Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 06:05
Static task
static1
Behavioral task
behavioral1
Sample
69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe
-
Size
512KB
-
MD5
69fa6d2c84ebb60bca0f2ead22791a56
-
SHA1
f62244dbc62d31e527453e8a1f3839ab71eedb7f
-
SHA256
529c487ecc8450a4fc69830d8b0ce75eaf2ef15b6a454801b0e7665bb9221b34
-
SHA512
4d616eec89b4db3c6438b5fd0d3801b427ed40484a05669ab7b3a036024c72c71dfcf816f409dac89eee5bc96613a3415ce4c6717fe0ddf36a73277ef858a93f
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6c:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5b
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
njcyyrxsbr.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" njcyyrxsbr.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
njcyyrxsbr.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" njcyyrxsbr.exe -
Processes:
njcyyrxsbr.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" njcyyrxsbr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" njcyyrxsbr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" njcyyrxsbr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" njcyyrxsbr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" njcyyrxsbr.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
njcyyrxsbr.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" njcyyrxsbr.exe -
Modifies Installed Components in the registry 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Executes dropped EXE 5 IoCs
Processes:
njcyyrxsbr.exejcofaqgcqzmnvvx.exeqopryxac.exeeabcuktbheyxr.exeqopryxac.exepid process 2608 njcyyrxsbr.exe 1340 jcofaqgcqzmnvvx.exe 2280 qopryxac.exe 2632 eabcuktbheyxr.exe 2704 qopryxac.exe -
Loads dropped DLL 5 IoCs
Processes:
69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exenjcyyrxsbr.exepid process 2904 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe 2904 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe 2904 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe 2904 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe 2608 njcyyrxsbr.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
njcyyrxsbr.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" njcyyrxsbr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirstRunDisabled = "1" njcyyrxsbr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" njcyyrxsbr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" njcyyrxsbr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" njcyyrxsbr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" njcyyrxsbr.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
jcofaqgcqzmnvvx.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ubmylajp = "njcyyrxsbr.exe" jcofaqgcqzmnvvx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\aexnqpak = "jcofaqgcqzmnvvx.exe" jcofaqgcqzmnvvx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "eabcuktbheyxr.exe" jcofaqgcqzmnvvx.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
njcyyrxsbr.exeqopryxac.exeqopryxac.exedescription ioc process File opened (read-only) \??\s: njcyyrxsbr.exe File opened (read-only) \??\v: njcyyrxsbr.exe File opened (read-only) \??\w: qopryxac.exe File opened (read-only) \??\r: qopryxac.exe File opened (read-only) \??\k: njcyyrxsbr.exe File opened (read-only) \??\q: qopryxac.exe File opened (read-only) \??\j: qopryxac.exe File opened (read-only) \??\t: njcyyrxsbr.exe File opened (read-only) \??\y: njcyyrxsbr.exe File opened (read-only) \??\o: qopryxac.exe File opened (read-only) \??\k: qopryxac.exe File opened (read-only) \??\n: njcyyrxsbr.exe File opened (read-only) \??\l: qopryxac.exe File opened (read-only) \??\z: qopryxac.exe File opened (read-only) \??\w: njcyyrxsbr.exe File opened (read-only) \??\e: qopryxac.exe File opened (read-only) \??\g: qopryxac.exe File opened (read-only) \??\i: qopryxac.exe File opened (read-only) \??\n: qopryxac.exe File opened (read-only) \??\p: qopryxac.exe File opened (read-only) \??\j: njcyyrxsbr.exe File opened (read-only) \??\l: njcyyrxsbr.exe File opened (read-only) \??