Overview
overview
10Static
static
3ec534b1e47...18.exe
windows7-x64
10ec534b1e47...18.exe
windows10-2004-x64
10$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...fo.dll
windows7-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3$PLUGINSDI...ss.dll
windows7-x64
3$PLUGINSDI...ss.dll
windows10-2004-x64
3$PLUGINSDIR/uac.dll
windows7-x64
3$PLUGINSDIR/uac.dll
windows10-2004-x64
3Analysis
-
max time kernel
95s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-12-2024 16:10
Static task
static1
Behavioral task
behavioral1
Sample
ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/uac.dll
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/uac.dll
Resource
win10v2004-20241007-en
General
-
Target
ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe
-
Size
255KB
-
MD5
ec534b1e4735cb1a5e433744f7d9afdc
-
SHA1
315308e5c59147874ccf2fb715e7687b34a18a2a
-
SHA256
deac8cda8716240891de34bbe884d239f10925955332be0a0507d247b076974f
-
SHA512
02dae880c2a56714290674f48cd1985c7fd11791afc31a33dc2ef6fa9a6c20c443228779c030601c05240d001f83d5dd59ce644c36564b2843bb8fb779819887
-
SSDEEP
6144:nmnIZJPXS3HF8ZJWGZ/f3rqqhVxnGMV+5T0OT5B1P0m:nmnwJP+HF8bWGZ/fbqQ/nxV+5T0O9B11
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Signatures
-
Modifies firewall policy service 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" Au_.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" Au_.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" Au_.exe -
Sality family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Au_.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" Au_.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" Au_.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" Au_.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" Au_.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" Au_.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" Au_.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2796 Au_.exe -
Loads dropped DLL 9 IoCs
pid Process 2796 Au_.exe 2796 Au_.exe 2796 Au_.exe 2796 Au_.exe 2796 Au_.exe 2796 Au_.exe 2796 Au_.exe 2796 Au_.exe 2796 Au_.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc Au_.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" Au_.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" Au_.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" Au_.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" Au_.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" Au_.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" Au_.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Au_.exe -
resource yara_rule behavioral2/memory/4760-3-0x0000000002510000-0x000000000359E000-memory.dmp upx behavioral2/memory/4760-6-0x0000000002510000-0x000000000359E000-memory.dmp upx behavioral2/memory/4760-5-0x0000000002510000-0x000000000359E000-memory.dmp upx behavioral2/memory/4760-4-0x0000000002510000-0x000000000359E000-memory.dmp upx behavioral2/memory/4760-7-0x0000000002510000-0x000000000359E000-memory.dmp upx behavioral2/memory/4760-11-0x0000000002510000-0x000000000359E000-memory.dmp upx behavioral2/memory/4760-26-0x0000000002510000-0x000000000359E000-memory.dmp upx behavioral2/memory/2796-148-0x0000000005190000-0x000000000621E000-memory.dmp upx behavioral2/memory/2796-149-0x0000000005190000-0x000000000621E000-memory.dmp upx behavioral2/memory/2796-155-0x0000000005190000-0x000000000621E000-memory.dmp upx behavioral2/memory/2796-154-0x0000000005190000-0x000000000621E000-memory.dmp upx behavioral2/memory/2796-153-0x0000000005190000-0x000000000621E000-memory.dmp upx behavioral2/memory/2796-156-0x0000000005190000-0x000000000621E000-memory.dmp upx behavioral2/memory/2796-147-0x0000000005190000-0x000000000621E000-memory.dmp upx behavioral2/memory/2796-145-0x0000000005190000-0x000000000621E000-memory.dmp upx behavioral2/memory/2796-146-0x0000000005190000-0x000000000621E000-memory.dmp upx behavioral2/memory/2796-159-0x0000000005190000-0x000000000621E000-memory.dmp upx behavioral2/memory/2796-160-0x0000000005190000-0x000000000621E000-memory.dmp upx behavioral2/memory/2796-161-0x0000000005190000-0x000000000621E000-memory.dmp upx behavioral2/memory/2796-192-0x0000000005190000-0x000000000621E000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SYSTEM.INI ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Au_.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe 2796 Au_.exe 2796 Au_.exe 2796 Au_.exe 2796 Au_.exe 2796 Au_.exe 2796 Au_.exe 2796 Au_.exe 2796 Au_.exe 2796 Au_.exe 2796 Au_.exe 2796 Au_.exe 2796 Au_.exe 2796 Au_.exe 2796 Au_.exe 2796 Au_.exe 2796 Au_.exe 2796 Au_.exe 2796 Au_.