Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2024, 20:20
Static task
static1
Behavioral task
behavioral1
Sample
0c53020e8fb7b089a7fcb9d1534e7d60_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0c53020e8fb7b089a7fcb9d1534e7d60_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0c53020e8fb7b089a7fcb9d1534e7d60_JaffaCakes118.exe
-
Size
161KB
-
MD5
0c53020e8fb7b089a7fcb9d1534e7d60
-
SHA1
49304cb6355babbfd878ab5a0b01f34deb8030b1
-
SHA256
c6f22aa00fa730828c90e7032889291c5b624facd56561e6684c855927ae4939
-
SHA512
981978b569bb92540b6bfbe972b281b8c118612d4b1590763be5ca6eb19a8971fc4518d0c3cf0507986b595903c5791ca29bbfd3b562849a0379a1af7a5920eb
-
SSDEEP
1536:dVyn1qvUo29OpBlXb94kWV7PYKmy8MMoWQdSCXa:2n1QTOkWZwy/7q
Malware Config
Signatures
-
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\VETTRAY.EXE BoBoTurbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\NUPGRADE.EXE BoBoTurbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MPFTRAY.EXE\Debugger = "C:\\Windows\\system\\BoBoTurbo.exe" BoBoTurbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVSCHED32.EXE BoBoTurbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KWatchUI.EXE BoBoTurbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RAVmonD.exe BoBoTurbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MAILMON.EXE BoBoTurbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WEBSCANX.EXE\Debugger = "C:\\Windows\\system\\BoBoTurbo.exe" BoBoTurbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SCANPM.EXE BoBoTurbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SCANPM.EXE\Debugger = "C:\\Windows\\system\\BoBoTurbo.exe" BoBoTurbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\DVP95.EXE BoBoTurbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVGCTRL.EXE BoBoTurbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAV32.exe BoBoTurbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Iparmor.exe BoBoTurbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\IAMAPP.EXE\Debugger = "C:\\Windows\\system\\BoBoTurbo.exe" BoBoTurbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\DVP95.EXE\Debugger = "C:\\Windows\\system\\BoBoTurbo.exe" BoBoTurbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\NAVWNT.EXE BoBoTurbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ICLOADNT.EXE BoBoTurbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WFINDV32.EXE\Debugger = "C:\\Windows\\system\\BoBoTurbo.exe" BoBoTurbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PCCWIN98.EXE\Debugger = "C:\\Windows\\system\\BoBoTurbo.exe" BoBoTurbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\CLEANER.EXE\Debugger = "C:\\Windows\\system\\BoBoTurbo.exe" BoBoTurbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVMonXP.exe BoBoTurbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVPFW.EXE BoBoTurbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MOOLIVE.EXE BoBoTurbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\NVC95.EXE BoBoTurbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MOOLIVE.EXE\Debugger = "C:\\Windows\\system\\BoBoTurbo.exe" BoBoTurbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TDS2-NT.EXE BoBoTurbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PAVW.EXE BoBoTurbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe\Debugger = "C:\\Windows\\system\\BoBoTurbo.exe" BoBoTurbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SCAN95.EXE\Debugger = "C:\\Windows\\system\\BoBoTurbo.exe" BoBoTurbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SAFEWEB.EXE BoBoTurbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\NISUM.EXE BoBoTurbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\F-AGNT95.EXE BoBoTurbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\CLAW95.EXE BoBoTurbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\navw32.EXE\Debugger = "C:\\Windows\\system\\BoBoTurbo.exe" BoBoTurbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVSvcUI.exe\Debugger = "C:\\Windows\\system\\BoBoTurbo.exe" BoBoTurbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\NAVAPW32.EXE BoBoTurbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ICMON.EXE BoBoTurbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\DVP95_0.EXE\Debugger = "C:\\Windows\\system\\BoBoTurbo.exe" BoBoTurbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ACKWIN32.EXE BoBoTurbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RAVmon.exe BoBoTurbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TDS2-98.EXE\Debugger = "C:\\Windows\\system\\BoBoTurbo.exe" BoBoTurbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TrojanHunter.exe BoBoTurbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\VSCAN40.EXE BoBoTurbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SMC.EXE\Debugger = "C:\\Windows\\system\\BoBoTurbo.exe" BoBoTurbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\IAMAPP.EXE BoBoTurbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVPM.EXE BoBoTurbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Logo_1.exe\Debugger = "C:\\Windows\\system\\BoBoTurbo.exe" BoBoTurbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360Safe.exe BoBoTurbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\LOCKDOWN2000.EXE\Debugger = "C:\\Windows\\system\\BoBoTurbo.exe" BoBoTurbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\CLEANER.EXE BoBoTurbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\CFINET32.EXE\Debugger = "C:\\Windows\\system\\BoBoTurbo.exe" BoBoTurbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVSCHED32.EXE\Debugger = "C:\\Windows\\system\\BoBoTurbo.exe" BoBoTurbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\_AVPM.EXE BoBoTurbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\_AVPM.EXE\Debugger = "C:\\Windows\\system\\BoBoTurbo.exe" BoBoTurbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360Safe.exe\Debugger = "C:\\Windows\\system\\BoBoTurbo.exe" BoBoTurbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SMC.EXE BoBoTurbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\IFACE.EXE BoBoTurbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\CLAW95CF.EXE\Debugger = "C:\\Windows\\system\\BoBoTurbo.exe" BoBoTurbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVwsc.exe\Debugger = "C:\\Windows\\system\\BoBoTurbo.exe" BoBoTurbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\THGUARD.EXE BoBoTurbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PERSFW.EXE\Debugger = "C:\\Windows\\system\\BoBoTurbo.exe" BoBoTurbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVPDOS32.EXE\Debugger = "C:\\Windows\\system\\BoBoTurbo.exe" BoBoTurbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\N32SCANW.EXE\Debugger = "C:\\Windows\\system\\BoBoTurbo.exe" BoBoTurbo.exe -
Executes dropped EXE 4 IoCs
pid Process 2916 BoBoTurbo.exe 3956 BoBoTurbo.exe 4308 BoBoTurbo.exe 3248 BoBoTurbo.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Q: BoBoTurbo.exe File opened (read-only) \??\T: BoBoTurbo.exe File opened (read-only) \??\V: BoBoTurbo.exe File opened (read-only) \??\W: BoBoTurbo.exe File opened (read-only) \??\X: BoBoTurbo.exe File opened (read-only) \??\K: BoBoTurbo.exe File opened (read-only) \??\L: BoBoTurbo.exe File opened (read-only) \??\N: BoBoTurbo.exe File opened (read-only) \??\O: BoBoTurbo.exe File opened (read-only) \??\E: BoBoTurbo.exe File opened (read-only) \??\I: BoBoTurbo.exe File opened (read-only) \??\J: BoBoTurbo.exe File opened (read-only) \??\M: BoBoTurbo.exe File opened (read-only) \??\U: BoBoTurbo.exe File opened (read-only) \??\Z: BoBoTurbo.exe File opened (read-only) \??\B: BoBoTurbo.exe File opened (read-only) \??\G: BoBoTurbo.exe File opened (read-only) \??\H: BoBoTurbo.exe File opened (read-only) \??\P: BoBoTurbo.exe File opened (read-only) \??\R: BoBoTurbo.exe File opened (read-only) \??\S: BoBoTurbo.exe File opened (read-only) \??\Y: BoBoTurbo.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops autorun.inf file 1 TTPs 4 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\autorun.inf BoBoTurbo.exe File created C:\autorun.inf BoBoTurbo.exe File opened for modification F:\autorun.inf BoBoTurbo.exe File created F:\autorun.inf BoBoTurbo.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSOSREC.EXE BoBoTurbo.exe File opened for modification C:\Program Files\Windows Media Player\wmpnetwk.exe BoBoTurbo.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxGameOverlay_1.46.11001.0_x64__8wekyb3d8bbwe\GameBar.exe BoBoTurbo.exe File opened for modification C:\Program Files (x86)\Windows Media Player\wmlaunch.exe BoBoTurbo.exe File opened for modification C:\Program Files (x86)\Windows Media Player\wmplayer.exe BoBoTurbo.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\notification_helper.exe BoBoTurbo.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe BoBoTurbo.