Malware Analysis Report

2025-03-14 22:29

Sample ID 240407-x6kgfscc3y
Target e5af47f2a5de064284c2293e627d3652_JaffaCakes118
SHA256 9424a5c272106c6f14927fd38aad7fa5fa53c48e55e3affda526ac995da95b20
Tags
upx persistence
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

9424a5c272106c6f14927fd38aad7fa5fa53c48e55e3affda526ac995da95b20

Threat Level: Shows suspicious behavior

The file e5af47f2a5de064284c2293e627d3652_JaffaCakes118 was found to be: Shows suspicious behavior.

Malicious Activity Summary

upx persistence

UPX packed file

Loads dropped DLL

ACProtect 1.3x - 1.4x DLL software

Executes dropped EXE

Adds Run key to start application

Drops file in System32 directory

Drops file in Windows directory

Unsigned PE

Modifies registry class

Suspicious behavior: EnumeratesProcesses

Suspicious use of SetWindowsHookEx

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-04-07 19:27

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-04-07 19:27

Reported

2024-04-07 19:30

Platform

win7-20240215-en

Max time kernel

150s

Max time network

119s

Command Line

"C:\Users\Admin\AppData\Local\Temp\e5af47f2a5de064284c2293e627d3652_JaffaCakes118.exe"

Signatures

ACProtect 1.3x - 1.4x DLL software

Description Indicator Process Target
N/A N/A N/A N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\svchosttest.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\rWWPO = "\"C:\\Windows\\svchosttest.exe\"" C:\Users\Admin\AppData\Local\Temp\e5af47f2a5de064284c2293e627d3652_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\lky2it6 = "\"C:\\Windows\\svchosttest.exe\"" C:\Windows\svchosttest.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\NJL9C = "\"C:\\Windows\\svchosttest.exe\"" C:\Windows\svchosttest.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\5DRo = "\"C:\\Windows\\svchosttest.exe\"" C:\Users\Admin\AppData\Local\Temp\e5af47f2a5de064284c2293e627d3652_JaffaCakes118.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File opened for modification C:\Windows\SysWOW64\win.com C:\Users\Admin\AppData\Local\Temp\e5af47f2a5de064284c2293e627d3652_JaffaCakes118.exe N/A
File opened for modification C:\Windows\SysWOW64\zlib.dll C:\Windows\svchosttest.exe N/A
File opened for modification C:\Windows\SysWOW64\mswinsck.ocx C:\Windows\svchosttest.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\svchosttest.exe C:\Windows\svchosttest.exe N/A
File opened for modification C:\Windows\svchosttest.exe C:\Users\Admin\AppData\Local\Temp\e5af47f2a5de064284c2293e627d3652_JaffaCakes118.exe N/A
File created C:\Windows\svchosttest.exe C:\Users\Admin\AppData\Local\Temp\e5af47f2a5de064284c2293e627d3652_JaffaCakes118.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Implemented Categories\{0DE86A57-2BAA-11CF-A229-00AA003D7352} C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Implemented Categories\{0DE86A53-2BAA-11CF-A229-00AA003D7352} C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\FLAGS\ = "2" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D} C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock\CLSID C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD897-BB45-11CF-9ABC-0080C7E7B78D}\InprocServer32 C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\ProxyStubClsid32 C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock\CurVer C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\ = "DMSWinsockControlEvents" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\ProgID\ = "MSWinsock.Winsock.1" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Control C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Implemented Categories\{0DE86A52-2BAA-11CF-A229-00AA003D7352} C:\Windows\SysWOW64\regsvr32.exe N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D} C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock.1\CLSID C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\0\win32\ = "C:\\Windows\\SysWow64\\mswinsck.ocx" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\ = "IMSWinsockControl" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\ProxyStubClsid32 C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\VersionIndependentProgID C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\ProgID C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Implemented Categories\{40FC6ED5-2438-11CF-A3DB-080036F12502} C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\0\win32 C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\ = "{248DD890-BB45-11CF-9ABC-0080C7E7B78D}" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\ = "{248DD890-BB45-11CF-9ABC-0080C7E7B78D}" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0 C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\0 C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D} C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\ = "DMSWinsockControlEvents" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock.1\ = "Microsoft WinSock Control, version 6.0" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Implemented Categories\{40FC6ED4-2438-11CF-A3DB-080036F12502} C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\ProxyStubClsid32 C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D} C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\MiscStatus C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\ToolboxBitmap32\ = "C:\\Windows\\SysWow64\\mswinsck.ocx, 1" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD897-BB45-11CF-9ABC-0080C7E7B78D} C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D} C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D} C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Version C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\ToolboxBitmap32 C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\HELPDIR C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\MiscStatus\1\ = "132497" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\FLAGS C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D} C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\Version = "1.0" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\ = "{248DD890-BB45-11CF-9ABC-0080C7E7B78D}" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\Version = "1.0" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock\ = "Microsoft WinSock Control, version 6.0" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock\CurVer\ = "MSWinsock.Winsock.1" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Version\ = "1.0" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\HELPDIR\ C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\ = "{248DD890-BB45-11CF-9ABC-0080C7E7B78D}" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\Version = "1.0" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\InprocServer32\ = "C:\\Windows\\SysWow64\\mswinsck.ocx" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\InprocServer32\ThreadingModel = "Apartment" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock\CLSID\ = "{248DD896-BB45-11CF-9ABC-0080C7E7B78D}" C:\Windows\SysWOW64\regsvr32.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\e5af47f2a5de064284c2293e627d3652_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e5af47f2a5de064284c2293e627d3652_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e5af47f2a5de064284c2293e627d3652_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e5af47f2a5de064284c2293e627d3652_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e5af47f2a5de064284c2293e627d3652_JaffaCakes118.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\e5af47f2a5de064284c2293e627d3652_JaffaCakes118.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\e5af47f2a5de064284c2293e627d3652_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\e5af47f2a5de064284c2293e627d3652_JaffaCakes118.exe"

