Analysis
-
max time kernel
143s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
04/07/2024, 19:57
Behavioral task
behavioral1
Sample
26124fa41b097b59f2d7cfda20a07f8f_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
26124fa41b097b59f2d7cfda20a07f8f_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
26124fa41b097b59f2d7cfda20a07f8f_JaffaCakes118.exe
-
Size
444KB
-
MD5
26124fa41b097b59f2d7cfda20a07f8f
-
SHA1
af1441fadbb8d93af53092a1afc11a44ff52af63
-
SHA256
0ded5ed29aa0aa4e307ef74be252a21d9e40d883786ec7442c6961797e56197e
-
SHA512
51430198441bebfdce84e78af2fb5318fbd0bc0edef223437780ac939c31888089b047576524d208ac5764f7a0a93d690c1efc9710b3986682c26447458426f1
-
SSDEEP
6144:vkANWTS4K0F2J5DXzDh3Mr793VT+zl5ooyh6/Zs3YzoJMjXriu04ko:vErKNJ5Lp+lT+66Oq7in4ko
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\SysWOW64\\vvgeowbv.exe,C:\\Windows\\system32\\userinit.exe" vvgeowbv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\SysWOW64\\vvgeowbv.exe,C:\\Windows\\system32\\userinit.exe" vvgeowbv.exe -
Drops file in Drivers directory 53 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\drivers\cell_header_remove.gif 26124fa41b097b59f2d7cfda20a07f8f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\rating.gif 26124fa41b097b59f2d7cfda20a07f8f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\sep_hor.gif 26124fa41b097b59f2d7cfda20a07f8f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\spacer.gif 26124fa41b097b59f2d7cfda20a07f8f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\x.gif 26124fa41b097b59f2d7cfda20a07f8f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\box_2.gif 26124fa41b097b59f2d7cfda20a07f8f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\download_box.gif 26124fa41b097b59f2d7cfda20a07f8f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\header_4.gif 26124fa41b097b59f2d7cfda20a07f8f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\infected.gif 26124fa41b097b59f2d7cfda20a07f8f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\style.css 26124fa41b097b59f2d7cfda20a07f8f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\cell_header_block.gif 26124fa41b097b59f2d7cfda20a07f8f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\product_2_header.gif 26124fa41b097b59f2d7cfda20a07f8f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\product_3_header.gif 26124fa41b097b59f2d7cfda20a07f8f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\s_detect.htm 26124fa41b097b59f2d7cfda20a07f8f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\header_red_free_scan_bg.gif 26124fa41b097b59f2d7cfda20a07f8f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\main_back.gif 26124fa41b097b59f2d7cfda20a07f8f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\blank.gif 26124fa41b097b59f2d7cfda20a07f8f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\button_freescan.gif 26124fa41b097b59f2d7cfda20a07f8f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\spy_away_box.jpg 26124fa41b097b59f2d7cfda20a07f8f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\header_red_free_scan.gif 26124fa41b097b59f2d7cfda20a07f8f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\star_gray.gif 26124fa41b097b59f2d7cfda20a07f8f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\warning_icon.gif 26124fa41b097b59f2d7cfda20a07f8f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\cell_footer.gif 26124fa41b097b59f2d7cfda20a07f8f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\detect.htm 26124fa41b097b59f2d7cfda20a07f8f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\header_3.gif 26124fa41b097b59f2d7cfda20a07f8f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\product_3_name_small.gif 26124fa41b097b59f2d7cfda20a07f8f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\product_features.gif 26124fa41b097b59f2d7cfda20a07f8f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\cell_bg.gif 26124fa41b097b59f2d7cfda20a07f8f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\download_btn.jpg 