Overview
overview
8Static
static
7b33e75eee0...18.exe
windows7-x64
8b33e75eee0...18.exe
windows10-2004-x64
8$PLUGINSDI...sh.dll
windows7-x64
3$PLUGINSDI...sh.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$TEMP/inst..._x.exe
windows7-x64
8$TEMP/inst..._x.exe
windows10-2004-x64
8$PLUGINSDI...ay.dll
windows7-x64
3$PLUGINSDI...ay.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...fo.dll
windows7-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3$PLUGINSDI...ll.dll
windows7-x64
3$PLUGINSDI...ll.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3Flash9e.dll
windows7-x64
3Flash9e.dll
windows10-2004-x64
3FlashUtil9e.exe
windows7-x64
3FlashUtil9e.exe
windows10-2004-x64
3BlinkxBroadbandTV.exe
windows7-x64
7BlinkxBroadbandTV.exe
windows10-2004-x64
7uninstall.exe
windows7-x64
7uninstall.exe
windows10-2004-x64
7Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-08-2024 11:14
Behavioral task
behavioral1
Sample
b33e75eee001379c213f4b9a80863791_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
b33e75eee001379c213f4b9a80863791_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/AdvSplash.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/AdvSplash.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$TEMP/install_flash_player_active_x.exe
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
$TEMP/install_flash_player_active_x.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/NSISArray.dll
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/NSISArray.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/fpinstall.dll
Resource
win7-20240705-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/fpinstall.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
Flash9e.dll
Resource
win7-20240705-en
Behavioral task
behavioral20
Sample
Flash9e.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
FlashUtil9e.exe
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
FlashUtil9e.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
BlinkxBroadbandTV.exe
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
BlinkxBroadbandTV.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
uninstall.exe
Resource
win7-20240705-en
Behavioral task
behavioral26
Sample
uninstall.exe
Resource
win10v2004-20240802-en
General
-
Target
b33e75eee001379c213f4b9a80863791_JaffaCakes118.exe
-
Size
1.8MB
-
MD5
b33e75eee001379c213f4b9a80863791
-
SHA1
b8e7e5be463293023b141ee13fd2a73c3c224731
-
SHA256
c49f0320eeab8dd644ba344a2039b4de48a26ef77c05eb069721477f0cd182ba
-
SHA512
dc6c532fbf796704c4e53d4db775b2e7b33a6189ce157878fbef558a19346ec0d95beb927a8232485f74847c05b80f58aca25658d9548e5ddc18b0d01cff64ee
-
SSDEEP
49152:y0GAdYjF3hm9Y74R+rVuFhi9xj+wj2z4ThqYe:hdophmlR8LxjPRThDe
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 6 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D27CDB6E-AE6D-11CF-96B8-444553540000} install_flash_player_active_x.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D27CDB6E-AE6D-11CF-96B8-444553540000}\ = "Adobe Flash Player" install_flash_player_active_x.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D27CDB6E-AE6D-11CF-96B8-444553540000}\ComponentID = "Flash" install_flash_player_active_x.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D27CDB6E-AE6D-11CF-96B8-444553540000}\IsInstalled = 01000000 install_flash_player_active_x.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D27CDB6E-AE6D-11CF-96B8-444553540000}\Version = "9.0.115.0" install_flash_player_active_x.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D27CDB6E-AE6D-11CF-96B8-444553540000}\Locale = "EN" install_flash_player_active_x.exe -
Executes dropped EXE 2 IoCs
pid Process 2796 install_flash_player_active_x.exe 3988 BlinkxBroadbandTV.exe -
Loads dropped DLL 15 IoCs
