Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
29/04/2024, 09:20
Static task
static1
Behavioral task
behavioral1
Sample
07537a8f7e1a4207eb82c253fe296a8f_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
07537a8f7e1a4207eb82c253fe296a8f_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
07537a8f7e1a4207eb82c253fe296a8f_JaffaCakes118.exe
-
Size
5.5MB
-
MD5
07537a8f7e1a4207eb82c253fe296a8f
-
SHA1
85d2beb1cd30e8342eabacb82bcdaa9f01018857
-
SHA256
b30e0fbf03f4bc7481aae8d625a127105c8a601096408f99ed62878a9579425e
-
SHA512
c29529f41f382b66a77952949795bb0bb48127070db97436cf1efa3538a257a0e562824177665aa570c5d11adf17ab7cc5d66f0c9aca76d8b85d82a8fb7d269a
-
SSDEEP
98304:XfN28AUgZFJiJaOht/IIn3qWw7spWOpJoCt6XEki7/A5DDyb3dQLBDlhaHkwEA5L:vA7UgZFJiJJ/IIn1YOICtENJ5D2ZoBO7
Malware Config
Extracted
azorult
http://163.172.175.132/1A6B3831-A96D-4936-815A-6F7C904EF9C0/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/memory/4812-229-0x0000000000400000-0x0000000000919000-memory.dmp family_kpot -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\DRIVERS\SET4537.tmp rundll32.exe File created C:\Windows\system32\DRIVERS\SET4537.tmp rundll32.exe File opened for modification C:\Windows\system32\DRIVERS\CisUtMonitor.sys rundll32.exe -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation UninstallTool.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Setup1829.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation 1.tmp Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation UninstallTool.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation UninstallTool.exe -
Executes dropped EXE 12 IoCs
pid Process 4812 File002.exe 4760 Setup1829.exe 3128 File001.exe 1284 1.exe 4328 1.tmp 4308 UninstallTool.exe 3480 UninstallTool.exe 452 UninstallTool.exe 2156 UninstallTool.exe 1184 UninstallToolExec.exe 4216 UninstallTool.exe 2312 UninstallToolHelper.exe -
Loads dropped DLL 3 IoCs
pid Process 1044 regsvr32.exe 4936 regsvr32.exe 2156 UninstallTool.exe -
Modifies system executable filetype association 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\ContextMenuHandlers\{FE8E6AD6-DABE-45e1-88C2-48DC4578924C} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\ContextMenuHandlers\{FE8E6AD6-DABE-45e1-88C2-48DC4578924C}\ = "UTShellExt" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\ContextMenuHandlers\{FE8E6AD6-DABE-45e1-88C2-48DC4578924C} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\ContextMenuHandlers\{FE8E6AD6-DABE-45e1-88C2-48DC4578924C}\ = "UTShellExt" regsvr32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Registers COM server for autorun 1 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{FE8E6AD6-DABE-45e1-88C2-48DC4578924C}\InProcServer32\ = "C:\\Program Files\\Uninstall Tool\\utshellext.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{FE8E6AD6-DABE-45e1-88C2-48DC4578924C}\InProcServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{FE8E6AD6-DABE-45e1-88C2-48DC4578924C}\InProcServer32 regsvr32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\GrpConv = "grpconv -o" rundll32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA UninstallToolExec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1492 07537a8f7e1a4207eb82c253fe296a8f_JaffaCakes118.exe -
