Analysis

  • max time kernel
    91s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250129-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-02-2025 03:39

General

  • Target

    JaffaCakes118_840fa6ee06fff8d84a2773e8ae922156.exe

  • Size

    183KB

  • MD5

    840fa6ee06fff8d84a2773e8ae922156

  • SHA1

    578ca844543245c67e88aa8c71664035f4b18d76

  • SHA256

    52f79515018dba7417e433c71b09a951015f69827f30b1ca0db3688a2a21d65b

  • SHA512

    b6ca765f0fa3193e0e332e3a9f730309b88491327c6c35eb543343d8e8997e70f9643347ed875156d18403d56e1139e74f7f462aab2c36130197ad2188b3d55d

  • SSDEEP

    3072:DLk39XKhYXJlq+JNu/9P0qO5dqAv9efWQFgn8PInvqHUE9s2giM0vxj+hyv8umc3:DQHK+3S9MqODvULe6mCkbeRmu

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

http://klkjwre77638dfqwieuoi888.info/

Signatures

  • Modifies firewall policy service 3 TTPs 6 IoCs
  • Sality

    Sality is backdoor written in C++, first discovered in 2003.

  • Sality family
  • UAC bypass 3 TTPs 2 IoCs
  • Windows security bypass 2 TTPs 12 IoCs
  • Disables RegEdit via registry modification 2 IoCs
  • Disables Task Manager via registry modification
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 61 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 14 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • UPX packed file 23 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 56 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Windows\system32\fontdrvhost.exe
    "fontdrvhost.exe"
    1⤵
      PID:784
    • C:\Windows\system32\fontdrvhost.exe
      "fontdrvhost.exe"
      1⤵
        PID:788
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        1⤵
          PID:1016
        • C:\Windows\system32\sihost.exe
          sihost.exe
          1⤵
            PID:2580
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
            1⤵
              PID:2732
            • C:\Windows\system32\taskhostw.exe
              taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
              1⤵
                PID:2996
              • C:\Windows\Explorer.EXE
                C:\Windows\Explorer.EXE
                1⤵
                  PID:3408
                  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_840fa6ee06fff8d84a2773e8ae922156.exe
                    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_840fa6ee06fff8d84a2773e8ae922156.exe"
                    2⤵
                    • Modifies firewall policy service
                    • UAC bypass
                    • Windows security bypass
                    • Disables RegEdit via registry modification
                    • Windows security modification
                    • Checks whether UAC is enabled
                    • Drops file in Windows directory
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    • System policy modification
                    PID:4536
                    • C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe
                      "C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\
                      3⤵
                      • Modifies firewall policy service
                      • UAC bypass
                      • Windows security bypass
                      • Disables RegEdit via registry modification
                      • Deletes itself
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Windows security modification
                      • Checks whether UAC is enabled
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of WriteProcessMemory
                      • System policy modification
                      PID:2456
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                  1⤵
                    PID:3536
                  • C:\Windows\system32\DllHost.exe
                    C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                    1⤵
                      PID:3720
                    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                      1⤵
                        PID:3820
                      • C:\Windows\System32\RuntimeBroker.exe
                        C:\Windows\System32\RuntimeBroker.exe -Embedding
                        1⤵
                          PID:3884
                        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                          1⤵
                            PID:3968
                          • C:\Windows\System32\RuntimeBroker.exe
                            C:\Windows\System32\RuntimeBroker.exe -Embedding
                            1⤵
                              PID:4124
                            • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe
                              "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca
                              1⤵
                                PID:4036
                              • C:\Windows\System32\RuntimeBroker.exe
                                C:\Windows\System32\RuntimeBroker.exe -Embedding
                                1⤵
                                  PID:4756
                                • C:\Windows\system32\backgroundTaskHost.exe
                                  "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca
                                  1⤵
                                    PID:4200
                                  • C:\Windows\system32\backgroundTaskHost.exe
                                    "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
                                    1⤵
                                      PID:5072
                                    • C:\Windows\System32\RuntimeBroker.exe
                                      C:\Windows\System32\RuntimeBroker.exe -Embedding
                                      1⤵
                                        PID:372
                                      • C:\Windows\System32\RuntimeBroker.exe
                                        C:\Windows\System32\RuntimeBroker.exe -Embedding
                                        1⤵
                                          PID:1756

                                        Network

                                        MITRE ATT&CK Enterprise v15

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • C:\Users\Admin\AppData\Local\Temp\0E57D09E_Rar\Au_.exe

                                          Filesize

                                          107KB

                                          MD5

                                          1e77482af3122ce2cc5a1a0dc8d3082d

                                          SHA1

                                          bd73aee1dc12468a2e285dc3358776faf02404c1

                                          SHA256

                                          f954e8a92a0b52a2c46ad5d42076d1c19f78758b300569085ee77a9c9b69c79a

                                          SHA512

                                          7fd3ba411f88793c2f046dd38bae692d2ad2e545a4e94cc58802b3dc12ca390663b68aebb25c85f100fc38abcbd9913c8e3c1dda2ffd10976ac1d1fbfa726b8b

