Malware Analysis Report

2024-10-19 10:47

Sample ID 240620-jtrhcaxarh
Target 04313e8642119d3b34a3d8ac56908465_JaffaCakes118
SHA256 6e98178ce94732d4177769617c11fa57951047677ddd6ce1680e2b3a178a8c95
Tags
upx adware persistence stealer
score
8/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
8/10

SHA256

6e98178ce94732d4177769617c11fa57951047677ddd6ce1680e2b3a178a8c95

Threat Level: Likely malicious

The file 04313e8642119d3b34a3d8ac56908465_JaffaCakes118 was found to be: Likely malicious.

Malicious Activity Summary

upx adware persistence stealer

Adds policy Run key to start application

Loads dropped DLL

UPX packed file

ACProtect 1.3x - 1.4x DLL software

Executes dropped EXE

Installs/modifies Browser Helper Object

Unsigned PE

Modifies registry class

Suspicious behavior: EnumeratesProcesses

Suspicious use of WriteProcessMemory

Modifies Internet Explorer settings

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-20 07:57

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-20 07:57

Reported

2024-06-20 08:00

Platform

win7-20240611-en

Max time kernel

150s

Max time network

124s

Command Line

"C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe"

Signatures

Adds policy Run key to start application

persistence
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\explorer\run C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\start = "C:\\Users\\Admin\\AppData\\Local\\Temp\\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe" C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A

ACProtect 1.3x - 1.4x DLL software

Description Indicator Process Target
N/A N/A N/A N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\iebtmm.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Installs/modifies Browser Helper Object

stealer adware
Description Indicator Process Target
Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{D46BEAA4-A304-40B3-A9DA-EC7F7F501F25} C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{D46BEAA4-A304-40B3-A9DA-EC7F7F501F25}\ C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes\{DAED9266-8C28-4C1C-8B58-5C66EFF1D302} C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes\{DAED9266-8C28-4C1C-8B58-5C66EFF1D302}\DisplayName = "Search" C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes\{DAED9266-8C28-4C1C-8B58-5C66EFF1D302}\URL = "http://www.managesearches.com/index.php?b=1&t=0&q={searchTerms}" C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Extensions\{9034A523-D068-4BE8-A284-9DF278BE776E}\Exec = "http://www.browseroption.com/redirect.php" C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Extensions\{9034A523-D068-4BE8-A284-9DF278BE776E}\CLSID = "{1FBA04EE-3024-11d2-8F1F-0000F87ABD16}" C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Search C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes\DefaultScope = "{DAED9266-8C28-4C1C-8B58-5C66EFF1D302}" C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Extensions\{9034A523-D068-4BE8-A284-9DF278BE776E} C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Extensions\{9034A523-D068-4BE8-A284-9DF278BE776E}\MenuText = "IE Anti-Spyware" C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A

Modifies registry class

Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D46BEAA4-A304-40B3-A9DA-EC7F7F501F25}\InprocServer32\ThreadingModel = "Apartment" C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
Key created \REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
Key created \REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{D46BEAA4-A304-40B3-A9DA-EC7F7F501F25} C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D46BEAA4-A304-40B3-A9DA-EC7F7F501F25}\ddd = "ddd" C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
Key created \REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{D46BEAA4-A304-40B3-A9DA-EC7F7F501F25}\InprocServer32 C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D46BEAA4-A304-40B3-A9DA-EC7F7F501F25}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\iebt.dll" C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\iebtmm.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\iebtmm.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\iebtmm.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\iebtmm.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\iebtmm.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\iebtmm.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\iebtmm.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\iebtmm.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\iebtmm.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\iebtmm.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\iebtmm.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\iebtmm.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\iebtmm.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\iebtmm.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\iebtmm.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\iebtmm.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\iebtmm.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\iebtmm.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\iebtmm.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\iebtmm.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\iebtmm.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\iebtmm.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\iebtmm.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\iebtmm.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\iebtmm.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\iebtmm.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\iebtmm.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\iebtmm.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\iebtmm.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe"

C:\Windows\SysWOW64\ctfmon.exe

ctfmon.exe

C:\Users\Admin\AppData\Local\Temp\iebtmm.exe

C:\Users\Admin\AppData\Local\Temp\iebtmm.exe

Network

N/A

Files

memory/1916-0-0x0000000000400000-0x000000000040C000-memory.dmp

\Users\Admin\AppData\Local\Temp\iebt.dll

MD5 1751401df95a07f46f382ca64e371ce2
SHA1 292bf09ba3f550f2570d0852dfc31d70c0d3539b
SHA256 e74eb2d590f545290c3e42c9b6369869d180204d0c393af1db01bf3e3f25f634
SHA512 9e2ddcfdca8227b02baf34d893876dd393d7bf45dd347cc2a2dac98c43ea91088dca28457101c4a3d76e247beaf324f4bf0f863da611b331fd18b8ecbdcea3a1

memory/1916-4-0x0000000010000000-0x0000000010009000-memory.dmp

\Users\Admin\AppData\Local\Temp\iebtmm.exe

MD5 9b0f66fdd9cd358a62c3c9fcc20ec5cc
SHA1 82a176fa4224c6b68deb641745954ea9db65ede0
SHA256 560649782e14d9ddc13be659c6b9d9b812de83dcd8a8272729413e8527533fe9
SHA512 9b6d7b5c6e59a8c4acd2c84195ebaa40a7433350acb4152ab0d8c9b8496a9197cf3231a8c1bb7fbb6421c68487394aa318d7d7078ddd5556dc92e784614b9a60

memory/1916-8-0x0000000000260000-0x0000000000267000-memory.dmp

memory/2960-14-0x0000000000400000-0x0000000000407000-memory.dmp

memory/1916-15-0x0000000000400000-0x000000000040C000-memory.dmp

memory/2960-16-0x0000000000400000-0x0000000000407000-memory.dmp

memory/1916-18-0x0000000010000000-0x0000000010009000-memory.dmp

memory/1916-20-0x0000000000260000-0x0000000000267000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-20 07:57

