Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23/07/2024, 19:45
Static task
static1
Behavioral task
behavioral1
Sample
68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe
-
Size
449KB
-
MD5
68ab36de0b34e529b6ddd96c8f98075b
-
SHA1
ab77409aa0e5af627ab7cf5cf3c6bd60842020c2
-
SHA256
39a3d42c051389be8c9743e097e1c53a1d119360d4f346b0809726ed42306665
-
SHA512
f20791515d7c55a55690baf4dc0e6399c94542a8943193ba916bc0e84e73242db1d5301adfe0b7813d8c57a2ef71bf0dd9f3bd6d0a2fc7ecfe32985e766a248c
-
SSDEEP
6144:JIbvnxNLgaJ5l72Xb+RgTWKvkPvy6nPuupjf3hEsjH8ZRwnt6l+vCTEM0Mb55yZ8:JmvHgU/OCPK8y6im9FiEXMiTF8
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modifies firewall policy service 3 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Windows\system32\jushed.exe = "C:\\Windows\\system32\\jushed.exe:*:Enabled:Explorer" 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe -
ModiLoader Second Stage 14 IoCs
resource yara_rule behavioral2/memory/3504-18-0x0000000000400000-0x000000000042C000-memory.dmp modiloader_stage2 behavioral2/memory/2424-19-0x0000000000400000-0x000000000042C000-memory.dmp modiloader_stage2 behavioral2/memory/3504-20-0x0000000000400000-0x000000000042C000-memory.dmp modiloader_stage2 behavioral2/memory/3504-16-0x0000000000400000-0x000000000042C000-memory.dmp modiloader_stage2 behavioral2/memory/3504-22-0x0000000000400000-0x000000000042C000-memory.dmp modiloader_stage2 behavioral2/memory/3504-36-0x0000000000400000-0x000000000042C000-memory.dmp modiloader_stage2 behavioral2/memory/3504-37-0x0000000000400000-0x000000000042C000-memory.dmp modiloader_stage2 behavioral2/memory/3504-72-0x0000000000400000-0x000000000042C000-memory.dmp modiloader_stage2 behavioral2/memory/2600-79-0x0000000000400000-0x000000000042C000-memory.dmp modiloader_stage2 behavioral2/memory/4904-78-0x0000000000400000-0x000000000042C000-memory.dmp modiloader_stage2 behavioral2/memory/2600-82-0x0000000000400000-0x000000000042C000-memory.dmp modiloader_stage2 behavioral2/memory/2600-81-0x0000000000400000-0x000000000042C000-memory.dmp modiloader_stage2 behavioral2/memory/2600-80-0x0000000000400000-0x000000000042C000-memory.dmp modiloader_stage2 behavioral2/memory/2600-90-0x0000000000400000-0x000000000042C000-memory.dmp modiloader_stage2 -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run mplay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Windows Media Player = "C:\\Windows\\mplay.exe" mplay.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7U56KFDB-4036-J8SX-U8JI-6512121AP505} mplay.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7U56KFDB-4036-J8SX-U8JI-6512121AP505}\StubPath = "\"C:\\Windows\\mplay.exe\"" mplay.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\Control Panel\International\Geo\Nation javaup500.exe -
Executes dropped EXE 5 IoCs
pid Process 2424 javaup500.exe 2476 javaup521.exe 3504 javaup500.exe 4904 mplay.exe 2600 mplay.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SunJavaUpdateScheduler = "C:\\Windows\\system32\\jushed.exe" 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Media Player = "C:\\Windows\\mplay.exe" mplay.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\javaup500.exe 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe File created C:\Windows\SysWOW64\javaup521.exe 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\javaup521.exe javaup521.exe File opened for modification C:\Windows\SysWOW64\jushed.exe 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe File created C:\Windows\SysWOW64\jushed.exe 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4640 set thread context of 2200 4640 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 84 PID 2424 set thread context of 3504 2424 javaup500.exe 96 PID 4904 set thread context of 2600 4904 mplay.exe 100 -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\program files\morpheus\my shared folder\Ultimate ring tones package3 (Crazy In Love, U Got It Bad, 50 Cent - P.I.M.P, Jennifer Lopez Feat. Ll Cool J - All I Have, 50 Cent - 21 Question).exe 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe File created C:\program files\morpheus\my shared folder\Download Accelerator Plus v8.7.5.exe 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe File created C:\program files\limewire\shared\K-Lite codec pack 3.10 full.exe 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe File created C:\program files\tesla\files\G-Force Platinum v3.7.5.exe 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe File created C:\program files\icq\shared folder\Total Commander7 license+keygen.exe 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe File created C:\program files\grokster\my grokster\Grand Theft Auto IV (Offline Activation).exe 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe File created C:\program files\grokster\my grokster\PDF password remover (works with all acrobat reader).exe 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe File created C:\program files\icq\shared folder\Smart Draw 2008 keygen.exe 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe File created C:\program files\grokster\my grokster\Windows XP PRO Corp SP3 valid-key generator.exe 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe File created C:\program files\tesla\files\BitDefender AntiVirus 2009 Keygen.exe 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe File created C:\program files\emule\incoming\Adobe Photoshop CS4 crack.exe 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe File created C:\program files\emule\incoming\AnyDVD HD v.6.3.1.8 Beta incl crack.exe 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe File created C:\program files\morpheus\my shared folder\Google Earth Pro 4.2. with Maps and crack.exe 