Analysis
-
max time kernel
150s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
19/07/2024, 06:13
Static task
static1
Behavioral task
behavioral1
Sample
5ac4326136d44df2e164aaefb5f80f52_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5ac4326136d44df2e164aaefb5f80f52_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5ac4326136d44df2e164aaefb5f80f52_JaffaCakes118.exe
-
Size
1.4MB
-
MD5
5ac4326136d44df2e164aaefb5f80f52
-
SHA1
60eb1637d50e48bcdb4939fc7cfcbb02fffcfd89
-
SHA256
58a31d33c7c3da2fa881ee25ac1eb8fb1b0827404d854dd6eddff6c9104b87aa
-
SHA512
bc3dc111729048999e8da22c4810e305e3490d6742446a4f86ece9dd9da63abab9668c91ad631b1b55ad80d9174370b8d0f77477c68dfee73629d809416967b4
-
SSDEEP
24576:gQsAVmhBwWsRBB/PbYiNNPSflQMm39kI+DLWR7EbaiF0mUP5K:PsAVmhGWsR//PbYinPEaMo9kIqS7oa0
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Modifies Windows Firewall 2 TTPs 3 IoCs
pid Process 2824 netsh.exe 2736 netsh.exe 2764 netsh.exe -
Executes dropped EXE 4 IoCs
pid Process 2760 EhStorShell32.exe 2908 kbdda32.exe 1004 EhStorShell32.exe 828 lsass.exe -
Loads dropped DLL 10 IoCs
pid Process 288 5ac4326136d44df2e164aaefb5f80f52_JaffaCakes118.exe 288 5ac4326136d44df2e164aaefb5f80f52_JaffaCakes118.exe 288 5ac4326136d44df2e164aaefb5f80f52_JaffaCakes118.exe 2908 kbdda32.exe 2908 kbdda32.exe 2908 kbdda32.exe 1004 EhStorShell32.exe 2760 EhStorShell32.exe 2760 EhStorShell32.exe 828 lsass.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\RTHDBPL = "C:\\Users\\Admin\\AppData\\Roaming\\SysWin\\lsass.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\RTHDBPL = "C:\\Users\\Admin\\AppData\\Roaming\\SysWin\\lsass.exe" EhStorShell32.exe -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects 5ac4326136d44df2e164aaefb5f80f52_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{139590D1-7F5B-43B6-8A20-CC66AA318C70} 5ac4326136d44df2e164aaefb5f80f52_JaffaCakes118.exe -
Drops file in System32 directory 11 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\KBDDA32.exe 5ac4326136d44df2e164aaefb5f80f52_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\472590126 kbdda32.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat kbdda32.exe File created C:\Windows\SysWOW64\KBDDA32.exe 5ac4326136d44df2e164aaefb5f80f52_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\e68530591366P.manifest kbdda32.exe File opened for modification C:\Windows\SysWOW64\e68530591366C.manifest kbdda32.exe File opened for modification C:\Windows\SysWOW64\e68530591366O.manifest kbdda32.exe File opened for modification C:\Windows\SysWOW64\e68530591366S.manifest kbdda32.exe File created C:\Windows\SysWOW64\api-ms-win-core-localization-l1-2-032.dll 5ac4326136d44df2e164aaefb5f80f52_JaffaCakes118.exe File created C:\Windows\SysWOW64\EhStorShell32.exe 5ac4326136d44df2e164aaefb5f80f52_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\472590126 5ac4326136d44df2e164aaefb5f80f52_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 9 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1508 288 WerFault.exe 29 -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\XMLHTTP_UUID_Default = d19095135b7fb6438a20cc66aa318c70 5ac4326136d44df2e164aaefb5f80f52_JaffaCakes118.exe -
Modifies data under HKEY_USERS 47 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 kbdda32.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 kbdda32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ kbdda32.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" kbdda32.exe Key created \REGISTRY\USER\S-1-5-19\Software\Zyawminstc 5ac4326136d44df2e164aaefb5f80f52_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-20\Software\Zyawminstc\CLSID 5ac4326136d44df2e164aaefb5f80f52_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-20\Software 5ac4326136d44df2e164aaefb5f80f52_JaffaCakes118.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{57442F0D-1F3A-4EBF-BF12-DE5CA55C5486}\WpadDecisionTime = 901e69bca2d9da01 kbdda32.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{57442F0D-1F3A-4EBF-BF12-DE5CA55C5486}\WpadDecision = "0" kbdda32.