Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2024, 08:39
Static task
static1
Behavioral task
behavioral1
Sample
bb075c2ca83ab16abfeead2d0e8c6481_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bb075c2ca83ab16abfeead2d0e8c6481_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bb075c2ca83ab16abfeead2d0e8c6481_JaffaCakes118.exe
-
Size
188KB
-
MD5
bb075c2ca83ab16abfeead2d0e8c6481
-
SHA1
4db8dbe958d140f2b9cb605aee2c9fec7a1e2bda
-
SHA256
6c5fd6d1f78d2e477dd7c6dfdedeabc9d3765fdabd61330592dac9f39a2d4b70
-
SHA512
5b3be880edb2c13e7e021cf3c7c25146db44016b50e4c7a18fbba1276bddb1facf56ce5df814cd9008e46838291eb81aa238273e901d4ec0bc77109d72a12081
-
SSDEEP
3072:Z/FDc0Cbdss/q+RxKd9u1Wb/4/8uL6suQ14Zvop4lhdPupdoK0QCcLq2XrDmQf:fc4+RId9ui/4UuOjQuomhupdoK0QCcLB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1480 WScript.Exe -
Executes dropped EXE 1 IoCs
pid Process 4928 Program Files8XE4Y0.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification \??\c:\Program Files\Common Files\t.ico bb075c2ca83ab16abfeead2d0e8c6481_JaffaCakes118.exe File opened for modification \??\c:\Program Files\Common Files\d.ico bb075c2ca83ab16abfeead2d0e8c6481_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Program Files8XE4Y0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.Exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bb075c2ca83ab16abfeead2d0e8c6481_JaffaCakes118.exe -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 909c980d38f5da01 IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "217950066" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.exe Set value (data) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000039570b57fe416e4dbccca910bc3eabbd000000000200000000001066000000010000200000009856b4d4173c45a0cb91da5dd5a6437b777287a07dc40c2677da5e9faac64ddb000000000e8000000002000020000000b0db920680f06d739b9d3cf56ee2172f9f9ea0e79143a6b7a9734290c2aff9ca200000004ccaeb5c75eb16591ad518b8960ae9e6efbfccb801a9bf30653cec653024537040000000e10de0f95750c1694b5997f32bd23ee2c005f07794e1f81c6f4339f871eda3875cc5e6b752b61c7b8de78bcc89f85a69250dac25987fe4b53f1ebe3b5c106817 IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31126840" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31126840" IEXPLORE.exe Set value (data) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80579d0d38f5da01 IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{388108D1-612B-11EF-98CC-DE20CD0D11AA} = "0" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31126840" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431167347" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "215450001" IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "215450001" IEXPLORE.exe Set value (data) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000039570b57fe416e4dbccca910bc3eabbd0000000002000000000010660000000100002000000039b0c4f99b6335f42a5bbf5ee0c6528609a62babb27c84e158cfa3c93c49fc48000000000e8000000002000020000000f675898bec3cd808be2d7a11a5d67adb641c6c7f32155f0055e20a0d98767529200000007a9e1b57887518af8a751d300bf7750de6e3661fc86bd7acb3001e8c739e712b400000004518d688233504cab558f8e718536b58bd880ca437e91e1e5b2e03e8cca018a51646c27134117a2e9e0b39ea21f1d592922f1b97a230a6351c83d32b6febaa37 IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.exe Set value (data) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.exe -
Modifies registry class 60 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htb\DefaultIcon\ = "c:\\Program Files\\Common Files\\t.ico" bb075c2ca83ab16abfeead2d0e8c6481_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\h35\DefaultIcon bb075c2ca83ab16abfeead2d0e8c6481_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.h35 bb075c2ca83ab16abfeead2d0e8c6481_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hli bb075c2ca83ab16abfeead2d0e8c6481_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.hli bb075c2ca83ab16abfeead2d0e8c6481_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.hyx bb075c2ca83ab16abfeead2d0e8c6481_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\h35\ bb075c2ca83ab16abfeead2d0e8c6481_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hdh\shell\open\command