pid Process 3276 b33e75eee001379c213f4b9a80863791_JaffaCakes118.exe 3276 b33e75eee001379c213f4b9a80863791_JaffaCakes118.exe 2796 install_flash_player_active_x.exe 2796 install_flash_player_active_x.exe 2796 install_flash_player_active_x.exe 2796 install_flash_player_active_x.exe 2796 install_flash_player_active_x.exe 2796 install_flash_player_active_x.exe 2796 install_flash_player_active_x.exe 2796 install_flash_player_active_x.exe 2796 install_flash_player_active_x.exe 2796 install_flash_player_active_x.exe 2796 install_flash_player_active_x.exe 2796 install_flash_player_active_x.exe 3988 BlinkxBroadbandTV.exe -
resource yara_rule behavioral2/files/0x000900000002341a-21.dat upx behavioral2/memory/3988-96-0x0000000000400000-0x0000000000502000-memory.dmp upx behavioral2/memory/3988-170-0x0000000000400000-0x0000000000502000-memory.dmp upx behavioral2/memory/3988-171-0x0000000000400000-0x0000000000502000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\Macromed\Flash\Flash9e.ocx install_flash_player_active_x.exe File created C:\Windows\SysWOW64\Macromed\Flash\FlashUtil9e.exe install_flash_player_active_x.exe File opened for modification C:\Windows\SysWOW64\Macromed\Flash\Flash9e.ocx install_flash_player_active_x.exe File opened for modification C:\Windows\SysWOW64\Macromed\Flash\FlashUtil9e.exe install_flash_player_active_x.exe File created C:\Windows\SysWOW64\Macromed\Flash\uninstall_activeX.exe install_flash_player_active_x.exe File opened for modification C:\Windows\SysWOW64\Macromed\Flash\install.log install_flash_player_active_x.exe -
Drops file in Program Files directory 15 IoCs
description ioc Process File created C:\Program Files (x86)\blinkx Brasil\data\logs\boot.txt BlinkxBroadbandTV.exe File created C:\Program Files (x86)\blinkx Brasil\data\brazil.ini b33e75eee001379c213f4b9a80863791_JaffaCakes118.exe File created C:\Program Files (x86)\blinkx Brasil\data\bbtvconfig.ini BlinkxBroadbandTV.exe File created C:\Program Files (x86)\blinkx Brasil\data\cache\e26e214b331a5d920db868009b376fa8.dat BlinkxBroadbandTV.exe File opened for modification C:\Program Files (x86)\blinkx Brasil\data\brasilbbtv.bmp b33e75eee001379c213f4b9a80863791_JaffaCakes118.exe File created C:\Program Files (x86)\blinkx Brasil\uninstall.exe b33e75eee001379c213f4b9a80863791_JaffaCakes118.exe File created C:\Program Files (x86)\blinkx Brasil\data\cache\b0ae7ce38b503333856acd0a31e8bc1e.txt BlinkxBroadbandTV.exe File created C:\Program Files (x86)\blinkx Brasil\data\cache\b0ae7ce38b503333856acd0a31e8bc1e.head BlinkxBroadbandTV.exe File created C:\Program Files (x86)\blinkx Brasil\data\cache\e26e214b331a5d920db868009b376fa8.head BlinkxBroadbandTV.exe File created C:\Program Files (x86)\blinkx Brasil\data\brasilbbtv.bmp b33e75eee001379c213f4b9a80863791_JaffaCakes118.exe File created C:\Program Files (x86)\blinkx Brasil\BlinkxBroadbandTV.exe b33e75eee001379c213f4b9a80863791_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\blinkx Brasil\data\bbtvconfig.ini BlinkxBroadbandTV.exe File created C:\Program Files (x86)\blinkx Brasil\data\logs\version.txt BlinkxBroadbandTV.exe File created C:\Program Files (x86)\blinkx Brasil\data\cache\b0ae7ce38b503333856acd0a31e8bc1e.dat BlinkxBroadbandTV.exe File created C:\Program Files (x86)\blinkx Brasil\data\cache\e26e214b331a5d920db868009b376fa8.txt BlinkxBroadbandTV.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b33e75eee001379c213f4b9a80863791_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language install_flash_player_active_x.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BlinkxBroadbandTV.exe -
NSIS installer 1 IoCs