Drops file in Program Files directory 57 IoCs
description ioc Process File created C:\Program Files\Uninstall Tool\languages\is-2DKIE.tmp 1.tmp File created C:\Program Files\Uninstall Tool\is-L8B25.tmp 1.tmp File opened for modification C:\Program Files\Uninstall Tool\unins000.dat 1.tmp File created C:\Program Files\Uninstall Tool\unins000.dat 1.tmp File created C:\Program Files\Uninstall Tool\languages\is-361L5.tmp 1.tmp File created C:\Program Files\Uninstall Tool\languages\is-M4T5E.tmp 1.tmp File created C:\Program Files\Uninstall Tool\languages\is-BPU2V.tmp 1.tmp File created C:\Program Files\Uninstall Tool\languages\is-0VACE.tmp 1.tmp File created C:\Program Files\Uninstall Tool\languages\is-E52DO.tmp 1.tmp File created C:\Program Files\Uninstall Tool\languages\is-QG8SO.tmp 1.tmp File created C:\Program Files\Uninstall Tool\languages\is-RCJ4G.tmp 1.tmp File created C:\Program Files\Uninstall Tool\languages\is-28J1T.tmp 1.tmp File created C:\Program Files\Uninstall Tool\languages\is-TKVT9.tmp 1.tmp File created C:\Program Files\Uninstall Tool\languages\is-NT2V2.tmp 1.tmp File created C:\Program Files\Uninstall Tool\languages\is-7SL6D.tmp 1.tmp File created C:\Program Files\Uninstall Tool\languages\is-BQ4AS.tmp 1.tmp File created C:\Program Files\Uninstall Tool\languages\is-JJIJ6.tmp 1.tmp File opened for modification C:\Program Files (x86)\Crystall Idea\Uninstall Tool\1.exe Setup1829.exe File created C:\Program Files\Uninstall Tool\languages\is-079DV.tmp 1.tmp File created C:\Program Files\Uninstall Tool\languages\is-IIDM2.tmp 1.tmp File created C:\Program Files\Uninstall Tool\languages\is-K6KGA.tmp 1.tmp File created C:\Program Files (x86)\Crystall Idea\Uninstall Tool\Uninstall.ini Setup1829.exe File created C:\Program Files\Uninstall Tool\languages\is-N7PB1.tmp 1.tmp File created C:\Program Files\Uninstall Tool\is-Q10GD.tmp 1.tmp File created C:\Program Files\Uninstall Tool\languages\is-Q19MQ.tmp 1.tmp File created C:\Program Files\Uninstall Tool\languages\is-F490I.tmp 1.tmp File created C:\Program Files\Uninstall Tool\languages\is-HFQL9.tmp 1.tmp File created C:\Program Files\Uninstall Tool\is-V0QFH.tmp 1.tmp File created C:\Program Files\Uninstall Tool\languages\is-GGD1L.tmp 1.tmp File created C:\Program Files\Uninstall Tool\languages\is-466IU.tmp 1.tmp File created C:\Program Files\Uninstall Tool\languages\is-GJ198.tmp 1.tmp File created C:\Program Files\Uninstall Tool\languages\is-KK0D3.tmp 1.tmp File created C:\Program Files\Uninstall Tool\languages\is-UK3CK.tmp 1.tmp File created C:\Program Files\Uninstall Tool\is-PN37O.tmp 1.tmp File created C:\Program Files\Uninstall Tool\unins000.msg 1.tmp File created C:\Program Files\Uninstall Tool\languages\is-RC8NH.tmp 1.tmp File created C:\Program Files\Uninstall Tool\languages\is-O0NAT.tmp 1.tmp File created C:\Program Files\Uninstall Tool\is-C3VEL.tmp 1.tmp File opened for modification C:\Program Files\Uninstall Tool\UninstallTool.url 1.tmp File created C:\Program Files\Uninstall Tool\languages\is-0OEBL.tmp 1.tmp File created C:\Program Files\Uninstall Tool\languages\is-77MF9.tmp 1.tmp File created C:\Program Files\Uninstall Tool\languages\is-AAM0U.tmp 1.tmp File created C:\Program Files\Uninstall Tool\languages\is-P0S4C.tmp 