Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26/08/2024, 07:15
Static task
static1
Behavioral task
behavioral1
Sample
c2846705938fb2f595267f5effa3b1c4_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
c2846705938fb2f595267f5effa3b1c4_JaffaCakes118.exe
-
Size
512KB
-
MD5
c2846705938fb2f595267f5effa3b1c4
-
SHA1
2d7c8740b75dc6ec3cf5a8a4968034e06cd51eee
-
SHA256
57abcac196c86e0bd3ace3fff8e9aa80d3813ac7fea30d70427a9cb6338c01e0
-
SHA512
ac21da0c96c224ff6246faae9ecf5bd441b6a339018d077b3c8e641ef573131c208f58adee917a9f87847723392980ed83cdd9a894c250f98f540423e4e5eddf
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj64:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5J
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" ucekuicmkr.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ucekuicmkr.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" ucekuicmkr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" ucekuicmkr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" ucekuicmkr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" ucekuicmkr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" ucekuicmkr.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ucekuicmkr.exe -
Executes dropped EXE 5 IoCs
pid Process 2032 ucekuicmkr.exe 1692 iwpdlfpnjcfzjgj.exe 2332 emklsplu.exe 580 sanjnsbinjquf.exe 2248 emklsplu.exe -
Loads dropped DLL 5 IoCs
pid Process 3068 c2846705938fb2f595267f5effa3b1c4_JaffaCakes118.exe 3068 c2846705938fb2f595267f5effa3b1c4_JaffaCakes118.exe 3068 c2846705938fb2f595267f5effa3b1c4_JaffaCakes118.exe 3068 c2846705938fb2f595267f5effa3b1c4_JaffaCakes118.exe 2032 ucekuicmkr.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" ucekuicmkr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" ucekuicmkr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" ucekuicmkr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirstRunDisabled = "1" ucekuicmkr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" ucekuicmkr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" ucekuicmkr.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\mfbufbru = "ucekuicmkr.exe" iwpdlfpnjcfzjgj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\otuhdfpv = "iwpdlfpnjcfzjgj.exe" iwpdlfpnjcfzjgj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "sanjnsbinjquf.exe" iwpdlfpnjcfzjgj.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\j: emklsplu.exe File opened (read-only) \??\m: emklsplu.exe File opened (read-only) \??\q: emklsplu.exe File opened (read-only) \??\t: emklsplu.exe File opened (read-only) \??\k: ucekuicmkr.exe File opened (read-only) \??\i: emklsplu.exe File opened (read-only) \??\b: ucekuicmkr.exe File opened (read-only) \??\i: ucekuicmkr.exe File opened (read-only) \??\q: ucekuicmkr.exe File opened (read-only) \??\u: ucekuicmkr.exe File opened (read-only) \??\z: ucekuicmkr.exe File opened (read-only) \??\y: emklsplu.exe File opened (read-only) \??\p: emklsplu.exe File opened (read-only) \??\q: emklsplu.exe File opened (read-only) \??\l: emklsplu.exe File opened (read-only) \??\s: emklsplu.exe File opened (read-only) \??\r: emklsplu.exe File opened (read-only) \??\s: ucekuicmkr.exe File opened (read-only) \??\o: emklsplu.exe File opened (read-only) \??\p: emklsplu.exe File opened (read-only) \??\r: ucekuicmkr.exe File opened (read-only) \??\t: ucekuicmkr.exe File opened (read-only) \??\b: emklsplu.exe File opened (read-only) \??\g: ucekuicmkr.exe File opened (read-only) \??\k: emklsplu.exe File opened (read-only) \??\v: emklsplu.exe File opened (read-only) \??\v: ucekuicmkr.exe File opened (read-only) \??\b: emklsplu.exe File opened (read-only) \??\z: emklsplu.exe File opened (read-only) \??\a: emklsplu.exe File opened (read-only) \??\h: emklsplu.exe File opened (read-only) \??\y: emklsplu.exe File opened (read-only) \??