Overview
overview
7Static
static
772ed6c732d...18.exe
windows7-x64
772ed6c732d...18.exe
windows10-2004-x64
7$PLUGINSDI...ig.dll
windows7-x64
3$PLUGINSDI...ig.dll
windows10-2004-x64
3$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...el.dll
windows7-x64
7$PLUGINSDI...el.dll
windows10-2004-x64
7$PLUGINSDIR/UAC.dll
windows7-x64
3$PLUGINSDIR/UAC.dll
windows10-2004-x64
3$PLUGINSDIR/fct.dll
windows7-x64
3$PLUGINSDIR/fct.dll
windows10-2004-x64
3$PLUGINSDI...ss.dll
windows7-x64
3$PLUGINSDI...ss.dll
windows10-2004-x64
3SmartTool.dll
windows7-x64
6SmartTool.dll
windows10-2004-x64
6SmartTool.exe
windows7-x64
6SmartTool.exe
windows10-2004-x64
6adc.dll
windows7-x64
3adc.dll
windows10-2004-x64
3Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26-07-2024 06:27
Behavioral task
behavioral1
Sample
72ed6c732d176f8f2f525a8df5d66cf0_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
72ed6c732d176f8f2f525a8df5d66cf0_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/IpConfig.dll
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/IpConfig.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/SelfDel.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/SelfDel.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/UAC.dll
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/UAC.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/fct.dll
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/fct.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
SmartTool.dll
Resource
win7-20240705-en
Behavioral task
behavioral16
Sample
SmartTool.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
SmartTool.exe
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
SmartTool.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
adc.dll
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
adc.dll
Resource
win10v2004-20240709-en
General
-
Target
72ed6c732d176f8f2f525a8df5d66cf0_JaffaCakes118.exe
-
Size
257KB
-
MD5
72ed6c732d176f8f2f525a8df5d66cf0
-
SHA1
660858c928a509f258b22504f87f5295e3ac0add
-
SHA256
71e5c6d2c0f84eeb0df16f536ea1b1bd984c752e13cdf2ff00312d409f00709e
-
SHA512
eaa0e6b19b8afae93de8e285a3ff726d957d7af045bfaecc4fa3a97a76d6a1c2d7bdfc407e21fbbf651974646dcb9650b36f495400431531e5dd118f6e395baf
-
SSDEEP
6144:UH1Aiwx75+ZPPfnE2Qyn20UNUGNuu7bvcliQU75+ZPPfnE2Qyn20UV:01ATF+ZPPfnEUnUxbv8iQUF+ZPPfnEU2
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x000800000002341b-57.dat acprotect behavioral2/memory/2920-60-0x0000000074A90000-0x0000000074A99000-memory.dmp acprotect -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\Control Panel\International\Geo\Nation 72ed6c732d176f8f2f525a8df5d66cf0_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 2784 explorer.exe -
Executes dropped EXE 1 IoCs
pid Process 2312 SmartTool.exe -
Loads dropped DLL 13 IoCs
pid Process 2920 72ed6c732d176f8f2f525a8df5d66cf0_JaffaCakes118.exe 2920 72ed6c732d176f8f2f525a8df5d66cf0_JaffaCakes118.exe 2920 72ed6c732d176f8f2f525a8df5d66cf0_JaffaCakes118.exe 2920 72ed6c732d176f8f2f525a8df5d66cf0_JaffaCakes118.exe 2920 72ed6c732d176f8f2f525a8df5d66cf0_JaffaCakes118.exe 3128 regsvr32.exe 2920 72ed6c732d176f8f2f525a8df5d66cf0_JaffaCakes118.exe 2920 72ed6c732d176f8f2f525a8df5d66cf0_JaffaCakes118.exe 2312 SmartTool.exe 2920 72ed6c732d176f8f2f525a8df5d66cf0_JaffaCakes118.exe 2920 72ed6c732d176f8f2f525a8df5d66cf0_JaffaCakes118.exe 2920 72ed6c732d176f8f2f525a8df5d66cf0_JaffaCakes118.exe 4084 regsvr32.exe -
