Malware Analysis Report

2025-06-16 06:55

Sample ID 241104-ddb5ts1kdw
Target 8ec80f0c252e4428e2e383aad8cc212a_JaffaCakes118
SHA256 dc7df90dc4e9c9898f92023224b4e20a791b728543c5ec7f5703f6880f4e42d1
Tags
discovery evasion trojan adware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

dc7df90dc4e9c9898f92023224b4e20a791b728543c5ec7f5703f6880f4e42d1

Threat Level: Known bad

The file 8ec80f0c252e4428e2e383aad8cc212a_JaffaCakes118 was found to be: Known bad.

Malicious Activity Summary

discovery evasion trojan adware stealer

Windows security bypass

Windows security modification

Loads dropped DLL

Installs/modifies Browser Helper Object

Drops file in Windows directory

Unsigned PE

System Location Discovery: System Language Discovery

Modifies Control Panel

Suspicious use of WriteProcessMemory

Runs net.exe

Modifies registry class

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-11-04 02:53

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-04 02:53

Reported

2024-11-04 04:44

Platform

win7-20240729-en

Max time kernel

119s

Max time network

125s

Command Line

"C:\Users\Admin\AppData\Local\Temp\8ec80f0c252e4428e2e383aad8cc212a_JaffaCakes118.exe"

Signatures

Windows security bypass

evasion trojan
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" C:\Users\Admin\AppData\Local\Temp\8ec80f0c252e4428e2e383aad8cc212a_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" C:\Users\Admin\AppData\Local\Temp\8ec80f0c252e4428e2e383aad8cc212a_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" C:\Users\Admin\AppData\Local\Temp\8ec80f0c252e4428e2e383aad8cc212a_JaffaCakes118.exe N/A

Windows security modification

evasion trojan
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" C:\Users\Admin\AppData\Local\Temp\8ec80f0c252e4428e2e383aad8cc212a_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" C:\Users\Admin\AppData\Local\Temp\8ec80f0c252e4428e2e383aad8cc212a_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" C:\Users\Admin\AppData\Local\Temp\8ec80f0c252e4428e2e383aad8cc212a_JaffaCakes118.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\ieocx.dll C:\Users\Admin\AppData\Local\Temp\8ec80f0c252e4428e2e383aad8cc212a_JaffaCakes118.exe N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\net.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\net1.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\8ec80f0c252e4428e2e383aad8cc212a_JaffaCakes118.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\regsvr32.exe N/A

Modifies Control Panel

evasion
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\don't load C:\Users\Admin\AppData\Local\Temp\8ec80f0c252e4428e2e383aad8cc212a_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\don't load\scui.cpl = "No" C:\Users\Admin\AppData\Local\Temp\8ec80f0c252e4428e2e383aad8cc212a_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\don't load\wscui.cpl = "No" C:\Users\Admin\AppData\Local\Temp\8ec80f0c252e4428e2e383aad8cc212a_JaffaCakes118.exe N/A

Runs net.exe

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1100 wrote to memory of 2336 N/A C:\Users\Admin\AppData\Local\Temp\8ec80f0c252e4428e2e383aad8cc212a_JaffaCakes118.exe C:\Windows\SysWOW64\regsvr32.exe
PID 1100 wrote to memory of 2336 N/A C:\Users\Admin\AppData\Local\Temp\8ec80f0c252e4428e2e383aad8cc212a_JaffaCakes118.exe C:\Windows\SysWOW64\regsvr32.exe
PID 1100 wrote to memory of 2336 N/A C:\Users\Admin\AppData\Local\Temp\8ec80f0c252e4428e2e383aad8cc212a_JaffaCakes118.exe C:\Windows\SysWOW64\regsvr32.exe
PID 1100 wrote to memory of 2336 N/A C:\Users\Admin\AppData\Local\Temp\8ec80f0c252e4428e2e383aad8cc212a_JaffaCakes118.exe C:\Windows\SysWOW64\regsvr32.exe
PID 1100 wrote to memory of 2336 N/A C:\Users\Admin\AppData\Local\Temp\8ec80f0c252e4428e2e383aad8cc212a_JaffaCakes118.exe C:\Windows\SysWOW64\regsvr32.exe
PID 1100 wrote to memory of 2336 N/A C:\Users\Admin\AppData\Local\Temp\8ec80f0c252e4428e2e383aad8cc212a_JaffaCakes118.exe C:\Windows\SysWOW64\regsvr32.exe
PID 1100 wrote to memory of 2336 N/A C:\Users\Admin\AppData\Local\Temp\8ec80f0c252e4428e2e383aad8cc212a_JaffaCakes118.exe C:\Windows\SysWOW64\regsvr32.exe
PID 1100 wrote to memory of 880 N/A C:\Users\Admin\AppData\Local\Temp\8ec80f0c252e4428e2e383aad8cc212a_JaffaCakes118.exe C:\Windows\SysWOW64\net.exe
PID 1100 wrote to memory of 880 N/A C:\Users\Admin\AppData\Local\Temp\8ec80f0c252e4428e2e383aad8cc212a_JaffaCakes118.exe C:\Windows\SysWOW64\net.exe
PID 1100 wrote to memory of 880 N/A C:\Users\Admin\AppData\Local\Temp\8ec80f0c252e4428e2e383aad8cc212a_JaffaCakes118.exe C:\Windows\SysWOW64\net.exe
PID 1100 wrote to memory of 880 N/A C:\Users\Admin\AppData\Local\Temp\8ec80f0c252e4428e2e383aad8cc212a_JaffaCakes118.exe C:\Windows\SysWOW64\net.exe
PID 880 wrote to memory of 2680 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 880 wrote to memory of 2680 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 880 wrote to memory of 2680 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe
PID 880 wrote to memory of 2680 N/A C:\Windows\SysWOW64\net.exe C:\Windows\SysWOW64\net1.exe

