Analysis
-
max time kernel
150s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
12/07/2024, 04:35
Static task
static1
Behavioral task
behavioral1
Sample
3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe
-
Size
365KB
-
MD5
3c0076df5304aea581674cf0dfd91aaa
-
SHA1
87c5cfd7656af4adccc4446109171f7385dca2ef
-
SHA256
e3cc760aabf2b84d82e96f9566763068da8a3dcd672c863df07472b35c9881bc
-
SHA512
596af08bd409bbae98c26dc7fed08ce0c891c9dd8365f2477a72378e0ee3f401d7726b6cbbc5be29d681c913331f6c8529d23b189e8fa4d81b2a2c7389b608d8
-
SSDEEP
6144:yqnwjmFpdkAkzm5ydz7R+WeP4R4Fj611+ILBM8Ra6rMXt86XejcMw:yGwjy4hz+ydJ+FG4R61FBMMrMXXXejHw
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3036 dnfye.exe 3008 dnfye2.exe -
Loads dropped DLL 4 IoCs
pid Process 2760 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe 2760 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe 2760 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe 2760 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HomePage = "C:\\Windows\\system32\\HomePage.exe" dnfye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ClickAd = "C:\\Windows\\system32\\ClickAd.exe" dnfye2.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ClickAd.exe dnfye2.exe File opened for modification C:\WINDOWS\SysWOW64\comdlg32.ocx 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe File opened for modification C:\WINDOWS\SysWOW64\MSINET.OCX 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe File created C:\Windows\SysWOW64\HomePage.exe dnfye.exe File opened for modification C:\Windows\SysWOW64\HomePage.exe dnfye.exe File created C:\Windows\SysWOW64\ClickAd.exe dnfye2.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\dnfye.exe 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe File opened for modification C:\Windows\dnfye2.exe 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2596 3008 WerFault.exe 34 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Local Page = "http://www.bukeneng.com" dnfye.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\default_page_url = "http://www.bukeneng.com" dnfye.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://www.baidu.com/s?tn=koal_pg&wd=http://www.bukeneng.com" dnfye.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\start page = "http://www.bukeneng.com" dnfye.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59293-9880-11CF-9754-00AA00C00908}\TypeLib\ = "{48E59290-9880-11CF-9754-00AA00C00908}" 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59293-9880-11CF-9754-00AA00C00908}\Implemented Categories\{40FC6ED4-2438-11CF-A3DB-080036F12502} 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{48E59292-9880-11CF-9754-00AA00C00908}\ = "DInetEvents" 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59293-9880-11CF-9754-00AA00C00908} 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59293-9880-11CF-9754-00AA00C00908}\ProgID\ = "InetCtls.Inet.1" 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59294-9880-11CF-9754-00AA00C00908} 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59295-9880-11CF-9754-00AA00C00908}\InprocServer32 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{48E59292-9880-11CF-9754-00AA00C00908}\TypeLib\ = "{48E59290-9880-11CF-9754-00AA00C00908}" 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{48E59292-9880-11CF-9754-00AA00C00908}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\InetCtls.Inet\CLSID 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59293-9880-11CF-9754-00AA00C00908}\Version 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59293-9880-11CF-9754-00AA00C00908}\Implemented Categories 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{48E59290-9880-11CF-9754-00AA00C00908}\1.0\0\win32 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{48E59292-9880-11CF-9754-00AA00C00908}\TypeLib 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59293-9880-11CF-9754-00AA00C00908}\ = "Microsoft Internet Transfer Control, version 6.0" 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\InetCtls.Inet\CurVer 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59293-9880-11CF-9754-00AA00C00908}\VersionIndependentProgID 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59293-9880-11CF-9754-00AA00C00908}\ProgID 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59293-9880-11CF-9754-00AA00C00908}\ToolboxBitmap32\ = "C:\\Windows\\SysWow64\\MSINET.OCX, 1" 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{48E59291-9880-11CF-9754-00AA00C00908}\ProxyStubClsid32 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{48E59292-9880-11CF-9754-00AA00C00908}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\InetCtls.Inet\ = "Microsoft Internet Transfer Control, version 6.0" 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59295-9880-11CF-9754-00AA00C00908} 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{48E59290-9880-11CF-9754-00AA00C00908}\1.0\HELPDIR\ 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{48E59291-9880-11CF-9754-00AA00C00908}\TypeLib\Version = "1.0" 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{48E59292-9880-11CF-9754-00AA00C00908}\TypeLib\Version = "1.0" 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{48E59290-9880-11CF-9754-00AA00C00908}\1.0\ = "Microsoft Internet Transfer Control 6.0" 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59293-9880-11CF-9754-00AA00C00908}\Version\ = "1.0" 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{48E59290-9880-11CF-9754-00AA00C00908}\1.0\HELPDIR 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{48E59291-9880-11CF-9754-00AA00C00908}\TypeLib\Version = "1.0" 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\InetCtls.Inet\CLSID\ = "{48E59293-9880-11CF-9754-00AA00C00908}" 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\InetCtls.Inet.1\ = "Microsoft Internet Transfer Control, version 6.0" 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59293-9880-11CF-9754-00AA00C00908}\MiscStatus 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{48E59291-9880-11CF-9754-00AA00C00908} 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{48E59291-9880-11CF-9754-00AA00C00908}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{48E59292-9880-11CF-9754-00AA00C00908}\ProxyStubClsid32 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{48E59292-9880-11CF-9754-00AA00C00908}\TypeLib\Version = "1.0" 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59293-9880-11CF-9754-00AA00C00908}\InprocServer32 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{48E59290-9880-11CF-9754-00AA00C00908} 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{48E59290-9880-11CF-9754-00AA00C00908}\1.0\FLAGS 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{48E59292-9880-11CF-9754-00AA00C00908}\ProxyStubClsid32 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59293-9880-11CF-9754-00AA00C00908}\InprocServer32\ThreadingModel = "Apartment" 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\InetCtls.Inet 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59293-9880-11CF-9754-00AA00C00908}\Control 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59294-9880-11CF-9754-00AA00C00908} 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{48E59291-9880-11CF-9754-00AA00C00908}\ = "IInet" 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{48E59291-9880-11CF-9754-00AA00C00908}\ProxyStubClsid32 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{48E59292-9880-11CF-9754-00AA00C00908}\TypeLib\ = "{48E59290-9880-11CF-9754-00AA00C00908}" 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\InetCtls.Inet.1 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59293-9880-11CF-9754-00AA00C00908}\Programmable 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59293-9880-11CF-9754-00AA00C00908}\Implemented