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Token: SeDebugPrivilege 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Token: SeDebugPrivilege 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Token: SeDebugPrivilege 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Token: SeDebugPrivilege 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Token: SeDebugPrivilege 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Token: SeDebugPrivilege 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Token: SeDebugPrivilege 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Token: SeDebugPrivilege 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Token: SeDebugPrivilege 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Token: SeDebugPrivilege 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Token: SeDebugPrivilege 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Token: SeDebugPrivilege 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Token: SeDebugPrivilege 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Token: SeDebugPrivilege 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Token: SeDebugPrivilege 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Token: SeDebugPrivilege 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Token: SeDebugPrivilege 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Token: SeDebugPrivilege 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Token: SeDebugPrivilege 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Token: SeDebugPrivilege 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Token: SeDebugPrivilege 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Token: SeDebugPrivilege 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Token: SeDebugPrivilege 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Token: SeDebugPrivilege 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Token: SeDebugPrivilege 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Token: SeDebugPrivilege 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Token: SeDebugPrivilege 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Token: SeDebugPrivilege 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Token: SeDebugPrivilege 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Token: SeDebugPrivilege 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Token: SeDebugPrivilege 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Token: SeDebugPrivilege 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Token: SeDebugPrivilege 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Token: SeDebugPrivilege 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Token: SeDebugPrivilege 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Token: SeDebugPrivilege 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Token: SeDebugPrivilege 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Token: SeDebugPrivilege 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Token: SeDebugPrivilege 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Token: SeDebugPrivilege 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Token: SeDebugPrivilege 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Token: SeDebugPrivilege 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Token: SeDebugPrivilege 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Token: SeDebugPrivilege 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Token: SeDebugPrivilege 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Token: SeDebugPrivilege 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Token: SeDebugPrivilege 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Token: SeDebugPrivilege 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Token: SeDebugPrivilege 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Token: SeDebugPrivilege 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Token: SeDebugPrivilege 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Token: SeDebugPrivilege 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Token: SeDebugPrivilege 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Token: SeDebugPrivilege 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Token: SeDebugPrivilege 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Token: SeDebugPrivilege 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Token: SeDebugPrivilege 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Token: SeDebugPrivilege 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Token: SeDebugPrivilege 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Token: SeDebugPrivilege 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Token: SeDebugPrivilege 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Token: SeDebugPrivilege 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Token: SeDebugPrivilege 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 4760 wrote to memory of 764 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe 8 PID 4760 wrote to memory of 772 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe 9 PID 4760 wrote to memory of 384 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe 13 PID 4760 wrote to memory of 2424 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe 42 PID 4760 wrote to memory of 2432 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe 43 PID 4760 wrote to memory of 2684 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe 47 PID 4760 wrote to memory of 3524 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe 56 PID 4760 wrote to memory of 3644 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe 57 PID 4760 wrote to memory of 3820 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe 58 PID 4760 wrote to memory of 3916 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe 59 PID 4760 wrote to memory of 3976 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe 60 PID 4760 wrote to memory of 4056 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe 61 PID 4760 wrote