Analysis
-
max time kernel
124s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 11:31
Static task
static1
Behavioral task
behavioral1
Sample
aad716e6ebefb3aac96726bea8bd529b_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
aad716e6ebefb3aac96726bea8bd529b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
aad716e6ebefb3aac96726bea8bd529b_JaffaCakes118.exe
-
Size
1.4MB
-
MD5
aad716e6ebefb3aac96726bea8bd529b
-
SHA1
a5399332adf6786c33b40273ca867ba30d224f71
-
SHA256
38163fc3b8a110ef6be66ac8db5aad4335f2f64974e9db67dd54ef395d7e2ded
-
SHA512
204257067ce702fea520dd16b6dc8e130f63cbc3a0d9d5511ab884623d8bab1da558329c047e42f2435468aed12b7be769f1cd3c00cb0e1cc5b729d7479fa93f
-
SSDEEP
24576:bir/4p6qO4pDlPJsZtZQk5p8hulbEwfDpBzjRvdsxlTShiVClwb:K/4Qf4pxPctqG8IllnxvdsxZ4U5b
Malware Config
Signatures
-
Loads dropped DLL 10 IoCs
pid Process 676 aad716e6ebefb3aac96726bea8bd529b_JaffaCakes118.exe 676 aad716e6ebefb3aac96726bea8bd529b_JaffaCakes118.exe 676 aad716e6ebefb3aac96726bea8bd529b_JaffaCakes118.exe 676 aad716e6ebefb3aac96726bea8bd529b_JaffaCakes118.exe 676 aad716e6ebefb3aac96726bea8bd529b_JaffaCakes118.exe 676 aad716e6ebefb3aac96726bea8bd529b_JaffaCakes118.exe 676 aad716e6ebefb3aac96726bea8bd529b_JaffaCakes118.exe 676 aad716e6ebefb3aac96726bea8bd529b_JaffaCakes118.exe 676 aad716e6ebefb3aac96726bea8bd529b_JaffaCakes118.exe 676 aad716e6ebefb3aac96726bea8bd529b_JaffaCakes118.exe -
Drops file in Program Files directory 12 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\jishu_164804\jishu_164804.ini aad716e6ebefb3aac96726bea8bd529b_JaffaCakes118.exe File created C:\Program Files (x86)\soft164804\a aad716e6ebefb3aac96726bea8bd529b_JaffaCakes118.exe File created C:\Program Files (x86)\soft164804\0420110405040415480416040404.txt aad716e6ebefb3aac96726bea8bd529b_JaffaCakes118.exe File created C:\Program Files (x86)\soft164804\wl0322276.exe aad716e6ebefb3aac96726bea8bd529b_JaffaCakes118.exe File created C:\Program Files (x86)\soft164804\pipi_dae_382.exe aad716e6ebefb3aac96726bea8bd529b_JaffaCakes118.exe File created C:\Program Files (x86)\soft164804\d_1604.exe aad716e6ebefb3aac96726bea8bd529b_JaffaCakes118.exe File created C:\Program Files (x86)\jishu_164804\FlashIcon.ico aad716e6ebefb3aac96726bea8bd529b_JaffaCakes118.exe File created C:\Program Files (x86)\jishu_164804\dailytips.ini aad716e6ebefb3aac96726bea8bd529b_JaffaCakes118.exe File created C:\Program Files (x86)\jishu_164804\newnew.exe aad716e6ebefb3aac96726bea8bd529b_JaffaCakes118.exe File created C:\Program Files (x86)\jishu_164804\newnew.ini aad716e6ebefb3aac96726bea8bd529b_JaffaCakes118.exe File created C:\Program Files (x86)\soft164804\B_0420110405040415480416040404.txt aad716e6ebefb3aac96726bea8bd529b_JaffaCakes118.exe File created C:\Program Files (x86)\soft164804\MiniJJ_12319.exe