resource yara_rule behavioral2/files/0x00070000000234cb-26.dat nsis_installer_1 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 BlinkxBroadbandTV.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz BlinkxBroadbandTV.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{FAF199D2-BFA7-4394-A4DE-044A08E59B32}\Policy = "3" install_flash_player_active_x.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{FAF199D2-BFA7-4394-A4DE-044A08E59B32}\AppPath = "C:\\Windows\\SysWow64\\Macromed\\Flash" install_flash_player_active_x.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{FAF199D2-BFA7-4394-A4DE-044A08E59B32}\AppName = "FlashUtil9e.exe" install_flash_player_active_x.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{D27CDB6E-AE6D-11CF-96B8-444553540000} install_flash_player_active_x.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{D27CDB6E-AE6D-11CF-96B8-444553540000}\Compatibility Flags = "0" install_flash_player_active_x.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{FAF199D2-BFA7-4394-A4DE-044A08E59B32} install_flash_player_active_x.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ShockwaveFlash.ShockwaveFlash.1\ = "Shockwave Flash Object" install_flash_player_active_x.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\FlashFactory.FlashFactory\CLSID\ = "{D27CDB70-AE6D-11cf-96B8-444553540000}" install_flash_player_active_x.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\MiscStatus install_flash_player_active_x.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D27CDB6B-AE6D-11CF-96B8-444553540000}\1.0\FLAGS\ = "0" install_flash_player_active_x.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D27CDB6C-AE6D-11CF-96B8-444553540000}\ProxyStubClsid32 install_flash_player_active_x.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ShockwaveFlash.ShockwaveFlash install_flash_player_active_x.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ShockwaveFlash.ShockwaveFlash.9\CLSID\ = "{D27CDB6E-AE6D-11cf-96B8-444553540000}" install_flash_player_active_x.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{57A0E746-3863-4D20-A811-950C84F1DB9B}\1.1\0\win32\ = "C:\\Windows\\SysWow64\\Macromed\\Flash\\Flash9e.ocx\\2" install_flash_player_active_x.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ShockwaveFlash.ShockwaveFlash.6\CLSID\ = "{D27CDB6E-AE6D-11cf-96B8-444553540000}" install_flash_player_active_x.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D27CDB6C-AE6D-11CF-96B8-444553540000}\TypeLib\ = "{D27CDB6B-AE6D-11CF-96B8-444553540000}" install_flash_player_active_x.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2E4BB6BE-A75F-4DC0-9500-68203655A2C4}\TypeLib\Version = "1.0" install_flash_player_active_x.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MacromediaFlashPaper.MacromediaFlashPaper\CLSID install_flash_player_active_x.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\VersionIndependentProgID\ = "ShockwaveFlash.ShockwaveFlash" install_flash_player_active_x.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D27CDB6C-AE6D-11CF-96B8-444553540000}\TypeLib\Version = "1.0" install_flash_player_active_x.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{307F64C0-621D-4D56-BBC6-91EFC13CE40D}\ = "ISimpleTextSelection" install_flash_player_active_x.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\FlashFactory.FlashFactory install_flash_player_active_x.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D27CDB6D-AE6D-11CF-96B8-444553540000}\TypeLib\ = "{D27CDB6B-AE6D-11CF-96B8-444553540000}" install_flash_player_active_x.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{FAB3E735-69C7-453B-A446-B6823C6DF1C9}\ install_flash_player_active_x.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{57A0E747-3863-4D20-A811-950C84F1DB9B}\ = "IFlashAccessibility" install_flash_player_active_x.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{307F64C0-621D-4D56-BBC6-91EFC13CE40D} install_flash_player_active_x.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D4304BCF-B8E9-4B35-BEA0-DC5B522670C2}\ = "FlashBroker" install_flash_player_active_x.