Analysis
-
max time kernel
134s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-12-2024 20:06
Static task
static1
Behavioral task
behavioral1
Sample
f58d57fefcff95ae50128b67c6c05126_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
f58d57fefcff95ae50128b67c6c05126_JaffaCakes118.exe
-
Size
229KB
-
MD5
f58d57fefcff95ae50128b67c6c05126
-
SHA1
495cb4b9e816e5c18fb1e1c5aa87dda20b11c2f4
-
SHA256
dbaeae6c483469f8da8954bee601a142594e9356212c43e04268598ea6213932
-
SHA512
45aae65291ea12c17fe75be9735477cc193263aeed73ba09d8e5ab60c9d403a00b7a77aa1a063dfa342aaa3ac7d9df9256ec080360aa96bf86c3f71842a40e4a
-
SSDEEP
6144:rkpNGUTubXZdvLLgploNzkizOIHxJrY8OH:5U6bXZxgplo5ki5S82
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 3 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f58d57fefcff95ae50128b67c6c05126_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f58d57fefcff95ae50128b67c6c05126_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f58d57fefcff95ae50128b67c6c05126_JaffaCakes118.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" f58d57fefcff95ae50128b67c6c05126_JaffaCakes118.exe -
Sality family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f58d57fefcff95ae50128b67c6c05126_JaffaCakes118.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f58d57fefcff95ae50128b67c6c05126_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f58d57fefcff95ae50128b67c6c05126_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" f58d57fefcff95ae50128b67c6c05126_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f58d57fefcff95ae50128b67c6c05126_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" f58d57fefcff95ae50128b67c6c05126_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f58d57fefcff95ae50128b67c6c05126_JaffaCakes118.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f58d57fefcff95ae50128b67c6c05126_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f58d57fefcff95ae50128b67c6c05126_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f58d57fefcff95ae50128b67c6c05126_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" f58d57fefcff95ae50128b67c6c05126_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f58d57fefcff95ae50128b67c6c05126_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" f58d57fefcff95ae50128b67c6c05126_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc f58d57fefcff95ae50128b67c6c05126_JaffaCakes118.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f58d57fefcff95ae50128b67c6c05126_JaffaCakes118.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: f58d57fefcff95ae50128b67c6c05126_JaffaCakes118.exe File opened (read-only) \??\Y: f58d57fefcff95ae50128b67c6c05126_JaffaCakes118.exe File opened (read-only) \??\R: f58d57fefcff95ae50128b67c6c05126_JaffaCakes118.exe File opened (read-only) \??\O: f58d57fefcff95ae50128b67c6c05126_JaffaCakes118.exe File opened (read-only) \??\N: f58d57fefcff95ae50128b67c6c05126_JaffaCakes118.exe File opened (read-only) \??\M: f58d57fefcff95ae50128b67c6c05126_JaffaCakes118.exe File opened (read-only) \??\K: f58d57fefcff95ae50128b67c6c05126_JaffaCakes118.exe File opened (read-only) \??\J: f58d57fefcff95ae50128b67c6c05126_JaffaCakes118.exe File opened (read-only) \??\Z: f58d57fefcff95ae50128b67c6c05126_JaffaCakes118.exe File opened (read-only) \??\S: f58d57fefcff95ae50128b67c6c05126_JaffaCakes118.exe File opened (read-only) \??\Q: f58d57fefcff95ae50128b67c6c05126_JaffaCakes118.exe File opened (read-only) \??\W: f58d57fefcff95ae50128b67c6c05126_JaffaCakes118.exe File opened (read-only) \??\T: f58d57fefcff95ae50128b67c6c05126_JaffaCakes118.exe File opened (read-only) \??\P: f58d57fefcff95ae50128b67c6c05126_JaffaCakes118.exe File opened (read-only) \??\I: f58d57fefcff95ae50128b67c6c05126_JaffaCakes118.exe File opened (read-only) \??\H: f58d57fefcff95ae50128b67c6c05126_JaffaCakes118.exe File opened (read-only) \??\G: f58d57fefcff95ae50128b67c6c05126_JaffaCakes118.exe File opened (read-only) \??\X: f58d57fefcff95ae50128b67c6c05126_JaffaCakes118.exe File opened (read-only) \??\V: f58d57fefcff95ae50128b67c6c05126_JaffaCakes118.exe File opened (read-only) \??\U: f58d57fefcff95ae50128b67c6c05126_JaffaCakes118.exe File opened (read-only) \??\L: f58d57fefcff95ae50128b67c6c05126_JaffaCakes118.exe -