aad716e6ebefb3aac96726bea8bd529b_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aad716e6ebefb3aac96726bea8bd529b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecca440099c424d92937bb9b1db2c920000000002000000000010660000000100002000000061cd04add56807dbed36b817d8d706b9bd278b7810eb4a299ee79eaf80349d7a000000000e8000000002000020000000deb603dfb4b532b72f86d403246b48b2bfd07eaf4ecf3fcb2c8e403d8520a1a520000000f0a3da9e88a3cbe926ca4f5d27ffc0bfa488e0a028025df4d6a598cf94d4a3674000000087859bac4476ded0a396e4d4fe71e139c9a3437b0ff09d16e84370d8ac64124cabefbf6d9e4bff893bd26bc1c4b08c755881c54f8999d0a91bb77c58fbe44603 IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A06FDC51-5E1E-11EF-9730-E6B33176B75A} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A05CD151-5E1E-11EF-9730-E6B33176B75A} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430228990" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecca440099c424d92937bb9b1db2c9200000000020000000000106600000001000020000000829b70ceac63d6ea95fdf64c2a1ddb09a5b0886a8663f1353e44ed392bf25ef9000000000e8000000002000020000000d914143f5b2c23b73b3839d3926a19b0fe84eafd23e6c59dd0f9eef18345afec9000000018b8269449c4862d7596617104f14935f72daef69bb9920095b04ae82d5835b4bd799fc35efcdc096350c34918209332c37b4d6d7b3b3022a71cbb8ad93a7079ba031a4bb5525c1df0b360ef1c50971bf4dc20687f4a24e5815fb79c1aaf8b622cc50601f8c8262833fe0d626c0f503d9a29715fce363b0c764b8333141afc22949984e1a1ed96c632965181f43b57bf400000003e02240ac191abc15c85568546c85105d08cc797cd7d715559950dab45c787603bd1bef5f5a515a454e898f5946066c51f513174b1a3a6be43daa70b85d4137f IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5058158e2bf2da01 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 676 aad716e6ebefb3aac96726bea8bd529b_JaffaCakes118.exe 676 aad716e6ebefb3aac96726bea8bd529b_JaffaCakes118.exe 676 aad716e6ebefb3aac96726bea8bd529b_JaffaCakes118.exe 676 aad716e6ebefb3aac96726bea8bd529b_JaffaCakes118.exe 676 aad716e6ebefb3aac96726bea8bd529b_JaffaCakes118.exe 676 aad716e6ebefb3aac96726bea8bd529b_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2724 IEXPLORE.EXE 2916 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE 2260 IEXPLORE.EXE 2260 IEXPLORE.EXE 2260 IEXPLORE.EXE 2260 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 50 IoCs
description pid Process procid_target PID 676 wrote to memory of 2900 676 aad716e6ebefb3aac96726bea8bd529b_JaffaCakes118.exe 30 PID 676 wrote to memory of 2900 676 aad716e6ebefb3aac96726bea8bd529b_JaffaCakes118.exe 30 PID 676 wrote to memory of 2900 676 aad716e6ebefb3aac96726bea8bd529b_JaffaCakes118.exe 30 PID 676 wrote to memory of 2900 676 aad716e6ebefb3aac96726bea8bd529b_JaffaCakes118.exe 30 PID 676 wrote to memory of 2900 676 aad716e6ebefb3aac96726bea8bd529b_JaffaCakes118.exe 30 PID 676 wrote to memory of 2900 676 aad716e6ebefb3aac96726bea8bd529b_JaffaCakes118.exe 30 PID 676 wrote to memory of 2900 676 aad716e6ebefb3aac96726bea8bd529b_JaffaCakes118.exe 30 PID 2900 wrote to memory of 2724 2900 IEXPLORE.EXE 31 PID 2900 wrote to memory of 2724 2900 IEXPLORE.EXE 31 PID 2900 wrote to memory of 2724 2900 IEXPLORE.EXE 31 PID 2900 wrote to memory of 2724 2900 IEXPLORE.EXE 31 PID 676 wrote to memory of 2772 676 aad716e6ebefb3aac96726bea8bd529b_JaffaCakes118.exe 32 PID 676 wrote to memory of 2772 676 aad716e6ebefb3aac96726bea8bd529b_JaffaCakes118.exe 