1.tmp File created C:\Program Files\Uninstall Tool\languages\is-SUTUI.tmp 1.tmp File created C:\Program Files\Uninstall Tool\languages\is-PLP6B.tmp 1.tmp File created C:\Program Files\Uninstall Tool\is-46J2I.tmp 1.tmp File created C:\Program Files\Uninstall Tool\languages\is-JK4CO.tmp 1.tmp File created C:\Program Files\Uninstall Tool\languages\is-OKH1J.tmp 1.tmp File created C:\Program Files\Uninstall Tool\is-R1UP4.tmp 1.tmp File opened for modification C:\Program Files (x86)\Crystall Idea\Uninstall Tool\Uninstall.exe Setup1829.exe File created C:\Program Files\Uninstall Tool\languages\is-9ASE9.tmp 1.tmp File created C:\Program Files\Uninstall Tool\is-0THSH.tmp 1.tmp File created C:\Program Files\Uninstall Tool\languages\is-MQB0U.tmp 1.tmp File created C:\Program Files\Uninstall Tool\languages\is-TN7GL.tmp 1.tmp File created C:\Program Files\Uninstall Tool\is-I6DQP.tmp 1.tmp File created C:\Program Files\Uninstall Tool\languages\is-KGC1E.tmp 1.tmp File created C:\Program Files\Uninstall Tool\languages\is-EQLHC.tmp 1.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3520 4812 WerFault.exe 92 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 runonce.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz runonce.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{BE92B574-0609-11EF-B865-F24B122C2885} = "0" iexplore.exe -
Modifies registry class 32 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\ContextMenuHandlers\{FE8E6AD6-DABE-45e1-88C2-48DC4578924C} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9ce424a8-8388-495f-a400-2bd50eb35657}\ = "Uninstall Tool" UninstallTool.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9ce424a8-8388-495f-a400-2bd50eb35657}\System.ControlPanel.Category = "5,8" UninstallTool.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9ce424a8-8388-495f-a400-2bd50eb35657}\Shell UninstallTool.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{FE8E6AD6-DABE-45e1-88C2-48DC4578924C}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FE8E6AD6-DABE-45e1-88C2-48DC4578924C}\ = "UTShellExt" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\ContextMenuHandlers\{FE8E6AD6-DABE-45e1-88C2-48DC4578924C}\ = "UTShellExt" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Msi.Package\shellex\ContextMenuHandlers\{FE8E6AD6-DABE-45e1-88C2-48DC4578924C}\ = "UTShellExt" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9ce424a8-8388-495f-a400-2bd50eb35657}\InfoTip = "Uninstall Programs Completely. Install and Trace Software. Manage Startup Programs" UninstallTool.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9ce424a8-8388-495f-a400-2bd50eb35657}\Shell\Open\Command\ = "C:\\Program Files\\Uninstall Tool\\UninstallToolExec.exe" UninstallTool.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{FE8E6AD6-DABE-45e1-88C2-48DC4578924C} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{FE8E6AD6-DABE-45e1-88C2-48DC4578924C}\InProcServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Msi.Package\shellex\ContextMenuHandlers\{FE8E6AD6-DABE-45e1-88C2-48DC4578924C} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9ce424a8-8388-495f-a400-2bd50eb35657}\Shell\Open\Command UninstallTool.