Analysis

  • max time kernel
    49s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    16-12-2024 11:54

General

  • Target

    f8e4401dff213d69435c8a4c95a5deea_JaffaCakes118.exe

  • Size

    369KB

  • MD5

    f8e4401dff213d69435c8a4c95a5deea

  • SHA1

    ac46f81e1385154221a02174c2a284eb858cf48b

  • SHA256

    ceba6ad4b778705c6fc2a4a968b93c5da232a3c545cf0e62bacc624c7f674b5c

  • SHA512

    6c815cd96e88749c1753187d3c433388e6086fb653f7b8c827e7d371426dba4b3667419651417589ebc9e72b40e85c9d58608ed65c1abe756c316ed83cfa7156

  • SSDEEP

    6144:3v3+5MVSBtJ/M7Ikc3TFarEwxhJyyQaAt6REgdfSVzQtYMhNufkF8UWYXMrj2L:/0OSR01P47wdt9YMhaAXMryL

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Signatures

  • Modifies firewall policy service 3 TTPs 6 IoCs
  • Sality

    Sality is backdoor written in C++, first discovered in 2003.

  • Sality family
  • UAC bypass 3 TTPs 2 IoCs
  • Windows security bypass 2 TTPs 12 IoCs
  • Executes dropped EXE 1 IoCs
  • Unexpected DNS network traffic destination 64 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Windows security modification 2 TTPs 14 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 28 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • UPX packed file 31 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 23 IoCs
  • Suspicious behavior: RenamesItself 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 48 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Windows\system32\taskhost.exe
    "taskhost.exe"
    1⤵
      PID:1112
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1164
      • C:\Windows\Explorer.EXE
        C:\Windows\Explorer.EXE
        1⤵
          PID:1208
          • C:\Users\Admin\AppData\Local\Temp\f8e4401dff213d69435c8a4c95a5deea_JaffaCakes118.exe
            "C:\Users\Admin\AppData\Local\Temp\f8e4401dff213d69435c8a4c95a5deea_JaffaCakes118.exe"
            2⤵
            • Modifies firewall policy service
            • UAC bypass
            • Windows security bypass
            • Windows security modification
            • Checks whether UAC is enabled
            • Enumerates connected drives
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: RenamesItself
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            • System policy modification
            PID:2380
            • C:\Users\Admin\AppData\Roaming\Microsoft\cimooda.exe
              C:\Users\Admin\AppData\Roaming\Microsoft\cimooda.exe
              3⤵
              • Modifies firewall policy service
              • UAC bypass
              • Windows security bypass
              • Executes dropped EXE
              • Windows security modification
              • Adds Run key to start application
              • Checks whether UAC is enabled
              • Enumerates connected drives
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: RenamesItself
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              • System policy modification
              PID:1828
        • C:\Windows\system32\DllHost.exe
          C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
          1⤵
            PID:1276

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\Microsoft\cimooda.exe

            Filesize

            369KB

            MD5

            f8e4401dff213d69435c8a4c95a5deea

            SHA1

            ac46f81e1385154221a02174c2a284eb858cf48b

            SHA256

            ceba6ad4b778705c6fc2a4a968b93c5da232a3c545cf0e62bacc624c7f674b5c

            SHA512

            6c815cd96e88749c1753187d3c433388e6086fb653f7b8c827e7d371426dba4b3667419651417589ebc9e72b40e85c9d58608ed65c1abe756c316ed83cfa7156

          • C:\Windows\SYSTEM.INI

            Filesize

            257B

            MD5

            0616ce58f1f4d7c194e26b995825c783

            SHA1

            c5b6cda388752d010e7baf905c50592f0d1a04cc

            SHA256

            8e94465a99c79499f40d0ac710a17959d4b2a9e0d6b75236cdd1ae971b7f95fb

            SHA512

            f16d80029a9eeae543fa746b688238f20aa4a414c974a13a6d7c07edaaaddc723de195ba4fa14839d307597fe3a175053e7d1c683713d15d1467a41acc5cb59e

          • C:\gfygie.pif

            Filesize

            100KB

            MD5

            4f427a51609c768f1ba3200b6fd28db1

            SHA1

            b8e63e823f0bb4fa2a561e8df05729ef07e68e79

            SHA256

            3f16ce46d62bff83381a2195f6b3121a9abeb9e10a33269ead349b660610ca47

            SHA512

            d2b37bac1e978e829b0d657c073d37f683c8751ef603ebb89e9fc77b951ce79f170746ccd2cbc707179677032e3a63846417fe94bab61c8073b4311479d1983e