32 PID 676 wrote to memory of 2772 676 aad716e6ebefb3aac96726bea8bd529b_JaffaCakes118.exe 32 PID 676 wrote to memory of 2772 676 aad716e6ebefb3aac96726bea8bd529b_JaffaCakes118.exe 32 PID 676 wrote to memory of 2772 676 aad716e6ebefb3aac96726bea8bd529b_JaffaCakes118.exe 32 PID 676 wrote to memory of 2772 676 aad716e6ebefb3aac96726bea8bd529b_JaffaCakes118.exe 32 PID 676 wrote to memory of 2772 676 aad716e6ebefb3aac96726bea8bd529b_JaffaCakes118.exe 32 PID 676 wrote to memory of 2728 676 aad716e6ebefb3aac96726bea8bd529b_JaffaCakes118.exe 33 PID 676 wrote to memory of 2728 676 aad716e6ebefb3aac96726bea8bd529b_JaffaCakes118.exe 33 PID 676 wrote to memory of 2728 676 aad716e6ebefb3aac96726bea8bd529b_JaffaCakes118.exe 33 PID 676 wrote to memory of 2728 676 aad716e6ebefb3aac96726bea8bd529b_JaffaCakes118.exe 33 PID 676 wrote to memory of 2728 676 aad716e6ebefb3aac96726bea8bd529b_JaffaCakes118.exe 33 PID 676 wrote to memory of 2728 676 aad716e6ebefb3aac96726bea8bd529b_JaffaCakes118.exe 33 PID 676 wrote to memory of 2728 676 aad716e6ebefb3aac96726bea8bd529b_JaffaCakes118.exe 33 PID 2724 wrote to memory of 2780 2724 IEXPLORE.EXE 34 PID 2724 wrote to memory of 2780 2724 IEXPLORE.EXE 34 PID 2724 wrote to memory of 2780 2724 IEXPLORE.EXE 34 PID 2724 wrote to memory of 2780 2724 IEXPLORE.EXE 34 PID 2724 wrote to memory of 2780 2724 IEXPLORE.EXE 34 PID 2724 wrote to memory of 2780 2724 IEXPLORE.EXE 34 PID 2724 wrote to memory of 2780 2724 IEXPLORE.EXE 34 PID 2772 wrote to memory of 2916 2772 IEXPLORE.EXE 35 PID 2772 wrote to memory of 2916 2772 IEXPLORE.EXE 35 PID 2772 wrote to memory of 2916 2772 IEXPLORE.EXE 35 PID 2772 wrote to memory of 2916 2772 IEXPLORE.EXE 35 PID 2728 wrote to memory of 2612 2728 Wscript.exe 36 PID 2728 wrote to memory of 2612 2728 Wscript.exe 36 PID 2728 wrote to memory of 2612 2728 Wscript.exe 36 PID 2728 wrote to memory of 2612 2728 Wscript.exe 36 PID 2728 wrote to memory of 2612 2728 Wscript.exe 36 PID 2728 wrote to memory of 2612 2728 Wscript.exe 36 PID 2728 wrote to memory of 2612 2728 Wscript.exe 36 PID 2916 wrote to memory of 2260 2916 IEXPLORE.EXE 38 PID 2916 wrote to memory of 2260 2916 IEXPLORE.EXE 38 PID 2916 wrote to memory of 2260 2916 IEXPLORE.EXE 38 PID 2916 wrote to memory of 2260 2916 IEXPLORE.EXE 38 PID 2916 wrote to memory of 2260 2916 IEXPLORE.EXE 38 PID 2916 wrote to memory of 2260 2916 IEXPLORE.EXE 38 PID 2916 wrote to memory of 2260 2916 IEXPLORE.EXE 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\aad716e6ebefb3aac96726bea8bd529b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\aad716e6ebefb3aac96726bea8bd529b_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:676 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" http://taourl.com/i0dpw2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://taourl.com/i0dpw3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2724 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2780
-
-