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9ce424a8-8388-495f-a400-2bd50eb35657}\InfoTip = "Uninstall Programs Completely. Install and Trace Software. Manage Startup Programs" UninstallTool.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Msi.Package\shellex\ContextMenuHandlers\{FE8E6AD6-DABE-45e1-88C2-48DC4578924C}\ = "UTShellExt" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FE8E6AD6-DABE-45e1-88C2-48DC4578924C} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9ce424a8-8388-495f-a400-2bd50eb35657} UninstallTool.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9ce424a8-8388-495f-a400-2bd50eb35657}\DefaultIcon UninstallTool.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ UninstallTool.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{FE8E6AD6-DABE-45e1-88C2-48DC4578924C}\InProcServer32\ = "C:\\Program Files\\Uninstall Tool\\utshellext.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FE8E6AD6-DABE-45e1-88C2-48DC4578924C}\InProcServer32\ = "C:\\Program Files\\Uninstall Tool\\utshellext_x86.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FE8E6AD6-DABE-45e1-88C2-48DC4578924C}\InProcServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID UninstallTool.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9ce424a8-8388-495f-a400-2bd50eb35657}\Shell\Open UninstallTool.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{FE8E6AD6-DABE-45e1-88C2-48DC4578924C}\ = "UTShellExt" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\ContextMenuHandlers\{FE8E6AD6-DABE-45e1-88C2-48DC4578924C}\ = "UTShellExt" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Msi.Package\shellex\ContextMenuHandlers\{FE8E6AD6-DABE-45e1-88C2-48DC4578924C} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FE8E6AD6-DABE-45e1-88C2-48DC4578924C}\InProcServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\ContextMenuHandlers\{FE8E6AD6-DABE-45e1-88C2-48DC4578924C} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9ce424a8-8388-495f-a400-2bd50eb35657}\DefaultIcon\ = "C:\\Program Files\\Uninstall Tool\\UninstallToolExec.exe" UninstallTool.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\Local Settings UninstallTool.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1492 07537a8f7e1a4207eb82c253fe296a8f_JaffaCakes118.exe 1492 07537a8f7e1a4207eb82c253fe296a8f_JaffaCakes118.exe 4812 File002.exe 4812 File002.exe 4216 UninstallTool.exe 4216 UninstallTool.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4216 UninstallTool.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4328 1.tmp 1680 iexplore.exe -
Suspicious use of SetWindowsHookEx 17 IoCs
pid Process 1680 iexplore.exe 1680 iexplore.exe 4308 UninstallTool.exe 4356 IEXPLORE.EXE 4356 IEXPLORE.EXE 3480 UninstallTool.exe 452 UninstallTool.exe 2156 UninstallTool.exe 4216 UninstallTool.exe 4216 UninstallTool.exe 4216 UninstallTool.exe 4216 UninstallTool.exe 4216 UninstallTool.exe 4216 UninstallTool.exe 4216 UninstallTool.exe 4216 UninstallTool.exe 4216 UninstallTool.exe -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 1492 wrote to memory of 1212 1492 07537a8f7e1a4207eb82c253fe296a8f_JaffaCakes118.exe 86 PID 1492 wrote to memory of 1212 1492 07537a8f7e1a4207eb82c253fe296a8f_JaffaCakes118.exe 86 PID 1492 wrote to memory of 1212 1492 07537a8f7e1a4207eb82c253fe296a8f_JaffaCakes118.exe 