\x: qopryxac.exe File opened (read-only) \??\p: njcyyrxsbr.exe File opened (read-only) \??\z: njcyyrxsbr.exe File opened (read-only) \??\n: qopryxac.exe File opened (read-only) \??\s: qopryxac.exe File opened (read-only) \??\w: qopryxac.exe File opened (read-only) \??\z: qopryxac.exe File opened (read-only) \??\h: njcyyrxsbr.exe File opened (read-only) \??\b: qopryxac.exe File opened (read-only) \??\m: qopryxac.exe File opened (read-only) \??\q: njcyyrxsbr.exe File opened (read-only) \??\u: qopryxac.exe File opened (read-only) \??\p: qopryxac.exe File opened (read-only) \??\v: qopryxac.exe File opened (read-only) \??\g: qopryxac.exe File opened (read-only) \??\o: qopryxac.exe File opened (read-only) \??\a: njcyyrxsbr.exe File opened (read-only) \??\u: njcyyrxsbr.exe File opened (read-only) \??\a: qopryxac.exe File opened (read-only) \??\m: qopryxac.exe File opened (read-only) \??\v: qopryxac.exe File opened (read-only) \??\e: qopryxac.exe File opened (read-only) \??\u: qopryxac.exe File opened (read-only) \??\t: qopryxac.exe File opened (read-only) \??\b: qopryxac.exe File opened (read-only) \??\q: qopryxac.exe File opened (read-only) \??\h: qopryxac.exe File opened (read-only) \??\m: njcyyrxsbr.exe File opened (read-only) \??\r: qopryxac.exe File opened (read-only) \??\t: qopryxac.exe File opened (read-only) \??\x: qopryxac.exe File opened (read-only) \??\b: njcyyrxsbr.exe File opened (read-only) \??\r: njcyyrxsbr.exe File opened (read-only) \??\s: qopryxac.exe File opened (read-only) \??\h: qopryxac.exe File opened (read-only) \??\i: qopryxac.exe File opened (read-only) \??\i: njcyyrxsbr.exe File opened (read-only) \??\o: njcyyrxsbr.exe File opened (read-only) \??\k: qopryxac.exe File opened (read-only) \??\y: qopryxac.exe File opened (read-only) \??\a: qopryxac.exe File opened (read-only) \??\y: qopryxac.exe -
Modifies WinLogon 2 TTPs 2 IoCs
Processes:
njcyyrxsbr.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" njcyyrxsbr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" njcyyrxsbr.exe -
AutoIT Executable 6 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral1/memory/2904-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe C:\Windows\SysWOW64\jcofaqgcqzmnvvx.exe autoit_exe \Windows\SysWOW64\njcyyrxsbr.exe autoit_exe C:\Windows\SysWOW64\qopryxac.exe autoit_exe \Windows\SysWOW64\eabcuktbheyxr.exe autoit_exe C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe autoit_exe -
Drops file in System32 directory 9 IoCs
Processes:
69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exenjcyyrxsbr.exedescription ioc process File created C:\Windows\SysWOW64\eabcuktbheyxr.exe 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\eabcuktbheyxr.exe 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe File created C:\Windows\SysWOW64\njcyyrxsbr.exe 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe File created C:\Windows\SysWOW64\qopryxac.exe 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\jcofaqgcqzmnvvx.exe 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\qopryxac.exe 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll njcyyrxsbr.exe File opened for modification C:\Windows\SysWOW64\njcyyrxsbr.exe 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe File created C:\Windows\SysWOW64\jcofaqgcqzmnvvx.exe 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe -
Drops file in Program Files directory 14 IoCs
Processes:
qopryxac.exeqopryxac.exedescription ioc process File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe qopryxac.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal qopryxac.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe qopryxac.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal qopryxac.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe qopryxac.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe qopryxac.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe qopryxac.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe qopryxac.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal qopryxac.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe qopryxac.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe qopryxac.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe qopryxac.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe qopryxac.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal qopryxac.exe -
