Analysis
-
max time kernel
136s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2024, 12:43
Static task
static1
Behavioral task
behavioral1
Sample
c8d78076a0dc1a438c974d7a4ca6bb59_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c8d78076a0dc1a438c974d7a4ca6bb59_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c8d78076a0dc1a438c974d7a4ca6bb59_JaffaCakes118.exe
-
Size
508KB
-
MD5
c8d78076a0dc1a438c974d7a4ca6bb59
-
SHA1
5a356fd639a9416bbef7b494ff092891e91e00b9
-
SHA256
d9508939788ef11986dad9fecc9ebc2e28dad9b3966bf861a68e9f351d26d382
-
SHA512
001a1a1b68ea5bbb99e8e43d88e613da5d6eeb75257dca5b03313e8d9a8592bf7f9ec351cbbd3f0b35f04b18ff0f571c085feda6e4ab0d0b2a63e56350b2679e
-
SSDEEP
12288:RBpo35lG4mEox2Y1joE9bPwifPvPU9pBD8HFOAkyhpVG:RBpo35lG4axJ5NPwifPvPU9pHmhpVG
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\NTAPService\ImagePath = "C:\\Program Files (x86)\\NateSearch\\NateSrv.exe /service" 028611_s.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation c8d78076a0dc1a438c974d7a4ca6bb59_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation NateSetup.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation 028611_s.exe -
Executes dropped EXE 3 IoCs
pid Process 908 NateSetup.exe 4980 028611_s.exe 4140 NateSrv.exe -
Loads dropped DLL 6 IoCs
pid Process 652 c8d78076a0dc1a438c974d7a4ca6bb59_JaffaCakes118.exe 3256 Regsvr32.exe 4460 regsvr32.exe 4612 regsvr32.exe 4416 regsvr32.exe 4048 regsvr32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Installs/modifies Browser Helper Object 2 TTPs 7 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{351DEC87-66BA-4A57-BA1B-E9B1583FC050} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{351DEC87-66BA-4A57-BA1B-E9B1583FC050} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{351DEC87-66BA-4A57-BA1B-E9B1583FC050} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{351DEC87-66BA-4A57-BA1B-E9B1583FC050} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{351DEC87-66BA-4A57-BA1B-E9B1583FC050} Regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C} NateSrv.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{31D09BA0-12F5-4CCE-BE8A-2923E76605DA} NateSrv.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files (x86)\NateSearch\NateSearch.dll c8d78076a0dc1a438c974d7a4ca6bb59_JaffaCakes118.exe File created C:\Program Files (x86)\NateSearch\NateSetup.exe c8d78076a0dc1a438c974d7a4ca6bb59_JaffaCakes118.exe File created C:\Program Files (x86)\NateSearch\NateSrv.exe c8d78076a0dc1a438c974d7a4ca6bb59_JaffaCakes118.exe File created C:\Program Files (x86)\NateSearch\NateUninstall.exe c8d78076a0dc1a438c974d7a4ca6bb59_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NateSrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c8d78076a0dc1a438c974d7a4ca6bb59_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NateSetup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 028611_s.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Software\Microsoft\Internet Explorer\SearchScopes 028611_s.exe Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\DefaultScope = "{ED75FB82-39AC-4510-B1EF-F240D2C4EBC5}" 028611_s.exe Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{ED75FB82-39AC-4510-B1EF-F240D2C4EBC5}\DisplayName = "³×ÀÌÆ®" 028611_s.exe Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{ED75FB82-39AC-4510-B1EF-F240D2C4EBC5}\FaviconURL = "http://search.nate.com/favicon.ico" 028611_s.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Software\Microsoft\Internet Explorer\SearchScopes\{ED75FB82-39AC-4510-B1EF-F240D2C4EBC5} 028611_s.exe Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{ED75FB82-39AC-4510-B1EF-F240D2C4EBC5}\URL = "http://search.nate.com/search/all.html?sc=ak&afc=A190000001&q={searchTerms}" 028611_s.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{ED75FB82-39AC-4510-B1EF-F240D2C4EBC5}\CodePage = "949" 028611_s.