Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20-04-2024 13:48
Static task
static1
Behavioral task
behavioral1
Sample
fce6714ae7c53eee2354c0b477d26d62_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
fce6714ae7c53eee2354c0b477d26d62_JaffaCakes118.exe
-
Size
496KB
-
MD5
fce6714ae7c53eee2354c0b477d26d62
-
SHA1
0a2ea1fed8387ec2bb074e0ebb88052a8396ad56
-
SHA256
199b81b4be4313d12a38102b5572728eb63c4a13fec35e1192bd7f92ec5828bc
-
SHA512
00c68e8a84bac416fca7aebaa49e4458a30dc409dc19e48c4e32cf69b63adb1332b08bad4a00b85dd7e1edbbaab52b75feb545f11439109558e4e9ca74a6d896
-
SSDEEP
12288:zDCPENnBV5jaHBoFvZstQW012B04Ngjw5qu8jxTQlDrLOM:zEEZBV5jCoFvZsSWG2BdN+w2+O
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
Processes:
3men.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" 3men.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
j29oAE.exeduiepuz.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" j29oAE.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" duiepuz.exe -
Disables taskbar notifications via registry modification
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1184 cmd.exe -
Executes dropped EXE 12 IoCs
Processes:
j29oAE.exeduiepuz.exe2men.exe2men.exe2men.exe2men.exe2men.exe2men.exe3men.exe3men.exe3men.exeB2DB.tmppid process 2892 j29oAE.exe 3064 duiepuz.exe 2972 2men.exe 2192 2men.exe 2372 2men.exe 2760 2men.exe 2820 2men.exe 1288 2men.exe 2208 3men.exe 1264 3men.exe 1220 3men.exe 2344 B2DB.tmp -
Loads dropped DLL 17 IoCs
Processes:
fce6714ae7c53eee2354c0b477d26d62_JaffaCakes118.exej29oAE.exeWerFault.exe3men.exepid process 2384 fce6714ae7c53eee2354c0b477d26d62_JaffaCakes118.exe 2384 fce6714ae7c53eee2354c0b477d26d62_JaffaCakes118.exe 2892 j29oAE.exe 2892 j29oAE.exe 2384 fce6714ae7c53eee2354c0b477d26d62_JaffaCakes118.exe 2384 fce6714ae7c53eee2354c0b477d26d62_JaffaCakes118.exe 2164 WerFault.exe 2164 WerFault.exe 2164 WerFault.exe 2164 WerFault.exe 2164 WerFault.exe 2164 WerFault.exe 2164 WerFault.exe 2384 fce6714ae7c53eee2354c0b477d26d62_JaffaCakes118.exe 2384 fce6714ae7c53eee2354c0b477d26d62_JaffaCakes118.exe 2208 3men.exe 2208 3men.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral1/memory/2192-40-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral1/memory/2192-42-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral1/memory/2192-46-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral1/memory/2192-51-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral1/memory/2192-53-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral1/memory/2192-55-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral1/memory/2372-56-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/2372-52-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/2372-62-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/2372-66-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/2372-65-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/2760-70-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral1/memory/2760-75-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral1/memory/2760-72-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral1/memory/2760-81-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral1/memory/2760-83-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral1/memory/2820-80-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral1/memory/2372-68-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/2820-86-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral1/memory/2760-85-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral1/memory/2820-93-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral1/memory/2820-90-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral1/memory/2820-95-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral1/memory/2820-97-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral