Analysis
-
max time kernel
120s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
10/07/2024, 00:21
Static task
static1
Behavioral task
behavioral1
Sample
3294eed3b9b1505d9c8e37ae990f6ddf_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3294eed3b9b1505d9c8e37ae990f6ddf_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3294eed3b9b1505d9c8e37ae990f6ddf_JaffaCakes118.exe
-
Size
614KB
-
MD5
3294eed3b9b1505d9c8e37ae990f6ddf
-
SHA1
65d988638bf65b273f99f603d2beac3cf2270032
-
SHA256
2d027c212df0e6ed79e6ba61bee72abc855308b14189a2c48c7cc1f2c1964381
-
SHA512
fb45bdddb77fd4e47249282008aa35b1f1411f5d4b60dbc112a27a962448fa553c6db8545b9ec913a387d86faab81bf023d8ba48f4dd08f6b57d9cafd1fb108a
-
SSDEEP
12288:oaWz2Mg7v3qnCi8ErQohh0F4CCJ8lnyLQYn:/adMv6CYrjqnyLQ+
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation 3294eed3b9b1505d9c8e37ae990f6ddf_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation WScript.exe -
Modifies system executable filetype association 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\SysWOW64\\WScript.exe\" \"C:\\Program Files\\Tencent\\Obfuscated.n\" \"%1\" %*" 3294eed3b9b1505d9c8e37ae990f6ddf_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\LNKFILE\CLSID WScript.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\PropertySheetHandlers WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\System32\\WScript.exe\" \"C:\\Program Files (x86)\\Winrar\\Monitor.jse\" \"%1\" %*" WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 3294eed3b9b1505d9c8e37ae990f6ddf_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\LNKFILE\SHELLEX\CONTEXTMENUHANDLERS\{00021401-0000-0000-C000-000000000046} WScript.exe Key deleted \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\lnkfile\shellex\ContextMenuHandlers WScript.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\LNKFILE\SHELLEX\DROPHANDLER WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\ = "´ò¿ª(&O)" WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{D37FE4F7-3E52-11EF-96F8-C22FF2BD35B2} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2819594402" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31117919" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31117919" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2817406095" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31117919" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2817406095" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000474a65013f51fa4ea7512bf38b7b793000000000020000000000106600000001000020000000d1adc3e9024d36a77703323bbb8686b08249e5ddf9d146ecd227b089237e2296000000000e80000000020000200000000598ab5b3f71252802ee5171d9677177aabe20b277bec84716c5c421efa11cb620000000ce7b0734781922330bcf67c66f2e43e6fc1a0eaed7393acb253cc8784c978e9540000000ce648e8ec7eda6695ee2fcde6f3dc11b9e96bfb6c03ed06d9f0b42c969e70fe63e8e1f313bcef5a442c2c642e78145f4851e9d8f4edae3dcea8321e42891b8e4 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f07bc8995fd2da01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427336068" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Modifies registry class 51 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\LNKFILE\SHELLEX\DROPHANDLER WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.n\ = "Nfile" 3294eed3b9b1505d9c8e37ae990f6ddf_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Nfile\Shell\Print\ = "打印(&P)" 3294eed3b9b1505d9c8e37ae990f6ddf_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Nfile\ShellEx 3294eed3b9b1505d9c8e37ae990f6ddf_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Nfile\ShellEx\DropHandler 3294eed3b9b1505d9c8e37ae990f6ddf_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Nfile\FriendlyTypeName = "@%SystemRoot%\\System32\\wshext.dll,-4805" 3294eed3b9b1505d9c8e37ae990f6ddf_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\LNKFILE\SHELLEX\CONTEXTMENUHANDLERS\{00021401-0000-0000-C000-000000000046} WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Nfile\Shell\Open\ = "打开(&O)" 3294eed3b9b1505d9c8e37ae990f6ddf_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Nfile\ShellEx\PropertySheetHandlers 3294eed3b9b1505d9c8e37ae990f6ddf_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\.LNK\SHELLEX\{BB2E617C-0920-11D1-9A0B-00C04FC2D6C1} WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Nfile\ = "JScript 已编码的 Script 文件" 3294eed3b9b1505d9c8e37ae990f6ddf_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Nfile\DefaultIcon\ = "%SystemRoot%\\SysWow64\\WScript.exe,3" 3294eed3b9b1505d9c8e37ae990f6ddf_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 3294eed3b9b1505d9c8e37ae990f6ddf_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Nfile\Shell\Edit\ = "编辑(&E)" 3294eed3b9b1505d9c8e37ae990f6ddf_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Nfile\Shell\Open2\ = "在命令提示符中打开(&W)" 3294eed3b9b1505d9c8e37ae990f6ddf_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Nfile\ScriptEngine 3294eed3b9b1505d9c8e37ae990f6ddf_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\.LNK\SHELLEX\{000214EE-0000-0000-C000-000000000046} WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Nfile\Shell 3294eed3b9b1505d9c8e37ae990f6ddf_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings 3294eed3b9b1505d9c8e37ae990f6ddf_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\PropertySheetHandlers WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\System32\\WScript.exe\" \"C:\\Program Files (x86)\\Winrar\\Monitor.jse\" \"%1\" %*" WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Nfile\Shell\Print\Command\ = "%SystemRoot%\\SysWow64\\Notepad.exe /p %1" 3294eed3b9b1505d9c8e37ae990f6ddf_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\LNKFILE\CLSID WScript.exe Key deleted \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\lnkfile\shellex\ContextMenuHandlers WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Nfile\ShellEx\PropertySheetHandlers\WSHProps 3294eed3b9b1505d9c8e37ae990f6ddf_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Nfile\Shell\Open\Command\ = "%SystemRoot%\\SysWow64\\WScript.exe \"%1\" %*" 3294eed3b9b1505d9c8e37ae990f6ddf_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Nfile\ShellEx\DropHandler\ = "{60254CA5-953B-11CF-8C96-00AA00B8708C}" 3294eed3b9b1505d9c8e37ae990f6ddf_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\SysWOW64\\WScript.exe\" \"C:\\Program Files\\Tencent\\Obfuscated.n\" \"%1\" %*" 3294eed3b9b1505d9c8e37ae990f6ddf_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Nfile\ScriptEngine\ = "JScript.Encode" 3294eed3b9b1505d9c8e37ae990f6ddf_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Nfile\Shell\Open2\Command\ = "%SystemRoot%\\SysWow64\\CScript.exe \"%1\" %*" 3294eed3b9b1505d9c8e37ae990f6ddf_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\ = "´ò¿ª(&O)" WScript.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\.lnk\ShellEx WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Nfile\Shell\Edit\Command\ = "%SystemRoot%\\SysWow64\\Notepad.exe %1" 3294eed3b9b1505d9c8e37ae990f6ddf_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Nfile\Shell\Open2\Command 3294eed3b9b1505d9c8e37ae990f6ddf_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Nfile\DefaultIcon 3294eed3b9b1505d9c8e37ae990f6ddf_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Nfile\Shell\Edit\Command 3294eed3b9b1505d9c8e37ae990f6ddf_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Nfile\Shell\Open 3294eed3b9b1505d9c8e37ae990f6ddf_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Nfile 3294eed3b9b1505d9c8e37ae990f6ddf_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Nfile\Shell\Edit 3294eed3b9b1505d9c8e37ae990f6ddf_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Nfile\Shell\Open2 3294eed3b9b1505d9c8e37ae990f6ddf_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Nfile\ShellEx\PropertySheetHandlers\WSHProps\ = "{60254CA5-953B-11CF-8C96-00AA00B8708C}" 3294eed3b9b1505d9c8e37ae990f6ddf_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\.LNK\SHELLEX\{000214F9-0000-0000-C000-000000000046} WScript.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\.LNK\SHELLEX\{00021500-0000-0000-C000-000000000046} WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.n 3294eed3b9b1505d9c8e37ae990f6ddf_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Nfile\Shell\Open\Command 3294eed3b9b1505d9c8e37ae990f6ddf_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Nfile\Shell\Print 3294eed3b9b1505d9c8e37ae990f6ddf_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Nfile\Shell\Print\Command 3294eed3b9b1505d9c8e37ae990f6ddf_JaffaCakes118.