26124fa41b097b59f2d7cfda20a07f8f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\footer_back.jpg 26124fa41b097b59f2d7cfda20a07f8f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\header_2.gif 26124fa41b097b59f2d7cfda20a07f8f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\product_1_name_small.gif 26124fa41b097b59f2d7cfda20a07f8f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\box_1.gif 26124fa41b097b59f2d7cfda20a07f8f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\header_red_protect_your_pc.gif 26124fa41b097b59f2d7cfda20a07f8f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\shadow.jpg 26124fa41b097b59f2d7cfda20a07f8f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\download_now_btn.gif 26124fa41b097b59f2d7cfda20a07f8f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\header_red_bg.gif 26124fa41b097b59f2d7cfda20a07f8f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\screenshot.jpg 26124fa41b097b59f2d7cfda20a07f8f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\shadow_bg.gif 26124fa41b097b59f2d7cfda20a07f8f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\cell_header_scan.gif 26124fa41b097b59f2d7cfda20a07f8f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\star_gray_small.gif 26124fa41b097b59f2d7cfda20a07f8f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\box_3.gif 26124fa41b097b59f2d7cfda20a07f8f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\button_buynow.gif 26124fa41b097b59f2d7cfda20a07f8f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\product_1_header.gif 26124fa41b097b59f2d7cfda20a07f8f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\pt.htm 26124fa41b097b59f2d7cfda20a07f8f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\star.gif 26124fa41b097b59f2d7cfda20a07f8f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\header_1.gif 26124fa41b097b59f2d7cfda20a07f8f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\perfect_cleaner_box.jpg 26124fa41b097b59f2d7cfda20a07f8f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\star_small.gif 26124fa41b097b59f2d7cfda20a07f8f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\v.gif 26124fa41b097b59f2d7cfda20a07f8f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\product_2_name_small.gif 26124fa41b097b59f2d7cfda20a07f8f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\sep_vert.gif 26124fa41b097b59f2d7cfda20a07f8f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\win_logo.gif 26124fa41b097b59f2d7cfda20a07f8f_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2912 vvgeowbv.exe -
Loads dropped DLL 2 IoCs
pid Process 3000 26124fa41b097b59f2d7cfda20a07f8f_JaffaCakes118.exe 3000 26124fa41b097b59f2d7cfda20a07f8f_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/3000-0-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral1/files/0x0006000000016c3a-59.dat upx behavioral1/memory/3000-60-0x0000000003410000-0x0000000003650000-memory.dmp upx behavioral1/memory/3000-68-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral1/memory/2912-71-0x0000000000400000-0x0000000000640000-memory.dmp upx behavioral1/memory/2912-73-0x0000000000400000-0x0000000000640000-memory.dmp upx behavioral1/memory/2912-97-0x0000000000400000-0x0000000000640000-memory.dmp upx behavioral1/memory/2912-162-0x0000000000400000-0x0000000000640000-memory.dmp upx -
Installs/modifies Browser Helper Object 2 TTPs 46 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{53C330D6-A4AB-419B-B45D-FD4411C1FEF4}\ vvgeowbv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{ca1d1b05-9c66-11d5-a009-000103c1e50b} vvgeowbv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{d8efadf1-9009-11d6-8c73-608c5dc19089} vvgeowbv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{944864a5-3916-46e2-96a9-a2e84f3f1208} vvgeowbv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{a4a435cf-3583-11d4-91bd-0048546a1450} vvgeowbv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{2d7cb618-cc1c-4126-a7e3-f5b12d3bcf71} vvgeowbv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{53C330D6-A4AB-419B-B45D-FD4411C1FEF4} vvgeowbv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{669695bc-a811-4a9d-8cdf-ba8c795f261e}\ vvgeowbv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{6abc861a-31e7-4d91-b43b-d3c98f22a5c0} vvgeowbv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{c4ca6559-2cf1-48b6-96b2-8340a06fd129}\ vvgeowbv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{bb936323-19fa-4521-ba29-eca6a121bc78} vvgeowbv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{ca1d1b05-9c66-11d5-a009-000103c1e50b}\ vvgeowbv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{51641ef3-8a7a-4d84-8659-b0911e947cc8}\ vvgeowbv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{c5af2622-8c75-4dfb-9693-23ab7686a456}\ vvgeowbv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{c2680e10-1655-4a0e-87f8-4259325a84b7}\ vvgeowbv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{06dfedaa-6196-11d5-bfc8-00508b4a487d}\ vvgeowbv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{b8875bfe-b021-11d4-bfa8-00508b8e9bd3}\ vvgeowbv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1adbcce8-cf84-441e-9b38-afc7a19c06a4} vvgeowbv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{c4ca6559-2cf1-48b6-96b2-8340a06fd129} vvgeowbv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{e9147a0a-a866-4214-b47c-da821891240f} vvgeowbv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{e9147a0a-a866-4214-b47c-da821891240f}\ vvgeowbv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{54645654-2225-4455-44A1-9F4543D34546} vvgeowbv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{e9306072-417e-43e3-81d5-369490beef7c}\ vvgeowbv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{06dfedaa-6196-11d5-bfc8-00508b4a487d} vvgeowbv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{669695bc-a811-4a9d-8cdf-ba8c795f261e} vvgeowbv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{6abc861a-31e7-4d91-b43b-d3c98f22a5c0}\ vvgeowbv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{12F02779-6D88-4958-8AD3-83C12D86ADC7} vvgeowbv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{00000000-d9e3-4bc6-a0bd-3d0ca4be5271} vvgeowbv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{00000012-890e-4aac-afd9-eff6954a34dd}\ vvgeowbv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{54645654-2225-4455-44A1-9F4543D34546}\ vvgeowbv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{029e02f0-a0e5-4b19-b958-7bf2db29fb13} vvgeowbv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{b8875bfe-b021-11d4-bfa8-00508b8e9bd3} vvgeowbv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{1adbcce8-cf84-441e-9b38-afc7a19c06a4}\ vvgeowbv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{029e02f0-a0e5-4b19-b958-7bf2db29fb13}\ vvgeowbv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{bb936323-19fa-4521-ba29-eca6a121bc78}\ vvgeowbv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{12F02779-6D88-4958-8AD3-83C12D86ADC7}\ vvgeowbv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{51641ef3-8a7a-4d84-8659-b0911e947cc8} vvgeowbv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{2d7cb618-cc1c-4126-a7e3-f5b12d3bcf71}\ vvgeowbv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{c5af2622-8c75-4dfb-9693-23ab7686a456} vvgeowbv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{c2680e10-1655-4a0e-87f8-4259325a84b7} vvgeowbv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{e9306072-417e-43e3-81d5-369490beef7c} vvgeowbv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{d8efadf1-9009-11d6-8c73-608c5dc19089}\ vvgeowbv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{944864a5-3916-46e2-96a9-a2e84f3f1208}\ vvgeowbv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{a4a435cf-3583-11d4-91bd-0048546a1450}\ vvgeowbv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{00000000-d9e3-4bc6-a0bd-3d0ca4be5271}\ vvgeowbv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{00000012-890e-4aac-afd9-eff6954a34dd} vvgeowbv.exe -