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javaws.exe BoBoTurbo.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\java.exe BoBoTurbo.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ssvagent.exe BoBoTurbo.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\POWERPNT.EXE BoBoTurbo.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\SDXHelper.exe BoBoTurbo.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\VPREVIEW.EXE BoBoTurbo.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\createdump.exe BoBoTurbo.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\chrome_pwa_launcher.exe BoBoTurbo.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\unpack200.exe BoBoTurbo.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\officeappguardwin32.exe BoBoTurbo.exe File opened for modification C:\Program Files\Windows Media Player\wmlaunch.exe BoBoTurbo.exe File opened for modification C:\Program Files\Windows Media Player\wmpconfig.exe BoBoTurbo.exe File opened for modification C:\Program Files\Windows Security\BrowserCore\BrowserCore.exe BoBoTurbo.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\AppInstallerPythonRedirector.exe BoBoTurbo.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\PaintStudio.View.exe BoBoTurbo.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_x64__8wekyb3d8bbwe\Win32Bridge.Server.exe BoBoTurbo.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe BoBoTurbo.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaw.exe BoBoTurbo.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javacpl.exe BoBoTurbo.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE BoBoTurbo.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\SETLANG.EXE BoBoTurbo.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOXMLED.EXE BoBoTurbo.exe File opened for modification C:\Program Files\Mozilla Firefox\private_browsing.exe BoBoTurbo.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\BHO\ie_to_edge_stub.exe BoBoTurbo.exe File opened for modification C:\Program Files (x86)\Windows Media Player\wmpconfig.exe BoBoTurbo.exe File opened for modification C:\Program Files\7-Zip\7z.exe BoBoTurbo.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msoasb.exe BoBoTurbo.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msotd.exe BoBoTurbo.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Source Engine\OSE.EXE BoBoTurbo.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\HxAccounts.exe BoBoTurbo.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\java.exe BoBoTurbo.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javaw.exe BoBoTurbo.exe File opened for modification C:\Program Files\Windows Photo Viewer\ImagingDevices.exe BoBoTurbo.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\MixedRealityPortal.Brokered.exe BoBoTurbo.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateComRegisterShell64.exe BoBoTurbo.exe File opened for modification C:\Program Files (x86)\Windows Media Player\wmprph.exe BoBoTurbo.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\pwahelper.exe BoBoTurbo.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\createdump.exe BoBoTurbo.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSOHTMED.EXE BoBoTurbo.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft Analysis Services\AS OLEDB\140\SQLDumper.exe BoBoTurbo.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\codecpacks.heif.exe BoBoTurbo.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_x64__8wekyb3d8bbwe\LocalBridge.exe BoBoTurbo.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\codecpacks.VP9.exe BoBoTurbo.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe BoBoTurbo.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exe BoBoTurbo.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java.exe BoBoTurbo.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msoev.exe BoBoTurbo.exe File opened for modification C:\Program Files (x86)\Windows Media Player\setup_wm.exe BoBoTurbo.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\Common.DBConnection64.exe BoBoTurbo.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe BoBoTurbo.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\onenoteim.exe BoBoTurbo.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_x64__8wekyb3d8bbwe\Microsoft.WebMediaExtensions.exe BoBoTurbo.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\msedge_pwa_launcher.exe BoBoTurbo.