Analysis
-
max time kernel
150s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-09-2024 09:23
Static task
static1
Behavioral task
behavioral1
Sample
d4081f9a07a0cb3bb520029880f43756_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d4081f9a07a0cb3bb520029880f43756_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d4081f9a07a0cb3bb520029880f43756_JaffaCakes118.exe
-
Size
496KB
-
MD5
d4081f9a07a0cb3bb520029880f43756
-
SHA1
03452dc8b5c8facebb745773c1708ddbcae3fd3e
-
SHA256
ee20b84e5d2dad62537656cc5c08310eb2b05c433a7946af033bc459ac13a9c6
-
SHA512
459cd19da75aac8039c3d2438bfb50af92c07c1c821f15bea6e9fb5cd08a497547be3d3faa21d6b48a9385c962d02c15837521d123e9429197c0805fa1ce0f4c
-
SSDEEP
12288:lDCPENnBV5jaHBoFvZstQW012B04Ngjw5qu8jxTQlDrLOM:lEEZBV5jCoFvZsSWG2BdN+w2+O
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" 3men.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" j29oAE.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" beufok.exe -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Deletes itself 1 IoCs
pid Process 1640 cmd.exe -
Executes dropped EXE 12 IoCs
pid Process 2000 j29oAE.exe 3044 beufok.exe 2316 2men.exe 2268 2men.exe 2592 2men.exe 2732 2men.exe 2720 2men.exe 2484 2men.exe 1380 3men.exe 2216 3men.exe 1708 3men.exe 1356 2913.tmp -
Loads dropped DLL 10 IoCs
pid Process 2900 d4081f9a07a0cb3bb520029880f43756_JaffaCakes118.exe 2900 d4081f9a07a0cb3bb520029880f43756_JaffaCakes118.exe 2000 j29oAE.exe 2000 j29oAE.exe 2900 d4081f9a07a0cb3bb520029880f43756_JaffaCakes118.exe 2900 d4081f9a07a0cb3bb520029880f43756_JaffaCakes118.exe 2900 d4081f9a07a0cb3bb520029880f43756_JaffaCakes118.exe 2900 d4081f9a07a0cb3bb520029880f43756_JaffaCakes118.exe 1380 3men.exe 1380 3men.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2268-43-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral1/memory/2268-41-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral1/memory/2268-46-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral1/memory/2268-50-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral1/memory/2268-48-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral1/memory/2592-65-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/2592-63-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/2592-62-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/2592-60-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/2592-57-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/2592-55-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/2732-68-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral1/memory/2732-76-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral1/memory/2732-75-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral1/memory/2732-73-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral1/memory/2732-70-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral1/memory/2720-85-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral1/memory/2720-82-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral1/memory/2720-80-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral1/memory/2732-77-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral1/memory/2720-89-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral1/memory/2720-90-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral1/memory/2268-106-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral1/memory/2732-148-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral1/memory/2720-155-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral1/memory/1380-157-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2216-159-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1380-270-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1708-273-0x0000000000400000-0x000000000046A000-memory.dmp upx -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 53 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\beufok = "C:\\Users\\Admin\\beufok.exe /W" beufok.