Analysis

  • max time kernel
    93s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/11/2024, 23:14

General

  • Target

    9137c16cb0d4978645b3d1c6d7447855_JaffaCakes118.dll

  • Size

    224KB

  • MD5

    9137c16cb0d4978645b3d1c6d7447855

  • SHA1

    4a2417e0ec9d5fe4ad031c085468a42db01f9cdd

  • SHA256

    aaabdb1c19000555691476d0e84fee88edae1055fc779f65accbd8bb66e468c8

  • SHA512

    219d9aa576d397b67067a399b261b483e16f279810edfcdf2ee8d17a9222758bdb73fef73cad4d95e73a326e2bdc4cb338409192f4a18962d8c88db88b17b4ad

  • SSDEEP

    3072:nGd5SXclHLA217rTPrU3Ri7nALg36Go859WtgvrBzFT:Gd5Xh3TYhi/oCDT

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Sality

    Sality is backdoor written in C++, first discovered in 2003.

  • Sality family
  • UAC bypass 3 TTPs 1 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Disables Task Manager via registry modification
  • Executes dropped EXE 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • UPX packed file 13 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Drops file in Windows directory 1 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 55 IoCs
  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 46 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Windows\system32\fontdrvhost.exe
    "fontdrvhost.exe"
    1⤵
      PID:780
    • C:\Windows\system32\fontdrvhost.exe
      "fontdrvhost.exe"
      1⤵
        PID:788
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        1⤵
          PID:316
        • C:\Windows\system32\sihost.exe
          sihost.exe
          1⤵
            PID:2860
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
            1⤵
              PID:2936
            • C:\Windows\system32\taskhostw.exe
              taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
              1⤵
                PID:2988
              • C:\Windows\Explorer.EXE
                C:\Windows\Explorer.EXE
                1⤵
                  PID:3380
                  • C:\Windows\system32\rundll32.exe
                    rundll32.exe C:\Users\Admin\AppData\Local\Temp\9137c16cb0d4978645b3d1c6d7447855_JaffaCakes118.dll,#1
                    2⤵
                    • Suspicious use of WriteProcessMemory
                    PID:1916
                    • C:\Windows\SysWOW64\rundll32.exe
                      rundll32.exe C:\Users\Admin\AppData\Local\Temp\9137c16cb0d4978645b3d1c6d7447855_JaffaCakes118.dll,#1
                      3⤵
                      • Drops file in System32 directory
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of WriteProcessMemory
                      PID:2756
                      • C:\Windows\SysWOW64\rundll32mgr.exe
                        C:\Windows\SysWOW64\rundll32mgr.exe
                        4⤵
                        • UAC bypass
                        • Disables RegEdit via registry modification
                        • Executes dropped EXE
                        • Checks whether UAC is enabled
                        • Drops file in Program Files directory
                        • Drops file in Windows directory
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of UnmapMainImage
                        • Suspicious use of WriteProcessMemory
                        • System policy modification
                        PID:4196
                        • C:\Program Files (x86)\Microsoft\WaterMark.exe
                          "C:\Program Files (x86)\Microsoft\WaterMark.exe"
                          5⤵
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of UnmapMainImage
                          • Suspicious use of WriteProcessMemory
                          PID:3144
                          • C:\Windows\SysWOW64\svchost.exe
                            C:\Windows\system32\svchost.exe
                            6⤵
                              PID:4956
                            • C:\Program Files\Internet Explorer\iexplore.exe
                              "C:\Program Files\Internet Explorer\iexplore.exe"
                              6⤵
                              • Modifies Internet Explorer settings
                              • Suspicious use of FindShellTrayWindow
                              • Suspicious use of SetWindowsHookEx
                              • Suspicious use of WriteProcessMemory
                              PID:1532
                              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1532 CREDAT:17410 /prefetch:2
                                7⤵
                                • System Location Discovery: System Language Discovery
                                • Modifies Internet Explorer settings
                                • Suspicious use of SetWindowsHookEx
                                PID:8
                            • C:\Program Files\Internet Explorer\iexplore.exe
                              "C:\Program Files\Internet Explorer\iexplore.exe"
                              6⤵
                              • Modifies Internet Explorer settings
                              • Suspicious use of FindShellTrayWindow
                              • Suspicious use of SetWindowsHookEx
                              • Suspicious use of WriteProcessMemory
                              PID:4208
                              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4208 CREDAT:17410 /prefetch:2
                                7⤵
                                • System Location Discovery: System Language Discovery
                                • Modifies Internet Explorer settings
                                • Suspicious use of SetWindowsHookEx
                                PID:224
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 2756 -s 608
                          4⤵
                          • Program crash
                          PID:1516
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                    1⤵
                      PID:3536
                    • C:\Windows\system32\DllHost.exe
                      C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                      1⤵
                        PID:3736
                      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                        1⤵
                          PID:3832
                        • C:\Windows\System32\RuntimeBroker.exe
                          C:\Windows\System32\RuntimeBroker.exe -Embedding
                          1⤵
                            PID:3908
                          • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                            "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                            1⤵
                              PID:3992
                            • C:\Windows\System32\RuntimeBroker.exe
                              C:\Windows\System32\RuntimeBroker.exe -Embedding
                              1⤵
                                PID:4176
                              • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe
                                "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca
                                1⤵
                                  PID:372
                                • C:\Windows\System32\RuntimeBroker.exe
                                  C:\Windows\System32\RuntimeBroker.exe -Embedding
                                  1⤵
                                    PID:3624
                                  • C:\Windows\system32\backgroundTaskHost.exe
                                    "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
                                    1⤵
                                      PID:3268
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2756 -ip 2756
                                      1⤵
                                        PID:5076

