Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
8Static
static
35f614b3d2a...18.exe
windows7-x64
85f614b3d2a...18.exe
windows10-2004-x64
8$PLUGINSDI...in.dll
windows7-x64
3$PLUGINSDI...in.dll
windows10-2004-x64
3$PLUGINSDI...rt.dll
windows7-x64
1$PLUGINSDI...rt.dll
windows10-2004-x64
1$PLUGINSDIR/Base.dll
windows7-x64
3$PLUGINSDIR/Base.dll
windows10-2004-x64
3$PLUGINSDI...er.dll
windows7-x64
1$PLUGINSDI...er.dll
windows10-2004-x64
1$PLUGINSDI...ol.dll
windows7-x64
3$PLUGINSDI...ol.dll
windows10-2004-x64
3$PLUGINSDI...rt.dll
windows7-x64
1$PLUGINSDI...rt.dll
windows10-2004-x64
1$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/Utils.dll
windows7-x64
3$PLUGINSDIR/Utils.dll
windows10-2004-x64
3$PLUGINSDI...00.dll
windows7-x64
3$PLUGINSDI...00.dll
windows10-2004-x64
3$PLUGINSDI...00.dll
windows7-x64
3$PLUGINSDI...00.dll
windows10-2004-x64
3$_15_/Baid...ce.dll
windows7-x64
1$_15_/Baid...ce.dll
windows10-2004-x64
1$_15_/Baid...ll.dll
windows7-x64
1$_15_/Baid...ll.dll
windows10-2004-x64
1$_15_/Baid...ot.exe
windows7-x64
1$_15_/Baid...ot.exe
windows10-2004-x64
1BDDocker.dll
windows7-x64
1BDDocker.dll
windows10-2004-x64
1BDDocker.exe
windows7-x64
1BDDocker.exe
windows10-2004-x64
1Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20/07/2024, 06:29
Static task
static1
Behavioral task
behavioral1
Sample
5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/BDMSkin.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/BDMSkin.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/BaiduReport.dll
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/BaiduReport.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/Base.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/Base.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/InstallHelper.dll
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/InstallHelper.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/Protocol.dll
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/Protocol.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/Report.dll
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/Report.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/Utils.dll
Resource
win7-20240705-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/Utils.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/msvcp100.dll
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/msvcp100.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/msvcr100.dll
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/msvcr100.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral23
Sample
$_15_/Baidu/Baidu/plugin/extends/game/1.0.0.3/JoystickService.dll
Resource
win7-20240705-en
Behavioral task
behavioral24
Sample
$_15_/Baidu/Baidu/plugin/extends/game/1.0.0.3/JoystickService.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral25
Sample
$_15_/Baidu/Baidu/plugin/extends/jietu/2.101.0.65/jietuDll.dll
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
$_15_/Baidu/Baidu/plugin/extends/jietu/2.101.0.65/jietuDll.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral27
Sample
$_15_/Baidu/Baidu/plugin/extends/jietu/2.101.0.65/screensnapshot.exe
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
$_15_/Baidu/Baidu/plugin/extends/jietu/2.101.0.65/screensnapshot.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral29
Sample
BDDocker.dll
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
BDDocker.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral31
Sample
BDDocker.exe
Resource
win7-20240704-en
Behavioral task
behavioral32
Sample
BDDocker.exe
Resource
win10v2004-20240709-en
General
-
Target
5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe
-
Size
10.6MB
-
MD5
5f614b3d2a686b4995c38b91324d8fdb
-
SHA1
72c298fb258d9e318aba64e900e91f3174cb2dbe
-
SHA256
531313033fdb71c44c0791f56679e55c36f06fa6250f90f68ebaf42e7a2a044b
-
SHA512
778c0d3ac4a7091cd09a5a9de4b3e41ea7c94c334af6219c85cf2f275feb3345adb42221193f6aac14e84fd1110ff52afb14cf24a7e7333bcbdf60fedb41681c
