d02f872e3741.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate JaffaCakes118_9dfd283c4620d082ee28d02f872e3741.exe -
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" JaffaCakes118_9dfd283c4620d082ee28d02f872e3741.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3024 sc.exe 1208 sc.exe 1704 sc.exe 4956 sc.exe -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_9dfd283c4620d082ee28d02f872e3741.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{050C25D7-C54E-BF75-D32D-3B647513A718}\InprocServer32 JaffaCakes118_9dfd283c4620d082ee28d02f872e3741.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{050C25D7-C54E-BF75-D32D-3B647513A718}\InprocServer32\Assembly = "Microsoft.Office.Interop.Excel, Version=15.0.0.0, Culture=neutral, PublicKeyToken=71E9BCE111E9429C" JaffaCakes118_9dfd283c4620d082ee28d02f872e3741.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{050C25D7-C54E-BF75-D32D-3B647513A718}\InprocServer32\RuntimeVersion = "v2.0.50727" JaffaCakes118_9dfd283c4620d082ee28d02f872e3741.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{050C25D7-C54E-BF75-D32D-3B647513A718}\InprocServer32\15.0.0.0\Class = "Microsoft.Office.Interop.Excel.OLEObjectClass" JaffaCakes118_9dfd283c4620d082ee28d02f872e3741.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{050C25D7-C54E-BF75-D32D-3B647513A718} JaffaCakes118_9dfd283c4620d082ee28d02f872e3741.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{050C25D7-C54E-BF75-D32D-3B647513A718}\InprocServer32\Class = "Microsoft.Office.Interop.Excel.OLEObjectClass" JaffaCakes118_9dfd283c4620d082ee28d02f872e3741.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{050C25D7-C54E-BF75-D32D-3B647513A718}\InprocServer32\15.0.0.0 JaffaCakes118_9dfd283c4620d082ee28d02f872e3741.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{050C25D7-C54E-BF75-D32D-3B647513A718}\InprocServer32\15.0.0.0\Assembly = "Microsoft.Office.Interop.Excel, Version=15.0.0.0, Culture=neutral, PublicKeyToken=71E9BCE111E9429C" JaffaCakes118_9dfd283c4620d082ee28d02f872e3741.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{050C25D7-C54E-BF75-D32D-3B647513A718}\InprocServer32\15.0.0.0\RuntimeVersion = "v2.0.50727" JaffaCakes118_9dfd283c4620d082ee28d02f872e3741.exe -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 4452 JaffaCakes118_9dfd283c4620d082ee28d02f872e3741.exe Token: SeIncBasePriorityPrivilege 4452 JaffaCakes118_9dfd283c4620d082ee28d02f872e3741.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4452 JaffaCakes118_9dfd283c4620d082ee28d02f872e3741.exe 4452 JaffaCakes118_9dfd283c4620d082ee28d02f872e3741.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 4452 wrote to memory of 4664 4452 JaffaCakes118_9dfd283c4620d082ee28d02f872e3741.exe 92 PID 4452 wrote to memory of 4664 4452 JaffaCakes118_9dfd283c4620d082ee28d02f872e3741.exe 92 PID 4452 wrote to memory of 4664 4452 JaffaCakes118_9dfd283c4620d082ee28d02f872e3741.exe 92 PID 4452 wrote to memory of 2624 4452 JaffaCakes118_9dfd283c4620d082ee28d02f872e3741.exe 93 PID 4452 wrote to memory of 2624 4452 JaffaCakes118_9dfd283c4620d082ee28d02f872e3741.exe 93 PID 4452 wrote to memory of 2624 4452 JaffaCakes118_9dfd283c4620d082ee28d02f872e3741.exe 93 PID 4452 wrote to memory of 872 4452 JaffaCakes118_9dfd283c4620d082ee28d02f872e3741.exe 94 PID 4452 wrote to memory of 872 4452 JaffaCakes118_9dfd283c4620d082ee28d02f872e3741.exe 94 PID 4452 wrote to memory of 872 4452 JaffaCakes118_9dfd283c4620d082ee28d02f872e3741.exe 94 PID 4452 wrote to memory of 3024 4452 JaffaCakes118_9dfd283c4620d082ee28d02f872e3741.exe 96 PID 4452 wrote to memory of 3024 4452 JaffaCakes118_9dfd283c4620d082ee28d02f872e3741.exe 96 PID 4452 wrote to memory of 3024 4452 JaffaCakes118_9dfd283c4620d082ee28d02f872e3741.exe 96 PID 4452 wrote to memory of 4956 4452 