C:\Windows\svchosttest.exe

C:\Windows\svchosttest.exe

C:\Windows\SysWOW64\regsvr32.exe

regsvr32 /s "C:\Windows\system32\mswinsck.ocx"

Network

Country Destination Domain Proto
US 8.8.8.8:53 gogo2326.no-ip.biz udp

Files

memory/2876-0-0x0000000000400000-0x0000000000458000-memory.dmp

C:\Windows\svchosttest.exe

MD5 e5af47f2a5de064284c2293e627d3652
SHA1 a5ef3a20453ece3d7a38eded9c4e40729ef544a7
SHA256 9424a5c272106c6f14927fd38aad7fa5fa53c48e55e3affda526ac995da95b20
SHA512 9dd76bcfe9163059b2efd7bc9967191ce406cdd0a308d77a33926a0a026c3dbaa01779e799018fe9d0aa7fe4dbcb8a54d0ae3625367312ceef1fc5d1bc925adb

memory/2876-12-0x0000000000400000-0x0000000000458000-memory.dmp

memory/2624-13-0x0000000000400000-0x0000000000458000-memory.dmp

\Windows\SysWOW64\zlib.dll

MD5 200d52d81e9b4b05fa58ce5fbe511dba
SHA1 c0d809ee93816d87388ed4e7fd6fca93d70294d2
SHA256 d4fe89dc2e7775f4ef0dfc70ed6999b8f09635326e05e08a274d464d1814c617
SHA512 7b1df70d76855d65cf246051e7b9f7119720a695d41ace1eb00e45e93e6de80d083b953269166bdee7137dbd9f3e5681e36bb036f151cea383c10d82957f39c5

memory/2624-22-0x0000000010000000-0x0000000010014000-memory.dmp

C:\Windows\SysWOW64\mswinsck.ocx

MD5 9484c04258830aa3c2f2a70eb041414c
SHA1 b242a4fb0e9dcf14cb51dc36027baff9a79cb823
SHA256 bf7e47c16d7e1c0e88534f4ef95e09d0fd821ed1a06b0d95a389b35364b63ff5
SHA512 9d0e9f0d88594746ba41ea4a61a53498619eda596e12d8ec37d01cfe8ceb08be13e3727c83d630a6d9e6d03066f62444bb94ea5a0d2ed9d21a270e612db532a0