Drops file in System32 directory 11 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\aivskurq.dll 26124fa41b097b59f2d7cfda20a07f8f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\vvgeowbv.exe 26124fa41b097b59f2d7cfda20a07f8f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\vvgeowbv.exe vvgeowbv.exe File opened for modification C:\Windows\SysWOW64\acespy\__acelog.ndx vvgeowbv.exe File opened for modification C:\Windows\SysWOW64\acespy\systune.exe vvgeowbv.exe File opened for modification C:\Windows\SysWOW64\mkwucqxi.base vvgeowbv.exe File opened for modification C:\Windows\SysWOW64\wml.exe vvgeowbv.exe File opened for modification C:\Windows\SysWOW64\vxddsk.exe vvgeowbv.exe File opened for modification C:\Windows\SysWOW64\ace16win.dll vvgeowbv.exe File opened for modification C:\Windows\SysWOW64\ESHOPEE.exe vvgeowbv.exe File opened for modification C:\Windows\SysWOW64\msole32.exe vvgeowbv.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Themes\\TranscodedWallpaper.jpg" vvgeowbv.exe -
Drops file in Program Files directory 21 IoCs
description ioc Process File opened for modification C:\Program files\akl\unsetup.exe vvgeowbv.exe File opened for modification C:\Program files\akl\keylog.txt vvgeowbv.exe File opened for modification C:\Program files\akl\unsetup.dat vvgeowbv.exe File opened for modification C:\Program files\e-zshopper\BarLcher.dll vvgeowbv.exe File opened for modification C:\Program files\amsys\unis000.exe vvgeowbv.exe File opened for modification C:\Program files\3721\assist\asbar.dll vvgeowbv.exe File opened for modification C:\Program files\akl\readme.txt vvgeowbv.exe File opened for modification C:\Program files\akl\uninstall.exe vvgeowbv.exe File opened for modification C:\Program files\p2pnetworks\amp2pl.exe vvgeowbv.exe File opened for modification C:\Program files\amsys\msvcrt.dll vvgeowbv.exe File opened for modification C:\Program files\akl\akl.dll vvgeowbv.exe File opened for modification C:\Program files\Accoona\ASearchAssist.dll vvgeowbv.exe File opened for modification C:\Program files\amsys\awmsg.dat vvgeowbv.exe File opened for modification C:\Program files\amsys\ijl15.dll vvgeowbv.exe File opened for modification C:\Program files\amsys\winam.dat vvgeowbv.exe File opened for modification C:\Program files\amsys\unins000.dat vvgeowbv.exe File opened for modification C:\Program files\3721\helper.dll vvgeowbv.exe File opened for modification C:\Program files\akl\akl.exe vvgeowbv.exe File opened for modification C:\Program files\akl\curlog.htm vvgeowbv.exe File opened for modification C:\Program files\amsys\guid.dat vvgeowbv.exe File opened for modification C:\Program files\amsys\mfc42.dll vvgeowbv.exe -
Drops file in Windows directory 48 IoCs
description ioc Process File opened for modification C:\Windows\dp0.dll vvgeowbv.exe File opened for modification C:\Windows\fhfmm-Uninstaller.exe vvgeowbv.exe File opened for modification C:\Windows\daxtime.dll vvgeowbv.exe File opened for modification C:\Windows\default.htm vvgeowbv.exe File opened for modification C:\Windows\jd2002.dll vvgeowbv.exe File opened for modification C:\Windows\liqad.dll vvgeowbv.exe File opened for modification C:\Windows\eventlowg.dll vvgeowbv.exe File opened for modification C:\Windows\liqui.dll vvgeowbv.exe File opened for modification C:\Windows\764.exe vvgeowbv.exe File opened for modification C:\Windows\flt.dll vvgeowbv.exe File opened for modification C:\Windows\absolute key logger.lnk vvgeowbv.exe File opened for modification C:\Windows\hotporn.exe vvgeowbv.exe File opened for modification C:\Windows\ie_32.exe vvgeowbv.exe File opened for modification C:\Windows\aconti.exe vvgeowbv.exe File opened for modification C:\Windows\pbar.dll vvgeowbv.exe File opened for modification C:\Windows\wml.exe vvgeowbv.exe File opened for modification C:\Windows\cbinst$.exe vvgeowbv.exe File opened for modification C:\Windows\hcwprn.exe vvgeowbv.exe File opened for modification