                                      Network

                                      MITRE ATT&CK Enterprise v15

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

                                        Filesize

                                        471B

                                        MD5

                                        7fecd001d472e28495336306d3e0b570

                                        SHA1

                                        7dabf5687a11d1d8f92f8ffd348fb73bf077e960

                                        SHA256

                                        d3b1b54dfa02ea5cf017cd692023d382defa55e40749816bbddcc3e8ef5e9bff

                                        SHA512

                                        5255e2e7897f3abc246464dacea7d32b54a8bdb88806e9d0f54a3d23e76074e2a88adaa35789c32b68d0ca8d6f67726c9ceec31597f3b05628b29cd52af613db

                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

                                        Filesize

                                        404B

                                        MD5

                                        b8bdfd28b1b89bc2c0c6cc8fb4b40d77

                                        SHA1

                                        8282ce19237e1ddcb26d7e381c8552d8694632c1

                                        SHA256

                                        d18f8bca2c5632d2fcadb9cb5f105ec99afac02c591cab41a05034e189b806f9

                                        SHA512

                                        93a215ce1b1be474cd6977923be2e78c3f602e9bb7a12842519a293aaa77630fece87cf6f86f5667bab0084eda587a605e26c9638fcf3f809cb7947fb6e1fc5c

                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

                                        Filesize

                                        404B

                                        MD5

                                        b7862651603928ebbb4a447649ab1ef9

                                        SHA1

                                        3caecb2112098d641e1c73c05ce65aebb4d43106

                                        SHA256

                                        5359d424eed1ac4d883f905abd0ab28b5befae6831b985c668e2d570a7d064e2

                                        SHA512

                                        7fcc1b72e6f351500600fee6ed913bf10765ef5f187ebfbe9bd4f04955b1bee1c4b587537384fdac1420fe4aaca0e4d87f927e1b467d93f679e898b87728e685

                                      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{BAFE7233-A9F0-11EF-91C3-DA61A5E71E4E}.dat

                                        Filesize

                                        5KB

                                        MD5

                                        fd619a06fe61d80243e63c4d59118920

                                        SHA1

                                        bde219b5b7a763061392c676ed1c768c7cdf0b55

                                        SHA256

                                        aa5c5478edba4fed270a9ee4f5e874d58829f7aceba3def0d2383a8828621e2b

                                        SHA512

                                        d1a2491ea3a007501c2c38bda98fce70e1282744c16c225ceeb8d72eaf34a5392a6f161ed1b56b65b2052efa37186e1cedfbd6b83e682bb7fba6e8b4050950e5

                                      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{BB00D407-A9F0-11EF-91C3-DA61A5E71E4E}.dat

                                        Filesize

                                        3KB

                                        MD5

                                        ff2aaa2c1cf8685d1208fe782c952f34

                                        SHA1

                                        032751d4066cf838b712aab8ecac2c1b2fcaa353

                                        SHA256

                                        75d583ebd6784dca53b8514c8100bac100851e1eeaa4c1c9b21650806fa2de68

                                        SHA512

                                        98ad762f776f2f8a8938678cbdc284300edbe750b7a99e34ea8a622013f14e9923d583277e2ef0ad1c00b7fe7f821d9b3a915c5c3d802817c844dcdea167f0d6

