Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11-07-2024 14:07
Behavioral task
behavioral1
Sample
3971a17dfe31449440d7f974e353fc55_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3971a17dfe31449440d7f974e353fc55_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3971a17dfe31449440d7f974e353fc55_JaffaCakes118.exe
-
Size
3.5MB
-
MD5
3971a17dfe31449440d7f974e353fc55
-
SHA1
3b471ff12b6bf746624ff47169b2e63481f22be7
-
SHA256
e184ddb99ea689aa34f6374c51b77e5bed16ef0ddf558e5ea0ff46b439fbf6cd
-
SHA512
f0dc3b56346a9608999f7c4daa949861eb7c9a104d4fcf2a33ded5320e239c86679b5d4435f13500bfdbb3de4d06c7ed91d49bd21d966bf88d1fa914107bbe79
-
SSDEEP
98304:BPsll0cd2I2kgozrQG1pGpl6u+dY1hfhRGeJTk:BPsbdCgz5zol63dyhO2Tk
Malware Config
Signatures
-
Detected Nirsoft tools 4 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral1/memory/2192-337-0x0000000000400000-0x0000000000414000-memory.dmp Nirsoft behavioral1/memory/588-354-0x0000000000400000-0x0000000000414000-memory.dmp Nirsoft behavioral1/memory/2988-382-0x0000000000400000-0x0000000000414000-memory.dmp Nirsoft behavioral1/memory/2624-397-0x0000000000400000-0x0000000000414000-memory.dmp Nirsoft -
Disables RegEdit via registry modification 4 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "0" InfDefaultInstall.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\disableregistrytools = "0" PEV.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\disableregistrytools = "0" PEV.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\disableregistrytools = "0" pev.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmd.exe PEV.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe PEV.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\grep.cfxxe PEV.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\chcp.com PEV.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\hidec.exe PEV.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\catchme.cfxxe pev.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\NIRCMD.COM pev.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\gsar.cfxxe PEV.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\LISTDLLS.CFXXE PEV.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RSTRUI.EXE PEV.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\GREP.CFXXE PEV.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmd.exe pev.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MTEE.CFXXE PEV.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\swsc.exe pev.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\extract.cfxxe PEV.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\swxcacls.cfxxe PEV.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\CSCRIPT.EXE PEV.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\GSAR.CFXXE PEV.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmd.exe PEV.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\CATCHME.CFXXE PEV.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SWSC.CFXXE PEV.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\swreg.exe PEV.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\COMBOFIX.EXE PEV.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\REGT.CFXXE PEV.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\EXTRACT.CFXXE PEV.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe PEV.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\setpath.cfxxe PEV.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PSEXEC.CFXXE pev.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\GREP.CFXXE PEV.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SWSC.EXE PEV.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Nircmd.com PEV.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ERUNT.CFXXE PEV.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\erdnt.exe pev.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\swxcacls.cfxxe pev.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\erunt.cfxxe PEV.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\CMD.CFXXE PEV.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\NIRCMD.CFXXE PEV.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmd.cfxxe pev.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\COMBOFIX.EXE pev.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\swsc.exe PEV.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\LISTDLLS.CFXXE PEV.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MTEE.CFXXE PEV.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WSCRIPT.EXE PEV.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regt.cfxxe pev.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\CATCHME.CFXXE pev.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\xcopy.exe PEV.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ZIP.CFXXE PEV.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\CHCP.COM PEV.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dumphive.cfxxe PEV.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ATTRIB.EXE PEV.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe pev.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TASKMGR.EXE pev.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WSCRIPT.EXE pev.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe PEV.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\FIND.EXE PEV.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SWSC.EXE PEV.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\CTFMON.EXE PEV.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\swsc.cfxxe PEV.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HANDLE.CFXXE PEV.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\restartit.cfxxe PEV.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\COMBO-FIX.EXE PEV.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SWREG.EXE PEV.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\extract.cfxxe PEV.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SWREG.CFXXE PEV.exe -
