Analysis
-
max time kernel
141s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
01-07-2024 12:12
Behavioral task
behavioral1
Sample
1b41356180d52ac46cca5efcbae52c73_JaffaCakes118.exe
Resource
win7-20240220-en
General
-
Target
1b41356180d52ac46cca5efcbae52c73_JaffaCakes118.exe
-
Size
844KB
-
MD5
1b41356180d52ac46cca5efcbae52c73
-
SHA1
19d096c515233fd27eab6aa5aed3a16f516bec99
-
SHA256
ef1aa0e9d3f370a71813318eea5198d5fe56bcbf3edfe73d0fea103c5438da59
-
SHA512
6b8dda7c3cba992631f5dc620e6695c78162a4c5a8c49c9fde604677018300503a319899e98a4601727b82433fc6b5f28de07d48b354e52851938078e10e90d4
-
SSDEEP
24576:iOidxWYtyy7XKGa68Ia+1KzcPBazErd+T0g1AQ8vGwhA0qA:TidA4yyrmM91KzcPMzH9Zc3
Malware Config
Signatures
-
Processes:
1b41356180d52ac46cca5efcbae52c73_JaffaCakes118.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 1b41356180d52ac46cca5efcbae52c73_JaffaCakes118.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
1b41356180d52ac46cca5efcbae52c73_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Wine 1b41356180d52ac46cca5efcbae52c73_JaffaCakes118.exe -
Processes:
resource yara_rule behavioral1/memory/1660-0-0x0000000000400000-0x00000000005DC000-memory.dmp themida behavioral1/memory/1660-3-0x0000000000400000-0x00000000005DC000-memory.dmp themida behavioral1/memory/1660-4-0x0000000000400000-0x00000000005DC000-memory.dmp themida behavioral1/memory/1660-6-0x0000000000400000-0x00000000005DC000-memory.dmp themida behavioral1/memory/1660-7-0x0000000000400000-0x00000000005DC000-memory.dmp themida behavioral1/memory/1660-8-0x0000000000400000-0x00000000005DC000-memory.dmp themida behavioral1/memory/1660-9-0x0000000000400000-0x00000000005DC000-memory.dmp themida behavioral1/memory/1660-10-0x0000000000400000-0x00000000005DC000-memory.dmp themida behavioral1/memory/1660-11-0x0000000000400000-0x00000000005DC000-memory.dmp themida behavioral1/memory/1660-12-0x0000000000400000-0x00000000005DC000-memory.dmp themida behavioral1/memory/1660-13-0x0000000000400000-0x00000000005DC000-memory.dmp themida behavioral1/memory/1660-14-0x0000000000400000-0x00000000005DC000-memory.dmp themida behavioral1/memory/1660-15-0x0000000000400000-0x00000000005DC000-memory.dmp themida behavioral1/memory/1660-16-0x0000000000400000-0x00000000005DC000-memory.dmp themida behavioral1/memory/1660-17-0x0000000000400000-0x00000000005DC000-memory.dmp themida behavioral1/memory/1660-18-0x0000000000400000-0x00000000005DC000-memory.dmp themida behavioral1/memory/1660-19-0x0000000000400000-0x00000000005DC000-memory.dmp themida behavioral1/memory/1660-20-0x0000000000400000-0x00000000005DC000-memory.dmp themida behavioral1/memory/1660-21-0x0000000000400000-0x00000000005DC000-memory.dmp themida -
Processes:
1b41356180d52ac46cca5efcbae52c73_JaffaCakes118.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 1b41356180d52ac46cca5efcbae52c73_JaffaCakes118.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
1b41356180d52ac46cca5efcbae52c73_JaffaCakes118.exepid process 1660 1b41356180d52ac46cca5efcbae52c73_JaffaCakes118.exe -
Drops file in Program Files directory 1 IoCs
Processes:
1b41356180d52ac46cca5efcbae52c73_JaffaCakes118.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe 1b41356180d52ac46cca5efcbae52c73_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