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ShockwaveFlash.ShockwaveFlash.6 install_flash_player_active_x.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-shockwave-flash\CLSID = "{D27CDB6E-AE6D-11cf-96B8-444553540000}" install_flash_player_active_x.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D27CDB6B-AE6D-11CF-96B8-444553540000}\1.0\FLAGS install_flash_player_active_x.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D27CDB6B-AE6D-11CF-96B8-444553540000}\1.0\HELPDIR install_flash_player_active_x.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D27CDB6D-AE6D-11CF-96B8-444553540000}\ = "_IShockwaveFlashEvents" install_flash_player_active_x.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D27CDB6C-AE6D-11CF-96B8-444553540000}\ = "IShockwaveFlash" install_flash_player_active_x.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\ = "Macromedia Flash Factory Object" install_flash_player_active_x.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.spl install_flash_player_active_x.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-shockwave-flash install_flash_player_active_x.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D27CDB6B-AE6D-11CF-96B8-444553540000}\1.0\ = "Shockwave Flash" install_flash_player_active_x.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D27CDB6B-AE6D-11CF-96B8-444553540000}\1.0\0 install_flash_player_active_x.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\VersionIndependentProgID install_flash_player_active_x.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/futuresplash\Extension = ".spl" install_flash_player_active_x.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/futuresplash\CLSID = "{D27CDB6E-AE6D-11cf-96B8-444553540000}" install_flash_player_active_x.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D27CDB6B-AE6D-11CF-96B8-444553540000} install_flash_player_active_x.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D27CDB6B-AE6D-11CF-96B8-444553540000}\1.0\HELPDIR\ = "C:\\Windows\\SysWow64\\Macromed\\Flash\\" install_flash_player_active_x.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.swf install_flash_player_active_x.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D27CDB6D-AE6D-11CF-96B8-444553540000}\TypeLib\Version = "1.0" install_flash_player_active_x.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{57A0E746-3863-4D20-A811-950C84F1DB9B} install_flash_player_active_x.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D27CDB6C-AE6D-11CF-96B8-444553540000}\TypeLib install_flash_player_active_x.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{57A0E746-3863-4D20-A811-950C84F1DB9B}\1.1\FLAGS install_flash_player_active_x.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{307F64C0-621D-4D56-BBC6-91EFC13CE40D}\ProxyStubClsid32 install_flash_player_active_x.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MacromediaFlashPaper.MacromediaFlashPaper\shell\open\command install_flash_player_active_x.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\FlashFactory.FlashFactory.1\ = "Macromedia Flash Factory Object" install_flash_player_active_x.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ShockwaveFlash.ShockwaveFlash.4\CLSID install_flash_player_active_x.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ShockwaveFlash.ShockwaveFlash.5 install_flash_player_active_x.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D27CDB6D-AE6D-11CF-96B8-444553540000}\TypeLib install_flash_player_active_x.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{57A0E747-3863-4D20-A811-950C84F1DB9B}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" install_flash_player_active_x.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ShockwaveFlash.ShockwaveFlash.1\CLSID install_flash_player_active_x.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\InprocServer32\ = "C:\\Windows\\SysWow64\\Macromed\\Flash\\Flash9e.ocx" install_flash_player_active_x.