Executes dropped EXE 56 IoCs
pid Process 2192 iexplore.exe 1180 iexplore.exe 588 iexplore.exe 888 hidec.exe 1552 iexplore.exe 2912 pev.exe 2988 n.pif 2624 n.pif 3056 PEV.exe 2140 hidec.exe 1476 hidec.exe 1656 PEV.exe 1392 hidec.exe 1976 hidec.exe 1916 hidec.exe 1056 SWXCACLS.cfxxe 1660 swreg.exe 2360 swreg.exe 748 n.pif 548 swreg.exe 3028 SWREG.exe 440 hidec.exe 2940 SWREG.exe 2788 n.pif 324 SWREG.exe 2892 hidec.exe 1668 SWREG.exe 1720 n.pif 1764 n.pif 1864 nircmd.cfxxe 1684 swreg.exe 2088 n.pif 1836 GSAR.cfxxe 3036 nircmd.cfxxe 2968 GSAR.cfxxe 2920 n.pif 3024 nircmd.cfxxe 2988 cmd.cfxxe 2160 pev.exe 2096 grep.cfxxe 348 grep.cfxxe 2708 grep.cfxxe 2816 swreg.exe 2604 grep.cfxxe 2672 swreg.exe 2764 NirCmd.cfxxe 3004 swreg.exe 3012 grep.cfxxe 864 pev.exe 2044 grep.cfxxe 1224 SWREG.cfxxe 1476 SWREG.cfxxe 1060 NirCmd.cfxxe 1480 n.pif 1620 cmd.cfxxe 1452 cmd.cfxxe -
Impair Defenses: Safe Mode Boot 1 TTPs 12 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\PEVSystemStart PEV.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\procexp90.Sys PEV.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\procexp90.Sys\ = "Driver" PEV.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\PEVSystemStart PEV.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\PEVSystemStart\ = "Service" PEV.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\procexp90.Sys pev.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\procexp90.Sys\ = "Driver" pev.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\procexp90.Sys PEV.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\PEVSystemStart\ = "Service" PEV.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\PEVSystemStart pev.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\PEVSystemStart\ = "Service" pev.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\procexp90.Sys\ = "Driver" PEV.exe -
Loads dropped DLL 50 IoCs
pid Process 2560 3971a17dfe31449440d7f974e353fc55_JaffaCakes118.exe 2560 3971a17dfe31449440d7f974e353fc55_JaffaCakes118.exe 2560 3971a17dfe31449440d7f974e353fc55_JaffaCakes118.exe 2560 3971a17dfe31449440d7f974e353fc55_JaffaCakes118.exe 2560 3971a17dfe31449440d7f974e353fc55_JaffaCakes118.exe 2560 3971a17dfe31449440d7f974e353fc55_JaffaCakes118.exe 2560 3971a17dfe31449440d7f974e353fc55_JaffaCakes118.exe 2560 3971a17dfe31449440d7f974e353fc55_JaffaCakes118.exe 1180 iexplore.exe 888 hidec.exe 2560 3971a17dfe31449440d7f974e353fc55_JaffaCakes118.exe 2560 3971a17dfe31449440d7f974e353fc55_JaffaCakes118.exe 2560 3971a17dfe31449440d7f974e353fc55_JaffaCakes118.exe 2560 3971a17dfe31449440d7f974e353fc55_JaffaCakes118.exe 2560 3971a17dfe31449440d7f974e353fc55_JaffaCakes118.exe 2560 3971a17dfe31449440d7f974e353fc55_JaffaCakes118.exe 2560 3971a17dfe31449440d7f974e353fc55_JaffaCakes118.exe 2560 3971a17dfe31449440d7f974e353fc55_JaffaCakes118.exe 1392 hidec.exe 1476 hidec.exe 2560 3971a17dfe31449440d7f974e353fc55_JaffaCakes118.exe 1916 hidec.exe 1976 hidec.exe 1916 hidec.exe 2560 3971a17dfe31449440d7f974e353fc55_JaffaCakes118.exe 2560 3971a17dfe31449440d7f974e353fc55_JaffaCakes118.exe 2560 3971a17dfe31449440d7f974e353fc55_JaffaCakes118.exe 2560 3971a17dfe31449440d7f974e353fc55_JaffaCakes118.exe 2560 3971a17dfe31449440d7f974e353fc55_JaffaCakes118.exe 2560 3971a17dfe31449440d7f974e353fc55_JaffaCakes118.exe 2560 3971a17dfe31449440d7f974e353fc55_JaffaCakes118.exe 2560 3971a17dfe31449440d7f974e353fc55_JaffaCakes118.exe 2088 n.pif 2088 n.pif 2560 3971a17dfe31449440d7f974e353fc55_JaffaCakes118.exe 3036 nircmd.cfxxe 2560 3971a17dfe31449440d7f974e353fc55_JaffaCakes118.exe 2560 3971a17dfe31449440d7f974e353fc55_JaffaCakes118.exe 2920 n.pif 2988 cmd.cfxxe 2988 cmd.cfxxe 2988 cmd.cfxxe 2988 cmd.cfxxe 2988 cmd.cfxxe 2988 cmd.cfxxe 2988 cmd.cfxxe 2988 cmd.cfxxe 2988 cmd.cfxxe 2988 cmd.cfxxe 2560 3971a17dfe31449440d7f974e353fc55_JaffaCakes118.exe -
Modifies system executable filetype association 2 TTPs 32 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"%1\" %*" InfDefaultInstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"%1\" %*" PEV.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command PEV.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"%1\" %*" PEV.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" PEV.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command PEV.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" InfDefaultInstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"%1\" %*" InfDefaultInstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command PEV.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"%1\" %*" PEV.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command pev.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"%1\" %*" pev.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command pev.