\k: emklsplu.exe File opened (read-only) \??\e: emklsplu.exe File opened (read-only) \??\g: emklsplu.exe File opened (read-only) \??\w: emklsplu.exe File opened (read-only) \??\l: ucekuicmkr.exe File opened (read-only) \??\a: emklsplu.exe File opened (read-only) \??\e: emklsplu.exe File opened (read-only) \??\r: emklsplu.exe File opened (read-only) \??\l: emklsplu.exe File opened (read-only) \??\o: emklsplu.exe File opened (read-only) \??\o: ucekuicmkr.exe File opened (read-only) \??\n: emklsplu.exe File opened (read-only) \??\m: emklsplu.exe File opened (read-only) \??\t: emklsplu.exe File opened (read-only) \??\u: emklsplu.exe File opened (read-only) \??\j: ucekuicmkr.exe File opened (read-only) \??\n: ucekuicmkr.exe File opened (read-only) \??\p: ucekuicmkr.exe File opened (read-only) \??\x: ucekuicmkr.exe File opened (read-only) \??\h: emklsplu.exe File opened (read-only) \??\j: emklsplu.exe File opened (read-only) \??\n: emklsplu.exe File opened (read-only) \??\v: emklsplu.exe File opened (read-only) \??\h: ucekuicmkr.exe File opened (read-only) \??\y: ucekuicmkr.exe File opened (read-only) \??\g: emklsplu.exe File opened (read-only) \??\i: emklsplu.exe File opened (read-only) \??\e: ucekuicmkr.exe File opened (read-only) \??\x: emklsplu.exe File opened (read-only) \??\u: emklsplu.exe File opened (read-only) \??\w: emklsplu.exe File opened (read-only) \??\s: emklsplu.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" ucekuicmkr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" ucekuicmkr.exe -
AutoIT Executable 8 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/3068-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe behavioral1/files/0x0008000000015d10-5.dat autoit_exe behavioral1/files/0x00090000000120f1-17.dat autoit_exe behavioral1/files/0x0008000000015d39-27.dat autoit_exe behavioral1/files/0x0008000000015d51-36.dat autoit_exe behavioral1/files/0x0006000000016d5d-72.dat autoit_exe behavioral1/files/0x0006000000016d62-74.dat autoit_exe behavioral1/files/0x0006000000016d6d-84.dat autoit_exe -
Drops file in System32 directory 9 IoCs
description ioc Process File created C:\Windows\SysWOW64\ucekuicmkr.exe c2846705938fb2f595267f5effa3b1c4_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\iwpdlfpnjcfzjgj.exe c2846705938fb2f595267f5effa3b1c4_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\emklsplu.exe c2846705938fb2f595267f5effa3b1c4_JaffaCakes118.exe File created C:\Windows\SysWOW64\sanjnsbinjquf.exe c2846705938fb2f595267f5effa3b1c4_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll ucekuicmkr.exe File opened for modification C:\Windows\SysWOW64\ucekuicmkr.exe c2846705938fb2f595267f5effa3b1c4_JaffaCakes118.exe File created C:\Windows\SysWOW64\iwpdlfpnjcfzjgj.exe c2846705938fb2f595267f5effa3b1c4_JaffaCakes118.exe File created C:\Windows\SysWOW64\emklsplu.exe c2846705938fb2f595267f5effa3b1c4_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\sanjnsbinjquf.exe c2846705938fb2f595267f5effa3b1c4_JaffaCakes118.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe emklsplu.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe emklsplu.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe emklsplu.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal emklsplu.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe emklsplu.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe emklsplu.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal emklsplu.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal emklsplu.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe emklsplu.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe emklsplu.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe emklsplu.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe emklsplu.