Analysis
-
max time kernel
148s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 18:23
Static task
static1
Behavioral task
behavioral1
Sample
8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe
-
Size
520KB
-
MD5
8b78b909dcfe0d6e263e5e16481672f6
-
SHA1
196bf89833b7e99e8479bcf8b48ac503ebc6ac4e
-
SHA256
5b121c485ac955445c9f9550f1f700c684016b0443beac607f76aab3d6826e34
-
SHA512
23b5856fd7786fad1aeafff88c7b1ded7a8b046b43590f6af4cff7eab94e2b4ead26515fbfc43cab82a51a0de0e5be558f31c88a3c7a3cea76bee386ad34a5fa
-
SSDEEP
12288:+lI39/HDTRV+XMcg5Hzqx3Kyw3XgUGk4nc/GlfCtzkcuWN77ut:+lI3NHDTeXMcMWxRwHgNMKfCt/Nm
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts b55d.exe -
Executes dropped EXE 4 IoCs
pid Process 2776 q.exe 2468 b55d.exe 1744 b55d.exe 1708 b55d.exe -
Loads dropped DLL 54 IoCs
pid Process 2676 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe 2676 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe 2776 q.exe 2776 q.exe 2776 q.exe 2776 q.exe 2184 regsvr32.exe 2676 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe 2676 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe 2468 b55d.exe 2468 b55d.exe 2468 b55d.exe 2676 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe 2676 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe 1744 b55d.exe 1744 b55d.exe 1744 b55d.exe 1708 b55d.exe 2400 rundll32.exe 2400 rundll32.exe 2400 rundll32.exe 2400 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 2188 rundll32.exe 1708 b55d.exe 1708 b55d.exe 1708 b55d.exe 1708 b55d.exe 1708 b55d.exe 1708 b55d.exe 1708 b55d.exe 1708 b55d.exe 1708 b55d.exe 1708 b55d.exe 1708 b55d.exe 1708 b55d.exe 1708 b55d.exe 1708 b55d.exe 1708 b55d.exe 1708 b55d.exe 1708 b55d.exe 1708 b55d.exe 1708 b55d.exe 1708 b55d.exe 1708 b55d.exe 1708 b55d.exe 1708 b55d.exe 1708 b55d.exe 1708 b55d.exe 1708 b55d.exe 1708 b55d.exe 1708 b55d.exe -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{C15134ED-31C1-4b17-B04E-FFFAB993EFA2} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{C15134ED-31C1-4b17-B04E-FFFAB993EFA2}\ = "Generic BHO" regsvr32.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 3 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 b55d.exe File opened for modification \??\PhysicalDrive0 rundll32.exe File opened for modification \??\PhysicalDrive0 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe -
Drops file in System32 directory 19 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\b3rc.exe 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\c35s.dll 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\b33d.exe 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\b55d.exe 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\4b3o.dlltmp 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\4bl4.dll 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\4bl4.dlltmp 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\46be.dll 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe File created C:\Windows\SysWOW64\98-100-235 rundll32.exe File created C:\Windows\SysWOW64\1252 rundll32.exe File opened for modification C:\Windows\SysWOW64\3ce8.dll 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\bba6.dll 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\c6cb.dll 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\36ud.exe 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\353r.dlltmp 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\s.exe q.exe File opened for modification C:\Windows\SysWOW64\c6cb.dlltmp 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\353r.dll 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\4b3o.dll 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File opened for modification C:\Windows\80au.bmp 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe File created C:\Windows\Tasks\ms.job 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe File opened for modification C:\Windows\480.exe 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe File opened for modification C:\Windows\b3cd.exe 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe File opened for modification C:\Windows\d48.flv 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe File opened for modification C:\Windows\0acu.bmp 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe File opened for modification C:\Windows\3cdd.flv 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe File opened for modification C:\Windows\b5b3.bmp 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe File opened for modification C:\Windows\80a.bmp 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe File opened for modification C:\Windows\d48d.flv 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe File opened for modification C:\Windows\436b.flv 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe File opened for modification C:\Windows\480d.exe 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe File opened for modification C:\Windows\d48d.exe 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language q.