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\a6-db-a5-22-de-29\WpadDecisionTime = 901e69bca2d9da01 kbdda32.exe Key created \REGISTRY\USER\S-1-5-19 5ac4326136d44df2e164aaefb5f80f52_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-20\Software\Zyawminstc 5ac4326136d44df2e164aaefb5f80f52_JaffaCakes118.exe Set value (data) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Internet Explorer\Main\XMLHTTP_UUID_Default = d19095135b7fb6438a20cc66aa318c70 5ac4326136d44df2e164aaefb5f80f52_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings kbdda32.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" kbdda32.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" kbdda32.exe Key created \REGISTRY\USER\.DEFAULT 5ac4326136d44df2e164aaefb5f80f52_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Zyawminstc\CLSID 5ac4326136d44df2e164aaefb5f80f52_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-19\Software 5ac4326136d44df2e164aaefb5f80f52_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-20 5ac4326136d44df2e164aaefb5f80f52_JaffaCakes118.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{57442F0D-1F3A-4EBF-BF12-DE5CA55C5486}\WpadNetworkName = "Network 3" kbdda32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Zyawminstc 5ac4326136d44df2e164aaefb5f80f52_JaffaCakes118.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0122000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 kbdda32.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" kbdda32.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" kbdda32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{57442F0D-1F3A-4EBF-BF12-DE5CA55C5486} kbdda32.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{57442F0D-1F3A-4EBF-BF12-DE5CA55C5486}\WpadDecisionReason = "1" kbdda32.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\a6-db-a5-22-de-29\WpadDecisionTime = b0a54709a3d9da01 kbdda32.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Zyawminstc\CLSID\ = "{42d3ab65-f982-4069-ad39-9b8fbff79f13}" 5ac4326136d44df2e164aaefb5f80f52_JaffaCakes118.exe Set value (data) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Internet Explorer\Main\XMLHTTP_UUID_Default = d19095135b7fb6438a20cc66aa318c70 5ac4326136d44df2e164aaefb5f80f52_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings kbdda32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections kbdda32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad kbdda32.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix kbdda32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{57442F0D-1F3A-4EBF-BF12-DE5CA55C5486}\a6-db-a5-22-de-29 kbdda32.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\a6-db-a5-22-de-29\WpadDecisionReason = "1" kbdda32.exe Key created \REGISTRY\USER\.DEFAULT\Software 5ac4326136d44df2e164aaefb5f80f52_JaffaCakes118.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{57442F0D-1F3A-4EBF-BF12-DE5CA55C5486}\WpadDecisionTime = b0a54709a3d9da01 kbdda32.exe Key created \REGISTRY\USER\S-1-5-19\Software\Zyawminstc\CLSID 5ac4326136d44df2e164aaefb5f80f52_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-19\Software\Zyawminstc\CLSID\ = "{42d3ab65-f982-4069-ad39-9b8fbff79f13}" 5ac4326136d44df2e164aaefb5f80f52_JaffaCakes118.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000004000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0122000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 kbdda32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Zyawminstc\CLSID 5ac4326136d44df2e164aaefb5f80f52_JaffaCakes118.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\e6853059 = " " kbdda32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\a6-db-a5-22-de-29 kbdda32.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\a6-db-a5-22-de-29\WpadDecision = "0" kbdda32.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\a6-db-a5-22-de-29\WpadDetectedUrl kbdda32.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Zyawminstc\CLSID\ = "{42d3ab65-f982-4069-ad39-9b8fbff79f13}" 5ac4326136d44df2e164aaefb5f80f52_JaffaCakes118.exe -