1/memory/2192-117-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral1/memory/2208-120-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2760-124-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral1/memory/2820-125-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral1/memory/2208-136-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1264-139-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1264-138-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1220-248-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2208-246-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1264-419-0x0000000000590000-0x0000000000690000-memory.dmp upx -
Adds Run key to start application 2 TTPs 53 IoCs
Processes:
duiepuz.exe3men.exej29oAE.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\duiepuz = "C:\\Users\\Admin\\duiepuz.exe /h" duiepuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\duiepuz = "C:\\Users\\Admin\\duiepuz.exe /u" duiepuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\duiepuz = "C:\\Users\\Admin\\duiepuz.exe /N" duiepuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\duiepuz = "C:\\Users\\Admin\\duiepuz.exe /H" duiepuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\duiepuz = "C:\\Users\\Admin\\duiepuz.exe /a" duiepuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\duiepuz = "C:\\Users\\Admin\\duiepuz.exe /L" duiepuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\duiepuz = "C:\\Users\\Admin\\duiepuz.exe /f" duiepuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\duiepuz = "C:\\Users\\Admin\\duiepuz.exe /i" duiepuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\duiepuz = "C:\\Users\\Admin\\duiepuz.exe /A" duiepuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\duiepuz = "C:\\Users\\Admin\\duiepuz.exe /V" duiepuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\duiepuz = "C:\\Users\\Admin\\duiepuz.exe /Q" duiepuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\duiepuz = "C:\\Users\\Admin\\duiepuz.exe /z" duiepuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\duiepuz = "C:\\Users\\Admin\\duiepuz.exe /g" duiepuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\duiepuz = "C:\\Users\\Admin\\duiepuz.exe /c" duiepuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\duiepuz = "C:\\Users\\Admin\\duiepuz.exe /I" duiepuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\duiepuz = "C:\\Users\\Admin\\duiepuz.exe /j" duiepuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\duiepuz = "C:\\Users\\Admin\\duiepuz.exe /Z" duiepuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\duiepuz = "C:\\Users\\Admin\\duiepuz.exe /U" duiepuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\duiepuz = "C:\\Users\\Admin\\duiepuz.exe /F" duiepuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\duiepuz = "C:\\Users\\Admin\\duiepuz.exe /m" duiepuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\duiepuz = "C:\\Users\\Admin\\duiepuz.exe /R" duiepuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\duiepuz = "C:\\Users\\Admin\\duiepuz.exe /t" duiepuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\duiepuz = "C:\\Users\\Admin\\duiepuz.exe /k" duiepuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\duiepuz = "C:\\Users\\Admin\\duiepuz.exe /y" duiepuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\duiepuz = "C:\\Users\\Admin\\duiepuz.exe /o" duiepuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\duiepuz = "C:\\Users\\Admin\\duiepuz.exe /C" duiepuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\duiepuz = "C:\\Users\\Admin\\duiepuz.exe /p" duiepuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\duiepuz = "C:\\Users\\Admin\\duiepuz.exe /W" duiepuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\duiepuz = "C:\\Users\\Admin\\duiepuz.exe /M" duiepuz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\A8C.exe = "C:\\Program Files (x86)\\LP\\A672\\A8C.exe" 3men.