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command InfDefaultInstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command InfDefaultInstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command InfDefaultInstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"%1\" %*" InfDefaultInstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" PEV.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"%1\" %*" PEV.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command PEV.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" pev.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"%1\" %*" pev.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command PEV.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command PEV.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"%1\" %*" PEV.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command PEV.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command InfDefaultInstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command PEV.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"%1\" %*" PEV.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command pev.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command pev.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"%1\" %*" pev.exe -
resource yara_rule behavioral1/memory/2560-0-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral1/files/0x000500000001c8d4-271.dat upx behavioral1/memory/2560-338-0x0000000003410000-0x0000000003424000-memory.dmp upx behavioral1/memory/2192-337-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/588-346-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/2192-332-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/588-354-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/2988-382-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/2560-391-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral1/memory/2624-397-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/files/0x000500000001a4a5-455.dat upx behavioral1/memory/1660-458-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral1/memory/548-470-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral1/memory/2360-467-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral1/memory/1660-471-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral1/memory/3028-472-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral1/memory/324-490-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral1/memory/2940-491-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral1/memory/1668-506-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral1/memory/2560-513-0x0000000003610000-0x0000000003624000-memory.dmp upx behavioral1/memory/2560-521-0x0000000003760000-0x0000000003774000-memory.dmp upx behavioral1/memory/1684-526-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral1/memory/1684-528-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral1/memory/2088-534-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/2920-548-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/2816-561-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral1/memory/2816-562-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral1/memory/2672-567-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral1/memory/3004-574-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral1/memory/2560-588-0x0000000003610000-0x0000000003624000-memory.dmp upx behavioral1/memory/1224-590-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral1/memory/1224-591-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral1/memory/1476-594-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral1/memory/1476-595-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral1/memory/2560-596-0x0000000003760000-0x0000000003774000-memory.dmp upx behavioral1/memory/2560-603-0x0000000000400000-0x0000000000428000-memory.dmp upx -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\ InfDefaultInstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\GrpConv = "grpconv -o" InfDefaultInstall.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RUNONCEEX PEV.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RUNONCEEX PEV.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RUNONCEEX pev.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\INF\setupapi.app.log InfDefaultInstall.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 runonce.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz runonce.exe -
Modifies data under HKEY_USERS 6 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Command Processor PEV.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Command Processor\EnableExtensions = "1" PEV.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Command Processor PEV.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Command Processor\EnableExtensions = "1" PEV.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Command Processor pev.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Command Processor\EnableExtensions = "1" pev.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command InfDefaultInstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"%1\" %*" PEV.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\PersistentHandler PEV.