Analysis
-
max time kernel
92s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
16-06-2024 06:44
Static task
static1
Behavioral task
behavioral1
Sample
b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe
-
Size
160KB
-
MD5
b23099f531746bc4be062e516c4f2a83
-
SHA1
61671fa0a3d43b409c1ddf00ae23f5fafdf3adec
-
SHA256
5524fdb5b6faf9125d367ee5b8626c9e5d5aefc476264c92d4b63254f4a95669
-
SHA512
4ad9b4562249fffccbdab44b51d701f5317e1f91bcf9058506a051424cb8b69075335e0bf1c05e136f6d897ab95408df9b5113c052b83d486286f4519e92e78f
-
SSDEEP
3072:kPtvNTB5N47Q9378AJOMYcYYcmXfaAdmzKOTitARFNKDb1VBhAtkpjK0avbDHJ:IPbN58AJO5if6GAjEDbDB+Xvb
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\qm_go4321_com.ico b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe File created C:\Windows\SysWOW64\taobao.haodizhi.cc.ico b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe File created C:\Windows\SysWOW64\bg_go4321_com.ico b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe File created C:\Windows\SysWOW64\life_74443_com.ico b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe File created C:\Windows\SysWOW64\www_meinvly_com.ico b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\TheWorld 2.0\TheWorld.ini b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\TheWorld 3\TheWorld.ini b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\GreenBrowser\User\GreenBrowser.ini b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3106512606" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425285249" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{E4A10FD5-2BAB-11EF-9D11-663BBECB1CCD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3104011194" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000092879b20bf700e4c81ff82d1ae3b836600000000020000000000106600000001000020000000ddb50807db6dc613b23572415bd19ca4478c148ad1f68470b4f12f6fb86a31fd000000000e80000000020000200000004404f5fa2b7a968a85b02f8bdb7c137e41bc262f93aae3a5cc8e116deb8ad9d620000000fc012dae133b3966b65f264d4d8a1767e6ccb47d92fd25361e7ccf7c5d705a964000000007c7a110fbb2b6cecc0b1666a3c6bb4855e1fb54c81d8ac5cfb3aaa1571cff6dd5a6b43266ae0db99cc97b2178ff964cac37854ae14f74ff7768e103a6ce0110 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3103854961" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3103854961" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31113144" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31113144" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31113144" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31113144" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{E4A136E5-2BAB-11EF-9D11-663BBECB1CCD} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31113144" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000092879b20bf700e4c81ff82d1ae3b8366000000000200000000001066000000010000200000009cb9258d5c7d9a3bb8399388d6d4488e76c694081c668a11795e2e0615fe8d0d000000000e8000000002000020000000bb58d89f6c0f5751ad03a509e978cfeb5c5bc211891786baa7b92bcb82a82e7c2000000001f3000657f708325f7ef2face4e8f442794255c5a7abfdaaf8a1e327b7cb5284000000092ba58a46f06a25ac65c8cdde20d06a2c8863b5e613b183cbf7fab43a2ca9eae4c1bed3693b23c3664bb39564096371ca945a096173ecc2ffbfa3f19e0447dbf iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90bfbfb9b8bfda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31113144" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3106512606" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a022b6b9b8bfda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3104011194" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f4de370-d627-11d1-ba4f-00a0c91eedba}\DefaultIcon b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\shell\Open\Command\ = "explorer.exe h%t%t%p%:%/%/%1t.%2g%2o%24%23%22%21.%3c%3o%3m%/%?%2i%2e%2i%2c%2o%2n" b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\ShellFolder\WantsParseDisplayName b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\DelegateFolders\ShellFolder\Attributes = "0" b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\DelegateFolders b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\InProcServer32\ThreadingModel = "Apartment" b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\DelegateFolders\shell\ÌÔ±¦Íø(&T) b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{daf95313-e44d-46af-be1b-cbacea2c3065} b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{e345f35f-9397-435c-8f95-4e922c26259e} b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\DelegateFolders\shell\ÌÔ±¦Íø(&T)\Command b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9343812e-1c37-4a49-a12e-4b2d810d956b} b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B4FB3F98-C1EA-428d-A78A-D1F5659CBA93} b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{f8278c54-a712-415b-b593-b77a2be0dda9} b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\DefaultIcon