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe emklsplu.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal emklsplu.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\mydoc.rtf c2846705938fb2f595267f5effa3b1c4_JaffaCakes118.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE File opened for modification C:\Windows\~$mydoc.rtf WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c2846705938fb2f595267f5effa3b1c4_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ucekuicmkr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iwpdlfpnjcfzjgj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language emklsplu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sanjnsbinjquf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language emklsplu.exe -
Office loads VBA resources, possible macro or embedded object present
-
Modifies registry class 19 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "32462C7B9C2C83546D4276A070252CAC7D8565DB" c2846705938fb2f595267f5effa3b1c4_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7F8BFFF9482E851B9136D65D7D97BDE4E13C593666466244D7E9" c2846705938fb2f595267f5effa3b1c4_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat ucekuicmkr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh ucekuicmkr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf ucekuicmkr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs ucekuicmkr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" ucekuicmkr.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes c2846705938fb2f595267f5effa3b1c4_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" ucekuicmkr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" ucekuicmkr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc ucekuicmkr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" ucekuicmkr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" ucekuicmkr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg ucekuicmkr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6ABCF9CAFE14F1E2837C3B47819B39E6B0FC028C43150233E1C442E708A0" c2846705938fb2f595267f5effa3b1c4_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E7FC6BB3FE6622DDD209D0D38B7B9016" c2846705938fb2f595267f5effa3b1c4_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "184FC77514E7DAB3B8C07CE2EC9E37CF" c2846705938fb2f595267f5effa3b1c4_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" ucekuicmkr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2FB7B15C47E539EE52CDB9D23299D4B8" c2846705938fb2f595267f5effa3b1c4_JaffaCakes118.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1204 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3068 c2846705938fb2f595267f5effa3b1c4_JaffaCakes118.exe 3068 c2846705938fb2f595267f5effa3b1c4_JaffaCakes118.exe 3068 c2846705938fb2f595267f5effa3b1c4_JaffaCakes118.exe 3068 c2846705938fb2f595267f5effa3b1c4_JaffaCakes118.exe 3068 c2846705938fb2f595267f5effa3b1c4_JaffaCakes118.exe 3068 c2846705938fb2f595267f5effa3b1c4_JaffaCakes118.exe 3068 c2846705938fb2f595267f5effa3b1c4_JaffaCakes118.exe 3068 c2846705938fb2f595267f5effa3b1c4_JaffaCakes118.exe 1692 iwpdlfpnjcfzjgj.exe 1692 iwpdlfpnjcfzjgj.exe 1692 iwpdlfpnjcfzjgj.exe 1692 iwpdlfpnjcfzjgj.exe 580 sanjnsbinjquf.exe 580 sanjnsbinjquf.exe 580 sanjnsbinjquf.exe 580 sanjnsbinjquf.exe 580 sanjnsbinjquf.exe 580 sanjnsbinjquf.exe 1692 iwpdlfpnjcfzjgj.exe 2032 ucekuicmkr.exe 2032 ucekuicmkr.exe 2032 ucekuicmkr.exe 2032 ucekuicmkr.exe 2032 ucekuicmkr.exe 2332 emklsplu.exe 2332 emklsplu.exe 2332 emklsplu.exe 2332 emklsplu.exe 2248 emklsplu.exe 2248 emklsplu.exe 2248 emklsplu.exe 2248 emklsplu.exe 1692 iwpdlfpnjcfzjgj.exe 580 sanjnsbinjquf.exe 580 sanjnsbinjquf.exe 1692 iwpdlfpnjcfzjgj.exe 580 sanjnsbinjquf.exe 580 sanjnsbinjquf.exe 1692 iwpdlfpnjcfzjgj.exe 1692 iwpdlfpnjcfzjgj.exe 580 sanjnsbinjquf.exe 580 sanjnsbinjquf.exe 1692 iwpdlfpnjcfzjgj.exe 580 sanjnsbinjquf.exe 580 sanjnsbinjquf.exe 1692 iwpdlfpnjcfzjgj.exe 580 sanjnsbinjquf.exe 580 sanjnsbinjquf.exe 1692 iwpdlfpnjcfzjgj.exe 580 sanjnsbinjquf.exe 580 sanjnsbinjquf.exe 1692 iwpdlfpnjcfzjgj.exe 580 sanjnsbinjquf.exe 580 sanjnsbinjquf.exe 1692 iwpdlfpnjcfzjgj.exe 580 sanjnsbinjquf.exe 580 sanjnsbinjquf.exe 1692 iwpdlfpnjcfzjgj.exe 580 sanjnsbinjquf.exe 580 sanjnsbinjquf.exe 1692 iwpdlfpnjcfzjgj.exe 580 sanjnsbinjquf.exe 580 sanjnsbinjquf.exe 1692 iwpdlfpnjcfzjgj.