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\duiepuz = "C:\\Users\\Admin\\duiepuz.exe /J" duiepuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\duiepuz = "C:\\Users\\Admin\\duiepuz.exe /O" duiepuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\duiepuz = "C:\\Users\\Admin\\duiepuz.exe /l" duiepuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\duiepuz = "C:\\Users\\Admin\\duiepuz.exe /w" duiepuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\duiepuz = "C:\\Users\\Admin\\duiepuz.exe /v" duiepuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\duiepuz = "C:\\Users\\Admin\\duiepuz.exe /b" duiepuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\duiepuz = "C:\\Users\\Admin\\duiepuz.exe /P" duiepuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\duiepuz = "C:\\Users\\Admin\\duiepuz.exe /x" duiepuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\duiepuz = "C:\\Users\\Admin\\duiepuz.exe /r" duiepuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\duiepuz = "C:\\Users\\Admin\\duiepuz.exe /E" duiepuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\duiepuz = "C:\\Users\\Admin\\duiepuz.exe /X" duiepuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\duiepuz = "C:\\Users\\Admin\\duiepuz.exe /T" duiepuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\duiepuz = "C:\\Users\\Admin\\duiepuz.exe /n" duiepuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\duiepuz = "C:\\Users\\Admin\\duiepuz.exe /e" duiepuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\duiepuz = "C:\\Users\\Admin\\duiepuz.exe /B" duiepuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\duiepuz = "C:\\Users\\Admin\\duiepuz.exe /Y" duiepuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\duiepuz = "C:\\Users\\Admin\\duiepuz.exe /D" duiepuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\duiepuz = "C:\\Users\\Admin\\duiepuz.exe /t" j29oAE.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\duiepuz = "C:\\Users\\Admin\\duiepuz.exe /G" duiepuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\duiepuz = "C:\\Users\\Admin\\duiepuz.exe /S" duiepuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\duiepuz = "C:\\Users\\Admin\\duiepuz.exe /q" duiepuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\duiepuz = "C:\\Users\\Admin\\duiepuz.exe /d" duiepuz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\duiepuz = "C:\\Users\\Admin\\duiepuz.exe /K" duiepuz.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
2men.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 2men.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 2men.exe -
Suspicious use of SetThreadContext 5 IoCs
Processes:
2men.exedescription pid process target process PID 2972 set thread context of 2192 2972 2men.exe 2men.exe PID 2972 set thread context of 2372 2972 2men.exe 2men.exe PID 2972 set thread context of 2760 2972 2men.exe 2men.exe PID 2972 set thread context of 2820 2972 2men.exe 2men.exe PID 2972 set thread context of 1288 2972 2men.exe 2men.exe -
Drops file in Program Files directory 3 IoCs
Processes:
3men.exedescription ioc process File created C:\Program Files (x86)\LP\A672\A8C.exe 3men.exe File opened for modification C:\Program Files (x86)\LP\A672\B2DB.tmp 3men.exe File opened for modification C:\Program Files (x86)\LP\A672\A8C.exe 3men.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2164 2372 WerFault.exe 2men.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
Processes:
tasklist.exetasklist.exepid process 2600 tasklist.exe 2132 tasklist.exe -
Modifies registry class 5 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_Classes\Local Settings explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