-
SSDEEP
196608:NBHC8KwHrU6Ery5NXJZzkl3fP0puCSe3xb1WujMYJroJiPEgI2fPZdms:DC8K6rery5ZDzklPMpuCl50uXozCPZb
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\System32\drivers\bbnetdriver.sys 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe -
Executes dropped EXE 12 IoCs
pid Process 2548 Baidu.exe 2088 Baidu.exe 264 Baidu.exe 1264 Baidu.exe 2212 Baidu.exe 316 Baidu.exe 1788 Baidu.exe 2476 BaiduService.exe 3004 BDDockerX64.exe 3032 BaiduRenderClient.exe 2964 Baidu.exe 2740 Baidu.exe -
Loads dropped DLL 64 IoCs
pid Process 1476 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 1476 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 1476 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 1476 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 1476 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 1476 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 1476 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 1476 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 1476 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 1476 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 1476 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 1476 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 1476 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 2548 Baidu.exe 2088 Baidu.exe 264 Baidu.exe 1264 Baidu.exe 2088 Baidu.exe 264 Baidu.exe 2548 Baidu.exe 1264 Baidu.exe 264 Baidu.exe 2548 Baidu.exe 1264 Baidu.exe 2088 Baidu.exe 264 Baidu.exe 2548 Baidu.exe 2088 Baidu.exe 1264 Baidu.exe 264 Baidu.exe 2548 Baidu.exe 2088 Baidu.exe 1264 Baidu.exe 264 Baidu.exe 2548 Baidu.exe 2212 Baidu.exe 264 Baidu.exe 2212 Baidu.exe 2212 Baidu.exe 2212 Baidu.exe 2212 Baidu.exe 2548 Baidu.exe 1264 Baidu.exe 316 Baidu.exe 316 Baidu.exe 316 Baidu.exe 316 Baidu.exe 316 Baidu.exe 2548 Baidu.exe 264 Baidu.exe 2088 Baidu.exe 2212 Baidu.exe 316 Baidu.exe 1264 Baidu.exe 2212 Baidu.exe 2212 Baidu.exe 2088 Baidu.exe 1264 Baidu.exe 316 Baidu.exe 2088 Baidu.exe 1264 Baidu.exe 1264 Baidu.exe 316 Baidu.exe 1264 Baidu.exe -
Unexpected DNS network traffic destination 64 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 180.76.76.76 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 180.76.76.76 Destination IP 114.114.114.114 Destination IP 180.76.76.76 Destination IP 114.114.114.114 Destination IP 180.76.76.76 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 180.76.76.76 Destination IP 180.76.76.76 Destination IP 180.76.76.76 Destination IP 180.76.76.76 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 180.76.76.76 Destination IP 114.114.114.114 Destination IP 180.76.76.76 Destination IP 180.76.76.76 Destination IP 114.114.114.114 Destination IP 180.76.76.76 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 180.76.76.76 Destination IP 114.114.114.114 Destination IP 180.76.76.76 Destination IP 180.76.76.76 Destination IP 114.114.114.114 Destination IP 180.76.76.76 Destination IP 180.76.76.76 Destination IP 114.114.114.114 Destination IP 180.76.76.76 Destination IP 114.114.114.114 Destination IP 180.76.76.76 Destination IP 114.114.114.114 Destination IP 180.76.76.76 Destination IP 180.76.76.76 Destination IP 180.76.76.76 Destination IP 180.76.76.76 Destination IP 180.76.76.76 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 180.76.76.76 Destination IP 114.114.114.114 Destination IP 180.76.76.76 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 180.76.76.76 Destination IP 180.76.76.76 Destination IP 114.114.114.114 Destination IP 180.76.76.76 Destination IP 180.76.76.76 Destination IP 114.114.114.114 Destination IP 180.76.76.76 Destination IP 180.76.76.76 Destination IP 114.114.114.114 Destination IP 180.76.76.76 Destination IP 180.76.76.76 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 180.76.76.76 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\BaiduClient = "\"C:\\Users\\Admin\\AppData\\Local\\Baidu\\BaiduClient\\3.0.0.2873\\Baidu.exe\" --auto-run" 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: BaiduService.