Analysis
-
max time kernel
145s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27/07/2024, 01:50
Static task
static1
Behavioral task
behavioral1
Sample
769c1637033775fea79330ca76984390_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
769c1637033775fea79330ca76984390_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
769c1637033775fea79330ca76984390_JaffaCakes118.exe
-
Size
2.2MB
-
MD5
769c1637033775fea79330ca76984390
-
SHA1
7bbd2dd9410be78153f0dc51b568ffa8c2d14717
-
SHA256
96b045abc98114cc47bd1ac23029fe2b8a12ac16c2f34a0c14cd7bc9d7710f6f
-
SHA512
c1b06406d050561f51304e83af379f8a4b4dc6a798dfaee26bc9ee552e5e6e0f7531aaf128c5cafad08224e7d0b8c38f63aa8a7a6e9f79b47d35e771bd67a4f3
-
SSDEEP
49152:YJAKL1A4GFERnJfYMKAUVB7bsxr5fy8ckyyoYXtGqOipLCgvhB:BKL1A4G6nJf9aBHsxr5fy8fy7Y9GqZFj
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation 769c1637033775fea79330ca76984390_JaffaCakes118.exe -
Executes dropped EXE 6 IoCs
pid Process 1252 SE205.exe 4904 SE205.tmp 1572 IEMaoSvc.exe 2976 IEMaoSvc.exe 1008 IEMaoSvc.exe 1932 IEMaoSvc.exe -
Loads dropped DLL 9 IoCs
pid Process 2232 regsvr32.exe 3220 regsvr32.exe 2896 regsvr32.exe 1932 IEMaoSvc.exe 1932 IEMaoSvc.exe 1932 IEMaoSvc.exe 1932 IEMaoSvc.exe 1932 IEMaoSvc.exe 1932 IEMaoSvc.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{0008CBE3-7D12-263A-15FD-39D13B9D1132} regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{0008CBE3-7D12-263A-15FD-39D13B9D1132}\NoExplorer = "1" regsvr32.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 IEMaoSvc.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\is-ECA19.tmp SE205.tmp File opened for modification C:\Windows\SysWOW64\2E2E5A5A.fn IEMaoSvc.exe -
Drops file in Program Files directory 60 IoCs
description ioc Process File created C:\Program Files (x86)\IEMao\Search\is-SJAU5.tmp SE205.tmp File created C:\Program Files (x86)\IEMao\Search\is-68KJA.tmp SE205.tmp File opened for modification C:\Program Files (x86)\IEMao\unins000.dat SE205.tmp File created C:\Program Files (x86)\IEMao\Search\is-6V507.tmp SE205.tmp File created C:\Program Files (x86)\IEMao\Search\is-NN419.tmp SE205.tmp File created C:\Program Files (x86)\IEMao\Search\is-D0NLI.tmp SE205.tmp File created C:\Program Files (x86)\IEMao\Search\is-A0N3D.tmp SE205.tmp File created C:\Program Files (x86)\IEMao\Search\is-ST93M.tmp SE205.tmp File created C:\Program Files (x86)\IEMao\Search\is-K0U7L.tmp SE205.tmp File created C:\Program Files (x86)\IEMao\Search\is-EGCFL.tmp SE205.tmp File created C:\Program Files (x86)\IEMao\Search\is-5OTTB.tmp SE205.tmp File created C:\Program Files (x86)\IEMao\is-3M6AK.tmp SE205.tmp File created C:\Program Files (x86)\IEMao\Search\is-TQ88E.tmp SE205.tmp File created C:\Program Files (x86)\IEMao\Search\is-9GPB3.tmp SE205.tmp File opened for modification C:\Program Files (x86)\IEMao\iemao.cg IEMaoSvc.exe File created C:\Program Files (x86)\IEMao\Search\is-RSI55.tmp SE205.tmp File opened for modification C:\Program Files (x86)\IEMao\iemao.cg IEMaoSvc.exe File created C:\Program Files (x86)\IEMao\unins000.dat SE205.tmp File created C:\Program Files (x86)\IEMao\is-MVKSB.tmp SE205.tmp File created C:\Program Files (x86)\IEMao\Search\is-NJ0O7.tmp SE205.tmp File created C:\Program Files (x86)\IEMao\Search\is-TBH5H.tmp SE205.tmp File created C:\Program Files (x86)\IEMao\Search\is-LG4JN.tmp SE205.tmp File created C:\Program Files (x86)\IEMao\Search\is-KFU3B.tmp SE205.tmp File created C:\Program Files (x86)\IEMao\Search\is-20Q20.tmp SE205.tmp