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\beufok = "C:\\Users\\Admin\\beufok.exe /E" beufok.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\beufok = "C:\\Users\\Admin\\beufok.exe /G" beufok.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\beufok = "C:\\Users\\Admin\\beufok.exe /J" beufok.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\beufok = "C:\\Users\\Admin\\beufok.exe /Y" beufok.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\beufok = "C:\\Users\\Admin\\beufok.exe /Z" beufok.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\18D.exe = "C:\\Program Files (x86)\\LP\\D054\\18D.exe" 3men.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\beufok = "C:\\Users\\Admin\\beufok.exe /k" beufok.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\beufok = "C:\\Users\\Admin\\beufok.exe /l" beufok.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\beufok = "C:\\Users\\Admin\\beufok.exe /X" beufok.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\beufok = "C:\\Users\\Admin\\beufok.exe /u" beufok.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\beufok = "C:\\Users\\Admin\\beufok.exe /h" beufok.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\beufok = "C:\\Users\\Admin\\beufok.exe /w" beufok.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\beufok = "C:\\Users\\Admin\\beufok.exe /L" beufok.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\beufok = "C:\\Users\\Admin\\beufok.exe /f" beufok.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\beufok = "C:\\Users\\Admin\\beufok.exe /m" beufok.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\beufok = "C:\\Users\\Admin\\beufok.exe /q" beufok.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\beufok = "C:\\Users\\Admin\\beufok.exe /t" beufok.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\beufok = "C:\\Users\\Admin\\beufok.exe /M" beufok.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\beufok = "C:\\Users\\Admin\\beufok.exe /v" beufok.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\beufok = "C:\\Users\\Admin\\beufok.exe /z" beufok.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\beufok = "C:\\Users\\Admin\\beufok.exe /p" beufok.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\beufok = "C:\\Users\\Admin\\beufok.exe /Q" beufok.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\beufok = "C:\\Users\\Admin\\beufok.exe /c" beufok.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\beufok = "C:\\Users\\Admin\\beufok.exe /O" beufok.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\beufok = "C:\\Users\\Admin\\beufok.exe /A" beufok.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\beufok = "C:\\Users\\Admin\\beufok.exe /o" beufok.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\beufok = "C:\\Users\\Admin\\beufok.exe /F" beufok.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\beufok = "C:\\Users\\Admin\\beufok.exe /g" beufok.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\beufok = "C:\\Users\\Admin\\beufok.exe /e" beufok.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\beufok = "C:\\Users\\Admin\\beufok.exe /s" beufok.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\beufok = "C:\\Users\\Admin\\beufok.exe /i" beufok.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\beufok = "C:\\Users\\Admin\\beufok.exe /V" beufok.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\beufok = "C:\\Users\\Admin\\beufok.exe /y" beufok.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\beufok = "C:\\Users\\Admin\\beufok.exe /R" beufok.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\beufok = "C:\\Users\\Admin\\beufok.exe /N" beufok.