C:\Windows\kvnab.exe vvgeowbv.exe File opened for modification C:\Windows\liqui.exe vvgeowbv.exe File opened for modification C:\Windows\vxddsk.exe vvgeowbv.exe File opened for modification C:\Windows\aconti.ini vvgeowbv.exe File opened for modification C:\Windows\wbeCheck.exe vvgeowbv.exe File opened for modification C:\Windows\xadbrk.exe vvgeowbv.exe File opened for modification C:\Windows\liqui-Uninstaller.exe vvgeowbv.exe File opened for modification C:\Windows\wbeInst$.exe vvgeowbv.exe File opened for modification C:\Windows\kkcomp$.exe vvgeowbv.exe File opened for modification C:\Windows\kkcomp.dll vvgeowbv.exe File opened for modification C:\Windows\fhfmm.exe vvgeowbv.exe File opened for modification C:\Windows\xadbrk.dll vvgeowbv.exe File opened for modification C:\Windows\aconti.log vvgeowbv.exe File opened for modification C:\Windows\aconti.sdb vvgeowbv.exe File opened for modification C:\Windows\spredirect.dll vvgeowbv.exe File opened for modification C:\Windows\pbsysie.dll vvgeowbv.exe File opened for modification C:\Windows\kvnab$.exe vvgeowbv.exe File opened for modification C:\Windows\kvnab.dll vvgeowbv.exe File opened for modification C:\Windows\settn.dll vvgeowbv.exe File opened for modification C:\Windows\liqad$.exe vvgeowbv.exe File opened for modification C:\Windows\7search.dll vvgeowbv.exe File opened for modification C:\Windows\ngd.dll vvgeowbv.exe File opened for modification C:\Windows\xxxvideo.exe vvgeowbv.exe File opened for modification C:\Windows\acontidialer.txt vvgeowbv.exe File opened for modification C:\Windows\adbar.dll vvgeowbv.exe File opened for modification C:\Windows\iexplorr23.dll vvgeowbv.exe File opened for modification C:\Windows\liqad.exe vvgeowbv.exe File opened for modification C:\Windows\kkcomp.exe vvgeowbv.exe File opened for modification C:\Windows\xadbrk_.exe vvgeowbv.exe File created C:\Windows\default.htm vvgeowbv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies Control Panel 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Control Panel\Desktop vvgeowbv.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Control Panel\Desktop\TileWallpaper = "0" vvgeowbv.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Control Panel\Desktop\WallpaperStyle = "2" vvgeowbv.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Desktop\General vvgeowbv.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Desktop\General\WallpaperSource = "C:\\Users\\Admin\\Pictures\\My Wallpaper.jpg" vvgeowbv.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3000 26124fa41b097b59f2d7cfda20a07f8f_JaffaCakes118.exe 2912 vvgeowbv.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3000 wrote to memory of 2912 3000 26124fa41b097b59f2d7cfda20a07f8f_JaffaCakes118.exe 28 PID 3000 wrote to memory of 2912 3000 26124fa41b097b59f2d7cfda20a07f8f_JaffaCakes118.exe 28 PID 3000 wrote to memory of 2912 3000 26124fa41b097b59f2d7cfda20a07f8f_JaffaCakes118.exe 28 PID 3000 wrote to memory of 2912 3000 26124fa41b097b59f2d7cfda20a07f8f_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\26124fa41b097b59f2d7cfda20a07f8f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\26124fa41b097b59f2d7cfda20a07f8f_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\vvgeowbv.exe"C:\Windows\system32\vvgeowbv.exe" start2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2912
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24KB
MD5a51464e41d75b2aa2b00ca31ea2ce7eb
SHA15b94362ac6a23c5aba706e8bfd11a5d8bab6097d
SHA25616d5506b6663085b1acd80644ffa5363c158e390da67ed31298b85ddf0ad353f
SHA512b2a09d52c211e7100e3e68d88c13394c64f23bf2ec3ca25b109ffb1e1a96a054f0e0d25d2f2a0c2145616eabc88c51d63023cef5faa7b49129d020f67ab0b1ff
-
Filesize
122KB
MD51f96c349c58f5562713d6c5950260c4a
SHA16cb77fcf7f82bbe5832c5c617d09718794b685fd
SHA256f3ea48099193152e5844be8d7126c0150fd12e7d8e69fdef7cd91bf7c38306f7
SHA512c8944934fb6f1976094dc6a92c90bd0b086f117b421589d7ed5c7bcf94562be5508bc505f9aedc162b3ebe1392b8f2b2a00ad03f5d680a58dddcd8ea52998c3d