                                      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\VersionManager\ver1A0C.tmp

                                        Filesize

                                        15KB

                                        MD5

                                        1a545d0052b581fbb2ab4c52133846bc

                                        SHA1

                                        62f3266a9b9925cd6d98658b92adec673cbe3dd3

                                        SHA256

                                        557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1

                                        SHA512

                                        bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d

                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\XH3Z2ZON\suggestions[1].en-US

                                        Filesize

                                        17KB

                                        MD5

                                        5a34cb996293fde2cb7a4ac89587393a

                                        SHA1

                                        3c96c993500690d1a77873cd62bc639b3a10653f

                                        SHA256

                                        c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

                                        SHA512

                                        e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

                                      • C:\Windows\SysWOW64\rundll32mgr.exe

                                        Filesize

                                        187KB

                                        MD5

                                        27fdabf7c440551ce0d41832bb40e0e4

                                        SHA1

                                        c3a6f07789562c1edbea44197a3f6cb3f6d345c9

                                        SHA256

                                        52f26137f9a813c374e5bca7ae97f2f31c1f8084276944fdc5e97df7a69a86c4

                                        SHA512

                                        4c13cfe5ed6741933d83ba0af39bd9cc544033328fe015b5ec1f1eff358e54764814f60085c0b4528034e2e8ab2f94694e186b27d9e66e42e01391ba20f38df5

                                      • memory/2756-1-0x000000006D200000-0x000000006D238000-memory.dmp

                                        Filesize

                                        224KB

                                      • memory/2756-47-0x000000006D200000-0x000000006D238000-memory.dmp

                                        Filesize

                                        224KB

                                      • memory/2756-22-0x0000000002600000-0x0000000002602000-memory.dmp

                                        Filesize

                                        8KB

                                      • memory/3144-52-0x0000000000400000-0x0000000000421000-memory.dmp

                                        Filesize

                                        132KB

                                      • memory/3144-49-0x0000000077392000-0x0000000077393000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/3144-44-0x0000000077392000-0x0000000077393000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/3144-43-0x0000000000400000-0x0000000000421000-memory.dmp

                                        Filesize

                                        132KB

                                      • memory/3144-42-0x0000000000060000-0x0000000000061000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/3144-48-0x0000000000070000-0x0000000000071000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/3144-39-0x0000000000400000-0x000000000043F000-memory.dmp

                                        Filesize

                                        252KB

                                      • memory/4196-12-0x0000000000400000-0x0000000000421000-memory.dmp

                                        Filesize

                                        132KB

                                      • memory/4196-24-0x0000000000400000-0x0000000000421000-memory.dmp

                                        Filesize

                                        132KB

                                      • memory/4196-18-0x0000000000400000-0x0000000000421000-memory.dmp

                                        Filesize

                                        132KB

                                      • memory/4196-38-0x0000000000401000-0x0000000000405000-memory.dmp

                                        Filesize

                                        16KB

                                      • memory/4196-31-0x0000000003280000-0x00000000042B0000-memory.dmp

                                        Filesize

                                        16.2MB

                                      • memory/4196-32-0x00000000001E0000-0x00000000001E1000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/4196-16-0x0000000003280000-0x00000000042B0000-memory.dmp

                                        Filesize

                                        16.2MB

                                      • memory/4196-6-0x0000000003280000-0x00000000042B0000-memory.dmp

                                        Filesize

                                        16.2MB

                                      • memory/4196-11-0x0000000000400000-0x0000000000421000-memory.dmp

                                        Filesize

                                        132KB

                                      • memory/4196-13-0x0000000000400000-0x0000000000421000-memory.dmp

                                        Filesize

                                        132KB

                                      • memory/4196-14-0x0000000000400000-0x0000000000421000-memory.dmp

                                        Filesize

                                        132KB

                                      • memory/4196-19-0x0000000000400000-0x0000000000421000-memory.dmp

                                        Filesize

                                        132KB

                                      • memory/4196-8-0x0000000003280000-0x00000000042B0000-memory.dmp

                                        Filesize

                                        16.2MB

                                      • memory/4196-5-0x0000000000400000-0x000000000043F000-memory.dmp

                                        Filesize

                                        252KB