Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
01-11-2024 12:15
Static task
static1
Behavioral task
behavioral1
Sample
846d0f27dae05edfc9f245dc4df3e7b3_JaffaCakes118.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
846d0f27dae05edfc9f245dc4df3e7b3_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
846d0f27dae05edfc9f245dc4df3e7b3_JaffaCakes118.exe
-
Size
3.4MB
-
MD5
846d0f27dae05edfc9f245dc4df3e7b3
-
SHA1
56a79e31a59c153e3a6f8d43ac9f007217dc1106
-
SHA256
b83207436a9b759ae57669db44bb501ce8321370caec88e3949abd660037e00c
-
SHA512
450aab625f1c299204ac55b8636680a0837c601ca20c6041ca82bf7e6019fc83df48c328b746936da66130a846503beaff860176af8e9365c76575cacc345dcd
-
SSDEEP
49152:FuXtVeKk34HR2vjylPttd7K19Hp65/0bVQoQl9LLCXVAXOLtVsGy57U8s3pYOT3d:Fud8Jct5EHpEie9X0kqVHyJk3T4Ouc
Malware Config
Signatures
-
Executes dropped EXE 5 IoCs
Processes:
Youbak_MSN_PARTNER2036.exeYoubak_MSN_PARTNER2036.tmpha65.exeHaoZipLoader.exeHaoZipUpdate.exepid process 2164 Youbak_MSN_PARTNER2036.exe 2312 Youbak_MSN_PARTNER2036.tmp 2472 ha65.exe 2856 HaoZipLoader.exe 1932 HaoZipUpdate.exe -
Loads dropped DLL 36 IoCs
Processes:
846d0f27dae05edfc9f245dc4df3e7b3_JaffaCakes118.exeYoubak_MSN_PARTNER2036.exeYoubak_MSN_PARTNER2036.tmpha65.exeHaoZipLoader.exeHaoZipUpdate.exepid process 2396 846d0f27dae05edfc9f245dc4df3e7b3_JaffaCakes118.exe 2164 Youbak_MSN_PARTNER2036.exe 2312 Youbak_MSN_PARTNER2036.tmp 2312 Youbak_MSN_PARTNER2036.tmp 2396 846d0f27dae05edfc9f245dc4df3e7b3_JaffaCakes118.exe 2472 ha65.exe 2472 ha65.exe 2472 ha65.exe 2472 ha65.exe 2472 ha65.exe 2472 ha65.exe 2856 HaoZipLoader.exe 2856 HaoZipLoader.exe 2856 HaoZipLoader.exe 2856 HaoZipLoader.exe 2856 HaoZipLoader.exe 2856 HaoZipLoader.exe 2856 HaoZipLoader.exe 2856 HaoZipLoader.exe 2856 HaoZipLoader.exe 2856 HaoZipLoader.exe 2856 HaoZipLoader.exe 2856 HaoZipLoader.exe 2856 HaoZipLoader.exe 2856 HaoZipLoader.exe 2856 HaoZipLoader.exe 2856 HaoZipLoader.exe 2856 HaoZipLoader.exe 2856 HaoZipLoader.exe 2856 HaoZipLoader.exe 2856 HaoZipLoader.exe 2472 ha65.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
HaoZipUpdate.exedescription ioc process File opened for modification \??\PhysicalDrive0 HaoZipUpdate.exe -
Drops file in Program Files directory 31 IoCs
Processes:
ha65.exeHaoZipUpdate.exeHaoZipLoader.exedescription ioc process File created C:\Program Files (x86)\HaoZip\HaoZip.exe ha65.exe File created C:\Program Files (x86)\HaoZip\HaoZipUpdate.exe ha65.exe File created C:\Program Files (x86)\HaoZip\好压免责声明.txt ha65.exe File created C:\Program Files (x86)\HaoZip\UNACEV2.DLL ha65.exe File opened for modification C:\Program Files (x86)\HaoZip\config\temp\pending.hzt HaoZipUpdate.exe File created C:\Program Files (x86)\HaoZip\msvcr80.dll ha65.exe File created C:\Program Files (x86)\HaoZip\config\HaoZip.hzs HaoZipUpdate.exe File opened for modification C:\Program Files (x86)\HaoZip\config\HZ~C5EE.tmp HaoZipLoader.exe File created C:\Program Files (x86)\HaoZip\config\temp\pending.hzt HaoZipUpdate.exe File created C:\Program Files (x86)\HaoZip\HaoZip.chm ha65.exe File created C:\Program Files (x86)\HaoZip\ZipNew.data ha65.exe File created C:\Program Files (x86)\HaoZip\HaoZipCompress.dll ha65.exe File created C:\Program Files (x86)\HaoZip\HaoZipImage.dll ha65.exe File created C:\Program Files (x86)\HaoZip\Rar.exe ha65.exe File created C:\Program Files (x86)\HaoZip\HaoZipExt.dll ha65.exe File created C:\Program Files (x86)\HaoZip\HaoZipLoader.exe ha65.exe File created C:\Program Files (x86)\HaoZip\TarNew.data ha65.exe File created