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b55d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b55d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b55d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Modifies registry class 51 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C15134ED-31C1-4b17-B04E-FFFAB993EFA2} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C15134ED-31C1-4b17-B04E-FFFAB993EFA2}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C15134ED-31C1-4b17-B04E-FFFAB993EFA2}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{53738F3D-33DE-4BF3-8F3F-0FDA9BBE7121} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{3D91005B-09EB-43B9-AEB2-31DD4C587447} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3D91005B-09EB-43B9-AEB2-31DD4C587447} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3D91005B-09EB-43B9-AEB2-31DD4C587447}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C15134ED-31C1-4b17-B04E-FFFAB993EFA2}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{3D91005B-09EB-43B9-AEB2-31DD4C587447}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C15134ED-31C1-4b17-B04E-FFFAB993EFA2}\VersionIndependentProgID\ = "BHO.FunPlayer" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{53738F3D-33DE-4BF3-8F3F-0FDA9BBE7121}\1.0\FLAGS\ = "0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{3D91005B-09EB-43B9-AEB2-31DD4C587447}\ = "IFunPlayer" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C15134ED-31C1-4b17-B04E-FFFAB993EFA2}\ = "CFunPlayer Object" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{53738F3D-33DE-4BF3-8F3F-0FDA9BBE7121}\1.0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{3D91005B-09EB-43B9-AEB2-31DD4C587447}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer.1\CLSID\ = "{C15134ED-31C1-4b17-B04E-FFFAB993EFA2}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer\ = "CFunPlayer Object" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C15134ED-31C1-4b17-B04E-FFFAB993EFA2}\InprocServer32\ThreadingModel = "apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{53738F3D-33DE-4BF3-8F3F-0FDA9BBE7121}\1.0\0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C15134ED-31C1-4b17-B04E-FFFAB993EFA2}\ProgID\ = "BHO.FunPlayer.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C15134ED-31C1-4b17-B04E-FFFAB993EFA2}\AppID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{53738F3D-33DE-4BF3-8F3F-0FDA9BBE7121}\1.0\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3D91005B-09EB-43B9-AEB2-31DD4C587447}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{3D91005B-09EB-43B9-AEB2-31DD4C587447}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\BHO.DLL regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C15134ED-31C1-4b17-B04E-FFFAB993EFA2}\InprocServer32\ = "C:\\Windows\\SysWow64\\4b3o.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{53738F3D-33DE-4BF3-8F3F-0FDA9BBE7121}\1.0\HELPDIR\ = "C:\\Windows\\SysWow64\\" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{53738F3D-33DE-4bf3-8F3F-0FDA9BBE7121}\ = "BHO" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{53738F3D-33DE-4BF3-8F3F-0FDA9BBE7121}\1.0\FLAGS regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer.1 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer.1\ = "CFunPlayer Object" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer.1\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C15134ED-31C1-4b17-B04E-FFFAB993EFA2}\VersionIndependentProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{3D91005B-09EB-43B9-AEB2-31DD4C587447}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C15134ED-31C1-4b17-B04E-FFFAB993EFA2}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3D91005B-09EB-43B9-AEB2-31DD4C587447}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer\CurVer\ = "BHO.FunPlayer.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{53738F3D-33DE-4BF3-8F3F-0FDA9BBE7121}\1.0\0\win32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{53738F3D-33DE-4bf3-8F3F-0FDA9BBE7121} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3D91005B-09EB-43B9-AEB2-31DD4C587447}\ = "IFunPlayer" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer\CLSID\ = "{C15134ED-31C1-4b17-B04E-FFFAB993EFA2}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C15134ED-31C1-4b17-B04E-FFFAB993EFA2}\TypeLib\ = "{53738F3D-33DE-4BF3-8F3F-0FDA9BBE7121}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{53738F3D-33DE-4BF3-8F3F-0FDA9BBE7121}\1.0\ = "BHO 1.0 Type Library" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{53738F3D-33DE-4BF3-8F3F-0FDA9BBE7121}\1.0\0\win32\ = "C:\\Windows\\SysWow64\\4b3o.