Analysis
-
max time kernel
123s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
17-06-2024 12:27
Behavioral task
behavioral1
Sample
b89d7260914649679198612f3d26d027_JaffaCakes118.exe
Resource
win7-20240220-en
General
-
Target
b89d7260914649679198612f3d26d027_JaffaCakes118.exe
-
Size
2.4MB
-
MD5
b89d7260914649679198612f3d26d027
-
SHA1
8ac1a7fca63b407690d1daa74b3bc52a15372d83
-
SHA256
78d5cc8faa953da913a73fa2da08e4c0dbc0a30e664548a30082a82c55bfdadb
-
SHA512
d6c38d0d736fccdf047981745ce96d16aa804e99e4c4d6e59134e76d92aa396be605fc3ddd9a4081ed04c4bd4b8632bf0a0c1323a901eeaf5d12b653eb5c2da5
-
SSDEEP
49152:f6fE2L44dtszaZP1XGywyeVDJKHDAkmongDjiCxJhFBf/IsIORqdb:fYLhso1XGyg7K0kmog6oPFB4sxqdb
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Signatures
-
Modifies firewall policy service 2 TTPs 3 IoCs
Processes:
b89d7260914649679198612f3d26d027_JaffaCakes118.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" b89d7260914649679198612f3d26d027_JaffaCakes118.exe -
Processes:
b89d7260914649679198612f3d26d027_JaffaCakes118.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" b89d7260914649679198612f3d26d027_JaffaCakes118.exe -
Processes:
b89d7260914649679198612f3d26d027_JaffaCakes118.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" b89d7260914649679198612f3d26d027_JaffaCakes118.exe -
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule C:\Program Files (x86)\MountTaiSoftware\Lodop\CAOSOFT_WEB_PRINT_lodop.ocx acprotect -
Loads dropped DLL 1 IoCs
Processes:
b89d7260914649679198612f3d26d027_JaffaCakes118.exepid process 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral2/memory/3756-0-0x0000000000400000-0x0000000000709000-memory.dmp upx behavioral2/memory/3756-11-0x0000000002630000-0x00000000036BE000-memory.dmp upx behavioral2/memory/3756-8-0x0000000002630000-0x00000000036BE000-memory.dmp upx behavioral2/memory/3756-16-0x0000000002630000-0x00000000036BE000-memory.dmp upx C:\Program Files (x86)\MountTaiSoftware\Lodop\CAOSOFT_WEB_PRINT_lodop.ocx upx behavioral2/memory/3756-33-0x0000000074390000-0x000000007489C000-memory.dmp upx behavioral2/memory/3756-10-0x0000000002630000-0x00000000036BE000-memory.dmp upx behavioral2/memory/3756-12-0x0000000002630000-0x00000000036BE000-memory.dmp upx behavioral2/memory/3756-14-0x0000000002630000-0x00000000036BE000-memory.dmp upx behavioral2/memory/3756-4-0x0000000002630000-0x00000000036BE000-memory.dmp upx behavioral2/memory/3756-7-0x0000000002630000-0x00000000036BE000-memory.dmp upx behavioral2/memory/3756-1-0x0000000002630000-0x00000000036BE000-memory.dmp upx behavioral2/memory/3756-35-0x0000000002630000-0x00000000036BE000-memory.dmp upx behavioral2/memory/3756-36-0x0000000002630000-0x00000000036BE000-memory.dmp upx behavioral2/memory/3756-37-0x0000000002630000-0x00000000036BE000-memory.dmp upx behavioral2/memory/3756-38-0x0000000002630000-0x00000000036BE000-memory.dmp upx behavioral2/memory/3756-39-0x0000000002630000-0x00000000036BE000-memory.dmp upx behavioral2/memory/3756-41-0x0000000002630000-0x00000000036BE000-memory.dmp upx behavioral2/memory/3756-42-0x0000000002630000-0x00000000036BE000-memory.dmp upx behavioral2/memory/3756-43-0x0000000002630000-0x00000000036BE000-memory.dmp upx behavioral2/memory/3756-45-0x0000000002630000-0x00000000036BE000-memory.dmp upx behavioral2/memory/3756-46-0x0000000002630000-0x00000000036BE000-memory.dmp upx behavioral2/memory/3756-48-0x0000000000400000-0x0000000000709000-memory.dmp upx behavioral2/memory/3756-49-0x0000000002630000-0x00000000036BE000-memory.dmp upx behavioral2/memory/3756-51-0x0000000002630000-0x00000000036BE000-memory.dmp upx behavioral2/memory/3756-54-0x0000000002630000-0x00000000036BE000-memory.dmp upx behavioral2/memory/3756-56-0x0000000002630000-0x00000000036BE000-memory.dmp upx behavioral2/memory/3756-58-0x0000000002630000-0x00000000036BE000-memory.dmp upx behavioral2/memory/3756-60-0x0000000002630000-0x00000000036BE000-memory.dmp upx behavioral2/memory/3756-67-0x0000000002630000-0x00000000036BE000-memory.dmp upx behavioral2/memory/3756-69-0x0000000002630000-0x00000000036BE000-memory.dmp upx behavioral2/memory/3756-71-0x0000000002630000-0x00000000036BE000-memory.dmp upx behavioral2/memory/3756-76-0x0000000002630000-0x00000000036BE000-memory.dmp