Analysis
-
max time kernel
149s -
max time network
158s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22-07-2024 21:11
Static task
static1
Behavioral task
behavioral1
Sample
64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe
-
Size
528KB
-
MD5
64d22cd45ad2ad2769b638bce0dc9b32
-
SHA1
15a4412a0ff25685271affac97fabaede8bf44e3
-
SHA256
9d24d509108aaeac24ced22ff671e6378a5b84eac3920831377c1a4a5c60c5f1
-
SHA512
75ea481a4eaee9d3e779f9f4c925f65c470661a6c2c93728a570b23930674508f365bdcc447042d438b43f2f6a0aa6d23280b74ce1a381026c04308563411f70
-
SSDEEP
12288:jPsH9Cr3fo7upvtAYoRBPNo/CiHfc3BZU0vHeLCbqHdq8qPuqVFX:jPLr3Q74toRBYCCkjU0fmHdgum
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts 36bd.exe -
Executes dropped EXE 4 IoCs
pid Process 2652 36bd.exe 2348 36bd.exe 2464 36bd.exe 2564 mtv.exe -
Loads dropped DLL 53 IoCs
pid Process 748 regsvr32.exe 3024 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe 3024 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe 2652 36bd.exe 2652 36bd.exe 2652 36bd.exe 3024 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe 3024 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe 2348 36bd.exe 2348 36bd.exe 2348 36bd.exe 2464 36bd.exe 3024 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe 3024 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe 2564 mtv.exe 2564 mtv.exe 2564 mtv.exe 2104 rundll32.exe 2104 rundll32.exe 2104 rundll32.exe 2104 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2032 rundll32.exe 2464 36bd.exe 2464 36bd.exe 2464 36bd.exe 2464 36bd.exe 2464 36bd.exe 2464 36bd.exe 2464 36bd.exe 2464 36bd.exe 2464 36bd.exe 2464 36bd.exe 2464 36bd.exe 2464 36bd.exe 2464 36bd.exe 2464 36bd.exe 2464 36bd.exe 2464 36bd.exe 2464 36bd.exe 2464 36bd.exe 2464 36bd.exe 2464 36bd.exe 2464 36bd.exe 2464 36bd.exe 2464 36bd.exe 2464 36bd.exe 2464 36bd.exe 2464 36bd.exe 2464 36bd.exe 2464 36bd.exe -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{EBF93111-7A1D-4843-A998-0AFE8FE5F325} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{EBF93111-7A1D-4843-A998-0AFE8FE5F325}\ regsvr32.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 3 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 rundll32.exe File opened for modification \??\PhysicalDrive0 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe File opened for modification \??\PhysicalDrive0 36bd.exe -
Drops file in System32 directory 20 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\4bl4.dlltmp 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\c6cb.dll 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\b33d.exe 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\36be.dll 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\b33o.dll 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\3ce8.dll 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\b3rc.exe 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\c35s.dll 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\b33o.dlltmp 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe File created C:\Windows\SysWOW64\-6293-93-59 rundll32.exe File opened for modification C:\Windows\SysWOW64\4bl4.dll 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\36ud.exe 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\c6cb.dlltmp 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\s.exe mtv.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat rundll32.exe File opened for modification C:\Windows\SysWOW64\bba6.dll 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\353r.dll 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\353r.dlltmp 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\36bd.exe 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe File created C:\Windows\SysWOW64\0dc3 rundll32.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File opened for modification C:\Windows\b3cd.exe 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe File opened for modification C:\Windows\d48.flv 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe File opened for modification C:\Windows\80a.bmp 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe File opened for modification C:\Windows\0acu.bmp 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe File opened for modification C:\Windows\d48d.exe 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe File opened for modification C:\Windows\cd4u.bmp 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe File opened for modification C:\Windows\b5b3.bmp 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe File opened for modification C:\Windows\3cdd.flv 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe File opened for modification