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 5 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 Baidu.exe File opened for modification \??\PhysicalDrive0 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe File opened for modification \??\PhysicalDrive0 Baidu.exe File opened for modification \??\PhysicalDrive0 Baidu.exe File opened for modification \??\PhysicalDrive0 BaiduRenderClient.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPoicy 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPoicy\{73F970DA-48AC-43F1-9848-FB90504CE3E9}\AppName = "Baidu.exe" 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPoicy\{73F970DA-48AC-43F1-9848-FB90504CE3E9}\AppPath = "C:\\Users\\Admin\\AppData\\Local\\Baidu\\BaiduClient\\3.0.0.2873" 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPoicy\{73F970DA-48AC-43F1-9848-FB90504CE3E9}\Policy = "3" 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPoicy\{73F970DA-48AC-43F1-9848-FB90504CE3E9} 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1476 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 1476 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 1476 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 1476 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 1476 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 1476 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 1476 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 1476 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 1476 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 1476 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 1476 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 1476 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 1184 Explorer.EXE 3032 BaiduRenderClient.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1184 Explorer.EXE 1788 Baidu.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 476 Process not Found -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 1476 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe Token: SeDebugPrivilege 1476 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe Token: SeDebugPrivilege 1476 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe Token: SeDebugPrivilege 1476 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe Token: SeDebugPrivilege 1476 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe Token: SeDebugPrivilege 1476 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe Token: SeDebugPrivilege 1476 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe Token: SeDebugPrivilege 1476 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe Token: SeDebugPrivilege 1476 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe Token: SeDebugPrivilege 1476 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe Token: SeDebugPrivilege 3004 BDDockerX64.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 3004 BDDockerX64.exe 1184 Explorer.EXE 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1184 Explorer.EXE 1184 Explorer.EXE 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe 1788 Baidu.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1788 Baidu.exe 1788 Baidu.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1788 Baidu.