upx behavioral2/memory/3756-78-0x0000000002630000-0x00000000036BE000-memory.dmp upx behavioral2/memory/3756-80-0x0000000002630000-0x00000000036BE000-memory.dmp upx behavioral2/memory/3756-82-0x0000000002630000-0x00000000036BE000-memory.dmp upx behavioral2/memory/3756-84-0x0000000002630000-0x00000000036BE000-memory.dmp upx behavioral2/memory/3756-87-0x0000000002630000-0x00000000036BE000-memory.dmp upx behavioral2/memory/3756-89-0x0000000002630000-0x00000000036BE000-memory.dmp upx behavioral2/memory/3756-91-0x0000000002630000-0x00000000036BE000-memory.dmp upx behavioral2/memory/3756-93-0x0000000002630000-0x00000000036BE000-memory.dmp upx -
Processes:
b89d7260914649679198612f3d26d027_JaffaCakes118.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc b89d7260914649679198612f3d26d027_JaffaCakes118.exe -
Processes:
b89d7260914649679198612f3d26d027_JaffaCakes118.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" b89d7260914649679198612f3d26d027_JaffaCakes118.exe -
Enumerates connected drives 3 TTPs 19 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
b89d7260914649679198612f3d26d027_JaffaCakes118.exedescription ioc process File opened (read-only) \??\N: b89d7260914649679198612f3d26d027_JaffaCakes118.exe File opened (read-only) \??\O: b89d7260914649679198612f3d26d027_JaffaCakes118.exe File opened (read-only) \??\Q: b89d7260914649679198612f3d26d027_JaffaCakes118.exe File opened (read-only) \??\T: b89d7260914649679198612f3d26d027_JaffaCakes118.exe File opened (read-only) \??\W: b89d7260914649679198612f3d26d027_JaffaCakes118.exe File opened (read-only) \??\M: b89d7260914649679198612f3d26d027_JaffaCakes118.exe File opened (read-only) \??\R: b89d7260914649679198612f3d26d027_JaffaCakes118.exe File opened (read-only) \??\V: b89d7260914649679198612f3d26d027_JaffaCakes118.exe File opened (read-only) \??\E: b89d7260914649679198612f3d26d027_JaffaCakes118.exe File opened (read-only) \??\G: b89d7260914649679198612f3d26d027_JaffaCakes118.exe File opened (read-only) \??\I: b89d7260914649679198612f3d26d027_JaffaCakes118.exe File opened (read-only) \??\K: b89d7260914649679198612f3d26d027_JaffaCakes118.exe File opened (read-only) \??\P: b89d7260914649679198612f3d26d027_JaffaCakes118.exe File opened (read-only) \??\Y: b89d7260914649679198612f3d26d027_JaffaCakes118.exe File opened (read-only) \??\J: b89d7260914649679198612f3d26d027_JaffaCakes118.exe File opened (read-only) \??\L: b89d7260914649679198612f3d26d027_JaffaCakes118.exe File opened (read-only) \??\S: b89d7260914649679198612f3d26d027_JaffaCakes118.exe File opened (read-only) \??\U: b89d7260914649679198612f3d26d027_JaffaCakes118.exe File opened (read-only) \??\X: b89d7260914649679198612f3d26d027_JaffaCakes118.exe -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
b89d7260914649679198612f3d26d027_JaffaCakes118.exedescription ioc process File opened for modification C:\autorun.inf b89d7260914649679198612f3d26d027_JaffaCakes118.exe File opened for modification F:\autorun.inf b89d7260914649679198612f3d26d027_JaffaCakes118.exe -
Drops file in Program Files directory 14 IoCs
Processes:
b89d7260914649679198612f3d26d027_JaffaCakes118.exedescription ioc process File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\appvcleaner.exe b89d7260914649679198612f3d26d027_JaffaCakes118.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\IntegratedOffice.exe b89d7260914649679198612f3d26d027_JaffaCakes118.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\OfficeClickToRun.exe b89d7260914649679198612f3d26d027_JaffaCakes118.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7zG.exe b89d7260914649679198612f3d26d027_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe b89d7260914649679198612f3d26d027_JaffaCakes118.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\InspectorOfficeGadget.exe b89d7260914649679198612f3d26d027_JaffaCakes118.exe File created C:\Program Files (x86)\MountTaiSoftware\Lodop\CAOSOFT_WEB_PRINT_lodop.ocx b89d7260914649679198612f3d26d027_JaffaCakes118.exe File created C:\Program Files (x86)\MountTaiSoftware\Lodop\NPCAOSOFT_WEB_PRINT_lodop.dll b89d7260914649679198612f3d26d027_JaffaCakes118.