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\beufok = "C:\\Users\\Admin\\beufok.exe /d" beufok.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\beufok = "C:\\Users\\Admin\\beufok.exe /n" beufok.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\beufok = "C:\\Users\\Admin\\beufok.exe /a" beufok.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\beufok = "C:\\Users\\Admin\\beufok.exe /x" beufok.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\beufok = "C:\\Users\\Admin\\beufok.exe /P" beufok.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\beufok = "C:\\Users\\Admin\\beufok.exe /U" beufok.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\beufok = "C:\\Users\\Admin\\beufok.exe /b" beufok.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\beufok = "C:\\Users\\Admin\\beufok.exe /K" beufok.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\beufok = "C:\\Users\\Admin\\beufok.exe /S" beufok.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\beufok = "C:\\Users\\Admin\\beufok.exe /X" j29oAE.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\beufok = "C:\\Users\\Admin\\beufok.exe /D" beufok.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\beufok = "C:\\Users\\Admin\\beufok.exe /H" beufok.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\beufok = "C:\\Users\\Admin\\beufok.exe /T" beufok.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\beufok = "C:\\Users\\Admin\\beufok.exe /B" beufok.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\beufok = "C:\\Users\\Admin\\beufok.exe /C" beufok.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\beufok = "C:\\Users\\Admin\\beufok.exe /j" beufok.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\beufok = "C:\\Users\\Admin\\beufok.exe /I" beufok.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 2men.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 2men.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 2044 tasklist.exe 1052 tasklist.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 2316 set thread context of 2268 2316 2men.exe 34 PID 2316 set thread context of 2592 2316 2men.exe 35 PID 2316 set thread context of 2732 2316 2men.exe 36 PID 2316 set thread context of 2720 2316 2men.exe 37 PID 2316 set thread context of 2484 2316 2men.exe 38 -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\LP\D054\18D.exe 3men.exe File opened for modification C:\Program Files (x86)\LP\D054\18D.exe 3men.exe File opened for modification C:\Program Files (x86)\LP\D054\2913.tmp 3men.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3men.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language beufok.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2men.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d4081f9a07a0cb3bb520029880f43756_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language j29oAE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3men.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2men.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3men.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2913.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2men.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2000 j29oAE.exe 2000 j29oAE.exe 2592 2men.exe 2732 2men.exe 3044 beufok.exe 3044 beufok.exe 2592 2men.exe 3044 beufok.exe 2732 2men.exe 3044 beufok.exe 3044 beufok.exe 3044 beufok.exe 2592 2men.exe 1380 3men.exe 1380 3men.exe 1380 3men.exe 1380 3men.exe 1380 3men.exe 1380 3men.exe 2592 2men.exe 2592 2men.exe 3044 beufok.exe 3044 beufok.exe 3044 beufok.exe 2592 2men.exe 3044 beufok.exe 2592 2men.exe 3044 beufok.exe 2592 2men.exe 3044 beufok.exe 3044 beufok.exe 2592 2men.exe 3044 beufok.exe 2592 2men.exe 3044 beufok.exe 2592 2men.exe 2592 2men.exe 2592 2men.exe 3044 beufok.exe 3044 beufok.exe 2592 2men.exe 3044 beufok.exe 2592 2men.exe 2592 2men.exe 3044 beufok.exe 3044 beufok.exe 2592 2men.exe 2592 2men.exe 3044 beufok.exe 2592 2men.exe 2592 2men.exe 3044 beufok.exe 2592 2men.exe 3044 beufok.exe 3044 beufok.exe 2592 2men.exe 2592 2men.exe 3044 beufok.exe 2592 2men.exe 2592 2men.exe 2592 2men.exe 3044 beufok.exe 2592 2men.exe 3044 beufok.