Analysis
-
max time kernel
143s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
15-10-2024 20:39
Behavioral task
behavioral1
Sample
49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe
Resource
win7-20241010-en
General
-
Target
49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
49e5775509e2938dfc0a00dbb6678d92
-
SHA1
7925f60e82cdfc055dde1160e73375ab0f86fa32
-
SHA256
6cde26900b59d3aec1d3c6ba9f581a96a76b23534e5b113ce020910671f69da3
-
SHA512
f23c3405523258eb6dcf85f3a28eff7c5a7ef9490cbdf7880c2f06924cd2e78bb22f84e4a9b7d85a0afaff5e1e3d974c00acba53bc6e7ed09404b3b78e96676e
-
SSDEEP
24576:rppOGVbiLXkRG9pudmXf/P49oGpOElnf/1p5V2TJjs:n0Vpudmv/hGpO6nf9pD2TNs
Malware Config
Signatures
-
Detect Neshta payload 3 IoCs
Processes:
resource yara_rule behavioral1/files/0x0001000000010315-10.dat family_neshta behavioral1/memory/1748-102-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1748-106-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Executes dropped EXE 2 IoCs
Processes:
49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exeuTorrent.exepid Process 2436 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe 2108 uTorrent.exe -
Identifies Wine through registry keys 2 TTPs 4 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exeuTorrent.exedescription ioc Process Key opened \REGISTRY\MACHINE\Software\Wow6432Node\Wine 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\Software\Wow6432Node\Wine uTorrent.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine uTorrent.exe -
Loads dropped DLL 3 IoCs
Processes:
49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exepid Process 1748 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe 1748 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe 2436 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
resource yara_rule behavioral1/files/0x0008000000016dbc-8.dat upx behavioral1/memory/2436-12-0x0000000000400000-0x00000000006B5000-memory.dmp upx behavioral1/memory/2436-104-0x0000000000400000-0x00000000006B5000-memory.dmp upx behavioral1/memory/2436-131-0x0000000000400000-0x00000000006B5000-memory.dmp upx behavioral1/memory/2108-174-0x0000000000400000-0x00000000006B5000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
Processes:
49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exedescription ioc Process File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\IECONT~1.EXE 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOUC.EXE 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORE.EXE 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTE.EXE 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBE_~1.EXE 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOXMLED.EXE 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\ODeploy.exe 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\ADOBEA~1\Versions\1.0\ADOBEA~1.EXE 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOBD5D~1.EXE 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTEM.EXE 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\NAMECO~1.EXE 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WORDICON.EXE 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\Oarpmany.exe 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~3.EXE 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOF5E2~1.EXE 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\BCSSync.exe 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\POWERPNT.EXE 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ACCICONS.EXE 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\VPREVIEW.EXE 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmlaunch.exe 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\SETUPF~1\{AC76B~1\Setup.exe 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOICONS.EXE 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpshare.exe 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~2\ACCESS~1\wordpad.exe 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\FLTLDR.EXE 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CLVIEW.EXE 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GRAPH.EXE 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\INFOPATH.EXE 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\PPTICO.EXE 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~1\wab.exe 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\Eula.exe 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXE 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~1.EXE 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WI54FB~1\WMPDMC.exe 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~4\ImagingDevices.exe 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CNFNOT32.EXE 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~1\WinMail.exe 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOSYNC.EXE 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ACROBR~1.EXE 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\Setup.exe 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\TextConv\WksConv\Wkconv.exe 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXE 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\OIS.EXE 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\SOURCE~1\OSE.EXE 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
