Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
11/07/2024, 10:41
Static task
static1
Behavioral task
behavioral1
Sample
38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe
-
Size
417KB
-
MD5
38c7b3a1e607aed753b35b78a105b029
-
SHA1
c3a2d3d83fb4e29c03e6cc5c34a53ae34cc792d1
-
SHA256
af1bbb21e8744b9572c291304b98064e9842572d92bb67d4e4e3c9ffdf07781e
-
SHA512
78df751971b3b28c7180ee80024c727adbfd50a500043a95dc1723d7e4866f19722207af9d9bd663c2a4d3424dcb0799082fb3284c1e813ee0fd1e4ec86ce8d4
-
SSDEEP
12288:Dr1WiLwWEaCmqp43s39OHCkM4ch8eLZDPK6w:9WOt2mL3s3gbMoi1w
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts b55d.exe -
Executes dropped EXE 3 IoCs
pid Process 2852 b55d.exe 2636 b55d.exe 2392 b55d.exe -
Loads dropped DLL 49 IoCs
pid Process 2984 regsvr32.exe 2384 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 2384 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 2852 b55d.exe 2852 b55d.exe 2852 b55d.exe 2384 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 2384 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 2636 b55d.exe 2636 b55d.exe 2636 b55d.exe 2392 b55d.exe 1484 rundll32.exe 1484 rundll32.exe 1484 rundll32.exe 1484 rundll32.exe 1048 rundll32.exe 1048 rundll32.exe 1048 rundll32.exe 1048 rundll32.exe 2392 b55d.exe 2392 b55d.exe 2392 b55d.exe 2392 b55d.exe 2392 b55d.exe 2392 b55d.exe 2392 b55d.exe 2392 b55d.exe 2392 b55d.exe 2392 b55d.exe 2392 b55d.exe 2392 b55d.exe 2392 b55d.exe 2392 b55d.exe 2392 b55d.exe 2392 b55d.exe 2392 b55d.exe 2392 b55d.exe 2392 b55d.exe 2392 b55d.exe 2392 b55d.exe 2392 b55d.exe 2392 b55d.exe 2392 b55d.exe 2392 b55d.exe 2392 b55d.exe 2392 b55d.exe 2392 b55d.exe 2392 b55d.exe -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{FE2C6476-6830-4483-A376-6058781C7154}\ = "Microsoft User" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{FE2C6476-6830-4483-A376-6058781C7154} regsvr32.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 3 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 rundll32.exe File opened for modification \??\PhysicalDrive0 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe File opened for modification \??\PhysicalDrive0 b55d.exe -
Drops file in System32 directory 19 IoCs
description ioc Process File created C:\Windows\SysWOW64\24de rundll32.exe File opened for modification C:\Windows\SysWOW64\c6cb.dll 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\353r.dlltmp 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\4b3o.dlltmp 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\b55d.exe 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\3ce8.dll 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\4bl4.dll 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\c6cb.dlltmp 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\b33d.exe 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\46be.dll 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe File created C:\Windows\SysWOW64\-60-48-45-107 rundll32.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat rundll32.exe File opened for modification C:\Windows\SysWOW64\b3rc.exe 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\36ud.exe 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\c35s.dll 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\4b3o.dll 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\4bl4.dlltmp 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\bba6.dll 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\353r.dll 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File opened for modification C:\Windows\b3cd.exe 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe File opened for modification C:\Windows\0acu.bmp 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe File created C:\Windows\Tasks\ms.job 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe File opened for modification C:\Windows\b5b3.bmp 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe File opened for modification C:\Windows\80au.bmp 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe File opened for modification C:\Windows\d48d.flv 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe File opened for modification C:\Windows\436b.flv 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe File opened for modification C:\Windows\480.exe 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe File opened for modification C:\Windows\d48d.exe 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe File opened for modification C:\Windows\3cdd.flv 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe File opened for modification C:\Windows\80a.bmp 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe File opened for modification C:\Windows\d48.flv 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe File opened for modification C:\Windows\480d.exe 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe -
Modifies registry class 47 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer.1\ = "CFunPlayer Object" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{FE2C6476-6830-4483-A376-6058781C7154}\ProgID\ = "BHO.FunPlayer.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{FE2C6476-6830-4483-A376-6058781C7154}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E533193D-2170-41A4-86D7-E4822455F193}\ = "IFunPlayer" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D9C916B1-7134-40E1-91AC-6932C6960A6B}\1.0\0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E533193D-2170-41A4-86D7-E4822455F193}\TypeLib\ = "{D9C916B1-7134-40E1-91AC-6932C6960A6B}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer.1 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer.1\CLSID\ = "{FE2C6476-6830-4483-A376-6058781C7154}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer\ = "CFunPlayer Object" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{FE2C6476-6830-4483-A376-6058781C7154} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{FE2C6476-6830-4483-A376-6058781C7154}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{FE2C6476-6830-4483-A376-6058781C7154}\InprocServer32\ = "C:\\Windows\\SysWow64\\4b3o.