b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\shell\ÊôÐÔ(&R) b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\DelegateFolders\InProcServer32\ThreadingModel = "Apartment" b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\DelegateFolders\shell\Open b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\DelegateFolders\DefaultIcon b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f4de370-d627-11d1-ba4f-00a0c91eedba}\InProcServer32 b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\DelegateFolders\InProcServer32 b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\DelegateFolders\shell\´´ÒµÍ¶×ʺÃÏîÄ¿(&C)\Command b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f4de370-d627-11d1-ba4f-00a0c91eedba}\LocalizedString = "ÎÒµÄÍøÖ·µ¼º½" b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\shell\´´ÒµÍ¶×ʺÃÏîÄ¿(&C)\Command\ = "explorer.exe h%t%t%p%:%/%/%1l%1i%1f%1e.%27%24%24%24%23.%3c%3o%3m%/%?%2i%2e%2i%2c%2o%2n" b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\ShellFolder\Attributes = "0" b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{26EE0668-A00A-44D7-9371-BEB064C98683} b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b} b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\shell\ = "Open" b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EDC978D6-4D53-4b2f-A265-5805674BE568} b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f4de370-d627-11d1-ba4f-00a0c91eedba}\shell\´´ÒµÍ¶×ʺÃÏîÄ¿(&C)\Command\ = "explorer.exe h%t%t%p%:%/%/%1l%1i%1f%1e.%27%24%24%24%23.%3c%3o%3m%/%?%2i%2e%2i%2c%2o%2n" b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f4de370-d627-11d1-ba4f-00a0c91eedba}\ShellFolder b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849} b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\InProcServer32\ = "%SystemRoot%\\SysWow64\\shdocvw.dll" b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\DelegateFolders\shell b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\DelegateFolders\ShellFolder\WantsParseDisplayName b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\DelegateFolders\shell b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\shell b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\DelegateFolders\ShellFolder b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\DelegateFolders\ShellFolder\HideOnDesktopPerUser b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\DelegateFolders\shell\ÊôÐÔ(&R)\Command b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F02C1A0D-BE21-4350-88B0-7367FC96EF3C} b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f4de370-d627-11d1-ba4f-00a0c91eedba}\InProcServer32\ThreadingModel = "Apartment" b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f4de370-d627-11d1-ba4f-00a0c91eedba}\shell\Open\Command b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f4de370-d627-11d1-ba4f-00a0c91eedba}\shell\ÌÔ±¦Íø(&T) b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{04731B67-D933-450a-90E6-4ACD2E9408FE} b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f4de370-d627-11d1-ba4f-00a0c91eedba}\shell\Open\Command\ = "explorer.exe h%t%t%p%:%/%/%7w%7w%7w%.%1w%1z%24%23%22%21%.%3c%3o%3m%/%?%6s%6y%6s%6t%6e%6m" b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\DelegateFolders\shell\ÌÔ±¦Íø(&T)\Command\ = "explorer.exe h%t%t%p%:%/%/%1t.%2g%2o%24%23%22%21.%3c%3o%3m%/%?%2i%2e%2i%2c%2o%2n" b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{98F275B4-4FFF-11E0-89E2-7B86DFD72085} b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f4de370-d627-11d1-ba4f-00a0c91eedba}\DefaultIcon\ = "%SystemRoot%\\SysWow64\\shdoclc.dll,-190" b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f4de370-d627-11d1-ba4f-00a0c91eedba}\shell\ÌÔ±¦Íø(&T)\Command b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\shell\Open\ = "´ò¿ª(&O)" b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5b934b42-522b-4c34-bbfe-37a3ef7b9c90} b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{64693913-1c21-4f30-a98f-4e52906d3b56} b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f4de370-d627-11d1-ba4f-00a0c91eedba}\InfoTip = "ÎÒµÄÍøÖ·µ¼º½" b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f4de370-d627-11d1-ba4f-00a0c91eedba}\ShellFolder\Attributes = "0" b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\shell\´´ÒµÍ¶×ʺÃÏîÄ¿(&C) b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\DelegateFolders\shell\´´ÒµÍ¶×ʺÃÏîÄ¿(&C)\Command\ = "explorer.exe h%t%t%p%:%/%/%1l%1i%1f%1e.%27%24%24%24%23.%3c%3o%3m%/%?