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
pid Process 3068 c2846705938fb2f595267f5effa3b1c4_JaffaCakes118.exe 3068 c2846705938fb2f595267f5effa3b1c4_JaffaCakes118.exe 3068 c2846705938fb2f595267f5effa3b1c4_JaffaCakes118.exe 1692 iwpdlfpnjcfzjgj.exe 1692 iwpdlfpnjcfzjgj.exe 1692 iwpdlfpnjcfzjgj.exe 580 sanjnsbinjquf.exe 2032 ucekuicmkr.exe 580 sanjnsbinjquf.exe 2032 ucekuicmkr.exe 580 sanjnsbinjquf.exe 2032 ucekuicmkr.exe 2332 emklsplu.exe 2332 emklsplu.exe 2332 emklsplu.exe 2248 emklsplu.exe 2248 emklsplu.exe 2248 emklsplu.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 3068 c2846705938fb2f595267f5effa3b1c4_JaffaCakes118.exe 3068 c2846705938fb2f595267f5effa3b1c4_JaffaCakes118.exe 3068 c2846705938fb2f595267f5effa3b1c4_JaffaCakes118.exe 1692 iwpdlfpnjcfzjgj.exe 1692 iwpdlfpnjcfzjgj.exe 1692 iwpdlfpnjcfzjgj.exe 580 sanjnsbinjquf.exe 2032 ucekuicmkr.exe 580 sanjnsbinjquf.exe 2032 ucekuicmkr.exe 580 sanjnsbinjquf.exe 2032 ucekuicmkr.exe 2332 emklsplu.exe 2332 emklsplu.exe 2332 emklsplu.exe 2248 emklsplu.exe 2248 emklsplu.exe 2248 emklsplu.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1204 WINWORD.EXE 1204 WINWORD.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 3068 wrote to memory of 2032 3068 c2846705938fb2f595267f5effa3b1c4_JaffaCakes118.exe 28 PID 3068 wrote to memory of 2032 3068 c2846705938fb2f595267f5effa3b1c4_JaffaCakes118.exe 28 PID 3068 wrote to memory of 2032 3068 c2846705938fb2f595267f5effa3b1c4_JaffaCakes118.exe 28 PID 3068 wrote to memory of 2032 3068 c2846705938fb2f595267f5effa3b1c4_JaffaCakes118.exe 28 PID 3068 wrote to memory of 1692 3068 c2846705938fb2f595267f5effa3b1c4_JaffaCakes118.exe 29 PID 3068 wrote to memory of 1692 3068 c2846705938fb2f595267f5effa3b1c4_JaffaCakes118.exe 29 PID 3068 wrote to memory of 1692 3068 c2846705938fb2f595267f5effa3b1c4_JaffaCakes118.exe 29 PID 3068 wrote to memory of 1692 3068 c2846705938fb2f595267f5effa3b1c4_JaffaCakes118.exe 29 PID 3068 wrote to memory of 2332 3068 c2846705938fb2f595267f5effa3b1c4_JaffaCakes118.exe 30 PID 3068 wrote to memory of 2332 3068 c2846705938fb2f595267f5effa3b1c4_JaffaCakes118.exe 30 PID 3068 wrote to memory of 2332 3068 c2846705938fb2f595267f5effa3b1c4_JaffaCakes118.exe 30 PID 3068 wrote to memory of 2332 3068 c2846705938fb2f595267f5effa3b1c4_JaffaCakes118.exe 30 PID 3068 wrote to memory of 580 3068 c2846705938fb2f595267f5effa3b1c4_JaffaCakes118.exe 31 PID 3068 wrote to memory of 580 3068 c2846705938fb2f595267f5effa3b1c4_JaffaCakes118.exe 31 PID 3068 wrote to memory of 580 3068 c2846705938fb2f595267f5effa3b1c4_JaffaCakes118.exe 31 PID 3068 wrote to memory of 580 3068 c2846705938fb2f595267f5effa3b1c4_JaffaCakes118.exe 31 PID 3068 wrote to memory of 1204 3068 c2846705938fb2f595267f5effa3b1c4_JaffaCakes118.exe 32 PID 3068 wrote to memory of 1204 3068 c2846705938fb2f595267f5effa3b1c4_JaffaCakes118.exe 32 PID 3068 wrote to memory of 1204 3068 c2846705938fb2f595267f5effa3b1c4_JaffaCakes118.exe 32 PID 3068 wrote to memory of 1204 3068 c2846705938fb2f595267f5effa3b1c4_JaffaCakes118.exe 32 PID 2032 wrote to memory of 2248 2032 ucekuicmkr.exe 33 PID 2032 wrote to memory of 2248 2032 ucekuicmkr.exe 33 PID 2032 wrote to memory of 2248 2032 ucekuicmkr.exe 33 PID 2032 wrote to memory of 2248 2032 ucekuicmkr.exe 33 PID 1204 wrote to memory of 2008 1204 WINWORD.EXE 38 PID 1204 wrote to memory of 2008 1204 WINWORD.EXE 38 PID 1204 wrote to memory of 2008 1204 WINWORD.EXE 38 PID 1204 wrote to memory of 2008 1204 WINWORD.EXE 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\c2846705938fb2f595267f5effa3b1c4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c2846705938fb2f595267f5effa3b1c4_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\ucekuicmkr.exeucekuicmkr.