JaffaCakes118_9dfd283c4620d082ee28d02f872e3741.exe 97 PID 4452 wrote to memory of 4956 4452 JaffaCakes118_9dfd283c4620d082ee28d02f872e3741.exe 97 PID 4452 wrote to memory of 4956 4452 JaffaCakes118_9dfd283c4620d082ee28d02f872e3741.exe 97 PID 4452 wrote to memory of 1464 4452 JaffaCakes118_9dfd283c4620d082ee28d02f872e3741.exe 98 PID 4452 wrote to memory of 1464 4452 JaffaCakes118_9dfd283c4620d082ee28d02f872e3741.exe 98 PID 4452 wrote to memory of 1464 4452 JaffaCakes118_9dfd283c4620d082ee28d02f872e3741.exe 98 PID 4452 wrote to memory of 5108 4452 JaffaCakes118_9dfd283c4620d082ee28d02f872e3741.exe 99 PID 4452 wrote to memory of 5108 4452 JaffaCakes118_9dfd283c4620d082ee28d02f872e3741.exe 99 PID 4452 wrote to memory of 5108 4452 JaffaCakes118_9dfd283c4620d082ee28d02f872e3741.exe 99 PID 4452 wrote to memory of 1704 4452 JaffaCakes118_9dfd283c4620d082ee28d02f872e3741.exe 101 PID 4452 wrote to memory of 1704 4452 JaffaCakes118_9dfd283c4620d082ee28d02f872e3741.exe 101 PID 4452 wrote to memory of 1704 4452 JaffaCakes118_9dfd283c4620d082ee28d02f872e3741.exe 101 PID 4452 wrote to memory of 1208 4452 JaffaCakes118_9dfd283c4620d082ee28d02f872e3741.exe 103 PID 4452 wrote to memory of 1208 4452 JaffaCakes118_9dfd283c4620d082ee28d02f872e3741.exe 103 PID 4452 wrote to memory of 1208 4452 JaffaCakes118_9dfd283c4620d082ee28d02f872e3741.exe 103 PID 1464 wrote to memory of 2500 1464 net.exe 110 PID 1464 wrote to memory of 2500 1464 net.exe 110 PID 1464 wrote to memory of 2500 1464 net.exe 110 PID 872 wrote to memory of 4712 872 net.exe 111 PID 872 wrote to memory of 4712 872 net.exe 111 PID 872 wrote to memory of 4712 872 net.exe 111 PID 2624 wrote to memory of 1760 2624 net.exe 112 PID 2624 wrote to memory of 1760 2624 net.exe 112 PID 2624 wrote to memory of 1760 2624 net.exe 112 PID 5108 wrote to memory of 4128 5108 net.exe 113 PID 5108 wrote to memory of 4128 5108 net.exe 113 PID 5108 wrote to memory of 4128 5108 net.exe 113 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System JaffaCakes118_9dfd283c4620d082ee28d02f872e3741.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" JaffaCakes118_9dfd283c4620d082ee28d02f872e3741.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9dfd283c4620d082ee28d02f872e3741.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9dfd283c4620d082ee28d02f872e3741.exe"1⤵
- UAC bypass
- Checks BIOS information in registry
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4452 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode disable2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4664
-
-
C:\Windows\SysWOW64\net.exenet stop security center2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop security center3⤵
- System Location Discovery: System Language Discovery
PID:1760
-
-
-
C:\Windows\SysWOW64\net.exenet stop WinDefend2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend3⤵
- System Location Discovery: System Language Discovery
PID:4712
-
-
-
C:\Windows\SysWOW64\sc.exesc stop SharedAccess2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3024
-
-
C:\Windows\SysWOW64\sc.exesc DELETE SharedAccess2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4956
-
-
C:\Windows\SysWOW64\net.exenet stop SharedAccess2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess3⤵
- System Location Discovery: System Language Discovery
PID:2500
-
-
-
C:\Windows\SysWOW64\net.exenet sc DELETE SharedAccess2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 sc DELETE SharedAccess3⤵
- System Location Discovery: System Language Discovery
PID:4128
-
-
-
C:\Windows\SysWOW64\sc.exesc wscsvc start disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1704
-
-
C:\Windows\SysWOW64\sc.exesc wuauserv start disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1208
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
2