memory/2624-28-0x0000000000400000-0x0000000000458000-memory.dmp

memory/2624-29-0x0000000010000000-0x0000000010014000-memory.dmp

memory/2624-30-0x0000000000400000-0x0000000000458000-memory.dmp

memory/2624-32-0x0000000000400000-0x0000000000458000-memory.dmp

memory/2624-33-0x0000000000400000-0x0000000000458000-memory.dmp

memory/2624-35-0x0000000000400000-0x0000000000458000-memory.dmp

memory/2624-37-0x0000000000400000-0x0000000000458000-memory.dmp

memory/2624-39-0x0000000000400000-0x0000000000458000-memory.dmp

memory/2624-41-0x0000000000400000-0x0000000000458000-memory.dmp

memory/2624-43-0x0000000000400000-0x0000000000458000-memory.dmp

memory/2624-45-0x0000000000400000-0x0000000000458000-memory.dmp

memory/2624-47-0x0000000000400000-0x0000000000458000-memory.dmp

memory/2624-49-0x0000000000400000-0x0000000000458000-memory.dmp

memory/2624-51-0x0000000000400000-0x0000000000458000-memory.dmp

memory/2624-53-0x0000000000400000-0x0000000000458000-memory.dmp

memory/2624-55-0x0000000000400000-0x0000000000458000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-04-07 19:27

Reported

2024-04-07 19:30

Platform

win10v2004-20240226-en

Max time kernel

148s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\e5af47f2a5de064284c2293e627d3652_JaffaCakes118.exe"

Signatures

ACProtect 1.3x - 1.4x DLL software

Description Indicator Process Target
N/A N/A N/A N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\svchosttest.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AGKELq = "\"C:\\Windows\\svchosttest.exe\"" C:\Users\Admin\AppData\Local\Temp\e5af47f2a5de064284c2293e627d3652_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NJL9C = "\"C:\\Windows\\svchosttest.exe\"" C:\Users\Admin\AppData\Local\Temp\e5af47f2a5de064284c2293e627d3652_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\2ylpuO = "\"C:\\Windows\\svchosttest.exe\"" C:\Windows\svchosttest.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\l0kAp1 = "\"C:\\Windows\\svchosttest.exe\"" C:\Windows\svchosttest.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File opened for modification C:\Windows\SysWOW64\zlib.dll C:\Windows\svchosttest.exe N/A
File opened for modification C:\Windows\SysWOW64\mswinsck.ocx C:\Windows\svchosttest.exe N/A
File opened for modification C:\Windows\SysWOW64\win.com C:\Users\Admin\AppData\Local\Temp\e5af47f2a5de064284c2293e627d3652_JaffaCakes118.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\svchosttest.exe C:\Users\Admin\AppData\Local\Temp\e5af47f2a5de064284c2293e627d3652_JaffaCakes118.exe N/A
File created C:\Windows\svchosttest.exe C:\Users\Admin\AppData\Local\Temp\e5af47f2a5de064284c2293e627d3652_JaffaCakes118.exe N/A
File opened for modification C:\Windows\svchosttest.exe C:\Windows\svchosttest.exe N/A