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe File created C:\program files\morpheus\my shared folder\LimeWire Pro v4.18.3.exe 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe File created C:\program files\emule\incoming\Power ISO v4.2 + keygen axxo.exe 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe File created C:\program files\morpheus\my shared folder\Kaspersky Internet Security 2009 keygen.exe 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe File created C:\program files\limewire\shared\Total Commander7 license+keygen.exe 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe File created C:\program files\grokster\my grokster\Divx Pro 6.8.0.19 + keymaker.exe 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe File created C:\program files\emule\incoming\CheckPoint ZoneAlarm And AntiSpy.exe 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe File created C:\program files\emule\incoming\Super Utilities Pro 2009 11.0.exe 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe File created C:\program files\icq\shared folder\Microsoft Visual Studio 2008 KeyGen.exe 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe File created C:\program files\emule\incoming\VmWare keygen.exe 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe File created C:\program files\winmx\shared\CheckPoint ZoneAlarm And AntiSpy.exe 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe File created C:\program files\tesla\files\Ultimate ring tones package3 (Crazy In Love, U Got It Bad, 50 Cent - P.I.M.P, Jennifer Lopez Feat. Ll Cool J - All I Have, 50 Cent - 21 Question).exe 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe File created C:\program files\winmx\shared\Download Boost 2.0.exe 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe File created C:\program files\winmx\shared\Sophos antivirus updater bypass.exe 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe File created C:\program files\icq\shared folder\Absolute Video Converter 6.2.exe 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe File created C:\program files\icq\shared folder\Sophos antivirus updater bypass.exe 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe File created C:\program files\morpheus\my shared folder\AVS video converter6.exe 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe File created C:\program files\winmx\shared\Download Accelerator Plus v8.7.5.exe 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe File created C:\program files\icq\shared folder\Youtube Music Downloader 1.0.exe 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe File created C:\program files\icq\shared folder\Adobe Acrobat Reader keygen.exe 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe File created C:\program files\grokster\my grokster\Nero 9 9.2.6.0 keygen.exe 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe File created C:\program files\tesla\files\Super Utilities Pro 2009 11.0.exe 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe File created C:\program files\winmx\shared\Opera 9.62 International.exe 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe File created C:\program files\winmx\shared\G-Force Platinum v3.7.5.exe 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe File created C:\program files\winmx\shared\AVS video converter6.exe 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe File created C:\program files\morpheus\my shared folder\Ultimate ring tones package1 (Beethoven,Bach, Baris Manco,Lambada,Chopin, Greensleves).exe 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe File created C:\program files\morpheus\my shared folder\Sophos antivirus updater bypass.exe 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe File created C:\program files\limewire\shared\Microsoft.Windows 7 Beta1 Build 7000 x86.exe 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe File created C:\program files\icq\shared folder\Adobe Photoshop CS4 crack.exe 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe File created C:\program files\icq\shared folder\Power ISO v4.2 + keygen axxo.exe 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe File created C:\program files\limewire\shared\Alcohol 120 v1.9.7.exe 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe File created C:\program files\limewire\shared\Nero 9 9.2.6.0 keygen.exe 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe File created C:\program files\limewire\shared\CleanMyPC Registry Cleaner v6.02.exe 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe File created C:\program files\tesla\files\CheckPoint ZoneAlarm And AntiSpy.exe 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe File created C:\program files\winmx\shared\Sony Vegas Pro 8 0b Build 219.exe 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe File created C:\program files\grokster\my grokster\Avast 4.8 Professional.exe 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe File created C:\program files\emule\incoming\Youtube Music Downloader 1.0.exe 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe File created C:\program files\emule\incoming\Ultimate ring tones package2 (Lil Wayne - Way Of Life,Khia - My Neck My Back Like My Pussy And My Crack,Mario - Let Me Love You,R. Kelly - The Worlds Greatest).exe 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe File created C:\program files\grokster\my grokster\Alcohol 120 v1.9.7.exe 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe File created C:\program files\emule\incoming\Google Earth Pro 4.2. with Maps and crack.exe 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe File created C:\program files\morpheus\my shared folder\Opera 9.62 International.exe 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe File created C:\program files\limewire\shared\DVD Tools Nero 9 2 6 0.exe 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe File created C:\program files\tesla\files\Norton Anti-Virus 2009 Enterprise Crack.exe 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe File created C:\program files\icq\shared folder\Nero 9 9.2.6.0 keygen.exe 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe File created C:\program files\icq\shared folder\G-Force Platinum v3.7.5.exe 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe File created C:\program files\grokster\my grokster\Windows 2008 Enterprise Server VMWare Virtual Machine.exe 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe File created C:\program files\tesla\files\Microsoft Visual Studio 2008 KeyGen.exe 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe File created C:\program files\tesla\files\Magic Video Converter 8 0 2 18.exe 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe File created C:\program files\emule\incoming\Norton Anti-Virus 2009 Enterprise Crack.exe 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe File created C:\program files\emule\incoming\Ultimate ring tones package3 (Crazy In Love, U Got It Bad, 50 Cent - P.I.M.P, Jennifer Lopez Feat. Ll Cool J - All I Have, 50 Cent - 21 Question).exe 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe File created C:\program files\tesla\files\Sophos antivirus updater bypass.exe 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe File created C:\program files\icq\shared folder\Avast 4.8 Professional.exe 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\mplay.exe javaup500.exe File opened for modification C:\Windows\mplay.exe javaup500.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language javaup521.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language javaup500.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mplay.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mplay.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language javaup500.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ javaup500.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2200 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 2200 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 2200 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 2200 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 2200 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 2200 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 2200 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 2200 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 2200 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 2200 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 2200 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 2200 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 2200 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 2200 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 2200 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 2200 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 2200 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 2200 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 2200 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 2200 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 2200 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 2200 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 2200 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 2200 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 2200 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 2200 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 2200 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 2200 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 2200 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 2200 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 2200 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 2200 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 2200 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 2200 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 2200 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 2200 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 2200 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 2200 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 2200 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 2200 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 2200 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 2200 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 2200 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 2200 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 2200 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 2200 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 2200 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 2200 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 2200 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 2200 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 2200 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 2200 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 2200 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 2200 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 2200 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 2200 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 2200 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 2200 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 2200 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 2200 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 2200 