86 PID 1492 wrote to memory of 2768 1492 07537a8f7e1a4207eb82c253fe296a8f_JaffaCakes118.exe 87 PID 1492 wrote to memory of 2768 1492 07537a8f7e1a4207eb82c253fe296a8f_JaffaCakes118.exe 87 PID 1492 wrote to memory of 2768 1492 07537a8f7e1a4207eb82c253fe296a8f_JaffaCakes118.exe 87 PID 1492 wrote to memory of 4620 1492 07537a8f7e1a4207eb82c253fe296a8f_JaffaCakes118.exe 88 PID 1492 wrote to memory of 4620 1492 07537a8f7e1a4207eb82c253fe296a8f_JaffaCakes118.exe 88 PID 1492 wrote to memory of 4620 1492 07537a8f7e1a4207eb82c253fe296a8f_JaffaCakes118.exe 88 PID 4620 wrote to memory of 4812 4620 cmd.exe 92 PID 4620 wrote to memory of 4812 4620 cmd.exe 92 PID 4620 wrote to memory of 4812 4620 cmd.exe 92 PID 2768 wrote to memory of 3128 2768 cmd.exe 94 PID 2768 wrote to memory of 3128 2768 cmd.exe 94 PID 2768 wrote to memory of 3128 2768 cmd.exe 94 PID 1212 wrote to memory of 4760 1212 cmd.exe 93 PID 1212 wrote to memory of 4760 1212 cmd.exe 93 PID 1212 wrote to memory of 4760 1212 cmd.exe 93 PID 4760 wrote to memory of 1284 4760 Setup1829.exe 95 PID 4760 wrote to memory of 1284 4760 Setup1829.exe 95 PID 4760 wrote to memory of 1284 4760 Setup1829.exe 95 PID 1284 wrote to memory of 4328 1284 1.exe 96 PID 1284 wrote to memory of 4328 1284 1.exe 96 PID 1284 wrote to memory of 4328 1284 1.exe 96 PID 4328 wrote to memory of 1044 4328 1.tmp 98 PID 4328 wrote to memory of 1044 4328 1.tmp 98 PID 4328 wrote to memory of 532 4328 1.tmp 100 PID 4328 wrote to memory of 532 4328 1.tmp 100 PID 532 wrote to memory of 4936 532 regsvr32.exe 101 PID 532 wrote to memory of 4936 532 regsvr32.exe 101 PID 532 wrote to memory of 4936 532 regsvr32.exe 101 PID 1680 wrote to memory of 4356 1680 iexplore.exe 104 PID 1680 wrote to memory of 4356 1680 iexplore.exe 104 PID 1680 wrote to memory of 4356 1680 iexplore.exe 104 PID 4328 wrote to memory of 4308 4328 1.tmp 103 PID 4328 wrote to memory of 4308 4328 1.tmp 103 PID 4308 wrote to memory of 3316 4308 UninstallTool.exe 105 PID 4308 wrote to memory of 3316 4308 UninstallTool.exe 105 PID 3316 wrote to memory of 2136 3316 rundll32.exe 106 PID 3316 wrote to memory of 2136 3316 rundll32.exe 106 PID 2136 wrote to memory of 4100 2136 runonce.exe 107 PID 2136 wrote to memory of 4100 2136 runonce.exe 107 PID 4328 wrote to memory of 3480 4328 1.tmp 108 PID 4328 wrote to memory of 3480 4328 1.tmp 108 PID 4328 wrote to memory of 452 4328 1.tmp 112 PID 4328 wrote to memory of 452 4328 1.tmp 112 PID 4328 wrote to memory of 2156 4328 1.tmp 113 PID 4328 wrote to memory of 2156 4328 1.tmp 113 PID 4328 wrote to memory of 1184 4328 1.tmp 114 PID 4328 wrote to memory of 1184 4328 1.tmp 114 PID 4328 wrote to memory of 1184 4328 1.tmp 114 PID 1184 wrote to memory of 4216 1184 UninstallToolExec.exe 115 PID 1184 wrote to memory of 4216 1184 UninstallToolExec.exe 115 PID 4216 wrote to memory of 2312 4216 UninstallTool.exe 116 PID 4216 wrote to memory of 2312 4216 UninstallTool.exe 116 PID 4216 wrote to memory of 2312 4216 UninstallTool.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\07537a8f7e1a4207eb82c253fe296a8f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\07537a8f7e1a4207eb82c253fe296a8f_JaffaCakes118.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c start "" "C:\Users\Admin\AppData\Local\Temp\Setup1829.exe" /verysilent2⤵