C:\Program Files (x86)\HaoZip\RarNew.data ha65.exe File created C:\Program Files (x86)\HaoZip\HaoZipFormats.dll ha65.exe File created C:\Program Files (x86)\HaoZip\sfx\HaoZip7zSetup.sfx ha65.exe File created C:\Program Files (x86)\HaoZip\7zNew.data ha65.exe File created C:\Program Files (x86)\HaoZip\HaoZipVersion.dll ha65.exe File opened for modification C:\Program Files (x86)\HaoZip\config\HZ~DDC2.tmp HaoZipUpdate.exe File created C:\Program Files (x86)\HaoZip\HaoZipC.exe ha65.exe File opened for modification C:\Program Files (x86)\HaoZip\config\HaoZipLang.ini ha65.exe File created C:\Program Files (x86)\HaoZip\Microsoft.VC80.CRT.manifest ha65.exe File created C:\Program Files (x86)\HaoZip\Uninstall.exe ha65.exe File opened for modification C:\Program Files (x86)\HaoZip\config\HZ~C61E.tmp HaoZipLoader.exe File created C:\Program Files (x86)\HaoZip\HaoZipShell.dll ha65.exe File created C:\Program Files (x86)\HaoZip\lang\HaoZipLang_chs.dll ha65.exe File created C:\Program Files (x86)\HaoZip\Benchmark.data ha65.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
846d0f27dae05edfc9f245dc4df3e7b3_JaffaCakes118.exeYoubak_MSN_PARTNER2036.exeYoubak_MSN_PARTNER2036.tmpha65.exeHaoZipLoader.exeHaoZipUpdate.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 846d0f27dae05edfc9f245dc4df3e7b3_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Youbak_MSN_PARTNER2036.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Youbak_MSN_PARTNER2036.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ha65.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HaoZipLoader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HaoZipUpdate.exe -
Modifies registry class 64 IoCs
Processes:
HaoZipLoader.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\HaoZip.lha\shellex\ContextMenuHandlers\{5FED836A-C96C-4d88-A91E-F63F07726585} HaoZipLoader.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.z07 HaoZipLoader.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\HaoZip.uue\DefaultIcon HaoZipLoader.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.z65\ = "HaoZip.zip.split" HaoZipLoader.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\HaoZip.z\shellex HaoZipLoader.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.r24 HaoZipLoader.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\HaoZip.zip.split\shell\open HaoZipLoader.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\HaoZip.tpz\shellex HaoZipLoader.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\HaoZip.hfs\shell\open\command HaoZipLoader.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\HaoZip.bzip2\shell\open\command\ = "\"C:\\Program Files (x86)\\HaoZip\\HaoZip.exe\" \"%1\"" HaoZipLoader.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.r37\ = "HaoZip.rar.split" HaoZipLoader.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\HaoZip.tar\shellex\ContextMenuHandlers\{5FED836A-C96C-4d88-A91E-F63F07726585} HaoZipLoader.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\HaoZip.z\DefaultIcon\ = "C:\\Program Files (x86)\\HaoZip\\HaoZip.exe,0" HaoZipLoader.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\HaoZip.xar\shell HaoZipLoader.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\HaoZip.xz\ = "好压 XZ 压缩文件" HaoZipLoader.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5FED836A-C96C-4d88-A91E-F63F07726585}\InprocServer32 HaoZipLoader.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\ShellEx\DragDropHandlers\HaoZip HaoZipLoader.