Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/03/2025, 13:17
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe
-
Size
367KB
-
MD5
5236917173a949ed75ac11908d5c45cf
-
SHA1
094867156d6c068b6215ab2f32d4d7c32d550a5e
-
SHA256
27ae1c25dd321250eaebecd06916d6268b1e67b49599c84cee4a54f06e59282a
-
SHA512
d9005a0fb4a70023709a6f799531efe8a2e0c8fd1e19a2118489ca071442fdfc7738d6b8da5fc73ae212c16db58e09ce9ff79e76293b112d17a76de105546e04
-
SSDEEP
6144:QNO8nT1QzCs7sAKq/qjE01U2+8TRMz8+wJFJhuRc04ag9d8CCKHS75rZ:QU8TxjG2dMw+yFXuav3X8VWS75rZ
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Signatures
-
Modifies firewall policy service 3 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe -
Sality family
-
UAC bypass 3 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe -
Windows security bypass 2 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe -
Executes dropped EXE 1 IoCs
pid Process 2564 update.exe -
Loads dropped DLL 4 IoCs
pid Process 2656 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe 2564 update.exe 2564 update.exe 2564 update.exe -
Windows security modification 2 TTPs 7 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe -
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\o: JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe File opened (read-only) \??\r: JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe File opened (read-only) \??\t: JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe File opened (read-only) \??\e: JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe File opened (read-only) \??\j: JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe File opened (read-only) \??\x: JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe File opened (read-only) \??\q: JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe File opened (read-only) \??\m: JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe File opened (read-only) \??\n: JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe File opened (read-only) \??\p: JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe File opened (read-only) \??\u: JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe File opened (read-only) \??\w: JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe File opened (read-only) \??\y: JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe File opened (read-only) \??\z: JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe File opened (read-only) \??\a: JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe File opened (read-only) \??\b: JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe File opened (read-only) \??\g: JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe File opened (read-only) \??\s: JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe File opened (read-only) \??\v: JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe File opened (read-only) \??\h: JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe File opened (read-only) \??\i: JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe File opened (read-only) \??\k: JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe File opened (read-only) \??\l: JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe -
resource yara_rule behavioral1/memory/2656-10-0x0000000001D40000-0x0000000002DCE000-memory.dmp upx behavioral1/memory/2656-9-0x0000000001D40000-0x0000000002DCE000-memory.dmp upx behavioral1/memory/2656-8-0x0000000001D40000-0x0000000002DCE000-memory.dmp upx behavioral1/memory/2656-7-0x0000000001D40000-0x0000000002DCE000-memory.dmp upx behavioral1/memory/2656-11-0x0000000001D40000-0x0000000002DCE000-memory.dmp upx behavioral1/memory/2656-6-0x0000000001D40000-0x0000000002DCE000-memory.dmp upx behavioral1/memory/2656-57-0x0000000001D40000-0x0000000002DCE000-memory.dmp upx behavioral1/memory/2656-52-0x0000000001D40000-0x0000000002DCE000-memory.dmp upx behavioral1/memory/2656-56-0x0000000001D40000-0x0000000002DCE000-memory.dmp upx behavioral1/memory/2656-61-0x0000000001D40000-0x0000000002DCE000-memory.dmp upx behavioral1/memory/2656-60-0x0000000001D40000-0x0000000002DCE000-memory.dmp upx behavioral1/memory/2656-62-0x0000000001D40000-0x0000000002DCE000-memory.dmp upx behavioral1/memory/2656-74-0x0000000001D40000-0x0000000002DCE000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SYSTEM.INI JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language update.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier update.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2656 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe -
Suspicious use of AdjustPrivilegeToken 30 IoCs
description pid Process Token: SeDebugPrivilege 2656 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 2656 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 2656 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 2656 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 2656 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 2656 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 2656 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 2656 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 2656 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 2656 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 2656 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 2656 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 2656 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 2656 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 2656 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 2656 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 2656 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 2656 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 2656 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 2656 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 2656 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 2656 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 2656 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeRestorePrivilege 2564 update.exe Token: SeRestorePrivilege 2564 update.exe Token: SeRestorePrivilege 2564 update.exe Token: SeRestorePrivilege 2564 update.exe Token: SeRestorePrivilege 2564 update.exe Token: SeRestorePrivilege 2564 update.exe Token: SeRestorePrivilege 2564 update.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2656 wrote to memory of 1088 2656 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe 18 PID 2656 wrote to memory of 1172 2656 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe 20 PID 2656 wrote to memory of 1200 2656 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe 21 PID 2656 wrote to memory of 1864 2656 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe 25 PID 2656 wrote to memory of 2564 2656 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe 31 PID 2656 wrote to memory of 2564 2656 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe 31 PID 2656 wrote to memory of 2564 2656 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe 31 PID 2656 wrote to memory of 2564 2656 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe 31 PID 2656 wrote to memory of 2564 2656 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe 31 PID 2656 wrote to memory of 2564 2656 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe 31 PID 2656 wrote to memory of 2564 2656 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe 31 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1088
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1172
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Loads dropped DLL
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2656 -
\??\c:\913d115661acb\update\update.exec:\913d115661acb\update\update.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:2564
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1864
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
295KB
MD5add3bd7b7c57792a39f2ec8672c8f718
SHA192420ce9be369ef5a41da5fc28a2cd64968f2edc
SHA25694aa8cf0ffc00f7c91232d774bb0c5f5925ffad3801f41e17a2045caf0f86436
SHA512297a6dcc3d1acee89cb6c527a46a2f0319c9e2f7f510d1861594ba7b467cb809cdff200650195d5bd9f79432ca32f1c30b93040515c7e4bfd5332714d86d3e64
-
Filesize
258KB
MD52d3b8ceab00c4b6f1a9d3e837e7c4a49
SHA11c20a92ffbbe7c63e65846a20b3b965d3a6725d3
SHA2567f12736f66fc280b8ce787bc7d68745293db96747f378f8e5803b6399aeccd93
SHA512fe755912741ddf5bf297572b44ec0839d4116265a128fa62d8fa35f75531b721a4ded4380dc786fa4c6afb659e8c2833f2ed6918e947d80ae5a8c22453f1bc34
-
Filesize
32KB
MD565c0578011febf82ac9ec095c3a46ede
SHA1a818b7457ddee7e421f1f2190b25ea20cd5ba61c
SHA256ec699a8e150bc13f40c35eafe568c1cc56ba609b35895776be731e4c5db34573
SHA512fa836d05a05c3b4e3b4a5b2179aa66ffd8144559715764ddb098ce96e3696f07c56f45a1f3525b855c532f3f3faf34ee9c7d82589ff7344e5321b0bc330e8b7a