Analysis
-
max time kernel
140s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27-06-2024 17:11
Static task
static1
Behavioral task
behavioral1
Sample
16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe
-
Size
280KB
-
MD5
16d143711c1d631e3034c279d6a5cb88
-
SHA1
fb931528d88d8e4107c5bdda1125c00a341d5656
-
SHA256
0359fe210e864779b977a9b12ad000fa0cbaa97ea4c8e12af197ba0a30303b58
-
SHA512
1824afc66ab91756d995a39acb32a8392cc59b79968fa897a750046f16141afe31014ee5a26d446659ae5ae64a67728121b18eb6b7e904ae94ddd19cc3aaf088
-
SSDEEP
6144:Mi1TzaLuFWa1lW6QNT1gC3B7n/4K51z2abHL/nDOYNHUbUQcDKbtavfw8a:t1TzaLulqgC3B7N50abHL/nDOYljQrbh
Malware Config
Signatures
-
Modifies security service 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe -
Loads dropped DLL 2 IoCs
pid Process 3544 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe 3544 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Explorer = "C:\\Users\\Admin\\AppData\\Local\\Temp\\explorer.exe" REG.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\PELoader.ocx cmd.exe File opened for modification C:\Windows\SysWOW64\PELoader.ocx cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BD74B12A-7E7A-4CC6-BAE9-677963B8D0F5}\ = "_PELoader" 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BD74B12A-7E7A-4CC6-BAE9-677963B8D0F5}\TypeLib 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{55F8A924-246F-4EFD-B98F-14F456EDD580}\ = "RunPE.PELoader" 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{55F8A924-246F-4EFD-B98F-14F456EDD580}\Control 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\RunPE.PELoader\Clsid\ = "{55F8A924-246F-4EFD-B98F-14F456EDD580}" 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BD74B12A-7E7A-4CC6-BAE9-677963B8D0F5}\ProxyStubClsid32 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BD74B12A-7E7A-4CC6-BAE9-677963B8D0F5}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{45665203-7270-4D1C-A525-932A42FBBF10}\ = "__PELoader" 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{45665203-7270-4D1C-A525-932A42FBBF10}\TypeLib\Version = "2.0" 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BD74B12A-7E7A-4CC6-BAE9-677963B8D0F5}\ProxyStubClsid32 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{55F8A924-246F-4EFD-B98F-14F456EDD580}\InprocServer32\ThreadingModel = "Apartment" 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{55F8A924-246F-4EFD-B98F-14F456EDD580}\TypeLib 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BD74B12A-7E7A-4CC6-BAE9-677963B8D0F5}\ProxyStubClsid\ = "{00020424-0000-0000-C000-000000000046}" 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{55F8A924-246F-4EFD-B98F-14F456EDD580}\Implemented Categories\{0DE86A53-2BAA-11CF-A229-00AA003D7352} 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{4BB1DCD7-E971-4EA7-B115-745EA1467E43}\2.0\0\win32 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{4BB1DCD7-E971-4EA7-B115-745EA1467E43}\2.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp" 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{55F8A924-246F-4EFD-B98F-14F456EDD580}\ProgID 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{55F8A924-246F-4EFD-B98F-14F456EDD580}\VERSION 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{45665203-7270-4D1C-A525-932A42FBBF10}\ = "PELoader" 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BD74B12A-7E7A-4CC6-BAE9-677963B8D0F5}\ = "_PELoader" 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{45665203-7270-4D1C-A525-932A42FBBF10}\ProxyStubClsid32 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{45665203-7270-4D1C-A525-932A42FBBF10}\TypeLib 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{55F8A924-246F-4EFD-B98F-14F456EDD580}\Control\ 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{55F8A924-246F-4EFD-B98F-14F456EDD580}\VERSION\ = "2.0" 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{55F8A924-246F-4EFD-B98F-14F456EDD580}\Implemented Categories 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BD74B12A-7E7A-4CC6-BAE9-677963B8D0F5} 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{55F8A924-246F-4EFD-B98F-14F456EDD580} 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{55F8A924-246F-4EFD-B98F-14F456EDD580}\ToolboxBitmap32 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{55F8A924-246F-4EFD-B98F-14F456EDD580}\MiscStatus\ = "0" 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{55F8A924-246F-4EFD-B98F-14F456EDD580}\MiscStatus\1 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{55F8A924-246F-4EFD-B98F-14F456EDD580}\Implemented Categories\{40FC6ED4-2438-11CF-A3DB-080036F12502} 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{45665203-7270-4D1C-A525-932A42FBBF10}\TypeLib\ = "{4BB1DCD7-E971-4EA7-B115-745EA1467E43}" 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{55F8A924-246F-4EFD-B98F-14F456EDD580}\TypeLib\ = "{4BB1DCD7-E971-4EA7-B115-745EA1467E43}" 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\RunPE.PELoader 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{55F8A924-246F-4EFD-B98F-14F456EDD580}\Implemented Categories\{0DE86A52-2BAA-11CF-A229-00AA003D7352} 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{45665203-7270-4D1C-A525-932A42FBBF10}\TypeLib 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{45665203-7270-4D1C-A525-932A42FBBF10}\TypeLib\ = "{4BB1DCD7-E971-4EA7-B115-745EA1467E43}" 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\RunPE.PELoader\Clsid 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{45665203-7270-4D1C-A525-932A42FBBF10}\ProxyStubClsid\ = "{00020420-0000-0000-C000-000000000046}" 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{4BB1DCD7-E971-4EA7-B115-745EA1467E43} 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{4BB1DCD7-E971-4EA7-B115-745EA1467E43}\2.0\HELPDIR 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{45665203-7270-4D1C-A525-932A42FBBF10} 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{45665203-7270-4D1C-A525-932A42FBBF10}\ = "__PELoader" 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{45665203-7270-4D1C-A525-932A42FBBF10}\ProxyStubClsid32 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{55F8A924-246F-4EFD-B98F-14F456EDD580}\MiscStatus\1\ = "132497" 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BD74B12A-7E7A-4CC6-BAE9-677963B8D0F5}\ = "PELoader" 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{4BB1DCD7-E971-4EA7-B115-745EA1467E43}\2.0\0 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{4BB1DCD7-E971-4EA7-B115-745EA1467E43}\2.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\PELoader.ocx" 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BD74B12A-7E7A-4CC6-BAE9-677963B8D0F5}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{45665203-7270-4D1C-A525-932A42FBBF10}\TypeLib\Version = "2.0" 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{55F8A924-246F-4EFD-B98F-14F456EDD580}\InprocServer32 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{55F8A924-246F-4EFD-B98F-14F456EDD580}\ToolboxBitmap32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\PELoader.ocx, 30000" 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BD74B12A-7E7A-4CC6-BAE9-677963B8D0F5}\TypeLib\Version = "2.0" 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{45665203-7270-4D1C-A525-932A42FBBF10}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{55F8A924-246F-4EFD-B98F-14F456EDD580}\ProgID\ = "RunPE.PELoader" 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{4BB1DCD7-E971-4EA7-B115-745EA1467E43}\2.0\ = "PE Loader" 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BD74B12A-7E7A-4CC6-BAE9-677963B8D0F5}\TypeLib\ = "{4BB1DCD7-E971-4EA7-B115-745EA1467E43}" 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{55F8A924-246F-4EFD-B98F-14F456EDD580}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\PELoader.ocx" 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{45665203-7270-4D1C-A525-932A42FBBF10}\ProxyStubClsid 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{4BB1DCD7-E971-4EA7-B115-745EA1467E43}\2.0\FLAGS 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BD74B12A-7E7A-4CC6-BAE9-677963B8D0F5}\TypeLib\ = "{4BB1DCD7-E971-4EA7-B115-745EA1467E43}" 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BD74B12A-7E7A-4CC6-BAE9-677963B8D0F5}\TypeLib\Version = "2.0" 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{45665203-7270-4D1C-A525-932A42FBBF10}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{55F8A924-246F-4EFD-B98F-14F456EDD580}\MiscStatus 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 5632 REG.exe -
Runs net.exe
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3544 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe 3544 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 3544 wrote to memory of 1936 3544 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe 91 PID 3544 wrote to memory of 1936 3544 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe 91 PID 3544 wrote to memory of 1936 3544 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe 91 PID 3544 wrote to memory of 5632 3544 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe 94 PID 3544 wrote to memory of 5632 3544 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe 94 PID 3544 wrote to memory of 5632 3544 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe 94 PID 3544 wrote to memory of 1644 3544 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe 95 PID 3544 wrote to memory of 1644 3544 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe 95 PID 3544 wrote to memory of 1644 3544 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe 95 PID 3544 wrote to memory of 5768 3544 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe 96 PID 3544 wrote to memory of 5768 3544 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe 96 PID 3544 wrote to memory of 5768 3544 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe 96 PID 3544 wrote to memory of 5776 3544 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe 97 PID 3544 wrote to memory of 5776 3544 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe 97 PID 3544 wrote to memory of 5776 3544 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe 97 PID 3544 wrote to memory of 3376 3544 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe 98 PID 3544 wrote to memory of 3376 3544 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe 98 PID 3544 wrote to memory of 3376 3544 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe 98 PID 3544 wrote to memory of 5340 3544 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe 100 PID 3544 wrote to memory of 