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.gz\ = "HaoZip.gz" HaoZipLoader.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\HaoZip.lzma\shellex\ContextMenuHandlers\{5FED836A-C96C-4d88-A91E-F63F07726585} HaoZipLoader.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\HaoZip.tbz2\shell\open\command HaoZipLoader.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cpio\ = "HaoZip.cpio" HaoZipLoader.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.z67 HaoZipLoader.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\HaoZip.xz\shellex\PropertySheetHandlers HaoZipLoader.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\HaoZip.rar\shellex\PropertySheetHandlers HaoZipLoader.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\HaoZip.wim\shellex\PropertySheetHandlers\{5FED836A-C96C-4d88-A91E-F63F07726585} HaoZipLoader.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\HaoZip.uue\shellex HaoZipLoader.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.r15 HaoZipLoader.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.r83 HaoZipLoader.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.r83\ = "HaoZip.rar.split" HaoZipLoader.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.z51\ = "HaoZip.zip.split" HaoZipLoader.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.z85 HaoZipLoader.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\HaoZip.zip\shellex\ContextMenuHandlers\{5FED836A-C96C-4d88-A91E-F63F07726585} HaoZipLoader.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\DragDropHandlers HaoZipLoader.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.r78 HaoZipLoader.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.z97 HaoZipLoader.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.r11 HaoZipLoader.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.r49 HaoZipLoader.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\HaoZip.001\DefaultIcon HaoZipLoader.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.z70\ = "HaoZip.zip.split" HaoZipLoader.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\HaoZip.tar\shellex\DropHandler\ = "{5FED836A-C96C-4d88-A91E-F63F07726585}" HaoZipLoader.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\HaoZip.001\shell\open\command\ = "\"C:\\Program Files (x86)\\HaoZip\\HaoZip.exe\" \"%1\"" HaoZipLoader.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.r02 HaoZipLoader.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.r33\ = "HaoZip.rar.split" HaoZipLoader.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.z58\ = "HaoZip.zip.split" HaoZipLoader.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.z64 HaoZipLoader.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\HaoZip.wim HaoZipLoader.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\HaoZip.xpi\DefaultIcon HaoZipLoader.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\HaoZip.tbz2\shellex HaoZipLoader.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.r16 HaoZipLoader.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.r57\ = "HaoZip.rar.split" HaoZipLoader.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.z79\ = "HaoZip.zip.split" HaoZipLoader.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\HaoZip.tar\shellex HaoZipLoader.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\HaoZip.bz2\shellex HaoZipLoader.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\HaoZip.cab\shell\open HaoZipLoader.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.jar\ = "HaoZip.jar" HaoZipLoader.