j29oAE.exe2men.exeduiepuz.exe3men.exepid process 2892 j29oAE.exe 2892 j29oAE.exe 2760 2men.exe 3064 duiepuz.exe 3064 duiepuz.exe 3064 duiepuz.exe 2760 2men.exe 3064 duiepuz.exe 3064 duiepuz.exe 3064 duiepuz.exe 3064 duiepuz.exe 2208 3men.exe 2208 3men.exe 2208 3men.exe 2208 3men.exe 2208 3men.exe 2208 3men.exe 3064 duiepuz.exe 3064 duiepuz.exe 3064 duiepuz.exe 3064 duiepuz.exe 3064 duiepuz.exe 3064 duiepuz.exe 3064 duiepuz.exe 3064 duiepuz.exe 3064 duiepuz.exe 3064 duiepuz.exe 3064 duiepuz.exe 3064 duiepuz.exe 3064 duiepuz.exe 3064 duiepuz.exe 3064 duiepuz.exe 3064 duiepuz.exe 3064 duiepuz.exe 3064 duiepuz.exe 3064 duiepuz.exe 3064 duiepuz.exe 3064 duiepuz.exe 3064 duiepuz.exe 3064 duiepuz.exe 3064 duiepuz.exe 3064 duiepuz.exe 3064 duiepuz.exe 3064 duiepuz.exe 3064 duiepuz.exe 3064 duiepuz.exe 3064 duiepuz.exe 2208 3men.exe 2208 3men.exe 2208 3men.exe 2208 3men.exe 2208 3men.exe 2208 3men.exe 2208 3men.exe 2208 3men.exe 3064 duiepuz.exe 3064 duiepuz.exe 3064 duiepuz.exe 3064 duiepuz.exe 3064 duiepuz.exe 3064 duiepuz.exe 3064 duiepuz.exe 3064 duiepuz.exe 3064 duiepuz.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
Processes:
tasklist.exemsiexec.exetasklist.exeexplorer.exedescription pid process Token: SeDebugPrivilege 2600 tasklist.exe Token: SeRestorePrivilege 1812 msiexec.exe Token: SeTakeOwnershipPrivilege 1812 msiexec.exe Token: SeSecurityPrivilege 1812 msiexec.exe Token: SeDebugPrivilege 2132 tasklist.exe Token: SeShutdownPrivilege 1768 explorer.exe Token: SeShutdownPrivilege 1768 explorer.exe Token: SeShutdownPrivilege 1768 explorer.exe Token: SeShutdownPrivilege 1768 explorer.exe Token: SeShutdownPrivilege 1768 explorer.exe Token: SeShutdownPrivilege 1768 explorer.exe Token: SeShutdownPrivilege 1768 explorer.exe Token: SeShutdownPrivilege 1768 explorer.exe Token: SeShutdownPrivilege 1768 explorer.exe Token: SeShutdownPrivilege 1768 explorer.exe Token: SeShutdownPrivilege 1768 explorer.exe Token: SeShutdownPrivilege 1768 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
Processes:
explorer.exepid process 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
Processes:
explorer.exepid process 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe 1768 explorer.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
fce6714ae7c53eee2354c0b477d26d62_JaffaCakes118.exej29oAE.exeduiepuz.exe2men.exe2men.exe2men.exepid process 2384 fce6714ae7c53eee2354c0b477d26d62_JaffaCakes118.exe 2892 j29oAE.exe 3064 duiepuz.exe 2972 2men.exe 2192 2men.exe 2820 2men.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
fce6714ae7c53eee2354c0b477d26d62_JaffaCakes118.exej29oAE.execmd.exe2men.exe2men.exedescription pid process target process PID 2384 wrote to memory of 2892 2384 fce6714ae7c53eee2354c0b477d26d62_JaffaCakes118.exe j29oAE.exe PID 2384 wrote to memory of 2892 2384 fce6714ae7c53eee2354c0b477d26d62_JaffaCakes118.exe j29oAE.exe PID 2384 wrote to memory of 2892 2384 fce6714ae7c53eee2354c0b477d26d62_JaffaCakes118.exe j29oAE.exe PID 2384 wrote to memory of 2892 2384 fce6714ae7c53eee2354c0b477d26d62_JaffaCakes118.exe j29oAE.exe PID 2892 wrote to memory of 3064 2892 j29oAE.exe duiepuz.exe PID 2892 wrote to memory of 3064 2892 j29oAE.exe duiepuz.exe PID 2892 wrote to memory of 3064 2892 j29oAE.exe duiepuz.exe PID 2892 wrote to memory of 3064 2892 j29oAE.exe duiepuz.exe PID 2892 wrote to memory of 2648 2892 j29oAE.exe cmd.exe PID 2892 wrote to memory of 2648 2892 j29oAE.exe cmd.exe PID 2892 wrote to memory of 2648 2892 j29oAE.exe cmd.exe PID 2892 wrote to memory of 2648 2892 j29oAE.exe cmd.exe PID 2648 wrote to memory of 2600 2648 cmd.exe tasklist.exe PID 2648 wrote to memory of 2600 2648 cmd.exe tasklist.exe PID 2648 wrote to memory of 2600 2648 cmd.exe tasklist.exe PID 2648 wrote to memory of 2600 2648 cmd.exe tasklist.exe PID 2384 wrote to memory of 2972 2384 fce6714ae7c53eee2354c0b477d26d62_JaffaCakes118.exe 2men.exe PID 2384 wrote to memory of 2972 