Processes

C:\Users\Admin\AppData\Local\Temp\8ec80f0c252e4428e2e383aad8cc212a_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\8ec80f0c252e4428e2e383aad8cc212a_JaffaCakes118.exe"

C:\Windows\SysWOW64\regsvr32.exe

C:\Windows\system32\regsvr32.exe /s C:\Windows\ieocx.dll

C:\Windows\SysWOW64\net.exe

C:\Windows\system32\net.exe stop "Security Center"

C:\Windows\SysWOW64\net1.exe

C:\Windows\system32\net1 stop "Security Center"

Network

Country Destination Domain Proto
DE 78.46.88.142:80 78.46.88.142 tcp

Files

memory/1100-1-0x0000000000400000-0x0000000000424000-memory.dmp

memory/1100-2-0x0000000000400000-0x0000000000424000-memory.dmp

memory/1100-0-0x0000000000401000-0x000000000040A000-memory.dmp

memory/2336-6-0x0000000000160000-0x0000000000166000-memory.dmp

memory/2336-5-0x0000000010000000-0x000000001000E000-memory.dmp

C:\Windows\ieocx.dll

MD5 74b6a00a13cb371c4c919da8e44eac5e
SHA1 baa584419445c50188ce895947bc5783bde5ea5c
SHA256 21511fea07b56208026de586fd4ed1d204a2b74124f5437cc3d1deeffb21d471
SHA512 73ef4be67472a7299ae024d455aadb3069ee2eef746f98a9a43b5fa2b89fcf6017a202d1b81626c1926c0920946191dab23360a8be7afb3f5e909c3565f66828

memory/1100-7-0x0000000000400000-0x0000000000424000-memory.dmp

memory/1100-8-0x0000000000400000-0x0000000000424000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-11-04 02:53

Reported

2024-11-04 04:30

Platform

win10v2004-20241007-en

Max time kernel

139s

Max time network

142s

Command Line

"C:\Users\Admin\AppData\Local\Temp\8ec80f0c252e4428e2e383aad8cc212a_JaffaCakes118.exe"

Signatures

Windows security bypass

evasion trojan
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" C:\Users\Admin\AppData\Local\Temp\8ec80f0c252e4428e2e383aad8cc212a_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" C:\Users\Admin\AppData\Local\Temp\8ec80f0c252e4428e2e383aad8cc212a_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" C:\Users\Admin\AppData\Local\Temp\8ec80f0c252e4428e2e383aad8cc212a_JaffaCakes118.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A

Windows security modification

evasion trojan
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" C:\Users\Admin\AppData\Local\Temp\8ec80f0c252e4428e2e383aad8cc212a_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" C:\Users\Admin\AppData\Local\Temp\8ec80f0c252e4428e2e383aad8cc212a_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" C:\Users\Admin\AppData\Local\Temp\8ec80f0c252e4428e2e383aad8cc212a_JaffaCakes118.exe N/A

Installs/modifies Browser Helper Object

stealer adware
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{96ad72e4-2e2b-4ffc-a5bb-279c2714af12} C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{96ad72e4-2e2b-4ffc-a5bb-279c2714af12}\NoExplorer = "1" C:\Windows\SysWOW64\regsvr32.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\ieocx.dll C:\Users\Admin\AppData\Local\Temp\8ec80f0c252e4428e2e383aad8cc212a_JaffaCakes118.exe N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\8ec80f0c252e4428e2e383aad8cc212a_JaffaCakes118.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\regsvr32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\net.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\net1.exe N/A