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.r26\ = "HaoZip.rar.split" HaoZipLoader.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\HaoZip.bz2\shell\open\command HaoZipLoader.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.r52\ = "HaoZip.rar.split" HaoZipLoader.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\HaoZip.swm\DefaultIcon\ = "C:\\Program Files (x86)\\HaoZip\\HaoZip.exe,0" HaoZipLoader.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\HaoZip.taz\shellex HaoZipLoader.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.z44\ = "HaoZip.zip.split" HaoZipLoader.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\HaoZip.deb\shell\open\command HaoZipLoader.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\HaoZip.rar.split\shellex HaoZipLoader.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.r05 HaoZipLoader.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
HaoZipLoader.exeHaoZipUpdate.exepid process 2856 HaoZipLoader.exe 2856 HaoZipLoader.exe 2856 HaoZipLoader.exe 2856 HaoZipLoader.exe 2856 HaoZipLoader.exe 2856 HaoZipLoader.exe 2856 HaoZipLoader.exe 2856 HaoZipLoader.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe -
Suspicious use of FindShellTrayWindow 62 IoCs
Processes:
HaoZipUpdate.exepid process 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe -
Suspicious use of SendNotifyMessage 62 IoCs
Processes:
HaoZipUpdate.exepid process 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe 1932 HaoZipUpdate.exe -
Suspicious use of WriteProcessMemory 35 IoCs
Processes:
846d0f27dae05edfc9f245dc4df3e7b3_JaffaCakes118.exeYoubak_MSN_PARTNER2036.exeha65.exedescription pid process target process PID 2396 wrote to memory of 2164 2396 846d0f27dae05edfc9f245dc4df3e7b3_JaffaCakes118.exe Youbak_MSN_PARTNER2036.exe PID 2396 wrote to memory of 2164 2396 846d0f27dae05edfc9f245dc4df3e7b3_JaffaCakes118.exe Youbak_MSN_PARTNER2036.exe PID 2396 wrote to memory of 2164 2396 846d0f27dae05edfc9f245dc4df3e7b3_JaffaCakes118.exe Youbak_MSN_PARTNER2036.exe PID 2396 wrote to memory of 2164 2396 846d0f27dae05edfc9f245dc4df3e7b3_JaffaCakes118.exe Youbak_MSN_PARTNER2036.exe PID 2396 wrote to memory of 2164 2396 846d0f27dae05edfc9f245dc4df3e7b3_JaffaCakes118.exe Youbak_MSN_PARTNER2036.exe PID 2396 wrote to memory of 2164 2396 846d0f27dae05edfc9f245dc4df3e7b3_JaffaCakes118.exe Youbak_MSN_PARTNER2036.exe PID 2396 wrote to memory of 2164 2396 846d0f27dae05edfc9f245dc4df3e7b3_JaffaCakes118.exe Youbak_MSN_PARTNER2036.exe PID 2164 wrote to memory of 2312 2164 Youbak_MSN_PARTNER2036.exe Youbak_MSN_PARTNER2036.tmp PID 2164 wrote to memory of 2312 2164 Youbak_MSN_PARTNER2036.exe Youbak_MSN_PARTNER2036.tmp PID 2164 wrote to memory of 2312 2164 Youbak_MSN_PARTNER2036.exe Youbak_MSN_PARTNER2036.tmp PID 2164 wrote to memory of 2312 2164 Youbak_MSN_PARTNER2036.exe Youbak_MSN_PARTNER2036.tmp PID 2164 wrote to memory of 2312 2164 Youbak_MSN_PARTNER2036.exe Youbak_MSN_PARTNER2036.tmp PID 2164 wrote to memory of 2312 2164 Youbak_MSN_PARTNER2036.exe Youbak_MSN_PARTNER2036.tmp PID 2164 wrote to memory of 2312 2164 Youbak_MSN_PARTNER2036.exe Youbak_MSN_PARTNER2036.tmp PID 2396 wrote to memory of 2472 2396 846d0f27dae05edfc9f245dc4df3e7b3_JaffaCakes118.exe ha65.exe PID 2396 wrote to memory of 2472 2396 846d0f27dae05edfc9f245dc4df3e7b3_JaffaCakes118.exe ha65.exe PID 2396 wrote to memory of 2472 2396 846d0f27dae05edfc9f245dc4df3e7b3_JaffaCakes118.exe ha65.exe PID 2396 wrote to memory of 2472 2396 846d0f27dae05edfc9f245dc4df3e7b3_JaffaCakes118.exe ha65.exe PID 2396 wrote to memory