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\AppVShNotify.exe b89d7260914649679198612f3d26d027_JaffaCakes118.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\MavInject32.exe b89d7260914649679198612f3d26d027_JaffaCakes118.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7z.exe b89d7260914649679198612f3d26d027_JaffaCakes118.exe File opened for modification C:\PROGRAM FILES\7-ZIP\Uninstall.exe b89d7260914649679198612f3d26d027_JaffaCakes118.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7zFM.exe b89d7260914649679198612f3d26d027_JaffaCakes118.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\OfficeC2RClient.exe b89d7260914649679198612f3d26d027_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
Processes:
b89d7260914649679198612f3d26d027_JaffaCakes118.exedescription ioc process File opened for modification C:\Windows\SYSTEM.INI b89d7260914649679198612f3d26d027_JaffaCakes118.exe -
Processes:
b89d7260914649679198612f3d26d027_JaffaCakes118.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN\iexplore.exe = "0" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN\Settings b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN\Settings\LOCALMACHINE_CD_UNLOCK = "0" b89d7260914649679198612f3d26d027_JaffaCakes118.exe -
Modifies registry class 64 IoCs
Processes:
b89d7260914649679198612f3d26d027_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{0F9014E9-F31C-408E-9CBA-C484B39066ED}\6.0\HELPDIR\ = "C:\\Program Files (x86)\\MountTaiSoftware\\Lodop\\" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{409D8542-9C63-4719-8DF6-ABDA44494A4E}\TypeLib b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{409D8542-9C63-4719-8DF6-ABDA44494A4E}\TypeLib\ = "{0F9014E9-F31C-408E-9CBA-C484B39066ED}" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0DC96C68-587A-486E-93D8-7BA1EAF5B9CB}\ProxyStubClsid32 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2105C259-1E0C-4534-8141-A753534CB4CA}\MiscStatus\ = "0" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2105C259-1E0C-4534-8141-A753534CB4CA}\ToolboxBitmap32 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{409D8542-9C63-4719-8DF6-ABDA44494A4E} b89d7260914649679198612f3d26d027_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{409D8542-9C63-4719-8DF6-ABDA44494A4E}\TypeLib b89d7260914649679198612f3d26d027_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2105C259-1E0C-4534-8141-A753534CB4CA}\MiscStatus\1 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{0F9014E9-F31C-408E-9CBA-C484B39066ED}\6.0\ = "Lodop" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{0F9014E9-F31C-408E-9CBA-C484B39066ED}\6.0\HELPDIR b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0DC96C68-587A-486E-93D8-7BA1EAF5B9CB}\TypeLib\Version = "6.0" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2105C259-1E0C-4534-8141-A753534CB4CA}\ = "LodopX Control" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2105C259-1E0C-4534-8141-A753534CB4CA}\Version\ = "6.0" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0DC96C68-587A-486E-93D8-7BA1EAF5B9CB}\ = "ILodopXEvents" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2105C259-1E0C-4534-8141-A753534CB4CA}\MiscStatus b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2105C259-1E0C-4534-8141-A753534CB4CA}\ToolboxBitmap32\ = "C:\\Program Files (x86)\\MountTaiSoftware\\Lodop\\CAOSOFT_WEB_PRINT_lodop.ocx,0" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Lodop.LodopX\Clsid\ = "{2105C259-1E0C-4534-8141-A753534CB4CA}" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2105C259-1E0C-4534-8141-A753534CB4CA}\Verb\0\ = "Properties,0,2" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{0F9014E9-F31C-408E-9CBA-C484B39066ED} b89d7260914649679198612f3d26d027_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{0F9014E9-F31C-408E-9CBA-C484B39066ED}\6.0\FLAGS b89d7260914649679198612f3d26d027_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0DC96C68-587A-486E-93D8-7BA1EAF5B9CB} b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{409D8542-9C63-4719-8DF6-ABDA44494A4E}\ = "ILodopX" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{409D8542-9C63-4719-8DF6-ABDA44494A4E}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{409D8542-9C63-4719-8DF6-ABDA44494A4E}\TypeLib\Version = "6.0" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2105C259-1E0C-4534-8141-A753534CB4CA}\InprocServer32\ = "C:\\PROGRA~2\\MOUNTT~1\\Lodop\\CAOSOF~1.OCX" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{0F9014E9-F31C-408E-9CBA-C484B39066ED}\6.0\0\win32\ = "C:\\Program Files (x86)\\MountTaiSoftware\\Lodop\\CAOSOFT_WEB_PRINT_lodop.ocx" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{409D8542-9C63-4719-8DF6-ABDA44494A4E}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0DC96C68-587A-486E-93D8-7BA1EAF5B9CB}\TypeLib b89d7260914649679198612f3d26d027_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0DC96C68-587A-486E-93D8-7BA1EAF5B9CB} b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2105C259-1E0C-4534-8141-A753534CB4CA}\TypeLib\ = "{0F9014E9-F31C-408E-9CBA-C484B39066ED}" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2105C259-1E0C-4534-8141-A753534CB4CA}\Verb\ b89d7260914649679198612f3d26d027_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2105C259-1E0C-4534-8141-A753534CB4CA}\ProgID b89d7260914649679198612f3d26d027_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2105C259-1E0C-4534-8141-A753534CB4CA}\TypeLib b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2105C259-1E0C-4534-8141-A753534CB4CA}\Control\ b89d7260914649679198612f3d26d027_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{409D8542-9C63-4719-8DF6-ABDA44494A4E}\ProxyStubClsid32 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0DC96C68-587A-486E-93D8-7BA1EAF5B9CB}\ProxyStubClsid32 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0DC96C68-587A-486E-93D8-7BA1EAF5B9CB}\TypeLib b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2105C259-1E0C-4534-8141-A753534CB4CA}\MiscStatus\1\ = "205201" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2105C259-1E0C-4534-8141-A753534CB4CA}\Control b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{0F9014E9-F31C-408E-9CBA-C484B39066ED}\6.0\FLAGS\ = "2" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{0F9014E9-F31C-408E-9CBA-C484B39066ED}\6.0\0\win32 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{409D8542-9C63-4719-8DF6-ABDA44494A4E} b89d7260914649679198612f3d26d027_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2105C259-1E0C-4534-8141-A753534CB4CA}\InprocServer32 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2105C259-1E0C-4534-8141-A753534CB4CA}\InprocServer32\ThreadingModel = "Apartment" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Lodop.LodopX b89d7260914649679198612f3d26d027_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{409D8542-9C63-4719-8DF6-ABDA44494A4E}\ProxyStubClsid32 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0DC96C68-587A-486E-93D8-7BA1EAF5B9CB}\ = "ILodopXEvents" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2105C259-1E0C-4534-8141-A753534CB4CA} b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Lodop.LodopX\ = "LodopX Control" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2105C259-1E0C-4534-8141-A753534CB4CA}\Verb\0 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0DC96C68-587A-486E-93D8-7BA1EAF5B9CB}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0DC96C68-587A-486E-93D8-7BA1EAF5B9CB}\TypeLib\Version = "6.0" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{409D8542-9C63-4719-8DF6-ABDA44494A4E}\TypeLib\ = "{0F9014E9-F31C-408E-9CBA-C484B39066ED}" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0DC96C68-587A-486E-93D8-7BA1EAF5B9CB}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0DC96C68-587A-486E-93D8-7BA1EAF5B9CB}\TypeLib\ = "{0F9014E9-F31C-408E-9CBA-C484B39066ED}" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2105C259-1E0C-4534-8141-A753534CB4CA}\Version b89d7260914649679198612f3d26d027_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{0F9014E9-F31C-408E-9CBA-C484B39066ED}\6.0\0 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{409D8542-9C63-4719-8DF6-ABDA44494A4E}\ = "ILodopX" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{409D8542-9C63-4719-8DF6-ABDA44494A4E}\TypeLib\Version = "6.0" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Lodop.LodopX\Clsid b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2105C259-1E0C-4534-8141-A753534CB4CA}\ProgID\ = "Lodop.LodopX" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2105C259-1E0C-4534-8141-A753534CB4CA}\Verb b89d7260914649679198612f3d26d027_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{0F9014E9-F31C-408E-9CBA-C484B39066ED}\6.0 b89d7260914649679198612f3d26d027_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
