Analysis
-
max time kernel
43s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2024, 19:46
Static task
static1
Behavioral task
behavioral1
Sample
0c39c098de7d708584645b6c637526da_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0c39c098de7d708584645b6c637526da_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0c39c098de7d708584645b6c637526da_JaffaCakes118.exe
-
Size
265KB
-
MD5
0c39c098de7d708584645b6c637526da
-
SHA1
7c1fd9c8673ec45aaf1f5d9211198cb77826d4b9
-
SHA256
a2335e318c0c30d281b343b2706f35ec97427bd072061c724479f0c756ca3f5b
-
SHA512
989233163c25fd9f64c2cd05394dbce4ff1bca61d87d8de455be6b8876596918693cdb6b41a2c91bdf43ae0183cae2fc86a8ef034312c865fd40537258e8643a
-
SSDEEP
6144:OY94NKF1jcewpPIU5X16c+ivPSzmYurPXJqQZRJ4f1G15Hp:l9OsNonVOmTrhqQZRJNJ
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation 0c39c098de7d708584645b6c637526da_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation rinst.exe -
Executes dropped EXE 64 IoCs
pid Process 5108 rinst.exe 5012 index.exe 3976 index.exe 1404 bpk.exe 3908 index.exe 2200 index.exe 1448 index.exe 2536 index.exe 748 index.exe 4996 index.exe 4856 index.exe 116 index.exe 4792 index.exe 2124 index.exe 4632 index.exe 1856 index.exe 3996 index.exe 2644 index.exe 2796 index.exe 3320 index.exe 4536 index.exe 4480 index.exe 4168 index.exe 1848 index.exe 1440 index.exe 4156 index.exe 3244 index.exe 2580 index.exe 4772 index.exe 2148 index.exe 3896 index.exe 4372 index.exe 5096 index.exe 4812 index.exe 2964 index.exe 1560 index.exe 3856 index.exe 1132 index.exe 3808 index.exe 3404 index.exe 4636 index.exe 2412 index.exe 3900 index.exe 348 index.exe 852 index.exe 1136 index.exe 2940 index.exe 4068 index.exe 3692 index.exe 2396 index.exe 3036 index.exe 4320 index.exe 2192 index.exe 4648 index.exe 3132 index.exe 640 index.exe 3460 index.exe 2724 index.exe 1092 index.exe 2116 index.exe 4004 index.exe 4560 index.exe 2312 index.exe 3748 index.exe -
Loads dropped DLL 4 IoCs
pid Process 1404 bpk.exe 1404 bpk.exe 1404 bpk.exe 4444 0c39c098de7d708584645b6c637526da_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A} bpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\ = "PK IE Plugin" bpk.exe -
Modifies WinLogon 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Logon = "WLELogon" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Logon = "WLELogon" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Shutdown = "WLEShutdown" index.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index index.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Asynchronous = "0" index.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Unlock = "WLEUnlock" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Shutdown = "WLEShutdown" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\StartScreenSaver = "WLEStartScreenSaver" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\StopScreenSaver = "WLEStopScreenSaver" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Unlock = "WLEUnlock" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Shutdown = "WLEShutdown" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Logon = "WLELogon" index.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Impersonate = "0" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Logon = "WLELogon" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Asynchronous = "0" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Logoff = "WLELogoff" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\StopScreenSaver = "WLEStopScreenSaver" index.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify index.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Impersonate = "0" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\StopScreenSaver = "WLEStopScreenSaver" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Shutdown = "WLEShutdown" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Startup = "WLEStartup" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\StartScreenSaver = "WLEStartScreenSaver" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Logoff = "WLELogoff" index.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Logon = "WLELogon" index.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Impersonate = "0" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Unlock = "WLEUnlock" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Lock = "WLELock" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Startup = "WLEStartup" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Impersonate = "0" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\StopScreenSaver = "WLEStopScreenSaver" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\StopScreenSaver = "WLEStopScreenSaver" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Logoff = "WLELogoff" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Logon = "WLELogon" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Logoff = "WLELogoff" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Unlock = "WLEUnlock" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Logoff = "WLELogoff" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Unlock = "WLEUnlock" index.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Impersonate = "0" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\DllName = "index.dll" index.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\StartScreenSaver = "WLEStartScreenSaver" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Lock = "WLELock" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Logoff = "WLELogoff" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\StopScreenSaver = "WLEStopScreenSaver" index.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Asynchronous = "0" index.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Impersonate = "0" index.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index index.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Logon = "WLELogon" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\DllName = "index.dll" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\StopScreenSaver = "WLEStopScreenSaver" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Logoff = "WLELogoff" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Lock = "WLELock" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\StopScreenSaver = "WLEStopScreenSaver" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Impersonate = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Impersonate = "0" index.