of 2472 2396 846d0f27dae05edfc9f245dc4df3e7b3_JaffaCakes118.exe ha65.exe PID 2396 wrote to memory of 2472 2396 846d0f27dae05edfc9f245dc4df3e7b3_JaffaCakes118.exe ha65.exe PID 2396 wrote to memory of 2472 2396 846d0f27dae05edfc9f245dc4df3e7b3_JaffaCakes118.exe ha65.exe PID 2472 wrote to memory of 2856 2472 ha65.exe HaoZipLoader.exe PID 2472 wrote to memory of 2856 2472 ha65.exe HaoZipLoader.exe PID 2472 wrote to memory of 2856 2472 ha65.exe HaoZipLoader.exe PID 2472 wrote to memory of 2856 2472 ha65.exe HaoZipLoader.exe PID 2472 wrote to memory of 2856 2472 ha65.exe HaoZipLoader.exe PID 2472 wrote to memory of 2856 2472 ha65.exe HaoZipLoader.exe PID 2472 wrote to memory of 2856 2472 ha65.exe HaoZipLoader.exe PID 2472 wrote to memory of 1932 2472 ha65.exe HaoZipUpdate.exe PID 2472 wrote to memory of 1932 2472 ha65.exe HaoZipUpdate.exe PID 2472 wrote to memory of 1932 2472 ha65.exe HaoZipUpdate.exe PID 2472 wrote to memory of 1932 2472 ha65.exe HaoZipUpdate.exe PID 2472 wrote to memory of 1932 2472 ha65.exe HaoZipUpdate.exe PID 2472 wrote to memory of 1932 2472 ha65.exe HaoZipUpdate.exe PID 2472 wrote to memory of 1932 2472 ha65.exe HaoZipUpdate.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\846d0f27dae05edfc9f245dc4df3e7b3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\846d0f27dae05edfc9f245dc4df3e7b3_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Youbak_MSN_PARTNER2036.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Youbak_MSN_PARTNER2036.exe" /VERYSILENT /SP- /NORESTART2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Users\Admin\AppData\Local\Temp\is-JMKQN.tmp\Youbak_MSN_PARTNER2036.tmp"C:\Users\Admin\AppData\Local\Temp\is-JMKQN.tmp\Youbak_MSN_PARTNER2036.tmp" /SL5="$301CC,737659,54272,C:\Users\Admin\AppData\Local\Temp\RarSFX0\Youbak_MSN_PARTNER2036.exe" /VERYSILENT /SP- /NORESTART3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2312 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\ha65.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\ha65.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Program Files (x86)\HaoZip\HaoZipLoader.exe"C:\Program Files (x86)\HaoZip\HaoZipLoader.exe" -install013⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2856 -
C:\Program Files (x86)\HaoZip\HaoZipUpdate.exe"C:\Program Files (x86)\HaoZip\HaoZipUpdate.exe" -install3⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1932
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD5c111d2770455449f129128b88f2f5206
SHA18b51f7261ef355270b4a6e76eeb616af1e0447ea
SHA256a283661a8652195db9c371579189c9359092e900b925393d265a4f5b232e118c
SHA512e6acd7df4646d4e44d7bae560493b4132272907b6b12600807dfb8f1defc37ab9a177b7887f29d580eee841850987e8f681f24714f91b82ac6851531828e688c
-
Filesize
1.8MB
MD597efade40e113454d7f51634e67a4c24
SHA1b26372620aafea7208d462a2afe52f6ed1b5c55a
SHA256c33464aa06906ad2f17f97f39b30d27552a62d1b93b7a84eef6b4d2d23bc8669
SHA5126c15bf5d634183cc5fafa7e80ab3d3ab69b87be9c0ccc0dd40b1367695478264c5f57eacd8aaf87cdca88d204c7cce8a4546febdfcd27c264b581af9b82b98a7
-
Filesize
172KB
MD552f02e82c21a85e7476ee6db6d76d786
SHA1e7fbdbec5e735cfcbaa89e98d7bcab6ce73b0b0c
SHA2568dcd8cba677436bd0dc3d44e8ba6ae7b75b15d602881d596b17690f7c4c0e2b6
SHA5124d1c7d95610f21f36b9ffb1db3004f5e0fef48e89f3b22e50283da85510343d54e7efdfce8f218555d28efc429a734b0f064ac17d5b8c73d4734e1ca6ba42f70
-
Filesize
37B
MD50e5d62bbebb35ca5bcac5a8563a799b2
SHA1271ccec941e18321739d1794578586a149e6ccd2
SHA256deac5c066a7d8d7a8af6c05dee5217e44fcbe34f6fafd9ea30390af5d6bb1537