Modifies registry class 16 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Zyawminstc\CLSID\ = "{42d3ab65-f982-4069-ad39-9b8fbff79f13}" 5ac4326136d44df2e164aaefb5f80f52_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\Software 5ac4326136d44df2e164aaefb5f80f52_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\Software\Zyawminstc\CLSID 5ac4326136d44df2e164aaefb5f80f52_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Zyawminstc 5ac4326136d44df2e164aaefb5f80f52_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.fsharproj 5ac4326136d44df2e164aaefb5f80f52_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{139590D1-7F5B-43B6-8A20-CC66AA318C70} 5ac4326136d44df2e164aaefb5f80f52_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{139590D1-7F5B-43B6-8A20-CC66AA318C70}\InprocServer32\ = "C:\\Windows\\SysWow64\\api-ms-win-core-localization-l1-2-032.dll" 5ac4326136d44df2e164aaefb5f80f52_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Zyawminstc\CLSID 5ac4326136d44df2e164aaefb5f80f52_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\Software\Zyawminstc\CLSID\ = "{42d3ab65-f982-4069-ad39-9b8fbff79f13}" 5ac4326136d44df2e164aaefb5f80f52_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{139590D1-7F5B-43B6-8A20-CC66AA318C70}\InprocServer32\ThreadingModel = "Both" 5ac4326136d44df2e164aaefb5f80f52_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_CLASSES\Software\Zyawminstc 5ac4326136d44df2e164aaefb5f80f52_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000_Classes\Software\Zyawminstc\CLSID 5ac4326136d44df2e164aaefb5f80f52_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.fsharproj\PersistentHandler 5ac4326136d44df2e164aaefb5f80f52_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.fsharproj\PersistentHandler\ = "{018066a7-c703-4df0-9cc7-589d74940a22}" 5ac4326136d44df2e164aaefb5f80f52_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{139590D1-7F5B-43B6-8A20-CC66AA318C70}\InprocServer32 5ac4326136d44df2e164aaefb5f80f52_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42d3ab65-f982-4069-ad39-9b8fbff79f13} 5ac4326136d44df2e164aaefb5f80f52_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 288 5ac4326136d44df2e164aaefb5f80f52_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 288 wrote to memory of 2760 288 5ac4326136d44df2e164aaefb5f80f52_JaffaCakes118.exe 30 PID 288 wrote to memory of 2760 288 5ac4326136d44df2e164aaefb5f80f52_JaffaCakes118.exe 30 PID 288 wrote to memory of 2760 288 5ac4326136d44df2e164aaefb5f80f52_JaffaCakes118.exe 30 PID 288 wrote to memory of 2760 288 5ac4326136d44df2e164aaefb5f80f52_JaffaCakes118.exe 30 PID 288 wrote to memory of 2824 288 5ac4326136d44df2e164aaefb5f80f52_JaffaCakes118.exe 31 PID 288 wrote to memory of 2824 288 5ac4326136d44df2e164aaefb5f80f52_JaffaCakes118.exe 31 PID 288 wrote to memory of 2824 288 5ac4326136d44df2e164aaefb5f80f52_JaffaCakes118.exe 31 PID 288 wrote to memory of 2824 288 5ac4326136d44df2e164aaefb5f80f52_JaffaCakes118.exe 31 PID 288 wrote to memory of 2736 288 5ac4326136d44df2e164aaefb5f80f52_JaffaCakes118.exe 33 PID 288 wrote to memory of 2736 288 5ac4326136d44df2e164aaefb5f80f52_JaffaCakes118.exe 33 PID 288 wrote to memory of 2736 288 5ac4326136d44df2e164aaefb5f80f52_JaffaCakes118.exe 33 PID 288 wrote to memory of 2736 288 5ac4326136d44df2e164aaefb5f80f52_JaffaCakes118.exe 33 PID 288 wrote to memory of 2764 288 5ac4326136d44df2e164aaefb5f80f52_JaffaCakes118.exe 34 PID 288 wrote to memory of 2764 288 5ac4326136d44df2e164aaefb5f80f52_JaffaCakes118.exe 34 PID 288 wrote to memory of 2764 288 5ac4326136d44df2e164aaefb5f80f52_JaffaCakes118.exe 34 PID 288 wrote to memory of 2764 288 5ac4326136d44df2e164aaefb5f80f52_JaffaCakes118.exe 34 PID 288 wrote to memory of 1508 288 5ac4326136d44df2e164aaefb5f80f52_JaffaCakes118.exe 38 PID 288 wrote to memory of 1508 288 5ac4326136d44df2e164aaefb5f80f52_JaffaCakes118.exe 38 PID 288 wrote to memory of 1508 288 5ac4326136d44df2e164aaefb5f80f52_JaffaCakes118.exe 38 PID 288 wrote to memory of 1508 288 5ac4326136d44df2e164aaefb5f80f52_JaffaCakes118.exe 38 PID 2908 wrote to memory of 1004 2908 kbdda32.exe 39 PID 2908 wrote to memory of 1004 2908 kbdda32.exe 39 PID 2908 wrote to memory of 1004 2908 kbdda32.exe 39 PID 2908 wrote to memory of 1004 2908 kbdda32.exe 39 PID 2760 wrote to memory of 828 2760 EhStorShell32.exe 40 PID 2760 wrote to memory of 828 2760 EhStorShell32.exe 40 PID 2760 wrote to memory of 828 2760 EhStorShell32.exe 40 PID 2760 wrote to memory of 828 2760 EhStorShell32.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\5ac4326136d44df2e164aaefb5f80f52_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5ac4326136d44df2e164aaefb5f80f52_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:288 -
