Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
23/06/2024, 22:35
Static task
static1
Behavioral task
behavioral1
Sample
031b34370c6913ac54cbcbccac4a55c7_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
031b34370c6913ac54cbcbccac4a55c7_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
031b34370c6913ac54cbcbccac4a55c7_JaffaCakes118.exe
-
Size
564KB
-
MD5
031b34370c6913ac54cbcbccac4a55c7
-
SHA1
d0778c193dbf76cf93df3db1d5b51b136a02c9b1
-
SHA256
939895d56ad30824b5c8dfbd70e36e35ead9ca0cbb987fcc322212d01de25700
-
SHA512
6dec35c09395e06069ced9496561afcb9c09b5ad80b8ac16c3f3857ca11d7e071554970dde6894eac7cee5a42d63d62db996e027c579dc2dfe52ce05efa492ae
-
SSDEEP
6144:G7KEGlVcJboOtGY8q75yKC2qJDrNRlpwPBYgZ9fVU93eJwN6QFbSpO4XcA2n4aAL:G7Kr3QboC9qLGKgZKe4HYpHvcbT
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" yepeoopsioz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" cbkkx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" cbkkx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" yepeoopsioz.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" yepeoopsioz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" yepeoopsioz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" cbkkx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" cbkkx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" yepeoopsioz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" yepeoopsioz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cbkkx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" cbkkx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" yepeoopsioz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cbkkx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" cbkkx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" cbkkx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" cbkkx.exe -
Adds policy Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\uzounuisyle = "crqgjaysifiytsmwhuqfe.exe" cbkkx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\uzounuisyle = "grmyxkeugzykbwmsz.exe" cbkkx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run yepeoopsioz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\prdgwals = "C:\\Users\\Admin\\AppData\\Local\\Temp\\nbzoqgdwlhjysqjscojx.exe" cbkkx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\uzounuisyle = "ankyzokcqlmatqiqzke.exe" cbkkx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run cbkkx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\prdgwals = "C:\\Users\\Admin\\AppData\\Local\\Temp\\nbzoqgdwlhjysqjscojx.exe" cbkkx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\prdgwals = "C:\\Users\\Admin\\AppData\\Local\\Temp\\pbxkkytkxrrewsjqyi.exe" cbkkx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\uzounuisyle = "ankyzokcqlmatqiqzke.exe" cbkkx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\prdgwals = "C:\\Users\\Admin\\AppData\\Local\\Temp\\pbxkkytkxrrewsjqyi.exe" cbkkx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\uzounuisyle = "crqgjaysifiytsmwhuqfe.exe" cbkkx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\prdgwals = "C:\\Users\\Admin\\AppData\\Local\\Temp\\grmyxkeugzykbwmsz.exe" yepeoopsioz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\uzounuisyle = "nbzoqgdwlhjysqjscojx.exe" cbkkx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\prdgwals = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ankyzokcqlmatqiqzke.exe" cbkkx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run cbkkx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\prdgwals = "C:\\Users\\Admin\\AppData\\Local\\Temp\\grmyxkeugzykbwmsz.exe" cbkkx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\prdgwals = "C:\\Users\\Admin\\AppData\\Local\\Temp\\crqgjaysifiytsmwhuqfe.exe" cbkkx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\uzounuisyle = "zjdomyrgrjhsicrw.exe" cbkkx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\uzounuisyle = "nbzoqgdwlhjysqjscojx.exe" yepeoopsioz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\uzounuisyle = "nbzoqgdwlhjysqjscojx.exe" cbkkx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\uzounuisyle = "pbxkkytkxrrewsjqyi.exe" cbkkx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\prdgwals = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ankyzokcqlmatqiqzke.exe" cbkkx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\uzounuisyle = "zjdomyrgrjhsicrw.exe" yepeoopsioz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\prdgwals = "C:\\Users\\Admin\\AppData\\Local\\Temp\\grmyxkeugzykbwmsz.exe" yepeoopsioz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run yepeoopsioz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\uzounuisyle = "zjdomyrgrjhsicrw.exe" cbkkx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\prdgwals = "C:\\Users\\Admin\\AppData\\Local\\Temp\\grmyxkeugzykbwmsz.exe" cbkkx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\uzounuisyle = "pbxkkytkxrrewsjqyi.exe" cbkkx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\uzounuisyle = "grmyxkeugzykbwmsz.exe" cbkkx.exe -
Disables RegEdit via registry modification 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" cbkkx.exe Set value (int) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" cbkkx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" cbkkx.exe Set value (int) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" yepeoopsioz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" yepeoopsioz.exe Set value (int) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" cbkkx.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\Control Panel\International\Geo\Nation 031b34370c6913ac54cbcbccac4a55c7_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\Control Panel\International\Geo\Nation yepeoopsioz.exe -
Executes dropped EXE 4 IoCs
pid Process 4560 yepeoopsioz.exe 4196 cbkkx.exe 2084 cbkkx.exe 2988 yepeoopsioz.exe -
Impair Defenses: Safe Mode Boot 1 TTPs 6 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\CBDHSvc cbkkx.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\UserManager cbkkx.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\SerCx2.sys cbkkx.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\ProfSvc cbkkx.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\Power cbkkx.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\iai2c.sys cbkkx.exe -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\zdrwouhqvh = "zjdomyrgrjhsicrw.exe ." cbkkx.exe Set value (str) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\qxowraqckzucp = "zjdomyrgrjhsicrw.exe ." cbkkx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\udwgdoguevscrky = "C:\\Users\\Admin\\AppData\\Local\\Temp\\grmyxkeugzykbwmsz.exe" cbkkx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\zdrwouhqvh = "crqgjaysifiytsmwhuqfe.exe ." cbkkx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\udwgdoguevscrky = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ankyzokcqlmatqiqzke.exe" cbkkx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\rzrawgxktjfocu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\pbxkkytkxrrewsjqyi.exe ." cbkkx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\udwgdoguevscrky = "C:\\Users\\Admin\\AppData\\Local\\Temp\\crqgjaysifiytsmwhuqfe.exe" cbkkx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\rzrawgxktjfocu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\crqgjaysifiytsmwhuqfe.exe ." yepeoopsioz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\qxowraqckzucp = "crqgjaysifiytsmwhuqfe.exe ." cbkkx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\gjwarwiqu = "pbxkkytkxrrewsjqyi.exe" cbkkx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\zdrwouhqvh = "nbzoqgdwlhjysqjscojx.exe ." cbkkx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\rzrawgxktjfocu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zjdomyrgrjhsicrw.exe ." cbkkx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\udwgdoguevscrky = "C:\\Users\\Admin\\AppData\\Local\\Temp\\nbzoqgdwlhjysqjscojx.exe" cbkkx.exe Set value (str) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rxnuowlwdrls = "crqgjaysifiytsmwhuqfe.exe" yepeoopsioz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\qxowraqckzucp = "pbxkkytkxrrewsjqyi.exe ." cbkkx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\rzrawgxktjfocu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\pbxkkytkxrrewsjqyi.exe ." yepeoopsioz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\rzrawgxktjfocu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\grmyxkeugzykbwmsz.exe ." cbkkx.exe Set value (str) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gjwarwiqu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ankyzokcqlmatqiqzke.exe" cbkkx.exe Set value (str) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gjwarwiqu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zjdomyrgrjhsicrw.exe" cbkkx.exe Set value (str) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rxnuowlwdrls = "ankyzokcqlmatqiqzke.exe" cbkkx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\gjwarwiqu = "grmyxkeugzykbwmsz.exe" cbkkx.exe Set value (str) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gjwarwiqu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\crqgjaysifiytsmwhuqfe.exe" yepeoopsioz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gjwarwiqu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\pbxkkytkxrrewsjqyi.exe" cbkkx.exe Set value (str) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\qxowraqckzucp = "nbzoqgdwlhjysqjscojx.exe ." cbkkx.exe Set value (str) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rxnuowlwdrls = "grmyxkeugzykbwmsz.exe" yepeoopsioz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\gjwarwiqu = "crqgjaysifiytsmwhuqfe.exe" cbkkx.exe Set value (str) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\zdrwouhqvh = "C:\\Users\\Admin\\AppData\\Local\\Temp\\nbzoqgdwlhjysqjscojx.exe ." cbkkx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\rzrawgxktjfocu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\grmyxkeugzykbwmsz.exe ." cbkkx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\gjwarwiqu = "pbxkkytkxrrewsjqyi.exe" cbkkx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\udwgdoguevscrky = "C:\\Users\\Admin\\AppData\\Local\\Temp\\grmyxkeugzykbwmsz.exe" yepeoopsioz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\qxowraqckzucp = "crqgjaysifiytsmwhuqfe.exe ." cbkkx.exe Set value (str) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gjwarwiqu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\nbzoqgdwlhjysqjscojx.exe" cbkkx.exe Set value (str) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\qxowraqckzucp = "pbxkkytkxrrewsjqyi.exe ." yepeoopsioz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\zdrwouhqvh = "zjdomyrgrjhsicrw.exe ." yepeoopsioz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\gjwarwiqu = "zjdomyrgrjhsicrw.exe" cbkkx.exe Set value (str) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gjwarwiqu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zjdomyrgrjhsicrw.exe" cbkkx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\gjwarwiqu = "grmyxkeugzykbwmsz.exe" yepeoopsioz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\udwgdoguevscrky = "C:\\Users\\Admin\\AppData\\Local\\Temp\\crqgjaysifiytsmwhuqfe.exe" cbkkx.exe Set value (str) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gjwarwiqu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zjdomyrgrjhsicrw.exe" yepeoopsioz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\qxowraqckzucp = "ankyzokcqlmatqiqzke.exe ." cbkkx.exe Set value (str) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gjwarwiqu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ankyzokcqlmatqiqzke.exe" cbkkx.exe Set value (str) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rxnuowlwdrls = "pbxkkytkxrrewsjqyi.exe" cbkkx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\zdrwouhqvh = "pbxkkytkxrrewsjqyi.exe ." cbkkx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\udwgdoguevscrky = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ankyzokcqlmatqiqzke.exe" cbkkx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\zdrwouhqvh = "zjdomyrgrjhsicrw.exe ." cbkkx.exe Set value (str) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\zdrwouhqvh = "C:\\Users\\Admin\\AppData\\Local\\Temp\\nbzoqgdwlhjysqjscojx.exe ." cbkkx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\zdrwouhqvh = "pbxkkytkxrrewsjqyi.exe ." cbkkx.exe Set value (str) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rxnuowlwdrls = "crqgjaysifiytsmwhuqfe.exe" cbkkx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\gjwarwiqu = "nbzoqgdwlhjysqjscojx.exe" cbkkx.exe Set value (str) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\zdrwouhqvh = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zjdomyrgrjhsicrw.exe ." yepeoopsioz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\qxowraqckzucp = "nbzoqgdwlhjysqjscojx.exe ." cbkkx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\rzrawgxktjfocu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zjdomyrgrjhsicrw.exe ." cbkkx.exe Set value (str) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\zdrwouhqvh = "C:\\Users\\Admin\\AppData\\Local\\Temp\\crqgjaysifiytsmwhuqfe.exe ." cbkkx.exe Set value (str) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\zdrwouhqvh = "C:\\Users\\Admin\\AppData\\Local\\Temp\\pbxkkytkxrrewsjqyi.exe ." cbkkx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\rzrawgxktjfocu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\pbxkkytkxrrewsjqyi.exe ." cbkkx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\udwgdoguevscrky = "C:\\Users\\Admin\\AppData\\Local\\Temp\\pbxkkytkxrrewsjqyi.exe" yepeoopsioz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\qxowraqckzucp = "ankyzokcqlmatqiqzke.exe ." cbkkx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\gjwarwiqu = "grmyxkeugzykbwmsz.exe" cbkkx.exe Set value (str) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\zdrwouhqvh = "C:\\Users\\Admin\\AppData\\Local\\Temp\\crqgjaysifiytsmwhuqfe.exe ." cbkkx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\gjwarwiqu = "crqgjaysifiytsmwhuqfe.exe" cbkkx.exe Set value (str) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rxnuowlwdrls = "ankyzokcqlmatqiqzke.exe" cbkkx.exe Set value (str) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rxnuowlwdrls = "zjdomyrgrjhsicrw.exe" cbkkx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\zdrwouhqvh = "grmyxkeugzykbwmsz.exe ." cbkkx.exe Set value (str) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gjwarwiqu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\crqgjaysifiytsmwhuqfe.exe" cbkkx.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cbkkx.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cbkkx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" yepeoopsioz.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA yepeoopsioz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" yepeoopsioz.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA yepeoopsioz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cbkkx.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cbkkx.exe -
Looks up external IP address via web service 8 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 30 www.showmyipaddress.com 45 www.whatismyip.ca 47 whatismyip.everdot.org 52 whatismyip.everdot.org 53 www.whatismyip.ca 54 whatismyip.everdot.org 25 whatismyip.everdot.org 26 whatismyipaddress.com -
Drops autorun.inf file 1 TTPs 4 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created F:\autorun.inf cbkkx.exe File opened for modification C:\autorun.inf cbkkx.exe File created C:\autorun.inf cbkkx.exe File opened for modification F:\autorun.inf cbkkx.exe -
Drops file in System32 directory 32 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ankyzokcqlmatqiqzke.exe yepeoopsioz.exe File opened for modification C:\Windows\SysWOW64\ankyzokcqlmatqiqzke.exe yepeoopsioz.exe File opened for modification C:\Windows\SysWOW64\nbzoqgdwlhjysqjscojx.exe cbkkx.exe File opened for modification C:\Windows\SysWOW64\grmyxkeugzykbwmsz.exe yepeoopsioz.exe File opened for modification C:\Windows\SysWOW64\crqgjaysifiytsmwhuqfe.exe yepeoopsioz.exe File opened for modification C:\Windows\SysWOW64\zjdomyrgrjhsicrw.exe cbkkx.exe File opened for modification C:\Windows\SysWOW64\crqgjaysifiytsmwhuqfe.exe cbkkx.exe File opened for modification C:\Windows\SysWOW64\ankyzokcqlmatqiqzke.exe cbkkx.exe File opened for modification C:\Windows\SysWOW64\nbzoqgdwlhjysqjscojx.exe yepeoopsioz.exe File opened for modification C:\Windows\SysWOW64\crqgjaysifiytsmwhuqfe.exe yepeoopsioz.exe File opened for