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" http://www.178gg.com/lianjie/10608.htm2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://www.178gg.com/lianjie/10608.htm3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2916 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2260
-
-
-
-
C:\Windows\SysWOW64\Wscript.exe"C:\Windows\system32\Wscript" "C:\Program Files (x86)\soft164804\b_1604.vbs"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files (x86)\soft164804\300.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:2612
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD597b173fabfcfa68bce50b916f0926a0f
SHA120d9223f19a5763c78001e807547c5ff02b72780
SHA2568e5478beb98b4f959eeec201a7917186eda3b98cc6cc67a54954628b1c8b2363
SHA5121e51059d2273e142972edecbae5b8a2aeb6128f4dd9d1558468836959258cbb864efe4c083043154b43da21af23eac8bbab162ee5017c33bc73fc8d2b67ee76d
-
Filesize
247B
MD50db1e4dc50d3fef7759e23a5bf4f0445
SHA1cf4faaa8b04368ae7d45b678353c83d9c5ef7385
SHA2561091b38105123f3775398561213d86d783bf57c777fbba87197f3b5c70ee9e28
SHA512770c670c5e4292b8fa017053a43b0dc97216492d0409c6ea29ec7bc9f2be2eee239600a7a922e801f6a7d76e02c3a0d8bdadf839db4358fd5bfcf15e573ab189
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5518736e2f29a1e4b3917388fdfd782ca
SHA1f84b5116565fa073cefe5cc90f5936cd06b2dd46
SHA25690893050d5da91bd53b93f94e7b46da4038fd468f507a0778e45065cf778bf51
SHA512e234fb50ed657669d9716f3551f486ec376d7748a2f93b7cd9e68fc2a22f351b2ef62c588795f5dbd7b931b8406c24220475b8c5cf2c76f0f018e913071f407d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583dfab7f06ddbeaab5eca529706bd2d6
SHA11ddd0fe8e5145b87bee4873b2bde5abdb33c4b1a
SHA256824f0988912ed4ced6d427414359fe6232fc2db63ac41d8d043940ca28fb3e46
SHA512b01b6e4260acc6880d63d5ddf6ec62292cd446b422729d2704acaabbb981a6630b8d2a7822787c2e27eb0596251ab093f7cde750a28f1c7d3c8093b20637ee44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577399c048136337a330a36060475d789
SHA18b07acbf3d27673bb309f98ce2740423a89fd5c9
SHA25662771ac7e4a400ebaf2a3850891c96d91bc8d87870ccd858d6b14d1ca20e1c82
SHA512e575ff6ddb6d1f76596ba5fd631d6d84280450d53033b070374203d275c829442fc02b13ad4d5558885292c8abfee3bfab88cfbbafddacc8fbbc5657dfa57686
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54991691a35b7fc24b13f92f82998ca6e
SHA11e935d470beed4515a65595218ec2087b6e80c73
SHA25696ae8b72ee13d99abe683395e67856e80067e99d2e1641dfcd91d0be658d8f84
SHA5128cf0fe20a8eb22b2292534bec610ab560886de14b11ec8346d9ac737a328afdf26c84943741400e167ff7fca925542f0991c78574f173c108b1f8f889686eb5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577b1dbb7da229b053279db8ab1fd4730
SHA1bdc72ff17c9272d5d1998a81c8a18dbc3b9b60f6
SHA256212b1bf8f8252878702b4b4825183e0443a135461bc435ba886a27b10339cd2d
SHA512af839ec13181162aecd0fc58a9f2f3404e85a33c6e05e93a2c1a8516e0df5fcff000cae05a1499c23f2037cefb0ae266f093652157b2a4d0e6c18a4e15e14132
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d900dec97c88f76381cb6a584c497157
SHA182a2bb59e3177f2ba4e7f4b701956f053a87a2ca
SHA25697e80e809f66eec2f9be0be7eec28152d39d24d9faa3199191106fa39e47806f
SHA5125d7e6ed17e8c5c9171333882a86457fe51a834febdea0cf3852a515e93fc9f29a284aa3fa49dbf6182693dc4466fbc578ce60cac34bfbcf794f973cfc5227244