resource yara_rule behavioral2/memory/2920-0-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/files/0x000800000002341b-57.dat upx behavioral2/memory/2920-60-0x0000000074A90000-0x0000000074A99000-memory.dmp upx behavioral2/memory/2920-75-0x0000000000400000-0x0000000000445000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SmartTool = "C:\\Program Files (x86)\\SmartTool\\SmartTool.exe" SmartTool.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Installs/modifies Browser Helper Object 2 TTPs 3 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{2D891923-34B7-4186-9B47-752624535DC1} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{2D891923-34B7-4186-9B47-752624535DC1} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{2D891923-34B7-4186-9B47-752624535DC1} regsvr32.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2920 set thread context of 2784 2920 72ed6c732d176f8f2f525a8df5d66cf0_JaffaCakes118.exe 91 -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files (x86)\SmartTool\adc.acc 72ed6c732d176f8f2f525a8df5d66cf0_JaffaCakes118.exe File created C:\Program Files (x86)\SmartTool\Uninstall.exe 72ed6c732d176f8f2f525a8df5d66cf0_JaffaCakes118.exe File created C:\Program Files (x86)\SmartTool\SmartTool.dll 72ed6c732d176f8f2f525a8df5d66cf0_JaffaCakes118.exe File created C:\Program Files (x86)\SmartTool\SmartTool.exe 72ed6c732d176f8f2f525a8df5d66cf0_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 72ed6c732d176f8f2f525a8df5d66cf0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SmartTool.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E97662C9-6D8A-47A6-BBF6-17730FEE28F0}\1.0\0\win32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SmartTool.SmartToolCtl\CLSID\ = "{2D891923-34B7-4186-9B47-752624535DC1}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SmartTool.SmartToolCtl\CurVer\ = "SmartTool.SmartToolCtl.1" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2D891923-34B7-4186-9B47-752624535DC1}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2D891923-34B7-4186-9B47-752624535DC1} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2D891923-34B7-4186-9B47-752624535DC1}\VersionIndependentProgID regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2D891923-34B7-4186-9B47-752624535DC1}\TypeLib regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2D891923-34B7-4186-9B47-752624535DC1} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2D891923-34B7-4186-9B47-752624535DC1}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E97662C9-6D8A-47A6-BBF6-17730FEE28F0} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SmartTool.SmartToolCtl\ = "SmartToolCtl Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SmartTool.SmartToolCtl\CurVer\ = "SmartTool.SmartToolCtl.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E97662C9-6D8A-47A6-BBF6-17730FEE28F0}\1.0\0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SmartTool.SmartToolCtl.1\ = "SmartToolCtl Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0F67A437-3336-4B2E-B211-D5BD3C6F5461}\ = "ISmartToolCtl" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0F67A437-3336-4B2E-B211-D5BD3C6F5461}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0F67A437-3336-4B2E-B211-D5BD3C6F5461} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E97662C9-6D8A-47A6-BBF6-17730FEE28F0}\1.0\HELPDIR\ = "C:\\Program Files (x86)\\SmartTool\\" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0F67A437-3336-4B2E-B211-D5BD3C6F5461} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2D891923-34B7-4186-9B47-752624535DC1}\VersionIndependentProgID\ = "SmartTool.SmartToolCtl" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2D891923-34B7-4186-9B47-752624535DC1}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0F67A437-3336-4B2E-B211-D5BD3C6F5461}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0F67A437-3336-4B2E-B211-D5BD3C6F5461}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2D891923-34B7-4186-9B47-752624535DC1}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SmartTool.SmartToolCtl.1 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SmartTool.SmartToolCtl.1\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0F67A437-3336-4B2E-B211-D5BD3C6F5461}\TypeLib\ = "{E97662C9-6D8A-47A6-BBF6-17730FEE28F0}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2D891923-34B7-4186-9B47-752624535DC1} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2D891923-34B7-4186-9B47-752624535DC1}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2D891923-34B7-4186-9B47-752624535DC1}\TypeLib\ = "{E97662C9-6D8A-47A6-BBF6-17730FEE28F0}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2D891923-34B7-4186-9B47-752624535DC1}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0F67A437-3336-4B2E-B211-D5BD3C6F5461}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E97662C9-6D8A-47A6-BBF6-17730FEE28F0}\1.0\FLAGS regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SmartTool.SmartToolCtl\ = "SmartToolCtl Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SmartTool.SmartToolCtl\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0F67A437-3336-4B2E-B211-D5BD3C6F5461}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SmartTool.SmartToolCtl.1\CLSID\ = "{2D891923-34B7-4186-9B47-752624535DC1}" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2D891923-34B7-4186-9B47-752624535DC1}\VersionIndependentProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E97662C9-6D8A-47A6-BBF6-17730FEE28F0}\1.0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0F67A437-3336-4B2E-B211-D5BD3C6F5461}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2D891923-34B7-4186-9B47-752624535DC1}\InprocServer32\ = "C:\\Program Files (x86)\\SmartTool\\SmartTool.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0F67A437-3336-4B2E-B211-D5BD3C6F5461}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2D891923-34B7-4186-9B47-752624535DC1}\VersionIndependentProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E97662C9-6D8A-47A6-BBF6-17730FEE28F0}\1.0\FLAGS\ = "0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0F67A437-3336-4B2E-B211-D5BD3C6F5461}\ = "ISmartToolCtl" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2D891923-34B7-4186-9B47-752624535DC1}\Programmable regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2D891923-34B7-4186-9B47-752624535DC1}\VersionIndependentProgID\ = "SmartTool.SmartToolCtl" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2D891923-34B7-4186-9B47-752624535DC1}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2D891923-34B7-4186-9B47-752624535DC1}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E97662C9-6D8A-47A6-BBF6-17730FEE28F0}\1.0\ = "SmartTool 1.0 Type Library" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2D891923-34B7-4186-9B47-752624535DC1}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SmartTool.SmartToolCtl\CLSID\ = "{2D891923-34B7-4186-9B47-752624535DC1}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SmartTool.SmartToolCtl.1\ = "SmartToolCtl Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0F67A437-3336-4B2E-B211-D5BD3C6F5461}\TypeLib\ = "{E97662C9-6D8A-47A6-BBF6-17730FEE28F0}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SmartTool.SmartToolCtl.1\CLSID\ = "{2D891923-34B7-4186-9B47-752624535DC1}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2D891923-34B7-4186-9B47-752624535DC1}\TypeLib\ = "{E97662C9-6D8A-47A6-BBF6-17730FEE28F0}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2D891923-34B7-4186-9B47-752624535DC1}\ProgID\ = "SmartTool.SmartToolCtl.