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1184 Explorer.EXE -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 1476 wrote to memory of 2548 1476 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 30 PID 1476 wrote to memory of 2548 1476 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 30 PID 1476 wrote to memory of 2548 1476 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 30 PID 1476 wrote to memory of 2548 1476 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 30 PID 1476 wrote to memory of 2088 1476 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 31 PID 1476 wrote to memory of 2088 1476 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 31 PID 1476 wrote to memory of 2088 1476 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 31 PID 1476 wrote to memory of 2088 1476 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 31 PID 1476 wrote to memory of 264 1476 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 32 PID 1476 wrote to memory of 264 1476 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 32 PID 1476 wrote to memory of 264 1476 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 32 PID 1476 wrote to memory of 264 1476 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 32 PID 1476 wrote to memory of 1264 1476 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 33 PID 1476 wrote to memory of 1264 1476 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 33 PID 1476 wrote to memory of 1264 1476 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 33 PID 1476 wrote to memory of 1264 1476 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 33 PID 1476 wrote to memory of 2212 1476 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 34 PID 1476 wrote to memory of 2212 1476 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 34 PID 1476 wrote to memory of 2212 1476 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 34 PID 1476 wrote to memory of 2212 1476 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 34 PID 1476 wrote to memory of 316 1476 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 35 PID 1476 wrote to memory of 316 1476 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 35 PID 1476 wrote to memory of 316 1476 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 35 PID 1476 wrote to memory of 316 1476 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 35 PID 1788 wrote to memory of 3004 1788 Baidu.exe 39 PID 1788 wrote to memory of 3004 1788 Baidu.exe 39 PID 1788 wrote to memory of 3004 1788 Baidu.exe 39 PID 1788 wrote to memory of 3004 1788 Baidu.exe 39 PID 1788 wrote to memory of 3032 1788 Baidu.exe 40 PID 1788 wrote to memory of 3032 1788 Baidu.exe 40 PID 1788 wrote to memory of 3032 1788 Baidu.exe 40 PID 1788 wrote to memory of 3032 1788 Baidu.exe 40 PID 3004 wrote to memory of 1184 3004 BDDockerX64.exe 21 PID 1788 wrote to memory of 2964 1788 Baidu.exe 41 PID 1788 wrote to memory of 2964 1788 Baidu.exe 41 PID 1788 wrote to memory of 2964 1788 Baidu.exe 41 PID 1788 wrote to memory of 2964 1788 Baidu.exe 41 PID 1788 wrote to memory of 2740 1788 Baidu.exe 42 PID 1788 wrote to memory of 2740 1788 Baidu.exe 42 PID 1788 wrote to memory of 2740 1788 Baidu.exe 42 PID 1788 wrote to memory of 2740 1788 Baidu.exe 42
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of UnmapMainImage
PID:1184 -
C:\Users\Admin\AppData\Local\Temp\5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe"2⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Adds Run key to start application
- Writes to the Master Boot Record (MBR)
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\Baidu.exe"C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\Baidu.exe" -p 1 --inst-task 12#03⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2548
-
-
C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\Baidu.exe"C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\Baidu.exe" -p 1 --inst-task 12#13⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2088
-
-
C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\Baidu.exe"C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\Baidu.exe" -p 1 --inst-task 113⤵
- Executes dropped EXE
- Loads dropped DLL
PID:264
-
-
C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\Baidu.exe"C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\Baidu.exe" --inst-task 5 -p 13⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1264
-
-
C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\Baidu.exe"C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\Baidu.exe" --inst-task 2#"C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873" -p 13⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2212
-
-
C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\Baidu.exe"C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\Baidu.exe" -p 5 -t 03⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
PID:316
-
-
-
C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\Baidu.exe"C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\Baidu.exe" --main-frame 0 --search-bar 2 --tray 12⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\BDDockerX64.exe"C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\BDDockerX64.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3004
-
-
C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\wrs\BaiduRenderClient.exe"C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\wrs\BaiduRenderClient.exe" --breakpad="\\.\pipe\crashservice.1788.0.7162" --humming-dir="C:\Users\Admin\AppData\Roaming\Baidu\Baidu\plugin" --main-frame="" --search-bar="" --service-exe="BaiduRenderClient.exe" --tray="" --xchannel="\\.\pipe\ipc.1788.0.7162" --xtype="service" /prefetch:13⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
PID:3032
-
-
C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\Baidu.exe"C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\Baidu.exe" -p 3 -r 1788 -c 3 -m 7679401527536 --magic-number 76794015275363⤵
- Executes dropped EXE
PID:2964
-
-
C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\Baidu.exe"C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\Baidu.exe" -p 2 -r 1788 -c 4 -m 7679401527536 --magic-number 76794015275363⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:2740
-
-
-
C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\BaiduService.exeC:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\BaiduService.exe1⤵
- Executes dropped EXE
- Enumerates connected drives
PID:2476
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
905KB
MD5f3482cb7643db3dfe3e78dd32514277c
SHA193c4f50c18128bc4a77b5d85826f3f29ce56f68a
SHA256c8c300ab2b4bdebd6fdfe4e92b46be4977f851261677b5bd2500a10ce00771c7
SHA51245c7a13b9781d87dd93b537d2589b53f13879ef7b78cb0c1a82622f256232cddb10cc93f43dfae96101d929b19676d538711c91731da37b0a122120acc8df16d
-
Filesize
1KB
MD510f7df6d159ae3c7334f7d80ed890eb7
SHA1cce3cd9c31a306a04bbbd4970fe49212985e8a6f
SHA256c2ed7ab25c83b28d9a64911d58783b72bc2f2af6d372bd99fc4af3c7eb6bd4be
SHA512b62c304b3c501c2e63423e9dc6f622d4d91f2ad17c2a5b7d1487c694779466fec134e11c7eebdb9512533692da7582d8d84924a08c99fc5214f21495f0bc3039
-
Filesize
1KB
MD5c24c3f8c95f5a3f8b8bf1a06fa91a469
SHA18758530843e7af229854c0efbaeff9cbf9ff11dd
SHA2566ad57e079a1a8595b2e04b4a387fb66be31c156cab3b7bf3120185090e722d45
SHA512e9a71f64a862bfc9e6e70fe3944d4da7f54efb7eed157684bc7a25442e0d179f6a528367aaa552814cd7edcdf2e3ed71e1315163b1693d1437a35ceb612862af
-
Filesize
115B
MD50a046fc4ac62ca3278450db3c4d14330
SHA18d4cec6518773caab72c4ff79d138b62ea6c1337
SHA25602fe395561c74e117eedd1ac5f9c5d9d2be407affde144421199623ac83da6b7
SHA5120dd7829970f5406b5466017359eff58e70dd33f36092e9073ae68f2d4543cf2494dad39012705841286cbab6dcd9f84c603582e97dfaaea416e756741d419ba0
-
Filesize
2KB
MD56490060dad9933a77452e9485f773f3b
SHA1b64330f4bf670385b2dcd03493ec8e34071b1815
SHA256f4a28b882e04982c6de7eca8f63cf6329261b22cd2f5a136bc25097d5063dc64
SHA5121e0d844db7bde7ab27af64b050fb6a4c31ac6732c349c5b9fa5f92241ba3fe2cadce5bff7f294fd4843c7e2bb368038dc3c47f29466413811830f4a045c7f9e1
-
Filesize
1KB
MD53c6e884730e4da0aeb7a7f979bf5d8d0
SHA14f54504a3236d513bc05064d9032f4228acc65ab
SHA25671acec8bb8582fd7c53f3eac9119b3fdf4798db3a7c9114a5dd8d055ac9a614d
SHA51247a1b8742029ae2d60e5fb1c70ab73a53488fc211293d570710b25e11aabc80fcdbf6b0aeca0826c6f458cc724cfe7787469ad71028d4b973e124006f642716f
-
Filesize
691KB
MD5ba4c5f1d1bcfcb2ffd973415b7975399
SHA184859acf0e413a4feb037b2e51ba8aa42d6ceb7f
SHA2568c31b32dfdb39274475ca2a061ad2280e91cd47425edeeb9a136909aa26c8df4
SHA512e05549af52276b3c3bf1eee871c723d74da3d91350ce9c01da231101b61d8815cb4956e0f9a90c04dd08fc96a66eeb885ddf5819010f6f289e7df478c37ce11c
-
Filesize
54KB
MD5d03ed968e344179761906e692764a23d
SHA19b060eb5db716eb91fb0a419a1179691c0c44593
SHA256c9c6e7e2fb2197ab9fc47d4a6a7b88656aa22257ba8caf7fa0f5145434e1a3db
SHA5126aa313d2d6c7200ef84686d48740df43348463566c5a39cffba77a545c000963e7d975617186ca079f68f3eb90079329b733efb46266dde4d9a7a2f9eead95c4
-
Filesize
37KB
MD556d1d9be11aec8560139c779f353155c
SHA1b28a2b5b348fb49cd3222e6a804ab934d293bcf2
SHA256cba98b57e8c9b5d9f34b68b2b9433187705c3ef65b11b0f20373ce5e05859c96
SHA51233f65c8af6937cc680e95d3f638d6fd861ce4aedb3595c9cc16afdd072e63a36b9b6ee28aed033e5779679d2c73c943b81759abb96a6a31e5d823c9dbd27f247
-
Filesize
1.8MB
MD53f6dc271f034861cb4be850a816105e3
SHA1d83f7a11d47d4668737ff64139870bad8a8722a0
SHA2564f5d4dc959ccb0f201b2f2c761c74f6284ec90fe4d05e11813c63f584356205a
SHA5122149b342a8bb8486faf3e7ffe43b6fe66bad4b93512ed668caccdf63399a48411b92b31c99a018c92e4590584d8c0111a483f8161ec179d5f92aba2e398fa76a
-
Filesize
355KB
MD533ac85604ff109e2a297c03fc1037bf1
SHA102be88a95fc04ec73c4ed33601f832e86d5f0bb3
SHA25647c64647fe2ef3215e919295fd3627b25e85877a690d2ba940f4177cfef2678c
SHA51280c3428e0bd0585f2c4076fc814b638aeab637b2a56b37febef08f75fad426b268fcc2409cc8d09738c23ffc7d56250683b157a5e452b4b43a2bf88d4f489826
-
Filesize
777KB
MD56fdcd6d9faf849ecd71d4fa329969780
SHA13480193f5e7a37bf8a01f728566b48d56850749b
SHA256a31fbc3014712fca12637400897816c41f65627434bdde1f4c8c0c025f08bad2
SHA5125a3ddbd1abda841bc06c210f612cfde3a48016991ea6a8dc5ee00574aee1904c70695226490986465c950bf09564bf56715d2c25fcee9931f33b82dcefc2c111
-
Filesize
242KB
MD5f497a1c6f5f1faca1a05fbee72abc07a
SHA13af6939afd2cdfc3eb7e9f6ff4cf26d254f97923
SHA256ec6a6f16902d84802d0a744a6537d7bebe40b4ad9c8bce4de012c3224c98030c
SHA5123a523e91cf7e4bd3c83f4eb9a861f410fb2be7367514cb7cf9c47f9f6aa3bcf200640c53bd96acf11f2177938b27cad033f361d67eb6098cb40eb3538292d8ba
-
Filesize
355KB
MD5a0ec723d41810478bb659a85e4e92f3d
SHA124cc9fc77abcafe0dd1c5a4e547a8b4efd63c85f
SHA256dd57149bfa1348e482afddbbe79187527cbd358cdb3036fdf4e8b9f446d020cf
SHA512ed98dff026eff8501a526dc36c5f68b63adc5a1704881015d6a9f7af53e5a3a47da6aad8d054b7f7cf0821f479a016f45ad20a1b201c263a09cf8265cd772c4d
-
Filesize
108KB
MD54ed3f52e01ac04d6b1fa05ff8a41c2fe
SHA19c363a2658db7deffe5358634320671ef6fc7664
SHA256542440c178b553d4a1b01d83f05df6a1ba842571f4a9f90b06fdceab06336fe1
SHA5128fcc515adc959c5b07b4c94400f6e39d75d9ba8a9556d7f4df8891a642b967f13b9f8302ff56bebac505a8a73a3bd4980e29406ccc918fb1dd3d7acc69f776ff
-
Filesize
17KB
MD5bdb492684b7a99ee0aa1d10c1f8bf702
SHA1c7b8a53cf1481df2a4a7eb11aeb824ff8b3a4698
SHA2564919ffc0acdada4f18469d7fc76abaec4584b99709bbd276c6e9a8043be76481
SHA512479f996f7dfbad9fff8f4bf3493dcaaa680390919233fb875d08efc0e6b71a94db9eae510091496a4c99e09ed793aae87ef64bd80e55cbf94823848d2edc0d20
-
Filesize
928KB
MD59ac5812dbee6e04f5d818dc5afb46480
SHA15232fb8d2ecb4cbbd52054741282cfb86fdd6e9d
SHA25677ec589230c246ff136b9abe22691e978c30aff7c3e222be34195a671c8b3d8d
SHA512970dd347a9d1a22dc02fba0ad1d8f7ac16c00dfca97045de5453ef8c7f64fac019d89aa2e1c69fb10ea3a29388a52c163da904d7b5abec95c18f0981a054c0e0
-
Filesize
411KB
MD5bc83108b18756547013ed443b8cdb31b
SHA179bcaad3714433e01c7f153b05b781f8d7cb318d
SHA256b2ad109c15eaa92079582787b7772ba0a2f034f7d075907ff87028df0eaea671
SHA5126e72b2d40e47567b3e506be474dafa7cacd0b53cd2c2d160c3b5384f2f461fc91bb5fdb614a351f628d4e516b3bbdabc2cc6d4cb4710970146d2938a687dd011
-
Filesize
755KB
MD50e37fbfa79d349d672456923ec5fbbe3
SHA14e880fc7625ccf8d9ca799d5b94ce2b1e7597335
SHA2568793353461826fbd48f25ea8b835be204b758ce7510db2af631b28850355bd18
SHA5122bea9bd528513a3c6a54beac25096ee200a4e6ccfc2a308ae9cfd1ad8738e2e2defd477d59db527a048e5e9a4fe1fc1d771701de14ef82b4dbcdc90df0387630