Analysis
-
max time kernel
123s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/03/2025, 11:50
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe
-
Size
100KB
-
MD5
51f00847c640ca67314f5d9af8d735d0
-
SHA1
610b4c5a8276533c1f0d01bbad3561e275480df1
-
SHA256
98502a3f8945c5f96b845022b0eb7321a052ca745f6041db899d25f0e380de6f
-
SHA512
123f71865de16f6c2e846456e616438f5a0fd689db59d10b65ee4323460c5c07127219379a4de60b89620dfffc4818def616302c2dc51188634a594b35cde1bd
-
SSDEEP
1536:Pqfs7qseIE/nrt5GPzu7elgTnTfE6es8Gibm8ZUXXxWknOZhvgfTOLp:Is7qzIE/KPzmggbTfE9Bbm5XXozp
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Signatures
-
Modifies firewall policy service 3 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe -
Sality family
-
UAC bypass 3 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe -
Windows security bypass 2 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe -
Windows security modification 2 TTPs 7 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe -
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\S: JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe File opened (read-only) \??\V: JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe File opened (read-only) \??\W: JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe File opened (read-only) \??\E: JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe File opened (read-only) \??\I: JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe File opened (read-only) \??\O: JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe File opened (read-only) \??\P: JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe File opened (read-only) \??\Q: JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe File opened (read-only) \??\T: JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe File opened (read-only) \??\J: JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe File opened (read-only) \??\N: JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe File opened (read-only) \??\R: JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe File opened (read-only) \??\U: JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe File opened (read-only) \??\Y: JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe File opened (read-only) \??\G: JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe File opened (read-only) \??\K: JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe File opened (read-only) \??\L: JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe File opened (read-only) \??\X: JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe File opened (read-only) \??\Z: JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe File opened (read-only) \??\H: JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe File opened (read-only) \??\M: JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\autorun.inf JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe File opened for modification F:\autorun.inf JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe -
resource yara_rule behavioral1/memory/2064-7-0x0000000001DB0000-0x0000000002E3E000-memory.dmp upx behavioral1/memory/2064-1-0x0000000001DB0000-0x0000000002E3E000-memory.dmp upx behavioral1/memory/2064-5-0x0000000001DB0000-0x0000000002E3E000-memory.dmp upx behavioral1/memory/2064-8-0x0000000001DB0000-0x0000000002E3E000-memory.dmp upx behavioral1/memory/2064-9-0x0000000001DB0000-0x0000000002E3E000-memory.dmp upx behavioral1/memory/2064-6-0x0000000001DB0000-0x0000000002E3E000-memory.dmp upx behavioral1/memory/2064-24-0x0000000001DB0000-0x0000000002E3E000-memory.dmp upx behavioral1/memory/2064-4-0x0000000001DB0000-0x0000000002E3E000-memory.dmp upx behavioral1/memory/2064-3-0x0000000001DB0000-0x0000000002E3E000-memory.dmp upx behavioral1/memory/2064-10-0x0000000001DB0000-0x0000000002E3E000-memory.dmp upx behavioral1/memory/2064-28-0x0000000001DB0000-0x0000000002E3E000-memory.dmp upx behavioral1/memory/2064-29-0x0000000001DB0000-0x0000000002E3E000-memory.dmp upx behavioral1/memory/2064-30-0x0000000001DB0000-0x0000000002E3E000-memory.dmp upx behavioral1/memory/2064-31-0x0000000001DB0000-0x0000000002E3E000-memory.dmp upx behavioral1/memory/2064-32-0x0000000001DB0000-0x0000000002E3E000-memory.dmp upx behavioral1/memory/2064-34-0x0000000001DB0000-0x0000000002E3E000-memory.dmp upx behavioral1/memory/2064-35-0x0000000001DB0000-0x0000000002E3E000-memory.dmp upx behavioral1/memory/2064-36-0x0000000001DB0000-0x0000000002E3E000-memory.dmp upx behavioral1/memory/2064-39-0x0000000001DB0000-0x0000000002E3E000-memory.dmp upx behavioral1/memory/2064-57-0x0000000001DB0000-0x0000000002E3E000-memory.dmp upx behavioral1/memory/2064-58-0x0000000001DB0000-0x0000000002E3E000-memory.dmp upx behavioral1/memory/2064-60-0x0000000001DB0000-0x0000000002E3E000-memory.dmp upx behavioral1/memory/2064-61-0x0000000001DB0000-0x0000000002E3E000-memory.dmp upx behavioral1/memory/2064-63-0x0000000001DB0000-0x0000000002E3E000-memory.dmp upx behavioral1/memory/2064-64-0x0000000001DB0000-0x0000000002E3E000-memory.dmp upx behavioral1/memory/2064-65-0x0000000001DB0000-0x0000000002E3E000-memory.dmp upx behavioral1/memory/2064-68-0x0000000001DB0000-0x0000000002E3E000-memory.dmp upx behavioral1/memory/2064-75-0x0000000001DB0000-0x0000000002E3E000-memory.dmp upx -
Drops file in Program Files directory 5 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7z.exe JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7zFM.exe JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7zG.exe JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe File opened for modification C:\PROGRAM FILES\7-ZIP\Uninstall.exe JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SYSTEM.INI JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe -
Suspicious use of AdjustPrivilegeToken 29 IoCs