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E97662C9-6D8A-47A6-BBF6-17730FEE28F0}\1.0\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2D891923-34B7-4186-9B47-752624535DC1}\ProgID\ = "SmartTool.SmartToolCtl.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SmartTool.SmartToolCtl regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2D891923-34B7-4186-9B47-752624535DC1}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E97662C9-6D8A-47A6-BBF6-17730FEE28F0}\1.0\0\win32\ = "C:\\Program Files (x86)\\SmartTool\\SmartTool.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0F67A437-3336-4B2E-B211-D5BD3C6F5461}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2D891923-34B7-4186-9B47-752624535DC1}\ = "SmartToolCtl Class" regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2920 72ed6c732d176f8f2f525a8df5d66cf0_JaffaCakes118.exe 2920 72ed6c732d176f8f2f525a8df5d66cf0_JaffaCakes118.exe 2920 72ed6c732d176f8f2f525a8df5d66cf0_JaffaCakes118.exe 2920 72ed6c732d176f8f2f525a8df5d66cf0_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2312 SmartTool.exe 2312 SmartTool.exe 2312 SmartTool.exe 2312 SmartTool.exe 2312 SmartTool.exe 2312 SmartTool.exe 2312 SmartTool.exe 2312 SmartTool.exe 2312 SmartTool.exe 2312 SmartTool.exe 2312 SmartTool.exe 2312 SmartTool.exe 2312 SmartTool.exe 2312 SmartTool.exe 2312 SmartTool.exe 2312 SmartTool.exe 2312 SmartTool.exe 2312 SmartTool.exe 2312 SmartTool.exe 2312 SmartTool.exe 2312 SmartTool.exe 2312 SmartTool.exe 2312 SmartTool.exe 2312 SmartTool.exe 2312 SmartTool.exe 2312 SmartTool.exe 2312 SmartTool.exe 2312 SmartTool.exe 2312 SmartTool.exe 2312 SmartTool.exe 2312 SmartTool.exe 2312 SmartTool.exe 2312 SmartTool.exe 2312 SmartTool.exe 2312 SmartTool.exe 2312 SmartTool.exe 2312 SmartTool.exe 2312 SmartTool.exe 2312 SmartTool.exe 2312 SmartTool.exe 2312 SmartTool.exe 2312 SmartTool.exe 2312 SmartTool.exe 2312 SmartTool.exe 2312 SmartTool.exe 2312 SmartTool.exe 2312 SmartTool.exe 2312 SmartTool.exe 2312 SmartTool.exe 2312 SmartTool.exe 2312 SmartTool.exe 2312 SmartTool.exe 2312 SmartTool.exe 2312 SmartTool.exe 2312 SmartTool.exe 2312 SmartTool.exe 2312 SmartTool.exe 2312 SmartTool.exe 2312 SmartTool.exe 2312 SmartTool.exe 2312 SmartTool.exe 2312 SmartTool.exe 2312 SmartTool.exe 2312 SmartTool.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2920 wrote to memory of 3128 2920 72ed6c732d176f8f2f525a8df5d66cf0_JaffaCakes118.exe 87 PID 2920 wrote to memory of 3128 2920 72ed6c732d176f8f2f525a8df5d66cf0_JaffaCakes118.exe 87 PID 2920 wrote to memory of 3128 2920 72ed6c732d176f8f2f525a8df5d66cf0_JaffaCakes118.exe 87 PID 2920 wrote to memory of 2312 2920 72ed6c732d176f8f2f525a8df5d66cf0_JaffaCakes118.exe 88 PID 2920 wrote to memory of 2312 2920 72ed6c732d176f8f2f525a8df5d66cf0_JaffaCakes118.exe 88 PID 2920 wrote to memory of 2312 2920 72ed6c732d176f8f2f525a8df5d66cf0_JaffaCakes118.exe 88 PID 2920 wrote to memory of 2784 2920 72ed6c732d176f8f2f525a8df5d66cf0_JaffaCakes118.exe 91 PID 2920 wrote to memory of 2784 2920 72ed6c732d176f8f2f525a8df5d66cf0_JaffaCakes118.exe 91 PID 2920 wrote to memory of 2784 2920 72ed6c732d176f8f2f525a8df5d66cf0_JaffaCakes118.exe 91 PID 2920 wrote to memory of 2784 2920 72ed6c732d176f8f2f525a8df5d66cf0_JaffaCakes118.exe 91 PID 2312 wrote to memory of 4084 2312 SmartTool.exe 92 PID 2312 wrote to memory of 4084 2312 SmartTool.exe 92 PID 2312 wrote to memory of 4084 2312 SmartTool.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\72ed6c732d176f8f2f525a8df5d66cf0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\72ed6c732d176f8f2f525a8df5d66cf0_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /s "C:\Program Files (x86)\SmartTool\SmartTool.dll"2⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3128