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\emklsplu.exeC:\Windows\system32\emklsplu.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2248
-
-
-
C:\Windows\SysWOW64\iwpdlfpnjcfzjgj.exeiwpdlfpnjcfzjgj.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1692
-
-
C:\Windows\SysWOW64\emklsplu.exeemklsplu.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2332
-
-
C:\Windows\SysWOW64\sanjnsbinjquf.exesanjnsbinjquf.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:580
-
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:2008
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD5eb6ccb407cecfb230b937471c30229ac
SHA15f4071e17a92c373e1081c9a60630c6c1d230ab7
SHA256aaf99e61b462d9b912d59397b94282f51142547abb593ff9287f4a1e85cc5757
SHA5123255463ca2aba502041ad50497542b20c5825cada6598007ca25dac2ce18e4dbfc49246dbd64ea3db01c2c3c7c7167a4267732052743f3825e6694ad4ec768fc
-
Filesize
512KB
MD5bdf1128f0e33da67bbbfb4b038794404
SHA100c9da0049e598024d9ee54b6eabef0b84bf7529
SHA2569e85d71d9d8b77dd02da6cb2f2e973058a1dc035b5e7362ac829d78eeae987f9
SHA5122529fa854ac7ae932e8c2e965a2581c26e69903ee28e8a515e6f9cd3357caf37340dce868588476065a7c61eaea14bb0ceea1058615e88c0abb09db63806e25d
-
Filesize
311B
MD5a6b90b6679e411ba6cc219f834dedbfc
SHA150f898138c574e4a7a61ae14308ceedfdbdeb9a6
SHA256bb28dffcb58081cce8245f47f535455941493fa418e60a92680b0d9461cb89a9
SHA512e8b35e88b3c495c431ce308a15030d067854a791839a1cf731a9537e85fc4560dde5ae6e759951ebb160aad6b5ddc03f8fa8021c7ed1da2946a30a54c32b7e81
-
Filesize
20KB
MD5dc08e8e470b567b52e1bc6e2f0a5c3e5
SHA168dc952f4c9a02bf6087e449a1c339f6443ed567
SHA2560bdf42da5cd51c6568656390b837b52e7ca3c9f7344c69ebb304e6ab072ca34d
SHA512e427805265c36b3bd9cceed3abd73507a8b0661a4a313349ab0c3da4eb2ecc9fc6c550ccec895a217a7d463199a5c130a5a82b18e595ed0c56dbdc1eaa6ab510
-
Filesize
512KB
MD5a3fee79c890328d0a3b5f79a4c65b1b5
SHA120a7bd1b953b151de8fb1e901daa120eb0502a7a
SHA25699dfc49b87b43a24d26f55f5be51693f5e2e8cf0954fac325a2d484a778fda0c
SHA51253ec2235b9c8edb7e62e2d857ace5b8629c24006f6ae4315ea8792d3c0faf392fdc7d658c28900e4971fd2d070bd82c15aebd3debc83ed5b166923fd4642ce76
-
Filesize
512KB
MD5be6502a0d2b2549d3ef369b5007bcbbe
SHA1c7dc1c2aae289425858981eb2dd52ed417184692
SHA256e5305f139f6d8fef088726b9ea3f349c36c1948292fe1cc36d40073ebe5f811f
SHA5129869fee597ff02b87d00bb38d2c95e68ad24480872211fd9b6aa071c970b7f862b3279235ff8868fb0c5883e51331c57b7a5fecf9db94cfa722104da31e9a384
-
Filesize
512KB
MD5e5cd332cc8c81771e413c90572b21b15
SHA19e0473fdeb50e26618797c07ea0828344418c2ff
SHA256adf950c12af345a8b58710c7ce3d82f4dbb0ff9439b8c67a2d68d503f4891437
SHA5128b42e3fafb9e9dcd98d60a26153133ccfd24a7ad8700cfb144fea412e0545aa5024f5c8ac3c6b08b8d7852ce1d579f3d5846e52d55683930b0b85ff0c82b7817
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
512KB
MD52ba19cd175deac0ed6d6906922efebf6
SHA1b6235e4d408cdde97995a8e82a5636d0863887a8
SHA256debdaa1a85fcba4ed74192d1698ede2a501ca6d7d86908b14ad4135c6a9ac548
SHA512498c0edaa2912ebda7b6814c0dedfd04d25d454f5e50ea26e607e48a20748042c0b3b787d3208aa91e88ca9dc71e24bdcb21d7d5bad8178e66bfc9295de6cc44
-
Filesize
512KB
MD5e0ae47abc8ab6709b14954d13ca720da
SHA1c19d94ed5b0815a25ffe783d57f311824195473e
SHA2568efd30d66cdbdf48102d9c827e772d7e7170657506ace5c0edc2141c0f6cc57b
SHA512080607d227c40163a15b52e6ffbd841450824b3a506c62c2ee319c7f8847c4ce8c3f03396fdecc17504d891ed4b2d9b48e9d1a41e38b3ab8f01e139ae9471a07