description pid Process Token: SeDebugPrivilege 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe Token: SeDebugPrivilege 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe Token: SeDebugPrivilege 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe Token: SeDebugPrivilege 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe Token: SeDebugPrivilege 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe Token: SeDebugPrivilege 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe Token: SeDebugPrivilege 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe Token: SeDebugPrivilege 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe Token: SeDebugPrivilege 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe Token: SeDebugPrivilege 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe Token: SeDebugPrivilege 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe Token: SeDebugPrivilege 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe Token: SeDebugPrivilege 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe Token: SeDebugPrivilege 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe Token: SeDebugPrivilege 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe Token: SeDebugPrivilege 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe Token: SeDebugPrivilege 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe Token: SeDebugPrivilege 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe Token: SeDebugPrivilege 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe Token: SeDebugPrivilege 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe Token: SeDebugPrivilege 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe Token: SeDebugPrivilege 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe Token: SeDebugPrivilege 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe Token: SeDebugPrivilege 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe Token: SeDebugPrivilege 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe Token: SeDebugPrivilege 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe Token: SeDebugPrivilege 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe Token: SeDebugPrivilege 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe Token: SeDebugPrivilege 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 2064 wrote to memory of 1104 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe 19 PID 2064 wrote to memory of 1152 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe 20 PID 2064 wrote to memory of 1216 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe 21 PID 2064 wrote to memory of 1600 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe 25 PID 2064 wrote to memory of 1104 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe 19 PID 2064 wrote to memory of 1152 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe 20 PID 2064 wrote to memory of 1216 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe 21 PID 2064 wrote to memory of 1600 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe 25 PID 2064 wrote to memory of 1104 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe 19 PID 2064 wrote to memory of 1152 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe 20 PID 2064 wrote to memory of 1216 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe 21 PID 2064 wrote to memory of 1600 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe 25 PID 2064 wrote to memory of 1104 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe 19 PID 2064 wrote to memory of 1152 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe 20 PID 2064 wrote to memory of 1216 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe 21 PID 2064 wrote to memory of 1600 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe 25 PID 2064 wrote to memory of 1104 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe 19 PID 2064 wrote to memory of 1152 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe 20 PID 2064 wrote to memory of 1216 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe 21 PID 2064 wrote to memory of 1600 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe 25 PID 2064 wrote to memory of 1104 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe 19 PID 2064 wrote to memory of 1152 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe 20 PID 2064 wrote to memory of 1216 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe 21 PID 2064 wrote to memory of 1600 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe 25 PID 2064 wrote to memory of 1104 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe 19 PID 2064 wrote to memory of 1152 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe 20 PID 2064 wrote to memory of 1216 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe 21 PID 2064 wrote to memory of 1600 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe 25 PID 2064 wrote to memory of 1104 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe 19 PID 2064 wrote to memory of 1152 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe 20 PID 2064 wrote to memory of 1216 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe 21 PID 2064 wrote to memory of 1600 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe 25 PID 2064 wrote to memory of 1104 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe 19 PID 2064 wrote to memory of 1152 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe 20 PID 2064 wrote to memory of 1216 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe 21 PID 2064 wrote to memory of 1600 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe 25 PID 2064 wrote to memory of 1104 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe 19 PID 2064 wrote to memory of 1152 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe 20 PID 2064 wrote to memory of 1216 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe 21 PID 2064 wrote to memory of 1600 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe 25 PID 2064 wrote to memory of 1104 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe 19 PID 2064 wrote to memory of 1152 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe 20 PID 2064 wrote to memory of 1216 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe 21 PID 2064 wrote to memory of 1600 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe 25 PID 2064 wrote to memory of 1104 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe 19 PID 2064 wrote to memory of 1152 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe 20 PID 2064 wrote to memory of 1216 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe 21 PID 2064 wrote to memory of 1600 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe 25 PID 2064 wrote to memory of 1104 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe 19 PID 2064 wrote to memory of 1152 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe 20 PID 2064 wrote to memory of 1216 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe 21 PID 2064 wrote to memory of 1600 2064 JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe 25 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1104
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1152
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_51f00847c640ca67314f5d9af8d735d0.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2064
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1600
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
100KB
MD58ab52bdbad6041b3c37d87ac830752cd
SHA1b97a56c3cc2d880420197d5415467962e9698db2
SHA25695e785ce9bdab9ca588dbf81c66fe0ab0bef961f3bf24dfb69461a3704a098ac
SHA51223ceeb7e6852c61177f6049595edb1c8fdad73eea6dc47d15a86a7320f459162b6610cc5f6cd8290e65fcac0702493a98d957e03fdc7777236fa89a184b8d59d