Analysis

  • max time kernel
    26s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/10/2024, 05:56

General

  • Target

    2c11b04be8bf8cb4b3b39bb144049bba_JaffaCakes118.exe

  • Size

    480KB

  • MD5

    2c11b04be8bf8cb4b3b39bb144049bba

  • SHA1

    11a72e3e277515c288b343980289915b0a939438

  • SHA256

    c4efeb9f9354910eb7cbfa1ae90aac7726ae014a6371ffbf27af8612a5dd5e5f

  • SHA512

    e3b5c768f77c28eb5148cf30561a205f6b29d8fb1fee93413fae693fd69047efe3e30c9bf9b01bbca3cd94cbd57e40ec0156df981d1c75f401d1e7ea230c7f88

  • SSDEEP

    6144:k9yGK4EDyGaLquWiVAJvRmiaPd+avl+Lwedot3Aq8hqJrmfbWWK:ny2gq7VFDweuiRU0TWX

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Signatures

  • Detect Neshta payload 3 IoCs
  • Modifies firewall policy service 3 TTPs 6 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Sality

    Sality is backdoor written in C++, first discovered in 2003.

  • UAC bypass 3 TTPs 2 IoCs
  • Windows security bypass 2 TTPs 12 IoCs
  • Disables RegEdit via registry modification 2 IoCs
  • Disables Task Manager via registry modification
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 14 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 9 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • UPX packed file 37 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 61 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Windows\system32\fontdrvhost.exe
    "fontdrvhost.exe"
    1⤵
      PID:768
    • C:\Windows\system32\fontdrvhost.exe
      "fontdrvhost.exe"
      1⤵
        PID:772
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        1⤵
          PID:1020
        • C:\Windows\system32\sihost.exe
          sihost.exe
          1⤵
            PID:2920
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
            1⤵
              PID:2960
            • C:\Windows\system32\taskhostw.exe
              taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
              1⤵
                PID:2644
              • C:\Windows\Explorer.EXE
                C:\Windows\Explorer.EXE
                1⤵
                  PID:3432
                  • C:\Users\Admin\AppData\Local\Temp\2c11b04be8bf8cb4b3b39bb144049bba_JaffaCakes118.exe
                    "C:\Users\Admin\AppData\Local\Temp\2c11b04be8bf8cb4b3b39bb144049bba_JaffaCakes118.exe"
                    2⤵
                    • Modifies firewall policy service
                    • UAC bypass
                    • Windows security bypass
                    • Disables RegEdit via registry modification
                    • Checks computer location settings
                    • Modifies system executable filetype association
                    • Windows security modification
                    • Checks whether UAC is enabled
                    • Enumerates connected drives
                    • Drops file in Program Files directory
                    • Drops file in Windows directory
                    • System Location Discovery: System Language Discovery
                    • Modifies registry class
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of WriteProcessMemory
                    • System policy modification
                    PID:5040
                    • C:\Users\Admin\AppData\Local\Temp\3582-490\2c11b04be8bf8cb4b3b39bb144049bba_JaffaCakes118.exe
                      "C:\Users\Admin\AppData\Local\Temp\3582-490\2c11b04be8bf8cb4b3b39bb144049bba_JaffaCakes118.exe"
                      3⤵
                      • Modifies firewall policy service
                      • UAC bypass
                      • Windows security bypass
                      • Disables RegEdit via registry modification
                      • Executes dropped EXE
                      • Windows security modification
                      • Checks whether UAC is enabled
                      • Enumerates connected drives
                      • Drops file in Windows directory
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      • System policy modification
                      PID:3424
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                  1⤵
                    PID:3576
                  • C:\Windows\system32\DllHost.exe
                    C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                    1⤵
                      PID:3768
                    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                      1⤵
                        PID:3864
                      • C:\Windows\System32\RuntimeBroker.exe
                        C:\Windows\System32\RuntimeBroker.exe -Embedding
                        1⤵
                          PID:3952
                        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                          1⤵
                            PID:4036
                          • C:\Windows\System32\RuntimeBroker.exe
                            C:\Windows\System32\RuntimeBroker.exe -Embedding
                            1⤵
                              PID:3468
                            • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe
                              "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca
                              1⤵
                                PID:4508
                              • C:\Windows\System32\RuntimeBroker.exe
                                C:\Windows\System32\RuntimeBroker.exe -Embedding
                                1⤵
                                  PID:4024
                                • C:\Windows\system32\backgroundTaskHost.exe
                                  "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca
                                  1⤵
                                    PID:3836
                                  • C:\Windows\system32\backgroundTaskHost.exe
                                    "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
                                    1⤵
                                      PID:4988
                                    • C:\Windows\System32\RuntimeBroker.exe
                                      C:\Windows\System32\RuntimeBroker.exe -Embedding
                                      1⤵
                                        PID:3116
                                      • C:\Windows\System32\RuntimeBroker.exe
                                        C:\Windows\System32\RuntimeBroker.exe -Embedding
                                        1⤵
                                          PID:1708