bb075c2ca83ab16abfeead2d0e8c6481_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htb\DefaultIcon bb075c2ca83ab16abfeead2d0e8c6481_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\h35\DefaultIcon\ = "c:\\Program Files\\Common Files\\d.ico" bb075c2ca83ab16abfeead2d0e8c6481_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hli\shell\open\command bb075c2ca83ab16abfeead2d0e8c6481_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\hyx\DefaultIcon\ = "%SystemRoot%\\SysWow64\\SHELL32.dll,41" bb075c2ca83ab16abfeead2d0e8c6481_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\h35\shell\open\command\ = "IEXPLORE.EXE http://www.t17t.com/?1193" bb075c2ca83ab16abfeead2d0e8c6481_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\hpf\DefaultIcon\ = "%SystemRoot%\\SysWow64\\SHELL32.dll,139" bb075c2ca83ab16abfeead2d0e8c6481_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hpf\shell\open bb075c2ca83ab16abfeead2d0e8c6481_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\hpf\shell\open\command\ = "IEXPLORE.EXE http://www.piaofang.net/?1193" bb075c2ca83ab16abfeead2d0e8c6481_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\h35\shell\open\command bb075c2ca83ab16abfeead2d0e8c6481_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\hyx\ bb075c2ca83ab16abfeead2d0e8c6481_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htb\shell\open\command bb075c2ca83ab16abfeead2d0e8c6481_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\hdh\DefaultIcon\ = "C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE,0" bb075c2ca83ab16abfeead2d0e8c6481_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hyx\DefaultIcon bb075c2ca83ab16abfeead2d0e8c6481_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htb bb075c2ca83ab16abfeead2d0e8c6481_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hyx\shell bb075c2ca83ab16abfeead2d0e8c6481_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hpf bb075c2ca83ab16abfeead2d0e8c6481_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.hpf\ = "hpf" bb075c2ca83ab16abfeead2d0e8c6481_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htb bb075c2ca83ab16abfeead2d0e8c6481_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htb\shell\open\command\ = "IEXPLORE.EXE http://taobao.loliso.com/?1193" bb075c2ca83ab16abfeead2d0e8c6481_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hyx\shell\open\command bb075c2ca83ab16abfeead2d0e8c6481_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\hyx\shell\open\command\ = "IEXPLORE.EXE http://www.d91d.com/?1193" bb075c2ca83ab16abfeead2d0e8c6481_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hpf\shell\open\command bb075c2ca83ab16abfeead2d0e8c6481_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\h35\shell bb075c2ca83ab16abfeead2d0e8c6481_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hdh\DefaultIcon bb075c2ca83ab16abfeead2d0e8c6481_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htb\shell bb075c2ca83ab16abfeead2d0e8c6481_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hpf\DefaultIcon bb075c2ca83ab16abfeead2d0e8c6481_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.hpf bb075c2ca83ab16abfeead2d0e8c6481_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.h35\ = "h35" bb075c2ca83ab16abfeead2d0e8c6481_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.hdh bb075c2ca83ab16abfeead2d0e8c6481_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htb\ = "htb" bb075c2ca83ab16abfeead2d0e8c6481_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hli\shell\open bb075c2ca83ab16abfeead2d0e8c6481_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\hli\shell\open\command\ = "IEXPLORE.EXE http://www.loliso.com/?1193" bb075c2ca83ab16abfeead2d0e8c6481_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hdh bb075c2ca83ab16abfeead2d0e8c6481_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\hdh\ bb075c2ca83ab16abfeead2d0e8c6481_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\hdh\shell\open\command\ = "IEXPLORE.EXE http://www.henbucuo.com/?1193" bb075c2ca83ab16abfeead2d0e8c6481_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hyx bb075c2ca83ab16abfeead2d0e8c6481_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\h35\shell\open