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D27CDB6D-AE6D-11CF-96B8-444553540000}\ProxyStubClsid32 install_flash_player_active_x.exe Key created \REGISTRY\MACHINE\Software\Classes\TypeLib\{FAB3E735-69C7-453B-A446-B6823C6DF1C9}\1.0 install_flash_player_active_x.exe Key created \REGISTRY\MACHINE\Software\Classes\TypeLib\{FAB3E735-69C7-453B-A446-B6823C6DF1C9}\1.0\HELPDIR install_flash_player_active_x.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\FlashFactory.FlashFactory.1\CLSID install_flash_player_active_x.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ShockwaveFlash.ShockwaveFlash.5\CLSID install_flash_player_active_x.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000} install_flash_player_active_x.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D27CDB6D-AE6D-11CF-96B8-444553540000}\ProxyStubClsid32 install_flash_player_active_x.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\Programmable install_flash_player_active_x.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\TypeLib install_flash_player_active_x.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{57A0E746-3863-4D20-A811-950C84F1DB9B}\1.1\0 install_flash_player_active_x.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\Implemented Categories install_flash_player_active_x.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{FAB3E735-69C7-453B-A446-B6823C6DF1C9}\1.0\0 install_flash_player_active_x.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{57A0E746-3863-4D20-A811-950C84F1DB9B}\1.1\ = "FlashAccessibility" install_flash_player_active_x.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3988 BlinkxBroadbandTV.exe 3988 BlinkxBroadbandTV.exe 3988 BlinkxBroadbandTV.exe 3988 BlinkxBroadbandTV.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3276 wrote to memory of 2796 3276 b33e75eee001379c213f4b9a80863791_JaffaCakes118.exe 92 PID 3276 wrote to memory of 2796 3276 b33e75eee001379c213f4b9a80863791_JaffaCakes118.exe 92 PID 3276 wrote to memory of 2796 3276 b33e75eee001379c213f4b9a80863791_JaffaCakes118.exe 92 PID 3276 wrote to memory of 3988 3276 b33e75eee001379c213f4b9a80863791_JaffaCakes118.exe 93 PID 3276 wrote to memory of 3988 3276 b33e75eee001379c213f4b9a80863791_JaffaCakes118.exe 93 PID 3276 wrote to memory of 3988 3276 b33e75eee001379c213f4b9a80863791_JaffaCakes118.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\b33e75eee001379c213f4b9a80863791_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b33e75eee001379c213f4b9a80863791_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Users\Admin\AppData\Local\Temp\install_flash_player_active_x.exe"C:\Users\Admin\AppData\Local\Temp\install_flash_player_active_x.exe" /s2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies registry class
PID:2796
-
-
C:\Program Files (x86)\blinkx Brasil\BlinkxBroadbandTV.exe"C:\Program Files (x86)\blinkx Brasil\BlinkxBroadbandTV.exe" /lang=brazil /logo=brasilbbtv /title=blinkx_Brasil2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
PID:3988
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
350KB
MD5bd2f6416721df0b07d02350359f9f669
SHA12292c9d37e8b2a8c4a4c6249363c22dcc739a573
SHA256b41362bcbb5aed2fa09709964994075b9c59ac7d3dd926b1ee94c96dc61759e4
SHA5122a044cfeaa79fb4f3fb624052bed3cd78033c59f044e38c80779ec138a2229ec0a260d021761df7121a00a266829aca6f5974da6d60cb6dfa77076de7647d6d2
-
Filesize
238B
MD5ff241ee30c12d4f738ea693d05c10606
SHA1694953a0ce81183d75f84407e6f57f71730ea6e9
SHA256ea3e944f2ece17b40a73f40dbda8bca3227958ad1b1ac74761f6e13a6e310c0f
SHA512fea25dd9385e60562a50056b744dbd1cc28036ddf43843d906ea33872bae3b6c58a67994a1da8c60d122e330d31026fabcff6e38a766b4de87006791c1bac29f
-
Filesize
302B
MD52860d6593b6deae83a20a63559942098
SHA156e0ee0a00972edff787cd6251a21dfb1de2b866
