Analysis
-
max time kernel
14s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
16-07-2024 09:42
Static task
static1
Behavioral task
behavioral1
Sample
4dc3056d771e553df08b4f1fd1ec1c9c_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
4dc3056d771e553df08b4f1fd1ec1c9c_JaffaCakes118.exe
-
Size
2.4MB
-
MD5
4dc3056d771e553df08b4f1fd1ec1c9c
-
SHA1
eb8c8106f5f86b0b28b803e73d2558c59072de8c
-
SHA256
9d8e918ee0cc27fa240659a022b23a542b83dae95bf86d341f89582f619b557c
-
SHA512
aa58ecebffb250cf749082098177e3de945e9c4e35e7674f6f7456fc7d48426d65a2be3d92390557dafc0781825ee4613dee84c7b7bbcd888da76d65736182d0
-
SSDEEP
49152:M0r+eSD+HTaRbHRAaLlzRIBrLbakBen7z4JA3iOCjLyGD0H/Mw:M0ZSDcOhNpqBrncou3i1m7
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Signatures
-
Detects Strela Stealer payload 1 IoCs
resource yara_rule behavioral1/files/0x0008000000017093-62.dat family_strela -
Modifies firewall policy service 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" 4dc3056d771e553df08b4f1fd1ec1c9c_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" 4dc3056d771e553df08b4f1fd1ec1c9c_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" 4dc3056d771e553df08b4f1fd1ec1c9c_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" Au_.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" Au_.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" Au_.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 4dc3056d771e553df08b4f1fd1ec1c9c_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Au_.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 4dc3056d771e553df08b4f1fd1ec1c9c_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 4dc3056d771e553df08b4f1fd1ec1c9c_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 4dc3056d771e553df08b4f1fd1ec1c9c_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" Au_.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" Au_.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" Au_.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 4dc3056d771e553df08b4f1fd1ec1c9c_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 4dc3056d771e553df08b4f1fd1ec1c9c_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" 4dc3056d771e553df08b4f1fd1ec1c9c_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" Au_.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" Au_.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" Au_.exe -
Deletes itself 1 IoCs
pid Process 2828 Au_.exe -
Executes dropped EXE 1 IoCs
pid Process 2828 Au_.exe -
Loads dropped DLL 7 IoCs
pid Process 2228 4dc3056d771e553df08b4f1fd1ec1c9c_JaffaCakes118.exe 2828 Au_.exe 2828 Au_.exe 2828 Au_.exe 2828 Au_.exe 2828 Au_.exe 2828 Au_.exe -
resource yara_rule behavioral1/memory/2228-18-0x0000000001F40000-0x0000000002FCE000-memory.dmp upx behavioral1/memory/2228-5-0x0000000001F40000-0x0000000002FCE000-memory.dmp upx behavioral1/memory/2228-3-0x0000000001F40000-0x0000000002FCE000-memory.dmp upx behavioral1/memory/2228-7-0x0000000001F40000-0x0000000002FCE000-memory.dmp upx behavioral1/memory/2828-32-0x0000000001DE0000-0x0000000002E6E000-memory.dmp upx behavioral1/memory/2828-49-0x0000000001DE0000-0x0000000002E6E000-memory.dmp upx behavioral1/memory/2828-35-0x0000000001DE0000-0x0000000002E6E000-memory.dmp upx behavioral1/memory/2828-33-0x0000000001DE0000-0x0000000002E6E000-memory.dmp upx behavioral1/memory/2828-31-0x0000000001DE0000-0x0000000002E6E000-memory.dmp upx behavioral1/memory/2828-34-0x0000000001DE0000-0x0000000002E6E000-memory.dmp upx behavioral1/memory/2828-29-0x0000000001DE0000-0x0000000002E6E000-memory.dmp upx behavioral1/memory/2828-28-0x0000000001DE0000-0x0000000002E6E000-memory.dmp upx behavioral1/memory/2828-26-0x0000000001DE0000-0x0000000002E6E000-memory.dmp upx behavioral1/memory/2228-23-0x0000000001F40000-0x0000000002FCE000-memory.dmp upx behavioral1/memory/2228-6-0x0000000001F40000-0x0000000002FCE000-memory.dmp upx behavioral1/memory/2228-4-0x0000000001F40000-0x0000000002FCE000-memory.dmp upx behavioral1/memory/2828-55-0x0000000001DE0000-0x0000000002E6E000-memory.dmp upx behavioral1/memory/2828-56-0x0000000001DE0000-0x0000000002E6E000-memory.dmp upx behavioral1/memory/2828-93-0x0000000001DE0000-0x0000000002E6E000-memory.dmp upx