modification C:\Windows\SysWOW64\zjdomyrgrjhsicrw.exe yepeoopsioz.exe File opened for modification C:\Windows\SysWOW64\pbxkkytkxrrewsjqyi.exe yepeoopsioz.exe File opened for modification C:\Windows\SysWOW64\ankyzokcqlmatqiqzke.exe cbkkx.exe File opened for modification C:\Windows\SysWOW64\tjjaewvqhfjawwrcoczppg.exe cbkkx.exe File opened for modification C:\Windows\SysWOW64\pbxkkytkxrrewsjqyi.exe cbkkx.exe File opened for modification C:\Windows\SysWOW64\zjdomyrgrjhsicrw.exe cbkkx.exe File opened for modification C:\Windows\SysWOW64\tjjaewvqhfjawwrcoczppg.exe cbkkx.exe File opened for modification C:\Windows\SysWOW64\pbxkkytkxrrewsjqyi.exe yepeoopsioz.exe File opened for modification C:\Windows\SysWOW64\grmyxkeugzykbwmsz.exe cbkkx.exe File created C:\Windows\SysWOW64\mjqozyegejusvcewpkolsqbag.glw cbkkx.exe File opened for modification C:\Windows\SysWOW64\nbzoqgdwlhjysqjscojx.exe yepeoopsioz.exe File opened for modification C:\Windows\SysWOW64\zjdomyrgrjhsicrw.exe yepeoopsioz.exe File opened for modification C:\Windows\SysWOW64\pbxkkytkxrrewsjqyi.exe cbkkx.exe File opened for modification C:\Windows\SysWOW64\crqgjaysifiytsmwhuqfe.exe cbkkx.exe File opened for modification C:\Windows\SysWOW64\grmyxkeugzykbwmsz.exe yepeoopsioz.exe File opened for modification C:\Windows\SysWOW64\tjjaewvqhfjawwrcoczppg.exe yepeoopsioz.exe File opened for modification C:\Windows\SysWOW64\tjjaewvqhfjawwrcoczppg.exe yepeoopsioz.exe File opened for modification C:\Windows\SysWOW64\grmyxkeugzykbwmsz.exe cbkkx.exe File opened for modification C:\Windows\SysWOW64\rzrawgxktjfocuhkoujrjsoypclbxgumzcgm.jbk cbkkx.exe File created C:\Windows\SysWOW64\rzrawgxktjfocuhkoujrjsoypclbxgumzcgm.jbk cbkkx.exe File opened for modification C:\Windows\SysWOW64\nbzoqgdwlhjysqjscojx.exe cbkkx.exe File opened for modification C:\Windows\SysWOW64\mjqozyegejusvcewpkolsqbag.glw cbkkx.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files (x86)\mjqozyegejusvcewpkolsqbag.glw cbkkx.exe File opened for modification C:\Program Files (x86)\rzrawgxktjfocuhkoujrjsoypclbxgumzcgm.jbk cbkkx.exe File created C:\Program Files (x86)\rzrawgxktjfocuhkoujrjsoypclbxgumzcgm.jbk cbkkx.exe File opened for modification C:\Program Files (x86)\mjqozyegejusvcewpkolsqbag.glw cbkkx.exe -
Drops file in Windows directory 32 IoCs
description ioc Process File opened for modification C:\Windows\tjjaewvqhfjawwrcoczppg.exe cbkkx.exe File opened for modification C:\Windows\tjjaewvqhfjawwrcoczppg.exe cbkkx.exe File opened for modification C:\Windows\grmyxkeugzykbwmsz.exe yepeoopsioz.exe File opened for modification C:\Windows\pbxkkytkxrrewsjqyi.exe yepeoopsioz.exe File opened for modification C:\Windows\ankyzokcqlmatqiqzke.exe yepeoopsioz.exe File opened for modification C:\Windows\tjjaewvqhfjawwrcoczppg.exe yepeoopsioz.exe File opened for modification C:\Windows\crqgjaysifiytsmwhuqfe.exe yepeoopsioz.exe File opened for modification C:\Windows\tjjaewvqhfjawwrcoczppg.exe yepeoopsioz.exe File opened for modification C:\Windows\pbxkkytkxrrewsjqyi.exe cbkkx.exe File opened for modification C:\Windows\crqgjaysifiytsmwhuqfe.exe yepeoopsioz.exe File opened for modification C:\Windows\nbzoqgdwlhjysqjscojx.exe yepeoopsioz.exe File opened for modification C:\Windows\zjdomyrgrjhsicrw.exe cbkkx.exe File created C:\Windows\mjqozyegejusvcewpkolsqbag.glw cbkkx.exe File opened for modification C:\Windows\zjdomyrgrjhsicrw.exe yepeoopsioz.exe File opened for modification C:\Windows\pbxkkytkxrrewsjqyi.exe cbkkx.exe File opened for modification C:\Windows\ankyzokcqlmatqiqzke.exe cbkkx.exe File created C:\Windows\rzrawgxktjfocuhkoujrjsoypclbxgumzcgm.jbk cbkkx.exe File opened for modification C:\Windows\ankyzokcqlmatqiqzke.exe yepeoopsioz.exe File opened for modification C:\Windows\nbzoqgdwlhjysqjscojx.exe yepeoopsioz.exe File opened for modification C:\Windows\zjdomyrgrjhsicrw.exe cbkkx.exe File opened for modification C:\Windows\ankyzokcqlmatqiqzke.exe cbkkx.exe File opened for modification C:\Windows\grmyxkeugzykbwmsz.exe cbkkx.exe File opened for modification C:\Windows\rzrawgxktjfocuhkoujrjsoypclbxgumzcgm.jbk cbkkx.exe File opened for modification C:\Windows\zjdomyrgrjhsicrw.exe yepeoopsioz.exe File opened for modification C:\Windows\grmyxkeugzykbwmsz.exe yepeoopsioz.exe File opened for modification C:\Windows\nbzoqgdwlhjysqjscojx.exe cbkkx.exe File opened for modification C:\Windows\crqgjaysifiytsmwhuqfe.exe cbkkx.exe File opened for modification C:\Windows\nbzoqgdwlhjysqjscojx.exe cbkkx.exe File opened for modification C:\Windows\mjqozyegejusvcewpkolsqbag.glw cbkkx.exe File opened for modification C:\Windows\pbxkkytkxrrewsjqyi.exe yepeoopsioz.exe File opened for modification C:\Windows\grmyxkeugzykbwmsz.exe cbkkx.exe File opened for modification C:\Windows\crqgjaysifiytsmwhuqfe.exe cbkkx.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1840 031b34370c6913ac54cbcbccac4a55c7_JaffaCakes118.exe 1840 031b34370c6913ac54cbcbccac4a55c7_JaffaCakes118.exe 1840 031b34370c6913ac54cbcbccac4a55c7_JaffaCakes118.exe 1840 031b34370c6913ac54cbcbccac4a55c7_JaffaCakes118.exe 1840 031b34370c6913ac54cbcbccac4a55c7_JaffaCakes118.exe 1840 031b34370c6913ac54cbcbccac4a55c7_JaffaCakes118.exe 1840 031b34370c6913ac54cbcbccac4a55c7_JaffaCakes118.exe 1840 031b34370c6913ac54cbcbccac4a55c7_JaffaCakes118.exe 1840 031b34370c6913ac54cbcbccac4a55c7_JaffaCakes118.exe 1840 031b34370c6913ac54cbcbccac4a55c7_JaffaCakes118.exe 1840 031b34370c6913ac54cbcbccac4a55c7_JaffaCakes118.exe 1840 031b34370c6913ac54cbcbccac4a55c7_JaffaCakes118.exe 1840 031b34370c6913ac54cbcbccac4a55c7_JaffaCakes118.exe 1840 031b34370c6913ac54cbcbccac4a55c7_JaffaCakes118.exe 2084 cbkkx.exe 2084 cbkkx.exe 1840 031b34370c6913ac54cbcbccac4a55c7_JaffaCakes118.exe 1840 031b34370c6913ac54cbcbccac4a55c7_JaffaCakes118.exe 1840 031b34370c6913ac54cbcbccac4a55c7_JaffaCakes118.exe 1840 031b34370c6913ac54cbcbccac4a55c7_JaffaCakes118.exe 1840 031b34370c6913ac54cbcbccac4a55c7_JaffaCakes118.exe 1840 031b34370c6913ac54cbcbccac4a55c7_JaffaCakes118.exe 1840 031b34370c6913ac54cbcbccac4a55c7_JaffaCakes118.exe 1840 031b34370c6913ac54cbcbccac4a55c7_JaffaCakes118.exe 1840 031b34370c6913ac54cbcbccac4a55c7_JaffaCakes118.exe 1840 031b34370c6913ac54cbcbccac4a55c7_JaffaCakes118.exe 1840 031b34370c6913ac54cbcbccac4a55c7_JaffaCakes118.exe 1840 031b34370c6913ac54cbcbccac4a55c7_JaffaCakes118.exe 1840 031b34370c6913ac54cbcbccac4a55c7_JaffaCakes118.exe 1840 031b34370c6913ac54cbcbccac4a55c7_JaffaCakes118.exe 1840 031b34370c6913ac54cbcbccac4a55c7_JaffaCakes118.exe 1840 031b34370c6913ac54cbcbccac4a55c7_JaffaCakes118.exe 1840 031b34370c6913ac54cbcbccac4a55c7_JaffaCakes118.exe 1840 031b34370c6913ac54cbcbccac4a55c7_JaffaCakes118.exe 1840 031b34370c6913ac54cbcbccac4a55c7_JaffaCakes118.exe 1840 031b34370c6913ac54cbcbccac4a55c7_JaffaCakes118.exe 1840 031b34370c6913ac54cbcbccac4a55c7_JaffaCakes118.exe 1840 031b34370c6913ac54cbcbccac4a55c7_JaffaCakes118.exe 1840 031b34370c6913ac54cbcbccac4a55c7_JaffaCakes118.exe 1840 031b34370c6913ac54cbcbccac4a55c7_JaffaCakes118.exe 1840 031b34370c6913ac54cbcbccac4a55c7_JaffaCakes118.exe 1840 031b34370c6913ac54cbcbccac4a55c7_JaffaCakes118.exe 1840 031b34370c6913ac54cbcbccac4a55c7_JaffaCakes118.exe 1840 031b34370c6913ac54cbcbccac4a55c7_JaffaCakes118.exe 1840 031b34370c6913ac54cbcbccac4a55c7_JaffaCakes118.exe 1840 031b34370c6913ac54cbcbccac4a55c7_JaffaCakes118.exe 2084 cbkkx.exe 2084 cbkkx.exe 1840 031b34370c6913ac54cbcbccac4a55c7_JaffaCakes118.exe 1840 031b34370c6913ac54cbcbccac4a55c7_JaffaCakes118.exe 1840 031b34370c6913ac54cbcbccac4a55c7_JaffaCakes118.exe 1840 031b34370c6913ac54cbcbccac4a55c7_JaffaCakes118.exe 1840 031b34370c6913ac54cbcbccac4a55c7_JaffaCakes118.exe 1840 031b34370c6913ac54cbcbccac4a55c7_JaffaCakes118.exe 1840 031b34370c6913ac54cbcbccac4a55c7_JaffaCakes118.exe 1840 031b34370c6913ac54cbcbccac4a55c7_JaffaCakes118.exe 1840 031b34370c6913ac54cbcbccac4a55c7_JaffaCakes118.exe 1840 031b34370c6913ac54cbcbccac4a55c7_JaffaCakes118.exe 1840 031b34370c6913ac54cbcbccac4a55c7_JaffaCakes118.exe 1840 031b34370c6913ac54cbcbccac4a55c7_JaffaCakes118.exe 1840 031b34370c6913ac54cbcbccac4a55c7_JaffaCakes118.exe 1840 031b34370c6913ac54cbcbccac4a55c7_JaffaCakes118.exe 1840 031b34370c6913ac54cbcbccac4a55c7_JaffaCakes118.exe 1840 031b34370c6913ac54cbcbccac4a55c7_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2084 cbkkx.