Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-01-2025 08:36
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_63db203857d3274284373b7b274eeaf0.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_63db203857d3274284373b7b274eeaf0.exe
-
Size
172KB
-
MD5
63db203857d3274284373b7b274eeaf0
-
SHA1
415a36621eb0f772a385b2698a1183df8d88342d
-
SHA256
1b0719fb85fe2ea6f9bdc5a8debdcc998209162ab3fb66ff73daaa3f3a839689
-
SHA512
344cf3c4fd5a72e51eec639f987ba07e557fd37e1aedea097b60ef821d132229b057e82c88c84e9567a1d609456109f97f6f58ace951fce237bc1ef2301e39ff
-
SSDEEP
3072:3xf026qbJ1y4GNq5jz+/YiMavc+UuOBbkfRODUHd1SFKlaMGJ:8qHGoq/TMXwgbaTdx8bJ
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Signatures
-
Modifies firewall policy service 3 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" JaffaCakes118_63db203857d3274284373b7b274eeaf0.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" JaffaCakes118_63db203857d3274284373b7b274eeaf0.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" JaffaCakes118_63db203857d3274284373b7b274eeaf0.exe -
Ramnit family
-
Sality family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" JaffaCakes118_63db203857d3274284373b7b274eeaf0.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" JaffaCakes118_63db203857d3274284373b7b274eeaf0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" JaffaCakes118_63db203857d3274284373b7b274eeaf0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" JaffaCakes118_63db203857d3274284373b7b274eeaf0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" JaffaCakes118_63db203857d3274284373b7b274eeaf0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" JaffaCakes118_63db203857d3274284373b7b274eeaf0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" JaffaCakes118_63db203857d3274284373b7b274eeaf0.exe -
Executes dropped EXE 1 IoCs
pid Process 1556 WaterMark.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" JaffaCakes118_63db203857d3274284373b7b274eeaf0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" JaffaCakes118_63db203857d3274284373b7b274eeaf0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" JaffaCakes118_63db203857d3274284373b7b274eeaf0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" JaffaCakes118_63db203857d3274284373b7b274eeaf0.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc JaffaCakes118_63db203857d3274284373b7b274eeaf0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" JaffaCakes118_63db203857d3274284373b7b274eeaf0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" JaffaCakes118_63db203857d3274284373b7b274eeaf0.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" JaffaCakes118_63db203857d3274284373b7b274eeaf0.exe -
resource yara_rule behavioral2/memory/2564-10-0x00000000032F0000-0x000000000437E000-memory.dmp upx behavioral2/memory/2564-5-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/2564-16-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/2564-9-0x00000000032F0000-0x000000000437E000-memory.dmp upx behavioral2/memory/2564-7-0x00000000032F0000-0x000000000437E000-memory.dmp upx behavioral2/memory/1556-31-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/2564-18-0x00000000032F0000-0x000000000437E000-memory.dmp upx behavioral2/memory/2564-12-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/2564-11-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/2564-4-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/2564-2-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/2564-3-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/1556-38-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\px8FBD.tmp JaffaCakes118_63db203857d3274284373b7b274eeaf0.exe File created C:\Program Files (x86)\Microsoft\WaterMark.exe JaffaCakes118_63db203857d3274284373b7b274eeaf0.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe JaffaCakes118_63db203857d3274284373b7b274eeaf0.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SYSTEM.INI JaffaCakes118_63db203857d3274284373b7b274eeaf0.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_63db203857d3274284373b7b274eeaf0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WaterMark.