Analysis

  • max time kernel
    148s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06/09/2024, 00:39

General

  • Target

    ce42c9afbbb6128df70fbd97f154f492_JaffaCakes118.exe

  • Size

    708KB

  • MD5

    ce42c9afbbb6128df70fbd97f154f492

  • SHA1

    efef2e72d8dfcdf90a9a3bdaf52c4b00321df087

  • SHA256

    cafa42623d5c4e9d132d8f945b055a032e3530832a496de6a5795974413c1449

  • SHA512

    4d213540e3925b71f24bfbb371f905bc7aec23e74e8b291cccfa95a770859610211a2feea63119c306dacdbb0c6ae05e2879fc0818ffb5416a05ec4884de0d0c

  • SSDEEP

    12288:XPzvd/Y6FBe6ikWAehJuqTHZT5FQBlVREeKNvXYX49IM5:fzvdQee6ikWAAuqVTHQBlViNfYX4L5

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Signatures

  • Modifies firewall policy service 3 TTPs 3 IoCs
  • Sality

    Sality is backdoor written in C++, first discovered in 2003.

  • UAC bypass 3 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 6 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Windows security modification 2 TTPs 7 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 11 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 43 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 61 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs
  • System policy modification 1 TTPs 1 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ce42c9afbbb6128df70fbd97f154f492_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ce42c9afbbb6128df70fbd97f154f492_JaffaCakes118.exe"
    1⤵
    • Modifies firewall policy service
    • UAC bypass
    • Windows security bypass
    • Windows security modification
    • Checks whether UAC is enabled
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2648
    • C:\Windows\SysWOW64\msiexec.exe
      msiexec.exe /i C:\Users\Admin\AppData\Local\Temp\MSIF9CA.tmp
      2⤵
      • Enumerates connected drives
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:2804
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2568
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding F8B65E918EDCFC468517DCA500293052
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1404
      • C:\Users\Admin\AppData\Local\Temp\01593.tmp
        C:\Users\Admin\AppData\Local\Temp\01593.tmp
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1232
        • C:\Setup.exe
          "C:\Setup.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2720
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:272
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000003A4" "0000000000000390"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:3020

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Setup.exe

    Filesize

    280KB

    MD5

    a394877a49ea1be45553fd1cdd17ce22

    SHA1

    2d895b9ea8a2eb7f828cc0e76db1899a36f9d131

    SHA256

    79ceac666e87c82a059f523c2106a09f28a5b2f907a317768b502efdf841738f

    SHA512

    ee44f9c53e7c49fbe1f112daa10439c6b65bbdc09a8bae91a498c5d54e2758485bb9cc01fb4b3bd896e52c47cfd83b38775cbfff190dfaebbccb925aec04073c

  • C:\Users\Admin\AppData\Local\Temp\01593.tmp

    Filesize

    382KB

    MD5

    6586651cc7b6588de7bdd38ead464f22

    SHA1

    27d21f935f7940939fe91d03a52298c2606d948e

    SHA256

    140c23fabef89e7d8797639694303a1ea0aee3f0aa8ee633c4e83464baec0721

    SHA512

    54c0d67237ea11b385d9353728a7acf9f5a25024ffad11e90d0a28d44da2d677313f3d1cf8433cdafc790dbba49e1a88d59d6bc685bc8eef087a0c480eb8ef6b

  • C:\Users\Admin\AppData\Local\Temp\MSIF9CA.tmp

    Filesize

    558KB

    MD5

    172e2462b13b295a1688701956ddc878

    SHA1

    c1909f4798759a9b758d28fbba7318f97bff5e14

    SHA256

    ea0afd35436e7624c6c3748a88c9cdf014a9e315ebd3473ff4e07eb74b5980e5

    SHA512

    8a4d8a80f58e0999f855ac4af6de255d3aeb900b9de02f4380575c93b566396c5f2021661b83c53e4a1bfd99041257dc05f5c6322c5022d71e08701bedbcdf58

  • \Windows\Installer\MSI1566.tmp

    Filesize

    493KB

    MD5

    cad102efafbb6ffd628c34def67677bb

    SHA1

    73bd6bec972d891ff9aa8876064295530e134ccc

    SHA256

    8914dc5c489b0911a072d590ab44981d05264502adbba43cf935f32e9262d11c

    SHA512

    1e2d03d333ec2a5ea4bb8e4bd0781906f34e5a9a7fd208d0d72c87cb958abff10e9bbb91d57e8a2cd513564b98408afec2a2698ed5c07b793fd81acafbaaf987

  • memory/2648-3-0x0000000001EA0000-0x0000000002F2E000-memory.dmp

    Filesize

    16.6MB

  • memory/2648-6-0x0000000001EA0000-0x0000000002F2E000-memory.dmp

    Filesize

    16.6MB

  • memory/2648-0-0x0000000000400000-0x00000000004B3000-memory.dmp

    Filesize

    716KB

  • memory/2648-8-0x0000000001EA0000-0x0000000002F2E000-memory.dmp

    Filesize

    16.6MB

  • memory/2648-4-0x0000000001EA0000-0x0000000002F2E000-memory.dmp

    Filesize

    16.6MB

  • memory/2648-11-0x0000000001EA0000-0x0000000002F2E000-memory.dmp

    Filesize

    16.6MB

  • memory/2648-7-0x0000000001EA0000-0x0000000002F2E000-memory.dmp

    Filesize

    16.6MB

  • memory/2648-16-0x0000000000400000-0x00000000004B3000-memory.dmp

    Filesize

    716KB

  • memory/2648-5-0x0000000001EA0000-0x0000000002F2E000-memory.dmp

    Filesize

    16.6MB

  • memory/2720-65-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB