Analysis
-
max time kernel
137s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2024, 12:44
Static task
static1
Behavioral task
behavioral1
Sample
a6b7069d33470bbec65029b590b05083_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
a6b7069d33470bbec65029b590b05083_JaffaCakes118.exe
-
Size
116KB
-
MD5
a6b7069d33470bbec65029b590b05083
-
SHA1
42e7888b2aa73cd10fa1581afbc76eabb1824f69
-
SHA256
a733a2946155227f40a93c12cd338a9dec8ddb0f627d25a4f3e3962b1895f820
-
SHA512
a3c4a6900beddc6940d0a016a1e81f768d665102ee7c959126b8d9ca76268715b70415fdaf0956665069dd65c058d078950d0e61df4eb830a67f265113688f97
-
SSDEEP
3072:+1Cj/M1bd4PjLoA9CJFgHZLkhUVkNUgHdIDcJGPVQguP:uCjkRd+oCsRUWIDcwoP
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Signatures
-
Modifies firewall policy service 3 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" a6b7069d33470bbec65029b590b05083_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" a6b7069d33470bbec65029b590b05083_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" a6b7069d33470bbec65029b590b05083_JaffaCakes118.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" a6b7069d33470bbec65029b590b05083_JaffaCakes118.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" a6b7069d33470bbec65029b590b05083_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" a6b7069d33470bbec65029b590b05083_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" a6b7069d33470bbec65029b590b05083_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" a6b7069d33470bbec65029b590b05083_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" a6b7069d33470bbec65029b590b05083_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" a6b7069d33470bbec65029b590b05083_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/3708-6-0x00000000021D0000-0x000000000325E000-memory.dmp upx behavioral2/memory/3708-4-0x00000000021D0000-0x000000000325E000-memory.dmp upx behavioral2/memory/3708-3-0x00000000021D0000-0x000000000325E000-memory.dmp upx behavioral2/memory/3708-10-0x00000000021D0000-0x000000000325E000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" a6b7069d33470bbec65029b590b05083_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" a6b7069d33470bbec65029b590b05083_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc a6b7069d33470bbec65029b590b05083_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" a6b7069d33470bbec65029b590b05083_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" a6b7069d33470bbec65029b590b05083_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" a6b7069d33470bbec65029b590b05083_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" a6b7069d33470bbec65029b590b05083_JaffaCakes118.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" a6b7069d33470bbec65029b590b05083_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SYSTEM.INI a6b7069d33470bbec65029b590b05083_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a6b7069d33470bbec65029b590b05083_JaffaCakes118.exe -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" a6b7069d33470bbec65029b590b05083_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a6b7069d33470bbec65029b590b05083_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a6b7069d33470bbec65029b590b05083_JaffaCakes118.exe"1⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- System policy modification
PID:3708
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5