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 456 PING.EXE -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 768 3294eed3b9b1505d9c8e37ae990f6ddf_JaffaCakes118.exe 768 3294eed3b9b1505d9c8e37ae990f6ddf_JaffaCakes118.exe 768 3294eed3b9b1505d9c8e37ae990f6ddf_JaffaCakes118.exe 768 3294eed3b9b1505d9c8e37ae990f6ddf_JaffaCakes118.exe 768 3294eed3b9b1505d9c8e37ae990f6ddf_JaffaCakes118.exe 768 3294eed3b9b1505d9c8e37ae990f6ddf_JaffaCakes118.exe 768 3294eed3b9b1505d9c8e37ae990f6ddf_JaffaCakes118.exe 768 3294eed3b9b1505d9c8e37ae990f6ddf_JaffaCakes118.exe 768 3294eed3b9b1505d9c8e37ae990f6ddf_JaffaCakes118.exe 768 3294eed3b9b1505d9c8e37ae990f6ddf_JaffaCakes118.exe 768 3294eed3b9b1505d9c8e37ae990f6ddf_JaffaCakes118.exe 768 3294eed3b9b1505d9c8e37ae990f6ddf_JaffaCakes118.exe 768 3294eed3b9b1505d9c8e37ae990f6ddf_JaffaCakes118.exe 768 3294eed3b9b1505d9c8e37ae990f6ddf_JaffaCakes118.exe 768 3294eed3b9b1505d9c8e37ae990f6ddf_JaffaCakes118.exe 768 3294eed3b9b1505d9c8e37ae990f6ddf_JaffaCakes118.exe 768 3294eed3b9b1505d9c8e37ae990f6ddf_JaffaCakes118.exe 768 3294eed3b9b1505d9c8e37ae990f6ddf_JaffaCakes118.exe 768 3294eed3b9b1505d9c8e37ae990f6ddf_JaffaCakes118.exe 768 3294eed3b9b1505d9c8e37ae990f6ddf_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 768 3294eed3b9b1505d9c8e37ae990f6ddf_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2992 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2992 iexplore.exe 2992 iexplore.exe 696 IEXPLORE.EXE 696 IEXPLORE.EXE 696 IEXPLORE.EXE 696 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 768 wrote to memory of 3156 768 3294eed3b9b1505d9c8e37ae990f6ddf_JaffaCakes118.exe 85 PID 768 wrote to memory of 3156 768 3294eed3b9b1505d9c8e37ae990f6ddf_JaffaCakes118.exe 85 PID 768 wrote to memory of 3156 768 3294eed3b9b1505d9c8e37ae990f6ddf_JaffaCakes118.exe 85 PID 3156 wrote to memory of 2992 3156 WScript.exe 87 PID 3156 wrote to memory of 2992 3156 WScript.exe 87 PID 768 wrote to memory of 4804 768 3294eed3b9b1505d9c8e37ae990f6ddf_JaffaCakes118.exe 88 PID 768 wrote to memory of 4804 768 3294eed3b9b1505d9c8e37ae990f6ddf_JaffaCakes118.exe 88 PID 768 wrote to memory of 4804 768 3294eed3b9b1505d9c8e37ae990f6ddf_JaffaCakes118.exe 88 PID 2992 wrote to memory of 696 2992 iexplore.exe 90 PID 2992 wrote to memory of 696 2992 iexplore.exe 90 PID 2992 wrote to memory of 696 2992 iexplore.exe 90 PID 4804 wrote to memory of 456 4804 cmd.exe 91 PID 4804 wrote to memory of 456 4804 cmd.exe 91 PID 4804 wrote to memory of 456 4804 cmd.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\3294eed3b9b1505d9c8e37ae990f6ddf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3294eed3b9b1505d9c8e37ae990f6ddf_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Modifies system executable filetype association
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\SysWow64\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\monitor.n"2⤵
- Checks computer location settings
- Modifies system executable filetype association
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3156 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.go2000.com/?g93⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2992 CREDAT:17410 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:696
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 4 127.1>nul &del /q "C:\Users\Admin\AppData\Local\Temp\3294eed3b9b1505d9c8e37ae990f6ddf_JaffaCakes118.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Windows\SysWOW64\PING.EXEping -n 4 127.13⤵
- Runs ping.exe
PID:456
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
7KB
MD5a4bf7f9ba9b3e741c3054dfa0b5325ee
SHA12d5810b2d46596b4bbd04b565806ea7ec99d9116
SHA25672f10825026c2f8fa14aaaae7a3919f96c56e6e4d2fe650b0268efe3a9b0469f
SHA512b7853a9e9f451ad96f4421cb8c5dd8847813a568dc056c309a4296cbf4de05eeead66236001eea0125cb7a6fa7c1baf5555221fa5d0b76e13e4698504e592eef
-
Filesize
1KB
MD5057041a0e4f08fb51274f105722e9976
SHA15909d0aad132972886847a263c941919f6aa79e2
SHA2568dcd711b2bae2513d098e2751fb1bf54af37d9aa64da647f407bdabe721ab0a7
SHA5126abb48406bbb420c89db404bb2dffc3947993edbf2c7d7f70c31b23c93f492bb811d1edec6179af693720bb7ebe0186132fee61a6e766ae9b16e1e603cad8dc8