Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 05:09
Static task
static1
Behavioral task
behavioral1
Sample
fb912c92ae7d8d33384b257773d4e13a_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
fb912c92ae7d8d33384b257773d4e13a_JaffaCakes118.exe
-
Size
82KB
-
MD5
fb912c92ae7d8d33384b257773d4e13a
-
SHA1
84ee3c71e2d9c5baf4a92e508a1ed60c81c1ebf9
-
SHA256
6531742e79acca2a9575282de357f2ebfe261ce313a6a739450afb314c17e7b0
-
SHA512
c30434391934d41e99eedf841f29fc747841ba34d3da046999d12ebdf2353e34c0a46b91615190cf7c7d6711ada988c55fdddffefda0e5bb923c62d758587d3d
-
SSDEEP
1536:HeYroiu+vOminHdSPeuw+8SeMRY6nEk70qpkED1k3GFlGGeYh:nu+mmadOmS1YjdV2Fl7
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Signatures
-
Modifies firewall policy service 3 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" fb912c92ae7d8d33384b257773d4e13a_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" fb912c92ae7d8d33384b257773d4e13a_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" fb912c92ae7d8d33384b257773d4e13a_JaffaCakes118.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" fb912c92ae7d8d33384b257773d4e13a_JaffaCakes118.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" fb912c92ae7d8d33384b257773d4e13a_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" fb912c92ae7d8d33384b257773d4e13a_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" fb912c92ae7d8d33384b257773d4e13a_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" fb912c92ae7d8d33384b257773d4e13a_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" fb912c92ae7d8d33384b257773d4e13a_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" fb912c92ae7d8d33384b257773d4e13a_JaffaCakes118.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Policies\system\DisableRegistryTools = "1" fb912c92ae7d8d33384b257773d4e13a_JaffaCakes118.exe -
Disables Task Manager via registry modification
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" fb912c92ae7d8d33384b257773d4e13a_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" fb912c92ae7d8d33384b257773d4e13a_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" fb912c92ae7d8d33384b257773d4e13a_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" fb912c92ae7d8d33384b257773d4e13a_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" fb912c92ae7d8d33384b257773d4e13a_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" fb912c92ae7d8d33384b257773d4e13a_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc fb912c92ae7d8d33384b257773d4e13a_JaffaCakes118.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" fb912c92ae7d8d33384b257773d4e13a_JaffaCakes118.exe -
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: fb912c92ae7d8d33384b257773d4e13a_JaffaCakes118.exe File opened (read-only) \??\G: fb912c92ae7d8d33384b257773d4e13a_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2536-1-0x0000000000630000-0x00000000016BE000-memory.dmp upx behavioral1/memory/2536-8-0x0000000000630000-0x00000000016BE000-memory.dmp upx behavioral1/memory/2536-11-0x0000000000630000-0x00000000016BE000-memory.dmp upx behavioral1/memory/2536-10-0x0000000000630000-0x00000000016BE000-memory.dmp upx behavioral1/memory/2536-5-0x0000000000630000-0x00000000016BE000-memory.dmp upx behavioral1/memory/2536-7-0x0000000000630000-0x00000000016BE000-memory.dmp upx behavioral1/memory/2536-6-0x0000000000630000-0x00000000016BE000-memory.dmp upx behavioral1/memory/2536-4-0x0000000000630000-0x00000000016BE000-memory.dmp upx behavioral1/memory/2536-12-0x0000000000630000-0x00000000016BE000-memory.dmp upx behavioral1/memory/2536-27-0x0000000000630000-0x00000000016BE000-memory.dmp upx behavioral1/memory/2536-26-0x0000000000630000-0x00000000016BE000-memory.dmp upx behavioral1/memory/2536-28-0x0000000000630000-0x00000000016BE000-memory.dmp upx behavioral1/memory/2536-29-0x0000000000630000-0x00000000016BE000-memory.dmp upx behavioral1/memory/2536-30-0x0000000000630000-0x00000000016BE000-memory.dmp upx behavioral1/memory/2536-32-0x0000000000630000-0x00000000016BE000-memory.dmp upx behavioral1/memory/2536-33-0x0000000000630000-0x00000000016BE000-memory.dmp upx behavioral1/memory/2536-53-0x0000000000630000-0x00000000016BE000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SYSTEM.INI fb912c92ae7d8d33384b257773d4e13a_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fb912c92ae7d8d33384b257773d4e13a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.ru/" regedit.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://samlab.ru/" regedit.exe -