Processes:
b89d7260914649679198612f3d26d027_JaffaCakes118.exepid process 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
b89d7260914649679198612f3d26d027_JaffaCakes118.exedescription pid process Token: SeDebugPrivilege 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
b89d7260914649679198612f3d26d027_JaffaCakes118.exedescription pid process target process PID 3756 wrote to memory of 772 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe fontdrvhost.exe PID 3756 wrote to memory of 780 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe fontdrvhost.exe PID 3756 wrote to memory of 60 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe dwm.exe PID 3756 wrote to memory of 2520 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe sihost.exe PID 3756 wrote to memory of 2560 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe svchost.exe PID 3756 wrote to memory of 2668 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe taskhostw.exe PID 3756 wrote to memory of 3488 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Explorer.EXE PID 3756 wrote to memory of 3692 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe svchost.exe PID 3756 wrote to memory of 3892 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe DllHost.exe PID 3756 wrote to memory of 3984 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe StartMenuExperienceHost.exe PID 3756 wrote to memory of 4052 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe RuntimeBroker.exe PID 3756 wrote to memory of 764 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe SearchApp.exe PID 3756 wrote to memory of 3048 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe RuntimeBroker.exe PID 3756 wrote to memory of 4092 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe RuntimeBroker.exe PID 3756 wrote to memory of 4520 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe TextInputHost.exe PID 3756 wrote to memory of 756 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe backgroundTaskHost.exe PID 3756 wrote to memory of 772 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe fontdrvhost.exe PID 3756 wrote to memory of 780 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe fontdrvhost.exe PID 3756 wrote to memory of 60 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe dwm.exe PID 3756 wrote to memory of 2520 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe sihost.exe PID 3756 wrote to memory of 2560 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe svchost.exe PID 3756 wrote to memory of 2668 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe taskhostw.exe PID 3756 wrote to memory of 3488 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Explorer.EXE PID 3756 wrote to memory of 3692 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe svchost.exe PID 3756 wrote to memory of 3892 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe DllHost.exe PID 3756 wrote to memory of 3984 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe StartMenuExperienceHost.exe PID 3756 wrote to memory of 4052 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe RuntimeBroker.exe PID 3756 wrote to memory of 764 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe SearchApp.exe PID 3756 wrote to memory of 3048 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe RuntimeBroker.exe PID 3756 wrote to memory of 4092 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe RuntimeBroker.exe PID 3756 wrote to memory of 4520 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe TextInputHost.exe PID 3756 wrote to memory of 1724 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe RuntimeBroker.exe PID 3756 wrote to memory of 3776 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe RuntimeBroker.exe PID 3756 wrote to memory of 772 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe fontdrvhost.exe PID 3756 wrote to memory of 780 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe fontdrvhost.exe PID 3756 wrote to memory of 60 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe dwm.exe PID 3756 wrote to memory of 2520 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe sihost.exe PID 3756 wrote to memory of 2560 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe svchost.exe PID 3756 wrote to memory of 2668 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe taskhostw.exe PID 3756 wrote to memory of 3488 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Explorer.EXE PID 3756 wrote to memory of 3692 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe svchost.exe PID 3756 wrote to memory of 3892 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe DllHost.exe PID 3756 wrote to memory of 3984 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe StartMenuExperienceHost.exe PID 3756 wrote to memory of 4052 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe RuntimeBroker.exe PID 3756 wrote to memory of 764 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe SearchApp.exe PID 3756 wrote to memory of 3048 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe RuntimeBroker.exe PID 3756 wrote to memory of 4092 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe RuntimeBroker.exe PID 3756 wrote to memory of 4520 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe TextInputHost.exe PID 3756 wrote to memory of 1724 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe RuntimeBroker.exe PID 3756 wrote to memory of 3776 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe RuntimeBroker.exe PID 3756 wrote to memory of 772 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe fontdrvhost.exe PID 3756 wrote to memory of 780 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe fontdrvhost.exe PID 3756 wrote to memory of 60 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe dwm.exe PID 3756 wrote to memory of 2520 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe sihost.exe PID 3756 wrote to memory of 2560 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe svchost.exe PID 3756 wrote to memory of 2668 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe taskhostw.exe PID 3756 wrote to memory of 3488 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Explorer.EXE PID 3756 wrote to memory of 3692 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe svchost.exe PID 3756 wrote to memory of 3892 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe DllHost.exe PID 3756 wrote to memory of 3984 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe StartMenuExperienceHost.exe PID 3756 wrote to memory of 4052 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe RuntimeBroker.exe PID 3756 wrote to memory of 764 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe SearchApp.exe PID 3756 wrote to memory of 3048 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe RuntimeBroker.exe PID 3756 wrote to memory of 4092 3756 b89d7260914649679198612f3d26d027_JaffaCakes118.exe RuntimeBroker.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
b89d7260914649679198612f3d26d027_JaffaCakes118.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" b89d7260914649679198612f3d26d027_JaffaCakes118.exe
Processes
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
-
C:\Windows\system32\sihost.exesihost.exe1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\b89d7260914649679198612f3d26d027_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b89d7260914649679198612f3d26d027_JaffaCakes118.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Loads dropped DLL
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Modify Registry
6Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\MountTaiSoftware\Lodop\CAOSOFT_WEB_PRINT_lodop.ocxFilesize
1.5MB
MD5be84f2a691c4767ddacc5f37fe0e5a68
SHA11ae6e280cdb0ed7fe028d18ba175ac1e5062dd80
SHA256600cf26e64b9763963cdf36daf30e84d52d5a191e6d070bcfa1e378768b73cbb
SHA51229954bbf34693dc14228d1a95b55b8fd07e16ee397f53296ca424a8e84ea1bed61a569030acc6bf577faecd5325574c6366a5ddb558c223a8c6ea6f2dceb0d46
-
F:\lcykbp.exeFilesize
100KB
MD5654aa5b7d08e8e581a6c1fc386802835
