Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/03/2025, 19:09
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe
-
Size
212KB
-
MD5
53446bee6d94a205129c8e55574d9fe4
-
SHA1
8793e22d95fb8f9418bad91413c797f602499247
-
SHA256
59c9544c206f6e202f2fbb10d5d9da403554eb8ca6db2db138e7b8c2a69fe185
-
SHA512
36f98f2ec9d6d95f29f296d7403360307b2e08953764b07b72dd471a3219eaa1a332d184944ea3dff30b3cb5b08f811a66f69548fddc91730450b4e8c1a1f122
-
SSDEEP
3072:ucUcm0X3qDOUwUNvo8Hj/64qDuibRRP1SWYh037Fu776yThTthw:ucUK3qDpvTT6LDuibjfa0rFa7PtTI
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Signatures
-
Modifies firewall policy service 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" sesdessecetra.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" sesdessecetra.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" sesdessecetra.exe -
Sality family
-
UAC bypass 3 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" sesdessecetra.exe -
Windows security bypass 2 TTPs 12 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sesdessecetra.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sesdessecetra.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" sesdessecetra.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sesdessecetra.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sesdessecetra.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" sesdessecetra.exe -
Executes dropped EXE 2 IoCs
pid Process 1964 sesdessecetra.exe 2924 sesdessecetra.exe -
Loads dropped DLL 8 IoCs
pid Process 2668 JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe 1964 sesdessecetra.exe 1964 sesdessecetra.exe 1964 sesdessecetra.exe 1964 sesdessecetra.exe 2924 sesdessecetra.exe 2924 sesdessecetra.exe 2924 sesdessecetra.exe -
Windows security modification 2 TTPs 14 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sesdessecetra.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sesdessecetra.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sesdessecetra.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sesdessecetra.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" sesdessecetra.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" sesdessecetra.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc sesdessecetra.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\Driver Control Manager v8.2 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\sesdessecetra.exe" JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Driver Control Manager v8.2 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\sesdessecetra.exe" JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe -
Checks whether UAC is enabled 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" sesdessecetra.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2300 set thread context of 2668 2300 JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe 30 PID 1964 set thread context of 2924 1964 sesdessecetra.exe 32 -
resource yara_rule behavioral1/memory/2300-4-0x0000000002C20000-0x0000000003CAE000-memory.dmp upx behavioral1/memory/2300-6-0x0000000002C20000-0x0000000003CAE000-memory.dmp upx behavioral1/memory/2300-5-0x0000000002C20000-0x0000000003CAE000-memory.dmp upx behavioral1/memory/2300-8-0x0000000002C20000-0x0000000003CAE000-memory.dmp upx behavioral1/memory/2300-7-0x0000000002C20000-0x0000000003CAE000-memory.dmp upx behavioral1/memory/2300-14-0x0000000002C20000-0x0000000003CAE000-memory.dmp upx behavioral1/memory/2300-13-0x0000000002C20000-0x0000000003CAE000-memory.dmp upx behavioral1/memory/2300-15-0x0000000002C20000-0x0000000003CAE000-memory.dmp upx behavioral1/memory/2300-12-0x0000000002C20000-0x0000000003CAE000-memory.dmp upx behavioral1/memory/2300-16-0x0000000002C20000-0x0000000003CAE000-memory.dmp upx behavioral1/memory/2300-10-0x0000000002C20000-0x0000000003CAE000-memory.dmp upx behavioral1/memory/2300-55-0x0000000002C20000-0x0000000003CAE000-memory.dmp upx behavioral1/memory/1964-74-0x0000000002B00000-0x0000000003B8E000-memory.dmp upx behavioral1/memory/1964-72-0x0000000002B00000-0x0000000003B8E000-memory.dmp upx behavioral1/memory/1964-71-0x0000000002B00000-0x0000000003B8E000-memory.dmp upx behavioral1/memory/1964-69-0x0000000002B00000-0x0000000003B8E000-memory.dmp upx behavioral1/memory/1964-80-0x0000000002B00000-0x0000000003B8E000-memory.dmp upx behavioral1/memory/1964-78-0x0000000002B00000-0x0000000003B8E000-memory.dmp upx behavioral1/memory/1964-76-0x0000000002B00000-0x0000000003B8E000-memory.dmp upx behavioral1/memory/1964-77-0x0000000002B00000-0x0000000003B8E000-memory.dmp upx behavioral1/memory/1964-75-0x0000000002B00000-0x0000000003B8E000-memory.dmp upx behavioral1/memory/1964-73-0x0000000002B00000-0x0000000003B8E000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SYSTEM.INI JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sesdessecetra.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sesdessecetra.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2300 JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe 1964 sesdessecetra.exe -
Suspicious use of AdjustPrivilegeToken 44 IoCs
description pid Process Token: SeDebugPrivilege 2300 JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe Token: SeDebugPrivilege 2300 JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe Token: SeDebugPrivilege 2300 JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe Token: SeDebugPrivilege 2300 JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe Token: SeDebugPrivilege 2300 JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe Token: SeDebugPrivilege 2300 JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe Token: SeDebugPrivilege 2300 JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe Token: SeDebugPrivilege 2300 JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe Token: SeDebugPrivilege 2300 JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe Token: SeDebugPrivilege 2300 JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe Token: SeDebugPrivilege 2300 JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe Token: SeDebugPrivilege 2300 JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe Token: SeDebugPrivilege 2300 JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe Token: SeDebugPrivilege 2300 JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe Token: SeDebugPrivilege 2300 JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe Token: SeDebugPrivilege 2300 JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe Token: SeDebugPrivilege 2300 JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe Token: SeDebugPrivilege 2300 JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe Token: SeDebugPrivilege 2300 JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe Token: SeDebugPrivilege 2300 JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe Token: SeDebugPrivilege 2300 JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe Token: SeDebugPrivilege 2300 JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe Token: SeDebugPrivilege 1964 sesdessecetra.exe Token: SeDebugPrivilege 1964 sesdessecetra.exe Token: SeDebugPrivilege 1964 sesdessecetra.exe Token: SeDebugPrivilege 1964 sesdessecetra.exe Token: SeDebugPrivilege 1964 sesdessecetra.exe Token: SeDebugPrivilege 1964 sesdessecetra.exe Token: SeDebugPrivilege 1964 sesdessecetra.exe Token: SeDebugPrivilege 1964 sesdessecetra.exe Token: SeDebugPrivilege 1964 sesdessecetra.exe Token: SeDebugPrivilege 1964 sesdessecetra.exe Token: SeDebugPrivilege 1964 sesdessecetra.exe Token: SeDebugPrivilege 1964 sesdessecetra.exe Token: SeDebugPrivilege 1964 sesdessecetra.exe Token: SeDebugPrivilege 1964 sesdessecetra.exe Token: SeDebugPrivilege 1964 sesdessecetra.exe Token: SeDebugPrivilege 1964 sesdessecetra.exe Token: SeDebugPrivilege 1964 sesdessecetra.exe Token: SeDebugPrivilege 1964 sesdessecetra.exe Token: SeDebugPrivilege 1964 sesdessecetra.exe Token: SeDebugPrivilege 1964 sesdessecetra.exe Token: SeDebugPrivilege 1964 sesdessecetra.exe Token: SeDebugPrivilege 1964 sesdessecetra.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2300 JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe 1964 sesdessecetra.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 2300 wrote to memory of 1120 2300 JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe 19 PID 2300 wrote to memory of 1180 2300 JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe 20 PID 2300 wrote to memory of 1208 2300 JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe 21 PID 2300 wrote to memory of 1696 2300 JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe 25 PID 2300 wrote to memory of 2668 2300 JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe 30 PID 2300 wrote to memory of 2668 2300 JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe 30 PID 2300 wrote to memory of 2668 2300 JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe 30 PID 2300 wrote to memory of 2668 2300 JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe 30 PID 2300 wrote to memory of 2668 2300 JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe 30 PID 2300 wrote to memory of 2668 2300 JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe 30 PID 2300 wrote to memory of 2668 2300 JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe 30 PID 2300 wrote to memory of 2668 2300 JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe 30 PID 2300 wrote to memory of 2668 2300 JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe 30 PID 2300 wrote to memory of 2668 2300 JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe 30 PID 2300 wrote to memory of 2668 2300 JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe 30 PID 2300 wrote to memory of 2668 2300 JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe 30 PID 2668 wrote to memory of 1964 2668 JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe 31 PID 2668 wrote to memory of 1964 2668 JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe 31 PID 2668 wrote to memory of 1964 2668 JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe 31 PID 2668 wrote to memory of 1964 2668 JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe 31 PID 2668 wrote to memory of 1964 2668 JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe 31 PID 2668 wrote to memory of 1964 2668 JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe 31 PID 2668 wrote to memory of 1964 2668 JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe 31 PID 1964 wrote to memory of 1120 1964 sesdessecetra.exe 19 PID 1964 wrote to memory of 1180 1964 sesdessecetra.exe 20 PID 1964 wrote to memory of 1208 1964 sesdessecetra.exe 21 PID 1964 wrote to memory of 1696 1964 sesdessecetra.exe 25 PID 1964 wrote to memory of 2924 1964 sesdessecetra.exe 32 PID 1964 wrote to memory of 2924 1964 sesdessecetra.exe 32 PID 1964 wrote to memory of 2924 1964 sesdessecetra.exe 32 PID 1964 wrote to memory of 2924 1964 sesdessecetra.exe 32 PID 1964 wrote to memory of 2924 1964 sesdessecetra.exe 32 PID 1964 wrote to memory of 2924 1964 sesdessecetra.exe 32 PID 1964 wrote to memory of 2924 1964 sesdessecetra.exe 32 PID 1964 wrote to memory of 2924 1964 sesdessecetra.exe 32 PID 1964 wrote to memory of 2924 1964 sesdessecetra.exe 32 PID 1964 wrote to memory of 2924 1964 sesdessecetra.exe 32 PID 1964 wrote to memory of 2924 1964 sesdessecetra.exe 32 PID 1964 wrote to memory of 2924 1964 sesdessecetra.exe 32 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" sesdessecetra.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1120
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1180
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_53446bee6d94a205129c8e55574d9fe4.exe"3⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\sesdessecetra.exe"C:\Users\Admin\AppData\Local\Temp\sesdessecetra.exe"4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\sesdessecetra.exe"C:\Users\Admin\AppData\Local\Temp\sesdessecetra.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2924
-
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1696
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212KB
MD553446bee6d94a205129c8e55574d9fe4
SHA18793e22d95fb8f9418bad91413c797f602499247
SHA25659c9544c206f6e202f2fbb10d5d9da403554eb8ca6db2db138e7b8c2a69fe185
SHA51236f98f2ec9d6d95f29f296d7403360307b2e08953764b07b72dd471a3219eaa1a332d184944ea3dff30b3cb5b08f811a66f69548fddc91730450b4e8c1a1f122
-
Filesize
257B
MD54252884d73155abb64d70ef01fff8056
SHA13e7c96cf96fb29da12f7e08fdb9e1cac2e1c1d99
SHA256f40ec85b4de7f687e5161bfd0d780ecc49b83b82aa2c27bae29ba8cf7b552370
SHA512988638568867713eb92c6bf6dd4175f914a5b95a90433a611b320f30288e807be8dc00c0dfdbcd60283f60193872743c90a50a2ef8713449514ab21f11ca330f