Analysis
-
max time kernel
3s -
max time network
4s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-01-2025 00:10
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_4043e7a3ec462e9cfa8ff47f6f7c5af0.dll
Resource
win7-20240903-en
Errors
General
-
Target
JaffaCakes118_4043e7a3ec462e9cfa8ff47f6f7c5af0.dll
-
Size
511KB
-
MD5
4043e7a3ec462e9cfa8ff47f6f7c5af0
-
SHA1
194394367effa041a33e213357921eb2400494aa
-
SHA256
79d32b9dedafb896a9d4e72931a1150bd636c4ede44e7d9b66a836870960dace
-
SHA512
82e12eebf0fbe561a60f4aa24b51839b4ce2296934ae56deaaf6b5077e7a5f6fd15724029a53d895ea02f66a7f3fd2c358bf08e790124815a7f4b792f840d87b
-
SSDEEP
6144:iSAshdo/MCRiVFAr5V2uG99GUc4Y5DDUXMfv0s9uivOc0mUTQx2iumBNTw:b4MM5V2uGvGUcdNDU8h9uim30xBtjTw
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,,C:\\Users\\Admin\\AppData\\Local\\erjumily\\mxxkwlup.exe" H2KdefKpT Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,C:\\Users\\Admin\\AppData\\Local\\erjumily\\mxxkwlup.exe" H2KdefKpT -
Modifies firewall policy service 3 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" H2KdefKpT Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" H2KdefKpT Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" H2KdefKpT -
Modifies security service 2 TTPs 4 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" H2KdefKpT Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Start = "4" H2KdefKpT Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\Start = "4" H2KdefKpT Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" H2KdefKpT -
Ramnit family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" H2KdefKpT -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" H2KdefKpT Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" H2KdefKpT Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" H2KdefKpT Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" H2KdefKpT Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" H2KdefKpT Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" H2KdefKpT -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\mxxkwlup.exe H2KdefKpT File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\mxxkwlup.exe H2KdefKpT -
Executes dropped EXE 1 IoCs
pid Process 2740 H2KdefKpT -
Loads dropped DLL 1 IoCs
pid Process 1944 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" H2KdefKpT Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" H2KdefKpT Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" H2KdefKpT Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" H2KdefKpT Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" H2KdefKpT Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" H2KdefKpT -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\MxxKwlup = "C:\\Users\\Admin\\AppData\\Local\\erjumily\\mxxkwlup.exe" H2KdefKpT -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" H2KdefKpT -
resource yara_rule behavioral1/memory/2740-10-0x0000000015190000-0x00000000151CD000-memory.dmp upx behavioral1/memory/2740-14-0x0000000015190000-0x00000000151CD000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language H2KdefKpT -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2740 H2KdefKpT 2740 H2KdefKpT -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 2740 H2KdefKpT Token: SeRestorePrivilege 2740 H2KdefKpT Token: SeBackupPrivilege 2740 H2KdefKpT Token: SeShutdownPrivilege 2740 H2KdefKpT -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2280 wrote to memory of 1944 2280 rundll32.exe 30 PID 2280 wrote to memory of 1944 2280 rundll32.exe 30 PID 2280 wrote to memory of 1944 2280 rundll32.exe 30 PID 2280 wrote to memory of 1944 2280 rundll32.exe 30 PID 2280 wrote to memory of 1944 2280 rundll32.exe 30 PID 2280 wrote to memory of 1944 2280 rundll32.exe 30 PID 2280 wrote to memory of 1944 2280 rundll32.exe 30 PID 1944 wrote to memory of 2740 1944 rundll32.exe 31 PID 1944 wrote to memory of 2740 1944 rundll32.exe 31 PID 1944 wrote to memory of 2740 1944 rundll32.exe 31 PID 1944 wrote to memory of 2740 1944 rundll32.exe 31 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" H2KdefKpT
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4043e7a3ec462e9cfa8ff47f6f7c5af0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4043e7a3ec462e9cfa8ff47f6f7c5af0.dll,#12⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\H2KdefKpT"H2KdefKpT"3⤵
- Modifies WinLogon for persistence
- Modifies firewall policy service
- Modifies security service
- UAC bypass
- Windows security bypass
- Drops startup file
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:2740
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
8Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
287KB
MD58627249c7e93c76032132f399d0fee6f
SHA1db0d2006fe739d06298eae5586d99a864905b708
SHA2561edd96962de859f5752f2567aaabe8171d735265abe1ed3c2225c9d0c20de107
SHA512a256316f407257045260d9a73e2f30a66920bd26e14ffe1e527f1a0e77f4e0009e3b89318fba0c6a3e2e9a5c7b09fec43818bc8f930e9808f6680b1adc063227