1b41356180d52ac46cca5efcbae52c73_JaffaCakes118.exepid process 1660 1b41356180d52ac46cca5efcbae52c73_JaffaCakes118.exe 1660 1b41356180d52ac46cca5efcbae52c73_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
1b41356180d52ac46cca5efcbae52c73_JaffaCakes118.exepid process 1660 1b41356180d52ac46cca5efcbae52c73_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
1b41356180d52ac46cca5efcbae52c73_JaffaCakes118.exedescription pid process Token: SeDebugPrivilege 1660 1b41356180d52ac46cca5efcbae52c73_JaffaCakes118.exe Token: SeShutdownPrivilege 1660 1b41356180d52ac46cca5efcbae52c73_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
1b41356180d52ac46cca5efcbae52c73_JaffaCakes118.exepid process 1660 1b41356180d52ac46cca5efcbae52c73_JaffaCakes118.exe -
System policy modification 1 TTPs 2 IoCs
Processes:
1b41356180d52ac46cca5efcbae52c73_JaffaCakes118.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 1b41356180d52ac46cca5efcbae52c73_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 1b41356180d52ac46cca5efcbae52c73_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b41356180d52ac46cca5efcbae52c73_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1b41356180d52ac46cca5efcbae52c73_JaffaCakes118.exe"1⤵
- UAC bypass
- Identifies Wine through registry keys
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
Network
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
2Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1660-0-0x0000000000400000-0x00000000005DC000-memory.dmpFilesize
1.9MB
-
memory/1660-1-0x0000000000BB0000-0x0000000000D8C000-memory.dmpFilesize
1.9MB
-
memory/1660-2-0x0000000000401000-0x000000000043A000-memory.dmpFilesize
228KB
-
memory/1660-3-0x0000000000400000-0x00000000005DC000-memory.dmpFilesize
1.9MB
-
memory/1660-4-0x0000000000400000-0x00000000005DC000-memory.dmpFilesize
1.9MB
-
memory/1660-6-0x0000000000400000-0x00000000005DC000-memory.dmpFilesize
1.9MB
-
memory/1660-7-0x0000000000400000-0x00000000005DC000-memory.dmpFilesize
1.9MB
-
memory/1660-8-0x0000000000400000-0x00000000005DC000-memory.dmpFilesize
1.9MB
-
memory/1660-9-0x0000000000400000-0x00000000005DC000-memory.dmpFilesize
1.9MB
-
memory/1660-10-0x0000000000400000-0x00000000005DC000-memory.dmpFilesize
1.9MB
-
memory/1660-11-0x0000000000400000-0x00000000005DC000-memory.dmpFilesize
1.9MB
-
memory/1660-12-0x0000000000400000-0x00000000005DC000-memory.dmpFilesize
1.9MB
-
memory/1660-13-0x0000000000400000-0x00000000005DC000-memory.dmpFilesize
1.9MB
-
memory/1660-14-0x0000000000400000-0x00000000005DC000-memory.dmpFilesize
1.9MB
-
memory/1660-15-0x0000000000400000-0x00000000005DC000-memory.dmpFilesize
1.9MB
-
memory/1660-16-0x0000000000400000-0x00000000005DC000-memory.dmpFilesize
1.9MB
-
memory/1660-17-0x0000000000400000-0x00000000005DC000-memory.dmpFilesize
1.9MB
-
memory/1660-18-0x0000000000400000-0x00000000005DC000-memory.dmpFilesize
1.9MB
-
memory/1660-19-0x0000000000400000-0x00000000005DC000-memory.dmpFilesize
1.9MB
-
memory/1660-20-0x0000000000400000-0x00000000005DC000-memory.dmpFilesize
1.9MB
-
memory/1660-21-0x0000000000400000-0x00000000005DC000-memory.dmpFilesize
1.9MB