behavioral1/memory/2828-96-0x0000000001DE0000-0x0000000002E6E000-memory.dmp upx behavioral1/memory/2828-97-0x0000000001DE0000-0x0000000002E6E000-memory.dmp upx behavioral1/memory/2828-99-0x0000000001DE0000-0x0000000002E6E000-memory.dmp upx behavioral1/memory/2828-100-0x0000000001DE0000-0x0000000002E6E000-memory.dmp upx behavioral1/memory/2828-101-0x0000000001DE0000-0x0000000002E6E000-memory.dmp upx behavioral1/memory/2828-102-0x0000000001DE0000-0x0000000002E6E000-memory.dmp upx behavioral1/memory/2828-105-0x0000000001DE0000-0x0000000002E6E000-memory.dmp upx behavioral1/memory/2828-106-0x0000000001DE0000-0x0000000002E6E000-memory.dmp upx behavioral1/memory/2828-116-0x0000000001DE0000-0x0000000002E6E000-memory.dmp upx behavioral1/memory/2828-118-0x0000000001DE0000-0x0000000002E6E000-memory.dmp upx behavioral1/memory/2828-120-0x0000000001DE0000-0x0000000002E6E000-memory.dmp upx behavioral1/memory/2828-162-0x0000000001DE0000-0x0000000002E6E000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" Au_.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" 4dc3056d771e553df08b4f1fd1ec1c9c_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" Au_.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" Au_.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 4dc3056d771e553df08b4f1fd1ec1c9c_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 4dc3056d771e553df08b4f1fd1ec1c9c_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc 4dc3056d771e553df08b4f1fd1ec1c9c_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" Au_.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 4dc3056d771e553df08b4f1fd1ec1c9c_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 4dc3056d771e553df08b4f1fd1ec1c9c_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 4dc3056d771e553df08b4f1fd1ec1c9c_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" Au_.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" Au_.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc Au_.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Au_.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 4dc3056d771e553df08b4f1fd1ec1c9c_JaffaCakes118.exe -
Enumerates connected drives 3 TTPs 9 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: Au_.exe File opened (read-only) \??\I: Au_.exe File opened (read-only) \??\J: Au_.exe File opened (read-only) \??\M: Au_.exe File opened (read-only) \??\E: Au_.exe File opened (read-only) \??\H: Au_.exe File opened (read-only) \??\K: Au_.exe File opened (read-only) \??\L: Au_.exe File opened (read-only) \??\N: Au_.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\gdiplus.dll Au_.exe File created C:\Windows\SysWOW64\msvcr71.dll Au_.exe File created C:\Windows\SysWOW64\mfc71.dll Au_.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SYSTEM.INI 4dc3056d771e553df08b4f1fd1ec1c9c_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2828 Au_.exe 2828 Au_.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 2828 Au_.exe Token: SeDebugPrivilege 2828 Au_.exe Token: SeDebugPrivilege 2828 Au_.exe Token: SeDebugPrivilege 2828 Au_.exe Token: SeDebugPrivilege 2828 Au_.exe Token: SeDebugPrivilege 2828 Au_.exe Token: SeDebugPrivilege 2828 Au_.exe Token: SeDebugPrivilege 2828 Au_.exe Token: SeDebugPrivilege 2828 Au_.exe Token: SeDebugPrivilege 2828 Au_.exe Token: SeDebugPrivilege 2828 Au_.exe Token: SeDebugPrivilege 2828 Au_.exe Token: SeDebugPrivilege 2828 Au_.exe Token: SeDebugPrivilege 2828 Au_.exe Token: SeDebugPrivilege 2828 Au_.exe Token: SeDebugPrivilege 2828 Au_.exe Token: SeDebugPrivilege 2828 Au_.exe Token: SeDebugPrivilege 2828 Au_.exe Token: SeDebugPrivilege 2828 Au_.exe Token: SeDebugPrivilege 2828 Au_.exe Token: SeDebugPrivilege 2828 Au_.exe Token: SeDebugPrivilege 2828 Au_.exe Token: SeDebugPrivilege 2828 Au_.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2828 Au_.exe 2828 Au_.exe 2828 Au_.