Modifies registry class

Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\ = "Microsoft Winsock Control 6.0" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\FLAGS\ = "2" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\InprocServer32\ = "C:\\Windows\\SysWow64\\mswinsck.ocx" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock.1\CLSID C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock.1\CLSID\ = "{248DD896-BB45-11CF-9ABC-0080C7E7B78D}" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\VersionIndependentProgID C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\ = "{248DD890-BB45-11CF-9ABC-0080C7E7B78D}" C:\Windows\SysWOW64\regsvr32.exe N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD897-BB45-11CF-9ABC-0080C7E7B78D} C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\0\win32 C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Version C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Implemented Categories\{0DE86A57-2BAA-11CF-A229-00AA003D7352} C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D} C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\Version = "1.0" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock\CurVer C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\ProgID C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Programmable C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\MiscStatus C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\0 C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\ = "{248DD890-BB45-11CF-9ABC-0080C7E7B78D}" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D} C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD897-BB45-11CF-9ABC-0080C7E7B78D}\InprocServer32\ = "C:\\Windows\\SysWow64\\mswinsck.ocx" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\ = "{248DD890-BB45-11CF-9ABC-0080C7E7B78D}" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\InprocServer32 C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Version\ = "1.0" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\Version = "1.0" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock\CLSID\ = "{248DD896-BB45-11CF-9ABC-0080C7E7B78D}" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\MiscStatus\1\ = "132497" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\0\win32\ = "C:\\Windows\\SysWow64\\mswinsck.ocx" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\HELPDIR\ C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\ = "IMSWinsockControl" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\ = "Microsoft WinSock Control, version 6.0" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\ProgID\ = "MSWinsock.Winsock.1" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\MiscStatus\ = "0" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\ProxyStubClsid32 C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\ = "{248DD890-BB45-11CF-9ABC-0080C7E7B78D}" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Implemented Categories\{40FC6ED4-2438-11CF-A3DB-080036F12502} C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD897-BB45-11CF-9ABC-0080C7E7B78D} C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD897-BB45-11CF-9ABC-0080C7E7B78D}\ = "Winsock General Property Page Object" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\ProxyStubClsid32 C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\ = "DMSWinsockControlEvents" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock\ = "Microsoft WinSock Control, version 6.0" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Control C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\ToolboxBitmap32 C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D} C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D} C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\Version = "1.0" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D} C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock\CLSID C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\VersionIndependentProgID\ = "MSWinsock.Winsock" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Implemented Categories C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Implemented Categories\{40FC6ED5-2438-11CF-A3DB-080036F12502} C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Implemented Categories\{0DE86A52-2BAA-11CF-A229-00AA003D7352} C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\ = "{248DD890-BB45-11CF-9ABC-0080C7E7B78D}" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\FLAGS C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\HELPDIR C:\Windows\SysWOW64\regsvr32.exe N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D} C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock.1\ = "Microsoft WinSock Control, version 6.0" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0 C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" C:\Windows\SysWOW64\regsvr32.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\e5af47f2a5de064284c2293e627d3652_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e5af47f2a5de064284c2293e627d3652_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e5af47f2a5de064284c2293e627d3652_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e5af47f2a5de064284c2293e627d3652_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e5af47f2a5de064284c2293e627d3652_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e5af47f2a5de064284c2293e627d3652_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e5af47f2a5de064284c2293e627d3652_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e5af47f2a5de064284c2293e627d3652_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e5af47f2a5de064284c2293e627d3652_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e5af47f2a5de064284c2293e627d3652_JaffaCakes118.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\e5af47f2a5de064284c2293e627d3652_JaffaCakes118.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A
N/A N/A C:\Windows\svchosttest.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\e5af47f2a5de064284c2293e627d3652_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\e5af47f2a5de064284c2293e627d3652_JaffaCakes118.exe"

C:\Windows\svchosttest.exe

C:\Windows\svchosttest.exe

C:\Windows\SysWOW64\regsvr32.exe

regsvr32 /s "C:\Windows\system32\mswinsck.ocx"

Network

Country Destination Domain Proto
US 8.8.8.8:53 gogo2326.no-ip.biz udp
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 gogo2326.no-ip.biz udp
US 8.8.8.8:53 140.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 183.142.211.20.in-addr.arpa udp
US 8.8.8.8:53 gogo2326.no-ip.biz udp
US 8.8.8.8:53 154.239.44.20.in-addr.arpa udp
US 8.8.8.8:53 gogo2326.no-ip.biz udp
US 8.8.8.8:53 gogo2326.no-ip.biz udp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 121.118.77.104.in-addr.arpa udp
US 8.8.8.8:53 159.113.53.23.in-addr.arpa udp
US 8.8.8.8:53 gogo2326.no-ip.biz udp
US 8.8.8.8:53 gogo2326.no-ip.biz udp
US 8.8.8.8:53 gogo2326.no-ip.biz udp
US 8.8.8.8:53 gogo2326.no-ip.biz udp
US 8.8.8.8:53 240.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 gogo2326.no-ip.biz udp
US 8.8.8.8:53 gogo2326.no-ip.biz udp
US 8.8.8.8:53 gogo2326.no-ip.biz udp
US 8.8.8.8:53 gogo2326.no-ip.biz udp
US 8.8.8.8:53 19.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 gogo2326.no-ip.biz udp
US 8.8.8.8:53 gogo2326.no-ip.biz udp
US 8.8.8.8:53 gogo2326.no-ip.biz udp
US 8.8.8.8:53 gogo2326.no-ip.biz udp
US 8.8.8.8:53 gogo2326.no-ip.biz udp
US 8.8.8.8:53 gogo2326.no-ip.biz udp
US 8.8.8.8:53 gogo2326.no-ip.biz udp