Drops file in Windows directory 4 IoCs
Processes:
69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exeWINWORD.EXEdescription ioc process File opened for modification C:\Windows\mydoc.rtf 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Office loads VBA resources, possible macro or embedded object present
-
Processes:
WINWORD.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" WINWORD.EXE -
Modifies registry class 64 IoCs
Processes:
WINWORD.EXEnjcyyrxsbr.exe69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exeexplorer.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc njcyyrxsbr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" /p %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6ABFFACEF962F1E4830E3A40869C3992B38E03FE4365034EE2C845E609A2" 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" njcyyrxsbr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\ = "&Edit" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\mhtmlfile WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_Classes\Local Settings explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" njcyyrxsbr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\ShellEx WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" njcyyrxsbr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2ECAB15A44EE389952BEB9A132EDD7C5" 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher WINWORD.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" njcyyrxsbr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" njcyyrxsbr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg njcyyrxsbr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat njcyyrxsbr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf njcyyrxsbr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\ = "&Print" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh njcyyrxsbr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
WINWORD.EXEpid process 2536 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exenjcyyrxsbr.exeqopryxac.exejcofaqgcqzmnvvx.exeeabcuktbheyxr.exeqopryxac.exepid process 2904 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe 2904 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe 2904 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe 2904 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe 2904 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe 2904 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe 2904 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe 2904 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe 2608 njcyyrxsbr.exe 2608 njcyyrxsbr.exe 2608 njcyyrxsbr.exe 2608 njcyyrxsbr.exe 2608 njcyyrxsbr.exe 2280 qopryxac.exe 2280 qopryxac.exe 2280 qopryxac.exe 2280 qopryxac.exe 1340 jcofaqgcqzmnvvx.exe 1340 jcofaqgcqzmnvvx.exe 1340 jcofaqgcqzmnvvx.exe 1340 jcofaqgcqzmnvvx.exe 1340 jcofaqgcqzmnvvx.exe 2632 eabcuktbheyxr.exe 2632 eabcuktbheyxr.exe 2632 eabcuktbheyxr.exe 2632 eabcuktbheyxr.exe 2632 eabcuktbheyxr.exe 2632 eabcuktbheyxr.exe 2704 qopryxac.exe 2704 qopryxac.exe 2704 qopryxac.exe 2704 qopryxac.exe 1340 jcofaqgcqzmnvvx.exe 2632 eabcuktbheyxr.exe 2632 eabcuktbheyxr.exe 1340 jcofaqgcqzmnvvx.exe 1340 jcofaqgcqzmnvvx.exe 2632 eabcuktbheyxr.exe 2632 eabcuktbheyxr.exe 1340 jcofaqgcqzmnvvx.exe 2632 eabcuktbheyxr.exe 2632 eabcuktbheyxr.exe 1340 jcofaqgcqzmnvvx.exe 2632 eabcuktbheyxr.exe 2632 eabcuktbheyxr.exe 1340 jcofaqgcqzmnvvx.exe 2632 eabcuktbheyxr.exe 2632 eabcuktbheyxr.exe 1340 jcofaqgcqzmnvvx.exe 2632 eabcuktbheyxr.exe 2632 eabcuktbheyxr.exe 1340 jcofaqgcqzmnvvx.exe 2632 eabcuktbheyxr.exe 2632 eabcuktbheyxr.exe 1340 jcofaqgcqzmnvvx.exe 2632 eabcuktbheyxr.exe 2632 eabcuktbheyxr.exe 1340 jcofaqgcqzmnvvx.exe 2632 eabcuktbheyxr.exe 2632 eabcuktbheyxr.exe 1340 jcofaqgcqzmnvvx.exe 2632 eabcuktbheyxr.exe 2632 eabcuktbheyxr.exe 1340 jcofaqgcqzmnvvx.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