C:\Windows\cd4d.exe 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe File created C:\Windows\Tasks\ms.job 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe File opened for modification C:\Windows\436b.flv 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe File opened for modification C:\Windows\480.exe 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe File opened for modification C:\Windows\cd4d.flv 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 47 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F9BCCE2C-1787-4F98-A27F-D9A0CD54F9F9} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F9BCCE2C-1787-4F98-A27F-D9A0CD54F9F9} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{92379EF0-EBF8-43AA-B33D-D05008038B36}\1.0\0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{92379EF0-EBF8-43AA-B33D-D05008038B36}\1.0\0\win32\ = "C:\\Windows\\SysWow64\\b33o.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBF93111-7A1D-4843-A998-0AFE8FE5F325}\ = "CTttPlayer Object" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBF93111-7A1D-4843-A998-0AFE8FE5F325}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBF93111-7A1D-4843-A998-0AFE8FE5F325}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBF93111-7A1D-4843-A998-0AFE8FE5F325}\InprocServer32\ThreadingModel = "apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{92379EF0-EBF8-43AA-B33D-D05008038B36}\1.0\0\win32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F9BCCE2C-1787-4F98-A27F-D9A0CD54F9F9}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.TttPlayer.1 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.TttPlayer regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F9BCCE2C-1787-4F98-A27F-D9A0CD54F9F9}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F9BCCE2C-1787-4F98-A27F-D9A0CD54F9F9}\TypeLib\ = "{92379EF0-EBF8-43AA-B33D-D05008038B36}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBF93111-7A1D-4843-A998-0AFE8FE5F325}\InprocServer32\ = "C:\\Windows\\SysWow64\\b33o.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{92379EF0-EBF8-43AA-B33D-D05008038B36}\1.0\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F9BCCE2C-1787-4F98-A27F-D9A0CD54F9F9}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.TttPlayer\ = "CTttPlayer Object" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBF93111-7A1D-4843-A998-0AFE8FE5F325}\VersionIndependentProgID\ = "BHO.TttPlayer" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{92379EF0-EBF8-43AA-B33D-D05008038B36}\1.0\FLAGS\ = "0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{92379EF0-EBF8-43AA-B33D-D05008038B36}\1.0\HELPDIR\ = "C:\\Windows\\SysWow64\\" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F9BCCE2C-1787-4F98-A27F-D9A0CD54F9F9}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F9BCCE2C-1787-4F98-A27F-D9A0CD54F9F9}\TypeLib\ = "{92379EF0-EBF8-43AA-B33D-D05008038B36}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F9BCCE2C-1787-4F98-A27F-D9A0CD54F9F9}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.TttPlayer.1\CLSID\ = "{EBF93111-7A1D-4843-A998-0AFE8FE5F325}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBF93111-7A1D-4843-A998-0AFE8FE5F325} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBF93111-7A1D-4843-A998-0AFE8FE5F325}\TypeLib\ = "{92379EF0-EBF8-43AA-B33D-D05008038B36}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{92379EF0-EBF8-43AA-B33D-D05008038B36}\1.0\FLAGS regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F9BCCE2C-1787-4F98-A27F-D9A0CD54F9F9}\ = "ITttPlayer" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBF93111-7A1D-4843-A998-0AFE8FE5F325}\ProgID\ = "BHO.TttPlayer.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBF93111-7A1D-4843-A998-0AFE8FE5F325}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.TttPlayer\CLSID\ = "{EBF93111-7A1D-4843-A998-0AFE8FE5F325}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.TttPlayer\CurVer regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBF93111-7A1D-4843-A998-0AFE8FE5F325}\VersionIndependentProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{92379EF0-EBF8-43AA-B33D-D05008038B36}\1.0\ = "BHO 1.0 Type Library" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F9BCCE2C-1787-4F98-A27F-D9A0CD54F9F9}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.TttPlayer.1\ = "CTttPlayer Object" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.TttPlayer.1\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBF93111-7A1D-4843-A998-0AFE8FE5F325}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{92379EF0-EBF8-43AA-B33D-D05008038B36}\1.0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F9BCCE2C-1787-4F98-A27F-D9A0CD54F9F9}\ = "ITttPlayer" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F9BCCE2C-1787-4F98-A27F-D9A0CD54F9F9}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F9BCCE2C-1787-4F98-A27F-D9A0CD54F9F9}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.TttPlayer\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.TttPlayer\CurVer\ = "BHO.TttPlayer.