Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 18:46
Static task
static1
Behavioral task
behavioral1
Sample
9007273412e2efa69dbcfcbdd71b1a6b_JaffaCakes118.dll
Resource
win7-20241010-en
General
-
Target
9007273412e2efa69dbcfcbdd71b1a6b_JaffaCakes118.dll
-
Size
304KB
-
MD5
9007273412e2efa69dbcfcbdd71b1a6b
-
SHA1
b2cc422223ddf3ce23e1e0a71712dc130ccb2541
-
SHA256
ebe77f785b157418adceb1d43bbf644b6a3fc9f4cc692a7d5d520e8478fad216
-
SHA512
213afc6f6c0208089f7d33ec1e7d262ca1fcf8fa66fea84f3af96cce125668ed5cb9dd938d381b55f00895bebbbbd5996135c32210e19af2002eb2fb1e6e1875
-
SSDEEP
6144:bKtDP9elqi0AOROnJPmR2wl3wSn3CxNfLOB9:bKtYlqi09ROnJPmRPVwSn3iNOf
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,c:\\program files (x86)\\microsoft\\desktoplayer.exe" svchost.exe -
Ramnit family
-
Executes dropped EXE 2 IoCs
Processes:
regsvr32Srv.exeDesktopLayer.exepid Process 1232 regsvr32Srv.exe 2120 DesktopLayer.exe -
Loads dropped DLL 4 IoCs
Processes:
regsvr32.exeregsvr32Srv.exepid Process 2460 regsvr32.exe 2460 regsvr32.exe 1232 regsvr32Srv.exe 1232 regsvr32Srv.exe -
Drops file in System32 directory 3 IoCs
Processes:
regsvr32.exesvchost.exedescription ioc Process File created C:\Windows\SysWOW64\regsvr32Srv.exe regsvr32.exe File created C:\Windows\SysWOW64\dmlconf.dat svchost.exe File opened for modification C:\Windows\SysWOW64\dmlconf.dat svchost.exe -
Processes:
resource yara_rule behavioral1/memory/1232-11-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral1/memory/2120-21-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral1/memory/2120-23-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral1/memory/2120-47-0x0000000000400000-0x0000000000426000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
Processes:
svchost.exedescription ioc Process File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\MSTTSLoc.dll svchost.exe File opened for modification C:\Program Files\Internet Explorer\msdbg2.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\de\PresentationCore.resources.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\mux\libmux_ps_plugin.dll svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\mshwjpn.dll svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Filters\VISFILT.DLL svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\nbexec.dll svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\ssvagent.exe svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\it\System.Printing.resources.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access_output\libaccess_output_shout_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libflac_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libvobsub_plugin.dll svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\MSOXEV.DLL svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\jfxwebkit.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\fr\PresentationBuildTasks.resources.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\it\System.IdentityModel.Resources.dll svchost.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\picturePuzzle.html svchost.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\airappinstaller.exe svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\tiptsf.dll svchost.exe File opened for modification C:\Program Files\Microsoft Office\Office14\1033\MAPISHELLR.DLL svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\it\UIAutomationTypes.resources.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fr\System.Data.Services.resources.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access_output\libaccess_output_file_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\packetizer\libpacketizer_mpeg4audio_plugin.dll svchost.exe File opened for modification C:\Program Files\Windows Journal\InkSeg.dll svchost.exe File opened for modification C:\Program Files\Common Files\System\msadc\msadcer.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\unpack200.exe svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\jsdt.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\spu\libremoteosd_plugin.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\nbexec64.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\ReachFramework.resources.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\System.Data.Services.Client.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\stream_out\libstream_out_display_plugin.dll svchost.exe File opened for modification C:\Program Files\Windows Photo Viewer\PhotoBase.dll svchost.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\LogTransport2.exe svchost.exe File opened for modification C:\Program Files\Internet Explorer\sqmapi.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.help_2.0.102.v20141007-2301\license.html svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\Microsoft.Build.Framework.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libdemux_stl_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\stream_out\libstream_out_gather_plugin.dll svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\ACEES.DLL svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\java-rmi.exe svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_filter\libscaletempo_plugin.dll svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\pipanel.exe svchost.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\BIBUtils.dll svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\eula.dll svchost.exe File opened for modification C:\Program Files\Microsoft Office\Office14\OLKFSTUB.DLL svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libadjust_plugin.dll svchost.