                                        Network

                                        MITRE ATT&CK Enterprise v15

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE

                                          Filesize

                                          86KB

                                          MD5

                                          3b73078a714bf61d1c19ebc3afc0e454

                                          SHA1

                                          9abeabd74613a2f533e2244c9ee6f967188e4e7e

                                          SHA256

                                          ded54d1fcca07b6bff2bc3b9a1131eac29ff1f836e5d7a7c5c325ec5abe96e29

                                          SHA512

                                          75959d4e8a7649c3268b551a2a378e6d27c0bfb03d2422ebeeb67b0a3f78c079473214057518930f2d72773ce79b106fd2d78405e8e3d8883459dcbb49c163c4

                                        • C:\Users\Admin\AppData\Local\Temp\0E576C27_Rar\2c11b04be8bf8cb4b3b39bb144049bba_JaffaCakes118.exe

                                          Filesize

                                          364KB

                                          MD5

                                          6f58a1d8e7b031c6f2a60ba04d1a0b7d

                                          SHA1

                                          64ced7781de492d15f0d443faffd2d0244b43e56

                                          SHA256

                                          b7a82904d92b096cb6ab537365f9c7f24b1ecefaa6ea7974c24e8102b1746f4b

                                          SHA512

                                          81371904cbe4dd5062e9ede60c3a0429adcd8c7b62dcb5f45b122280d2e3fb5d1ddd4b0f109d972b919e67cde99636cdd952082cd74b567769211ea389a89912

                                        • C:\Users\Admin\AppData\Local\Temp\3582-490\2c11b04be8bf8cb4b3b39bb144049bba_JaffaCakes118.exe

                                          Filesize

                                          440KB

                                          MD5

                                          673917ae89ec8828a3bdb6215b6f0453

                                          SHA1

                                          8d3190f2acbf38bb06d3dbc015590308ad544bf4

                                          SHA256

                                          8f4a1f9d9d4962adcac98f74d8df302ac33a8ad11b2520dec0fd2201a629fed7

                                          SHA512

                                          adedb168c20179e54ce114f7e41f8cf3e85cad6dbc6d1ce718c40d1d8149a393ee473329a0de52d911b173898896d680fbe8cd0c5ba0159376206ceea4481d16

                                        • C:\Windows\SYSTEM.INI

                                          Filesize

                                          257B

                                          MD5

                                          794162b3875e5694abd986f8b0f12959

                                          SHA1

                                          d8b0da41384c5dc0f9a120a5d34576632ffe33ae

                                          SHA256

                                          e5dbb588c4340e3bca0dddbb96f287a7c22e3026ec75b7ebb8e3edfa452fbfee

                                          SHA512

                                          6035cfca2f8306b0525d128658f6f30f055d7bad7a0db3724dd51bd165b96db077e1522b141a383ec5731f152b85c72f1a50624923d89f49d16a7d416ebd9a97

                                        • memory/3424-77-0x00000000004B0000-0x00000000004B2000-memory.dmp

                                          Filesize

                                          8KB

                                        • memory/3424-85-0x0000000000400000-0x0000000000470000-memory.dmp

                                          Filesize

                                          448KB

                                        • memory/3424-12-0x0000000000400000-0x0000000000470000-memory.dmp

                                          Filesize

                                          448KB

                                        • memory/3424-15-0x0000000002390000-0x000000000341E000-memory.dmp

                                          Filesize

                                          16.6MB

                                        • memory/3424-17-0x0000000002390000-0x000000000341E000-memory.dmp

                                          Filesize

                                          16.6MB

                                        • memory/3424-29-0x00000000004B0000-0x00000000004B2000-memory.dmp

                                          Filesize

                                          8KB

                                        • memory/3424-65-0x0000000002390000-0x000000000341E000-memory.dmp

                                          Filesize

                                          16.6MB

                                        • memory/3424-32-0x00000000004B0000-0x00000000004B2000-memory.dmp

                                          Filesize

                                          8KB

                                        • memory/3424-13-0x0000000002390000-0x000000000341E000-memory.dmp

                                          Filesize

                                          16.6MB

                                        • memory/3424-27-0x0000000002390000-0x000000000341E000-memory.dmp

                                          Filesize

                                          16.6MB

                                        • memory/3424-30-0x0000000002390000-0x000000000341E000-memory.dmp

                                          Filesize

                                          16.6MB

                                        • memory/3424-18-0x0000000002390000-0x000000000341E000-memory.dmp

                                          Filesize

                                          16.6MB

                                        • memory/3424-33-0x0000000002390000-0x000000000341E000-memory.dmp

                                          Filesize

                                          16.6MB

                                        • memory/3424-26-0x00000000005F0000-0x00000000005F1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/3424-34-0x0000000002390000-0x000000000341E000-memory.dmp