SHA256247dfb03d3ea11d11fda887214d67da08e46be9929e9a3d18d392500cef460ce
SHA51234028f61f0bc3ea8989f4457afb3d28408c9bb4d6cc15d2afff5ef8b71748f08f40b118c26d3fc621daaf682c2405200efd2e1f65bafbcd53aeb23fd93ba32fc
-
Filesize
330B
MD5e6e5dac29caf04c9e332b0f2bb96b1e1
SHA1e8e6ed69902727be81358e1be8284f6026d3bf18
SHA25643355fe8b90c9f8bf24514d2f9f5f090b10434d46d7730d8be8f892b4f302442
SHA5124c13439aebbefc8bf3481830ce1dad9d0402352477d194103445e0405030a48be2209e339158d8d752a514ae6391fcb7ad3fd695d1561210044984cf059f5021
-
Filesize
339B
MD5aadd812992f22f0f3fd2e22b3d6be3c0
SHA10f1c23f29fcd11ccd3de105ba75a06db7e68e089
SHA256c7752d4310b938a053e43996b197de25aa6fe1d2279d4294fc353024edb37c3f
SHA5123f42e173618e9219278355995fe89062077e1e53196842b147ebfe2c4b3e2f8ec10db68942dd44a55a994c7885092b9116b97f0614519e1097ac7f2f0b497f19
-
Filesize
357KB
MD59c27b71279f826ecb99daa45018e31b7
SHA1f06c5513d4bb03f7c82c95b933b3de3262febe7e
SHA2565eb3c565fa232b318e5a8981e3eb6d1690fbe9afd9545d6213156db5f72c0fbd
SHA5127a501c15a9c8caf16da05e0ed5324827337557d16d44c4db353702b033565148f320899951bd7cdf473d5630516bb643113ce9dfb39f835e8871d50e56d1faba
-
Filesize
737B
MD5c72fb83dfbbc6a6c725b3054b0cd6bae
SHA19bf31161614d8898882ac1311941831a1c8e5c2a
SHA256656a4eddf489232a643753ed288151624b14b8f4ccf36af93dbc3a13576ba5d2
SHA5124807377f25af9d8422fc4ba7a39af015234a088860242fc9a44ed88cec996b1c1c263b31cfb3f22466c842a3c5959f4155255395e555e8baff00d0677984dd5f
-
Filesize
1.5MB
MD54c223aa3e559e2e88da3bb43f3604d20
SHA1a6d0f099262e9e7b9289b8a7bdcfa550821584ef
SHA2563896ac00208eebea9f62aacf09ccd7324fe86048bfbb20740b72c3874615878b
SHA5125f0c9721ad857990ae6d9420080cee0d39df70a15e07520f59682cf1a137409923e3ab4e8c0f2c27b280cdb0ce936223adda167236131981aff35830beda69bc
-
Filesize
17KB
MD52b8574f6a8f5de9042baa43c069d20ba
SHA107959da0c6b7715b51f70f1b0aea1f56ba7a4559
SHA25638654eef0ee3715f4b1268f4b4176a6b487a0a9e53a27a4ec0b84550ea173564
SHA512f034f71b6a18ee8024d40acd3c097d95c8fd8e128d75075cc452e71898c1c0322f21b54bd39ca72d053d7261ffbab0c5c1f820602d52fc85806513a6fe317e88
-
Filesize
10KB
MD516ae54e23736352739d7ab156b1965ba
SHA114f8f04bed2d6adc07565d5c064f6931b128568f
SHA256c11ffa087c6848f3870e6336d151f0ba6298c0e1e30ccddf2da25a06d36a61fc
SHA51215dbfcdc5dc34cb20066120045e3250f8df9e50b91de043f2ada33ac0235907d98668e248828a7ed9c75e25dfb5103b7248867530ce73ee36f6a35c30b4afa9f
-
Filesize
4KB
MD568d73a95c628836b67ea5a717d74b38c
SHA1935372db4a66f9dfd6c938724197787688e141b0
SHA25621a373c52aaecce52b41aebe6d0224f53760fc3e5c575e821175eee3a1f7f226
SHA5120e804deab4e647213132add4173c1d2c554c628816f56e21e274a40e185d90254e29c8bfc6fbfdfea2a492d43d23c0bfa4b276252a3f5e1993ab80ff832c4914
-
Filesize
8KB
MD5071b6233c92f69ffa1c24243328c3b94
SHA1bb583c00e87cdc65e6254c7148d37afc1bbb3095
SHA2565f6c63cb0ba539d692c5461730f057d0ec6c60639d772fbdc3753c3c6e746c43
SHA5127fc2db406350488ee86ccffe1e99a91e0f509ef0429063336bf6f96aab07127df352db77fe9d00ddc3aa2db7886dfbac08b6acf6a5c647859956111ca47c24f1
-
Filesize
6KB
MD5c152aaed8394cc372b720190af65f73a
SHA1ac6c786c054193187d1fa63712538b5cd8219cb4
SHA256db15e55dee9f7798e72a6947f3d6abe09fb6fbfc122b11ac7d425dc159cab50c
SHA5120e3cf9be421ba729a0597f274b1fbdc4880a45af84d85ba215700e415ed195752a12f2ee68d510d2dca449e131c449e4783ab2c4ff870e0d33859c919bb9175e
-
Filesize
10KB
MD54fbb4a2cd711fc1fe84f3dc30c491dc9
SHA1888e01ae6e64e7326f88df9a30587f699eab154a
SHA256c3b05f4faf5e8903d5b4cb4a8ce4bbf2e8144725b98d8787d51c117b6efa9bc2
SHA51292dcf99672a5935065df6492e27abb653679f1db6dcddfde87cd14260c94a870327826b23cc2f338381b3eb53d07c1a3867806f6ff94533db5195b895a856847
-
Filesize
2.8MB
MD5d3c50535c26190fead7785a03499c0ac
SHA16a72eea0f62b60d71cfb9da60cab6d178b1fb78f
SHA25601ff419547aefb8e32715d3873540c058533ac6b0d301b1f98868aa6a17616a5
SHA51255b299bcad2c7c7506f8eef0aceaf8764aa0e19e9907ff79b7e3f108d81a5d6566211dc6e9cbd29d7f1bef8f5daad9bb888ec345aa21899ab28b45394dbc21f3