2384 fce6714ae7c53eee2354c0b477d26d62_JaffaCakes118.exe 2men.exe PID 2384 wrote to memory of 2972 2384 fce6714ae7c53eee2354c0b477d26d62_JaffaCakes118.exe 2men.exe PID 2384 wrote to memory of 2972 2384 fce6714ae7c53eee2354c0b477d26d62_JaffaCakes118.exe 2men.exe PID 2972 wrote to memory of 2192 2972 2men.exe 2men.exe PID 2972 wrote to memory of 2192 2972 2men.exe 2men.exe PID 2972 wrote to memory of 2192 2972 2men.exe 2men.exe PID 2972 wrote to memory of 2192 2972 2men.exe 2men.exe PID 2972 wrote to memory of 2192 2972 2men.exe 2men.exe PID 2972 wrote to memory of 2192 2972 2men.exe 2men.exe PID 2972 wrote to memory of 2192 2972 2men.exe 2men.exe PID 2972 wrote to memory of 2192 2972 2men.exe 2men.exe PID 2972 wrote to memory of 2372 2972 2men.exe 2men.exe PID 2972 wrote to memory of 2372 2972 2men.exe 2men.exe PID 2972 wrote to memory of 2372 2972 2men.exe 2men.exe PID 2972 wrote to memory of 2372 2972 2men.exe 2men.exe PID 2972 wrote to memory of 2372 2972 2men.exe 2men.exe PID 2972 wrote to memory of 2372 2972 2men.exe 2men.exe PID 2972 wrote to memory of 2372 2972 2men.exe 2men.exe PID 2972 wrote to memory of 2372 2972 2men.exe 2men.exe PID 2972 wrote to memory of 2760 2972 2men.exe 2men.exe PID 2972 wrote to memory of 2760 2972 2men.exe 2men.exe PID 2972 wrote to memory of 2760 2972 2men.exe 2men.exe PID 2972 wrote to memory of 2760 2972 2men.exe 2men.exe PID 2972 wrote to memory of 2760 2972 2men.exe 2men.exe PID 2972 wrote to memory of 2760 2972 2men.exe 2men.exe PID 2972 wrote to memory of 2760 2972 2men.exe 2men.exe PID 2972 wrote to memory of 2760 2972 2men.exe 2men.exe PID 2972 wrote to memory of 2820 2972 2men.exe 2men.exe PID 2972 wrote to memory of 2820 2972 2men.exe 2men.exe PID 2972 wrote to memory of 2820 2972 2men.exe 2men.exe PID 2972 wrote to memory of 2820 2972 2men.exe 2men.exe PID 2972 wrote to memory of 2820 2972 2men.exe 2men.exe PID 2972 wrote to memory of 2820 2972 2men.exe 2men.exe PID 2972 wrote to memory of 2820 2972 2men.exe 2men.exe PID 2972 wrote to memory of 2820 2972 2men.exe 2men.exe PID 2972 wrote to memory of 1288 2972 2men.exe 2men.exe PID 2972 wrote to memory of 1288 2972 2men.exe 2men.exe PID 2972 wrote to memory of 1288 2972 2men.exe 2men.exe PID 2972 wrote to memory of 1288 2972 2men.exe 2men.exe PID 2372 wrote to memory of 2164 2372 2men.exe WerFault.exe PID 2372 wrote to memory of 2164 2372 2men.exe WerFault.exe PID 2372 wrote to memory of 2164 2372 2men.exe WerFault.exe PID 2372 wrote to memory of 2164 2372 2men.exe WerFault.exe PID 2972 wrote to memory of 1288 2972 2men.exe 2men.exe PID 2384 wrote to memory of 2208 2384 fce6714ae7c53eee2354c0b477d26d62_JaffaCakes118.exe 3men.exe PID 2384 wrote to memory of 2208 2384 fce6714ae7c53eee2354c0b477d26d62_JaffaCakes118.exe 3men.exe PID 2384 wrote to memory of 2208 2384 fce6714ae7c53eee2354c0b477d26d62_JaffaCakes118.exe 3men.exe -
System policy modification 1 TTPs 2 IoCs
Processes:
3men.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 3men.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" 3men.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\fce6714ae7c53eee2354c0b477d26d62_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fce6714ae7c53eee2354c0b477d26d62_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\j29oAE.exeC:\Users\Admin\j29oAE.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Users\Admin\duiepuz.exe"C:\Users\Admin\duiepuz.exe"3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3064
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del j29oAE.exe3⤵
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2600
-
-
-
-
C:\Users\Admin\2men.exeC:\Users\Admin\2men.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Users\Admin\2men.exe"C:\Users\Admin\2men.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2192
-
-