Processes:
49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exedescription ioc Process File opened for modification C:\Windows\svchost.com 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
DllHost.exeDllHost.exe49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exeuTorrent.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uTorrent.exe -
Processes:
uTorrent.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main uTorrent.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl uTorrent.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION uTorrent.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\uTorrent.exe = "8000" uTorrent.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION uTorrent.exe -
Modifies registry class 64 IoCs
Processes:
uTorrent.exe49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\.btskin uTorrent.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-bittorrent-key\Extension = ".btkey" uTorrent.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\MIME\Database\Content Type\application/x-bittorrent-key uTorrent.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-bittorrent\Extension = ".torrent" uTorrent.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\MIME\Database\Content Type\application/x-bittorrentsearchdescription+xml uTorrent.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\MIME\Database\Content Type\application/x-bittorrent-app uTorrent.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\MIME\Database\Content Type\application/x-bittorrent-skin uTorrent.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\MIME\Database\Content Type\application/x-bittorrent uTorrent.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\.torrent\Content Type = "application/x-bittorrent" uTorrent.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\.btsearch\ = "uTorrent" uTorrent.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\MIME\Database\Content Type\application/x-bittorrentsearchdescription+xml\Extension = ".btsearch" uTorrent.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\Magnet\shell uTorrent.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\MIME\Database\Content Type\application/x-bittorrent-key\Extension = ".btkey" uTorrent.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\Applications 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\Magnet\URL Protocol uTorrent.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\Magnet\shell\ = "open" uTorrent.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\.btkey\Content Type = "application/x-bittorrent-key" uTorrent.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\MIME uTorrent.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\Applications\uTorrent.exe\shell 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\uTorrent uTorrent.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\Magnet\shell\open\command uTorrent.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-bittorrent-app\Extension = ".btapp" uTorrent.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-bittorrent-skin\Extension = ".btskin" uTorrent.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\.btkey\ = "uTorrent" uTorrent.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\.torrent 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-bittorrentsearchdescription+xml\Extension = ".btsearch" uTorrent.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\MIME\Database\Content Type\application/x-bittorrent-app\Extension = ".btapp" uTorrent.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\MIME\Database uTorrent.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\.btsearch 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\Applications\uTorrent.exe\shell\ = "open" 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\uTorrent\Content Type\ = "application/x-bittorrent" uTorrent.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\.btsearch uTorrent.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\.btskin\Content Type = "application/x-bittorrent-skin" uTorrent.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-bittorrent-key uTorrent.