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe Process not Found File created C:\Windows\SysWOW64\index.exe Process not Found File created C:\Windows\SysWOW64\index.exe Process not Found File created C:\Windows\SysWOW64\index.exe Process not Found File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe Process not Found File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe Process not Found File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe Process not Found File created C:\Windows\SysWOW64\index.exe Process not Found File created C:\Windows\SysWOW64\index.exe Process not Found File created C:\Windows\SysWOW64\index.exe Process not Found File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe Process not Found File created C:\Windows\SysWOW64\index.exe Process not Found File created C:\Windows\SysWOW64\index.exe Process not Found File created C:\Windows\SysWOW64\index.exe Process not Found File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe Process not Found File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe Process not Found File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe Process not Found File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe Process not Found File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe Process not Found File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe Process not Found File created C:\Windows\SysWOW64\index.exe Process not Found File created C:\Windows\SysWOW64\index.exe Process not Found File created C:\Windows\SysWOW64\index.exe Process not Found File created C:\Windows\SysWOW64\index.exe Process not Found File created C:\Windows\SysWOW64\index.exe Process not Found File created C:\Windows\SysWOW64\index.exe index.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe -
Modifies registry class 46 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A} bpk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\Programmable bpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}\1.0\0\win32\ = "C:\\Windows\\SysWow64\\bpkwb.dll" bpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\ = "IViewSource" bpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\TypeLib\Version = "1.0" bpk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\TypeLib bpk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PK.IE\CLSID bpk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PK.IE bpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\ = "IE Plugin Class" bpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\VersionIndependentProgID\ = "PK.IE" bpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\InprocServer32\ThreadingModel = "Apartment" bpk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}\1.0 bpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PK.IE.1\CLSID\ = "{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}" bpk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\InprocServer32 bpk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\TypeLib bpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}\1.0\FLAGS\ = "0" bpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\TypeLib\ = "{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}" bpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" bpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\TypeLib\ = "{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}" bpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PK.IE\CLSID\ = "{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}" bpk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PK.IE\CurVer bpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PK.IE\CurVer\ = "PK.IE.1" bpk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1E1B286C-88FF-11D3-8D96-D7ACAC95951A} bpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}\1.0\ = "BPK IE Plugin Type Library" bpk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\ProxyStubClsid32 bpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PK.IE\ = "IE Class" bpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PK.IE.1\ = "IE Plugin Class" bpk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}\1.0\FLAGS bpk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\TypeLib bpk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A} bpk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\ProxyStubClsid32 bpk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PK.IE.1 bpk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\ProgID bpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\ProgID\ = "PK.IE.1" bpk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\VersionIndependentProgID bpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\InprocServer32\ = "C:\\Windows\\SysWow64\\bpkwb.dll" bpk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}\1.0\0\win32 bpk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PK.IE.1\CLSID bpk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}\1.0\0 bpk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}\1.0\HELPDIR bpk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A} bpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" bpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\TypeLib\ = "{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}" bpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\ = "IViewSource" bpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\TypeLib\Version = "1.0" bpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}\1.0\HELPDIR\ = "C:\\Windows\\SysWow64\\" bpk.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1404 bpk.exe 1404 bpk.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1404 bpk.exe 1404 bpk.exe 1404 bpk.exe 1404 bpk.exe 1404 bpk.exe 1404 bpk.exe 1404 bpk.exe 1404 bpk.exe 1404 bpk.exe 1404 bpk.exe 1404 bpk.exe 1404 bpk.exe 1404 bpk.exe 1404 bpk.exe 1404 bpk.exe 1404 bpk.exe 1404 bpk.exe 1404 bpk.exe 1404 bpk.exe 1404 bpk.exe 1404 bpk.exe 1404 bpk.exe 1404 bpk.exe 1404 bpk.exe 1404 bpk.exe 1404 bpk.exe 1404 bpk.exe 1404 bpk.exe 1404 bpk.exe 1404 bpk.exe 1404 bpk.exe 1404 bpk.exe 1404 bpk.exe 1404 bpk.exe 1404 bpk.exe 1404 bpk.exe 1404 bpk.exe 1404 bpk.exe 1404 bpk.exe 1404 bpk.exe 1404 bpk.exe 1404 bpk.exe 1404 bpk.exe 1404 bpk.exe 1404 bpk.exe 1404 bpk.exe 1404 bpk.exe 1404 bpk.exe 1404 bpk.exe 1404 bpk.exe 1404 bpk.exe 1404 bpk.exe 1404 bpk.exe 1404 bpk.exe 1404 bpk.exe 1404 bpk.exe 1404 bpk.exe 1404 bpk.exe 1404 bpk.exe 1404 bpk.exe 1404 bpk.exe 1404 bpk.exe 1404 bpk.exe 1404 bpk.