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBF93111-7A1D-4843-A998-0AFE8FE5F325}\AppID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{92379EF0-EBF8-43AA-B33D-D05008038B36} regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2464 36bd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2564 mtv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3024 wrote to memory of 2752 3024 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe 30 PID 3024 wrote to memory of 2752 3024 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe 30 PID 3024 wrote to memory of 2752 3024 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe 30 PID 3024 wrote to memory of 2752 3024 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe 30 PID 3024 wrote to memory of 2752 3024 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe 30 PID 3024 wrote to memory of 2752 3024 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe 30 PID 3024 wrote to memory of 2752 3024 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe 30 PID 3024 wrote to memory of 2836 3024 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe 31 PID 3024 wrote to memory of 2836 3024 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe 31 PID 3024 wrote to memory of 2836 3024 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe 31 PID 3024 wrote to memory of 2836 3024 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe 31 PID 3024 wrote to memory of 2836 3024 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe 31 PID 3024 wrote to memory of 2836 3024 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe 31 PID 3024 wrote to memory of 2836 3024 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe 31 PID 3024 wrote to memory of 2624 3024 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe 32 PID 3024 wrote to memory of 2624 3024 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe 32 PID 3024 wrote to memory of 2624 3024 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe 32 PID 3024 wrote to memory of 2624 3024 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe 32 PID 3024 wrote to memory of 2624 3024 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe 32 PID 3024 wrote to memory of 2624 3024 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe 32 PID 3024 wrote to memory of 2624 3024 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe 32 PID 3024 wrote to memory of 2676 3024 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe 33 PID 3024 wrote to memory of 2676 3024 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe 33 PID 3024 wrote to memory of 2676 3024 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe 33 PID 3024 wrote to memory of 2676 3024 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe 33 PID 3024 wrote to memory of 2676 3024 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe 33 PID 3024 wrote to memory of 2676 3024 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe 33 PID 3024 wrote to memory of 2676 3024 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe 33 PID 3024 wrote to memory of 748 3024 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe 34 PID 3024 wrote to memory of 748 3024 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe 34 PID 3024 wrote to memory of 748 3024 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe 34 PID 3024 wrote to memory of 748 3024 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe 34 PID 3024 wrote to memory of 748 3024 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe 34 PID 3024 wrote to memory of 748 3024 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe 34 PID 3024 wrote to memory of 748 3024 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe 34 PID 3024 wrote to memory of 2652 3024 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe 35 PID 3024 wrote to memory of 2652 3024 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe 35 PID 3024 wrote to memory of 2652 3024 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe 35 PID 3024 wrote to memory of 2652 3024 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe 35 PID 3024 wrote to memory of 2652 3024 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe 35 PID 3024 wrote to memory of 2652 3024 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe 35 PID 3024 wrote to