Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-12-2024 19:05
Behavioral task
behavioral1
Sample
db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe
-
Size
326KB
-
MD5
db17cba3c696f7cd8c3b9bb16bbc303f
-
SHA1
da3dd87afb7ea399cd54a36f91658a4f6d390615
-
SHA256
19cd856e41e9b6986e9d416970b424b5eb953c92ed814d7973699e7d9591c2b9
-
SHA512
ae13871042400b4966c5f9d56e867622ab3434e244d1ef15c42146030cc4f0ec3049a37a0ef0adf63327f896ca8fd7fef0bb8825f5ed7e04fe52d0cf049bfde5
-
SSDEEP
6144:luMJWY+qaHEQCcYfSBYJbQCjRcqESEgm6Anhc1kG6EFjBfvS17CLbd5L4yS:l+YcUc6SBLLTSEgBAnhc1kG/hvIC/7L4
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe IEXPLOREi.exe" db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe -
Sality family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\system\DisableRegistryTools = "1" db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe -
Disables Task Manager via registry modification
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 5008 netsh.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Yahoo Messengger = "C:\\Windows\\system32\\IEXPLOREi.exe" db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\i: db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe File opened (read-only) \??\j: db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe File opened (read-only) \??\n: db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe File opened (read-only) \??\y: db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe File opened (read-only) \??\e: db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe File opened (read-only) \??\o: db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe File opened (read-only) \??\q: db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe File opened (read-only) \??\s: db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe File opened (read-only) \??\v: db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe File opened (read-only) \??\w: db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe File opened (read-only) \??\x: db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe File opened (read-only) \??\m: db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe File opened (read-only) \??\b: db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe File opened (read-only) \??\l: db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe File opened (read-only) \??\p: db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe File opened (read-only) \??\r: db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe File opened (read-only) \??\t: db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe File opened (read-only) \??\a: db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe File opened (read-only) \??\h: db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe File opened (read-only) \??\k: db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe File opened (read-only) \??\u: db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe File opened (read-only) \??\z: db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe File opened (read-only) \??\g: db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe -
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/2396-40-0x0000000000400000-0x00000000004AA000-memory.dmp autoit_exe behavioral2/memory/2396-52-0x0000000000400000-0x00000000004AA000-memory.dmp autoit_exe behavioral2/memory/2396-69-0x0000000000400000-0x00000000004AA000-memory.dmp autoit_exe -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\IEXPLOREi.exe db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe File created C:\Windows\SysWOW64\WORD.exe db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\WORD.exe db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\autorun.ini db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe File opened for modification C:\WINDOWS\SysWOW64\IEXPLOREI.EXE db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe File created C:\Windows\SysWOW64\IEXPLOREi.exe db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/2396-0-0x0000000000400000-0x00000000004AA000-memory.dmp upx behavioral2/memory/2396-1-0x00000000033B0000-0x00000000043E3000-memory.dmp upx behavioral2/memory/2396-3-0x00000000033B0000-0x00000000043E3000-memory.dmp upx behavioral2/memory/2396-5-0x00000000033B0000-0x00000000043E3000-memory.dmp upx behavioral2/files/0x000a000000023b6d-20.dat upx behavioral2/memory/2396-29-0x00000000033B0000-0x00000000043E3000-memory.dmp upx behavioral2/memory/2396-34-0x00000000033B0000-0x00000000043E3000-memory.dmp upx behavioral2/memory/2396-40-0x0000000000400000-0x00000000004AA000-memory.dmp upx behavioral2/memory/2396-49-0x00000000033B0000-0x00000000043E3000-memory.dmp upx behavioral2/memory/2396-52-0x0000000000400000-0x00000000004AA000-memory.dmp upx behavioral2/memory/2396-55-0x00000000033B0000-0x00000000043E3000-memory.dmp upx behavioral2/memory/2396-59-0x00000000033B0000-0x00000000043E3000-memory.dmp upx behavioral2/memory/2396-69-0x0000000000400000-0x00000000004AA000-memory.dmp upx behavioral2/memory/2396-80-0x00000000033B0000-0x00000000043E3000-memory.dmp upx -
Drops file in Program Files directory 11 IoCs
description ioc Process File opened for modification C:\PROGRAM FILES\7-ZIP\Uninstall.exe db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\MavInject32.exe db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7z.exe db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7zFM.exe db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7zG.exe db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\appvcleaner.exe db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\AppVShNotify.exe db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\InspectorOfficeGadget.exe db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\IntegratedOffice.exe db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\OfficeC2RClient.exe db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\OfficeClickToRun.exe db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\IEXPLOREi.exe db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe File opened for modification C:\Windows\SYSTEM.INI db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe File created C:\Windows\IEXPLOREi.exe db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 56 IoCs