Reported

2024-06-20 08:00

Platform

win10v2004-20240611-en

Max time kernel

150s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe"

Signatures

Adds policy Run key to start application

persistence
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\explorer\run C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\start = "C:\\Users\\Admin\\AppData\\Local\\Temp\\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe" C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A

ACProtect 1.3x - 1.4x DLL software

Description Indicator Process Target
N/A N/A N/A N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\iebtmm.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Installs/modifies Browser Helper Object

stealer adware
Description Indicator Process Target
Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{D46BEAA4-A304-40B3-A9DA-EC7F7F501F25} C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{D46BEAA4-A304-40B3-A9DA-EC7F7F501F25}\ C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\Software\Microsoft\Internet Explorer\SearchScopes\{DAED9266-8C28-4C1C-8B58-5C66EFF1D302} C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{DAED9266-8C28-4C1C-8B58-5C66EFF1D302}\DisplayName = "Search" C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{9034A523-D068-4BE8-A284-9DF278BE776E} C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\Software\Microsoft\Internet Explorer\Search C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\Software\Microsoft\Internet Explorer\Main C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{DAED9266-8C28-4C1C-8B58-5C66EFF1D302}\URL = "http://www.managesearches.com/index.php?b=1&t=0&q={searchTerms}" C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\Software\Microsoft\Internet Explorer\SearchScopes C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\DefaultScope = "{DAED9266-8C28-4C1C-8B58-5C66EFF1D302}" C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{9034A523-D068-4BE8-A284-9DF278BE776E}\MenuText = "IE Anti-Spyware" C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{9034A523-D068-4BE8-A284-9DF278BE776E}\Exec = "http://www.browseroption.com/redirect.php" C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{9034A523-D068-4BE8-A284-9DF278BE776E}\CLSID = "{1FBA04EE-3024-11d2-8F1F-0000F87ABD16}" C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{D46BEAA4-A304-40B3-A9DA-EC7F7F501F25} C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D46BEAA4-A304-40B3-A9DA-EC7F7F501F25}\ddd = "ddd" C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{D46BEAA4-A304-40B3-A9DA-EC7F7F501F25}\InprocServer32 C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D46BEAA4-A304-40B3-A9DA-EC7F7F501F25}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\iebt.dll" C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D46BEAA4-A304-40B3-A9DA-EC7F7F501F25}\InprocServer32\ThreadingModel = "Apartment" C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\iebtmm.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\iebtmm.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\iebtmm.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\iebtmm.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\iebtmm.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\iebtmm.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\iebtmm.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\iebtmm.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\iebtmm.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\iebtmm.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\iebtmm.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\iebtmm.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\iebtmm.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\iebtmm.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\iebtmm.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\iebtmm.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\iebtmm.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\iebtmm.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\iebtmm.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\iebtmm.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\iebtmm.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\iebtmm.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\iebtmm.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\iebtmm.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\iebtmm.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\iebtmm.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\iebtmm.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\iebtmm.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\iebtmm.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\iebtmm.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\04313e8642119d3b34a3d8ac56908465_JaffaCakes118.exe"

C:\Users\Admin\AppData\Local\Temp\iebtmm.exe

C:\Users\Admin\AppData\Local\Temp\iebtmm.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
US 8.8.8.8:53 133.32.126.40.in-addr.arpa udp
NL 23.62.61.171:443 www.bing.com tcp
US 8.8.8.8:53 171.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 205.47.74.20.in-addr.arpa udp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 106.90.14.23.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 30.243.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 10.27.171.150.in-addr.arpa udp

Files

memory/436-0-0x0000000000400000-0x000000000040C000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\iebt.dll

MD5 1751401df95a07f46f382ca64e371ce2
SHA1 292bf09ba3f550f2570d0852dfc31d70c0d3539b
SHA256 e74eb2d590f545290c3e42c9b6369869d180204d0c393af1db01bf3e3f25f634
SHA512 9e2ddcfdca8227b02baf34d893876dd393d7bf45dd347cc2a2dac98c43ea91088dca28457101c4a3d76e247beaf324f4bf0f863da611b331fd18b8ecbdcea3a1

memory/436-5-0x0000000010000000-0x0000000010009000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\iebtmm.exe

MD5 9b0f66fdd9cd358a62c3c9fcc20ec5cc
SHA1 82a176fa4224c6b68deb641745954ea9db65ede0
SHA256 560649782e14d9ddc13be659c6b9d9b812de83dcd8a8272729413e8527533fe9
SHA512 9b6d7b5c6e59a8c4acd2c84195ebaa40a7433350acb4152ab0d8c9b8496a9197cf3231a8c1bb7fbb6421c68487394aa318d7d7078ddd5556dc92e784614b9a60

memory/2268-10-0x0000000000400000-0x0000000000407000-memory.dmp

memory/436-11-0x0000000000400000-0x000000000040C000-memory.dmp

memory/2268-12-0x0000000000400000-0x0000000000407000-memory.dmp

memory/436-15-0x0000000010000000-0x0000000010009000-memory.dmp