%2i%2e%2i%2c%2o%2n" b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{89D83576-6BD1-4c86-9454-BEB04E94C819} b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f4de370-d627-11d1-ba4f-00a0c91eedba}\shell\Open\MUIVerb = "@shdoclc.dll,-10241" b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\shell\ÊôÐÔ(&R)\Command b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f4de370-d627-11d1-ba4f-00a0c91eedba}\shell\ = "Open" b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\DelegateFolders\shell\Open\Command b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\DelegateFolders\shell\ÊôÐÔ(&R) b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\DefaultIcon\ = "%SystemRoot%\\SysWow64\\taobao.haodizhi.cc.ico" b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\ShellFolder\HideOnDesktopPerUser b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4532 b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1904 iexplore.exe 3600 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 3600 iexplore.exe 3600 iexplore.exe 1904 iexplore.exe 1904 iexplore.exe 4772 IEXPLORE.EXE 4772 IEXPLORE.EXE 3124 IEXPLORE.EXE 3124 IEXPLORE.EXE 4772 IEXPLORE.EXE 4772 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 4532 wrote to memory of 1904 4532 b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe 88 PID 4532 wrote to memory of 1904 4532 b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe 88 PID 4532 wrote to memory of 3600 4532 b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe 89 PID 4532 wrote to memory of 3600 4532 b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe 89 PID 4532 wrote to memory of 1236 4532 b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe 90 PID 4532 wrote to memory of 1236 4532 b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe 90 PID 4532 wrote to memory of 1236 4532 b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe 90 PID 3600 wrote to memory of 3124 3600 iexplore.exe 91 PID 3600 wrote to memory of 3124 3600 iexplore.exe 91 PID 3600 wrote to memory of 3124 3600 iexplore.exe 91 PID 1904 wrote to memory of 4772 1904 iexplore.exe 92 PID 1904 wrote to memory of 4772 1904 iexplore.exe 92 PID 1904 wrote to memory of 4772 1904 iexplore.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b23099f531746bc4be062e516c4f2a83_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://tc.go4321.com/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1904 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4772
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.38522.com/baohanye.html2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3600 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3124
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\B23099~1.EXE > nul2⤵PID:1236
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
651B
MD500faf3eddb8234c67f4fc9dda35f4d0a
SHA152e9529c3ee40e7c9a8ba710d9bdfee63c00b155
SHA256e0dc28244e3299765be7cd899fbc2e4ea40410ef56e4e03c7d6b397aee5c1e59
SHA512b310067afdc422fe45b98a398cde8e0d62b610a7347f0a5e47a28e0ddbc6ce446e76887a06b1ffc4bb84484885886dc01aa471ec79cc3aeaf7be6c5525c21ae0
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{E4A10FD5-2BAB-11EF-9D11-663BBECB1CCD}.dat
Filesize5KB
MD5d9552291eae41e2de1c8c81a0e4859ff
SHA1ba4c1d6077476b2a5054a365082aa84f96065aad
SHA256007a643302e6fad43972068525a74093ee59fd0ba42ceef53b52d4ef9a455ee9
SHA512b1988ac3057c89b5f7ff03efef20f56a05cf5304bbf129d511119ed952267e8c7eb7315399a1281372aa9ca4481929a9dae42c9a57a2fcf3ab114b2b50db61b8
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{E4A136E5-2BAB-11EF-9D11-663BBECB1CCD}.dat
Filesize3KB
MD556523d85b75e4190d631c6947069d2b8
SHA1dee88c83f4144d8fe10747490349f209783d6a46
SHA2567d3c8516d71bbeddbf55448dd5285ab37cc4a3cc756c2a7a775f7f5347211c6f
SHA5124a5072996b811de5a5c02b76928271aac7bc60328df6c619604b54b86dfa514e7c4f9dd63ec394fb383d617d07f9a0636eeb3010f5b12705b0c5722e5be25e7a
-
Filesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
149B
MD565489726ce2b055aeeb241b90f230571
SHA1530474d095b2fd606c02f3b85afd4f2908eb0949
SHA256eecd462ec549a3dda64ed3316fb709f91c04dd873b8e35d79004e58ba02dce9a
SHA5121d2d1221c999b7340af2691b578bf85df783330e216ec83755367d5e85d8f04f62ef514503b4bbf8c5336d13428f688d4762a34fbb6d3e6607a45139633a5697
-
Filesize
155B
MD5761f5bbcd8993b9db625865bd9a1be41
SHA1dff63c0d8b7b1410d952dc452642f53e10f47f19
SHA25662439cd57973cdfcfa7333551bd496279bb101572b2356f345fc0dd157070c5d
SHA51201efccfee3cd433cfc7c84c136d80ce9fcecb691f02aef9e732c4e921d2ee0b3bc739776f8f80928aba50634a45fb3865d6566ed5aa8c15abde6696ae9943b5d
-
Filesize
76B
MD5a5d8afe991a28dcd842fc52a3cb5e9df
SHA1984b4d2ff6ed73516d191cd29b1408e6e26f0f65
SHA256cf4aa8ba3d54066e70453ac006a00fbe45c86ca36970105ec75ed897b0acdefe
SHA512d7fae173c59911e739bce51f18d316f65877d6761643984357ed36a89fbe25dddfbffffffd0a208dff91bc899813af6c7a443256e863c9e803b1d60b92c0a43b