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56770d5619b99ad147502076385303ce0
SHA1611a3d6531ab10cb17c602cae850f4ee6e55b61a
SHA2561af944b6d0f58f8e2c77f512de4c395675c203f141c96e6d3b24ea7c93434076
SHA512b4cd2fead9e99c001057c651415e1b356173b3e4b6b6d4d001c697cf9c1de2ca94a3c8a0b0a90769bbcd150b7602715ba219073ee9eb2ade3be31c4578d08dae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5993d3414acd4f812c708cb03e8e4db34
SHA19a207429caf57cad0e9c876835c8d8c3aec52513
SHA2567bb48ce84c8dbf8371eeb1b51750e0e9d81b5cede24c2e47092f66476dc0290a
SHA51240879b96ef9d86c4cfbf826701943c4eb92d374a3f091d9c94e5387d8e358e07e743c5d8f863ca6a8e80276900e2e31235b1575a80e65f1b04a0ec9ad43ca36f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3be3790fa165cfd24be19701d16fa1e
SHA1353dca0402978d6f9534971f8e4fda701d9cbf23
SHA256b173a4a3e2c2a55b582bd61b8ab3c3e89b125fa125b41dd7c21b26860ed755e1
SHA5127359a3a31569ad06d95263e36ceea0a89ed2f59169f9f7735c9abdb560c1df0ccd5bd2e718348de038dd399374cc78f13e272c8d906da20ea996992175b27d11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598f06feb4ab2af74ba5b0b4b86254785
SHA19a22bb1ddfe4fa61b47db16b0cb06e30079acff7
SHA256d2580a05d372db628b46f5e8a9028637b5e7019f26f1b7fcccc0336a0b447959
SHA512332d73e7b6ca7d572975a71955076a30d9dcaa183137d0105c7a1e6a716481b362c55a6d7c06a4735be822ee048a1b6230ce43007884393503d46756e22f5369
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{A05CD151-5E1E-11EF-9730-E6B33176B75A}.dat
Filesize5KB
MD51106ebdc55fcc9057a37472faf79de76
SHA1d383bd282b1b495b151962e70af5c36773ed5c1d
SHA256ae12e0e56cb3110e9e98390af9fb5c01c20ecb0530c20c6048ae46d7b9acf8b1
SHA512dabdfe596e995b907f729ec2640ff665421b019df247bc65505158e83649c9cdf198ccda169fcbeb7ddcdda983af22d438c060b0c09cb453e91d63bb32c3fdfe
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
1KB
MD5b38712ed231f729ae6d0052f85b2acb1
SHA17ef875de599fddb503a61b85778fcccdfe31bdd7
SHA2565dcef75d81cb42fd8d751ebd965836f165cad8c67b56ba1a809b41d8306ca824
SHA512e8598d40cdae0ac5f44b386ae46782acf1f040eb35d31048fa73a4af0467f640d832f94ddbbf20de8e926a68a88c598fc38646afbab4dcb1a3dc5737afe5f60b
-
Filesize
1.0MB
MD5e2590fb7bac27dbfa512820e9139f28b
SHA1209d8d0b77c7a8863a3c68464ce47f6a3f00d454
SHA2564369c213390dd318aaf57b841e338f0b781b16e61713c39e3d961d6065de1821
SHA512a6b8cdac512c2d05eb2270f8b4f64248cc177785acbd8d4f0ad725acdd2c894f639e7e7259066a8014a79d69f213812dc09793a2bad7a3d6bd9a511f3ee57223
-
Filesize
31KB
MD583cd62eab980e3d64c131799608c8371
SHA15b57a6842a154997e31fab573c5754b358f5dd1c
SHA256a6122e80f1c51dc72770b4f56c7c482f7a9571143fbf83b19c4d141d0cb19294
SHA51291cfbcc125600ec341f5571dcf1e4a814cf7673f82cf42f32155bd54791bbf32619f2bb14ae871d7996e9ddecdfcc5db40caa0979d6dfba3e73cfe8e69c163c9
-
Filesize
14KB
MD5254f13dfd61c5b7d2119eb2550491e1d
SHA15083f6804ee3475f3698ab9e68611b0128e22fd6
SHA256fd0e8be2135f3d326b65520383a3468c3983fa32c9c93594d986b16709d80f28
SHA512fcef8ac5bd0ee6e316dbbc128a223ba18c8bf85a8d253e0c0877af6a4f686a20b08d34e5a426e2be5045962b391b8073769253a4d9b18616febc8133ccf654f7