pid Process 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe Token: SeDebugPrivilege 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe Token: SeDebugPrivilege 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe Token: SeDebugPrivilege 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe Token: SeDebugPrivilege 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe Token: SeDebugPrivilege 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe Token: SeDebugPrivilege 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe Token: SeDebugPrivilege 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe Token: SeDebugPrivilege 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe Token: SeDebugPrivilege 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe Token: SeDebugPrivilege 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe Token: SeDebugPrivilege 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe Token: SeDebugPrivilege 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe Token: SeDebugPrivilege 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe Token: SeDebugPrivilege 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe Token: SeDebugPrivilege 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe Token: SeDebugPrivilege 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe Token: SeDebugPrivilege 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe Token: SeDebugPrivilege 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe Token: SeDebugPrivilege 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe Token: SeDebugPrivilege 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe Token: SeDebugPrivilege 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe Token: SeDebugPrivilege 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe Token: SeDebugPrivilege 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe Token: SeDebugPrivilege 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe Token: SeDebugPrivilege 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe Token: SeDebugPrivilege 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe Token: SeDebugPrivilege 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe Token: SeDebugPrivilege 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe Token: SeDebugPrivilege 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe Token: SeDebugPrivilege 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe Token: SeDebugPrivilege 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe Token: SeDebugPrivilege 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe Token: SeDebugPrivilege 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe Token: SeDebugPrivilege 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe Token: SeDebugPrivilege 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe Token: SeDebugPrivilege 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe Token: SeDebugPrivilege 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe Token: SeDebugPrivilege 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe Token: SeDebugPrivilege 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe Token: SeDebugPrivilege 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe Token: SeDebugPrivilege 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe Token: SeDebugPrivilege 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe Token: SeDebugPrivilege 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe Token: SeDebugPrivilege 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe Token: SeDebugPrivilege 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe Token: SeDebugPrivilege 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe Token: SeDebugPrivilege 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe Token: SeDebugPrivilege 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe Token: SeDebugPrivilege 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe Token: SeDebugPrivilege 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe Token: SeDebugPrivilege 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe Token: SeDebugPrivilege 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe Token: SeDebugPrivilege 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe Token: SeDebugPrivilege 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe Token: SeDebugPrivilege 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe Token: SeDebugPrivilege 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe Token: SeDebugPrivilege 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe Token: SeDebugPrivilege 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe Token: SeDebugPrivilege 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe Token: SeDebugPrivilege 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe Token: SeDebugPrivilege 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe Token: SeDebugPrivilege 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe Token: SeDebugPrivilege 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2396 wrote to memory of 5008 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 82 PID 2396 wrote to memory of 5008 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 82 PID 2396 wrote to memory of 5008 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 82 PID 2396 wrote to memory of 764 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 8 PID 2396 wrote to memory of 772 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 9 PID 2396 wrote to memory of 384 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 13 PID 2396 wrote to memory of 2424 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 42 PID 2396 wrote to memory of 2432 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 43 PID 2396 wrote to memory of 2684 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 47 PID 2396 wrote to memory of 3524 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 56 PID 2396 wrote to memory of 3644 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 57 PID 2396 wrote to memory of 3820 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 58 PID 2396 wrote to memory of 3916 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 59 PID 2396 wrote to memory of 3976 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 60 PID 2396 wrote to memory of 4056 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 61 PID 2396 wrote to memory of 4144 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 62 PID 2396 wrote to memory of 4296 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 75 PID 2396 wrote to memory of 4772 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 76 PID 2396 wrote to memory of 5008 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 82 PID 