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E533193D-2170-41A4-86D7-E4822455F193} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E533193D-2170-41A4-86D7-E4822455F193}\ = "IFunPlayer" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer\CurVer regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{FE2C6476-6830-4483-A376-6058781C7154}\AppID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D9C916B1-7134-40E1-91AC-6932C6960A6B}\1.0\ = "BHO 1.0 Type Library" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D9C916B1-7134-40E1-91AC-6932C6960A6B}\1.0\FLAGS regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D9C916B1-7134-40E1-91AC-6932C6960A6B}\1.0\FLAGS\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D9C916B1-7134-40E1-91AC-6932C6960A6B} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D9C916B1-7134-40E1-91AC-6932C6960A6B}\1.0\0\win32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E533193D-2170-41A4-86D7-E4822455F193}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{FE2C6476-6830-4483-A376-6058781C7154}\ = "CFunPlayer Object" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{FE2C6476-6830-4483-A376-6058781C7154}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{FE2C6476-6830-4483-A376-6058781C7154}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E533193D-2170-41A4-86D7-E4822455F193}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E533193D-2170-41A4-86D7-E4822455F193}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E533193D-2170-41A4-86D7-E4822455F193}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E533193D-2170-41A4-86D7-E4822455F193} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E533193D-2170-41A4-86D7-E4822455F193}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer.1\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer\CurVer\ = "BHO.FunPlayer.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{FE2C6476-6830-4483-A376-6058781C7154}\VersionIndependentProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{FE2C6476-6830-4483-A376-6058781C7154}\VersionIndependentProgID\ = "BHO.FunPlayer" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D9C916B1-7134-40E1-91AC-6932C6960A6B}\1.0\0\win32\ = "C:\\Windows\\SysWow64\\4b3o.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D9C916B1-7134-40E1-91AC-6932C6960A6B}\1.0\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E533193D-2170-41A4-86D7-E4822455F193}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E533193D-2170-41A4-86D7-E4822455F193}\TypeLib\ = "{D9C916B1-7134-40E1-91AC-6932C6960A6B}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D9C916B1-7134-40E1-91AC-6932C6960A6B}\1.0\HELPDIR\ = "C:\\Windows\\SysWow64\\" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E533193D-2170-41A4-86D7-E4822455F193}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E533193D-2170-41A4-86D7-E4822455F193}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer\CLSID\ = "{FE2C6476-6830-4483-A376-6058781C7154}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{FE2C6476-6830-4483-A376-6058781C7154}\InprocServer32\ThreadingModel = "apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{FE2C6476-6830-4483-A376-6058781C7154}\TypeLib\ = "{D9C916B1-7134-40E1-91AC-6932C6960A6B}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D9C916B1-7134-40E1-91AC-6932C6960A6B}\1.0 regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2392 b55d.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 2384 wrote to memory of 2124 2384 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 30 PID 2384 wrote to memory of 2124 2384 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 30 PID 2384 wrote to memory of 2124 2384 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 30 PID 2384 wrote to memory of 2124 2384 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 30 PID 2384 wrote to memory of 2124 2384 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 30 PID 2384 wrote to memory of 2124 2384 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 30 PID 2384 wrote to memory of 2124 2384 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 30 PID 2384 wrote to memory of 2764 2384 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 31 PID 2384 wrote to memory of 2764 2384 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 31 PID 2384 wrote to memory of 2764 2384 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 31 PID 2384 wrote to memory of 2764 2384 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 31 PID 2384 wrote to memory of 2764 2384 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 31 PID 2384 wrote to memory of 2764 2384 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 31 PID 2384 wrote to memory of 2764 2384 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 31 PID 2384 wrote to memory of 2808 2384 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 32 PID 2384 wrote to memory of 2808 2384 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 32 PID 2384 wrote to memory of 2808 2384 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 32 PID 2384 wrote to memory of 2808 2384 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 32 PID 2384 wrote to memory of 2808 2384 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 32 PID 2384 wrote to memory of 2808 2384 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 32 PID 2384 wrote to memory of 2808 2384 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 