memory of 2652 3024 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe 35 PID 3024 wrote to memory of 2348 3024 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe 37 PID 3024 wrote to memory of 2348 3024 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe 37 PID 3024 wrote to memory of 2348 3024 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe 37 PID 3024 wrote to memory of 2348 3024 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe 37 PID 3024 wrote to memory of 2348 3024 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe 37 PID 3024 wrote to memory of 2348 3024 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe 37 PID 3024 wrote to memory of 2348 3024 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe 37 PID 3024 wrote to memory of 2564 3024 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe 40 PID 3024 wrote to memory of 2564 3024 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe 40 PID 3024 wrote to memory of 2564 3024 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe 40 PID 3024 wrote to memory of 2564 3024 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe 40 PID 3024 wrote to memory of 2564 3024 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe 40 PID 3024 wrote to memory of 2564 3024 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe 40 PID 3024 wrote to memory of 2564 3024 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe 40 PID 2464 wrote to memory of 2104 2464 36bd.exe 41 PID 2464 wrote to memory of 2104 2464 36bd.exe 41 PID 2464 wrote to memory of 2104 2464 36bd.exe 41 PID 2464 wrote to memory of 2104 2464 36bd.exe 41 PID 2464 wrote to memory of 2104 2464 36bd.exe 41 PID 2464 wrote to memory of 2104 2464 36bd.exe 41 PID 2464 wrote to memory of 2104 2464 36bd.exe 41 PID 3024 wrote to memory of 2032 3024 64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\64d22cd45ad2ad2769b638bce0dc9b32_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32/4bl4.dll"2⤵PID:2752
-
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32/c6cb.dll"2⤵PID:2836
-
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32/353r.dll"2⤵PID:2624
-
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32/b33o.dll"2⤵PID:2676
-
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /s "C:\Windows\system32/b33o.dll"2⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:748
-
-
C:\Windows\SysWOW64\36bd.exeC:\Windows\system32/36bd.exe -i2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2652
-
-
C:\Windows\SysWOW64\36bd.exeC:\Windows\system32/36bd.exe -s2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2348
-
-
C:\Users\Admin\AppData\Local\Temp\h8nil4o8\mtv.exeC:\Users\Admin\AppData\Local\Temp\h8nil4o8\mtv.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:2564
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32 C:\Windows\system32/36be.dll, Always2⤵
- Loads dropped DLL
PID:2032
-
-
C:\Windows\SysWOW64\36bd.exeC:\Windows\SysWOW64\36bd.exe1⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32 C:\Windows\system32/36be.dll,Always2⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
PID:2104
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
115KB
MD5cbe8d9327071ebd627a41367bd649964
SHA18a185061b767fe1a45f83c8e056b2b963da816cf
SHA2567fd47308f059705c8cecb00d6ac473795fcbecd04c849084744d8473cbbe9849
SHA51269142d0f4aecfd15a7b9e1b78505ca6aa076790f31e914426e287aa35c48d502c003e2f2762a829dc33d6fa40bc61afee18445f591227c28b2ef15b7d3f59580
-
Filesize
72KB
MD51858978af51266632c483ba738911b4f
SHA169c66bc78efeb1fe4ec562c8bdfbbc6e54434fd8
SHA2564b85da0bbbdbf411548a43bd6a319c203e438daa87d21c5c9034ee6e65ac0d22
SHA5123a3152dbd0d06dd97af4164b75acdf6f30aafb9016a5aeebb9da42c99868cb91d3a013dabd406cfe035b63b2da713f040fcbbe3a49d5e91a557b2b2f5b91e34a
-
Filesize
386KB
MD5889d5db2ee1dce0cd2923b2f98fcffab
SHA140cfb113d6d86bd9798c56f76b8e5ebc2f58f1aa
SHA2565a5b4ad40b7f946041efde0b277ea98a0a786616e810b6a45b301a9c1ca3de2f
SHA5122e64716e0e8f275d6f731c29bd6d9214893f473098dccbff4439dbb98680b413463bed273ac88016985827ad5948857813856133af957a65bb58e31728e9003b
-
Filesize
224KB
MD55a8888018336c7e49f11c7c45c93209f
SHA1c5b4b31bc15a0da31ad0c27485d90e0f067b2c54
SHA256dc26a111427fc4dbb2ceb1d1dea4a08d8397f2f34a6b79e296230a4089572928
SHA512c827f7891c178a8a320606313b3922875fc7660b7b40f17fa2fbaef995c1da55cec26b7c7e53f383f579e91222d460cd88311a5386560b3c789025050b9e1adf
-
Filesize
152KB
MD5b662c70b2ba04b2f6ceda31211ec2e4e
SHA174893abbfda55b387d9f832e828b5c741709484d
SHA25641c63cc3b377c73d24c4c483af66e832ed8be398bcb81ecd31cc85eedb6de643
SHA5122c02c47952463cb9730096483a8eb85c6abfb64d1d93ebb1847a56e96eb88f708c356094dcc03f122dd8a32e9b840d2a1dddc5b25c6faf153e144f803719a818