Files

memory/4548-0-0x0000000000400000-0x0000000000458000-memory.dmp

C:\Windows\svchosttest.exe

MD5 e5af47f2a5de064284c2293e627d3652
SHA1 a5ef3a20453ece3d7a38eded9c4e40729ef544a7
SHA256 9424a5c272106c6f14927fd38aad7fa5fa53c48e55e3affda526ac995da95b20
SHA512 9dd76bcfe9163059b2efd7bc9967191ce406cdd0a308d77a33926a0a026c3dbaa01779e799018fe9d0aa7fe4dbcb8a54d0ae3625367312ceef1fc5d1bc925adb

memory/4548-12-0x0000000000400000-0x0000000000458000-memory.dmp

memory/1316-18-0x0000000010000000-0x0000000010014000-memory.dmp

C:\Windows\SysWOW64\zlib.dll

MD5 200d52d81e9b4b05fa58ce5fbe511dba
SHA1 c0d809ee93816d87388ed4e7fd6fca93d70294d2
SHA256 d4fe89dc2e7775f4ef0dfc70ed6999b8f09635326e05e08a274d464d1814c617
SHA512 7b1df70d76855d65cf246051e7b9f7119720a695d41ace1eb00e45e93e6de80d083b953269166bdee7137dbd9f3e5681e36bb036f151cea383c10d82957f39c5

memory/1316-19-0x00000000020F0000-0x0000000002117000-memory.dmp

C:\Windows\SysWOW64\mswinsck.ocx

MD5 9484c04258830aa3c2f2a70eb041414c
SHA1 b242a4fb0e9dcf14cb51dc36027baff9a79cb823
SHA256 bf7e47c16d7e1c0e88534f4ef95e09d0fd821ed1a06b0d95a389b35364b63ff5
SHA512 9d0e9f0d88594746ba41ea4a61a53498619eda596e12d8ec37d01cfe8ceb08be13e3727c83d630a6d9e6d03066f62444bb94ea5a0d2ed9d21a270e612db532a0

memory/1316-26-0x0000000000400000-0x0000000000458000-memory.dmp

memory/1316-27-0x0000000010000000-0x0000000010014000-memory.dmp

memory/1316-28-0x0000000000400000-0x0000000000458000-memory.dmp

memory/1316-30-0x0000000000400000-0x0000000000458000-memory.dmp

memory/1316-31-0x0000000000400000-0x0000000000458000-memory.dmp

memory/1316-33-0x0000000000400000-0x0000000000458000-memory.dmp

memory/1316-35-0x0000000000400000-0x0000000000458000-memory.dmp

memory/1316-37-0x0000000000400000-0x0000000000458000-memory.dmp

memory/1316-39-0x0000000000400000-0x0000000000458000-memory.dmp

memory/1316-41-0x0000000000400000-0x0000000000458000-memory.dmp

memory/1316-43-0x0000000000400000-0x0000000000458000-memory.dmp

memory/1316-45-0x0000000000400000-0x0000000000458000-memory.dmp

memory/1316-47-0x0000000000400000-0x0000000000458000-memory.dmp

memory/1316-49-0x0000000000400000-0x0000000000458000-memory.dmp

memory/1316-51-0x0000000000400000-0x0000000000458000-memory.dmp

memory/1316-53-0x0000000000400000-0x0000000000458000-memory.dmp