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1840 wrote to memory of 4560 1840 031b34370c6913ac54cbcbccac4a55c7_JaffaCakes118.exe 93 PID 1840 wrote to memory of 4560 1840 031b34370c6913ac54cbcbccac4a55c7_JaffaCakes118.exe 93 PID 1840 wrote to memory of 4560 1840 031b34370c6913ac54cbcbccac4a55c7_JaffaCakes118.exe 93 PID 4560 wrote to memory of 4196 4560 yepeoopsioz.exe 98 PID 4560 wrote to memory of 4196 4560 yepeoopsioz.exe 98 PID 4560 wrote to memory of 4196 4560 yepeoopsioz.exe 98 PID 4560 wrote to memory of 2084 4560 yepeoopsioz.exe 99 PID 4560 wrote to memory of 2084 4560 yepeoopsioz.exe 99 PID 4560 wrote to memory of 2084 4560 yepeoopsioz.exe 99 PID 1840 wrote to memory of 2988 1840 031b34370c6913ac54cbcbccac4a55c7_JaffaCakes118.exe 116 PID 1840 wrote to memory of 2988 1840 031b34370c6913ac54cbcbccac4a55c7_JaffaCakes118.exe 116 PID 1840 wrote to memory of 2988 1840 031b34370c6913ac54cbcbccac4a55c7_JaffaCakes118.exe 116 -
System policy modification 1 TTPs 41 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" cbkkx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" cbkkx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" cbkkx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System yepeoopsioz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cbkkx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" cbkkx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" cbkkx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" cbkkx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" yepeoopsioz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer yepeoopsioz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" cbkkx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" cbkkx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" cbkkx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" cbkkx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" yepeoopsioz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System yepeoopsioz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cbkkx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" yepeoopsioz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer cbkkx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" yepeoopsioz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" yepeoopsioz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" yepeoopsioz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" cbkkx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" cbkkx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer cbkkx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" yepeoopsioz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cbkkx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" cbkkx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" cbkkx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" cbkkx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" cbkkx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" yepeoopsioz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cbkkx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" cbkkx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" cbkkx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" yepeoopsioz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" yepeoopsioz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" yepeoopsioz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" cbkkx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" cbkkx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" yepeoopsioz.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\031b34370c6913ac54cbcbccac4a55c7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\031b34370c6913ac54cbcbccac4a55c7_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Users\Admin\AppData\Local\Temp\yepeoopsioz.exe"C:\Users\Admin\AppData\Local\Temp\yepeoopsioz.exe" "c:\users\admin\appdata\local\temp\031b34370c6913ac54cbcbccac4a55c7_jaffacakes118.exe*"2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4560 -
C:\Users\Admin\AppData\Local\Temp\cbkkx.exe"C:\Users\Admin\AppData\Local\Temp\cbkkx.exe" "-C:\Users\Admin\AppData\Local\Temp\zjdomyrgrjhsicrw.exe"3⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- System policy modification