                                          Filesize

                                          16.6MB

                                        • memory/3424-37-0x0000000002390000-0x000000000341E000-memory.dmp

                                          Filesize

                                          16.6MB

                                        • memory/3424-36-0x0000000002390000-0x000000000341E000-memory.dmp

                                          Filesize

                                          16.6MB

                                        • memory/3424-16-0x0000000002390000-0x000000000341E000-memory.dmp

                                          Filesize

                                          16.6MB

                                        • memory/3424-52-0x0000000002390000-0x000000000341E000-memory.dmp

                                          Filesize

                                          16.6MB

                                        • memory/3424-58-0x0000000002390000-0x000000000341E000-memory.dmp

                                          Filesize

                                          16.6MB

                                        • memory/3424-57-0x0000000002390000-0x000000000341E000-memory.dmp

                                          Filesize

                                          16.6MB

                                        • memory/5040-161-0x0000000003C60000-0x0000000004CEE000-memory.dmp

                                          Filesize

                                          16.6MB

                                        • memory/5040-142-0x0000000003C60000-0x0000000004CEE000-memory.dmp

                                          Filesize

                                          16.6MB

                                        • memory/5040-28-0x0000000002EE0000-0x0000000002EE2000-memory.dmp

                                          Filesize

                                          8KB

                                        • memory/5040-24-0x0000000003030000-0x0000000003031000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/5040-115-0x0000000000400000-0x000000000041B000-memory.dmp

                                          Filesize

                                          108KB

                                        • memory/5040-121-0x0000000003C60000-0x0000000004CEE000-memory.dmp

                                          Filesize

                                          16.6MB

                                        • memory/5040-128-0x0000000003C60000-0x0000000004CEE000-memory.dmp

                                          Filesize

                                          16.6MB

                                        • memory/5040-127-0x0000000003C60000-0x0000000004CEE000-memory.dmp

                                          Filesize

                                          16.6MB

                                        • memory/5040-125-0x0000000003C60000-0x0000000004CEE000-memory.dmp

                                          Filesize

                                          16.6MB

                                        • memory/5040-124-0x0000000003C60000-0x0000000004CEE000-memory.dmp

                                          Filesize

                                          16.6MB

                                        • memory/5040-122-0x0000000003C60000-0x0000000004CEE000-memory.dmp

                                          Filesize

                                          16.6MB

                                        • memory/5040-126-0x0000000003C60000-0x0000000004CEE000-memory.dmp

                                          Filesize

                                          16.6MB

                                        • memory/5040-123-0x0000000003C60000-0x0000000004CEE000-memory.dmp

                                          Filesize

                                          16.6MB

                                        • memory/5040-119-0x0000000003C60000-0x0000000004CEE000-memory.dmp

                                          Filesize

                                          16.6MB

                                        • memory/5040-143-0x0000000003C60000-0x0000000004CEE000-memory.dmp

                                          Filesize

                                          16.6MB

                                        • memory/5040-31-0x0000000002EE0000-0x0000000002EE2000-memory.dmp

                                          Filesize

                                          8KB

                                        • memory/5040-155-0x0000000003C60000-0x0000000004CEE000-memory.dmp

                                          Filesize

                                          16.6MB

                                        • memory/5040-157-0x0000000002EE0000-0x0000000002EE2000-memory.dmp

                                          Filesize

                                          8KB

                                        • memory/5040-156-0x0000000003C60000-0x0000000004CEE000-memory.dmp

                                          Filesize

                                          16.6MB

                                        • memory/5040-158-0x0000000003C60000-0x0000000004CEE000-memory.dmp

                                          Filesize

                                          16.6MB

                                        • memory/5040-160-0x0000000003C60000-0x0000000004CEE000-memory.dmp

                                          Filesize

                                          16.6MB

                                        • memory/5040-23-0x0000000002EE0000-0x0000000002EE2000-memory.dmp

                                          Filesize

                                          8KB

                                        • memory/5040-162-0x0000000003C60000-0x0000000004CEE000-memory.dmp

                                          Filesize

                                          16.6MB

                                        • memory/5040-164-0x0000000000400000-0x000000000041B000-memory.dmp

                                          Filesize

                                          108KB

                                        • memory/5040-165-0x0000000003C60000-0x0000000004CEE000-memory.dmp

                                          Filesize

                                          16.6MB

                                        • memory/5040-166-0x0000000003C60000-0x0000000004CEE000-memory.dmp

                                          Filesize

                                          16.6MB

                                        • memory/5040-168-0x0000000003C60000-0x0000000004CEE000-memory.dmp

                                          Filesize

                                          16.6MB

                                        • memory/5040-170-0x0000000003C60000-0x0000000004CEE000-memory.dmp

                                          Filesize

                                          16.6MB

                                        • memory/5040-228-0x0000000003C60000-0x0000000004CEE000-memory.dmp

                                          Filesize

                                          16.6MB