C:\Users\Admin\2men.exe"C:\Users\Admin\2men.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2372 -s 884⤵
- Loads dropped DLL
- Program crash
PID:2164
-
-
-
C:\Users\Admin\2men.exe"C:\Users\Admin\2men.exe"3⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
PID:2760
-
-
C:\Users\Admin\2men.exe"C:\Users\Admin\2men.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2820
-
-
C:\Users\Admin\2men.exe"C:\Users\Admin\2men.exe"3⤵
- Executes dropped EXE
PID:1288
-
-
-
C:\Users\Admin\3men.exeC:\Users\Admin\3men.exe2⤵
- Modifies security service
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- System policy modification
PID:2208 -
C:\Users\Admin\3men.exeC:\Users\Admin\3men.exe startC:\Users\Admin\AppData\Roaming\22D29\993A6.exe%C:\Users\Admin\AppData\Roaming\22D293⤵
- Executes dropped EXE
PID:1264
-
-
C:\Users\Admin\3men.exeC:\Users\Admin\3men.exe startC:\Program Files (x86)\29EE3\lvvm.exe%C:\Program Files (x86)\29EE33⤵
- Executes dropped EXE
PID:1220
-
-
C:\Program Files (x86)\LP\A672\B2DB.tmp"C:\Program Files (x86)\LP\A672\B2DB.tmp"3⤵
- Executes dropped EXE
PID:2344
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del fce6714ae7c53eee2354c0b477d26d62_JaffaCakes118.exe2⤵
- Deletes itself
PID:1184 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2132
-
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1812
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1768
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
600B
MD5bb789f30fbd9b6e7d095fd3906885f3d
SHA14825f71f89df8f38ac63dce46c9143c7cbc3530a
SHA2563e9933b2343cd16cd1005529655ce0f9aae9bcb2a3c5216e9a4377d9f70e9002
SHA512f88020186662f0b781fcbb9102edb87ec22f85045eb285af2b24aca5cc53c0e1e690e6a00475c92aa13389431d16965d65f46b1e63b76181c25bfb44f655c301
-
Filesize
996B
MD59a62eaff507b873fd36324bcaf79df75
SHA1d266645a05e0590b86bd3e008dc9c632d69a69a0
SHA256d20f8ec3827dd121ab3634ad58873157c569efcf0f8fca653026d9fc0a7fba76
SHA512a1ae9aa1f28021a6ab6ef57c9bfeb67761848da2f6a3f0c8cd975253026a048e72ee7d52049cb207358c651d3d344b5955f4708c799ff49dd7cc785874440573
-
Filesize
1KB
MD554aae721054d705871b106688a6c2f17
SHA1dfce1c43c1d3a6e28f23d59f5800fc744b854bdd
SHA256a4e117b2d912c1600c02452509bbda8fe8a233dfbad085bd9abf4f643a34b2e2
SHA512d0e5f3fd501681732c6ad26cad7d631a195bcd24345cf9dd3ead2e8756ff29b615d0dca0de30d2cdd0df8d3fbe5252639754381f437c6aa1286ba3d096c4f47c
-
Filesize
96KB
MD56b9ed8570a1857126c8bf99e0663926c
SHA194e08d8a0be09be35f37a9b17ec2130febfa2074
SHA256888e4e571a6f78ee81d94ab56bd033d413f9160f1089073176b03c91878aae2d
SHA51223211a1b71f1d05ad7f003231da826220ac4940e48071135cc3fba14708123fa0292e2e71c294a8086d8dc5f90dd32c4da3b41e6857c56f38cb325d78cb14880
-
Filesize
132KB
MD5945a713b037b50442ec5d18d3dc0d55e
SHA12c8881b327a79fafcce27479b78f05487d93c802
SHA2562da470571a64bcdeb56f62c916ee2bffa87ccc6c028b7c8cb0132d09bceedd2f
SHA5120eab4bb5d04725cc20e463ae6959f71064674602f8ee7b3c9b2db75e928b9a0b1bdc94233dc261f6277d02e54a443b42a59b12aaebb8bbf243f0940344fbf385
-
Filesize
271KB
MD50d668203e24463de2bf228f00443b7bc
SHA1eacff981d71f6648f6315e508bfd75e11683dba8
SHA256509d530e99839d7dbc8fccac163420d9dc455fb478fa57fdec1b7a2ef629d7bc
SHA5123251bb1341bd466e71468d72723bd5cf545dbd232327f343b44c51daae8755ed3caa02f74adbb0304912769346fa90dfa4c7036c211836e5650bdb06993ba803
-
Filesize
176KB
MD500be1d6fcd0a1f6f906378856ec3c405
SHA1d414fd68e0abde8ee9e44bccb25301ed614dab1a
SHA256593e6e2ff77e68bf785ef470dd0bdddf153290c5b5cdbe5e36933d824be3e413
SHA5121fc6d3d70b661b7d6cdd6852873f9f37a667b10a96a9c142ca8210dcb3b24bc5e80e9d58e27bccc6d922304319ba448649cb6e3608ad59d518ce020e83b57c0e
-
Filesize
176KB
MD5c4a634088e095eab98183984bb7252d8
SHA1c205f2c1f8040c9205c6c06accd75c0396c59781
SHA256db345985313397a39cc2817134315c8db71ab4c48680e62c0358db406b0eff6a
SHA512b6a30f6d5cc30bee9b9d483629f16c80c5338360cec629f9ee2a3307b73b9743fd71396e408ac72008b84f4b8fded26002c910421853253b52b8b4d530df7a8e