File created C:\Program Files (x86)\IEMao\Search\is-51LPN.tmp SE205.tmp File opened for modification C:\Program Files (x86)\IEMao\Site.ini SE205.tmp File created C:\Program Files (x86)\IEMao\Search\is-AUS43.tmp SE205.tmp File created C:\Program Files (x86)\IEMao\Search\is-MA7OB.tmp SE205.tmp File created C:\Program Files (x86)\IEMao\Search\is-DJ84B.tmp SE205.tmp File created C:\Program Files (x86)\IEMao\Search\is-5J6V9.tmp SE205.tmp File created C:\Program Files (x86)\IEMao\is-FBNHR.tmp SE205.tmp File created C:\Program Files (x86)\IEMao\is-FMVO7.tmp SE205.tmp File created C:\Program Files (x86)\IEMao\Search\is-6TJPV.tmp SE205.tmp File created C:\Program Files (x86)\IEMao\is-B9364.tmp SE205.tmp File created C:\Program Files (x86)\IEMao\is-9RI42.tmp SE205.tmp File created C:\Program Files (x86)\IEMao\Search\is-23PK0.tmp SE205.tmp File created C:\Program Files (x86)\IEMao\Search\is-OSK06.tmp SE205.tmp File created C:\Program Files (x86)\IEMao\Search\is-04ANI.tmp SE205.tmp File created C:\Program Files (x86)\IEMao\is-VIGSC.tmp SE205.tmp File created C:\Program Files (x86)\IEMao\Search\is-6CNM3.tmp SE205.tmp File created C:\Program Files (x86)\IEMao\Search\is-UCACO.tmp SE205.tmp File created C:\Program Files (x86)\IEMao\Search\is-6S77L.tmp SE205.tmp File created C:\Program Files (x86)\IEMao\Search\is-LB1K0.tmp SE205.tmp File created C:\Program Files (x86)\IEMao\Search\is-V9SU5.tmp SE205.tmp File created C:\Program Files (x86)\IEMao\Search\is-CGKM9.tmp SE205.tmp File created C:\Program Files (x86)\IEMao\Search\is-1S2QJ.tmp SE205.tmp File created C:\Program Files (x86)\IEMao\Search\is-2HKUN.tmp SE205.tmp File created C:\Program Files (x86)\IEMao\Search\is-TS463.tmp SE205.tmp File created C:\Program Files (x86)\IEMao\Search\is-62RBN.tmp SE205.tmp File created C:\Program Files (x86)\IEMao\Search\is-90MEM.tmp SE205.tmp File created C:\Program Files (x86)\IEMao\Search\is-5NKHM.tmp SE205.tmp File created C:\Program Files (x86)\IEMao\Search\is-59AO1.tmp SE205.tmp File created C:\Program Files (x86)\IEMao\Search\is-L71KU.tmp SE205.tmp File created C:\Program Files (x86)\IEMao\Search\is-FDLOK.tmp SE205.tmp File created C:\Program Files (x86)\IEMao\Search\is-8OEH1.tmp SE205.tmp File created C:\Program Files (x86)\IEMao\Search\is-67A0R.tmp SE205.tmp File created C:\Program Files (x86)\IEMao\Search\is-14PCK.tmp SE205.tmp File created C:\Program Files (x86)\IEMao\Search\is-B532T.tmp SE205.tmp File created C:\Program Files (x86)\IEMao\Search\is-U0UFO.tmp SE205.tmp File created C:\Program Files (x86)\IEMao\Search\is-A426E.tmp SE205.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 769c1637033775fea79330ca76984390_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SE205.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SE205.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEMaoSvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEMaoSvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEMaoSvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEMaoSvc.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Toolbar regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Toolbar\{0008CBE3-7D56-263A-18FD-39D13B9D1165} regsvr32.exe Set value (data) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\WebBrowser\ITBarLayout = 0a00000040e7f1007b0030000200000240e7f1009802009a3300010100000000c000f00000000000609db8766099b876000038010100f0000000000011845e77c8e798000000000030000000a8a0410030e47d7668845e7760e8980040ad627700006aa50000ffff9499b87600000000000000000b0000009402f00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e3cb0800567d3a2618fd39d13b9d11657002f00048e701010b0000000b000000dce7980048e7f10060e8980040ad6277f26c6aa5feffffff0ce898001d796377000000004479637748e7f1000000f000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a8a04100f64b99d250e898002569ab76ababababac2a62776b69ab76a8a041002023000120000000a8a0410001000000d800000020000000a8a0410002000000a400000070e898000e284000cc2547002a45400074274000b8e898000f28400070e89800a0e89800c023000198240001c023000100000000b0e898002b2b4000a0e898004a4b4000010000000000000043da46004bda4600c0101801c021000101210001000000000000000020230001 regsvr32.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion IEMaoSvc.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Borland.Midas_DSCursor\Clsid regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9E8D2FA7-591C-11D0-BF52-0020AF32BD64}\InProcServer32\ = "C:\\Windows\\SysWow64\\midas.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{68F018D4-06B6-465C-B7EA-83AA39D43CC0}\1.0\HELPDIR\ = "C:\\Program Files (x86)\\IEMao\\" IEMaoSvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1AEFCC20-7A24-11D2-98B0-C69BEB4B5B6D}\ = "IAppServer" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Borland.Midas_DSBase\Clsid regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6DE67902-36AB-4DDD-8785-53AB3E78E9D8}\ProxyStubClsid32 IEMaoSvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{DFB579ED-8CDF-441A-9900-7EF5D5515383}\TypeLib\ = "{68F018D4-06B6-465C-B7EA-83AA39D43CC0}" IEMaoSvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9E8D2FA1-591C-11D0-BF52-0020AF32BD64} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Borland.Midas_DSCursor.1 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Borland.Midas_DSCursor\ = "Borland Midas DSCursor Current" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Borland.Midas_DSCursor\CurVer regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0008CBE3-7D56-263A-18FD-39D13B9D1165}\ = "IEèËÑË÷µ¼º½¹¤¾ßÀ¸" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{27331A4D-E394-41D3-AB92-2AE3F5A39EEF}\ProgID\ = "IEMaoSv.BarManage" IEMaoSvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DFB579ED-8CDF-441A-9900-7EF5D5515383}\TypeLib\Version = "1.0" IEMaoSvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1AEFCC20-7A24-11D2-98B0-C69BEB4B5B6D}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Borland.Midas_DatapacketWrite.1\ = "Borland Midas DatapacketWrite" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{27331A4D-E394-41D3-AB92-2AE3F5A39EEF}\Version\ = "1.0" IEMaoSvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{68F018D4-06B6-465C-B7EA-83AA39D43CC0}\1.0\0\win32 IEMaoSvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5E18AC0D-3260-4BD1-B4D1-181FC9F6ACE2} IEMaoSvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0008CBE3-7D12-263A-15FD-39D13B9D1132}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DFB579ED-8CDF-441A-9900-7EF5D5515383} IEMaoSvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Borland.Midas_DatapacketWrite.1 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Borland.Midas_DatapacketWrite.1\Clsid regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9E8D2FA7-591C-11D0-BF52-0020AF32BD64}\ = "Borland Midas DatapacketRead" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{68F018D4-06B6-465C-B7EA-83AA39D43CC0}\1.0\FLAGS\ = "0" IEMaoSvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5E18AC0D-3260-4BD1-B4D1-181FC9F6ACE2}\ = "IEMaoFunc Object" IEMaoSvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9E8D2FA3-591C-11D0-BF52-0020AF32BD64}\InProcServer32\ = "C:\\Windows\\SysWow64\\midas.