2396 wrote to memory of 5008 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 82 PID 2396 wrote to memory of 2916 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 84 PID 2396 wrote to memory of 2916 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 84 PID 2396 wrote to memory of 2916 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 84 PID 2916 wrote to memory of 4900 2916 cmd.exe 86 PID 2916 wrote to memory of 4900 2916 cmd.exe 86 PID 2916 wrote to memory of 4900 2916 cmd.exe 86 PID 2396 wrote to memory of 4436 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 87 PID 2396 wrote to memory of 4436 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 87 PID 2396 wrote to memory of 4436 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 87 PID 4436 wrote to memory of 4316 4436 cmd.exe 89 PID 4436 wrote to memory of 4316 4436 cmd.exe 89 PID 4436 wrote to memory of 4316 4436 cmd.exe 89 PID 2396 wrote to memory of 764 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 8 PID 2396 wrote to memory of 772 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 9 PID 2396 wrote to memory of 384 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 13 PID 2396 wrote to memory of 2424 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 42 PID 2396 wrote to memory of 2432 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 43 PID 2396 wrote to memory of 3524 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 56 PID 2396 wrote to memory of 3644 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 57 PID 2396 wrote to memory of 3820 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 58 PID 2396 wrote to memory of 3916 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 59 PID 2396 wrote to memory of 3976 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 60 PID 2396 wrote to memory of 4056 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 61 PID 2396 wrote to memory of 4144 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 62 PID 2396 wrote to memory of 4296 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 75 PID 2396 wrote to memory of 4772 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 76 PID 2396 wrote to memory of 764 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 8 PID 2396 wrote to memory of 772 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 9 PID 2396 wrote to memory of 384 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 13 PID 2396 wrote to memory of 2424 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 42 PID 2396 wrote to memory of 2432 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 43 PID 2396 wrote to memory of 3524 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 56 PID 2396 wrote to memory of 3644 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 57 PID 2396 wrote to memory of 3820 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 58 PID 2396 wrote to memory of 3916 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 59 PID 2396 wrote to memory of 3976 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 60 PID 2396 wrote to memory of 4056 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 61 PID 2396 wrote to memory of 4144 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 62 PID 2396 wrote to memory of 4296 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 75 PID 2396 wrote to memory of 4772 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 76 PID 2396 wrote to memory of 4192 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 97 PID 2396 wrote to memory of 4192 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 97 PID 2396 wrote to memory of 4192 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 97 PID 2396 wrote to memory of 4192 2396 db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe 97 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe
Processes
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:764
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:772
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵PID:384
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2424
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2432
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2684
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3524
-
C:\Users\Admin\AppData\Local\Temp\db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\db17cba3c696f7cd8c3b9bb16bbc303f_JaffaCakes118.exe"2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Windows security bypass
- Disables RegEdit via registry modification
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2396 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode disable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:5008
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C AT /delete /yes3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\SysWOW64\at.exeAT /delete /yes4⤵
- System Location Discovery: System Language Discovery
PID:4900
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C AT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\WORD.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Windows\SysWOW64\at.exeAT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\WORD.exe4⤵
- System Location Discovery: System Language Discovery
PID:4316
-
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE"3⤵
- System Location Discovery: System Language Discovery
PID:4192
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE"3⤵
- System Location Discovery: System Language Discovery
PID:4544
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE"3⤵
- System Location Discovery: System Language Discovery
PID:1380
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE"3⤵PID:4912
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3644
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3820
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3916
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3976
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:4056
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4144
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵PID:4296
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4772
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
326KB
MD5db17cba3c696f7cd8c3b9bb16bbc303f
SHA1da3dd87afb7ea399cd54a36f91658a4f6d390615
SHA25619cd856e41e9b6986e9d416970b424b5eb953c92ed814d7973699e7d9591c2b9
SHA512ae13871042400b4966c5f9d56e867622ab3434e244d1ef15c42146030cc4f0ec3049a37a0ef0adf63327f896ca8fd7fef0bb8825f5ed7e04fe52d0cf049bfde5