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javacpl.exe BoBoTurbo.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msoadfsb.exe BoBoTurbo.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\FLTLDR.EXE BoBoTurbo.exe File opened for modification C:\Program Files\Mozilla Firefox\pingsender.exe BoBoTurbo.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\system\BoBoTurbo.exe 0c53020e8fb7b089a7fcb9d1534e7d60_JaffaCakes118.exe File opened for modification C:\Windows\system\BoBoTurbo.exe 0c53020e8fb7b089a7fcb9d1534e7d60_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0c53020e8fb7b089a7fcb9d1534e7d60_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0c53020e8fb7b089a7fcb9d1534e7d60_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BoBoTurbo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BoBoTurbo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4844 0c53020e8fb7b089a7fcb9d1534e7d60_JaffaCakes118.exe 4844 0c53020e8fb7b089a7fcb9d1534e7d60_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4844 0c53020e8fb7b089a7fcb9d1534e7d60_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1300 wrote to memory of 4844 1300 0c53020e8fb7b089a7fcb9d1534e7d60_JaffaCakes118.exe 82 PID 1300 wrote to memory of 4844 1300 0c53020e8fb7b089a7fcb9d1534e7d60_JaffaCakes118.exe 82 PID 1300 wrote to memory of 4844 1300 0c53020e8fb7b089a7fcb9d1534e7d60_JaffaCakes118.exe 82 PID 4844 wrote to memory of 2916 4844 0c53020e8fb7b089a7fcb9d1534e7d60_JaffaCakes118.exe 83 PID 4844 wrote to memory of 2916 4844 0c53020e8fb7b089a7fcb9d1534e7d60_JaffaCakes118.exe 83 PID 4844 wrote to memory of 2916 4844 0c53020e8fb7b089a7fcb9d1534e7d60_JaffaCakes118.exe 83 PID 4844 wrote to memory of 3236 4844 0c53020e8fb7b089a7fcb9d1534e7d60_JaffaCakes118.exe 84 PID 4844 wrote to memory of 3236 4844 0c53020e8fb7b089a7fcb9d1534e7d60_JaffaCakes118.exe 84 PID 4844 wrote to memory of 3236 4844 0c53020e8fb7b089a7fcb9d1534e7d60_JaffaCakes118.exe 84 PID 2916 wrote to memory of 3956 2916 BoBoTurbo.exe 85 PID 2916 wrote to memory of 3956 2916 BoBoTurbo.exe 85 PID 2916 wrote to memory of 3956 2916 BoBoTurbo.exe 85 PID 3956 wrote to memory of 4308 3956 BoBoTurbo.exe 87 PID 3956 wrote to memory of 4308 3956 BoBoTurbo.exe 87 PID 3956 wrote to memory of 4308 3956 BoBoTurbo.exe 87 PID 3956 wrote to memory of 3248 3956 BoBoTurbo.exe 88 PID 3956 wrote to memory of 3248 3956 BoBoTurbo.exe 88 PID 3956 wrote to memory of 3248 3956 BoBoTurbo.exe 88 PID 3236 wrote to memory of 936 3236 cmd.exe 89 PID 3236 wrote to memory of 936 3236 cmd.exe 89 PID 3236 wrote to memory of 936 3236 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c53020e8fb7b089a7fcb9d1534e7d60_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0c53020e8fb7b089a7fcb9d1534e7d60_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Users\Admin\AppData\Local\Temp\0c53020e8fb7b089a7fcb9d1534e7d60_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\0c53020e8fb7b089a7fcb9d1534e7d60_JaffaCakes118.exe _sys2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Windows\system\BoBoTurbo.exeC:\Windows\system\BoBoTurbo.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\system\BoBoTurbo.exeC:\Windows\system\BoBoTurbo.exe _sys4⤵
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Windows\system\BoBoTurbo.exeC:\Windows\system\BoBoTurbo.exe down5⤵
- Executes dropped EXE
PID:4308
-
-
C:\Windows\system\BoBoTurbo.exeC:\Windows\system\BoBoTurbo.exe worm5⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Program Files directory
PID:3248
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c erase /A:RHSA "C:\Users\Admin\AppData\Local\Temp\0c53020e8fb7b089a7fcb9d1534e7d60_JaffaCakes118.exe"&cmd /c del "C:\Users\Admin\AppData\Local\Temp\0c53020e8fb7b089a7fcb9d1534e7d60_JaffaCakes118.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Local\Temp\0c53020e8fb7b089a7fcb9d1534e7d60_JaffaCakes118.exe"4⤵
- System Location Discovery: System Language Discovery
PID:936
-
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Event Triggered Execution
1Image File Execution Options Injection
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
161KB
MD50c53020e8fb7b089a7fcb9d1534e7d60
SHA149304cb6355babbfd878ab5a0b01f34deb8030b1
SHA256c6f22aa00fa730828c90e7032889291c5b624facd56561e6684c855927ae4939
SHA512981978b569bb92540b6bfbe972b281b8c118612d4b1590763be5ca6eb19a8971fc4518d0c3cf0507986b595903c5791ca29bbfd3b562849a0379a1af7a5920eb