Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2024, 08:54
Behavioral task
behavioral1
Sample
2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe
-
Size
387KB
-
MD5
2e3f2a36a767527dda68452392480a18
-
SHA1
ed3198f2c751da2aa30885e6c48d97c217ee546f
-
SHA256
dee3120359a2f356ab96beca532472b477f7b96fd5643698e09e6832fb3bd677
-
SHA512
c223c4593b8e64747b621edc6b43f5fe80667972c4c0f79975b3040662e2837c08f54ad0ba5029ed78b3c0eebbb45f37f218c39e11b108e999598c0c41a8fd58
-
SSDEEP
12288:33NCCmpLhXiLxj1Lf73YnKr/iQbuFTS2I4nEKYdy/F/t:tCCmZYLxj1f3YiiQCc2I4nEGF
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\run 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\Windows Live = "C:\\Program Files (x86)\\Muiis\\2e3f2a36a767527dda68452392480a18_JaffaCakes118.EXE" 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\Windows Update = "C:\\Program Files (x86)\\Muiis\\2e3f2a36a767527dda68452392480a18_JaffaCakes118.EXE" 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe -
Sets service image path in registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SfCtlCom\ImagePath = "C:\\Program Files\\Trend Micro\\Internet Secuity\\SfCtlCOm.EXE" 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\TmPfw\ImagePath = "C:\\Program Files\\Trend Micro\\Internet Secuity\\SfCtlCOm.EXE" 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe -
resource yara_rule behavioral2/files/0x0007000000023c9d-7.dat aspack_v212_v242 -
Loads dropped DLL 7 IoCs
pid Process 3260 regsvr32.exe 3776 regsvr32.exe 3776 regsvr32.exe 876 regsvr32.exe 1776 regsvr32.exe 4992 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe 4992 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File created C:\Program Files (x86)\Muiis\2e3f2a36a767527dda68452392480a18_JaffaCakes118.EXE 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe File created C:\Program Files (x86)\Common Files\System\ado\WinUpData.EXE 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Common Files\System\ado\WinUpData.EXE 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe File created C:\Program Files (x86)\Muiis\readme.txt 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe File created C:\Program Files (x86)\Common Files\SYSTEM\ADO\readme.txt 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Muiis 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Muiis\Svchost.EXE 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Muiis\TBLC.DLL 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Muiis\2e3f2a36a767527dda68452392480a18_JaffaCakes118.EXE 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Muiis\CABARC.EXE 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Common Files\SYSTEM\ADO\TBLC.DLL 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Common Files\SYSTEM\ADO\CABARC.EXE 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Muiis\CONFIG.ini 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Common Files\SYSTEM\ADO\CONFIG.ini 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\MSSTDFMT.DLL 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe File opened for modification C:\Windows\REGTOOL5.DLL 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe File opened for modification C:\Windows\scrrun.dll 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe File opened for modification C:\Windows\stdole2.tlb 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe File opened for modification C:\Windows\wshom.ocx 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{99FF4677-FFC3-11D0-BD02-00C04FC2FB86}\ProgID\ = "MSSTDFMT.StdDataFormats.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A1741EF6-FFC6-11D0-BD02-00C04FC2FB86}\TypeLib\ = "{6B263850-900B-11D0-9484-00A0C91110ED}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EE09B103-97E0-11CF-978F-00A02463E06F}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{85131631-480C-11D2-B1F9-00C04F86C324}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{99FF4676-FFC3-11D0-BD02-00C04FC2FB86}\TypeLib\ = "{6B263850-900B-11D0-9484-00A0C91110ED}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{99FF4676-FFC3-11D0-BD02-00C04FC2FB86}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2B11E9B0-9F09-11D0-9484-00A0C91110ED}\TypeLib\ = "{6B263850-900B-11D0-9484-00A0C91110ED}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E675F3F0-91B5-11D0-9484-00A0C91110ED}\ = "IDataFormatDisp" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2B11E9B0-9F09-11D0-9484-00A0C91110ED}\Version regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E675F3F0-91B5-11D0-9484-00A0C91110ED} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6C51B910-900B-11D0-9484-00A0C91110ED}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{32DA2B15-CFED-11D1-B747-00C04FC2B085}\Version regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1BCD446E-7095-11D0-9C4E-00AA00BDD685}\1.0\FLAGS\ = "0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6D835690-900B-11D0-9484-00A0C91110ED}\Version\ = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSSTDFMT.StdDataValue\CurVer\ = "MSSTDFMT.StdDataValue.