to memory of 4144 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe 62 PID 4760 wrote to memory of 4296 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe 75 PID 4760 wrote to memory of 4772 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe 76 PID 4760 wrote to memory of 2796 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe 82 PID 4760 wrote to memory of 2796 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe 82 PID 4760 wrote to memory of 2796 4760 ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe 82 PID 2796 wrote to memory of 764 2796 Au_.exe 8 PID 2796 wrote to memory of 772 2796 Au_.exe 9 PID 2796 wrote to memory of 384 2796 Au_.exe 13 PID 2796 wrote to memory of 2424 2796 Au_.exe 42 PID 2796 wrote to memory of 2432 2796 Au_.exe 43 PID 2796 wrote to memory of 2684 2796 Au_.exe 47 PID 2796 wrote to memory of 3524 2796 Au_.exe 56 PID 2796 wrote to memory of 3644 2796 Au_.exe 57 PID 2796 wrote to memory of 3820 2796 Au_.exe 58 PID 2796 wrote to memory of 3916 2796 Au_.exe 59 PID 2796 wrote to memory of 3976 2796 Au_.exe 60 PID 2796 wrote to memory of 4056 2796 Au_.exe 61 PID 2796 wrote to memory of 4144 2796 Au_.exe 62 PID 2796 wrote to memory of 4296 2796 Au_.exe 75 PID 2796 wrote to memory of 4772 2796 Au_.exe 76 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Au_.exe
Processes
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:764
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:772
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵PID:384
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2424
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2432
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2684
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3524
-
C:\Users\Admin\AppData\Local\Temp\ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ec534b1e4735cb1a5e433744f7d9afdc_JaffaCakes118.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4760 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\3⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2796
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3644
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3820
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3916
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3976
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:4056
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4144
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵PID:4296
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4772
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
187KB
MD567c2e58c28f913b0b3a298a5388ada76
SHA10097c9789638a57eeab2ff13d0b4d3b1d469ed1b
SHA2564a646549c9e3f593502ff76fefec5f1c0284de1dfdb6aff3351d2ef534f47582
SHA5120cfe8913455801c8fee72a8f0d8e6775e803c879c156b0aa0a3dc55b400490373e65f80e60aaf745c31f29a284cdb481906220f89b5ef9cdb9183c4e43eee40a
-
Filesize
15KB
MD567d8f4d5acdb722e9cb7a99570b3ded1
SHA1f4a729ba77332325ea4dbdeea98b579f501fd26f
SHA256fa8de036b1d9bb06be383a82041966c73473fc8382d041fb5c1758f991afeae7
SHA51203999cc26a76b0de6f7e4e8a45137ee4d9c250366ac5a458110f00f7962158311eea5f22d3ee4f32f85aa6969eb143bdb8f03ca989568764ed2bc488c89b4b7f
-
Filesize
11KB
MD5959ea64598b9a3e494c00e8fa793be7e
SHA140f284a3b92c2f04b1038def79579d4b3d066ee0
SHA25603cd57ab00236c753e7ddeee8ee1c10839ace7c426769982365531042e1f6f8b
SHA5125e765e090f712beffce40c5264674f430b08719940d66e3a4d4a516fd4ade859f7853f614d9d6bbb602780de54e11110d66dbb0f9ca20ef6096ede531f9f6d64
-
Filesize
4KB
MD5d16e06c5de8fb8213a0464568ed9852f
SHA1d063690dc0d2c824f714acb5c4bcede3aa193f03
SHA256728472ba312ae8af7f30d758ab473e0772477a68fcd1d2d547dafe6d8800d531
SHA51260502bb65d91a1a895f38bd0f070738152af58ffa4ac80bac3954aa8aad9fda9666e773988cbd00ce4741d2454bf5f2e0474ce8ea18cfe863ec4c36d09d1e27a
-
Filesize
868B
MD596f72aab0bb600d1559f9826e5c954f0
SHA126a244848edd8a4e5614e28fea12699dcea53b7f
SHA256f04307654ee71e1d6a779bd86b5f1fd3dfd89dacb944ba82b12d6f45d4d543fd
SHA512ee5f36187624e8975e1b0366fc220fa42a2a4a0b0bda6ef338c6b86af8ee7594c8425bcbc4d12cd2c14a693d11d30a0ff250a7043edc0733e355ee22ce144089
-
Filesize
84KB
MD5fae3be7a9827eaa3ef9f43832805e110
SHA10888a3ed318f17bf39e3c9af5848c965551b31a5
SHA25665aac0490feb6cb70ef76b39d3f08f61172dfce998fecf56a25c3f10d5c754a7
SHA51239d0496614a390c2e97636bd1d252c3cba8c0c28a7245f631cc7b7195bfe224cb176c97adbb92824df8db5e5340d5255171eabcac0da548385fed0d81578c6c2
-
Filesize
16KB
MD54e1c46e37af4b3ab0036cb1e85c81608
SHA18424a551d819cdae44d95a80af24a502d7e25ac1
SHA256468d24e632789e5d2e740bf7b084d72e4e3784ebc19d77dfe4b3d866bec8d789
SHA5129a2e140238bc6e4492cfcd022930b4facb3ca61d498febce949b36b526ef5ab434d94d0811bf958f572d1cf141b4411fa7950551244926a93d69b68d8fd33df6
-
Filesize
255KB
MD5ec534b1e4735cb1a5e433744f7d9afdc
SHA1315308e5c59147874ccf2fb715e7687b34a18a2a
SHA256deac8cda8716240891de34bbe884d239f10925955332be0a0507d247b076974f
SHA51202dae880c2a56714290674f48cd1985c7fd11791afc31a33dc2ef6fa9a6c20c443228779c030601c05240d001f83d5dd59ce644c36564b2843bb8fb779819887
-
Filesize
256B
MD5beb697dd92d9e88f4fcea1a53be1dd73
SHA12b41db4bcade86c767901069f535e8f73d02e6ba
SHA256ce91a312f7dc0dd5a9d27a23a94a7d94c874f98702b56f08a9a66f6180fa1146
SHA5124c95a4f2c5b302ab0bca25614a7625a77cac9c8c35254cd06d4f1d6f8257efcb67296eb2af8f69ab8ff73d4467618e6b855610ec4060dc5011b0c1bb67da2204