bb075c2ca83ab16abfeead2d0e8c6481_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.hli\ = "hli" bb075c2ca83ab16abfeead2d0e8c6481_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hdh\shell\open bb075c2ca83ab16abfeead2d0e8c6481_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hyx\shell\open bb075c2ca83ab16abfeead2d0e8c6481_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\hpf\ bb075c2ca83ab16abfeead2d0e8c6481_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htb\ bb075c2ca83ab16abfeead2d0e8c6481_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\hli\DefaultIcon\ = "%SystemRoot%\\SysWow64\\SHELL32.dll,130" bb075c2ca83ab16abfeead2d0e8c6481_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hli\shell bb075c2ca83ab16abfeead2d0e8c6481_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.hdh\ = "hdh" bb075c2ca83ab16abfeead2d0e8c6481_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.hyx\ = "hyx" bb075c2ca83ab16abfeead2d0e8c6481_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htb\shell\open bb075c2ca83ab16abfeead2d0e8c6481_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\h35 bb075c2ca83ab16abfeead2d0e8c6481_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\hli\ bb075c2ca83ab16abfeead2d0e8c6481_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hdh\shell bb075c2ca83ab16abfeead2d0e8c6481_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hpf\shell bb075c2ca83ab16abfeead2d0e8c6481_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hli\DefaultIcon bb075c2ca83ab16abfeead2d0e8c6481_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2092 IEXPLORE.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2516 bb075c2ca83ab16abfeead2d0e8c6481_JaffaCakes118.exe 4928 Program Files8XE4Y0.exe 2092 IEXPLORE.exe 2092 IEXPLORE.exe 428 IEXPLORE.EXE 428 IEXPLORE.EXE 428 IEXPLORE.EXE 428 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2516 wrote to memory of 4928 2516 bb075c2ca83ab16abfeead2d0e8c6481_JaffaCakes118.exe 87 PID 2516 wrote to memory of 4928 2516 bb075c2ca83ab16abfeead2d0e8c6481_JaffaCakes118.exe 87 PID 2516 wrote to memory of 4928 2516 bb075c2ca83ab16abfeead2d0e8c6481_JaffaCakes118.exe 87 PID 4928 wrote to memory of 2092 4928 Program Files8XE4Y0.exe 93 PID 4928 wrote to memory of 2092 4928 Program Files8XE4Y0.exe 93 PID 2092 wrote to memory of 428 2092 IEXPLORE.exe 94 PID 2092 wrote to memory of 428 2092 IEXPLORE.exe 94 PID 2092 wrote to memory of 428 2092 IEXPLORE.exe 94 PID 2516 wrote to memory of 1480 2516 bb075c2ca83ab16abfeead2d0e8c6481_JaffaCakes118.exe 95 PID 2516 wrote to memory of 1480 2516 bb075c2ca83ab16abfeead2d0e8c6481_JaffaCakes118.exe 95 PID 2516 wrote to memory of 1480 2516 bb075c2ca83ab16abfeead2d0e8c6481_JaffaCakes118.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\bb075c2ca83ab16abfeead2d0e8c6481_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bb075c2ca83ab16abfeead2d0e8c6481_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2516 -
\??\c:\Program Files8XE4Y0.exe"c:\Program Files8XE4Y0.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Program Files\Internet Explorer\IEXPLORE.exe"C:\Program Files\Internet Explorer\IEXPLORE.exe" http://dl.kanlink.cn:1287/CPAdown/vplay.php3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2092 CREDAT:17410 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:428
-
-
-
-
C:\Windows\SysWOW64\WScript.ExeWScript.Exe jies.bak.vbs2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1480
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD5b1681148cee0a611c92ad272adaeaa00
SHA1628bedc795659c5227484160eb64f3f32eaec96d
SHA256320ecc532a605d5813edc5361249f2c1b5262b0b6591a9d1ec4d57fce0c2699f
SHA512c9aa92fef0ca10e1b07afd23fd96f0b725d3b432d839d609bf57a7b604d3ad9b910e3817c185b7aacab51d8d152d2070d6b153ad9c0e1ef638ae2760ad751702
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
450B
MD511a1f13be9647d20cecbf9ceed9256aa
SHA1dc9ca611b2110511598f628f80963c2d8007d397
SHA256e97baa9939eca4e40d21e0c60e3800d628a86111260681c8df1f68fcf6d5ae7d
SHA512dfd8ebf8864572e672f64f89856fa9bfe7c62d15b8720359b661e7a7a7efb491773fbdfb21b6135d11ed36d21161d1f296f8d7e5a22478ff4a0e184867c5bdf5