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\cfxxefile\shell\open\command InfDefaultInstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.com InfDefaultInstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\cfxxefile\shell\open\command\ = "\"%1\" %*" PEV.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command PEV.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.exe PEV.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\PersistentHandler pev.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cfxxe pev.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"%1\" %*" InfDefaultInstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"%1\" %*" InfDefaultInstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.exe PEV.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command PEV.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\PersistentHandler\ = "{5e941d80-bf96-11cd-b579-08002b30bfeb}" PEV.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.com\ = "comfile" pev.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command InfDefaultInstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.pif\ = "piffile" PEV.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.exe\ = "exefile" PEV.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "batfile" pev.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\cmdfile\shell\open\command pev.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cfexe pev.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.com\ = "comfile" PEV.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\cmdfile\shell\open\command PEV.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "VBSFile" PEV.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\PersistentHandler\ = "{5e941d80-bf96-11cd-b579-08002b30bfeb}" pev.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.com\ = "comfile" InfDefaultInstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\cfxxefile\shell\open\command PEV.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\cmdfile\shell\open\command\ = "\"%1\" %*" PEV.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command PEV.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"%1\" %*" pev.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\cfxxefile\shell\open InfDefaultInstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\cfxxefile\shell\open\command\ = "\"%1\" %*" InfDefaultInstall.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\.cfexe PEV.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\cfxxefile\shell\open\command\ = "\"%1\" %*" PEV.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command PEV.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\PersistentHandler\ = "{5e941d80-bf96-11cd-b579-08002b30bfeb}" PEV.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command pev.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "batfile" PEV.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\cfxxefile\shell\open\command PEV.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\cmdfile\shell\open\command PEV.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.exe pev.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "cmdfile" pev.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\PersistentHandler PEV.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "cmdfile" PEV.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.pif PEV.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\cfexefile pev.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "cmdfile" PEV.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs PEV.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.com pev.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"%1\" %*" pev.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs pev.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"%1\" %*" PEV.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cfxxe PEV.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\cfexefile pev.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\cfxxefile InfDefaultInstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\cmdfile\shell\open\command InfDefaultInstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.pif\ = "piffile" InfDefaultInstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command PEV.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\.cfexe PEV.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.com PEV.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command PEV.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "VBSFile" PEV.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\cfexefile PEV.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 864 pev.exe 864 pev.exe 864 pev.exe 864 pev.exe 864 pev.exe 864 pev.