Modifies Control Panel

evasion
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\don't load C:\Users\Admin\AppData\Local\Temp\8ec80f0c252e4428e2e383aad8cc212a_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\don't load\scui.cpl = "No" C:\Users\Admin\AppData\Local\Temp\8ec80f0c252e4428e2e383aad8cc212a_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\don't load\wscui.cpl = "No" C:\Users\Admin\AppData\Local\Temp\8ec80f0c252e4428e2e383aad8cc212a_JaffaCakes118.exe N/A

Modifies registry class

Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{96ad72e4-2e2b-4ffc-a5bb-279c2714af12}\InprocServer32\ = "C:\\Windows\\ieocx.dll" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A54DC52D-7AAD-4D40-A126-337211631EDC}\1.0\ = "DHCP 1.0 Type Library" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A54DC52D-7AAD-4D40-A126-337211631EDC}\1.0\0\win32\ = "C:\\Windows\\ieocx.dll" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4B66E1DF-4DE3-4CDA-83B5-11673EADAB0B}\ = "_IBhoAppEvents" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9692BE2F-EB8F-49D9-A11C-C24C1EF734D5}\TypeLib\ = "{A54DC52D-7AAD-4D40-A126-337211631EDC}" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{96ad72e4-2e2b-4ffc-a5bb-279c2714af12}\VersionIndependentProgID\ = "IEocxApp.IEocx" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4B66E1DF-4DE3-4CDA-83B5-11673EADAB0B} C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9692BE2F-EB8F-49D9-A11C-C24C1EF734D5} C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{96ad72e4-2e2b-4ffc-a5bb-279c2714af12}\ = "IEocx Class" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{4B66E1DF-4DE3-4CDA-83B5-11673EADAB0B}\ = "_IBhoAppEvents" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{4B66E1DF-4DE3-4CDA-83B5-11673EADAB0B}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9692BE2F-EB8F-49D9-A11C-C24C1EF734D5}\TypeLib\ = "{A54DC52D-7AAD-4D40-A126-337211631EDC}" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{96ad72e4-2e2b-4ffc-a5bb-279c2714af12}\InprocServer32 C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9692BE2F-EB8F-49D9-A11C-C24C1EF734D5}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{96ad72e4-2e2b-4ffc-a5bb-279c2714af12}\InprocServer32\ThreadingModel = "Apartment" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{4B66E1DF-4DE3-4CDA-83B5-11673EADAB0B}\TypeLib\ = "{A54DC52D-7AAD-4D40-A126-337211631EDC}" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4B66E1DF-4DE3-4CDA-83B5-11673EADAB0B}\ProxyStubClsid32 C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A54DC52D-7AAD-4D40-A126-337211631EDC}\1.0\0\win32 C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4B66E1DF-4DE3-4CDA-83B5-11673EADAB0B}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IEocxApp.IEocx.1\CLSID\ = "{96ad72e4-2e2b-4ffc-a5bb-279c2714af12}" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IEocxApp.IEocx\CLSID\ = "{96ad72e4-2e2b-4ffc-a5bb-279c2714af12}" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IEocxApp.IEocx\CurVer C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{96ad72e4-2e2b-4ffc-a5bb-279c2714af12}\ProgID\ = "IEocxApp.IEocx.1" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{96ad72e4-2e2b-4ffc-a5bb-279c2714af12}\TypeLib\ = "{a54dc52d-7aad-4d40-a126-337211631edc}" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IEocxApp.IEocx\ = "IEocx Class" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9692BE2F-EB8F-49D9-A11C-C24C1EF734D5}\TypeLib\Version = "1.0" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9692BE2F-EB8F-49D9-A11C-C24C1EF734D5}\TypeLib C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IEocxApp.IEocx.1 C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{96ad72e4-2e2b-4ffc-a5bb-279c2714af12}\TypeLib C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A54DC52D-7AAD-4D40-A126-337211631EDC}\1.0 C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4B66E1DF-4DE3-4CDA-83B5-11673EADAB0B}\TypeLib C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4B66E1DF-4DE3-4CDA-83B5-11673EADAB0B}\TypeLib\ = "{A54DC52D-7AAD-4D40-A126-337211631EDC}" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IEocxApp.IEocx\CLSID C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{96ad72e4-2e2b-4ffc-a5bb-279c2714af12} C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A54DC52D-7AAD-4D40-A126-337211631EDC}\1.0\FLAGS C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9692BE2F-EB8F-49D9-A11C-C24C1EF734D5}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{96ad72e4-2e2b-4ffc-a5bb-279c2714af12}\ProgID C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{4B66E1DF-4DE3-4CDA-83B5-11673EADAB0B}\ProxyStubClsid32 C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9692BE2F-EB8F-49D9-A11C-C24C1EF734D5}\TypeLib\Version = "1.0" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IEocxApp.IEocx.1\CLSID C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A54DC52D-7AAD-4D40-A126-337211631EDC} C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A54DC52D-7AAD-4D40-A126-337211631EDC}\1.0\HELPDIR C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{4B66E1DF-4DE3-4CDA-83B5-11673EADAB0B} C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9692BE2F-EB8F-49D9-A11C-C24C1EF734D5} C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IEocxApp.IEocx\CurVer\ = "IEocxApp.IEocx.1" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{96ad72e4-2e2b-4ffc-a5bb-279c2714af12}\Programmable C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A54DC52D-7AAD-4D40-A126-337211631EDC}\1.0\0 C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9692BE2F-EB8F-49D9-A11C-C24C1EF734D5}\ProxyStubClsid32 C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A54DC52D-7AAD-4D40-A126-337211631EDC}\1.0\HELPDIR\ = "C:\\Windows" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{4B66E1DF-4DE3-4CDA-83B5-11673EADAB0B}\TypeLib\Version = "1.0" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9692BE2F-EB8F-49D9-A11C-C24C1EF734D5}\TypeLib C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9692BE2F-EB8F-49D9-A11C-C24C1EF734D5}\ = "IBhoApp" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IEocxApp.IEocx.1\ = "IEocx Class" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A54DC52D-7AAD-4D40-A126-337211631EDC}\1.0\FLAGS\ = "0" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{4B66E1DF-4DE3-4CDA-83B5-11673EADAB0B}\TypeLib C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9692BE2F-EB8F-49D9-A11C-C24C1EF734D5}\ = "IBhoApp" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IEocxApp.IEocx C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{96ad72e4-2e2b-4ffc-a5bb-279c2714af12}\VersionIndependentProgID C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4B66E1DF-4DE3-4CDA-83B5-11673EADAB0B}\TypeLib\Version = "1.0" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9692BE2F-EB8F-49D9-A11C-C24C1EF734D5}\ProxyStubClsid32 C:\Windows\SysWOW64\regsvr32.exe N/A