SHA512e1d4e982f6b8b2d0c089b58b2f25d644582bfd58b66892421f095db87884b9efedce7f5dfcfd9825e832f57228a6fc3d8e9dd797ae4414c3daf43dcdf97bfcf9
-
Filesize
334KB
MD504919aa4ecfa8aacbf1d6383ee4d92f0
SHA11b3e08b6dbd72bb11afe6475b0a9caa5b173f218
SHA2566a8af8509fa93a42d5fe3eeb871f916e20f28f96a3c2aabcf9d8938366edf94d
SHA512268a01f622f5105878da331fa93f64f1f43e7e1b099d49f10b7d631bf6d56f28c8d05e960b2551fb09f4f2a7edfc0ca5fa3facc2b432c863e72b5067d601cb73
-
Filesize
48KB
MD5a43c95953e8ae0cc14cdce57dfb0096b
SHA1d721d9f34aefbcdf6e8cc59889d5ccc8e1997d0e
SHA2569aceeeef173e48bdf2167756227e41b71a9dc04c7276105b36fd3607d32f342c
SHA51287bd9181503fcdaef5191f3836f00b8f103d3280e81594cfaa224dc2824c54ec79241adf4750e6f8fbab0ff5c5048ac2cea6da6e3da6a6e2b68ab71e2f511658
-
Filesize
115KB
MD5e58565d563b57d23cabf53ab07dd1a48
SHA147875e0b3399eb6bbac4d6d8d7ee7dd449aa0b09
SHA256ac0b28a399cec5081349cb1ab36b76cb7e0705a51ed14e4029b63ce7e63181b0
SHA51269aa599a6e9830a2264abb34566181789eb6b3980f938c58d94f3da460765c854ce5e4c99b49aa4a2fa372e6360154839a391a9adc5ac31635315e16c4131c22
-
Filesize
219KB
MD5fc274b9bbccb119040b4c98d06dd2f94
SHA138ada3cdece1a3aa33167b51c4e5383fd34bc513
SHA256dc37c5698510265763c654a89d06c0e37d0a603054a9d7a0281b3c819acd1d77
SHA51220d455cf419ec5e89d9a51e20a65c28c19bc3641f821c76ab6a1e4a494195b24f462014852906a11f4719f4c64f0de717a1198ecc4c26ae740d243e56580114d
-
Filesize
8KB
MD5d2fa876bdc048d986c6568c84a685f25
SHA1cf04df82ac26d87b65b420c6b33e8e56c312d791
SHA25668cf8ab20ea5ffe0f550c0b9dd3630ee450287c528345b213f25a2a1174deb97
SHA512eac6e35218def092248cb7b2f3b1308e16497d66a20f0e158abc0ba45c01b882a100fc09ac629777bb7a2500a76c83a2e4eaa79a9c163c586a50913bee00a8f7
-
Filesize
80KB
MD51baa91ee2d5ffbc0cd490413eabc2f11
SHA14f78183dd73428c805a82975c63072d29ba1f62e
SHA2560c5ef5708d08d889e3fed130522c7476373357d627400fdb7082a4f16275abd8
SHA51284eed54ce82aaa879b2a86b5a7c5648dfe834377c19017ba6b34829aa284641634af625a3bf75eaec41f7942136776ec1ddf55961e16920531339c53120b29ad
-
Filesize
989KB
MD5d88681c275fd71f42ccaee06e5901fc9
SHA13f051192a4ea9722d139cea2e7d7aef860880253
SHA256980e63c8f1c312d3dda44b1fc79cc937357a36c585fcda7c51a433e36f1600a5
SHA512f096de74e29554d8960803f272d5c8cd37304d5fcc55d54287d0bd24901c6bf6cf9ca0b33f4d3ee96cdce5fab50248abe9332e5eb47066eb32ee5102737d2d86
-
Filesize
2.3MB
MD5616285502f035c80681455288c513731
SHA14fd937ff5add37e10254c11a8f0809d6b7f23521
SHA25649631d72bdd2902f98b080e4326b82380be234e1d01a8291dcc7431764e90281
SHA5126d46800f925917af4d510604e544b9491c83a23ce98fb4a1d2bc6d2deefb7d7d052b75b1dd57cb232d4f4a036b013fdfe53d280926342053831b26fc549c34bb
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
694KB
MD529bb632f057f068130e8a7877781a05d
SHA110060581eb95e61d6ac8176f692a2ae251149b32
SHA25613065ec81bfdf70d1074f8fb90f6eaecae531b76e71ba1542f3cefc41a9e29c1
SHA5120b66548ea8690d755566054f42a3886ac983f8402afd8ff27923f092a71c8404e16add8393d314ea056698f51ab0f3260c882c1447b35f73b1830458e70fd405
-
Filesize
46KB
MD525aa25fcec2065cdf81f77d2153a63a7
SHA1e09b96d596323201ce5586daa16c9b8ecfaa7654
SHA256ba62fc93cdd027de00af9cbaf31bf102d47fe9f1d74493ebf6faa2f2c9982435
SHA5125de8b9ca1b38fba4f63756066d10a0312acafe9c051645fd192e500d1cff23a21845cec2d1fb1002ddf7002f9f6ae3962fd6087f3ab793d9630c33e35d6aba64
-
Filesize
11KB
MD5a82b0479708b96c7bf4dd6b798aedee0
SHA17e47b402848a86bdddd5f0de8bb4620471caaab0
SHA25672410442a894b8316da6ad469f03997ec17c0b0d117745bb6ac5cac3232c7d20
SHA51202e07def3897d87d546c0cf1492191591be587f64ae5c165b9a91fb977585c65a860135eb8c102b67dede913ea935459ce70c4ca973b292122c8d097ab130d58