SHA1b2a613e276ed1c82684d59474db81d02552bac01
SHA256666c1dcf809add0d3de7de6b43d48b7d49beac2ed1eab9ed9bf65778241cc39d
SHA51254f80c1fba62d6f1cf5bed3fb68194328eae40c123884a6c65284c7a1ec67edad0098c5f9e5419bcd460cc2bcdef3d824a91e69a73eb49bee330a57ce42199f4
-
memory/3756-0-0x0000000000400000-0x0000000000709000-memory.dmpFilesize
3.0MB
-
memory/3756-6-0x0000000000860000-0x0000000000861000-memory.dmpFilesize
4KB
-
memory/3756-11-0x0000000002630000-0x00000000036BE000-memory.dmpFilesize
16.6MB
-
memory/3756-9-0x0000000000850000-0x0000000000852000-memory.dmpFilesize
8KB
-
memory/3756-8-0x0000000002630000-0x00000000036BE000-memory.dmpFilesize
16.6MB
-
memory/3756-16-0x0000000002630000-0x00000000036BE000-memory.dmpFilesize
16.6MB
-
memory/3756-34-0x0000000006BD0000-0x0000000006BD1000-memory.dmpFilesize
4KB
-
memory/3756-33-0x0000000074390000-0x000000007489C000-memory.dmpFilesize
5.0MB
-
memory/3756-10-0x0000000002630000-0x00000000036BE000-memory.dmpFilesize
16.6MB
-
memory/3756-12-0x0000000002630000-0x00000000036BE000-memory.dmpFilesize
16.6MB
-
memory/3756-14-0x0000000002630000-0x00000000036BE000-memory.dmpFilesize
16.6MB
-
memory/3756-15-0x0000000000850000-0x0000000000852000-memory.dmpFilesize
8KB
-
memory/3756-13-0x0000000004630000-0x0000000004631000-memory.dmpFilesize
4KB
-
memory/3756-4-0x0000000002630000-0x00000000036BE000-memory.dmpFilesize
16.6MB
-
memory/3756-7-0x0000000002630000-0x00000000036BE000-memory.dmpFilesize
16.6MB
-
memory/3756-5-0x0000000000850000-0x0000000000852000-memory.dmpFilesize
8KB
-
memory/3756-1-0x0000000002630000-0x00000000036BE000-memory.dmpFilesize
16.6MB
-
memory/3756-35-0x0000000002630000-0x00000000036BE000-memory.dmpFilesize
16.6MB
-
memory/3756-36-0x0000000002630000-0x00000000036BE000-memory.dmpFilesize
16.6MB
-
memory/3756-37-0x0000000002630000-0x00000000036BE000-memory.dmpFilesize
16.6MB
-
memory/3756-38-0x0000000002630000-0x00000000036BE000-memory.dmpFilesize
16.6MB
-
memory/3756-39-0x0000000002630000-0x00000000036BE000-memory.dmpFilesize
16.6MB
-
memory/3756-41-0x0000000002630000-0x00000000036BE000-memory.dmpFilesize
16.6MB
-
memory/3756-42-0x0000000002630000-0x00000000036BE000-memory.dmpFilesize
16.6MB
-
memory/3756-43-0x0000000002630000-0x00000000036BE000-memory.dmpFilesize
16.6MB
-
memory/3756-45-0x0000000002630000-0x00000000036BE000-memory.dmpFilesize
16.6MB
-
memory/3756-46-0x0000000002630000-0x00000000036BE000-memory.dmpFilesize
16.6MB
-
memory/3756-48-0x0000000000400000-0x0000000000709000-memory.dmpFilesize
3.0MB
-
memory/3756-49-0x0000000002630000-0x00000000036BE000-memory.dmpFilesize
16.6MB
-
memory/3756-51-0x0000000002630000-0x00000000036BE000-memory.dmpFilesize
16.6MB
-
memory/3756-54-0x0000000002630000-0x00000000036BE000-memory.dmpFilesize
16.6MB
-
memory/3756-56-0x0000000002630000-0x00000000036BE000-memory.dmpFilesize
16.6MB
-
memory/3756-58-0x0000000002630000-0x00000000036BE000-memory.dmpFilesize
16.6MB
-
memory/3756-60-0x0000000002630000-0x00000000036BE000-memory.dmpFilesize
16.6MB
-
memory/3756-67-0x0000000002630000-0x00000000036BE000-memory.dmpFilesize
16.6MB
-
memory/3756-69-0x0000000002630000-0x00000000036BE000-memory.dmpFilesize
16.6MB
-
memory/3756-71-0x0000000002630000-0x00000000036BE000-memory.dmpFilesize
16.6MB
-
memory/3756-75-0x0000000074390000-0x000000007489C000-memory.dmpFilesize
5.0MB
-
memory/3756-74-0x0000000000850000-0x0000000000852000-memory.dmpFilesize
8KB
-
memory/3756-76-0x0000000002630000-0x00000000036BE000-memory.dmpFilesize
16.6MB
-
memory/3756-78-0x0000000002630000-0x00000000036BE000-memory.dmpFilesize
16.6MB
-
memory/3756-80-0x0000000002630000-0x00000000036BE000-memory.dmpFilesize
16.6MB
-
memory/3756-82-0x0000000002630000-0x00000000036BE000-memory.dmpFilesize
16.6MB
-
memory/3756-84-0x0000000002630000-0x00000000036BE000-memory.dmpFilesize
16.6MB
-
memory/3756-86-0x0000000006BD0000-0x0000000006BD1000-memory.dmpFilesize
4KB
-
memory/3756-87-0x0000000002630000-0x00000000036BE000-memory.dmpFilesize
16.6MB
-
memory/3756-89-0x0000000002630000-0x00000000036BE000-memory.dmpFilesize
16.6MB
-
memory/3756-91-0x0000000002630000-0x00000000036BE000-memory.dmpFilesize
16.6MB
-
memory/3756-93-0x0000000002630000-0x00000000036BE000-memory.dmpFilesize
16.6MB