Processes:
explorer.exedescription pid process Token: SeShutdownPrivilege 1512 explorer.exe Token: SeShutdownPrivilege 1512 explorer.exe Token: SeShutdownPrivilege 1512 explorer.exe Token: SeShutdownPrivilege 1512 explorer.exe Token: SeShutdownPrivilege 1512 explorer.exe Token: SeShutdownPrivilege 1512 explorer.exe Token: SeShutdownPrivilege 1512 explorer.exe Token: SeShutdownPrivilege 1512 explorer.exe Token: SeShutdownPrivilege 1512 explorer.exe Token: SeShutdownPrivilege 1512 explorer.exe Token: SeShutdownPrivilege 1512 explorer.exe Token: SeShutdownPrivilege 1512 explorer.exe -
Suspicious use of FindShellTrayWindow 47 IoCs
Processes:
69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exenjcyyrxsbr.exeqopryxac.exejcofaqgcqzmnvvx.exeeabcuktbheyxr.exeqopryxac.exeexplorer.exepid process 2904 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe 2904 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe 2904 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe 2608 njcyyrxsbr.exe 2608 njcyyrxsbr.exe 2608 njcyyrxsbr.exe 2280 qopryxac.exe 2280 qopryxac.exe 2280 qopryxac.exe 1340 jcofaqgcqzmnvvx.exe 1340 jcofaqgcqzmnvvx.exe 1340 jcofaqgcqzmnvvx.exe 2632 eabcuktbheyxr.exe 2632 eabcuktbheyxr.exe 2632 eabcuktbheyxr.exe 2704 qopryxac.exe 2704 qopryxac.exe 2704 qopryxac.exe 1512 explorer.exe 1512 explorer.exe 1512 explorer.exe 1512 explorer.exe 1512 explorer.exe 1512 explorer.exe 1512 explorer.exe 1512 explorer.exe 1512 explorer.exe 1512 explorer.exe 1512 explorer.exe 1512 explorer.exe 1512 explorer.exe 1512 explorer.exe 1512 explorer.exe 1512 explorer.exe 1512 explorer.exe 1512 explorer.exe 1512 explorer.exe 1512 explorer.exe 1512 explorer.exe 1512 explorer.exe 1512 explorer.exe 1512 explorer.exe 1512 explorer.exe 1512 explorer.exe 1512 explorer.exe 1512 explorer.exe 1512 explorer.exe -
Suspicious use of SendNotifyMessage 34 IoCs
Processes:
69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exenjcyyrxsbr.exeqopryxac.exejcofaqgcqzmnvvx.exeeabcuktbheyxr.exeexplorer.exepid process 2904 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe 2904 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe 2904 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe 2608 njcyyrxsbr.exe 2608 njcyyrxsbr.exe 2608 njcyyrxsbr.exe 2280 qopryxac.exe 2280 qopryxac.exe 2280 qopryxac.exe 1340 jcofaqgcqzmnvvx.exe 1340 jcofaqgcqzmnvvx.exe 1340 jcofaqgcqzmnvvx.exe 2632 eabcuktbheyxr.exe 2632 eabcuktbheyxr.exe 2632 eabcuktbheyxr.exe 1512 explorer.exe 1512 explorer.exe 1512 explorer.exe 1512 explorer.exe 1512 explorer.exe 1512 explorer.exe 1512 explorer.exe 1512 explorer.exe 1512 explorer.exe 1512 explorer.exe 1512 explorer.exe 1512 explorer.exe 1512 explorer.exe 1512 explorer.exe 1512 explorer.exe 1512 explorer.exe 1512 explorer.exe 1512 explorer.exe 1512 explorer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
WINWORD.EXEpid process 2536 WINWORD.EXE 2536 WINWORD.EXE -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exenjcyyrxsbr.exedescription pid process target process PID 2904 wrote to memory of 2608 2904 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe njcyyrxsbr.exe PID 2904 wrote to memory of 2608 2904 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe njcyyrxsbr.exe PID 2904 wrote to memory of 2608 2904 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe njcyyrxsbr.exe PID 2904 wrote to memory of 2608 2904 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe njcyyrxsbr.exe PID 2904 wrote to memory of 1340 2904 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe jcofaqgcqzmnvvx.exe PID 2904 wrote to memory of 1340 2904 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe jcofaqgcqzmnvvx.exe PID 2904 wrote to memory of 1340 2904 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe jcofaqgcqzmnvvx.exe PID 2904 wrote to memory of 1340 2904 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe jcofaqgcqzmnvvx.exe