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 2180 InfDefaultInstall.exe Token: SeRestorePrivilege 2180 InfDefaultInstall.exe Token: SeRestorePrivilege 2180 InfDefaultInstall.exe Token: SeRestorePrivilege 2180 InfDefaultInstall.exe Token: SeRestorePrivilege 2180 InfDefaultInstall.exe Token: SeRestorePrivilege 2180 InfDefaultInstall.exe Token: SeRestorePrivilege 2180 InfDefaultInstall.exe Token: SeSecurityPrivilege 2360 swreg.exe Token: SeTakeOwnershipPrivilege 548 swreg.exe Token: SeRestorePrivilege 548 swreg.exe Token: SeSecurityPrivilege 1056 SWXCACLS.cfxxe Token: SeTakeOwnershipPrivilege 1660 swreg.exe Token: SeRestorePrivilege 1660 swreg.exe Token: SeSecurityPrivilege 1660 swreg.exe Token: SeTakeOwnershipPrivilege 1660 swreg.exe Token: SeRestorePrivilege 1660 swreg.exe Token: SeSecurityPrivilege 1660 swreg.exe Token: SeTakeOwnershipPrivilege 1660 swreg.exe Token: SeRestorePrivilege 1660 swreg.exe Token: SeSecurityPrivilege 1660 swreg.exe Token: SeTakeOwnershipPrivilege 1660 swreg.exe Token: SeRestorePrivilege 1660 swreg.exe Token: SeSecurityPrivilege 1660 swreg.exe Token: SeTakeOwnershipPrivilege 1660 swreg.exe Token: SeRestorePrivilege 1660 swreg.exe Token: SeSecurityPrivilege 1660 swreg.exe Token: SeTakeOwnershipPrivilege 1660 swreg.exe Token: SeRestorePrivilege 1660 swreg.exe Token: SeSecurityPrivilege 548 swreg.exe Token: SeSecurityPrivilege 1660 swreg.exe Token: SeTakeOwnershipPrivilege 1660 swreg.exe Token: SeRestorePrivilege 1660 swreg.exe Token: SeSecurityPrivilege 1660 swreg.exe Token: SeTakeOwnershipPrivilege 1660 swreg.exe Token: SeRestorePrivilege 1660 swreg.exe Token: SeSecurityPrivilege 1660 swreg.exe Token: SeTakeOwnershipPrivilege 1660 swreg.exe Token: SeRestorePrivilege 1660 swreg.exe Token: SeSecurityPrivilege 1660 swreg.exe Token: SeTakeOwnershipPrivilege 1660 swreg.exe Token: SeRestorePrivilege 1660 swreg.exe Token: SeSecurityPrivilege 1660 swreg.exe Token: SeTakeOwnershipPrivilege 1660 swreg.exe Token: SeRestorePrivilege 1660 swreg.exe Token: SeSecurityPrivilege 1660 swreg.exe Token: SeTakeOwnershipPrivilege 1660 swreg.exe Token: SeRestorePrivilege 1660 swreg.exe Token: SeSecurityPrivilege 1660 swreg.exe Token: SeTakeOwnershipPrivilege 1660 swreg.exe Token: SeRestorePrivilege 1660 swreg.exe Token: SeSecurityPrivilege 1660 swreg.exe Token: SeTakeOwnershipPrivilege 1660 swreg.exe Token: SeRestorePrivilege 1660 swreg.exe Token: SeSecurityPrivilege 1660 swreg.exe Token: SeTakeOwnershipPrivilege 1660 swreg.exe Token: SeRestorePrivilege 1660 swreg.exe Token: SeSecurityPrivilege 1660 swreg.exe Token: SeTakeOwnershipPrivilege 1660 swreg.exe Token: SeRestorePrivilege 1660 swreg.exe Token: SeSecurityPrivilege 1660 swreg.exe Token: SeTakeOwnershipPrivilege 1660 swreg.exe Token: SeRestorePrivilege 1660 swreg.exe Token: SeSecurityPrivilege 1660 swreg.exe Token: SeTakeOwnershipPrivilege 1660 swreg.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2560 wrote to memory of 2192 2560 3971a17dfe31449440d7f974e353fc55_JaffaCakes118.exe 30 PID 2560 wrote to memory of 2192 2560 3971a17dfe31449440d7f974e353fc55_JaffaCakes118.exe 30 PID 2560 wrote to memory of 2192 2560 3971a17dfe31449440d7f974e353fc55_JaffaCakes118.exe 30 PID 2560 wrote to memory of 2192 2560 3971a17dfe31449440d7f974e353fc55_JaffaCakes118.exe 30 PID 2560 wrote to memory of 588 2560 3971a17dfe31449440d7f974e353fc55_JaffaCakes118.exe 31 PID 2560 wrote to memory of 588 2560 3971a17dfe31449440d7f974e353fc55_JaffaCakes118.exe 31 PID 2560 wrote to memory of 588 2560 3971a17dfe31449440d7f974e353fc55_JaffaCakes118.exe 31 PID 2560 wrote to memory of 588 2560 3971a17dfe31449440d7f974e353fc55_JaffaCakes118.exe 31 PID 2560 wrote to memory of 1180 2560 3971a17dfe31449440d7f974e353fc55_JaffaCakes118.exe 32 PID 2560 wrote to memory of 1180 2560 3971a17dfe31449440d7f974e353fc55_JaffaCakes118.exe 32 PID 2560 wrote to memory of 1180 2560 3971a17dfe31449440d7f974e353fc55_JaffaCakes118.exe 32 PID 2560 wrote to memory of 1180 2560 3971a17dfe31449440d7f974e353fc55_JaffaCakes118.exe 32 PID 2560 wrote to memory of 888 2560 3971a17dfe31449440d7f974e353fc55_JaffaCakes118.exe 33 PID 2560 wrote to memory of 888 2560 3971a17dfe31449440d7f974e353fc55_JaffaCakes118.exe 33 PID 2560 wrote to memory of 888 2560 3971a17dfe31449440d7f974e353fc55_JaffaCakes118.exe 33 PID 2560 wrote to memory of 888 2560 3971a17dfe31449440d7f974e353fc55_JaffaCakes118.exe 33 PID 1180 wrote to memory of 1552 1180 iexplore.exe 34 PID 1180 wrote to memory of 1552 1180 iexplore.exe 34 PID 1180 wrote to memory of 1552 1180 iexplore.exe 34 PID 1180 wrote to memory of 1552 1180 iexplore.exe 34 PID 888 wrote to memory of 2912 888 hidec.exe 36 PID 888 wrote to memory of 2912 888 hidec.exe 36 PID 888 wrote to memory of 2912 888 hidec.exe 36 PID 888 wrote to memory of 2912 888 hidec.exe 36 PID 2560 wrote to memory of 2988 2560 3971a17dfe31449440d7f974e353fc55_JaffaCakes118.exe 38 PID 2560 wrote to memory of 2988 2560 3971a17dfe31449440d7f974e353fc55_JaffaCakes118.exe 38 PID 2560 wrote to memory of 2988 2560 3971a17dfe31449440d7f974e353fc55_JaffaCakes118.exe 38 PID 2560 wrote to memory of 2988 2560 3971a17dfe31449440d7f974e353fc55_JaffaCakes118.exe 38 PID 2988 wrote to memory of 2180 2988 n.pif 39 PID 2988 wrote to memory of 2180 2988 n.pif 39 PID 2988 wrote to memory of 2180 2988 n.pif 39 PID 2988 wrote to memory of 2180 2988 n.pif 39 PID 2988 wrote to memory of 2180 2988 n.pif 39 PID 2988 wrote to memory of 2180 2988 n.pif 39 PID 2988 wrote to memory of 2180 2988 n.pif 39 PID 2180 wrote to memory of 2228 2180 InfDefaultInstall.exe 40 PID 2180 wrote to memory of 2228 2180 InfDefaultInstall.exe 40 PID 2180 wrote to memory of 2228 2180 InfDefaultInstall.exe 40 PID 2180 wrote to memory of 2228 2180 InfDefaultInstall.exe 40 PID 2228 wrote to memory of 2728 2228 runonce.exe 41 PID 2228 wrote to memory of 2728 2228 runonce.exe 41 PID 2228 wrote to memory of 2728 2228 runonce.exe 41 PID 2228 wrote to memory of 2728 2228 runonce.exe 41 PID 2560 wrote to memory