Analysis
-
max time kernel
124s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
08-07-2024 23:55
Static task
static1
Behavioral task
behavioral1
Sample
2e48f61bd78caf3a2de38dc8331248fd_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2e48f61bd78caf3a2de38dc8331248fd_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2e48f61bd78caf3a2de38dc8331248fd_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
2e48f61bd78caf3a2de38dc8331248fd
-
SHA1
8840502cfedf4089d1eb003ca69d8e16e5f3c348
-
SHA256
5ac5604a6add0f9cf37dd038503fded1a9a6db9ccf7505485364c4f107d96c2f
-
SHA512
15b6199a7412f96c10cee42d65e3442e68d99f8a39fa65f96e0e31780437787fb2aedcef324765299c2926ffce7f73d1a9dd99a9b3423732f2e342fe0c33b002
-
SSDEEP
24576:pD4JkT/O9lt/2bgRBapVQImnrFJ97YOIUd:E4G9lt/SgRIpVQIIFJxnIq
Malware Config
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 1868 mextenmgrinst.exe 2580 installwin.exe 2544 quicktimesh.exe 2480 nvset.exe 2340 nvu.exe 1072 nvovd.exe -
Loads dropped DLL 25 IoCs
pid Process 2708 2e48f61bd78caf3a2de38dc8331248fd_JaffaCakes118.exe 1868 mextenmgrinst.exe 1868 mextenmgrinst.exe 1868 mextenmgrinst.exe 1868 mextenmgrinst.exe 1868 mextenmgrinst.exe 2580 installwin.exe 2580 installwin.exe 2580 installwin.exe 2708 2e48f61bd78caf3a2de38dc8331248fd_JaffaCakes118.exe 2708 2e48f61bd78caf3a2de38dc8331248fd_JaffaCakes118.exe 2580 installwin.exe 2544 quicktimesh.exe 2580 installwin.exe 2580 installwin.exe 2544 quicktimesh.exe 2544 quicktimesh.exe 2580 installwin.exe 2544 quicktimesh.exe 2544 quicktimesh.exe 2580 installwin.exe 2480 nvset.exe 2480 nvset.exe 2340 nvu.exe 2340 nvu.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSUtility = "\"C:\\Users\\Admin\\Documents\\Default User\\nvu.exe\" -a" nvset.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Installs/modifies Browser Helper Object 2 TTPs 4 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{96385E56-3EA6-491B-9F58-E6BC0AF6CFE1}\ mextenmgrinst.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{DE13A5FF-97E9-4747-BB2D-B61E89F8447B} mextenmgrinst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{DE13A5FF-97E9-4747-BB2D-B61E89F8447B}\ mextenmgrinst.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{96385E56-3EA6-491B-9F58-E6BC0AF6CFE1} mextenmgrinst.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\MSINET.OCX mextenmgrinst.exe File opened for modification C:\Windows\SysWOW64\INETKO.DLL mextenmgrinst.exe File created C:\Windows\SysWOW64\nvset.exe 2e48f61bd78caf3a2de38dc8331248fd_JaffaCakes118.exe File created C:\Windows\SysWOW64\mextenmgrinst.exe 2e48f61bd78caf3a2de38dc8331248fd_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\VB6KO.DLL mextenmgrinst.exe -
Drops file in Program Files directory 9 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\mextenmgr\quicktimesh.dll mextenmgrinst.exe File opened for modification C:\Program Files (x86)\mextenmgr\quicktimesh.exe mextenmgrinst.exe File opened for modification C:\Program Files (x86)\mextenmgr\unst.bat installwin.exe File opened for modification C:\Program Files (x86)\mextenmgr\mextenmgr.dll mextenmgrinst.exe File opened for modification C:\Program Files (x86)\mextenmgr\mextenmgrdl.exe mextenmgrinst.exe File opened for modification C:\Program Files (x86)\mextenmgr\installwin.exe mextenmgrinst.exe File opened for modification C:\Program Files (x86)\mextenmgr\quicktimeshdl.exe mextenmgrinst.exe File opened for modification C:\Program Files (x86)\mextenmgr\Uninstall.exe mextenmgrinst.exe File created C:\Program Files (x86)\mextenmgr\Uninstall.ini mextenmgrinst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\DisableScriptDebuggerIE = "yes" nvovd.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main nvovd.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Disable Script Debugger = "yes" nvovd.