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9E8D2FA5-591C-11D0-BF52-0020AF32BD64}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9E8D2FA1-591C-11D0-BF52-0020AF32BD64}\ProgID\ = "Borland.Midas_DSBase.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Borland.Midas_DSCursor\CurVer\ = "Borland.Midas_DSCursor.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5E18AC0D-3260-4BD1-B4D1-181FC9F6ACE2}\Version\ = "1.0" IEMaoSvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{83F57D68-CA9A-11D2-9088-00C04FA35CFA}\1.0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9E8D2FA7-591C-11D0-BF52-0020AF32BD64}\ProgID\ = "Borland.Midas_DatapacketRead.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0008CBE3-7D56-263A-18FD-39D13B9D1165}\InprocServer32\ = "C:\\PROGRA~2\\IEMao\\IEMaoBar.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{DFB579ED-8CDF-441A-9900-7EF5D5515383}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" IEMaoSvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\iemao.IEMaoHelper\Clsid regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Borland.Midas_DSCursor regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9E8D2FA3-591C-11D0-BF52-0020AF32BD64}\InProcServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9E8D2FA7-591C-11D0-BF52-0020AF32BD64} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\iemao.HtmlDrag\ regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{83F57D68-CA9A-11D2-9088-00C04FA35CFA}\1.0\0\win32\ = "C:\\Windows\\SysWow64\\midas.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1AEFCC20-7A24-11D2-98B0-C69BEB4B5B6D}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6DE67902-36AB-4DDD-8785-53AB3E78E9D8}\TypeLib IEMaoSvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0008CBE3-7D12-263A-15FD-39D13B9D1132}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{83F57D68-CA9A-11D2-9088-00C04FA35CFA}\1.0\ = "CodeGear Midas type library" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6DE67902-36AB-4DDD-8785-53AB3E78E9D8}\TypeLib\ = "{68F018D4-06B6-465C-B7EA-83AA39D43CC0}" IEMaoSvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EA33A1D2-892C-4798-8430-50E66C58656A}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1AEFCC20-7A24-11D2-98B0-C69BEB4B5B6D}\TypeLib\ = "{83F57D68-CA9A-11D2-9088-00C04FA35CFA}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9E8D2FA3-591C-11D0-BF52-0020AF32BD64}\InProcServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IEMaoBar.IEMao Toolbar\Clsid regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1AEFCC20-7A24-11D2-98B0-C69BEB4B5B6D}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9E8D2FA3-591C-11D0-BF52-0020AF32BD64}\ProgID\ = "Borland.Midas_DSCursor.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IEMaoSv.BarManage\Clsid\ = "{27331A4D-E394-41D3-AB92-2AE3F5A39EEF}" IEMaoSvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\iemao.HtmlDrag\Clsid regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{27331A4D-E394-41D3-AB92-2AE3F5A39EEF} IEMaoSvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1AEFCC20-7A24-11D2-98B0-C69BEB4B5B6D}\TypeLib\ = "{83F57D68-CA9A-11D2-9088-00C04FA35CFA}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Borland.Midas_DatapacketRead.1\Clsid\ = "{9E8D2FA7-591C-11D0-BF52-0020AF32BD64}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9E8D2FA5-591C-11D0-BF52-0020AF32BD64}\ProgID\ = "Borland.Midas_DatapacketWrite.