Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-12-2024 12:44
Static task
static1
Behavioral task
behavioral1
Sample
d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe
-
Size
311KB
-
MD5
d28274894da19ccbcad3a2ed93da481d
-
SHA1
911a426e6f31e139f14fca3ef39ee58777d00746
-
SHA256
a6bcf7096614b005b4a76df83fa07953cab1a342a245ccd58eab72bdc0f7b6dd
-
SHA512
5049fe6027bf1c86988439fcce9107abc00794018d1c53f26c5ed9e8e0da84755a5485de754e4f98f2470f9871cbfacf9533f3de10779a44f2ce848be494c511
-
SSDEEP
6144:sTfFDbRnOTWbaRGm4vUW+t82MmRu+F2+UVm3Ar8QsVgbomacS0:+5O6m4vo7DU9oQB6cB
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Signatures
-
Modifies firewall policy service 3 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe -
Sality family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 2532 ssec.exe 2964 ssec.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2532 set thread context of 2964 2532 ssec.exe 31 -
resource yara_rule behavioral1/memory/2688-3-0x0000000001D80000-0x0000000002E0E000-memory.dmp upx behavioral1/memory/2688-5-0x0000000001D80000-0x0000000002E0E000-memory.dmp upx behavioral1/memory/2688-6-0x0000000001D80000-0x0000000002E0E000-memory.dmp upx behavioral1/memory/2688-44-0x0000000001D80000-0x0000000002E0E000-memory.dmp upx behavioral1/memory/2688-4-0x0000000001D80000-0x0000000002E0E000-memory.dmp upx behavioral1/memory/2688-13-0x0000000001D80000-0x0000000002E0E000-memory.dmp upx behavioral1/memory/2688-9-0x0000000001D80000-0x0000000002E0E000-memory.dmp upx behavioral1/memory/2688-8-0x0000000001D80000-0x0000000002E0E000-memory.dmp upx behavioral1/memory/2688-7-0x0000000001D80000-0x0000000002E0E000-memory.dmp upx behavioral1/memory/2688-28-0x0000000001D80000-0x0000000002E0E000-memory.dmp upx -
Drops file in Windows directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SYSTEM.INI d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe File created C:\Windows\__tmp_rar_sfx_access_check_259454841 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe File created C:\Windows\ssec.exe d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe File opened for modification C:\Windows\ssec.exe d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe File created C:\Windows\a.jpg d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe File opened for modification C:\Windows\a.jpg d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe File opened for modification C:\Windows\ssec.exe ssec.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ssec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ssec.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2688 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe 2964 ssec.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeDebugPrivilege 2688 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 2688 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 2688 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 2688 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 2688 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 2688 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 2688 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 2688 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 2688 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 2688 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 2688 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 2688 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 2688 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 2688 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 2688 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 2688 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 2688 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 2688 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 2688 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 2688 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 2688 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe Token: SeDebugPrivilege 2688 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2532 ssec.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2688 wrote to memory of 1100 2688 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe 19 PID 2688 wrote to memory of 1156 2688 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe 20 PID 2688 wrote to memory of 1196 2688 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe 21 PID 2688 wrote to memory of 1292 2688 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe 23 PID 2688 wrote to memory of 2532 2688 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe 30 PID 2688 wrote to memory of 2532 2688 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe 30 PID 2688 wrote to memory of 2532 2688 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe 30 PID 2688 wrote to memory of 2532 2688 d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe 30 PID 2532 wrote to memory of 2964 2532 ssec.exe 31 PID 2532 wrote to memory of 2964 2532 ssec.exe 31 PID 2532 wrote to memory of 2964 2532 ssec.exe 31 PID 2532 wrote to memory of 2964 2532 ssec.exe 31 PID 2532 wrote to memory of 2964 2532 ssec.exe 31 PID 2532 wrote to memory of 2964 2532 ssec.exe 31 PID 2532 wrote to memory of 2964 2532 ssec.exe 31 PID 2532 wrote to memory of 2964 2532 ssec.exe 31 PID 2964 wrote to memory of 1196 2964 ssec.exe 21 PID 2964 wrote to memory of 1196 2964 ssec.exe 21 PID 2964 wrote to memory of 1196 2964 ssec.exe 21 PID 2964 wrote to memory of 1196 2964 ssec.exe 21 PID 2964 wrote to memory of 1196 2964 ssec.exe 21 PID 2964 wrote to memory of 1196 2964 ssec.exe 21 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1100
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1156
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2688 -
C:\Windows\ssec.exe"C:\Windows\ssec.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\ssec.exe
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2964
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1292
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
234KB
MD53bb386b07341490c2da019b0a8a6e637
SHA1ae0ae7bca4b25e90f086e025d919c8dd22064f9f
SHA256c45ed4da96f10b56577c54e3a40120812dccf7cb72cd791afdf29661e78b9f0d
SHA512939cc275f06dbb2f6a32af510593961c388197a8866352dd324bfc98fa600432f300835cc9bf34b1d7dae492f249c4c961d3c4c42f6891e9c40c085c0c4a1ae8
-
Filesize
163KB
MD5538b91459a3e9aa6a82eed1146d7552c
SHA1d5feea713bded87788c1f44f6f047af53837832c
SHA256183756c4db9f2188a215fb97d15542cc4ec7f3b44e5334ef248d7aae1a49a708
SHA5126c952e4a6cd2010fd668e1fc1335375f92562ecbd62adb2a7e50ebc2fb7982b8de5dbd67eec4d9425b43e2cd53ff62e2402f16a05d0875c4d56d4aa0a8899336