C:\Windows\SysWOW64\EhStorShell32.exe"C:\Windows\system32\EhStorShell32.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Users\Admin\AppData\Roaming\SysWin\lsass.exe"C:\Users\Admin\AppData\Roaming\SysWin\lsass.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:828
-
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\system32\netsh.exe" advfirewall firewall add rule name="Windows Update Service" dir=in action=allow program="c:\windows\syswow64\kbdda32.exe" enable=yes profile=domain2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:2824
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\system32\netsh.exe" advfirewall firewall add rule name="Windows Update Service" dir=in action=allow program="c:\windows\syswow64\kbdda32.exe" enable=yes profile=private2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:2736
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\system32\netsh.exe" advfirewall firewall add rule name="Windows Update Service" dir=in action=allow program="c:\windows\syswow64\kbdda32.exe" enable=yes profile=public2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:2764
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 288 -s 5602⤵
- Program crash
PID:1508
-
-
C:\Windows\SysWOW64\kbdda32.exeC:\Windows\SysWOW64\kbdda32.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\ProgramData\EhStorShell32.exeschutz2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1004
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Browser Extensions
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
2AppInit DLLs
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
2AppInit DLLs
1Netsh Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32B
MD5ab289c749652bb47169c6899c4179a57
SHA1a3f11eca3ad7e00cb59c3473c5ead96b0417a762
SHA256f941bd7fb2f71c70b35de6867774639fcbe4cdb5182c70bf316fbee83e90e138
SHA5123054e1b344751977a72e67fd89f4a034bc5ab81cdbce3c94785d5af559fa199bc4b36b79ba9118c9918195df9e930114c992cba98ec8704cded1c9eb43b7387d
-
Filesize
120B
MD51b09584482fa3b1d7dc69486c0770b33
SHA185aacff4fbc878cf0ad38f86d1a65121f9ef7aba
SHA2567b27de2ac17b147ff12205e13b9e48db7f509fa2cc2bd2ce9d5a88078b47f746
SHA512674bd29647b519e4d236dc174050faa2414d1e8c82c4429408884c22abb59b63857a1cdee23754b51a8c7beed717153a2dcdfcd5c352415b9cb29e8094a0b874
-
Filesize
1.4MB
MD55ac4326136d44df2e164aaefb5f80f52
SHA160eb1637d50e48bcdb4939fc7cfcbb02fffcfd89
SHA25658a31d33c7c3da2fa881ee25ac1eb8fb1b0827404d854dd6eddff6c9104b87aa
SHA512bc3dc111729048999e8da22c4810e305e3490d6742446a4f86ece9dd9da63abab9668c91ad631b1b55ad80d9174370b8d0f77477c68dfee73629d809416967b4
-
Filesize
249KB
MD5af329f753611110cd6249e4800f114cd
SHA1c7d40e12de5746ba7e08cb277af417a2aae8a326
SHA25679598b7db4f653ba34feaf4a94e1eeecd469b6ef5ab59b6ad0cde4a1235cee12
SHA512b7985e590828bd1fc051fb952ebeb88bb497a3ac87d59d9c930f42cd2cdf918261198cfa115fda7d862697f53212bbce166262817e44d729db1a679326b22f4f
-
Filesize
187KB
MD5a5d1fc3cb67687ef7a865fc600825151
SHA1adfad1d81ac24e485b4654ff839d2141ae1e3e45
SHA256ae423c66501c2830b90c88b1fdb30655800ba6812dafd7d98f03422441f796da
SHA5124dc9d84770e67e0739836d2f563a475031f1cb00105ad354e6a281965cacc08fe15f8f16fb6620f438020ee5a424e92e2962be968e8aae9d08d85c65de4907a6
-
Filesize
429KB
MD5213d946c7944f5c221279248389df42c
SHA17db977c802da1afeeda718424486bc237c8614b2
SHA25684bc00fc0406fcccd2313ca71dd9dc1a75780bda9d77eb6433145fba43978ac3
SHA5128388c9d277554bd84d45feaf98b012d968b3c5b6deca50e1d2a33d2511b0bf36138c8206b4204e37162c3e13422bd4a516f4f9123a3dba51d4da93090353d57e