of 2624 2560 3971a17dfe31449440d7f974e353fc55_JaffaCakes118.exe 43 PID 2560 wrote to memory of 2624 2560 3971a17dfe31449440d7f974e353fc55_JaffaCakes118.exe 43 PID 2560 wrote to memory of 2624 2560 3971a17dfe31449440d7f974e353fc55_JaffaCakes118.exe 43 PID 2560 wrote to memory of 2624 2560 3971a17dfe31449440d7f974e353fc55_JaffaCakes118.exe 43 PID 2624 wrote to memory of 3056 2624 n.pif 44 PID 2624 wrote to memory of 3056 2624 n.pif 44 PID 2624 wrote to memory of 3056 2624 n.pif 44 PID 2624 wrote to memory of 3056 2624 n.pif 44 PID 2560 wrote to memory of 2140 2560 3971a17dfe31449440d7f974e353fc55_JaffaCakes118.exe 46 PID 2560 wrote to memory of 2140 2560 3971a17dfe31449440d7f974e353fc55_JaffaCakes118.exe 46 PID 2560 wrote to memory of 2140 2560 3971a17dfe31449440d7f974e353fc55_JaffaCakes118.exe 46 PID 2560 wrote to memory of 2140 2560 3971a17dfe31449440d7f974e353fc55_JaffaCakes118.exe 46 PID 2560 wrote to memory of 1476 2560 3971a17dfe31449440d7f974e353fc55_JaffaCakes118.exe 47 PID 2560 wrote to memory of 1476 2560 3971a17dfe31449440d7f974e353fc55_JaffaCakes118.exe 47 PID 2560 wrote to memory of 1476 2560 3971a17dfe31449440d7f974e353fc55_JaffaCakes118.exe 47 PID 2560 wrote to memory of 1476 2560 3971a17dfe31449440d7f974e353fc55_JaffaCakes118.exe 47 PID 2140 wrote to memory of 1656 2140 hidec.exe 48 PID 2140 wrote to memory of 1656 2140 hidec.exe 48 PID 2140 wrote to memory of 1656 2140 hidec.exe 48 PID 2140 wrote to memory of 1656 2140 hidec.exe 48 PID 2560 wrote to memory of 1392 2560 3971a17dfe31449440d7f974e353fc55_JaffaCakes118.exe 49 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer PEV.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer PEV.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer pev.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3971a17dfe31449440d7f974e353fc55_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3971a17dfe31449440d7f974e353fc55_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\32788R22FWJFW\iexplore.exe"C:\32788R22FWJFW\iexplore.exe" win close ititle " Security"2⤵
- Executes dropped EXE
PID:2192
-
-
C:\32788R22FWJFW\iexplore.exe"C:\32788R22FWJFW\iexplore.exe" win close ititle "SysInternals"2⤵
- Executes dropped EXE
PID:588
-
-
C:\32788R22FWJFW\iexplore.exe"C:\32788R22FWJFW\iexplore.exe" exec hide 32788R22FWJFW\License\iexplore.exe -k and { *sysguard.exe or ???*tssd.exe or a-fast.exe or -preg"\\[\da-f]*\d[\da-f]*\\*.exe" }2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\32788R22FWJFW\License\iexplore.exe32788R22FWJFW\License\iexplore.exe -k and { *sysguard.exe or ???*tssd.exe or a-fast.exe or -preg"\\[\da-f]*\d[\da-f]*\\*.exe" }3⤵
- Executes dropped EXE
PID:1552
-
-
-
C:\32788R22FWJFW\hidec.exe"C:\32788R22FWJFW\hidec.exe" 32788R22FWJFW\pev.exe -k * and { *Antivirus*Pro.exe or a-fast.exe or digprot.exe or *Police*Pro.exe or svch[!o]st.exe or sv[!c]host.exe or winupdate.exe or or ANTI_files.exe or dbsinit.exe or ?.exe or desot.exe or desote.exe or *sysguard.exe or aap.exe or pump.exe os svcst.exe or seres.exe or *spyware.exe or new.exe or ave.exe or -preg"\d{3,}.exe" }2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:888 -
C:\32788R22FWJFW\pev.exe32788R22FWJFW\pev.exe -k * and { *Antivirus*Pro.exe or a-fast.exe or digprot.exe or *Police*Pro.exe or svch[!o]st.exe or sv[!c]host.exe or winupdate.exe or or ANTI_files.exe or dbsinit.exe or ?.exe or desot.exe or desote.exe or *sysguard.exe or aap.exe or pump.exe os svcst.exe or seres.exe or *spyware.exe or new.exe or ave.exe or -preg"\d{3,}.exe" }3⤵
- Executes dropped EXE
PID:2912
-
-
-
C:\32788R22FWJFW\n.pif"C:\32788R22FWJFW\n.pif" shexec install 32788R22FWJFW\Prep.inf2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\InfDefaultInstall.exe"C:\Windows\System32\InfDefaultInstall.exe" "C:\32788R22FWJFW\Prep.inf"3⤵
- Disables RegEdit via registry modification
- Modifies system executable filetype association
- Adds Run key to start application
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\runonce.exe"C:\Windows\system32\runonce.exe" -r4⤵
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\SysWOW64\grpconv.exe"C:\Windows\System32\grpconv.exe" -o5⤵PID:2728
-
-
-
-
-
C:\32788R22FWJFW\n.pif"C:\32788R22FWJFW\n.pif" exec hide 32788R22FWJFW\PEV.exe RIMPORT 32788R22FWJFW\EXE.reg2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\32788R22FWJFW\PEV.exe32788R22FWJFW\PEV.exe RIMPORT 32788R22FWJFW\EXE.reg3⤵
- Disables RegEdit via registry modification
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Impair Defenses: Safe Mode Boot
- Modifies system executable filetype association
- Adds Run key to start application
- Modifies data under HKEY_USERS
- Modifies registry class
- System policy modification
PID:3056
-
-
-
C:\32788R22FWJFW\hidec.exe"C:\32788R22FWJFW\hidec.exe" 32788R22FWJFW\PEV.exe RIMPORT 32788R22FWJFW\EXE.reg2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\32788R22FWJFW\PEV.exe32788R22FWJFW\PEV.exe RIMPORT 32788R22FWJFW\EXE.reg3⤵
- Disables RegEdit via registry modification
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Impair Defenses: Safe Mode Boot
- Modifies system executable filetype association
- Adds Run key to start application
- Modifies data under HKEY_USERS
- Modifies registry class
- System policy modification
PID:1656
-
-
-