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\Setup1829.exe"C:\Users\Admin\AppData\Local\Temp\Setup1829.exe" /verysilent3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Program Files (x86)\Crystall Idea\Uninstall Tool\1.exe"C:\Program Files (x86)\Crystall Idea\Uninstall Tool\1.exe" /silent4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Users\Admin\AppData\Local\Temp\is-HP6B8.tmp\1.tmp"C:\Users\Admin\AppData\Local\Temp\is-HP6B8.tmp\1.tmp" /SL5="$30200,3102762,185856,C:\Program Files (x86)\Crystall Idea\Uninstall Tool\1.exe" /silent5⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Windows\system32\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files\Uninstall Tool\utshellext.dll"6⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Registers COM server for autorun
- Modifies registry class
PID:1044
-
-
C:\Windows\system32\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files\Uninstall Tool\utshellext_x86.dll"6⤵
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Windows\SysWOW64\regsvr32.exe/s "C:\Program Files\Uninstall Tool\utshellext_x86.dll"7⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Modifies registry class
PID:4936
-
-
-
C:\Program Files\Uninstall Tool\UninstallTool.exe"C:\Program Files\Uninstall Tool\UninstallTool.exe" /install_service_silent6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Windows\SYSTEM32\rundll32.exerundll32.exe setupapi.dll, InstallHinfSection DefaultInstall 132 .\CisUtMonitor.inf7⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3316 -
C:\Windows\system32\runonce.exe"C:\Windows\system32\runonce.exe" -r8⤵
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\System32\grpconv.exe"C:\Windows\System32\grpconv.exe" -o9⤵PID:4100
-
-
-
-
-
C:\Program Files\Uninstall Tool\UninstallTool.exe"C:\Program Files\Uninstall Tool\UninstallTool.exe" /init6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3480
-
-
C:\Program Files\Uninstall Tool\UninstallTool.exe"C:\Program Files\Uninstall Tool\UninstallTool.exe" /add_control_panel_icon6⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:452
-
-
C:\Program Files\Uninstall Tool\UninstallTool.exe"C:\Program Files\Uninstall Tool\UninstallTool.exe" /pin_to_taskbar6⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2156
-
-
C:\Program Files\Uninstall Tool\UninstallToolExec.exe"C:\Program Files\Uninstall Tool\UninstallToolExec.exe"6⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Program Files\Uninstall Tool\UninstallTool.exe"C:\Program Files\Uninstall Tool\UninstallTool.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Program Files\Uninstall Tool\UninstallToolHelper.exeUninstallToolHelper.exe8⤵
- Executes dropped EXE
PID:2312
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c start "" "C:\Users\Admin\AppData\Local\Temp\File001.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\File001.exe"C:\Users\Admin\AppData\Local\Temp\File001.exe"3⤵
- Executes dropped EXE
PID:3128
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c start "" "C:\Users\Admin\AppData\Local\Temp\File002.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Users\Admin\AppData\Local\Temp\File002.exe"C:\Users\Admin\AppData\Local\Temp\File002.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4812 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4812 -s 16124⤵