                                        • C:\Users\Admin\AppData\Local\Temp\nsuD0AF.tmp\Processes.dll

                                          Filesize

                                          35KB

                                          MD5

                                          2cfba79d485cf441c646dd40d82490fc

                                          SHA1

                                          83e51ac1115a50986ed456bd18729653018b9619

                                          SHA256

                                          86b302fa9c85dfa0c1c03ba000864a928365dab571f3355347dba02da22949b7

                                          SHA512

                                          cca186a7f9c5cff3f4eca410fbe8cc13dad2514a7e36aec9b1addfbcb239ace9b9b2d8427771858e3fd11783abce7e24d43c286f98da9f8b17562ca095a4c043

                                        • C:\Users\Admin\AppData\Local\Temp\nsuD0AF.tmp\System.dll

                                          Filesize

                                          11KB

                                          MD5

                                          c17103ae9072a06da581dec998343fc1

                                          SHA1

                                          b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

                                          SHA256

                                          dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

                                          SHA512

                                          d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

                                        • C:\Users\Admin\AppData\Local\Temp\nsuD0AF.tmp\UAC.dll

                                          Filesize

                                          13KB

                                          MD5

                                          bcec2a6095d38abc192a68d094c302d0

                                          SHA1

                                          9e88c5b957b45524690513b75d81dee259d5d599

                                          SHA256

                                          446000200eff4f9c20761ce1680902daba190c81a57154f4917b1741d7800e3c

                                          SHA512

                                          b48e85a17904a104eef573358763a0b1215eec96f72f83ff544d2dab22737bc42411ca505adf3f7e95c6f7e7997ad3e408f258093727105b678d5eee8d8e6278

                                        • C:\Users\Admin\AppData\Local\Temp\nsuD0AF.tmp\UserInfo.dll

                                          Filesize

                                          4KB

                                          MD5

                                          7579ade7ae1747a31960a228ce02e666

                                          SHA1

                                          8ec8571a296737e819dcf86353a43fcf8ec63351

                                          SHA256

                                          564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5

                                          SHA512

                                          a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b

                                        • C:\Users\Admin\AppData\Local\Temp\nsuD0AF.tmp\inetc.dll

                                          Filesize

                                          24KB

                                          MD5

                                          ef630cf1898c257df36b1037bd1e5392

                                          SHA1

                                          b2c47d9a741d2b5391387059552b37f2daddade2

                                          SHA256

                                          41776a77b4e3bba1c3e70d10b9f560248148b8f2c45d39d4cd8683754112860f

                                          SHA512

                                          986b405d723294ff5b3649f899bc048c5693bd386dc3f489b390ccb1d56e8e65a9dbe6d0863d553525ce93d505a162eaa087faf4b4c5133345c3330d01327211

                                        • C:\Users\Admin\AppData\Local\Temp\nsuD0AF.tmp\nsDialogs.dll

                                          Filesize

                                          9KB

                                          MD5

                                          c10e04dd4ad4277d5adc951bb331c777

                                          SHA1

                                          b1e30808198a3ae6d6d1cca62df8893dc2a7ad43

                                          SHA256

                                          e31ad6c6e82e603378cb6b80e67d0e0dcd9cf384e1199ac5a65cb4935680021a

                                          SHA512

                                          853a5564bf751d40484ea482444c6958457cb4a17fb973cf870f03f201b8b2643be41bccde00f6b2026dc0c3d113e6481b0dc4c7b0f3ae7966d38c92c6b5862e

                                        • C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe

                                          Filesize

                                          183KB

                                          MD5

                                          840fa6ee06fff8d84a2773e8ae922156

                                          SHA1

                                          578ca844543245c67e88aa8c71664035f4b18d76

                                          SHA256

                                          52f79515018dba7417e433c71b09a951015f69827f30b1ca0db3688a2a21d65b

                                          SHA512

                                          b6ca765f0fa3193e0e332e3a9f730309b88491327c6c35eb543343d8e8997e70f9643347ed875156d18403d56e1139e74f7f462aab2c36130197ad2188b3d55d

                                        • C:\Windows\SYSTEM.INI

                                          Filesize

                                          257B

                                          MD5

                                          fcb3accaad8df7dcac3dedcba0487608

                                          SHA1

                                          120d3714e2b2e9b85ac4ccae0cc3e370a527ca1d

                                          SHA256

                                          812046608d7abcbcf2b2c1a65c4c1f186d1de1d1f7d771f9a7e79a18e061b649

                                          SHA512

                                          515303d485ab542b52db584f44df9bcae482a352a6b272bfbefce0965f0ad169f4277b418d9d3f19b9c1375ebc93d54c11f43bedd686bb1178da7b5f9c441002