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 1404 bpk.exe 1404 bpk.exe 1404 bpk.exe 1404 bpk.exe 1404 bpk.exe 1404 bpk.exe 1404 bpk.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4444 wrote to memory of 5108 4444 0c39c098de7d708584645b6c637526da_JaffaCakes118.exe 82 PID 4444 wrote to memory of 5108 4444 0c39c098de7d708584645b6c637526da_JaffaCakes118.exe 82 PID 4444 wrote to memory of 5108 4444 0c39c098de7d708584645b6c637526da_JaffaCakes118.exe 82 PID 5108 wrote to memory of 5012 5108 rinst.exe 84 PID 5108 wrote to memory of 5012 5108 rinst.exe 84 PID 5108 wrote to memory of 5012 5108 rinst.exe 84 PID 5012 wrote to memory of 3976 5012 index.exe 85 PID 5012 wrote to memory of 3976 5012 index.exe 85 PID 5012 wrote to memory of 3976 5012 index.exe 85 PID 5108 wrote to memory of 1404 5108 rinst.exe 86 PID 5108 wrote to memory of 1404 5108 rinst.exe 86 PID 5108 wrote to memory of 1404 5108 rinst.exe 86 PID 3976 wrote to memory of 3908 3976 index.exe 87 PID 3976 wrote to memory of 3908 3976 index.exe 87 PID 3976 wrote to memory of 3908 3976 index.exe 87 PID 3908 wrote to memory of 2200 3908 index.exe 88 PID 3908 wrote to memory of 2200 3908 index.exe 88 PID 3908 wrote to memory of 2200 3908 index.exe 88 PID 2200 wrote to memory of 1448 2200 index.exe 89 PID 2200 wrote to memory of 1448 2200 index.exe 89 PID 2200 wrote to memory of 1448 2200 index.exe 89 PID 1448 wrote to memory of 2536 1448 index.exe 90 PID 1448 wrote to memory of 2536 1448 index.exe 90 PID 1448 wrote to memory of 2536 1448 index.exe 90 PID 2536 wrote to memory of 748 2536 index.exe 91 PID 2536 wrote to memory of 748 2536 index.exe 91 PID 2536 wrote to memory of 748 2536 index.exe 91 PID 748 wrote to memory of 4996 748 index.exe 92 PID 748 wrote to memory of 4996 748 index.exe 92 PID 748 wrote to memory of 4996 748 index.exe 92 PID 4996 wrote to memory of 4856 4996 index.exe 93 PID 4996 wrote to memory of 4856 4996 index.exe 93 PID 4996 wrote to memory of 4856 4996 index.exe 93 PID 4856 wrote to memory of 116 4856 index.exe 94 PID 4856 wrote to memory of 116 4856 index.exe 94 PID 4856 wrote to memory of 116 4856 index.exe 94 PID 116 wrote to memory of 4792 116 index.exe 95 PID 116 wrote to memory of 4792 116 index.exe 95 PID 116 wrote to memory of 4792 116 index.exe 95 PID 4792 wrote to memory of 2124 4792 index.exe 96 PID 4792 wrote to memory of 2124 4792 index.exe 96 PID 4792 wrote to memory of 2124 4792 index.exe 96 PID 2124 wrote to memory of 4632 2124 index.exe 97 PID 2124 wrote to memory of 4632 2124 index.exe 97 PID 2124 wrote to memory of 4632 2124 index.exe 97 PID 4632 wrote to memory of 1856 4632 index.exe 98 PID 4632 wrote to memory of 1856 4632 index.exe 98 PID 4632 wrote to memory of 1856 4632 index.exe 98 PID 1856 wrote to memory of 3996 1856 index.exe 99 PID 1856 wrote to memory of 3996 1856 index.exe 99 PID 1856 wrote to memory of 3996 1856 index.exe 99 PID 3996 wrote to memory of 2644 3996 index.exe 100 PID 3996 wrote to memory of 2644 3996 index.exe 100 PID 3996 wrote to memory of 2644 3996 index.exe 100 PID 2644 wrote to memory of 2796 2644 index.exe 101 PID 2644 wrote to memory of 2796 2644 index.exe 101 PID 2644 wrote to memory of 2796 2644 index.exe 101 PID 2796 wrote to memory of 3320 2796 index.exe 102 PID 2796 wrote to memory of 3320 2796 index.exe 102 PID 2796 wrote to memory of 3320 2796 index.exe 102 PID 3320 wrote to memory of 4536 3320 index.exe 103 PID 3320 wrote to memory of 4536 3320 index.exe 103 PID 3320 wrote to memory of 4536 3320 index.exe 103 PID 4536 wrote to memory of 4480 4536 index.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c39c098de7d708584645b6c637526da_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0c39c098de7d708584645b6c637526da_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\rinst.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\rinst.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\index.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\index.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe20⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe22⤵
- Executes dropped EXE
PID:4480 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe23⤵
- Executes dropped EXE
PID:4168 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe24⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1848 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe25⤵
- Executes dropped EXE
PID:1440 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe26⤵
- Executes dropped EXE
PID:4156 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe27⤵
- Executes dropped EXE
PID:3244 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe28⤵
- Executes dropped EXE
PID:2580 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe29⤵
- Executes dropped EXE
PID:4772 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe30⤵
- Executes dropped EXE
PID:2148 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe31⤵
- Executes dropped EXE
PID:3896 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe32⤵
- Executes dropped EXE
PID:4372 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe33⤵
- Executes dropped EXE
PID:5096 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe34⤵
- Executes dropped EXE
PID:4812 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe35⤵
- Executes dropped EXE
PID:2964 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe36⤵
- Executes dropped EXE
PID:1560 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe37⤵
- Executes dropped EXE
PID:3856 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe38⤵
- Executes dropped EXE
PID:1132 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe39⤵
- Executes dropped EXE
PID:3808 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe40⤵
- Executes dropped EXE
PID:3404 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe41⤵
- Executes dropped EXE
- Modifies WinLogon
PID:4636 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe42⤵