C:\32788R22FWJFW\hidec.exe"C:\32788R22FWJFW\hidec.exe" 32788R22FWJFW\swreg.exe acl "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Drivers32" /da:r /q2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1476 -
C:\32788R22FWJFW\swreg.exe32788R22FWJFW\swreg.exe acl "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Drivers32" /da:r /q3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2360
-
-
-
C:\32788R22FWJFW\hidec.exe"C:\32788R22FWJFW\hidec.exe" 32788R22FWJFW\swreg.exe acl "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options" /reset /q2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1392 -
C:\32788R22FWJFW\swreg.exe32788R22FWJFW\swreg.exe acl "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options" /reset /q3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1660
-
-
-
C:\32788R22FWJFW\hidec.exe"C:\32788R22FWJFW\hidec.exe" 32788R22FWJFW\swreg.exe acl "HKLM\SOFTWARE\Microsoft\Command Processor" /reset /q2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1976 -
C:\32788R22FWJFW\swreg.exe32788R22FWJFW\swreg.exe acl "HKLM\SOFTWARE\Microsoft\Command Processor" /reset /q3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:548
-
-
-
C:\32788R22FWJFW\hidec.exe"C:\32788R22FWJFW\hidec.exe" 32788R22FWJFW\SWXCACLS.cfxxe "C:\Windows\system32\cmd.exe" /P /GA:F /GS:F /GU:X /GP:X /I ENABLE /Q2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1916 -
C:\32788R22FWJFW\SWXCACLS.cfxxe32788R22FWJFW\SWXCACLS.cfxxe "C:\Windows\system32\cmd.exe" /P /GA:F /GS:F /GU:X /GP:X /I ENABLE /Q3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1056
-
-
-
C:\32788R22FWJFW\n.pif"C:\32788R22FWJFW\n.pif" exec hide 32788R22FWJFW\SWREG.exe acl "hklm\software\microsoft\windows nt\currentversion\windows" /O Guest /Q2⤵
- Executes dropped EXE
PID:748 -
C:\32788R22FWJFW\SWREG.exe32788R22FWJFW\SWREG.exe acl "hklm\software\microsoft\windows nt\currentversion\windows" /O Guest /Q3⤵
- Executes dropped EXE
PID:3028
-
-
-
C:\32788R22FWJFW\hidec.exe"C:\32788R22FWJFW\hidec.exe" 32788R22FWJFW\SWREG.exe acl "hklm\software\microsoft\windows nt\currentversion\windows" /O Guest /Q2⤵
- Executes dropped EXE
PID:440 -
C:\32788R22FWJFW\SWREG.exe32788R22FWJFW\SWREG.exe acl "hklm\software\microsoft\windows nt\currentversion\windows" /O Guest /Q3⤵
- Executes dropped EXE
PID:2940
-
-
-
C:\32788R22FWJFW\n.pif"C:\32788R22FWJFW\n.pif" cmdwait 150 exec hide 32788R22FWJFW\SWREG.exe acl "hklm\software\microsoft\windows nt\currentversion\windows" /DE:F /Q2⤵
- Executes dropped EXE
PID:2788 -
C:\32788R22FWJFW\SWREG.exe32788R22FWJFW\SWREG.exe acl "hklm\software\microsoft\windows nt\currentversion\windows" /DE:F /Q3⤵
- Executes dropped EXE
PID:324
-
-
-
C:\32788R22FWJFW\hidec.exe"C:\32788R22FWJFW\hidec.exe" 32788R22FWJFW\SWREG.exe acl "hklm\software\microsoft\windows nt\currentversion\windows" /DE:F /Q2⤵
- Executes dropped EXE
PID:2892 -
C:\32788R22FWJFW\SWREG.exe32788R22FWJFW\SWREG.exe acl "hklm\software\microsoft\windows nt\currentversion\windows" /DE:F /Q3⤵
- Executes dropped EXE
PID:1668
-
-
-
C:\32788R22FWJFW\n.pif"C:\32788R22FWJFW\n.pif" cmdwait 3000 exec hide 32788R22FWJFW\swreg.exe acl "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Drivers32" /reset /q2⤵
- Executes dropped EXE
PID:1720 -
C:\32788R22FWJFW\swreg.exe32788R22FWJFW\swreg.exe acl "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Drivers32" /reset /q3⤵
- Executes dropped EXE
PID:1684
-
-
-
C:\32788R22FWJFW\n.pif"C:\32788R22FWJFW\n.pif" shellcopy C:\Windows\system32\en-us\cmd.exe.mui 32788R22FWJFW\EN-US\cmd.cfxxe.mui yestoall noerrorui silent nosecattr2⤵
- Executes dropped EXE
PID:1764
-
-
C:\32788R22FWJFW\nircmd.cfxxe"C:\32788R22FWJFW\nircmd.cfxxe" shellcopy C:\Windows\system32\en-us\cmd.exe.mui 32788R22FWJFW\EN-US\cmd.cfxxe.mui yestoall noerrorui silent nosecattr2⤵
- Executes dropped EXE
PID:1864
-
-
C:\32788R22FWJFW\n.pif"C:\32788R22FWJFW\n.pif" exec hide 32788R22FWJFW\GSAR.cfxxe -if -s\:000M:000i:000c:000r:000o -r\:001M:000i:000c:000r:000o "C:\Windows\system32\cmd.exe" "32788R22FWJFW\cmd.cfxxe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2088 -
C:\32788R22FWJFW\GSAR.cfxxe32788R22FWJFW\GSAR.cfxxe -if -s\:000M:000i:000c:000r:000o -r\:001M:000i:000c:000r:000o "C:\Windows\system32\cmd.exe" "32788R22FWJFW\cmd.cfxxe"3⤵
- Executes dropped EXE
PID:1836
-
-
-
C:\32788R22FWJFW\nircmd.cfxxe"C:\32788R22FWJFW\nircmd.cfxxe" exec hide 32788R22FWJFW\GSAR.cfxxe -if -s\:000M:000i:000c:000r:000o -r\:001M:000i:000c:000r:000o "C:\Windows\system32\cmd.exe" "32788R22FWJFW\cmd.cfxxe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3036 -
C:\32788R22FWJFW\GSAR.cfxxe32788R22FWJFW\GSAR.cfxxe -if -s\:000M:000i:000c:000r:000o -r\:001M:000i:000c:000r:000o "C:\Windows\system32\cmd.exe" "32788R22FWJFW\cmd.cfxxe"3⤵
- Executes dropped EXE
PID:2968
-
-
-
C:\32788R22FWJFW\n.pif"C:\32788R22FWJFW\n.pif" cmdwait 1000 exec hide "32788R22FWJFW\cmd.cfxxe" /c 32788R22FWJFW\p.cmd2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2920 -
C:\32788R22FWJFW\cmd.cfxxe"32788R22FWJFW\cmd.cfxxe" /c 32788R22FWJFW\p.cmd3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2988 -
C:\32788R22FWJFW\pev.exe32788R22FWJFW\PEV.exe RIMPORT 32788R22FWJFW\EXE.reg4⤵
- Disables RegEdit via registry modification
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Impair Defenses: Safe Mode Boot
- Modifies system executable filetype association
- Adds Run key to start application