Modifies registry class 22 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Winamp.Playlist\shell\Play\ = "Îòêðûòü â Winamp" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shell\Winamp.Bookmark regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shell\Winamp.Enqueue\ = "Äîáàâèòü â Winamp" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Winamp.File regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Winamp.File\shell regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Winamp.File\shell\ListBookmark\ = "Â çàêëàäêè Winamp" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Winamp.File\shell\Play regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Winamp.Playlist\shell regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shell\Winamp.Bookmark\ = "Â çàêëàäêè Winamp" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shell\Winamp.Enqueue regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shell\Winamp.Play regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shell\Winamp.Play\ = "Îòêðûòü â Winamp" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Winamp.File\shell\Enqueue\ = "Äîáàâèòü â Winamp" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Winamp.Playlist\shell\Enqueue regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Winamp.Playlist\shell\ListBookmark regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Winamp.File\shell\Play\ = "Îòêðûòü â Winamp" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Winamp.Playlist\shell\Play regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Winamp.File\shell\Enqueue regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Winamp.File\shell\ListBookmark regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Winamp.Playlist regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Winamp.Playlist\shell\Enqueue\ = "Äîáàâèòü â Winamp" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Winamp.Playlist\shell\ListBookmark\ = "Â çàêëàäêè Winamp" regedit.exe -
Runs .reg file with regedit 1 IoCs
pid Process 3068 regedit.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2536 fb912c92ae7d8d33384b257773d4e13a_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeDebugPrivilege 2536 fb912c92ae7d8d33384b257773d4e13a_JaffaCakes118.exe Token: SeDebugPrivilege 2536 fb912c92ae7d8d33384b257773d4e13a_JaffaCakes118.exe Token: SeDebugPrivilege 2536 fb912c92ae7d8d33384b257773d4e13a_JaffaCakes118.exe Token: SeDebugPrivilege 2536 fb912c92ae7d8d33384b257773d4e13a_JaffaCakes118.exe Token: SeDebugPrivilege 2536 fb912c92ae7d8d33384b257773d4e13a_JaffaCakes118.exe Token: SeDebugPrivilege 2536 fb912c92ae7d8d33384b257773d4e13a_JaffaCakes118.exe Token: SeDebugPrivilege 2536 fb912c92ae7d8d33384b257773d4e13a_JaffaCakes118.exe Token: SeDebugPrivilege 2536 fb912c92ae7d8d33384b257773d4e13a_JaffaCakes118.exe Token: SeDebugPrivilege 2536 fb912c92ae7d8d33384b257773d4e13a_JaffaCakes118.exe Token: SeDebugPrivilege 2536 fb912c92ae7d8d33384b257773d4e13a_JaffaCakes118.exe Token: SeDebugPrivilege 2536 fb912c92ae7d8d33384b257773d4e13a_JaffaCakes118.exe Token: SeDebugPrivilege 2536 fb912c92ae7d8d33384b257773d4e13a_JaffaCakes118.exe Token: SeDebugPrivilege 2536 fb912c92ae7d8d33384b257773d4e13a_JaffaCakes118.exe Token: SeDebugPrivilege 2536 fb912c92ae7d8d33384b257773d4e13a_JaffaCakes118.exe Token: SeDebugPrivilege 2536 fb912c92ae7d8d33384b257773d4e13a_JaffaCakes118.exe Token: SeDebugPrivilege 2536 fb912c92ae7d8d33384b257773d4e13a_JaffaCakes118.exe Token: SeDebugPrivilege 2536 fb912c92ae7d8d33384b257773d4e13a_JaffaCakes118.exe Token: SeDebugPrivilege 2536 fb912c92ae7d8d33384b257773d4e13a_JaffaCakes118.exe Token: SeDebugPrivilege 2536 fb912c92ae7d8d33384b257773d4e13a_JaffaCakes118.exe Token: SeDebugPrivilege 2536 fb912c92ae7d8d33384b257773d4e13a_JaffaCakes118.exe Token: SeDebugPrivilege 2536 fb912c92ae7d8d33384b257773d4e13a_JaffaCakes118.exe Token: SeDebugPrivilege 2536 fb912c92ae7d8d33384b257773d4e13a_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2536 wrote to memory of 3068 2536 fb912c92ae7d8d33384b257773d4e13a_JaffaCakes118.exe 30 PID 2536 wrote to memory of 3068 2536 fb912c92ae7d8d33384b257773d4e13a_JaffaCakes118.exe 30 PID 2536 wrote to memory of 3068 2536 fb912c92ae7d8d33384b257773d4e13a_JaffaCakes118.exe 30 PID 2536 wrote to memory of 3068 2536 fb912c92ae7d8d33384b257773d4e13a_JaffaCakes118.exe 30 PID 2536 wrote to memory of 1040 2536 fb912c92ae7d8d33384b257773d4e13a_JaffaCakes118.exe 17 PID 2536 wrote to memory of 1068 2536 fb912c92ae7d8d33384b257773d4e13a_JaffaCakes118.exe 18 PID 2536 wrote to memory of 1112 2536 fb912c92ae7d8d33384b257773d4e13a_JaffaCakes118.exe 20 PID 2536 wrote to memory of 888 2536 fb912c92ae7d8d33384b257773d4e13a_JaffaCakes118.exe 23 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" fb912c92ae7d8d33384b257773d4e13a_JaffaCakes118.exe
Processes
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1040
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1068
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1112
-
C:\Users\Admin\AppData\Local\Temp\fb912c92ae7d8d33384b257773d4e13a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fb912c92ae7d8d33384b257773d4e13a_JaffaCakes118.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Disables RegEdit via registry modification
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2536 -
C:\Windows\SysWOW64\regedit.exeregedit.exe -s C:\ParaTemp.reg3⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Runs .reg file with regedit
PID:3068
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:888
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
7Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e408f5355385a96bcd5f38c02cdc46d1
SHA1f2f4649abbcd68eddda98893d39faa74439e4f5a
SHA2565cd740ec25a66b841be1196597dfb86a1b9860e7295fc9af16bdaa48ad7ed5eb
SHA51219acdc114786f6fee6ae0db061822b7ee626b3b6cb08903538a709c5e964bf366e589248f2b5086b544061144231af80f8eea19d4e89224afca38eec7e5f5274