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\InetCtls.Inet.1\CLSID installwin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59293-9880-11CF-9754-00AA00C00908}\ProgID\ = "InetCtls.Inet.1" installwin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{48E59292-9880-11CF-9754-00AA00C00908}\ = "DInetEvents" quicktimesh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A9D5D4C9-298B-4FD5-82DA-88E36F30CB7D}\TypeLib mextenmgrinst.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{A9D5D4C9-298B-4FD5-82DA-88E36F30CB7D}\ProxyStubClsid32 mextenmgrinst.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{79941385-057F-4917-A248-930DD9CCD2FF} mextenmgrinst.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{79941385-057F-4917-A248-930DD9CCD2FF}\ProxyStubClsid32 mextenmgrinst.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59295-9880-11CF-9754-00AA00C00908} quicktimesh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59295-9880-11CF-9754-00AA00C00908}\InprocServer32 quicktimesh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59293-9880-11CF-9754-00AA00C00908}\VersionIndependentProgID installwin.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{96385E56-3EA6-491B-9F58-E6BC0AF6CFE1}\ProgID mextenmgrinst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DE13A5FF-97E9-4747-BB2D-B61E89F8447B}\VERSION\ = "5.0" mextenmgrinst.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59293-9880-11CF-9754-00AA00C00908}\Implemented Categories\{40FC6ED5-2438-11CF-A3DB-080036F12502} installwin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\InetCtls.Inet\CLSID\ = "{48E59293-9880-11CF-9754-00AA00C00908}" installwin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{A9D5D4C9-298B-4FD5-82DA-88E36F30CB7D}\ProxyStubClsid\ = "{00020424-0000-0000-C000-000000000046}" mextenmgrinst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{79941385-057F-4917-A248-930DD9CCD2FF}\ProxyStubClsid\ = "{00020424-0000-0000-C000-000000000046}" mextenmgrinst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{48E59291-9880-11CF-9754-00AA00C00908}\TypeLib\ = "{48E59290-9880-11CF-9754-00AA00C00908}" quicktimesh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{96385E56-3EA6-491B-9F58-E6BC0AF6CFE1}\Implemented Categories\{40FC6ED5-2438-11CF-A3DB-080036F12502} mextenmgrinst.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TYPELIB\{48E59290-9880-11CF-9754-00AA00C00908}\1.0\FLAGS quicktimesh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TYPELIB\{74D6F700-7FD2-4A91-80F2-ED763CED6A2D} mextenmgrinst.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59293-9880-11CF-9754-00AA00C00908}\Control installwin.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59294-9880-11CF-9754-00AA00C00908}\InprocServer32 installwin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59294-9880-11CF-9754-00AA00C00908}\InprocServer32\ = "C:\\Windows\\SysWow64\\MSINET.OCX" installwin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{48E59292-9880-11CF-9754-00AA00C00908}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" quicktimesh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DE13A5FF-97E9-4747-BB2D-B61E89F8447B}\ = "quicktimeshgp.quicktimesh" mextenmgrinst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\quicktimeshgp.quicktimesh\Clsid\ = "{DE13A5FF-97E9-4747-BB2D-B61E89F8447B}" mextenmgrinst.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TYPELIB\{0EEF74AE-B13F-4786-8D12-E10E4614D8B0} mextenmgrinst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{79941385-057F-4917-A248-930DD9CCD2FF}\ = "_quicktimesh" mextenmgrinst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59293-9880-11CF-9754-00AA00C00908}\ProgID\ = "InetCtls.Inet.1" quicktimesh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59293-9880-11CF-9754-00AA00C00908}\Implemented Categories\{40FC6ED4-2438-11CF-A3DB-080036F12502} quicktimesh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{48E59292-9880-11CF-9754-00AA00C00908} quicktimesh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{79941385-057F-4917-A248-930DD9CCD2FF}\TypeLib\Version = "5.0" mextenmgrinst.