32 PID 2384 wrote to memory of 2812 2384 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 33 PID 2384 wrote to memory of 2812 2384 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 33 PID 2384 wrote to memory of 2812 2384 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 33 PID 2384 wrote to memory of 2812 2384 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 33 PID 2384 wrote to memory of 2812 2384 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 33 PID 2384 wrote to memory of 2812 2384 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 33 PID 2384 wrote to memory of 2812 2384 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 33 PID 2384 wrote to memory of 2984 2384 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 34 PID 2384 wrote to memory of 2984 2384 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 34 PID 2384 wrote to memory of 2984 2384 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 34 PID 2384 wrote to memory of 2984 2384 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 34 PID 2384 wrote to memory of 2984 2384 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 34 PID 2384 wrote to memory of 2984 2384 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 34 PID 2384 wrote to memory of 2984 2384 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 34 PID 2384 wrote to memory of 2852 2384 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 35 PID 2384 wrote to memory of 2852 2384 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 35 PID 2384 wrote to memory of 2852 2384 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 35 PID 2384 wrote to memory of 2852 2384 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 35 PID 2384 wrote to memory of 2852 2384 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 35 PID 2384 wrote to memory of 2852 2384 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 35 PID 2384 wrote to memory of 2852 2384 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 35 PID 2384 wrote to memory of 2636 2384 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 37 PID 2384 wrote to memory of 2636 2384 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 37 PID 2384 wrote to memory of 2636 2384 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 37 PID 2384 wrote to memory of 2636 2384 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 37 PID 2384 wrote to memory of 2636 2384 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 37 PID 2384 wrote to memory of 2636 2384 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 37 PID 2384 wrote to memory of 2636 2384 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 37 PID 2384 wrote to memory of 1048 2384 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 40 PID 2384 wrote to memory of 1048 2384 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 40 PID 2384 wrote to memory of 1048 2384 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 40 PID 2384 wrote to memory of 1048 2384 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 40 PID 2384 wrote to memory of 1048 2384 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 40 PID 2384 wrote to memory of 1048 2384 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 40 PID 2384 wrote to memory of 1048 2384 38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe 40 PID 2392 wrote to memory of 1484 2392 b55d.exe 41 PID 2392 wrote to memory of 1484 2392 b55d.exe 41 PID 2392 wrote to memory of 1484 2392 b55d.exe 41 PID 2392 wrote to memory of 1484 2392 b55d.exe 41 PID 2392 wrote to memory of 1484 2392 b55d.exe 41 PID 2392 wrote to memory of 1484 2392 b55d.exe 41 PID 2392 wrote to memory of 1484 2392 b55d.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\38c7b3a1e607aed753b35b78a105b029_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32\4bl4.dll"2⤵PID:2124
-
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32\c6cb.dll"2⤵PID:2764
-
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32\353r.dll"2⤵PID:2808
-
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32\4b3o.dll"2⤵PID:2812
-
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /s "C:\Windows\system32\4b3o.dll"2⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:2984
-
-
C:\Windows\SysWOW64\b55d.exeC:\Windows\system32\b55d.exe -i2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2852
-
-
C:\Windows\SysWOW64\b55d.exeC:\Windows\system32\b55d.exe -s2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2636
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32 C:\Windows\system32\46be.dll, Always2⤵
- Loads dropped DLL
PID:1048
-
-
C:\Windows\SysWOW64\b55d.exeC:\Windows\SysWOW64\b55d.exe1⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32 C:\Windows\system32\46be.dll,Always2⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
PID:1484
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD540b5629e4fcc3dba8e0363f132f8cd47
SHA16495d3ab0ffd901a876362258c1ae30a043ec05e
SHA2560910b095d7ad49fcd161411e0f15ad89129ed75177be8c097d51a477c3c6e12a
SHA51238cbf73f88e7153a0cd2f9e54331548d65b90404f1a43672e9099d982e07ec6e9c2280ca4b49257f903d496587f12a9c020a7987b645a427f0a9082a13907df6
-
Filesize
93KB
MD546d6032ea50d9a571332da56c0af5348
SHA125dbf270aa07b9ff7d5b1cec72c813b401ecbc1f
SHA2569c280248baa9512fbf4bc44e8aa1b7dc69306349fa93e552ecdc4964ef1a1691
SHA5123994c9380673704c2dd30639582a3edbc05e0fa302e5493251d0503c2d13d2490f9b0d3c9c94702a26274744033ff8647026d669e13d48d20ae6360281887e5e
-
Filesize
215KB
MD594a1bda50441ef499e681b84ab7f6078
SHA14db1d26d8de273e5b2b635429c9b8ddbecc796a3
SHA25651f588eec6e24f6c22b6e3d2f6c9f465ff72772bede9e312efc9055ad5daabf9
SHA512891c200cfe604a35e2adc96230595a3248994f825ac008af8f40a4e1ca09a9f8e422936f3d3004f58ec1ed2a76e22463b015e29557e6002d793532cc6021f4ae