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Software\Microsoft\Internet Explorer\Toolbar NateSrv.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "0" NateSrv.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{351DEC87-66BA-4A57-BA1B-E9B1583FC050}\VersionIndependentProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{351DEC87-66BA-4A57-BA1B-E9B1583FC050} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{351DEC87-66BA-4A57-BA1B-E9B1583FC050}\ = "NateSrch Class" Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{351DEC87-66BA-4A57-BA1B-E9B1583FC050}\InprocServer32 Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\NateSearch.NateSrch\ = "NateSrch Class" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{351DEC87-66BA-4A57-BA1B-E9B1583FC050}\VersionIndependentProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{351DEC87-66BA-4A57-BA1B-E9B1583FC050} Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\NateSearch.NateSrch\ = "NateSrch Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{351DEC87-66BA-4A57-BA1B-E9B1583FC050}\Programmable regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{351DEC87-66BA-4A57-BA1B-E9B1583FC050}\VersionIndependentProgID\ = "NateSearch.NateSrch" Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB531AD1-ACFB-42D9-89F0-52DFA792ACAD}\TypeLib\ = "{CFAA4635-6B33-4477-96BD-1740CDD343EE}" Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{351DEC87-66BA-4A57-BA1B-E9B1583FC050}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\NateSearch.NateSrch\ = "NateSrch Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{351DEC87-66BA-4A57-BA1B-E9B1583FC050}\InprocServer32 regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{351DEC87-66BA-4A57-BA1B-E9B1583FC050} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{351DEC87-66BA-4A57-BA1B-E9B1583FC050}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\NateSearch.NateSrch.1\CLSID Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{351DEC87-66BA-4A57-BA1B-E9B1583FC050}\VersionIndependentProgID Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB531AD1-ACFB-42D9-89F0-52DFA792ACAD}\ProxyStubClsid32 Regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\ie_to_edge_bho.IEToEdgeBHO\CurVer NateSrv.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{351DEC87-66BA-4A57-BA1B-E9B1583FC050}\InprocServer32 regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{351DEC87-66BA-4A57-BA1B-E9B1583FC050}\TypeLib regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\ie_to_edge_bho.IEToEdgeBHO.1 NateSrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\NateSearch.NateSrch\CurVer\ = "NateSearch.NateSrch.1" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{351DEC87-66BA-4A57-BA1B-E9B1583FC050}\InprocServer32 regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{351DEC87-66BA-4A57-BA1B-E9B1583FC050}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{351DEC87-66BA-4A57-BA1B-E9B1583FC050}\ = "NateSrch Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\NateSearch.NateSrch.1\ = "NateSrch Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\NateSearch.NateSrch\CLSID\ = "{351DEC87-66BA-4A57-BA1B-E9B1583FC050}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{351DEC87-66BA-4A57-BA1B-E9B1583FC050} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\NateSearch.NateSrch.1\ = "NateSrch Class" Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CFAA4635-6B33-4477-96BD-1740CDD343EE} Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CFAA4635-6B33-4477-96BD-1740CDD343EE}\1.0\0\win32 Regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C} NateSrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{351DEC87-66BA-4A57-BA1B-E9B1583FC050} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{351DEC87-66BA-4A57-BA1B-E9B1583FC050}\ = "NateSrch Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{AB531AD1-ACFB-42D9-89F0-52DFA792ACAD}\ = "INateSrch" Regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\OCHelper.BrowserHelper\CLSID NateSrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{351DEC87-66BA-4A57-BA1B-E9B1583FC050}\TypeLib\ = "{CFAA4635-6B33-4477-96BD-1740CDD343EE}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{351DEC87-66BA-4A57-BA1B-E9B1583FC050}\Programmable regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{351DEC87-66BA-4A57-BA1B-E9B1583FC050}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{351DEC87-66BA-4A57-BA1B-E9B1583FC050}\Programmable regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\NateSearch.NateSrch\CurVer\ = "NateSearch.NateSrch.1" Regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{31D09BA0-12F5-4CCE-BE8A-2923E76605DA}\Implemented Categories NateSrv.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{31D09BA0-12F5-4CCE-BE8A-2923E76605DA}\TypeLib NateSrv.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{31D09BA0-12F5-4CCE-BE8A-2923E76605DA} NateSrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{351DEC87-66BA-4A57-BA1B-E9B1583FC050}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{351DEC87-66BA-4A57-BA1B-E9B1583FC050}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{351DEC87-66BA-4A57-BA1B-E9B1583FC050} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\NateSearch.NateSrch Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB531AD1-ACFB-42D9-89F0-52DFA792ACAD}\ = "INateSrch" Regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\Implemented Categories NateSrv.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{31D09BA0-12F5-4CCE-BE8A-2923E76605DA}\ProgID NateSrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{351DEC87-66BA-4A57-BA1B-E9B1583FC050}\VersionIndependentProgID\ = "NateSearch.NateSrch" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{351DEC87-66BA-4A57-BA1B-E9B1583FC050}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AD139557-79C6-4206-B886-F6AC76E2EADC}\ProxyStubClsid32 Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{AB531AD1-ACFB-42D9-89F0-52DFA792ACAD}\ProxyStubClsid32 Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{AB531AD1-ACFB-42D9-89F0-52DFA792ACAD}\TypeLib\ = "{CFAA4635-6B33-4477-96BD-1740CDD343EE}" Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB531AD1-ACFB-42D9-89F0-52DFA792ACAD}\TypeLib Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{351DEC87-66BA-4A57-BA1B-E9B1583FC050}\ = "NateSrch Class" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\ie_to_edge_bho.IEToEdgeBHO NateSrv.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{351DEC87-66BA-4A57-BA1B-E9B1583FC050}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\NateSearch.NateSrch.1\ = "NateSrch Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{AD139557-79C6-4206-B886-F6AC76E2EADC}\ = "_INateSrchEvents" Regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 652 c8d78076a0dc1a438c974d7a4ca6bb59_JaffaCakes118.exe 652 c8d78076a0dc1a438c974d7a4ca6bb59_JaffaCakes118.exe 4980 028611_s.exe 4980 028611_s.exe -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 652 c8d78076a0dc1a438c974d7a4ca6bb59_JaffaCakes118.exe 652 c8d78076a0dc1a438c974d7a4ca6bb59_JaffaCakes118.exe 908 NateSetup.exe 908 NateSetup.exe 4980 028611_s.exe 4980 028611_s.exe 4980 028611_s.exe 4140 NateSrv.exe 4140 NateSrv.exe 4140 NateSrv.exe 4140 NateSrv.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 652 wrote to memory of 3256 652 c8d78076a0dc1a438c974d7a4ca6bb59_JaffaCakes118.exe 93 PID 652 wrote to memory of 3256 652 c8d78076a0dc1a438c974d7a4ca6bb59_JaffaCakes118.exe 93 PID 652 wrote to memory of 3256 652 c8d78076a0dc1a438c974d7a4ca6bb59_JaffaCakes118.exe 93 PID 652 wrote to memory of 908 652 c8d78076a0dc1a438c974d7a4ca6bb59_JaffaCakes118.exe 95 PID 652 wrote to memory of 908 652 c8d78076a0dc1a438c974d7a4ca6bb59_JaffaCakes118.exe 95 PID 652 wrote to memory of 908 652 c8d78076a0dc1a438c974d7a4ca6bb59_JaffaCakes118.exe 95 PID 908 wrote to memory of 4980 908 NateSetup.exe 97 