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TYPELIB\{48E59290-9880-11CF-9754-00AA00C00908}\1.0\0 quicktimesh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{48E59292-9880-11CF-9754-00AA00C00908}\TypeLib quicktimesh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TYPELIB\{0EEF74AE-B13F-4786-8D12-E10E4614D8B0}\13.0\HELPDIR mextenmgrinst.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{79941385-057F-4917-A248-930DD9CCD2FF}\TypeLib mextenmgrinst.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\quicktimeshgp.quicktimesh mextenmgrinst.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\InetCtls.Inet.1\CLSID quicktimesh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59293-9880-11CF-9754-00AA00C00908}\ToolboxBitmap32\ = "C:\\Windows\\SysWow64\\MSINET.OCX, 1" quicktimesh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59293-9880-11CF-9754-00AA00C00908}\MiscStatus\1\ = "132497" installwin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TYPELIB\{74D6F700-7FD2-4A91-80F2-ED763CED6A2D}\5.0\ = "quicktimeshgp" mextenmgrinst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59294-9880-11CF-9754-00AA00C00908}\ = "Internet Control General Property Page Object" quicktimesh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59293-9880-11CF-9754-00AA00C00908} installwin.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59293-9880-11CF-9754-00AA00C00908}\MiscStatus quicktimesh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\InetCtls.Inet installwin.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59295-9880-11CF-9754-00AA00C00908}\InprocServer32 installwin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TYPELIB\{0EEF74AE-B13F-4786-8D12-E10E4614D8B0}\13.0\HELPDIR\ = "C:\\Program Files (x86)\\mextenmgr" mextenmgrinst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{A9D5D4C9-298B-4FD5-82DA-88E36F30CB7D}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" mextenmgrinst.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DE13A5FF-97E9-4747-BB2D-B61E89F8447B}\VERSION mextenmgrinst.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TYPELIB\{74D6F700-7FD2-4A91-80F2-ED763CED6A2D}\5.0\FLAGS mextenmgrinst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{79941385-057F-4917-A248-930DD9CCD2FF}\TypeLib\ = "{74D6F700-7FD2-4A91-80F2-ED763CED6A2D}" mextenmgrinst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DE13A5FF-97E9-4747-BB2D-B61E89F8447B}\TypeLib\ = "{74D6F700-7FD2-4A91-80F2-ED763CED6A2D}" mextenmgrinst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{A9D5D4C9-298B-4FD5-82DA-88E36F30CB7D}\TypeLib\ = "{0EEF74AE-B13F-4786-8D12-E10E4614D8B0}" mextenmgrinst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A9D5D4C9-298B-4FD5-82DA-88E36F30CB7D}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" mextenmgrinst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{A9D5D4C9-298B-4FD5-82DA-88E36F30CB7D}\ = "mextenmgr" mextenmgrinst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59293-9880-11CF-9754-00AA00C00908}\MiscStatus\ = "0" quicktimesh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59294-9880-11CF-9754-00AA00C00908} quicktimesh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{48E59292-9880-11CF-9754-00AA00C00908}\ = "DInetEvents" quicktimesh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{A9D5D4C9-298B-4FD5-82DA-88E36F30CB7D}\ProxyStubClsid mextenmgrinst.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59293-9880-11CF-9754-00AA00C00908}\ToolboxBitmap32 quicktimesh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{48E59292-9880-11CF-9754-00AA00C00908}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" quicktimesh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{96385E56-3EA6-491B-9F58-E6BC0AF6CFE1}\InprocServer32\ = "C:\\Program Files (x86)\\mextenmgr\\mextenmgr.dll" mextenmgrinst.