Runs net.exe

Processes

C:\Users\Admin\AppData\Local\Temp\8ec80f0c252e4428e2e383aad8cc212a_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\8ec80f0c252e4428e2e383aad8cc212a_JaffaCakes118.exe"

C:\Windows\SysWOW64\regsvr32.exe

C:\Windows\system32\regsvr32.exe /s C:\Windows\ieocx.dll

C:\Windows\SysWOW64\net.exe

C:\Windows\system32\net.exe stop "Security Center"

C:\Windows\SysWOW64\net1.exe

C:\Windows\system32\net1 stop "Security Center"

Network

Country Destination Domain Proto
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 150.171.28.10:443 g.bing.com tcp
US 8.8.8.8:53 140.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp
DE 78.46.88.142:80 78.46.88.142 tcp
US 8.8.8.8:53 142.88.46.78.in-addr.arpa udp
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 200.163.202.172.in-addr.arpa udp
US 8.8.8.8:53 241.42.69.40.in-addr.arpa udp
US 8.8.8.8:53 107.12.20.2.in-addr.arpa udp
US 8.8.8.8:53 55.36.223.20.in-addr.arpa udp
US 8.8.8.8:53 22.236.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp

Files

memory/2744-3-0x0000000000400000-0x0000000000424000-memory.dmp

memory/2744-2-0x0000000000401000-0x000000000040A000-memory.dmp

memory/2744-4-0x0000000000400000-0x0000000000424000-memory.dmp

C:\Windows\ieocx.dll

MD5 74b6a00a13cb371c4c919da8e44eac5e
SHA1 baa584419445c50188ce895947bc5783bde5ea5c
SHA256 21511fea07b56208026de586fd4ed1d204a2b74124f5437cc3d1deeffb21d471
SHA512 73ef4be67472a7299ae024d455aadb3069ee2eef746f98a9a43b5fa2b89fcf6017a202d1b81626c1926c0920946191dab23360a8be7afb3f5e909c3565f66828

memory/912-8-0x0000000010000000-0x000000001000E000-memory.dmp

memory/912-10-0x0000000010002000-0x0000000010004000-memory.dmp

memory/912-9-0x0000000000DD0000-0x0000000000DD6000-memory.dmp

memory/2744-12-0x0000000000400000-0x0000000000424000-memory.dmp

memory/2744-11-0x0000000000401000-0x000000000040A000-memory.dmp

memory/2744-13-0x0000000000400000-0x0000000000424000-memory.dmp

memory/2744-14-0x0000000000400000-0x0000000000424000-memory.dmp