PID 908 wrote to memory of 4980 908 NateSetup.exe 97 PID 908 wrote to memory of 4980 908 NateSetup.exe 97 PID 4980 wrote to memory of 2188 4980 028611_s.exe 98 PID 4980 wrote to memory of 2188 4980 028611_s.exe 98 PID 4980 wrote to memory of 2188 4980 028611_s.exe 98 PID 4980 wrote to memory of 4140 4980 028611_s.exe 99 PID 4980 wrote to memory of 4140 4980 028611_s.exe 99 PID 4980 wrote to memory of 4140 4980 028611_s.exe 99 PID 4140 wrote to memory of 4460 4140 NateSrv.exe 105 PID 4140 wrote to memory of 4460 4140 NateSrv.exe 105 PID 4140 wrote to memory of 4460 4140 NateSrv.exe 105 PID 4140 wrote to memory of 4612 4140 NateSrv.exe 106 PID 4140 wrote to memory of 4612 4140 NateSrv.exe 106 PID 4140 wrote to memory of 4612 4140 NateSrv.exe 106 PID 4140 wrote to memory of 4416 4140 NateSrv.exe 108 PID 4140 wrote to memory of 4416 4140 NateSrv.exe 108 PID 4140 wrote to memory of 4416 4140 NateSrv.exe 108 PID 4140 wrote to memory of 4048 4140 NateSrv.exe 109 PID 4140 wrote to memory of 4048 4140 NateSrv.exe 109 PID 4140 wrote to memory of 4048 4140 NateSrv.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\c8d78076a0dc1a438c974d7a4ca6bb59_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c8d78076a0dc1a438c974d7a4ca6bb59_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Windows\SysWOW64\Regsvr32.exeRegsvr32.exe /s "C:\Program Files (x86)\NateSearch\NateSearch.dll"2⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3256
-
-
C:\Program Files (x86)\NateSearch\NateSetup.exe"C:\Program Files (x86)\NateSearch\NateSetup.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Users\Admin\AppData\Local\Temp\028611_s.exe"C:\Users\Admin\AppData\Local\Temp\028611_s.exe" Setup3⤵
- Sets service image path in registry
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32 /s "C:\Users\Admin\AppData\Local\Temp\NateSearch.dll"4⤵
- System Location Discovery: System Language Discovery
PID:2188
-
-
C:\Program Files (x86)\NateSearch\NateSrv.exe"C:\Program Files (x86)\NateSearch\NateSrv.exe"4⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32 /s "C:\Program Files (x86)\NateSearch\NateSearch.dll"5⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4460
-
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32 /s "C:\Program Files (x86)\NateSearch\NateSearch.dll"5⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4612
-
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32 /s "C:\Program Files (x86)\NateSearch\NateSearch.dll"5⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4416
-
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32 /s "C:\Program Files (x86)\NateSearch\NateSearch.dll"5⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4048
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4276,i,13995403245988825027,7033610968827661507,262144 --variations-seed-version --mojo-platform-channel-handle=3864 /prefetch:81⤵PID:1292
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Browser Extensions
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120KB
MD583092441bb361565c7e2a364c50022bc
SHA1264e53ace72f80a0a94fe8780b8fd0a37e8e2f25
SHA256800802d55c9980601d006b1681219ec688926bde7d515547063a438ca1f35a1c
SHA5126be9b1263ac69dd9cd818719749f95fec1d2e92355a7bb3449b22c41d23a484a315f40db16b82b02e797fc2570da20999b567e943e41f7947ed16f60c1b5eaa8
-
Filesize
2.6MB
MD5efc4c25ef5e213ca548fdd07d5e817e8
SHA16b7c0adaf21e970a87d84e943a8a437329821b6f
SHA25684d0e0ef8b9b3d1e98d1074b995abc066fdd9b7186c486780ce0aa560dcd75ce
SHA512991091daf856e31664e0fa3515b643da44e14bff1a837446ea8dcfb67478f1d58a3be978d6c8f3898619915fe3b67d1a7cc4df1374c1a163e2b31b4aa7b9983a
-
Filesize
120KB
MD58efdd4e5f79ea8bd4e87a97a4be8d3dd
SHA13a1b1c9fff6eed91d5813ec8bab0bba111a771b2
SHA256ac86f6e932e77f5f2f951e7484a78f890ac0234bd0ae54bb400d5ef9eba6153a
SHA51290e6179ea110946799ce8fd1006a6d79798452c09038bc153ff65a35ba22abacac19b10867f2a780cc2a1826b9cea6c5463b065bb34ff477ca534a59b75a1e11