PID 2904 wrote to memory of 2280 2904 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe qopryxac.exe PID 2904 wrote to memory of 2280 2904 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe qopryxac.exe PID 2904 wrote to memory of 2280 2904 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe qopryxac.exe PID 2904 wrote to memory of 2280 2904 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe qopryxac.exe PID 2904 wrote to memory of 2632 2904 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe eabcuktbheyxr.exe PID 2904 wrote to memory of 2632 2904 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe eabcuktbheyxr.exe PID 2904 wrote to memory of 2632 2904 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe eabcuktbheyxr.exe PID 2904 wrote to memory of 2632 2904 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe eabcuktbheyxr.exe PID 2608 wrote to memory of 2704 2608 njcyyrxsbr.exe qopryxac.exe PID 2608 wrote to memory of 2704 2608 njcyyrxsbr.exe qopryxac.exe PID 2608 wrote to memory of 2704 2608 njcyyrxsbr.exe qopryxac.exe PID 2608 wrote to memory of 2704 2608 njcyyrxsbr.exe qopryxac.exe PID 2904 wrote to memory of 2536 2904 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe WINWORD.EXE PID 2904 wrote to memory of 2536 2904 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe WINWORD.EXE PID 2904 wrote to memory of 2536 2904 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe WINWORD.EXE PID 2904 wrote to memory of 2536 2904 69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe WINWORD.EXE -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\69fa6d2c84ebb60bca0f2ead22791a56_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\njcyyrxsbr.exenjcyyrxsbr.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\qopryxac.exeC:\Windows\system32\qopryxac.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:2704 -
C:\Windows\SysWOW64\jcofaqgcqzmnvvx.exejcofaqgcqzmnvvx.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1340 -
C:\Windows\SysWOW64\qopryxac.exeqopryxac.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2280 -
C:\Windows\SysWOW64\eabcuktbheyxr.exeeabcuktbheyxr.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2632 -
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"2⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2536
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1512
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
8Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD511e41b9eef527dc805dd24197dccf493
SHA1c7574dbe82dafbdd8ad973799e2d8b3fbbf0ac58
SHA25628b3c25b7b273f62ea31124d82b739a1dd14d4f824a30e2103bc1526cf188330
SHA512aa16dcc091dcf515ad7e55bbda5f5069a5dbc50c242c0d8dcf3b5728c159559774e7276bcf1640d2d052faaaef9acea36fdd98b259b45c913bbf18d84811b092
-
Filesize
512KB
MD541de7b8a8b16fc32d9cbb1337a28756b
SHA1e474057072427f62148ef87e73baed29d70d5238
SHA256adea80fefc51eb944819fe6f412af3c7f24621a52f4c3f2574683470b6537cfe
SHA512b727b0b16e8aeebb222ef1aa1639eaac62aef27bdea537dbc08b751e7c20d6cd39a442154182a83887103aeab082f2c2c0e8d13ca3bb84d222301cd0ef7da174
-
Filesize
512KB
MD5f8e6401487c0da5a3d34f9cf33c34f96
SHA1f81a1f0352445c06ad93709ec7c463d09f8911f1
SHA2563caa8e503a508b8028186bd14113b4948dff48c85797924c6f62db1547bf8876
SHA512528eb4ef7223f47a7791050e447bc659c3d43ec72a6606203a7e5e5ad1d4553267507fa4989402d34adfdf6336301384b8dfacc6bd08f4fe5e1171b26910a5d1
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
512KB
MD54853a9612eba6cea84422c86cb30f81f
SHA1e4756812ec1d6b601173bc93116684a7fd6ae697
SHA256d51d527132b9742028bec392de712fa84f707567c9590ee9ee2ad2353095421a
SHA5126088bc5aa9ccbb604755ffc1642fda9afd79ce642d884f62923b144f913a4e37afd3b9e06b95b636d6302790ebf2956863a4313a6e2864093c558be5f9048e05
-
Filesize
512KB
MD56485da08a7b26e121d79f44c262e1517
SHA128cd7a1d1eed5d3437d59771327fdfb83260f74d
SHA256df1ed12f2d77267ac1c01a6411fba2bb5e0f8e094b422d723ce3c5711e1cc130
SHA512d66168b119d5c8f7cca72168f32561330d6d6fa3548f57f06fdfca8e991da7477cee0f3725f068867da383a191510f8595ca7aebca5cc9b0404a76d2333bc6a2