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 2200 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 2200 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 2200 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4640 wrote to memory of 2200 4640 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 84 PID 4640 wrote to memory of 2200 4640 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 84 PID 4640 wrote to memory of 2200 4640 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 84 PID 4640 wrote to memory of 2200 4640 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 84 PID 4640 wrote to memory of 2200 4640 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 84 PID 4640 wrote to memory of 2200 4640 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 84 PID 4640 wrote to memory of 2200 4640 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 84 PID 4640 wrote to memory of 2200 4640 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 84 PID 4640 wrote to memory of 2200 4640 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 84 PID 4640 wrote to memory of 2200 4640 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 84 PID 2200 wrote to memory of 2424 2200 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 94 PID 2200 wrote to memory of 2424 2200 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 94 PID 2200 wrote to memory of 2424 2200 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 94 PID 2200 wrote to memory of 2476 2200 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 95 PID 2200 wrote to memory of 2476 2200 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 95 PID 2200 wrote to memory of 2476 2200 68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe 95 PID 2424 wrote to memory of 3504 2424 javaup500.exe 96 PID 2424 wrote to memory of 3504 2424 javaup500.exe 96 PID 2424 wrote to memory of 3504 2424 javaup500.exe 96 PID 2424 wrote to memory of 3504 2424 javaup500.exe 96 PID 2424 wrote to memory of 3504 2424 javaup500.exe 96 PID 2424 wrote to memory of 3504 2424 javaup500.exe 96 PID 2424 wrote to memory of 3504 2424 javaup500.exe 96 PID 2424 wrote to memory of 3504 2424 javaup500.exe 96 PID 2424 wrote to memory of 3504 2424 javaup500.exe 96 PID 2424 wrote to memory of 3504 2424 javaup500.exe 96 PID 2424 wrote to memory of 3504 2424 javaup500.exe 96 PID 2424 wrote to memory of 3504 2424 javaup500.exe 96 PID 3504 wrote to memory of 4904 3504 javaup500.exe 98 PID 3504 wrote to memory of 4904 3504 javaup500.exe 98 PID 3504 wrote to memory of 4904 3504 javaup500.exe 98 PID 4904 wrote to memory of 2600 4904 mplay.exe 100 PID 4904 wrote to memory of 2600 4904 mplay.exe 100 PID 4904 wrote to memory of 2600 4904 mplay.exe 100 PID 4904 wrote to memory of 2600 4904 mplay.exe 100 PID 4904 wrote to memory of 2600 4904 mplay.exe 100 PID 4904 wrote to memory of 2600 4904 mplay.exe 100 PID 4904 wrote to memory of 2600 4904 mplay.exe 100 PID 4904 wrote to memory of 2600 4904 mplay.exe 100 PID 4904 wrote to memory of 2600 4904 mplay.exe 100 PID 4904 wrote to memory of 2600 4904 mplay.exe 100 PID 4904 wrote to memory of 2600 4904 mplay.exe 100 PID 4904 wrote to memory of 2600 4904 mplay.exe 100 PID 2600 wrote to memory of 3836 2600 mplay.exe 101 PID 2600 wrote to memory of 3836 2600 mplay.exe 101 PID 2600 wrote to memory of 3836 2600 mplay.exe 101 PID 2600 wrote to memory of 3836 2600 mplay.exe 101 PID 2600 wrote to memory of 3836 2600 mplay.exe 101 PID 2600 wrote to memory of 3836 2600 mplay.exe 101 PID 2600 wrote to memory of 3836 2600 mplay.exe 101 PID 2600 wrote to memory of 3836 2600 mplay.exe 101 PID 2600 wrote to memory of 3836 2600 mplay.exe 101 PID 2600 wrote to memory of 3836 2600 mplay.exe 101 PID 2600 wrote to memory of 3836 2600 mplay.exe 101 PID 2600 wrote to memory of 3836 2600 mplay.exe 101 PID 2600 wrote to memory of 3836 2600 mplay.exe 101 PID 2600 wrote to memory of 3836 2600 mplay.exe 101 PID 2600 wrote to memory of 3836 2600 mplay.exe 101 PID 2600 wrote to memory of 3836 2600 mplay.exe 101 PID 2600 wrote to memory of 3836 2600 mplay.exe 101 PID 2600 wrote to memory of 3836 2600 mplay.exe 101 PID 2600 wrote to memory of 3836 2600 mplay.exe 101 PID 2600 wrote to memory of 3836 2600 mplay.exe 101 PID 2600 wrote to memory of 3836 2600 mplay.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Users\Admin\AppData\Local\Temp\68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\68ab36de0b34e529b6ddd96c8f98075b_JaffaCakes118.exe2⤵
- Modifies firewall policy service
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\SysWOW64\javaup500.exe"C:\Windows\system32\javaup500.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\SysWOW64\javaup500.exeC:\Windows\SysWOW64\javaup500.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Windows\mplay.exe"C:\Windows\mplay.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Windows\mplay.exeC:\Windows\mplay.exe6⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"7⤵PID:3836
-
-
-
-
-
-
C:\Windows\SysWOW64\javaup521.exe"C:\Windows\system32\javaup521.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2476
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
157KB
MD5ce5126b12926220c15d3df3a8ff6a05d
SHA15b39eaa17ce07ce42036b41fdc45dddd6d5a3605
SHA256125600aa9078469bb6557c78806b039ae6d0a84078ae9c43033ee0c01696847b
SHA512b919bf64142cd251653701fa190a54a0814f76ee084edfa250eceb12fda016def10373ba62d99c38717c4ec05bcdf4ecee0503af280904fbb87e8cebae735681
-
Filesize
89KB
MD5455cbd925ab3487720eb6f5ff9b1ffdb
SHA1198df5a489d2cb8b1ce17d8722836ec26b1b8cc1
SHA256a3cd09616de6053da636542ac4297c3f665f16c11fa25a323f823c5357323c62
SHA512b8644a5b77ac5fd3a043b9c128564d72381408b396e76daf198c3491c93aafd9375e8492985ff85cdf68748160cb726290edf74b4fbfafbdca519bb9f972d99f