- Modifies data under HKEY_USERS
- Modifies registry class
- System policy modification
PID:2160
-
-
C:\32788R22FWJFW\grep.cfxxeGREP.cfxxe -F "5.1.2" OsVer4⤵
- Executes dropped EXE
PID:2096
-
-
C:\32788R22FWJFW\grep.cfxxeGREP.cfxxe -F "6.0.6" OsVer4⤵
- Executes dropped EXE
PID:348
-
-
C:\32788R22FWJFW\grep.cfxxeGREP.cfxxe -F "6.1.7600" OsVer4⤵
- Executes dropped EXE
PID:2708
-
-
C:\32788R22FWJFW\swreg.exeSWREG.exe QUERY "hklm\software\microsoft\windows nt\currentversion" /v currentversion4⤵
- Executes dropped EXE
PID:2816
-
-
C:\32788R22FWJFW\grep.cfxxeGREP.cfxxe -is "currentversion.* 6.[01]" OsVer004⤵
- Executes dropped EXE
PID:2604
-
-
C:\32788R22FWJFW\swreg.exeSWREG.exe QUERY "HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_{79007602-0CDB-4405-9DBF-1257BB3226ED}\0000\Control" /v ActiveService4⤵
- Executes dropped EXE
PID:2672
-
-
C:\32788R22FWJFW\NirCmd.cfxxeNIRCMD.cfxxe WIN CLOSE CLASS "#32770"4⤵
- Executes dropped EXE
PID:2764
-
-
C:\32788R22FWJFW\swreg.exeSWREG QUERY "HKLM\System\Currentcontrolset\Control\ProductOptions" /v ProductType4⤵
- Executes dropped EXE
PID:3004
-
-
C:\32788R22FWJFW\grep.cfxxeGREP.cfxxe -isq "ProductType.*WinNT" WinNT004⤵
- Executes dropped EXE
PID:3012
-
-
C:\32788R22FWJFW\pev.exePEV PLIST4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:864
-
-
C:\32788R22FWJFW\grep.cfxxeGREP -Fis "C:\Windows\system32\csrss.exe"4⤵
- Executes dropped EXE
PID:2044
-
-
C:\32788R22FWJFW\SWREG.cfxxeSWREG ACL "HKLM\Software\Microsoft\Windows NT\CurrentVersion\Windows" /RESET /Q4⤵
- Executes dropped EXE
PID:1224
-
-
C:\32788R22FWJFW\SWREG.cfxxeSWREG ACL "HKLM\Software\Microsoft\Windows NT\CurrentVersion\Windows" /RO:F /RA:F /Q4⤵
- Executes dropped EXE
PID:1476
-
-
C:\Windows\SysWOW64\chcp.comCHCP 12524⤵PID:2424
-
-
C:\32788R22FWJFW\NirCmd.cfxxeNircmd.cfxxe infobox "Incompatible OS. ComboFix only works for workstations with Windows 2000 and XP~n~nOS incompatible. ComboFix ne fonctionne que pour Windows 2000 et XP~n~nOS niet compatibel. ComboFix kan enkel gebruikt worden voor Windows 2000 en XP~n~nInkompatibles Betriebssystem. ComboFix läuft nur unter Windows 2000 und XP~n~nKäyttöjärjestelmä ei ole yhteensopiva. ComboFix toimii vain Windows 2000- ja XP-käyttöjärjestelmissä.~n~nSistema Operativo Incompat¡vel. ComboFix apenas funciona em Windows 2000 e XP~n~nSO. Incompatible. ComboFix funciona únicamente en Windows 2000 y XP~n~nOS Incompatibile. Combofix funziona solo su windows 2000 e XP" "Error - Win32 only"4⤵
- Executes dropped EXE
PID:1060
-
-
-
-
C:\32788R22FWJFW\nircmd.cfxxe"C:\32788R22FWJFW\nircmd.cfxxe" cmdwait 1700 exec hide "32788R22FWJFW\cmd.cfxxe" /c 32788R22FWJFW\p.cmd2⤵
- Executes dropped EXE
PID:3024 -
C:\32788R22FWJFW\cmd.cfxxe"32788R22FWJFW\cmd.cfxxe" /c 32788R22FWJFW\p.cmd3⤵
- Executes dropped EXE
PID:1620
-
-
-
C:\32788R22FWJFW\n.pif"C:\32788R22FWJFW\n.pif" cmdwait 2500 exec hide "32788R22FWJFW\cmd.cfxxe" /c 32788R22FWJFW\p.cmd2⤵
- Executes dropped EXE
PID:1480 -
C:\32788R22FWJFW\cmd.cfxxe"32788R22FWJFW\cmd.cfxxe" /c 32788R22FWJFW\p.cmd3⤵
- Executes dropped EXE
PID:1452
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
2Change Default File Association
1Image File Execution Options Injection
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD51aa16d0f74468cf739427c823e44f693
SHA1ea83e02989f1427fb0f2f1f5eb23e1e125cd5c78
SHA2568419a839e8e106403e2dc8ae73ef9a627bb894b91a5b39e2ad88e62c9d66dc56
SHA5120a403c320ce88bd7b0dcbfcf71e552d08e070fafefeada050c330f01e50cc542726812026d18b14216be49ca608197630b65f23fc32b89268b8bb86de7c35782
-
Filesize
1KB
MD5abc6379205de2618851c4fcbf72112eb
SHA11ed7b1e965eab56f55efda975f9f7ade95337267
SHA25622e7528e56dffaa26cfe722994655686c90824b13eb51184abfe44d4e95d473f
SHA512180c7f400dd13092b470e3a91bf02e98ef6247c1193bf349e3710e8d1e9003f3bc9b792bb776eacb746e9c67b3041f2333cc07f28c5f046d59274742230fb7c1
-
Filesize
30KB
MD5ae72e8619cb31d84da25e2435e55003c
SHA12ed893a9aa82da248b5f4344819fcf6ad2d28240
SHA256eccf9f7bb602e25cf9383be7856318c1fa679c0c4a354966b0ed723da17e8d24
SHA5121013c5f0a25b3dfc3daa3d7dec9f16c0fc89e9672a7f400145973e4427db331cf8be6ea42a0d6cd225eccb2b88f05bf0237342a35276c8689f320121e386c982
-
Filesize
158KB
MD501d95a1f8cf13d07cc564aabb36bcc0b
SHA1be229bde90b82d21fe94c67e2b096334e93d78c2
SHA2561eed7a2498943b7303de1f085820edbabae4a414db6125862c1ba2db269ee3e3
SHA512342c92b9e6d6870a43c973dd2b52549f8925eec9b153056db336184243f08eb932aa1e433e7d950bbb0d4e46faa95d04f0283b48d4361653d9b81311ab2b3a48
-
Filesize
13KB
MD53c76471e2e02fb0a60fce98120ac607d
SHA14c3f336111cb4223e6e011033af85edf7fc13fb2
SHA2563421abc6b631a78fe18152dc7391154224097e62944cc93b801d76a2e7f308f2
SHA51259c20586e655cd0180c017b1000b38879b477040c923642730cabc3941b8da70d5e82274e46ca626f4c859deb15d03183bda9173a006e105805668eba1979ef0
-
Filesize
250KB
MD5f1fba6185a6a2bc6456970914875078e
SHA1a3a0da9b072ad4ceab9aec41af71a730d9b44744
SHA256deaaab3b825ebadb6395e0be7671f96fd30ca8f76159b53c2d11da5c2ca7b7d0
SHA51245cd68a2465d5aa24a693f5bdec9999fee1117e4329d4ae2e1d51a923d42d717e1d09eff9f9e11f3282ebc32422640028d64bf108f9d3d9c49bcd1df6b14212a
-
Filesize
207KB
MD5b1a9cf0b6f80611d31987c247ec630b4
SHA17299b3c370254e1e4bade26dc5fec818989d836a
SHA256933756962d8a3530c50072e03af9e0eb0bede3c7af58feda3518240e851071ef
SHA512152e24b5490c3e15ec7cf6db0e6573cd75846be6b1472165d055255a9b74a22d929bf8bef1c3f8e31333577d806d600239dde2dfbb463cc62987bac62706b9e1