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6DE67902-36AB-4DDD-8785-53AB3E78E9D8}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" IEMaoSvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{27331A4D-E394-41D3-AB92-2AE3F5A39EEF}\LocalServer32 IEMaoSvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{83F57D68-CA9A-11D2-9088-00C04FA35CFA}\1.0\FLAGS\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{83F57D68-CA9A-11D2-9088-00C04FA35CFA}\1.0\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9E8D2FA1-591C-11D0-BF52-0020AF32BD64}\ = "Borland Midas DSBase 1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9E8D2FA5-591C-11D0-BF52-0020AF32BD64}\ = "Borland Midas DatapacketWrite" regsvr32.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2296 769c1637033775fea79330ca76984390_JaffaCakes118.exe 1572 IEMaoSvc.exe 2976 IEMaoSvc.exe 1008 IEMaoSvc.exe 1932 IEMaoSvc.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2296 wrote to memory of 1252 2296 769c1637033775fea79330ca76984390_JaffaCakes118.exe 84 PID 2296 wrote to memory of 1252 2296 769c1637033775fea79330ca76984390_JaffaCakes118.exe 84 PID 2296 wrote to memory of 1252 2296 769c1637033775fea79330ca76984390_JaffaCakes118.exe 84 PID 1252 wrote to memory of 4904 1252 SE205.exe 88 PID 1252 wrote to memory of 4904 1252 SE205.exe 88 PID 1252 wrote to memory of 4904 1252 SE205.exe 88 PID 4904 wrote to memory of 1572 4904 SE205.tmp 90 PID 4904 wrote to memory of 1572 4904 SE205.tmp 90 PID 4904 wrote to memory of 1572 4904 SE205.tmp 90 PID 4904 wrote to memory of 2232 4904 SE205.tmp 92 PID 4904 wrote to memory of 2232 4904 SE205.tmp 92 PID 4904 wrote to memory of 2232 4904 SE205.tmp 92 PID 4904 wrote to memory of 3220 4904 SE205.tmp 93 PID 4904 wrote to memory of 3220 4904 SE205.tmp 93 PID 4904 wrote to memory of 3220 4904 SE205.tmp 93 PID 4904 wrote to memory of 2896 4904 SE205.tmp 94 PID 4904 wrote to memory of 2896 4904 SE205.tmp 94 PID 4904 wrote to memory of 2896 4904 SE205.tmp 94 PID 4904 wrote to memory of 2976 4904 SE205.tmp 95 PID 4904 wrote to memory of 2976 4904 SE205.tmp 95 PID 4904 wrote to memory of 2976 4904 SE205.tmp 95 PID 4904 wrote to memory of 1008 4904 SE205.tmp 96 PID 4904 wrote to memory of 1008 4904 SE205.tmp 96 PID 4904 wrote to memory of 1008 4904 SE205.tmp 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\769c1637033775fea79330ca76984390_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\769c1637033775fea79330ca76984390_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\SE205.exe"C:\Users\Admin\AppData\Local\Temp\SE205.exe" /VERYSILENT /SP-2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Users\Admin\AppData\Local\Temp\is-B83Q8.tmp\SE205.tmp"C:\Users\Admin\AppData\Local\Temp\is-B83Q8.tmp\SE205.tmp" /SL5="$9005C,1954047,54272,C:\Users\Admin\AppData\Local\Temp\SE205.exe" /VERYSILENT /SP-3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Users\Admin\AppData\Local\Temp\is-N3457.tmp\IEMaoSvc.exe"C:\Users\Admin\AppData\Local\Temp\is-N3457.tmp\IEMaoSvc.exe" U4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1572
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\IEMao\iemao.dll"4⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2232
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Windows\system32\midas.dll"4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3220