PID:4196
-
-
C:\Users\Admin\AppData\Local\Temp\cbkkx.exe"C:\Users\Admin\AppData\Local\Temp\cbkkx.exe" "-C:\Users\Admin\AppData\Local\Temp\zjdomyrgrjhsicrw.exe"3⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Impair Defenses: Safe Mode Boot
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:2084
-
-
-
C:\Users\Admin\AppData\Local\Temp\yepeoopsioz.exe"C:\Users\Admin\AppData\Local\Temp\yepeoopsioz.exe" "c:\users\admin\appdata\local\temp\031b34370c6913ac54cbcbccac4a55c7_jaffacakes118.exe"2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- System policy modification
PID:2988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4248,i,17325488789339133686,9539570259395798500,262144 --variations-seed-version --mojo-platform-channel-handle=3760 /prefetch:81⤵PID:2444
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280B
MD59b874ea98058aac596d8dc3dbced32e4
SHA1ce4c3c0d4ee915b9658c70d41e398251390b7828
SHA256e412f8985f09ade6433586d34165f3d6d0cb1e6c14627c3fac098d67511ef953
SHA512ca0c4a440d486ef444dfd2a395df8daefe926dc4a4928611f33608f5af2b040f3572c3f51574650393f9d0387c16aa4422cee9b299b5236e7ea05aad8adc7f06
-
Filesize
280B
MD53f74214a1a62852ad025226f5ed496c5
SHA1401b5b1e052c69102d9e0bce7d4b3df16127bec1
SHA256a6186eb2213b5e5f34589e240312b5158b1f09f4ea4a899577c10d459780a4d6
SHA512a73477c5671af56f6874e7ff03f82f32d674857ea3ab00001d84f5eaf2bb11ad45a392eb96b2fdf9090ed9acdb0b1a30aa79211b2ce786d18446562a916906bc
-
Filesize
280B
MD576d36c0d8ed4e038590e61090ed27f6b
SHA195473641bf673ed7369bf43d1e8053b43205b783
SHA256438a53f483aedecaa4e581e2c137002854f65561d8f977297e96f9aa87e6121a
SHA51227df5a23c47da958e7db460680b552cedc93e48d8690000ecb86aa4dcd0fee00b471cabc620ebd65bf07d19c9d540b6595a062a643da91e50014d2cd613790c6
-
Filesize
280B
MD59381f1e8b69bc08239545d0237bed499
SHA144708e7c3e90112c71d48019455dd0ea78dc010e
SHA2560815a1ba2e275e469fce5cb5dae326da6b3851561028ad97174e836a90d08db2
SHA512be8cf18a19434624d407875d8aad6807bfe297c9f1293cec37d9a96e7e0f281d549fe13f00a1d621756e69d0a0281faf351a2499c23c529abb01c59169200c88
-
Filesize
280B
MD517d6b73805861f30ecb5bd2c2f32771e
SHA18204c410cb0a8622b020f346032281dbcc7bc783
SHA256a391aca3336c0eac2c4c667ed5903e6f45f5b54426cc3130c0b25e7e868d1d54
SHA512bdaa48fdc45c7216d6d3f50260a54c23bf924b63631f388c14f9dae9a1bd85d046ac421405e9b29796d5dbe625c9821f85da1e67c243082b8ab565cd69439cb7
-
Filesize
280B
MD5063f9deea0c32b81116a58554a9ec017
SHA194089a831a23a498868aa131c068a5860f42c248
SHA25611f7f9bb13dc39b038ff527253f8bbd1f9e1735b3dd0f9ee6a0ddf66d9bf0192
SHA512a036ffa49558b8307541bbc455f60b1954f9c16df3dea809013b1ccdb9f64a9857483a2f4cb1349294f13cadc1d5543d5fb0992dc63309d1c9e1e3cb672b1fae
-
Filesize
724KB
MD5e57964eb7593898ff389d9afa5fa5980
SHA1f6399e7d2612ab411a6caad5dee676cf5109a6f6
SHA25671fb1fa5da330100a2a4725f2af44254c4ddc4f1e2c3115cb963a3d5c729bb1c
SHA5128af3be3e75831e5e2b6c1a0b75403e96af90565942bafac0e67cfd482cd4b3f26e572b260163d85ed1da0975ef992f6c5964eb3c16eaad60af166e19450587e9
-
Filesize
320KB
MD51d38298ec1748d8b73cab9166bb13149
SHA1f341a5ff0ef23fde83e121383153612628bb536a
SHA256535fa600cbf2dfcec10a805863d851908d708319c8d8700babe427d7bfc6137d
SHA512721c3c7025e9b322bf046940ecb99a145f4644980fe8c6a09bdb182b655bd10652619aa87c2466bfa51d29270a0b57305231fc4b82a7c8218f03137acc062130
-
Filesize
280B
MD5c6170cf65c454e1b666bf66c7aae51b6
SHA1a804ca6ac1d9be2db68f2d42bffc0c5575201134
SHA256533934156ded2e469c22d4d0219ff3ae436b1d713dde247d1511e702ae208c35
SHA512f04abce6c43ba773b8d44d0e1ce264d0eba2f892e1dc08a565894ad7640cd867349344cc1e8c93cc3321958c9bbee5c00db48cd1d88e3e650cfa5af6ec3cdfb8
-
Filesize
4KB
MD5e0a1555ab015c863827dd9428f2620ee
SHA1df34dcc41c1e43a8dcc92b0d02726ece1ea4d08a
SHA2562f05f31b6fc4bde8ef5533650dcd83c81ffee833e9236f00575ff45634f75ac4
SHA51285e5b068485a971c4ff07f6d7f27545aecc8407a17f7f0a0a8e82954f3e9262c0da21a523757cfdc4ff9dafebc6e0db9e995474ca5d3571071b37d389c2796ec
-
Filesize
564KB
MD5031b34370c6913ac54cbcbccac4a55c7
SHA1d0778c193dbf76cf93df3db1d5b51b136a02c9b1
SHA256939895d56ad30824b5c8dfbd70e36e35ead9ca0cbb987fcc322212d01de25700
SHA5126dec35c09395e06069ced9496561afcb9c09b5ad80b8ac16c3f3857ca11d7e071554970dde6894eac7cee5a42d63d62db996e027c579dc2dfe52ce05efa492ae