- Executes dropped EXE
PID:2412 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe43⤵
- Executes dropped EXE
PID:3900 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe44⤵
- Executes dropped EXE
PID:348 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe45⤵
- Executes dropped EXE
PID:852 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe46⤵
- Executes dropped EXE
PID:1136 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe47⤵
- Executes dropped EXE
PID:2940 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe48⤵
- Executes dropped EXE
PID:4068 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe49⤵
- Executes dropped EXE
PID:3692 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe50⤵
- Executes dropped EXE
PID:2396 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe51⤵
- Executes dropped EXE
PID:3036 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe52⤵
- Executes dropped EXE
PID:4320 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe53⤵
- Executes dropped EXE
PID:2192 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe54⤵
- Executes dropped EXE
PID:4648 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe55⤵
- Executes dropped EXE
PID:3132 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe56⤵
- Executes dropped EXE
- Modifies WinLogon
PID:640 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe57⤵
- Executes dropped EXE
PID:3460 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe58⤵
- Executes dropped EXE
PID:2724 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe59⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1092 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe60⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2116 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe61⤵
- Executes dropped EXE
PID:4004 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe62⤵
- Executes dropped EXE
PID:4560 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe63⤵
- Executes dropped EXE
PID:2312 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe64⤵
- Executes dropped EXE
PID:3748 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe65⤵PID:4012
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe66⤵PID:3628
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe67⤵PID:4928
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe68⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:3800 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe69⤵PID:5052
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe70⤵PID:3484
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe71⤵PID:2236
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe72⤵PID:3496
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe73⤵PID:320
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe74⤵PID:4276
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe75⤵PID:4368
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe76⤵PID:3688
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe77⤵
- Modifies WinLogon
PID:3868 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe78⤵PID:672
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe79⤵
- Modifies WinLogon
PID:512 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe80⤵PID:4248
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe81⤵PID:796
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe82⤵PID:5048
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe83⤵PID:4000
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe84⤵PID:1492
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe85⤵
- System Location Discovery: System Language Discovery
PID:872 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe86⤵PID:756
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe87⤵PID:1220
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe88⤵
- System Location Discovery: System Language Discovery
PID:3684 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe89⤵
- Drops file in System32 directory
PID:2188 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe90⤵PID:1080
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe91⤵PID:4776
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe92⤵PID:4796
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe93⤵PID:3104
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe94⤵PID:5108
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe95⤵PID:1564
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe96⤵PID:4396
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe97⤵PID:2980
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe98⤵PID:2800
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe99⤵PID:2220
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe100⤵PID:344
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe101⤵PID:2752
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe102⤵PID:5076
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe103⤵PID:2320
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe104⤵PID:4976
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe105⤵PID:1552
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe106⤵PID:668
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe107⤵PID:5092
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe108⤵PID:988
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe109⤵PID:4572
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe110⤵PID:5136
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe111⤵PID:5152
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe112⤵PID:5164
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe113⤵PID:5184
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe114⤵
- Modifies WinLogon
PID:5200 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe115⤵
- Modifies WinLogon
PID:5216 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe116⤵PID:5228
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe117⤵PID:5244
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe118⤵PID:5264
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe119⤵PID:5276
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe120⤵PID:5296
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe121⤵PID:5312
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe122⤵PID:5328
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-