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DE13A5FF-97E9-4747-BB2D-B61E89F8447B}\TypeLib mextenmgrinst.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\InetCtls.Inet.1 quicktimesh.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2480 nvset.exe 2480 nvset.exe -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 2544 quicktimesh.exe 2580 installwin.exe 2544 quicktimesh.exe 2480 nvset.exe 2480 nvset.exe 2480 nvset.exe 2340 nvu.exe 2340 nvu.exe 2340 nvu.exe 1072 nvovd.exe 1072 nvovd.exe -
Suspicious use of WriteProcessMemory 37 IoCs
description pid Process procid_target PID 2708 wrote to memory of 1868 2708 2e48f61bd78caf3a2de38dc8331248fd_JaffaCakes118.exe 30 PID 2708 wrote to memory of 1868 2708 2e48f61bd78caf3a2de38dc8331248fd_JaffaCakes118.exe 30 PID 2708 wrote to memory of 1868 2708 2e48f61bd78caf3a2de38dc8331248fd_JaffaCakes118.exe 30 PID 2708 wrote to memory of 1868 2708 2e48f61bd78caf3a2de38dc8331248fd_JaffaCakes118.exe 30 PID 2708 wrote to memory of 1868 2708 2e48f61bd78caf3a2de38dc8331248fd_JaffaCakes118.exe 30 PID 2708 wrote to memory of 1868 2708 2e48f61bd78caf3a2de38dc8331248fd_JaffaCakes118.exe 30 PID 2708 wrote to memory of 1868 2708 2e48f61bd78caf3a2de38dc8331248fd_JaffaCakes118.exe 30 PID 1868 wrote to memory of 2580 1868 mextenmgrinst.exe 31 PID 1868 wrote to memory of 2580 1868 mextenmgrinst.exe 31 PID 1868 wrote to memory of 2580 1868 mextenmgrinst.exe 31 PID 1868 wrote to memory of 2580 1868 mextenmgrinst.exe 31 PID 1868 wrote to memory of 2580 1868 mextenmgrinst.exe 31 PID 1868 wrote to memory of 2580 1868 mextenmgrinst.exe 31 PID 1868 wrote to memory of 2580 1868 mextenmgrinst.exe 31 PID 1868 wrote to memory of 2544 1868 mextenmgrinst.exe 32 PID 1868 wrote to memory of 2544 1868 mextenmgrinst.exe 32 PID 1868 wrote to memory of 2544 1868 mextenmgrinst.exe 32 PID 1868 wrote to memory of 2544 1868 mextenmgrinst.exe 32 PID 2708 wrote to memory of 2480 2708 2e48f61bd78caf3a2de38dc8331248fd_JaffaCakes118.exe 33 PID 2708 wrote to memory of 2480 2708 2e48f61bd78caf3a2de38dc8331248fd_JaffaCakes118.exe 33 PID 2708 wrote to memory of 2480 2708 2e48f61bd78caf3a2de38dc8331248fd_JaffaCakes118.exe 33 PID 2708 wrote to memory of 2480 2708 2e48f61bd78caf3a2de38dc8331248fd_JaffaCakes118.exe 33 PID 2480 wrote to memory of 2340 2480 nvset.exe 36 PID 2480 wrote to memory of 2340 2480 nvset.exe 36 PID 2480 wrote to memory of 2340 2480 nvset.exe 36 PID 2480 wrote to memory of 2340 2480 nvset.exe 36 PID 2580 wrote to memory of 1252 2580 installwin.exe 38 PID 2580 wrote to memory of 1252 2580 installwin.exe 38 PID 2580 wrote to memory of 1252 2580 installwin.exe 38 PID 2580 wrote to memory of 1252 2580 installwin.exe 38 PID 2580 wrote to memory of 1252 2580 installwin.exe 38 PID 2580 wrote to memory of 1252 2580 installwin.exe 38 PID 2580 wrote to memory of 1252 2580 installwin.exe 38 PID 2340 wrote to memory of 1072 2340 nvu.exe 41 PID 2340 wrote to memory of 1072 2340 nvu.exe 41 PID 2340 wrote to memory of 1072 2340 nvu.exe 41 PID 2340 wrote to memory of 1072 2340 nvu.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\2e48f61bd78caf3a2de38dc8331248fd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2e48f61bd78caf3a2de38dc8331248fd_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\mextenmgrinst.exeC:\Windows\system32\mextenmgrinst.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Program Files (x86)\mextenmgr\installwin.exe"C:\Program Files (x86)\mextenmgr\installwin.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files (x86)\mextenmgr\unst.bat""4⤵PID:1252
-
-
-
C:\Program Files (x86)\mextenmgr\quicktimesh.exe"C:\Program Files (x86)\mextenmgr\quicktimesh.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2544