-
-
C:\Program Files (x86)\SmartTool\SmartTool.exe"C:\Program Files (x86)\SmartTool\SmartTool.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\Program Files (x86)\SmartTool\SmartTool.dll"3⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4084
-
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\system32\explorer.exe2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2784
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Browser Extensions
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
102KB
MD5741cdff08122fb644ce0f38ecaaabbbc
SHA1659c20277291a9e6defe7fa7b0fb97fda048c24a
SHA256c24a0118cf1865938b512aa45a9d017ce13f58c746409479799b6ee3029c1ab8
SHA5126aee20d572d335d5c89725d08c7d9a84f01d9704b883a187dd5ce332f0c09c2960ad5abecf7df77811888e96f1fe625faf836935e2a0fdd3a863728c282361d8
-
Filesize
42KB
MD5d844fa7525b1984de45e97840df8819b
SHA13e7bf200f9984782dcc94efdf982ac6c283c0181
SHA2564328c450cba954a17e04d51503a3e245f08eb7f521809f347298a2d927b62e6e
SHA512640f5834df57a50e9e3ac164f4fb530082ac9dfdc6231bfc32c4c9bfcdceb414a1bfa5df3b4b19f143bf080cb2685332fd0da5ffcc2a8188caad84c1ef9aeaeb
-
Filesize
28KB
MD5f06fe4389c83c3e770d3f4edd19223b1
SHA111b4d5103349f200f30cc062d72c151758881707
SHA256f1dfc3086f329fed40734166d437c8c99fec54005f0f9ec47cd6fff3fa161d89
SHA51236b32c6c6ba95f440595feae8eb5bf8f8108453095e964d86c275101e4f4b99fb24b5c79e26a4dacd5586578615f1c5ea9cce4277e73a9a9cb903e1ab1115550
-
Filesize
114KB
MD5a3ed6f7ea493b9644125d494fbf9a1e6
SHA1ebeee67fb0b5b3302c69f47c5e7fca62e1a809d8
SHA256ec0f85f8a9d6b77081ba0103f967ef6705b547bf27bcd866d77ac909d21a1e08
SHA5127099e1bc78ba5727661aa49f75523126563a5ebccdff10cabf868ce5335821118384825f037fbf1408c416c0212aa702a5974bc54d1b63c9d0bcade140f9aae1
-
Filesize
14KB
MD5a5f8399a743ab7f9c88c645c35b1ebb5
SHA1168f3c158913b0367bf79fa413357fbe97018191
SHA256dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9
SHA512824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977
-
Filesize
4KB
MD57cff7fe2caea5184d98c147e7e263132
SHA121f39d3d0dd5f7198d67ef30e95d10ae3460093e
SHA256281c39b733579e031c62bdd247b41543ece1fe3bd6eda26fc8ad474b10f33101
SHA512fb1161b8571d1d0c67e2df0d571b08f5e7a73f81409aed847344154d02406910629181bcce4e18e998ec472f51a6a1b40d956a010abdd10e850413aafa87808a
-
Filesize
13KB
MD529858669d7da388d1e62b4fd5337af12
SHA1756b94898429a9025a04ae227f060952f1149a5f
SHA256c24c005daa7f5578c4372b38d1be6be5e27ef3ba2cdb9b67fee15cac406eba62
SHA5126f4d538f2fe0681f357bab73f633943c539ddc1451efa1d1bb76d70bb47aa68a05849e36ae405cc4664598a8194227fa7053de6dbce7d6c52a20301293b3c85f
-
Filesize
4KB
MD5e3f3809f51c7982d96aaf9c090f7d176
SHA17494daa8000c0b31c58d94edc509232569a4606f
SHA256010f5e0c69b4a630b08b2551e03d8044a33350f151848dcf50953407012fab29
SHA5123fca284e384abc95201dc73f19bd9d75413e8890e819967070b9d9991115be2a8c17e07bd1aaaffcbc770b393bf9a2af253100ac4d9efba8d21110bac97737fc
-
Filesize
4KB
MD505450face243b3a7472407b999b03a72
SHA1ffd88af2e338ae606c444390f7eaaf5f4aef2cd9
SHA25695fe9d92512ff2318cc2520311ef9145b2cee01209ab0e1b6e45c7ce1d4d0e89
SHA512f4cbe30166aff20a226a7150d93a876873ba699d80d7e9f46f32a9b4753fa7966c3113a3124340b39ca67a13205463a413e740e541e742903e3f89af5a53ad3b