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\BHO.DLL\AppID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FunPlayer\CurVer regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{3D91005B-09EB-43B9-AEB2-31DD4C587447}\TypeLib\ = "{53738F3D-33DE-4BF3-8F3F-0FDA9BBE7121}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3D91005B-09EB-43B9-AEB2-31DD4C587447}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3D91005B-09EB-43B9-AEB2-31DD4C587447}\TypeLib\ = "{53738F3D-33DE-4BF3-8F3F-0FDA9BBE7121}" regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1708 b55d.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2776 q.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2676 wrote to memory of 2924 2676 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe 30 PID 2676 wrote to memory of 2924 2676 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe 30 PID 2676 wrote to memory of 2924 2676 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe 30 PID 2676 wrote to memory of 2924 2676 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe 30 PID 2676 wrote to memory of 2924 2676 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe 30 PID 2676 wrote to memory of 2924 2676 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe 30 PID 2676 wrote to memory of 2924 2676 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe 30 PID 2676 wrote to memory of 2640 2676 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe 31 PID 2676 wrote to memory of 2640 2676 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe 31 PID 2676 wrote to memory of 2640 2676 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe 31 PID 2676 wrote to memory of 2640 2676 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe 31 PID 2676 wrote to memory of 2640 2676 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe 31 PID 2676 wrote to memory of 2640 2676 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe 31 PID 2676 wrote to memory of 2640 2676 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe 31 PID 2676 wrote to memory of 2592 2676 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe 32 PID 2676 wrote to memory of 2592 2676 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe 32 PID 2676 wrote to memory of 2592 2676 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe 32 PID 2676 wrote to memory of 2592 2676 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe 32 PID 2676 wrote to memory of 2592 2676 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe 32 PID 2676 wrote to memory of 2592 2676 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe 32 PID 2676 wrote to memory of 2592 2676 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe 32 PID 2676 wrote to memory of 2748 2676 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe 33 PID 2676 wrote to memory of 2748 2676 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe 33 PID 2676 wrote to memory of 2748 2676 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe 33 PID 2676 wrote to memory of 2748 2676 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe 33 PID 2676 wrote to memory of 2748 2676 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe 33 PID 2676 wrote to memory of 2748 2676 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe 33 PID 2676 wrote to memory of 2748 2676 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe 33 PID 2676 wrote to memory of 2776 2676 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe 34 PID 2676 wrote to memory of 2776 2676 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe 34 PID 2676 wrote to memory of 2776 2676 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe 34 PID 2676 wrote to memory of 2776 2676 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe 34 PID 2676 wrote to memory of 2776 2676 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe 34 PID 2676 wrote to memory of 2776 2676 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe 34 PID 2676 wrote to memory of 2776 2676 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe 34 PID 2676 wrote to memory of 2184 2676 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe 35 PID 2676 wrote to memory of 2184 2676 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe 35 PID 2676 wrote to memory of 2184 2676 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe 35 PID 2676 wrote to memory of 2184 2676 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe 35 PID 2676 wrote to memory of 2184 2676 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe 35 PID 2676 wrote to memory of 2184 2676 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe 35 PID 2676 wrote to memory of 2184 2676 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe 35 PID 2676 wrote to memory of 2468 2676 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe 36 PID 2676 wrote to memory of 2468 2676 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe 36 PID 2676 wrote to memory of 2468 2676 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe 36 PID 2676 wrote to memory of 2468 2676 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe 36 PID 2676 wrote to memory of 2468 2676 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe 36 PID 2676 wrote to memory of 2468 2676 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe 36 PID 2676 wrote to memory of 2468 2676 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe 36 PID 2676 wrote to memory of 1744 2676 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe 38 PID 2676 wrote to memory of 1744 2676 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe 38 PID 2676 wrote to memory of 1744 2676 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe 38 PID 2676 wrote to memory of 1744 2676 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe 38 PID 2676 wrote to memory of 1744 2676 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe 38 PID 2676 wrote to memory of 1744 2676 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe 38 PID 2676 wrote to memory of 1744 2676 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe 38 PID 2676 wrote to memory of 2188 2676 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe 42 PID 2676 wrote to memory of 2188 2676 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe 42 PID 2676 wrote to memory of 2188 2676 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe 42 PID 2676 wrote to memory of 2188 2676 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe 42 PID 2676 wrote to memory of 2188 2676 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe 42 PID 2676 wrote to memory of 2188 2676 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe 42 PID 2676 wrote to memory of 2188 2676 8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe 42 PID 1708 wrote to memory of 2400 1708 b55d.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8b78b909dcfe0d6e263e5e16481672f6_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32\4bl4.dll"2⤵
- System Location Discovery: System Language Discovery
PID:2924
-
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32\c6cb.dll"2⤵
- System Location Discovery: System Language Discovery
PID:2640
-
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32\353r.dll"2⤵
- System Location Discovery: System Language Discovery
PID:2592
-
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32\4b3o.dll"2⤵
- System Location Discovery: System Language Discovery
PID:2748
-
-
C:\Users\Admin\AppData\Local\Temp\h8nil4o8\q.exeC:\Users\Admin\AppData\Local\Temp\h8nil4o8\q.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2776
-
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /s "C:\Windows\system32\4b3o.dll"2⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2184
-
-
C:\Windows\SysWOW64\b55d.exeC:\Windows\system32\b55d.exe -i2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2468
-
-
C:\Windows\SysWOW64\b55d.exeC:\Windows\system32\b55d.exe -s2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1744
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32 C:\Windows\system32\46be.dll, Always2⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2188
-
-
C:\Windows\SysWOW64\b55d.exeC:\Windows\SysWOW64\b55d.exe1⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32 C:\Windows\system32\46be.dll,Always2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2400
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD596304ef9a2c3c1e384be4b58771e3a43
SHA1323ae38af1ee65168abd25e17b177d1a3ecb5880
SHA25668c2a4524b2171a623093695fe0cb2b51f122d9c46204ef4d724b59e973186ec
SHA512023bac06f494625aecd015c2d3fe33f981c410b098c8aed988e321786aa4b0a5e22269e73dfa55fe8ebcd5e13fac566f89133bbc29a68e7a268190a25b319aa0
-
Filesize
380KB
MD5b983302b8b45b453a5b3104bfdc1a973
SHA1dc006cc01841931cfb58f297fcb80e567b1a7574
SHA2566527e9592edc1c9efad835630da58412c840475bdd235238470fb66073f565de
SHA512e7d321c0816ed3da62bf163e1957d896b4463dd943c354cdaad94bd9c94ddf86f1c8783d0c0418bbb70b0aa911d16c9782027c73f1f6aabc220b0680a69a9c56
-
Filesize
136KB
MD564db1299c26aa1479e40be31034b7b7b
SHA1d917bb0e47574721e3457edead34e5ca926bf31c
SHA25664a330806590c6505c1d6932f85777adf5138d6b9ae7babe7cdd42f05caa03f4
SHA5121219fb3a3a98af6ccbce05d2908df8fc9b8575f29a5c187b5471563de9404232d1dcfcaaf9c3cde7a14255caea4de86731857570bc130604a082ae85b950922e
-
Filesize
108KB
MD5923a5fc659a884ed9b30c327732f0caf
SHA11dcc3f0e654ea2098cbe9f023bea150711caac6f
SHA25638c74477e1098bb34c0a3417fa34c021b0b99ad175765d65b8c417a45eaa804f
SHA51260f7b99642a32b5fc7871333e1292f4d7d2dc14269ad2ecae4943d8ee7c4db77798b23b22356241c8640a88ccc80ccd2c284280b7147be92e4df83c99127972a
-
Filesize
20KB
MD5c060f4d902b639dc692b5bff2fb199c5
SHA17b1b4fdb3f9b4f94af40682026b5367347bc8bc5
SHA256cfc8cc21ac16b078291139cdfed435de23bd4144d238828063c48d26e42827fb
SHA512a545142c3e06c6d36e610962d46f229ada793a9e73da4251d40f15f2f31bafcadd80d17a94f8bd4edb1e9dc98344df3ad65fcdaaf71235a279e2b10a4c3d8afb