Categories\{40FC6ED5-2438-11CF-A3DB-080036F12502} 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{48E59290-9880-11CF-9754-00AA00C00908}\1.0\FLAGS\ = "2" 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{48E59291-9880-11CF-9754-00AA00C00908}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{48E59291-9880-11CF-9754-00AA00C00908}\ = "IInet" 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{48E59292-9880-11CF-9754-00AA00C00908} 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\InetCtls.Inet.1\CLSID 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59293-9880-11CF-9754-00AA00C00908}\MiscStatus\ = "0" 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59293-9880-11CF-9754-00AA00C00908}\Implemented Categories\{0DE86A52-2BAA-11CF-A229-00AA003D7352} 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59294-9880-11CF-9754-00AA00C00908}\ = "Internet Control General Property Page Object" 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{48E59290-9880-11CF-9754-00AA00C00908}\1.0 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{48E59291-9880-11CF-9754-00AA00C00908}\TypeLib 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{48E59291-9880-11CF-9754-00AA00C00908}\TypeLib 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\InetCtls.Inet\CurVer\ = "InetCtls.Inet.1" 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{48E59293-9880-11CF-9754-00AA00C00908}\MiscStatus\1 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2760 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe 2760 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe 2760 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe 2760 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe 2760 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe 2760 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe 2760 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe 2760 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe 2760 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe 2760 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe 2760 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe 2760 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe 2760 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe 2760 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe 2760 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe 2760 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe 2760 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe 2760 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe 2760 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe 2760 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe 2760 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe 2760 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe 2760 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe 2760 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe 2760 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe 2760 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe 2760 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe 2760 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe 2760 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe 2760 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe 2760 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe 2760 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe 2760 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe 2760 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe 2760 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe 2760 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe 2760 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe 2760 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe 2760 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe 2760 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe 2760 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe 2760 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe 2760 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe 2760 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe 2760 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe 2760 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe 2760 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe 2760 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe 2760 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe 2760 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe 2760 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe 2760 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe 2760 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe 2760 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe 2760 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe 2760 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe 2760 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe 2760 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe 2760 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe 2760 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe 2760 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe 2760 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe 2760 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe 2760 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2760 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe 2760 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe 2760 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2760 wrote to memory of 3036 2760 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe 32 PID 2760 wrote to memory of 3036 2760 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe 32 PID 2760 wrote to memory of 3036 2760 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe 32 PID 2760 wrote to memory of 3036 2760 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe 32 PID 2760 wrote to memory of 3008 2760 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe 34 PID 2760 wrote to memory of 3008 2760 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe 34 PID 2760 wrote to memory of 3008 2760 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe 34 PID 2760 wrote to memory of 3008 2760 3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe 34 PID 3008 wrote to memory of 2596 3008 dnfye2.exe 36 PID 3008 wrote to memory of 2596 3008 dnfye2.exe 36 PID 3008 wrote to memory of 2596 3008 dnfye2.exe 36 PID 3008 wrote to memory of 2596 3008 dnfye2.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3c0076df5304aea581674cf0dfd91aaa_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\WINDOWS\dnfye.exeC:\WINDOWS\dnfye.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
PID:3036
-
-
C:\WINDOWS\dnfye2.exeC:\WINDOWS\dnfye2.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3008 -s 8243⤵
- Program crash
PID:2596
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
118KB
MD5dcbacd27a16a2949bc28aba90b89f814
SHA1e60580464473c6498d7d20c7656406a0735bd98b
SHA25687d713583fd63d1523a30f85e80162362beed59b66704021dd0e7d8408cce0a6
SHA512168ec6e1266a388ef3381c3e737ba79ea209732fb6cdd395c3f2f11783f010e7cf396c599640fa2c4141a0481f91905ea8ff7f58f969e5863824908dfb1ff7a1
-
Filesize
196KB
MD59c9c49692cfaf75cc6443690371a4365
SHA16b8bad39f5803b5ee10c417ab56a427dad64a8ba
SHA25611b6466e8c8730787adc85d0d01f0ce94f000a5140d07ac65628ed20d07a8b0d
SHA512a0b5412af252b4f973b4b81c66f861a1a7e7f1ba31a68093fdfee7e86b97db1ee022bf219e823d23f3e6dd102f1697cce1d6fb17bd68ff95e27ef1967cbb60d4
-
Filesize
112KB
MD57bec181a21753498b6bd001c42a42722
SHA13249f233657dc66632c0539c47895bfcee5770cc
SHA25673da54b69911bdd08ea8bbbd508f815ef7cfa59c4684d75c1c602252ec88ee31
SHA512d671e25ae5e02a55f444d253f0e4a42af6a5362d9759fb243ad6d2c333976ab3e98669621ec0850ad915ee06acbe8e70d77b084128fc275462223f4f5ab401bc