-
-
-
C:\Windows\SysWOW64\nvset.exeC:\Windows\system32\nvset.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Users\Admin\Documents\Default User\nvu.exe"C:\Users\Admin\Documents\Default User\nvu.exe" -op3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Users\Admin\Documents\Default User\nvovd.exe"C:\Users\Admin\Documents\Default User\nvovd.exe" -fx4⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1072
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD554d1fe90f49c180c8282feb82b5ddc56
SHA1f7a4af4690aaf83e361492150c4bf7a664feac3d
SHA2568376c75a7f4a149400db4db4213f7197f11a052af7c58e1edc6c0ca2958eabb8
SHA512f26ba271858733cbecdcb9ba23e6d2f400f8c669400179e9aca2a0f7d7add97f403954ccce981bb003f993e56c607116cd0d142e9afa98025153822bc297326d
-
Filesize
92KB
MD53f69ed582313fd64a4ad2d0dc7ec6113
SHA199470eefd7f55858a0eed8d76c7f571bd2471891
SHA256c94dd31acd0a762d887a2fb1d6a0f9dfb51040049f116edd3a10e02a19807b4a
SHA512852e7e10d1de37a17ad75f32438f074f0d768275f1d701b269969081bb19bb6aab618e4353205fc5d8bf2157c5959126999c3a9e5bd01315187cb5e7ffd2295f
-
Filesize
194B
MD527aa38993caa6ca4ca75652e36874ed2
SHA16c75a1e8951060489cf7bac28f36966374058a0b
SHA256c0e5bf0a0cacbec413934d3d8f5951e6a785778c99bc75798230060bdc3a72b6
SHA512d903a07b88ae49dfc45f615b18a8fbf7ff41e43f48ac739d924e7c5a02a789f99905683ec9723c49ff410e6a5e69c253c1c26ea76f9f4f029efecbff86df07d6
-
Filesize
44KB
MD57a39b5cac356411f2f68d0e936473a70
SHA1d0804bd190a0a7cc8302c8786d4fea58aef96806
SHA2567e898b486f1c0a1f5a450f343b5f04633dbccb2793ed4c59f7f388acc4410140
SHA51279eba047844c8b51c696e3c93a1afb2c4404916acea6d0988544c00849c98172a549fc08b9d1875cfc3e37ee278688bd903a58badfa7139f43e8db90963b7dfb
-
Filesize
113KB
MD540d81470a19269d88bf44e766be7f84a
SHA14030e8e94297bc0aa5139fe241e8cf8f8142d8d4
SHA256dd1215f01b484e7842763302d42749d516963d9ac74e2fe8825a5eaba34f6229
SHA512e4a39613cc32885b67f6219281fbf99f50018b5fd2886b5389cfa04dc9dc4ebfc46fca2b9e89586116094fa3a7600c20b2ca0fa3535dd2615739621856506864
-
Filesize
99KB
MD584742b5754690ed667372be561cf518d
SHA1ef97aa43f804f447498568fc33704800b91a7381
SHA25652b64e2bfc9ee0b807f2095726ace9e911bcd907054ac15686a4e7d2fd4dc751
SHA51272ac19a3665a01519dac2ad43eb6178a66ad7f4e167f2a882cbca242978f8debe3e15d0e210c3b0391590699999f33a1fd5de4ca6559ff894b4e6cb4ac1415a0
-
Filesize
116KB
MD51acdc20bd5b3fea1daf653ad3d441e4c
SHA1afc42a7eff685f86e6709a5e7003f4f9bec6f333
SHA256e0aa63a84871ac0ce9a939023eba3ebfcb9521792e9232627860ca482b61d01d
SHA512cee59f90ea69d3300efddb47c4285dccff664076214e637603bd6605560c072cd45d7fb2f6493aa1471de74b68626e2f50bbc60abbb56d1f1db1b6f6a4c0e760
-
Filesize
116KB
MD581092cc77f8cecadc14eb304bfb62475
SHA1ffffaaf31be77c65c2316b81fb3c54c7fc940b75
SHA256c3d9f3f0431b310c19cbe4976b65d585f028bc869bee363ce53236cf4c9f0e7b
SHA51251c3977ae3e43e2539b2fa089ee25d6218c6fa1e68ef4ec9c197fb70bfb9a9870122f99ae73e5d9b93783fd4c36bfffd3a345715a7a845380fbd264fc274cc49
-
Filesize
88KB
MD5e0360c9d843c365f82ca3c43b4f88f95
SHA1ba802ce4be38c2814c94fb0c68de5717369250c1
SHA2568f2a203adb4f91b4302ea5cfc36933fd0010684a5d161cb6ae5bb84afa0b56e3
SHA512cd91ff8136283b316b949b1010b2536f249d53cf58611e89b73c2b65cc0bafa955d10102a5a9c2ba118fcb4e265308cdfdb1ff7775fe38ce27478dea722585cb
-
Filesize
898KB
MD5ec36cb7823ebe864382dff14563e6211
SHA16e1e331214ae932cda9d776b7b1e9b95d192e417
SHA2560a9832929404b111e231adede2fd4c62ca44dd49c741f8e961f1e9d31cfba7fd
SHA5121088300f4f62473c6a210c8397e06e906655b91994722e9257b564233633dd68a4704911024bc694bb08faa2cf734c426ccfdf25803853d60f7e1b19e80cd584
-
Filesize
164KB
MD585790794634d96e775e31057d411388e
SHA14e61f6a556496f36ae71585c0e493673ae846ff5
SHA2561673ab46b39a53769ce8d96edd8dbf6b134968e0a49d29d0614981e3c6fd0abe
SHA51256cb92c442286a93513b9f8edc77d25fe276313802a34de7896e5b204a604188e5a895c5093b710be921e68cd3c234dfded64eeffcf5bcd6e16a8ca824b0ced3