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2228 wrote to memory of 2828 2228 4dc3056d771e553df08b4f1fd1ec1c9c_JaffaCakes118.exe 30 PID 2228 wrote to memory of 2828 2228 4dc3056d771e553df08b4f1fd1ec1c9c_JaffaCakes118.exe 30 PID 2228 wrote to memory of 2828 2228 4dc3056d771e553df08b4f1fd1ec1c9c_JaffaCakes118.exe 30 PID 2228 wrote to memory of 2828 2228 4dc3056d771e553df08b4f1fd1ec1c9c_JaffaCakes118.exe 30 PID 2228 wrote to memory of 2828 2228 4dc3056d771e553df08b4f1fd1ec1c9c_JaffaCakes118.exe 30 PID 2228 wrote to memory of 2828 2228 4dc3056d771e553df08b4f1fd1ec1c9c_JaffaCakes118.exe 30 PID 2228 wrote to memory of 2828 2228 4dc3056d771e553df08b4f1fd1ec1c9c_JaffaCakes118.exe 30 PID 2828 wrote to memory of 1104 2828 Au_.exe 19 PID 2828 wrote to memory of 1152 2828 Au_.exe 20 PID 2828 wrote to memory of 1200 2828 Au_.exe 21 PID 2828 wrote to memory of 1248 2828 Au_.exe 25 PID 2828 wrote to memory of 1104 2828 Au_.exe 19 PID 2828 wrote to memory of 1152 2828 Au_.exe 20 PID 2828 wrote to memory of 1200 2828 Au_.exe 21 PID 2828 wrote to memory of 1248 2828 Au_.exe 25 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 4dc3056d771e553df08b4f1fd1ec1c9c_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Au_.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1104
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1152
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\4dc3056d771e553df08b4f1fd1ec1c9c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4dc3056d771e553df08b4f1fd1ec1c9c_JaffaCakes118.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Loads dropped DLL
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\3⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2828
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1248
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.3MB
MD53f18a5a90407c2031ebc82a1180d4650
SHA1dd2448f8d7ea325b49ad515db1235c7fc9c12617
SHA256cdc4d30c679097135fc6167998b9b359a74dee6a90f311c165021a92d770a9cc
SHA5127dde674f35d88da63f7b9eda9c9981d806ccf9ab5d1a056f1b7b2df7dae9fca18cdd3e6395bbd3c7f50cad1ba8ae0d7f628880ffb9e9c82af6bdbf9b04f48926
-
Filesize
257B
MD540f6020647f15be713442169c28831c1
SHA12f5acfdb0c4c6f9dee1098a9088fadb16bc1bda9
SHA256a5de767c835f77d39e02c7cbd4da49c0076c40ada83fb352b7baa37105541f73
SHA5122c619e228b7805e95e5f1b78753b086be89d7b0c38d08f8707a71c96288a6321cc98ff39ae7da1e0642c777b2e0a617388c99aa0f2e31cc7214d9c5062a1f0b1
-
Filesize
100KB
MD5679d002b447941a98fe2c05e5c85e01d
SHA1ba752c2817bc7e16b3be86f49b906b21ba920c46
SHA2563e15fb4aa1722eb937c9060ccb8a7314a901b5c42c21f63e7380269c9c8e9c23
SHA512487c2a2b378b6a5d092ad211b08365f050e7afc910622ccbf5de2bc8294cac754fda2c6e1136dca5e66ad7b9d69645fd464162de2b72a389fb136b59358e8964
-
Filesize
5.8MB
MD52e13e03b7cf2d8c8338bbc3d29fd3e07
SHA1173e6e67c5315474765dcd303b3214d5600c48ea
SHA256ea1552de423ed1768bace344d9a07bf529845c75fe6fc6ce3c4ba91d4aae5409
SHA51294220a07aea2f4a45ef6b7566baba5a9ce73e70236bf97fc2489bee50b662f3fd05824d7804dd544eef85d73e69091aaae5de3094f0866bf51521024eb3d168d
-
Filesize
792KB
MD58fea8fd177034b52e6a5886fb5e780bd
SHA199f511388a2420d53b8406baed48ba550842eaad
SHA256546dddc7a31609b5bc3dc8ecef6f6782b77613853c54171fc32314c08a69e8de
SHA5125d82a3b9cf9d69049e6278a6d835b8a9a386c97ae9a69cf658675b0a8751a344d0da1ee704e9bb9023dab7cd77fdca684bdc90837960b583eef0bb4324498696
-
Filesize
11KB
MD5959ea64598b9a3e494c00e8fa793be7e
SHA140f284a3b92c2f04b1038def79579d4b3d066ee0
SHA25603cd57ab00236c753e7ddeee8ee1c10839ace7c426769982365531042e1f6f8b
SHA5125e765e090f712beffce40c5264674f430b08719940d66e3a4d4a516fd4ade859f7853f614d9d6bbb602780de54e11110d66dbb0f9ca20ef6096ede531f9f6d64
-
Filesize
2.4MB
MD54dc3056d771e553df08b4f1fd1ec1c9c
SHA1eb8c8106f5f86b0b28b803e73d2558c59072de8c
SHA2569d8e918ee0cc27fa240659a022b23a542b83dae95bf86d341f89582f619b557c
SHA512aa58ecebffb250cf749082098177e3de945e9c4e35e7674f6f7456fc7d48426d65a2be3d92390557dafc0781825ee4613dee84c7b7bbcd888da76d65736182d0
-
Filesize
1.0MB
MD51fd3f9722119bdf7b8cff0ecd1e84ea6
SHA19a4faa258b375e173feaca91a8bd920baf1091eb
SHA256385ea2a454172e3f9b1b18778d4d29318a12be9f0c0c0602db72e2cce136e823
SHA512109d7a80a5b10548200d05ab3d7deb9dc2ae8e40d84b468184895eb462211078ecdcb11f01eb50c91c65a924f8e592cd63b78e402dcaea144ff89c11f2ab07d6
-
Filesize
340KB
MD5ca2f560921b7b8be1cf555a5a18d54c3
SHA1432dbcf54b6f1142058b413a9d52668a2bde011d
SHA256c4d4339df314a27ff75a38967b7569d9962337b8d4cd4b0db3aba5ff72b2bfbb
SHA51223e0bdd9458a5a8e0f9bbcb7f6ce4f87fcc9e47c1ee15f964c17ff9fe8d0f82dd3a0f90263daaf1ee87fad4a238aa0ee92a16b3e2c67f47c84d575768edba43e