- Program crash
PID:3520
-
-
-
-
C:\Program Files (x86)\Internet Explorer\ielowutil.exe"C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding1⤵PID:820
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1680 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4356
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4812 -ip 48121⤵PID:1732
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
52KB
MD5ce7f6aef1b27d41e7365700e74afc969
SHA1eca24811ab520c1b3fc7dc07179311dc76ea8be8
SHA256d03ae146525b6a0b43f9cc94cac672d65f91a57b9898e1093932561b22fdb50e
SHA512e65b5871c1e711b3e3f866cb7c91fb62bde24bc6b1a1c1b5cf4a32cfd577a86b4615f44fb2bb629bca92b6e87deaa8fa6d8f0b00ad1677e3e75a3bb6dd7c6bc1
-
Filesize
3.5MB
MD5cc54a313a8e23a64e501056c6ba25bc7
SHA183a34de9ce945da1c8d582b322047a0ce9db1a4d
SHA2561242f58b0f3825ca07e262e9c37e32731bf687374642870550bdbfb092e3bb97
SHA51272092129f64a790a7a608fdb350ab6b635150ee4b4e76b694d1a2d354d505532b24b1d40b45aa9880d0d30ced7b2c3bcc9b8e779f836c13a77ed99a0da3cb3d0
-
Filesize
97KB
MD59607e8cc411112371a34e7701a80b230
SHA1e471940c6d0ab75ed87f41e1ebeafde459fe60b4
SHA256da0d9e96f00c804e968ad99e683dcfb5a9e9703fda1291f09a9db2918c2be567
SHA512d812fb36ed2df7be9e5b152a53205c5bb35979300097399b0be6f334a2cb64f62d53027cf30424eda26d0b1678ff772a792fb607b8523ce4c9098fb497d8ed2f
-
Filesize
2KB
MD5ab33006d71573c73ea639a4d90923bf7
SHA13fb74cc71b41ca0c2abec7008e88737fef9ad66c
SHA256416ca112938536cdc8191eea469479398e6ce01ec25a4830991d93142a46422f
SHA51235df4cad9d9cfecc1e649b25daa052141d530dfafc57607fc806e3b7267fb802529867bbf5c508b14f82ac320a472d883b7e62fef081dfe865d7a1c61c77cc32
-
Filesize
4.6MB
MD507acf83bda719741025b34a0671fc754
SHA1426e6e512fb52290f49bd606a05bf12abb05e7ba
SHA25661d9f616d3c1f22df0e7668e181b1c7910ea48a51b57519837dd5cadebc1cf04
SHA512f27f17ccb2c486310fa1ee33115d349fa7a7708b5be216366a9ecc031d6d1a84073604446624568230fbcd4792beb6112f4b9f960213b517d5ba22a9ec26366a
-
Filesize
218KB
MD5ccda58e3bcd4da4fe22d5e80c3cfb27f
SHA171c23b3b6bc611d0030dde422d98e4a3659a4319
SHA256f52683e6b16634a5ed2f5e99ec1d6e1f1d585e7f3feae88a47b200fea70375a7
SHA51252a1bb1dbf2e50c66cca1aa81583daa0e1e55b42f6940334c5ed524e65d71bd3c49742f9664dd436772f3fc37406b800cb9284ab55b03814d61b5003a62f11ca
-
Filesize
423KB
MD54d454f8abe7860306da91c55ba9be042
SHA1a83ce432ada547eac181e20e0249ea9c4b484843
SHA256d323ce72e2cf82f061b4a62dfc212472f7850b4dffd3658193298c2232a04d0b
SHA5121f099152c4f81135a18a5c8b52f4543505dba145c16879f37ff62815cd5adccd9b332d3b9164736acb411443f05ce4ef3e89c2d605e94b3593e770f0f8dce21b
-
Filesize
36KB
MD50fdb3264d678d048ecae17799df05cb4
SHA1df4887043e8f437aa2a879b47772040f8347fc9f
SHA256cd9a38aa64c6cfa2391a5f89b0c7cdf4cbfd63bf6d69d6620f12c736ce4d5892
SHA512a4c9e76fd22c1ec8e44193d26355f6fdb067e6bdfe2084f6993ddbb18d790dacc71d6c9e28553dc6118ec31a96e9241cc5d38db6b53671ad6a69576ba611dedd
-
Filesize
379KB
MD5b45a9b037e1686b7c217bc406bc933af
SHA1c3ef67fb58ced40c1312f0855d5c897c08b4e1bb
SHA256e589ba19b06772570ab1d36675fe1f0a201760f6b16f1a1f3b374b695070fe7f
SHA5126b47f29d9df2ab22735bfe7cede43ac3af7cefc75a58c90daeebf10c2e5fd92a1132f035d78e47573524ad0091152422779b74957be897e6777ef6a9de065919