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1852 explorer.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeDebugPrivilege 2044 tasklist.exe Token: SeRestorePrivilege 2224 msiexec.exe Token: SeTakeOwnershipPrivilege 2224 msiexec.exe Token: SeSecurityPrivilege 2224 msiexec.exe Token: SeDebugPrivilege 1052 tasklist.exe Token: SeShutdownPrivilege 1852 explorer.exe Token: SeShutdownPrivilege 1852 explorer.exe Token: SeShutdownPrivilege 1852 explorer.exe Token: SeShutdownPrivilege 1852 explorer.exe Token: SeShutdownPrivilege 1852 explorer.exe Token: SeShutdownPrivilege 1852 explorer.exe Token: SeShutdownPrivilege 1852 explorer.exe Token: SeShutdownPrivilege 1852 explorer.exe Token: SeShutdownPrivilege 1852 explorer.exe Token: SeShutdownPrivilege 1852 explorer.exe Token: SeShutdownPrivilege 1852 explorer.exe Token: SeShutdownPrivilege 1852 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 1852 explorer.exe 1852 explorer.exe 1852 explorer.exe 1852 explorer.exe 1852 explorer.exe 1852 explorer.exe 1852 explorer.exe 1852 explorer.exe 1852 explorer.exe 1852 explorer.exe 1852 explorer.exe 1852 explorer.exe 1852 explorer.exe 1852 explorer.exe 1852 explorer.exe 1852 explorer.exe 1852 explorer.exe 1852 explorer.exe 1852 explorer.exe 1852 explorer.exe 1852 explorer.exe 1852 explorer.exe 1852 explorer.exe 1852 explorer.exe 1852 explorer.exe 1852 explorer.exe 1852 explorer.exe 1852 explorer.exe -
Suspicious use of SendNotifyMessage 22 IoCs
pid Process 1852 explorer.exe 1852 explorer.exe 1852 explorer.exe 1852 explorer.exe 1852 explorer.exe 1852 explorer.exe 1852 explorer.exe 1852 explorer.exe 1852 explorer.exe 1852 explorer.exe 1852 explorer.exe 1852 explorer.exe 1852 explorer.exe 1852 explorer.exe 1852 explorer.exe 1852 explorer.exe 1852 explorer.exe 1852 explorer.exe 1852 explorer.exe 1852 explorer.exe 1852 explorer.exe 1852 explorer.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2900 d4081f9a07a0cb3bb520029880f43756_JaffaCakes118.exe 2000 j29oAE.exe 3044 beufok.exe 2316 2men.exe 2268 2men.exe 2720 2men.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2900 wrote to memory of 2000 2900 d4081f9a07a0cb3bb520029880f43756_JaffaCakes118.exe 28 PID 2900 wrote to memory of 2000 2900 d4081f9a07a0cb3bb520029880f43756_JaffaCakes118.exe 28 PID 2900 wrote to memory of 2000 2900 d4081f9a07a0cb3bb520029880f43756_JaffaCakes118.exe 28 PID 2900 wrote to memory of 2000 2900 d4081f9a07a0cb3bb520029880f43756_JaffaCakes118.exe 28 PID 2000 wrote to memory of 3044 2000 j29oAE.exe 29 PID 2000 wrote to memory of 3044 2000 j29oAE.exe 29 PID 2000 wrote to memory of 3044 2000 j29oAE.exe 29 PID 2000 wrote to memory of 3044 2000 j29oAE.exe 29 PID 2000 wrote to memory of 2056 2000 j29oAE.exe 30 PID 2000 wrote to memory of 2056 2000 j29oAE.exe 30 PID 2000 wrote to memory of 2056 2000 j29oAE.exe 30 PID 2000 wrote to memory of 2056 2000 j29oAE.exe 30 PID 2900 wrote to memory of 2316 2900 d4081f9a07a0cb3bb520029880f43756_JaffaCakes118.exe 32 PID 2900 wrote to memory of 2316 2900 d4081f9a07a0cb3bb520029880f43756_JaffaCakes118.exe 32 PID 2900 wrote to memory of 2316 2900 d4081f9a07a0cb3bb520029880f43756_JaffaCakes118.exe 32 PID 2900 wrote to memory of 2316 2900 d4081f9a07a0cb3bb520029880f43756_JaffaCakes118.exe 32 PID 2056 wrote to memory of 2044 2056 cmd.exe 33 PID 2056 wrote to memory of 2044 2056 cmd.exe 33 PID 2056 wrote to memory of 2044 2056 cmd.exe 33 PID 2056 wrote to memory of 2044 2056 cmd.exe 33 PID 2316 wrote to