                                        • memory/2456-76-0x0000000005CF0000-0x0000000006D7E000-memory.dmp

                                          Filesize

                                          16.6MB

                                        • memory/2456-75-0x0000000005CF0000-0x0000000006D7E000-memory.dmp

                                          Filesize

                                          16.6MB

                                        • memory/2456-113-0x0000000007C70000-0x0000000007C7D000-memory.dmp

                                          Filesize

                                          52KB

                                        • memory/2456-34-0x0000000000400000-0x0000000000455000-memory.dmp

                                          Filesize

                                          340KB

                                        • memory/2456-314-0x0000000005CF0000-0x0000000006D7E000-memory.dmp

                                          Filesize

                                          16.6MB

                                        • memory/2456-313-0x0000000000400000-0x0000000000455000-memory.dmp

                                          Filesize

                                          340KB

                                        • memory/2456-92-0x0000000005CF0000-0x0000000006D7E000-memory.dmp

                                          Filesize

                                          16.6MB

                                        • memory/2456-89-0x0000000005CF0000-0x0000000006D7E000-memory.dmp

                                          Filesize

                                          16.6MB

                                        • memory/2456-88-0x0000000005CF0000-0x0000000006D7E000-memory.dmp

                                          Filesize

                                          16.6MB

                                        • memory/2456-81-0x0000000005CF0000-0x0000000006D7E000-memory.dmp

                                          Filesize

                                          16.6MB

                                        • memory/2456-82-0x0000000005CF0000-0x0000000006D7E000-memory.dmp

                                          Filesize

                                          16.6MB

                                        • memory/2456-84-0x0000000005CF0000-0x0000000006D7E000-memory.dmp

                                          Filesize

                                          16.6MB

                                        • memory/2456-86-0x0000000005CF0000-0x0000000006D7E000-memory.dmp

                                          Filesize

                                          16.6MB

                                        • memory/2456-87-0x0000000002940000-0x0000000002942000-memory.dmp

                                          Filesize

                                          8KB

                                        • memory/2456-85-0x0000000005CF0000-0x0000000006D7E000-memory.dmp

                                          Filesize

                                          16.6MB

                                        • memory/2456-77-0x0000000005CF0000-0x0000000006D7E000-memory.dmp

                                          Filesize

                                          16.6MB

                                        • memory/2456-83-0x0000000005CF0000-0x0000000006D7E000-memory.dmp

                                          Filesize

                                          16.6MB

                                        • memory/2456-80-0x0000000002940000-0x0000000002942000-memory.dmp

                                          Filesize

                                          8KB

                                        • memory/2456-79-0x0000000002FE0000-0x0000000002FE1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/4536-8-0x0000000003E50000-0x0000000003E51000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/4536-9-0x0000000002430000-0x00000000034BE000-memory.dmp

                                          Filesize

                                          16.6MB

                                        • memory/4536-3-0x0000000002430000-0x00000000034BE000-memory.dmp

                                          Filesize

                                          16.6MB

                                        • memory/4536-6-0x0000000002430000-0x00000000034BE000-memory.dmp

                                          Filesize

                                          16.6MB

                                        • memory/4536-7-0x0000000000600000-0x0000000000602000-memory.dmp

                                          Filesize

                                          8KB

                                        • memory/4536-0-0x0000000000400000-0x0000000000455000-memory.dmp

                                          Filesize

                                          340KB

                                        • memory/4536-13-0x0000000002430000-0x00000000034BE000-memory.dmp

                                          Filesize

                                          16.6MB

                                        • memory/4536-10-0x0000000000600000-0x0000000000602000-memory.dmp

                                          Filesize

                                          8KB

                                        • memory/4536-5-0x0000000002430000-0x00000000034BE000-memory.dmp

                                          Filesize

                                          16.6MB

                                        • memory/4536-4-0x0000000002430000-0x00000000034BE000-memory.dmp

                                          Filesize

                                          16.6MB

                                        • memory/4536-14-0x0000000002430000-0x00000000034BE000-memory.dmp

                                          Filesize

                                          16.6MB

                                        • memory/4536-12-0x0000000000600000-0x0000000000602000-memory.dmp

                                          Filesize

                                          8KB

                                        • memory/4536-26-0x0000000000600000-0x0000000000602000-memory.dmp

                                          Filesize

                                          8KB

                                        • memory/4536-1-0x0000000002430000-0x00000000034BE000-memory.dmp

                                          Filesize

                                          16.6MB

                                        • memory/4536-35-0x0000000000400000-0x0000000000455000-memory.dmp

                                          Filesize

                                          340KB

                                        • memory/4536-27-0x0000000002430000-0x00000000034BE000-memory.dmp

                                          Filesize

                                          16.6MB

                                        • memory/4536-11-0x0000000002430000-0x00000000034BE000-memory.dmp

                                          Filesize

                                          16.6MB