-
Filesize
335KB
MD52f9c5a77aec3e3e4387320267d996f89
SHA1a023bd77be6784e80b6381010e5a867c5f7ce542
SHA256595df900ddd426ba124198782a027a09d356cfe7924b7f69fa51696377535e0f
SHA512f283d6a163ad08348a35c347dd7f0c92746a6ebfb9709e8029f608eb0ba97309726c7aa17414f58a77672e56d8c6dacc062a537ab44dd552bc9110e726b1c220
-
Filesize
945B
MD52735d476771cc00ef345f41e9ffa4459
SHA16691a12311f026a90d5313fadcd1e2148ea65445
SHA2564940d64b99da9d1e2af0f929708d2ddc86fbf92b310b343eb215ded44ae8efe3
SHA5127cd6c455a021a49c0aa94803d532f27f51168c0232c6b700aaf58125377cf939453e799b504dc014f8ca303213827a623ee29a472ac7fa30d1e6e912b887a653
-
Filesize
481KB
MD53372d01659f43b8dffd5b14914b03890
SHA19c09efd4ff70674eafd1238525fc1bb127948404
SHA25668d658155beff9b517aae6a26c3735c26ca6e1e026089403876e188cb23848a6
SHA5125830689beaf260f2cbdc0d90029bf0b73246cf46f3346e4825c8d6613ce92c926132de35f9fe016f00441a5aa79a7c4288f6883566c15e54d89422dc2ea1dada
-
Filesize
195KB
MD571ca31e32c62557a91c072255c79b9ad
SHA11c03cc0471ac7b289b49f4ef9b2691d4282d3f5c
SHA25659b790491d763421741300e1473d1d302ad96130cc26c1c87edaf7469d4d5885
SHA51213691125da737a3915784db6ef9e990850ebb6f78c034ab98ca9676f9bf4b1b2b7bc8195f00e0a47d598c0a84582c7bf3291d1691d099c4374e7b1a1beba5876
-
Filesize
3.7MB
MD5811c36d10c8cb9d7eb4023755939c389
SHA1f77c8cc3369d341fe5f4e8a0ada22aacbe5dd2d6
SHA2560b37b021a61d3352ff8e5d43f185d08ad1245938ab22123c9b58d661ff731620
SHA512c16cb83746b0108566d2c74c86cafd03ded6cc6d57fd0e71f44598f8ad72fed03ebe6f2d4fa4d33937477656e1231bb38104a53ff26a9ce744c08e57d07effe7
-
Filesize
1.2MB
MD5b7d0813e1f27e5b6b01b65a518731759
SHA1b942b56e9cf826ea46c7e27b139f75e6d2605cfc
SHA2567c0a7db43a4b649b3cd9e5ca8c1e0041a167a7339668b75dd1ec1c972b20fac4
SHA512cbb7d217197af7ac375910df142d09c68d1c118f4e44652339494a1de5d7d57cc223c0b08d62597b66d01a6fba325ea1c94cce11d4bce128e0e7c1d03ecf1604
-
Filesize
2KB
MD565b65862d48178a71d0cb4da54b62c96
SHA14b19796cf5fc94d30788ee61ced090d1d6ac299f
SHA256647f68b03c9a5d7f21d2a0c27f5bbd72d8559ab4e17a365e24be937155f5c033
SHA512a37d98cb6deb56ee9fdde13c91bca88e918ff7041632373730ce447fb8e2443cbcf5f43b69c99c542d2bdc96ec2dd8157a9438956d812d106239b11be0782384
-
Filesize
1KB
MD5b686c239de5bc638271322d247c89bb4
SHA14986d1748bf439e299f19bf64df4d721770cfb77
SHA256c0af4a2d740c7a45a69ff544b5173ad1ea6038e75af87b5306242f30fd3a6882
SHA512ab2d036746e4f25f38710b26594a9fd463600d63da2d6ad8fcc0553f39c162738ed43e39b507e729690c67be993e34ee99d0cc13688532a79fb9a35a3350e067
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\269c0465f0b4b6ee.customDestinations-ms
Filesize1KB
MD5f67b90fc9441580b7e1a13fa66638e2d
SHA170852dec6239ab4749538c25217dc8d383641c4b
SHA256706841416b4dd847c7a6740583cb14ca9213d188056c44251bab90b589722e08
SHA512ac54b9dcc0767fcf47066b68f6dc856bd89fc650dc98d600ccc8bfa28c9b35f8150086432cf949011a065681a83aebc4d95a15ac2fbce0415a81d0241429528d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\269c0465f0b4b6ee.customDestinations-ms
Filesize1KB
MD51554d1be8b28d4ff1c2cb12ed8e33ee9
SHA18fd74e7961d16d00a4f86bded326f80addde04b4
SHA256d54a993d6f4d19a300d4e3009e6add0155a21e1398be69ce36a5a361efbe81e0
SHA512f5c454787d233f97de25c4f752f8060a0c9c9cd6b13c84d2600e6437443de61bfb7a61dab2455c1c4569d7c6f45ed6d546eb1c101a64ed35d0eaec6252d600e9