Drops autorun.inf file 1 TTPs 3 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\autorun.inf f58d57fefcff95ae50128b67c6c05126_JaffaCakes118.exe File opened for modification C:\Documents and Settings\Admin\Local Settings\Application Data\Microsoft\CD Burning\autorun.inf f58d57fefcff95ae50128b67c6c05126_JaffaCakes118.exe File opened for modification F:\autorun.inf f58d57fefcff95ae50128b67c6c05126_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/700-3-0x0000000002350000-0x000000000340A000-memory.dmp upx behavioral2/memory/700-28-0x0000000002350000-0x000000000340A000-memory.dmp upx behavioral2/memory/700-7-0x0000000002350000-0x000000000340A000-memory.dmp upx behavioral2/memory/700-5-0x0000000002350000-0x000000000340A000-memory.dmp upx behavioral2/memory/700-4-0x0000000002350000-0x000000000340A000-memory.dmp upx behavioral2/memory/700-6-0x0000000002350000-0x000000000340A000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\e577f23 f58d57fefcff95ae50128b67c6c05126_JaffaCakes118.exe File opened for modification C:\Windows\SYSTEM.INI f58d57fefcff95ae50128b67c6c05126_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f58d57fefcff95ae50128b67c6c05126_JaffaCakes118.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz winword.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString winword.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 winword.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily winword.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU winword.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS winword.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3676 winword.exe 3676 winword.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 700 f58d57fefcff95ae50128b67c6c05126_JaffaCakes118.exe 700 f58d57fefcff95ae50128b67c6c05126_JaffaCakes118.exe 700 f58d57fefcff95ae50128b67c6c05126_JaffaCakes118.exe 700 f58d57fefcff95ae50128b67c6c05126_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3676 winword.exe 3676 winword.exe 3676 winword.exe 3676 winword.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 700 wrote to memory of 3676 700 f58d57fefcff95ae50128b67c6c05126_JaffaCakes118.exe 83 PID 700 wrote to memory of 3676 700 f58d57fefcff95ae50128b67c6c05126_JaffaCakes118.exe 83 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f58d57fefcff95ae50128b67c6c05126_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f58d57fefcff95ae50128b67c6c05126_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f58d57fefcff95ae50128b67c6c05126_JaffaCakes118.exe"1⤵
- Modifies firewall policy service
- Modifies visibility of file extensions in Explorer
- UAC bypass
- Windows security bypass
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:700 -
C:\Program Files\Microsoft Office\Root\Office16\winword.exe"C:\Program Files\Microsoft Office\Root\Office16\winword.exe"2⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3676
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
263KB
MD5ff0e07eff1333cdf9fc2523d323dd654
SHA177a1ae0dd8dbc3fee65dd6266f31e2a564d088a4
SHA2563f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5
SHA512b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d
-
Filesize
126B
MD5163e20cbccefcdd42f46e43a94173c46
SHA14c7b5048e8608e2a75799e00ecf1bbb4773279ae
SHA2567780bee9df142a17e0457f3dcb2788b50fc2792370089335597d33719126fb7e
SHA512e5ac0ff6b087857799ab70f68067c9dc73eeb93ccfcad87047052380b95ade3e6eb2a7d01a0f850d548a39f4b1ebb60e299d603dbe25c31b9a3585b34a0c65a8
-
Filesize
157KB
MD50899a2667c83db409c4e037155f6edc9
SHA1657278cfe85089427bd9bd4769e14fae62712bb4
SHA256348746346a930e04c02d4e95961704951db778ce925b77385b46ff08bd88fa96
SHA5121e7f7e22a335a94ad63ab18d91295e301dd59bfb4a8fef137145fc9a8253ae91bda16b5b6499117c48213b48bcddffa5cd7e9a05c527e81362e35dad49a4eba1