memory of 2268 2316 2men.exe 34 PID 2316 wrote to memory of 2268 2316 2men.exe 34 PID 2316 wrote to memory of 2268 2316 2men.exe 34 PID 2316 wrote to memory of 2268 2316 2men.exe 34 PID 2316 wrote to memory of 2268 2316 2men.exe 34 PID 2316 wrote to memory of 2268 2316 2men.exe 34 PID 2316 wrote to memory of 2268 2316 2men.exe 34 PID 2316 wrote to memory of 2268 2316 2men.exe 34 PID 2316 wrote to memory of 2592 2316 2men.exe 35 PID 2316 wrote to memory of 2592 2316 2men.exe 35 PID 2316 wrote to memory of 2592 2316 2men.exe 35 PID 2316 wrote to memory of 2592 2316 2men.exe 35 PID 2316 wrote to memory of 2592 2316 2men.exe 35 PID 2316 wrote to memory of 2592 2316 2men.exe 35 PID 2316 wrote to memory of 2592 2316 2men.exe 35 PID 2316 wrote to memory of 2592 2316 2men.exe 35 PID 2316 wrote to memory of 2732 2316 2men.exe 36 PID 2316 wrote to memory of 2732 2316 2men.exe 36 PID 2316 wrote to memory of 2732 2316 2men.exe 36 PID 2316 wrote to memory of 2732 2316 2men.exe 36 PID 2316 wrote to memory of 2732 2316 2men.exe 36 PID 2316 wrote to memory of 2732 2316 2men.exe 36 PID 2316 wrote to memory of 2732 2316 2men.exe 36 PID 2316 wrote to memory of 2732 2316 2men.exe 36 PID 2316 wrote to memory of 2720 2316 2men.exe 37 PID 2316 wrote to memory of 2720 2316 2men.exe 37 PID 2316 wrote to memory of 2720 2316 2men.exe 37 PID 2316 wrote to memory of 2720 2316 2men.exe 37 PID 2316 wrote to memory of 2720 2316 2men.exe 37 PID 2316 wrote to memory of 2720 2316 2men.exe 37 PID 2316 wrote to memory of 2720 2316 2men.exe 37 PID 2316 wrote to memory of 2720 2316 2men.exe 37 PID 2316 wrote to memory of 2484 2316 2men.exe 38 PID 2316 wrote to memory of 2484 2316 2men.exe 38 PID 2316 wrote to memory of 2484 2316 2men.exe 38 PID 2316 wrote to memory of 2484 2316 2men.exe 38 PID 2316 wrote to memory of 2484 2316 2men.exe 38 PID 2900 wrote to memory of 1380 2900 d4081f9a07a0cb3bb520029880f43756_JaffaCakes118.exe 40 PID 2900 wrote to memory of 1380 2900 d4081f9a07a0cb3bb520029880f43756_JaffaCakes118.exe 40 PID 2900 wrote to memory of 1380 2900 d4081f9a07a0cb3bb520029880f43756_JaffaCakes118.exe 40 PID 2900 wrote to memory of 1380 2900 d4081f9a07a0cb3bb520029880f43756_JaffaCakes118.exe 40 PID 2900 wrote to memory of 1640 2900 d4081f9a07a0cb3bb520029880f43756_JaffaCakes118.exe 44 PID 2900 wrote to memory of 1640 2900 d4081f9a07a0cb3bb520029880f43756_JaffaCakes118.exe 44 PID 2900 wrote to memory of 1640 2900 d4081f9a07a0cb3bb520029880f43756_JaffaCakes118.exe 44 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 3men.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" 3men.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\d4081f9a07a0cb3bb520029880f43756_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d4081f9a07a0cb3bb520029880f43756_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\j29oAE.exeC:\Users\Admin\j29oAE.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\beufok.exe"C:\Users\Admin\beufok.exe"3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3044
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del j29oAE.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2044
-
-
-
-
C:\Users\Admin\2men.exeC:\Users\Admin\2men.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\2men.exe"C:\Users\Admin\2men.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2268
-
-
C:\Users\Admin\2men.exe"C:\Users\Admin\2men.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2592
-
-
C:\Users\Admin\2men.exe"C:\Users\Admin\2men.exe"3⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
PID:2732
-
-
C:\Users\Admin\2men.exe"C:\Users\Admin\2men.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2720
-
-
C:\Users\Admin\2men.exe"C:\Users\Admin\2men.exe"3⤵
- Executes dropped EXE
PID:2484
-
-
-
C:\Users\Admin\3men.exeC:\Users\Admin\3men.exe2⤵
