Analysis
-
max time kernel
96s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-01-2025 00:10
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_4043e7a3ec462e9cfa8ff47f6f7c5af0.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_4043e7a3ec462e9cfa8ff47f6f7c5af0.dll
-
Size
511KB
-
MD5
4043e7a3ec462e9cfa8ff47f6f7c5af0
-
SHA1
194394367effa041a33e213357921eb2400494aa
-
SHA256
79d32b9dedafb896a9d4e72931a1150bd636c4ede44e7d9b66a836870960dace
-
SHA512
82e12eebf0fbe561a60f4aa24b51839b4ce2296934ae56deaaf6b5077e7a5f6fd15724029a53d895ea02f66a7f3fd2c358bf08e790124815a7f4b792f840d87b
-
SSDEEP
6144:iSAshdo/MCRiVFAr5V2uG99GUc4Y5DDUXMfv0s9uivOc0mUTQx2iumBNTw:b4MM5V2uGvGUcdNDU8h9uim30xBtjTw
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,,C:\\Users\\Admin\\AppData\\Local\\lmatgcqg\\tpogptxv.exe" H2KdefKpT -
Modifies firewall policy service 3 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" H2KdefKpT Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" H2KdefKpT Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" H2KdefKpT -
Modifies security service 2 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" H2KdefKpT Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\mpssvc\Start = "4" H2KdefKpT Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" H2KdefKpT -
Ramnit family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" H2KdefKpT -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" H2KdefKpT Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" H2KdefKpT Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" H2KdefKpT Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" H2KdefKpT Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" H2KdefKpT Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" H2KdefKpT -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\tpogptxv.exe H2KdefKpT File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\tpogptxv.exe H2KdefKpT -
Executes dropped EXE 1 IoCs
pid Process 4932 H2KdefKpT -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" H2KdefKpT Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" H2KdefKpT Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" H2KdefKpT Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" H2KdefKpT Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" H2KdefKpT Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" H2KdefKpT -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\TpoGptxv = "C:\\Users\\Admin\\AppData\\Local\\lmatgcqg\\tpogptxv.exe" H2KdefKpT -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" H2KdefKpT -
resource yara_rule behavioral2/memory/4932-11-0x0000000015190000-0x00000000151CD000-memory.dmp upx behavioral2/memory/4932-7-0x0000000015190000-0x00000000151CD000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language H2KdefKpT -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4932 H2KdefKpT 4932 H2KdefKpT 4932 H2KdefKpT 4932 H2KdefKpT -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeSecurityPrivilege 4932 H2KdefKpT -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1216 wrote to memory of 1984 1216 rundll32.exe 85 PID 1216 wrote to memory of 1984 1216 rundll32.exe 85 PID 1216 wrote to memory of 1984 1216 rundll32.exe 85 PID 1984 wrote to memory of 4932 1984 rundll32.exe 86 PID 1984 wrote to memory of 4932 1984 rundll32.exe 86 PID 1984 wrote to memory of 4932 1984 rundll32.exe 86 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" H2KdefKpT
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4043e7a3ec462e9cfa8ff47f6f7c5af0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4043e7a3ec462e9cfa8ff47f6f7c5af0.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\H2KdefKpT"H2KdefKpT"3⤵
- Modifies WinLogon for persistence
- Modifies firewall policy service
- Modifies security service
- UAC bypass
- Windows security bypass
- Drops startup file
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:4932
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
8Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
287KB
MD58627249c7e93c76032132f399d0fee6f
SHA1db0d2006fe739d06298eae5586d99a864905b708
SHA2561edd96962de859f5752f2567aaabe8171d735265abe1ed3c2225c9d0c20de107
SHA512a256316f407257045260d9a73e2f30a66920bd26e14ffe1e527f1a0e77f4e0009e3b89318fba0c6a3e2e9a5c7b09fec43818bc8f930e9808f6680b1adc063227