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\IEMao\IEMaoBar.dll"4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies registry class
PID:2896
-
-
C:\Program Files (x86)\IEMao\IEMaoSvc.exe"C:\Program Files (x86)\IEMao\IEMaoSvc.exe" /regserver4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2976
-
-
C:\Program Files (x86)\IEMao\IEMaoSvc.exe"C:\Program Files (x86)\IEMao\IEMaoSvc.exe" INS C:\Users\Admin\AppData\Local\Temp\SE205.exe4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1008
-
-
-
-
C:\Program Files (x86)\IEMao\IEMaoSvc.exe"C:\Program Files (x86)\IEMao\IEMaoSvc.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:1932
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD54fd418575fc880292165cfe1459698a8
SHA1bce2f459b993b51ea12c995795830250d370a228
SHA256f67fd91b26e2a7965d623bf8c6ab500abb92443a474eec5482eb961864e9d40a
SHA512ae8ce98370eec8fc0eb123e008ca91f5fe8e0247dcf3afdb5d03d8a1947d6fdce0eb685fa28683e286266858baf3ce532acd21fbc39fc867026af0e45b61045a
-
Filesize
648B
MD5c32cd0022b2903bc8e5df113f1a1c6ed
SHA15cc5c6f391b3762fd282f4f2a7f3d218179fb1cd
SHA2563bd51bb4288d9e4626e720a04f8b5d45fa02cea665dcc2c6012a73f8686768af
SHA512ea6b0a9fc9d72cf7ce3790f2a0590812cc309781697f14adb371c5c31dad7e8e6e360f1d54a1e960d71bed7934f2b31ea6e574db49c2af3b30c9e18556464197
-
Filesize
570KB
MD5c8386a40d92c22459e759ffa9410cea3
SHA1248e1f688b439ad774cd5c6e8b4b537b3f337c6d
SHA2564c2aca3c43cc6bcad5ba469efb4492dafefdf865a1d29e062efec220be512dc0
SHA512c18fdcc47632120af36cd814e0e7bd8a1de39a4e77805c6c193f5f3592aefffc9c3c4f7e2f31150872ebdf84f2aac87f2bb14d4eec4c17730b0f67b2c3d9121f
-
Filesize
44B
MD552b7ba72c99fbd0a6c6c9c4b9f70cb89
SHA10888b49e3952d6a202b2a5bc6a6d0ba97304a134
SHA2569458985fb8c27599bdf14f013146c382256e1b91de4c397e03c17bb7b4c10a8a
SHA5122a7ba4ef10cf1213f793048c43247d318915a4c246f03dd5dfc245def539b13f2680f44a9833eda4713e32fdbf8b060965f946983d23cc51e88fd29cb354d715
-
Filesize
764KB
MD5f7ba4f7ed7d31e823ad386e44512220d
SHA1393c9c99eb4e7ae040d38c4cbbeaa4df7d36bf3c
SHA25647dde1ea825b5f0dccc2675404c5f545c25225bde240571965f388a05e6d1be9
SHA512bbeb4c9191f2c3d3d758d1de63573fd7250f38e6493a78518bfc07d993401eea0a88d05c0d9178ab88145489a792de7edc645e875e5d83df1453a43cafa95796
-
Filesize
2.1MB
MD59c4905c83ff4757aa4af814ff541dbff
SHA1bb6e9e6a15762146ecaa518dcacf3cec099030ef
SHA256b28f07326f5b491544b74903e691cb69146398be5c2b209c353acd530c1bc6a1
SHA512ebfd4d124442b45f5ee1b760594149148255900a1a4706f939f16600731db2569167e5ad0cb073af2a4fbd09bda10a2ddc8289ca40c7e5e9c9abbdc0c9cd4d39
-
Filesize
696KB
MD58aa8c628f7b7b7f3e96eff00557bd0bf
SHA19af9cf61707cbba7bf0d7cbed94e8db91aff8bd6
SHA25614d4fa3ea6c3fbf6e9d284de717e73a1ebb5e77f3d5c8c98808e40ade359ea9d
SHA5125e0a4765873684fce159af81310e37b6918c923ccede0c4de0bd1e2e221425109131830cff02e3f910f15b0401ee3b4ae68700b6d29a5e8466f6d4ee1dcd6eeb
-
Filesize
2.6MB
MD54af78d4339b984a67f73c7f38d19b898
SHA15bfe2be35cb0146583c1b8c4ef6ed9080f42a9cf
SHA25636aee391a9711e586c2b92e5a60c106feb593b28735820e8aa1d2fed655d811f
SHA512fb132fca362317d6814448a69068ae99e82c31ce96c3e3a076a6123850ed20610220547a56447308291ebebfa0cfbfc9eae542613e344582bc3eafacfb33b61d
-
Filesize
430KB
MD543b9337ca111defa4da637a3121e7a7d
SHA140f15faa582609408194e2317f14a949388874ef
SHA256e5d2be36e26d90a1926b641e25689ecd9ae4f796bc3ca40ba75b30ef33f67fbf
SHA51225c34deb29fc478c68dd7dd582571025db4cebd9a3d824caa98e9a1f74c1ffea4c983964d9657517d5fc1522efa6e3dbf23224bd24fa215780e39eae13acac60