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E675F3F0-91B5-11D0-9484-00A0C91110ED} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5DE7A180-91B1-11D0-9484-00A0C91110ED}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0CF774D1-F077-11D1-B1BC-00C04F86C324}\InprocServer32 regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{99FF4677-FFC3-11D0-BD02-00C04FC2FB86}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSSTDFMT.StdDataFormats\CLSID\ = "{99FF4677-FFC3-11D0-BD02-00C04FC2FB86}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5DE7A180-91B1-11D0-9484-00A0C91110ED}\ = "IStdDataValueDisp" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C2F13ED0-91B0-11D0-9484-00A0C91110ED}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\REGTool5.Registry regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6D835690-900B-11D0-9484-00A0C91110ED}\Implemented Categories regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSSTDFMT.StdDataValue\ = "StdDataValue Object" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EE09B103-97E0-11CF-978F-00A02463E06F}\Implemented Categories regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0D43FE01-F093-11CF-8940-00A0C9054228} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1BCD446B-7095-11D0-9C4E-00AA00BDD685}\ProxyStubClsid regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{5DE7A180-91B1-11D0-9484-00A0C91110ED}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A1741EF6-FFC6-11D0-BD02-00C04FC2FB86} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1BCD446B-7095-11D0-9C4E-00AA00BDD685}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{6B263850-900B-11D0-9484-00A0C91110ED}\1.0\0\win32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cdx regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Scripting.Encoder regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1BCD446E-7095-11D0-9C4E-00AA00BDD685} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1BCD446B-7095-11D0-9C4E-00AA00BDD685}\ = "_Registry" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{99FF4677-FFC3-11D0-BD02-00C04FC2FB86}\Version regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A1741EF6-FFC6-11D0-BD02-00C04FC2FB86}\ = "IDataFormatsDisp" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A1741EF6-FFC6-11D0-BD02-00C04FC2FB86}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{99FF4676-FFC3-11D0-BD02-00C04FC2FB86}\TypeLib\ = "{6B263850-900B-11D0-9484-00A0C91110ED}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0CF774D0-F077-11D1-B1BC-00C04F86C324}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1BCD446C-7095-11D0-9C4E-00AA00BDD685}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{99FF4677-FFC3-11D0-BD02-00C04FC2FB86}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{6B263850-900B-11D0-9484-00A0C91110ED}\1.0\0\win32\ = "C:\\Windows\\MSSTDFMT.DLL" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E675F3F0-91B5-11D0-9484-00A0C91110ED}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5DE7A180-91B1-11D0-9484-00A0C91110ED}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C2F13ED0-91B0-11D0-9484-00A0C91110ED}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSSTDFMT.StdDataFormat.1 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2B11E9B0-9F09-11D0-9484-00A0C91110ED}\Version\ = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A1741EF6-FFC6-11D0-BD02-00C04FC2FB86}\ = "IDataFormatsDisp" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6D835690-900B-11D0-9484-00A0C91110ED}\ = "StdDataFormat Object" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSSTDFMT.StdDataFormats\CurVer\ = "MSSTDFMT.StdDataFormats.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{5DE7A180-91B1-11D0-9484-00A0C91110ED}\ = "IStdDataValueDisp" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0CF774D1-F077-11D1-B1BC-00C04F86C324}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2B11E9B0-9F09-11D0-9484-00A0C91110ED}\Implemented Categories regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSSTDFMT.StdDataFormats.1\CLSID\ = "{99FF4677-FFC3-11D0-BD02-00C04FC2FB86}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1BCD446C-7095-11D0-9C4E-00AA00BDD685}\Implemented Categories regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSSTDFMT.StdDataFormat.1\ = "StdDataFormat Object" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A1741EF6-FFC6-11D0-BD02-00C04FC2FB86} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\ScriptHostEncode regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4992 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe 4992 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe 4992 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe 4992 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe 4992 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe 4992 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe 4992 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe 4992 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe 4992 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe 4992 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe 4992 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe 4992 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe 4992 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe 4992 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe 4992 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe 4992 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe 4992 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe 4992 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe 4992 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe 4992 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe 4992 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe 4992 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe 4992 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe 4992 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe 4992 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe 4992 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe 4992 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe 4992 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe 4992 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe 4992 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe 4992 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe 4992 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe 4992 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe 4992 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe 4992 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe 4992 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe 4992 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe 4992 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe 4992 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe 4992 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe 4992 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe 4992 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe 4992 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe 4992 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe 4992 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe 4992 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe 4992 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe 4992 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe 4992 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe 4992 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe 4992 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe 4992 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe 4992 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe 4992 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe 4992 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe 4992 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe 4992 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe 4992 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe 4992 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe 4992 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe 4992 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe 4992 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe 4992 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe 4992 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4992 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4992 wrote to memory of 3260 4992 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe 85 PID 4992 wrote to memory of 3260 4992 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe 85 PID 4992 wrote to memory of 3260 4992 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe 85 PID 4992 wrote to memory of 3776 4992 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe 86 PID 4992 wrote to memory of 3776 4992 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe 86 PID 4992 wrote to memory of 3776 4992 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe 86 PID 4992 wrote to memory of 876 4992 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe 88 PID 4992 wrote to memory of 876 4992 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe 88 PID 4992 wrote to memory of 876 4992 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe 88 PID 4992 wrote to memory of 1776 4992 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe 89 PID 4992 wrote to memory of 1776 4992 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe 89 PID 4992 wrote to memory of 1776 4992 2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2e3f2a36a767527dda68452392480a18_JaffaCakes118.exe"1⤵
- Adds policy Run key to start application
- Sets service image path in registry
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s C:\Windows\MSSTDFMT.DLL2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3260
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s C:\Windows\wshom.ocx2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3776
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s C:\Windows\scrrun.dll2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:876
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s C:\Windows\REGTOOL5.DLL2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1776
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
387KB
MD52e3f2a36a767527dda68452392480a18
SHA1ed3198f2c751da2aa30885e6c48d97c217ee546f
SHA256dee3120359a2f356ab96beca532472b477f7b96fd5643698e09e6832fb3bd677
SHA512c223c4593b8e64747b621edc6b43f5fe80667972c4c0f79975b3040662e2837c08f54ad0ba5029ed78b3c0eebbb45f37f218c39e11b108e999598c0c41a8fd58
-
Filesize
29KB
MD5f17ccc7123909fbb13158003edc68034
SHA1f06989a733361ea7f8ad464f4233c4103c6f8ef9
SHA25679f4cded8b29ba5e1ada817322268b5aa4bc1593f39ca9c8be514788709d5168
SHA512632eaf9bad7aadb96e82d458885ed60e28c6544949f0af84502f3f10184cbef26f772f5fc2b6e27e4938f8b414384f56dc5579db7f838acc8dcdb631ee5ecb98
-
Filesize
116KB
MD538950fbc15ea45be9b8988d897007fb1
SHA15aabb9eff890f63c300e0633028b65cd0a93660e
SHA25673eae3c481beaf127017349e0dd03f023d5ed1888b2333b0d562c2522cd34800
SHA5126a392beeb1563977d4b1b39d683f067a6e3ed6af708c598e87fd234b25220c480d0eb5ff5eaedbc573d31fba3b38f7e82dded38824e30be6c4eeb2e40c9061c2
-
Filesize
32KB
MD5c3ab59f59b12d84af6e5d0239568c1b9
SHA1369d577ffb177d1fd5cd08f4c09861952c030834
SHA2565867810967f63871ec9c34c7aa9e4dd8fdf930438e951c621edbf7ec65d0eb67
SHA512840fb4202ca42cb44ff60953f2e6c0a562c6499555def142273b6f3f2e98fbbc5f2e9ce9cff78b918fe5a8279be179d2e41ba75d24efea33afc9bf7279fd12c1
-
Filesize
148KB
MD502016b635e1951eb7ce5d434639e08fc
SHA1dc16249731679f03fd6c7ffef1d02c95d9a0d9b7
SHA2568648112f8908d98beb1f69bc6a3e8a3e3f115805caf322c75f1034b91ab810a7
SHA51250b5766438fc0ec10fcc81cc91cdb463e0286502c386522ce7657d17faca4a40474c74c4cb8ce76e640f772b2cf82975a4db0c10f63ded9085d89f01149eb841
-
Filesize
96KB
MD545a87dbbfb14ff12b81e166147799c81
SHA195100c112ecaad15b4cd652b99c588f00e6e636b
SHA256e102483d03588447dbf8efdf1bac54ebf1458c50429e39c76c20209b501bae18
SHA512d1d6727fc418ba47d3dec2795906897579ac1abafbe935b077de307e967c34a13e7814ed50f9c517b6cb08753c01f064465d7a72615435bdb9bff314c88de228