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\.btsearch\OpenWithProgids 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\.torrent uTorrent.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\uTorrent\DefaultIcon uTorrent.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\MIME\Database\Content Type uTorrent.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\uTorrent\shell uTorrent.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\Magnet\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\uTorrent\\uTorrent.exe\" \"%1\"" uTorrent.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\Magnet\DefaultIcon uTorrent.exe Key created \Registry\User\S-1-5-21-2039016743-699959520-214465309-1000_Classes\.torrent\OpenWithProgids 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\Applications\uTorrent.exe\shell\open\command 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-bittorrent uTorrent.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\uTorrent\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\uTorrent\\uTorrent.exe\" \"%1\"" uTorrent.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\uTorrent\Content Type uTorrent.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\.btapp\ = "uTorrent" uTorrent.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\.btskin\ = "uTorrent" uTorrent.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\.btsearch\OpenWithProgids\uTorrent 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\Magnet\shell\open uTorrent.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\Magnet\DefaultIcon\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\uTorrent\\uTorrent.exe\",0" uTorrent.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\.btinstall uTorrent.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\Magnet uTorrent.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\MIME\Database\Content Type\application/x-bittorrent-appinst\Extension = ".btinstall" uTorrent.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\.torrent\OpenWithProgids 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\Applications\uTorrent.exe\shell\open 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\Applications\uTorrent.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\uTorrent\\uTorrent.exe\" \"%1\"" 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\uTorrent\DefaultIcon\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\uTorrent\\uTorrent.exe\",0" uTorrent.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\uTorrent\shell\open\command uTorrent.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\.btapp uTorrent.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\.btapp\Content Type = "application/x-bittorrent-app" uTorrent.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-bittorrent-skin uTorrent.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\FalconBetaAccount\remote_access_client_id = "9230773643" 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-bittorrent-appinst uTorrent.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
uTorrent.exepid Process 2108 uTorrent.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exeuTorrent.exepid Process 2436 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe 2108 uTorrent.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exeuTorrent.exedescription pid Process Token: SeManageVolumePrivilege 2436 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe Token: SeManageVolumePrivilege 2108 uTorrent.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
uTorrent.exepid Process 2108 uTorrent.exe 2108 uTorrent.exe -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
uTorrent.exepid Process 2108 uTorrent.exe 2108 uTorrent.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exedescription pid Process procid_target PID 1748 wrote to memory of 2436 1748 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe 30 PID 1748 wrote to memory of 2436 1748 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe 30 PID 1748 wrote to memory of 2436 1748 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe 30 PID 1748 wrote to memory of 2436 1748 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe 30 PID 2436 wrote to memory of 2108 2436 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe 33 PID 2436 wrote to memory of 2108 2436 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe 33 PID 2436 wrote to memory of 2108 2436 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe 33 PID 2436 wrote to memory of 2108 2436 49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\3582-490\49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\49e5775509e2938dfc0a00dbb6678d92_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Users\Admin\AppData\Roaming\uTorrent\uTorrent.exeuTorrent.exe /STARTAPP /NOINSTALL /BRINGTOFRONT3⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2108
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{E2B3C97F-6AE1-41AC-817A-F6F92166D7DD}1⤵
- System Location Discovery: System Language Discovery
PID:908
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{E2B3C97F-6AE1-41AC-817A-F6F92166D7DD}1⤵
- System Location Discovery: System Language Discovery
PID:2404
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
547KB
MD5cf6c595d3e5e9667667af096762fd9c4
SHA19bb44da8d7f6457099cb56e4f7d1026963dce7ce
SHA256593e60cc30ae0789448547195af77f550387f6648d45847ea244dd0dd7abf03d
SHA512ff4f789df9e6a6d0fbe12b3250f951fcf11e857906c65e96a30bb46266e7e1180d6103a03db2f3764e0d1346b2de7afba8259ba080057e4a268e45e8654dfa80
-
Filesize
1.0MB
MD5590b6b4eb21dbff4b30ee61dd267e857
SHA111006326b0f30743bd49e37e22822d0658e1af48
SHA256c246ddc07c98e512ac7f923d6dadcd15d18bcbc02e1a26a853a4c519dbd56a3a
SHA51264471f0aaf3e9dbcc980ceabebf20290167c7b305044ff02b041cb2cc6e46ffe140aef183c6bb4f1ea5294dbbe09c7a4a52ada1428a943a73c61a4ce34c4231d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2039016743-699959520-214465309-1000\1f91d2d17ea675d4c2c3192e241743f9_d58f30ce-7498-4544-8c46-d67b11e386bc
Filesize1KB
MD52f0c242d6dc12edbbbfa6387e9db1777
SHA1e3e120901413e73711f8f1a93591de33017abf14
SHA256ecc0709d52392893acd383c24836434f7e53e8bccfd4e1ccc74d2e4573bf8e79
SHA51201d5eefcf2e160763210e7fce1dea9a967718963fc318a5f594e8c73c5cbad3fbff4ebe4c99ef75baa054eda3dcc5237831e892429e9ecbac95f623154f626e0
-
Filesize
89B
MD5de080a48fef87c9b8677a19c7c7d48ef
SHA1a4534dd3aab5e1fa9863b3bf21469d97aa86953e
SHA25617584be1054f9a4eadb4d39fc8ef6760f47c65efbf79df8baf83c7e6a0a49112
SHA5122c4a20d057f119db36f6539b0e3dd10aa4b7812ec38e4f350e80bff1a0d7abfe8e1eb3a61644fe59be8a9b52f7dadaeb660b28edf5ed3375591ccfe8f7f7dd0b
-
Filesize
243B
MD5202851b4ac10eabb696f01dd54b8f6a8
SHA16e5fe7a2381de351acc313df85447e36010538a9
SHA2564bb841e062bb5ca0710c9c8c864ab5fb1bd8caa4cfe3f3b62d8899954de94e0a
SHA51267aa6786e70d6a9a1ceb353600d4c02deeceb6c2061b0876438b576216f95d10ac59c0c2a6c4380f2186ed24d3020e148aa39487c813531777e221b171287769
-
Filesize
243B
MD584bf94f60b7834e320c4a042a0a516ce
SHA132f86a187637d65d2573e6a19157c263d4feca4c
SHA256f3bdbc7d08f9e7eb19e7160e616786bbf67a81f69c23cd4eafe977f05d257234
SHA512613a3ed14aa62ebeb52868b913462f0f2592afde3a56b25789f1306fa0c9a58537d265dc4c01fb4abe4b55858ad82d0f4567fffdcde5c631190bd8c1eb8c557e
-
Filesize
243B
MD5e8287c0129fd9c39dfea1d5e5bece379
SHA1d0504943bf36a5779d96c4742896e821e73621c1
SHA256cba86f7add3ec149fe7e86bd9fec4abc966868072100037311699b57e711c60d
SHA5127f8fcc29548fe1d78aa9a9a293b37f80ec78afbbbbd0bf0aef4e0d796ea1117d77d85e71fdc059c16714567f2e177b17acf72fb8212acd03dcbc5e82af7b38ac
-
Filesize
243B
MD57a1a3ffb7cba7629c3473f49e7ae2c96
SHA119bbe6cb0883c265a07d7b54d357f7c98d94fe07
SHA2562a4f7065bdbcda4e5c486d38f2572f3c328df85b3d560dae3f56f022e25462bc
SHA512b4f20bf27e6786ccdc3f54d36befac7ff1b053440874ffd4832079172b05d62020658c2781e694a0c6892cdb2d588b523b2629e65c33ae5bff042709125309e8
-
Filesize
243B
MD598ef2271196ad08c5acf0120f6535605
SHA144391274410df3a343f3b92bff3a19d9fce0994e
SHA256dec9b482ecbf56c919c10908c036f467ce90747ebee41c8aa8032b2a0bae8aa8
SHA512ef9806f3ac2acc2714e20751e1fd1cccb58f2e024ffe426ad984cca34240bee0c863051d32775b88b9f7bfd01c68516b15e4aa9d92a3b73a8852fd93dab904b1
-
Filesize
243B
MD5d5244dcfdb45d4cb0dd9d7a09659ace5
SHA1d98bc6f8b8f77350d232f912e1c663921f4601d8
SHA25607c48017b0f89a8093d287d99a1a4010e41770a90efbe556ca4802b1e90c03ba
SHA5129db8d560119a15e2853a73aa44281312c2041f4393636256e8e63fd5fb6cfdf5672c10b5a0064fff531f44148c05b100e2990a6bc7a548c85874ea4d8973c5dd
-
Filesize
5KB
MD5d5b222577b6c664c0c5fbece854ef7de
SHA1f99235e7d03ef8895511f6fb6667c0be90cca8d5
SHA256c99686a659748af523d58e816578606ad7537bea7cb2de2c866813d251a9f44c
SHA512944190a6fa01dad34951a6dcb5779fde839b9ad1958e2a9818e162b1373206de20a69b8e4873e10c46f7c67e69fb2e943a6c2e66b32e07b01b585b4884b1769f
-
Filesize
5KB
MD5d5d25e76d167b43cc28d05f2d48df4d2
SHA19a8f13dc827b6e83a346f0aba6561808e78ce348
SHA256dc78ed7fafe72fbb68b197396f6685144b86c209243cf5d33c49540fcdb58c42
SHA512cbee14e4cb2fc2ca50ce53d50a72c17773403e0aa38681a3b8fd0e2aa8b14bfe04d2e730adee0e0c904b641e30c7cdf62c7467deaf9eef57704966a58a1538f2
-
Filesize
36KB
MD5a72ccec655860656bcdbac0f6a6f3038
SHA11947d5edbd771c466ecb2bda5696242e1987afca
SHA256be9cbcb92ebd9283276857a4151b04fefd56acbd94f19deab3c7da44b5e66d65
SHA512c0eb22b71859905331827a09b4b672eb885a03f43dc9104d9b7fd4cbb5547edcb0e265886f0ed3a481c76823c3adfdddbea35135de6a7fe012789db1da4f84d1
-
Filesize
252KB
MD59e2b9928c89a9d0da1d3e8f4bd96afa7
SHA1ec66cda99f44b62470c6930e5afda061579cde35
SHA2568899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043
SHA5122ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156