5340 3544 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe 100 PID 3544 wrote to memory of 5340 3544 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe 100 PID 3544 wrote to memory of 4408 3544 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe 106 PID 3544 wrote to memory of 4408 3544 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe 106 PID 3544 wrote to memory of 4408 3544 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe 106 PID 3544 wrote to memory of 5904 3544 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe 108 PID 3544 wrote to memory of 5904 3544 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe 108 PID 3544 wrote to memory of 5904 3544 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe 108 PID 3376 wrote to memory of 5972 3376 cmd.exe 109 PID 3376 wrote to memory of 5972 3376 cmd.exe 109 PID 3376 wrote to memory of 5972 3376 cmd.exe 109 PID 5340 wrote to memory of 5872 5340 cmd.exe 111 PID 5340 wrote to memory of 5872 5340 cmd.exe 111 PID 5340 wrote to memory of 5872 5340 cmd.exe 111 PID 1644 wrote to memory of 6000 1644 cmd.exe 110 PID 1644 wrote to memory of 6000 1644 cmd.exe 110 PID 1644 wrote to memory of 6000 1644 cmd.exe 110 PID 5768 wrote to memory of 5500 5768 cmd.exe 112 PID 5768 wrote to memory of 5500 5768 cmd.exe 112 PID 5768 wrote to memory of 5500 5768 cmd.exe 112 PID 6000 wrote to memory of 5504 6000 net.exe 113 PID 6000 wrote to memory of 5504 6000 net.exe 113 PID 6000 wrote to memory of 5504 6000 net.exe 113 PID 5500 wrote to memory of 5508 5500 net.exe 114 PID 5500 wrote to memory of 5508 5500 net.exe 114 PID 5500 wrote to memory of 5508 5500 net.exe 114 PID 3544 wrote to memory of 5536 3544 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe 116 PID 3544 wrote to memory of 5536 3544 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe 116 PID 3544 wrote to memory of 5536 3544 16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\16d143711c1d631e3034c279d6a5cb88_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\rst.bat" "2⤵PID:1936
-
-
C:\Windows\SysWOW64\REG.exeREG ADD HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v "Explorer" /d "C:\Users\Admin\AppData\Local\Temp\explorer.exe" /t REG_SZ2⤵
- Adds Run key to start application
- Modifies registry key
PID:5632
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop "Security Center"2⤵
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\SysWOW64\net.exenet stop "Security Center"3⤵
- Suspicious use of WriteProcessMemory
PID:6000 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Security Center"4⤵PID:5504
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop SharedAccess2⤵
- Suspicious use of WriteProcessMemory
PID:5768 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵
- Suspicious use of WriteProcessMemory
PID:5500 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵PID:5508
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess" /v Start /t REG_DWORD /d 0x4 /f2⤵PID:5776
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c reg add "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /v Start /t REG_DWORD /d 0x4 /f2⤵
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /v Start /t REG_DWORD /d 0x4 /f3⤵
- Modifies security service
PID:5972
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c reg add "HKLM\SYSTEM\CurrentControlSet\Services\wscsvc" /v Start /t REG_DWORD /d 0x4 /f2⤵
- Suspicious use of WriteProcessMemory
PID:5340 -
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Services\wscsvc" /v Start /t REG_DWORD /d 0x4 /f3⤵
- Modifies security service
PID:5872
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\copy.bat" "2⤵
- Drops file in System32 directory
PID:4408
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 C:\Windows\system32\PELoader.ocx /s2⤵PID:5904
-
-
C:\Windows\SysWOW64\cmd.execmd2⤵PID:5536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3904 --field-trial-handle=2280,i,1836084024518340990,18250262151825427757,262144 --variations-seed-version /prefetch:81⤵PID:3084
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD55b19a2d3c7a1c97fcbac23d9c0661c0c
SHA134bff82bd1008e6bbc7afaaa48be6a977cbc7de7
SHA25626387fa757f9d8a0e8532d330b5b3bbfee37c2df0125f43d458c36e95cab9a25
SHA512b23fd7d09da6814351f3156f9bff0ed3fb7328f17324fb5ffc0483069d9f1187793f622fb92140fa4c9a9b308614c823783891247d50912bee28c794cbacc748
-
Filesize
90B
MD5cfb653509db21d1f42180210a19477ac
SHA134ef6c12321929363aad04a802c709a07c6e075c
SHA2569fd81e595efb9d9f949ba3a0360297a258d21c74a6fcb676b4ed7ecb42e5c0c2
SHA512a37b46519e41a38799b8742a629bc9d51614b696984792c75e4a4db091f79a8206caaf7bbdb1fdc9f86592e6b3cca4228346e477244d4bccf17fbc9113dfc06f
-
Filesize
280KB
MD516d143711c1d631e3034c279d6a5cb88
SHA1fb931528d88d8e4107c5bdda1125c00a341d5656
SHA2560359fe210e864779b977a9b12ad000fa0cbaa97ea4c8e12af197ba0a30303b58
SHA5121824afc66ab91756d995a39acb32a8392cc59b79968fa897a750046f16141afe31014ee5a26d446659ae5ae64a67728121b18eb6b7e904ae94ddd19cc3aaf088
-
Filesize
280B
MD50df18a68e203268750eea8f099deac66
SHA1ce8c8edcb67dde60f239705b2c0315a30fb65fc9
SHA25687093bdce5668ba3a3e01083229df751c311c457cddb3eab7169f3ceac0b187c
SHA512dec1faae69be706874e04b8ef10ead52d63ada3e693dcff87a9855b9fa18fd3dd16f1133b6498ddfb0fb05c1dd5e0d5ff7f50f1639956ceea7a46a0b096eaa5f