          • memory/1112-10-0x0000000000320000-0x0000000000322000-memory.dmp

            Filesize

            8KB

          • memory/1828-112-0x0000000000400000-0x000000000045E000-memory.dmp

            Filesize

            376KB

          • memory/1828-114-0x0000000000400000-0x000000000045E000-memory.dmp

            Filesize

            376KB

          • memory/1828-148-0x0000000000400000-0x000000000045E000-memory.dmp

            Filesize

            376KB

          • memory/1828-145-0x0000000000400000-0x000000000045E000-memory.dmp

            Filesize

            376KB

          • memory/1828-122-0x0000000000400000-0x000000000045E000-memory.dmp

            Filesize

            376KB

          • memory/2380-35-0x0000000002210000-0x000000000329E000-memory.dmp

            Filesize

            16.6MB

          • memory/2380-40-0x0000000002210000-0x000000000329E000-memory.dmp

            Filesize

            16.6MB

          • memory/2380-6-0x0000000002210000-0x000000000329E000-memory.dmp

            Filesize

            16.6MB

          • memory/2380-5-0x0000000002210000-0x000000000329E000-memory.dmp

            Filesize

            16.6MB

          • memory/2380-3-0x0000000002210000-0x000000000329E000-memory.dmp

            Filesize

            16.6MB

          • memory/2380-8-0x0000000002210000-0x000000000329E000-memory.dmp

            Filesize

            16.6MB

          • memory/2380-25-0x0000000000380000-0x0000000000382000-memory.dmp

            Filesize

            8KB

          • memory/2380-24-0x0000000000380000-0x0000000000382000-memory.dmp

            Filesize

            8KB

          • memory/2380-23-0x0000000000390000-0x0000000000391000-memory.dmp

            Filesize

            4KB

          • memory/2380-27-0x0000000002210000-0x000000000329E000-memory.dmp

            Filesize

            16.6MB

          • memory/2380-28-0x0000000002210000-0x000000000329E000-memory.dmp

            Filesize

            16.6MB

          • memory/2380-26-0x0000000002210000-0x000000000329E000-memory.dmp

            Filesize

            16.6MB

          • memory/2380-30-0x0000000002210000-0x000000000329E000-memory.dmp

            Filesize

            16.6MB

          • memory/2380-29-0x0000000002210000-0x000000000329E000-memory.dmp

            Filesize

            16.6MB

          • memory/2380-31-0x0000000002210000-0x000000000329E000-memory.dmp

            Filesize

            16.6MB

          • memory/2380-32-0x0000000002210000-0x000000000329E000-memory.dmp

            Filesize

            16.6MB

          • memory/2380-33-0x0000000002210000-0x000000000329E000-memory.dmp

            Filesize

            16.6MB

          • memory/2380-20-0x0000000000390000-0x0000000000391000-memory.dmp

            Filesize

            4KB

          • memory/2380-36-0x0000000002210000-0x000000000329E000-memory.dmp

            Filesize

            16.6MB

          • memory/2380-37-0x0000000002210000-0x000000000329E000-memory.dmp

            Filesize

            16.6MB

          • memory/2380-39-0x0000000002210000-0x000000000329E000-memory.dmp

            Filesize

            16.6MB

          • memory/2380-19-0x0000000000380000-0x0000000000382000-memory.dmp

            Filesize

            8KB

          • memory/2380-50-0x0000000002210000-0x000000000329E000-memory.dmp

            Filesize

            16.6MB

          • memory/2380-52-0x0000000000380000-0x0000000000382000-memory.dmp

            Filesize

            8KB

          • memory/2380-51-0x0000000002210000-0x000000000329E000-memory.dmp

            Filesize

            16.6MB

          • memory/2380-54-0x0000000002210000-0x000000000329E000-memory.dmp

            Filesize

            16.6MB

          • memory/2380-56-0x0000000002210000-0x000000000329E000-memory.dmp

            Filesize

            16.6MB

          • memory/2380-59-0x0000000002210000-0x000000000329E000-memory.dmp

            Filesize

            16.6MB

          • memory/2380-60-0x0000000002210000-0x000000000329E000-memory.dmp

            Filesize

            16.6MB

          • memory/2380-61-0x0000000002210000-0x000000000329E000-memory.dmp

            Filesize

            16.6MB

          • memory/2380-62-0x0000000002210000-0x000000000329E000-memory.dmp

            Filesize

            16.6MB

          • memory/2380-64-0x0000000002210000-0x000000000329E000-memory.dmp

            Filesize

            16.6MB

          • memory/2380-66-0x0000000002210000-0x000000000329E000-memory.dmp

            Filesize

            16.6MB

          • memory/2380-68-0x0000000002210000-0x000000000329E000-memory.dmp

            Filesize

            16.6MB

          • memory/2380-69-0x0000000000400000-0x000000000045E000-memory.dmp

            Filesize

            376KB

          • memory/2380-72-0x0000000000400000-0x000000000045E000-memory.dmp

            Filesize

            376KB

          • memory/2380-71-0x000000000042F000-0x0000000000436000-memory.dmp

            Filesize

            28KB

          • memory/2380-87-0x0000000000400000-0x000000000045E000-memory.dmp

            Filesize

            376KB

          • memory/2380-7-0x0000000002210000-0x000000000329E000-memory.dmp

            Filesize

            16.6MB

          • memory/2380-9-0x00000000002A0000-0x00000000002A1000-memory.dmp

            Filesize

            4KB

          • memory/2380-4-0x0000000002210000-0x000000000329E000-memory.dmp

            Filesize

            16.6MB

          • memory/2380-0-0x0000000000400000-0x000000000045E000-memory.dmp

            Filesize

            376KB

          • memory/2380-111-0x0000000004BD0000-0x0000000004C2E000-memory.dmp

            Filesize

            376KB

          • memory/2380-113-0x0000000002210000-0x000000000329E000-memory.dmp

            Filesize

            16.6MB