- Modifies security service
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- System policy modification
PID:1380 -
C:\Users\Admin\3men.exeC:\Users\Admin\3men.exe startC:\Users\Admin\AppData\Roaming\4FBE2\D97D0.exe%C:\Users\Admin\AppData\Roaming\4FBE23⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2216
-
-
C:\Users\Admin\3men.exeC:\Users\Admin\3men.exe startC:\Program Files (x86)\E2018\lvvm.exe%C:\Program Files (x86)\E20183⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1708
-
-
C:\Program Files (x86)\LP\D054\2913.tmp"C:\Program Files (x86)\LP\D054\2913.tmp"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1356
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del d4081f9a07a0cb3bb520029880f43756_JaffaCakes118.exe2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1640 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1052
-
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2224
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1852
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
5Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
132KB
MD5945a713b037b50442ec5d18d3dc0d55e
SHA12c8881b327a79fafcce27479b78f05487d93c802
SHA2562da470571a64bcdeb56f62c916ee2bffa87ccc6c028b7c8cb0132d09bceedd2f
SHA5120eab4bb5d04725cc20e463ae6959f71064674602f8ee7b3c9b2db75e928b9a0b1bdc94233dc261f6277d02e54a443b42a59b12aaebb8bbf243f0940344fbf385
-
Filesize
300B
MD589daf292de90b11d1437b45888adf44b
SHA1904ef904be8b47fb5d58e3efa277239012ec0188
SHA2564dd7d0cbbe7974b77255b3e740cead4f9710ae5bd1128b99ac87378fe7e5c89c
SHA512e2d5b6064787a4d3d7a5715d9bb9e50d48c24e4825ae07ef1a0a146552c40cc493601e5a5ae248bf5a22d3bf30f03c071aa4a17fcd2d8f47b9a08010709979e8
-
Filesize
600B
MD55fc44ad13a994b13d579816a8cd29db6
SHA13461fb6aea30948ef8aff1bfdd8bf4358bd59e6b
SHA2562b4c6edd1341b0ba11ea7b614c608223014d30d7132be7c29f2e1d59d5e01c04
SHA5125a0bf1a578b58edcf0ff78e56734f43ee1ef5418374ab228b5888c1d2c0555ea2d346b0a9c513712b825244303d4eae6b2b25f23444e5a4402066950252f7d25
-
Filesize
996B
MD5e18ecaee85991d9a1bc1c7fb418063b6
SHA1bf23e62437e97270402a55bdcf305014b967fdc6
SHA256a1a8f2c4452b034e11d3a1269b30a9de5fbaa1112eff36201dd162d72bc593be
SHA512ec8c042751113e90fe7fcee71bc5ba2bfa982223b7bc897c0b9f8910344825f4237d762fdff1d3aaca061a6113caafd2619998de7d90c0fbd4f305643ea54b42
-
Filesize
1KB
MD506af4e0999156779a3e753dd57e76174
SHA1c5040f7a444bcc9eb15a518b61cfe056d5c08f9b
SHA25623da4c5718f25b78e90fae229d0bbfafde15d02342cb8c30b09f7003ae09f5b1
SHA5124ae003a3c22af4ba9889cfbb522625fb2593ed35d5af5fa0f8734a8a9a9b65b6dfea8c974a05f8d0773ca8b16a9d33268d2fff1c4550c327e66d2e95d205067b
-
Filesize
176KB
MD5c6bdf73237b91f89333e544cd97eb2ff
SHA1c7f78dd7990dbb9c485b1321eea7f6b8765c2236
SHA2563fe7a1ab270487611e37e8a5ba2a2cab93aea913376b5d229e696f061c05debb
SHA512473310ce8f8fcd1e717e5ab3f7d3973a0ff77ab650f04711d02dc2d1ea019161804b41cc8532a58e284f476b712fb8e18446d7b0231a9ff16f6d6a8b40e1fcc7
-
Filesize
96KB
MD56b9ed8570a1857126c8bf99e0663926c
SHA194e08d8a0be09be35f37a9b17ec2130febfa2074
SHA256888e4e571a6f78ee81d94ab56bd033d413f9160f1089073176b03c91878aae2d
SHA51223211a1b71f1d05ad7f003231da826220ac4940e48071135cc3fba14708123fa0292e2e71c294a8086d8dc5f90dd32c4da3b41e6857c56f38cb325d78cb14880
-
Filesize
271KB
MD50d668203e24463de2bf228f00443b7bc
SHA1eacff981d71f6648f6315e508bfd75e11683dba8
SHA256509d530e99839d7dbc8fccac163420d9dc455fb478fa57fdec1b7a2ef629d7bc
SHA5123251bb1341bd466e71468d72723bd5cf545dbd232327f343b44c51daae8755ed3caa02f74adbb0304912769346fa90dfa4c7036c211836e5650bdb06993ba803
-
Filesize
176KB
MD5c4a634088e095eab98183984bb7252d8
SHA1c205f2c1f8040c9205c6c06accd75c0396c59781
SHA256db345985313397a39cc2817134315c8db71ab4c48680e62c0358db406b0eff6a
SHA512b6a30f6d5cc30bee9b9d483629f16c80c5338360cec629f9ee2a3307b73b9743fd71396e408ac72008b84f4b8fded26002c910421853253b52b8b4d530df7a8e