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31153393" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2205860395" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31153393" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2209141109" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2205860395" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31153393" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "442571973" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{AF1F83D9-C8E4-11EF-A4B7-DEEFF298442C} = "0" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 2564 JaffaCakes118_63db203857d3274284373b7b274eeaf0.exe 2564 JaffaCakes118_63db203857d3274284373b7b274eeaf0.exe 1556 WaterMark.exe 1556 WaterMark.exe 1556 WaterMark.exe 1556 WaterMark.exe 1556 WaterMark.exe 1556 WaterMark.exe 1556 WaterMark.exe 1556 WaterMark.exe 1556 WaterMark.exe 1556 WaterMark.exe 1556 WaterMark.exe 1556 WaterMark.exe 1556 WaterMark.exe 1556 WaterMark.exe 1556 WaterMark.exe 1556 WaterMark.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2564 JaffaCakes118_63db203857d3274284373b7b274eeaf0.exe Token: SeDebugPrivilege 2564 JaffaCakes118_63db203857d3274284373b7b274eeaf0.exe Token: SeDebugPrivilege 1556 WaterMark.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4924 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4924 iexplore.exe 4924 iexplore.exe 3424 IEXPLORE.EXE 3424 IEXPLORE.EXE 3424 IEXPLORE.EXE 3424 IEXPLORE.EXE -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2564 JaffaCakes118_63db203857d3274284373b7b274eeaf0.exe 1556 WaterMark.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2564 wrote to memory of 1556 2564 JaffaCakes118_63db203857d3274284373b7b274eeaf0.exe 82 PID 2564 wrote to memory of 1556 2564 JaffaCakes118_63db203857d3274284373b7b274eeaf0.exe 82 PID 2564 wrote to memory of 1556 2564 JaffaCakes118_63db203857d3274284373b7b274eeaf0.exe 82 PID 1556 wrote to memory of 1968 1556 WaterMark.exe 83 PID 1556 wrote to memory of 1968 1556 WaterMark.exe 83 PID 1556 wrote to memory of 1968 1556 WaterMark.exe 83 PID 1556 wrote to memory of 1968 1556 WaterMark.exe 83 PID 1556 wrote to memory of 1968 1556 WaterMark.exe 83 PID 1556 wrote to memory of 1968 1556 WaterMark.exe 83 PID 1556 wrote to memory of 1968 1556 WaterMark.exe 83 PID 1556 wrote to memory of 1968 1556 WaterMark.exe 83 PID 1556 wrote to memory of 1968 1556 WaterMark.exe 83 PID 1556 wrote to memory of 4924 1556 WaterMark.exe 84 PID 1556 wrote to memory of 4924 1556 WaterMark.exe 84 PID 1556 wrote to memory of 4308 1556 WaterMark.exe 85 PID 1556 wrote to memory of 4308 1556 WaterMark.exe 85 PID 4924 wrote to memory of 3424 4924 iexplore.exe 86 PID 4924 wrote to memory of 3424 4924 iexplore.exe 86 PID 4924 wrote to memory of 3424 4924 iexplore.exe 86 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" JaffaCakes118_63db203857d3274284373b7b274eeaf0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_63db203857d3274284373b7b274eeaf0.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_63db203857d3274284373b7b274eeaf0.exe"1⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2564 -
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:1968
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4924 CREDAT:17410 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3424
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
- Modifies Internet Explorer settings
PID:4308
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
172KB
MD563db203857d3274284373b7b274eeaf0
SHA1415a36621eb0f772a385b2698a1183df8d88342d
SHA2561b0719fb85fe2ea6f9bdc5a8debdcc998209162ab3fb66ff73daaa3f3a839689
SHA512344cf3c4fd5a72e51eec639f987ba07e557fd37e1aedea097b60ef821d132229b057e82c88c84e9567a1d609456109f97f6f58ace951fce237bc1ef2301e39ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD530f59b20e935520badc298242cb4cff1
SHA100622b2054eb148a8459c2ccd0b22606c2d5c7f6
SHA2564a981d199e551f2b8c8fa22f0e3fbc264e876e5ed243d83331b2a6083a753e3c
SHA512f22ca09eb3266cee3f363e4f3f955745382679d136d61e7c27f81081cd77efa5f82f82220526928f73049e692b7c060f64032dfae0f967c579c6e6acfd2e8d21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD5b6c875e6a02742ed97df404ac71d9b72
SHA10fe5bf4133b28b11aba62cf79c7d1bb44c08f050
SHA2569965388961555c952bffce3cb958752dfb8b205cf9156ca0cfcc82e971c05602
SHA512c047292e0db38b9cd80176757f8ba543586635530bb89ea382047806a35c65cf9fa245960465344cd2f3222cb64f13d9879f91cbacefdf33218f6029232745b7
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee