Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
8Static
static
35f614b3d2a...18.exe
windows7-x64
85f614b3d2a...18.exe
windows10-2004-x64
8$PLUGINSDI...in.dll
windows7-x64
3$PLUGINSDI...in.dll
windows10-2004-x64
3$PLUGINSDI...rt.dll
windows7-x64
1$PLUGINSDI...rt.dll
windows10-2004-x64
1$PLUGINSDIR/Base.dll
windows7-x64
3$PLUGINSDIR/Base.dll
windows10-2004-x64
3$PLUGINSDI...er.dll
windows7-x64
1$PLUGINSDI...er.dll
windows10-2004-x64
1$PLUGINSDI...ol.dll
windows7-x64
3$PLUGINSDI...ol.dll
windows10-2004-x64
3$PLUGINSDI...rt.dll
windows7-x64
1$PLUGINSDI...rt.dll
windows10-2004-x64
1$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/Utils.dll
windows7-x64
3$PLUGINSDIR/Utils.dll
windows10-2004-x64
3$PLUGINSDI...00.dll
windows7-x64
3$PLUGINSDI...00.dll
windows10-2004-x64
3$PLUGINSDI...00.dll
windows7-x64
3$PLUGINSDI...00.dll
windows10-2004-x64
3$_15_/Baid...ce.dll
windows7-x64
1$_15_/Baid...ce.dll
windows10-2004-x64
1$_15_/Baid...ll.dll
windows7-x64
1$_15_/Baid...ll.dll
windows10-2004-x64
1$_15_/Baid...ot.exe
windows7-x64
1$_15_/Baid...ot.exe
windows10-2004-x64
1BDDocker.dll
windows7-x64
1BDDocker.dll
windows10-2004-x64
1BDDocker.exe
windows7-x64
1BDDocker.exe
windows10-2004-x64
1Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
20/07/2024, 06:29
Static task
static1
Behavioral task
behavioral1
Sample
5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/BDMSkin.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/BDMSkin.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/BaiduReport.dll
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/BaiduReport.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/Base.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/Base.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/InstallHelper.dll
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/InstallHelper.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/Protocol.dll
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/Protocol.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/Report.dll
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/Report.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/Utils.dll
Resource
win7-20240705-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/Utils.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/msvcp100.dll
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/msvcp100.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/msvcr100.dll
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/msvcr100.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral23
Sample
$_15_/Baidu/Baidu/plugin/extends/game/1.0.0.3/JoystickService.dll
Resource
win7-20240705-en
Behavioral task
behavioral24
Sample
$_15_/Baidu/Baidu/plugin/extends/game/1.0.0.3/JoystickService.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral25
Sample
$_15_/Baidu/Baidu/plugin/extends/jietu/2.101.0.65/jietuDll.dll
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
$_15_/Baidu/Baidu/plugin/extends/jietu/2.101.0.65/jietuDll.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral27
Sample
$_15_/Baidu/Baidu/plugin/extends/jietu/2.101.0.65/screensnapshot.exe
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
$_15_/Baidu/Baidu/plugin/extends/jietu/2.101.0.65/screensnapshot.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral29
Sample
BDDocker.dll
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
BDDocker.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral31
Sample
BDDocker.exe
Resource
win7-20240704-en
Behavioral task
behavioral32
Sample
BDDocker.exe
Resource
win10v2004-20240709-en
General
-
Target
5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe
-
Size
10.6MB
-
MD5
5f614b3d2a686b4995c38b91324d8fdb
-
SHA1
72c298fb258d9e318aba64e900e91f3174cb2dbe
-
SHA256
531313033fdb71c44c0791f56679e55c36f06fa6250f90f68ebaf42e7a2a044b
-
SHA512
778c0d3ac4a7091cd09a5a9de4b3e41ea7c94c334af6219c85cf2f275feb3345adb42221193f6aac14e84fd1110ff52afb14cf24a7e7333bcbdf60fedb41681c
-
SSDEEP
196608:NBHC8KwHrU6Ery5NXJZzkl3fP0puCSe3xb1WujMYJroJiPEgI2fPZdms:DC8K6rery5ZDzklPMpuCl50uXozCPZb
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\System32\drivers\bbnetdriver.sys 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation Baidu.exe -
Executes dropped EXE 12 IoCs
pid Process 968 Baidu.exe 2960 Baidu.exe 2516 Baidu.exe 4836 Baidu.exe 5112 Baidu.exe 2176 Baidu.exe 1144 Baidu.exe 1580 BaiduService.exe 3364 BaiduRenderClient.exe 1884 Baidu.exe 3888 BDDockerX64.exe 1160 Baidu.exe -
Loads dropped DLL 64 IoCs
pid Process 4780 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 4780 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 4780 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 4780 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 4780 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 4780 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 4780 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 4780 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 4780 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 4780 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 4780 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 4780 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 968 Baidu.exe 968 Baidu.exe 968 Baidu.exe 2960 Baidu.exe 2960 Baidu.exe 2960 Baidu.exe 968 Baidu.exe 968 Baidu.exe 2960 Baidu.exe 968 Baidu.exe 2960 Baidu.exe 2960 Baidu.exe 2516 Baidu.exe 968 Baidu.exe 2516 Baidu.exe 2516 Baidu.exe 2516 Baidu.exe 2516 Baidu.exe 2516 Baidu.exe 4836 Baidu.exe 4836 Baidu.exe 4836 Baidu.exe 4836 Baidu.exe 4836 Baidu.exe 4836 Baidu.exe 968 Baidu.exe 2516 Baidu.exe 4836 Baidu.exe 2516 Baidu.exe 2960 Baidu.exe 2960 Baidu.exe 5112 Baidu.exe 5112 Baidu.exe 5112 Baidu.exe 5112 Baidu.exe 5112 Baidu.exe 5112 Baidu.exe 5112 Baidu.exe 5112 Baidu.exe 4836 Baidu.exe 5112 Baidu.exe 5112 Baidu.exe 2176 Baidu.exe 2176 Baidu.exe 2176 Baidu.exe 2176 Baidu.exe 2176 Baidu.exe 2176 Baidu.exe 2176 Baidu.exe 2176 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe -
Unexpected DNS network traffic destination 64 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 180.76.76.76 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 180.76.76.76 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 180.76.76.76 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 180.76.76.76 Destination IP 114.114.114.114 Destination IP 180.76.76.76 Destination IP 180.76.76.76 Destination IP 180.76.76.76 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 180.76.76.76 Destination IP 180.76.76.76 Destination IP 114.114.114.114 Destination IP 180.76.76.76 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 180.76.76.76 Destination IP 180.76.76.76 Destination IP 180.76.76.76 Destination IP 180.76.76.76 Destination IP 114.114.114.114 Destination IP 180.76.76.76 Destination IP 180.76.76.76 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 180.76.76.76 Destination IP 180.76.76.76 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 180.76.76.76 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 180.76.76.76 Destination IP 114.114.114.114 Destination IP 180.76.76.76 Destination IP 114.114.114.114 Destination IP 180.76.76.76 Destination IP 180.76.76.76 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 180.76.76.76 Destination IP 180.76.76.76 Destination IP 114.114.114.114 Destination IP 180.76.76.76 Destination IP 180.76.76.76 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 180.76.76.76 Destination IP 180.76.76.76 Destination IP 114.114.114.114 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\BaiduClient = "\"C:\\Users\\Admin\\AppData\\Local\\Baidu\\BaiduClient\\3.0.0.2873\\Baidu.exe\" --auto-run" 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: BaiduService.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 5 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 Baidu.exe File opened for modification \??\PhysicalDrive0 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe File opened for modification \??\PhysicalDrive0 Baidu.exe File opened for modification \??\PhysicalDrive0 Baidu.exe File opened for modification \??\PhysicalDrive0 BaiduRenderClient.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 4 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 Baidu.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName Baidu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 Baidu.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName Baidu.exe -
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPoicy\{73F970DA-48AC-43F1-9848-FB90504CE3E9}\AppPath = "C:\\Users\\Admin\\AppData\\Local\\Baidu\\BaiduClient\\3.0.0.2873" 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPoicy\{73F970DA-48AC-43F1-9848-FB90504CE3E9}\Policy = "3" 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPoicy\{73F970DA-48AC-43F1-9848-FB90504CE3E9} 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPoicy 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPoicy\{73F970DA-48AC-43F1-9848-FB90504CE3E9}\AppName = "Baidu.exe" 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4780 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 4780 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 4780 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 4780 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 4780 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 4780 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 4780 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 4780 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 4780 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 4780 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 4780 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 4780 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 4780 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 4780 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 4780 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 4780 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 4780 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 4780 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 4780 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 4780 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 4780 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 4780 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 3364 BaiduRenderClient.exe 3364 BaiduRenderClient.exe 3464 Explorer.EXE 3464 Explorer.EXE 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 668 Process not Found -
Suspicious use of AdjustPrivilegeToken 27 IoCs
description pid Process Token: SeDebugPrivilege 4780 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe Token: SeDebugPrivilege 4780 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe Token: SeDebugPrivilege 4780 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe Token: SeDebugPrivilege 4780 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe Token: SeDebugPrivilege 4780 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe Token: SeDebugPrivilege 4780 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe Token: SeDebugPrivilege 4780 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe Token: SeDebugPrivilege 4780 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe Token: SeDebugPrivilege 4780 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe Token: SeDebugPrivilege 4780 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe Token: SeDebugPrivilege 3888 BDDockerX64.exe Token: SeShutdownPrivilege 3464 Explorer.EXE Token: SeCreatePagefilePrivilege 3464 Explorer.EXE Token: SeShutdownPrivilege 3464 Explorer.EXE Token: SeCreatePagefilePrivilege 3464 Explorer.EXE Token: SeShutdownPrivilege 3464 Explorer.EXE Token: SeCreatePagefilePrivilege 3464 Explorer.EXE Token: SeShutdownPrivilege 3464 Explorer.EXE Token: SeCreatePagefilePrivilege 3464 Explorer.EXE Token: SeShutdownPrivilege 3464 Explorer.EXE Token: SeCreatePagefilePrivilege 3464 Explorer.EXE Token: SeShutdownPrivilege 3464 Explorer.EXE Token: SeCreatePagefilePrivilege 3464 Explorer.EXE Token: SeShutdownPrivilege 3464 Explorer.EXE Token: SeCreatePagefilePrivilege 3464 Explorer.EXE Token: SeShutdownPrivilege 3464 Explorer.EXE Token: SeCreatePagefilePrivilege 3464 Explorer.EXE -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 3888 BDDockerX64.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 3464 Explorer.EXE 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 1144 Baidu.exe 1144 Baidu.exe 1144 Baidu.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1144 Baidu.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 4780 wrote to memory of 968 4780 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 87 PID 4780 wrote to memory of 968 4780 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 87 PID 4780 wrote to memory of 968 4780 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 87 PID 4780 wrote to memory of 2960 4780 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 88 PID 4780 wrote to memory of 2960 4780 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 88 PID 4780 wrote to memory of 2960 4780 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 88 PID 4780 wrote to memory of 2516 4780 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 89 PID 4780 wrote to memory of 2516 4780 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 89 PID 4780 wrote to memory of 2516 4780 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 89 PID 4780 wrote to memory of 4836 4780 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 90 PID 4780 wrote to memory of 4836 4780 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 90 PID 4780 wrote to memory of 4836 4780 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 90 PID 4780 wrote to memory of 2176 4780 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 91 PID 4780 wrote to memory of 2176 4780 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 91 PID 4780 wrote to memory of 2176 4780 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 91 PID 4780 wrote to memory of 5112 4780 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 92 PID 4780 wrote to memory of 5112 4780 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 92 PID 4780 wrote to memory of 5112 4780 5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe 92 PID 1144 wrote to memory of 3364 1144 Baidu.exe 96 PID 1144 wrote to memory of 3364 1144 Baidu.exe 96 PID 1144 wrote to memory of 3364 1144 Baidu.exe 96 PID 1144 wrote to memory of 3888 1144 Baidu.exe 97 PID 1144 wrote to memory of 3888 1144 Baidu.exe 97 PID 1144 wrote to memory of 1884 1144 Baidu.exe 98 PID 1144 wrote to memory of 1884 1144 Baidu.exe 98 PID 1144 wrote to memory of 1884 1144 Baidu.exe 98 PID 1144 wrote to memory of 1160 1144 Baidu.exe 99 PID 1144 wrote to memory of 1160 1144 Baidu.exe 99 PID 1144 wrote to memory of 1160 1144 Baidu.exe 99 PID 3888 wrote to memory of 3464 3888 BDDockerX64.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3464 -
C:\Users\Admin\AppData\Local\Temp\5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5f614b3d2a686b4995c38b91324d8fdb_JaffaCakes118.exe"2⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Adds Run key to start application
- Writes to the Master Boot Record (MBR)
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\Baidu.exe"C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\Baidu.exe" -p 1 --inst-task 12#03⤵
- Executes dropped EXE
- Loads dropped DLL
PID:968
-
-
C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\Baidu.exe"C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\Baidu.exe" -p 1 --inst-task 12#13⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2960
-
-
C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\Baidu.exe"C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\Baidu.exe" -p 1 --inst-task 113⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2516
-
-
C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\Baidu.exe"C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\Baidu.exe" --inst-task 5 -p 13⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4836
-
-
C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\Baidu.exe"C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\Baidu.exe" --inst-task 2#"C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873" -p 13⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2176
-
-
C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\Baidu.exe"C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\Baidu.exe" -p 5 -t 03⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
PID:5112
-
-
-
C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\Baidu.exe"C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\Baidu.exe" --main-frame 0 --search-bar 2 --tray 12⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\wrs\BaiduRenderClient.exe"C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\wrs\BaiduRenderClient.exe" --breakpad="\\.\pipe\crashservice.1144.0.7162" --humming-dir="C:\Users\Admin\AppData\Roaming\Baidu\Baidu\plugin" --main-frame="" --search-bar="" --service-exe="BaiduRenderClient.exe" --tray="" --xchannel="\\.\pipe\ipc.1144.0.7162" --xtype="service" /prefetch:13⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
PID:3364
-
-
C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\BDDockerX64.exe"C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\BDDockerX64.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3888
-
-
C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\Baidu.exe"C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\Baidu.exe" -p 3 -r 1144 -c 3 -m 4913442588168 --magic-number 49134425881683⤵
- Executes dropped EXE
PID:1884
-
-
C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\Baidu.exe"C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\Baidu.exe" -p 2 -r 1144 -c 4 -m 4913442588168 --magic-number 49134425881683⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:1160
-
-
-
C:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\BaiduService.exeC:\Users\Admin\AppData\Local\Baidu\BaiduClient\3.0.0.2873\BaiduService.exe1⤵
- Executes dropped EXE
- Enumerates connected drives
PID:1580
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.2MB
MD5886bba974f16c61dd0334c57f29f3115
SHA1d88e5adc88a25308f70f6dc9419b011406041301
SHA2565a8d383f4978a0f2f42666cb9dc5f156373200ff0ea54e650af07e2c5a5f2646
SHA512fc90ca9a37dddfa07683f7d2e25740a1d3b9324df8313ca0009703555ae144ce2f31324aadc7976c95b7633ff5d18ef58da7db84461e95ba84c4eeb81a925826
-
Filesize
691KB
MD5ba4c5f1d1bcfcb2ffd973415b7975399
SHA184859acf0e413a4feb037b2e51ba8aa42d6ceb7f
SHA2568c31b32dfdb39274475ca2a061ad2280e91cd47425edeeb9a136909aa26c8df4
SHA512e05549af52276b3c3bf1eee871c723d74da3d91350ce9c01da231101b61d8815cb4956e0f9a90c04dd08fc96a66eeb885ddf5819010f6f289e7df478c37ce11c
-
Filesize
64KB
MD51ff6574d1406cddb05c20b41984c76f2
SHA1d94c1991719a7e8745459ef2ee59baf3c2d80b72
SHA25654271a03e8feca3ade1ebc75207fe29636115210247e895aad371ebb6cc1b5ef
SHA5121bbe6ada115d5d1e508f2babab68afda96db31477e43f969bc8f60f91b336ae1bbb19e232cc0a7b50aea8577cbc7f8931bda6f7e792bc20fb308296414c68383
-
Filesize
54KB
MD5d03ed968e344179761906e692764a23d
SHA19b060eb5db716eb91fb0a419a1179691c0c44593
SHA256c9c6e7e2fb2197ab9fc47d4a6a7b88656aa22257ba8caf7fa0f5145434e1a3db
SHA5126aa313d2d6c7200ef84686d48740df43348463566c5a39cffba77a545c000963e7d975617186ca079f68f3eb90079329b733efb46266dde4d9a7a2f9eead95c4
-
Filesize
256KB
MD5379a2975c9e06ac8b533bc9efc1cfc0a
SHA1a171f4c707bd3870d6e4bef184cb66903ab2e8f8
SHA2568c0adb58a7bf819ecef2fd5bca9447255790603567425e590f77275a0b2216a0
SHA512626a86e8db4258e97dfafcbb13acdf891355ee58dd82333127e304532ad73ee5fd1ec6132b49306c5a1522c298d15afbe3d633cdac489b503c02debd4ac58a23
-
Filesize
37KB
MD556d1d9be11aec8560139c779f353155c
SHA1b28a2b5b348fb49cd3222e6a804ab934d293bcf2
SHA256cba98b57e8c9b5d9f34b68b2b9433187705c3ef65b11b0f20373ce5e05859c96
SHA51233f65c8af6937cc680e95d3f638d6fd861ce4aedb3595c9cc16afdd072e63a36b9b6ee28aed033e5779679d2c73c943b81759abb96a6a31e5d823c9dbd27f247
-
Filesize
905KB
MD5f3482cb7643db3dfe3e78dd32514277c
SHA193c4f50c18128bc4a77b5d85826f3f29ce56f68a
SHA256c8c300ab2b4bdebd6fdfe4e92b46be4977f851261677b5bd2500a10ce00771c7
SHA51245c7a13b9781d87dd93b537d2589b53f13879ef7b78cb0c1a82622f256232cddb10cc93f43dfae96101d929b19676d538711c91731da37b0a122120acc8df16d
-
Filesize
1KB
MD5c4a6d1a86c9021a1758aa506469dc939
SHA1ac89f6fa915a7ab230d2101571b51f8d4d3beb44
SHA256ea9bcb5931196b2cff7fa4c555ba28401557d00a0fb9f84a7033d71659a86fb7
SHA5125c0ba14da69eca03e72c02ad9d03e824d80168a1eaa1df8d3061d1d7ffbefa96bec225876adbe948f7e42c62a2f31570b12cf2a213ec2cb3cf8e85c0659c8618
-
Filesize
479B
MD535c7f94b3987af7e54b61609d0836da9
SHA1202b622d365f4c160a99d6c96431d9a7bae19f06
SHA256a9a63ed52d89eea36adfefece316a97381ef5c542653708affb11bf5de07dc6b
SHA512bd9ca76902e5d40a004b236d03364e56cad515dba8df50c3dc3c95ea0db69361d9662d993d7585593bd376f718317d18b4a4078dc3f9f4e27c103746b4e23359
-
Filesize
1.8MB
MD53f6dc271f034861cb4be850a816105e3
SHA1d83f7a11d47d4668737ff64139870bad8a8722a0
SHA2564f5d4dc959ccb0f201b2f2c761c74f6284ec90fe4d05e11813c63f584356205a
SHA5122149b342a8bb8486faf3e7ffe43b6fe66bad4b93512ed668caccdf63399a48411b92b31c99a018c92e4590584d8c0111a483f8161ec179d5f92aba2e398fa76a
-
Filesize
355KB
MD533ac85604ff109e2a297c03fc1037bf1
SHA102be88a95fc04ec73c4ed33601f832e86d5f0bb3
SHA25647c64647fe2ef3215e919295fd3627b25e85877a690d2ba940f4177cfef2678c
SHA51280c3428e0bd0585f2c4076fc814b638aeab637b2a56b37febef08f75fad426b268fcc2409cc8d09738c23ffc7d56250683b157a5e452b4b43a2bf88d4f489826
-
Filesize
777KB
MD56fdcd6d9faf849ecd71d4fa329969780
SHA13480193f5e7a37bf8a01f728566b48d56850749b
SHA256a31fbc3014712fca12637400897816c41f65627434bdde1f4c8c0c025f08bad2
SHA5125a3ddbd1abda841bc06c210f612cfde3a48016991ea6a8dc5ee00574aee1904c70695226490986465c950bf09564bf56715d2c25fcee9931f33b82dcefc2c111
-
Filesize
242KB
MD5f497a1c6f5f1faca1a05fbee72abc07a
SHA13af6939afd2cdfc3eb7e9f6ff4cf26d254f97923
SHA256ec6a6f16902d84802d0a744a6537d7bebe40b4ad9c8bce4de012c3224c98030c
SHA5123a523e91cf7e4bd3c83f4eb9a861f410fb2be7367514cb7cf9c47f9f6aa3bcf200640c53bd96acf11f2177938b27cad033f361d67eb6098cb40eb3538292d8ba
-
Filesize
355KB
MD5a0ec723d41810478bb659a85e4e92f3d
SHA124cc9fc77abcafe0dd1c5a4e547a8b4efd63c85f
SHA256dd57149bfa1348e482afddbbe79187527cbd358cdb3036fdf4e8b9f446d020cf
SHA512ed98dff026eff8501a526dc36c5f68b63adc5a1704881015d6a9f7af53e5a3a47da6aad8d054b7f7cf0821f479a016f45ad20a1b201c263a09cf8265cd772c4d
-
Filesize
108KB
MD54ed3f52e01ac04d6b1fa05ff8a41c2fe
SHA19c363a2658db7deffe5358634320671ef6fc7664
SHA256542440c178b553d4a1b01d83f05df6a1ba842571f4a9f90b06fdceab06336fe1
SHA5128fcc515adc959c5b07b4c94400f6e39d75d9ba8a9556d7f4df8891a642b967f13b9f8302ff56bebac505a8a73a3bd4980e29406ccc918fb1dd3d7acc69f776ff
-
Filesize
17KB
MD5bdb492684b7a99ee0aa1d10c1f8bf702
SHA1c7b8a53cf1481df2a4a7eb11aeb824ff8b3a4698
SHA2564919ffc0acdada4f18469d7fc76abaec4584b99709bbd276c6e9a8043be76481
SHA512479f996f7dfbad9fff8f4bf3493dcaaa680390919233fb875d08efc0e6b71a94db9eae510091496a4c99e09ed793aae87ef64bd80e55cbf94823848d2edc0d20
-
Filesize
928KB
MD59ac5812dbee6e04f5d818dc5afb46480
SHA15232fb8d2ecb4cbbd52054741282cfb86fdd6e9d
SHA25677ec589230c246ff136b9abe22691e978c30aff7c3e222be34195a671c8b3d8d
SHA512970dd347a9d1a22dc02fba0ad1d8f7ac16c00dfca97045de5453ef8c7f64fac019d89aa2e1c69fb10ea3a29388a52c163da904d7b5abec95c18f0981a054c0e0
-
Filesize
411KB
MD5bc83108b18756547013ed443b8cdb31b
SHA179bcaad3714433e01c7f153b05b781f8d7cb318d
SHA256b2ad109c15eaa92079582787b7772ba0a2f034f7d075907ff87028df0eaea671
SHA5126e72b2d40e47567b3e506be474dafa7cacd0b53cd2c2d160c3b5384f2f461fc91bb5fdb614a351f628d4e516b3bbdabc2cc6d4cb4710970146d2938a687dd011
-
Filesize
755KB
MD50e37fbfa79d349d672456923ec5fbbe3
SHA14e880fc7625ccf8d9ca799d5b94ce2b1e7597335
SHA2568793353461826fbd48f25ea8b835be204b758ce7510db2af631b28850355bd18
SHA5122bea9bd528513a3c6a54beac25096ee200a4e6ccfc2a308ae9cfd1ad8738e2e2defd477d59db527a048e5e9a4fe1fc1d771701de14ef82b4dbcdc90df0387630
-
Filesize
115B
MD50a046fc4ac62ca3278450db3c4d14330
SHA18d4cec6518773caab72c4ff79d138b62ea6c1337
SHA25602fe395561c74e117eedd1ac5f9c5d9d2be407affde144421199623ac83da6b7
SHA5120dd7829970f5406b5466017359eff58e70dd33f36092e9073ae68f2d4543cf2494dad39012705841286cbab6dcd9f84c603582e97dfaaea416e756741d419ba0
-
Filesize
2KB
MD56490060dad9933a77452e9485f773f3b
SHA1b64330f4bf670385b2dcd03493ec8e34071b1815
SHA256f4a28b882e04982c6de7eca8f63cf6329261b22cd2f5a136bc25097d5063dc64
SHA5121e0d844db7bde7ab27af64b050fb6a4c31ac6732c349c5b9fa5f92241ba3fe2cadce5bff7f294fd4843c7e2bb368038dc3c47f29466413811830f4a045c7f9e1