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\A3DUtility.exe svchost.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\msdatl3.dll svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\d3dcompiler_47.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jconsole.exe svchost.exe File opened for modification C:\Program Files\Mozilla Firefox\ucrtbase.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\Microsoft.Build.Engine.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access\libaccess_realrtsp_plugin.dll svchost.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\picturePuzzle.html svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\journal.dll svchost.exe File opened for modification C:\Program Files\DVD Maker\Pipeline.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\rmiregistry.exe svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\plugin2\npjp2.dll svchost.exe File opened for modification C:\Program Files\Common Files\System\msadc\msadcor.dll svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\epl-v10.html svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\dtplugin\deployJava1.dll svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
regsvr32Srv.exeDesktopLayer.exesvchost.exeregsvr32.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32Srv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DesktopLayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Modifies registry class 64 IoCs
Processes:
regsvr32.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BF262B62-CC1C-4FB9-AB52-5B54AFA357EE}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{465A6059-DA60-49DC-90A3-DF407297CC9A}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{79867DC0-0AE6-11D4-B052-00409575855B}\TypeLib\ = "{2E73E231-6A73-429F-AC58-4592BCCD6AC5}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{2E73E231-6A73-429F-AC58-4592BCCD6AC5}\1.0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{84E87512-7776-4F59-B119-165DEE47E60A}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4DAC7F6A-8BD2-4816-8283-9BEAB56D8739} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{ED18E0CA-6A5C-4DCC-BA33-2B1BC4420A57}\TypeLib\ = "{2E73E231-6A73-429F-AC58-4592BCCD6AC5}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{AD27FE13-A289-4439-9A62-9ED2278A7CA9}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\LogonMgr.LogonManager.1\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{2E73E231-6A73-429F-AC58-4592BCCD6AC5}\1.0\0\win32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{89698CC5-DD69-4F34-BDCA-7FA190FCAA37} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{4F45FE87-19D5-45E3-9207-06AF2BAA93D3}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F0AE2345-D700-4B48-97DB-A12506966B3C}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{93278B81-3743-4DB1-A6F7-ECAC01FFED1A}\TypeLib\ = "{2E73E231-6A73-429F-AC58-4592BCCD6AC5}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{79867DC0-0AE6-11D4-B052-00409575855B} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{465A6059-DA60-49DC-90A3-DF407297CC9A}\TypeLib\ = "{2E73E231-6A73-429F-AC58-4592BCCD6AC5}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{739022A5-2615-45BF-A30A-AEC6C70B049B}\ = "ILogonNotification" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{739022A5-2615-45BF-A30A-AEC6C70B049B} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{ED18E0CA-6A5C-4DCC-BA33-2B1BC4420A57}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{96144532-C2BD-409D-8F3E-F2EFEDA7B4FB}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{96144532-C2BD-409D-8F3E-F2EFEDA7B4FB}\ = "ILogEntry" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{0CFA9F37-6669-4D30-9054-CE38A8D74233} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{0CFA9F37-6669-4D30-9054-CE38A8D74233}\ = "ILogonManager2" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\LogonMgr.LogonManager\CurVer\ = "LogonMgr.LogonManager.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{f4894f79-8121-4df2-b79e-ed73fa8ade6f}\VersionIndependentProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{f4894f79-8121-4df2-b79e-ed73fa8ade6f}\MiscStatus\1 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{2E73E231-6A73-429F-AC58-4592BCCD6AC5}\1.0\FLAGS\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2F5E6FB2-D765-458E-BE53-031AF5E4269B}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{739022A5-2615-45BF-A30A-AEC6C70B049B}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{AD27FE13-A289-4439-9A62-9ED2278A7CA9}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AD27FE13-A289-4439-9A62-9ED2278A7CA9}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{BF262B62-CC1C-4FB9-AB52-5B54AFA357EE}\TypeLib\ = "{2E73E231-6A73-429F-AC58-4592BCCD6AC5}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C3BE8465-5CFC-4C65-8AEC-AC50C2CCA89D}\ = "IConnectorDeviceEnum" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{79867DC0-0AE6-11D4-B052-00409575855B}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{AD27FE13-A289-4439-9A62-9ED2278A7CA9}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B7D5F98A-8248-4144-A86F-19E3A0C46955} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{2E73E231-6A73-429F-AC58-4592BCCD6AC5}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\9007273412e2efa69dbcfcbdd71b1a6b_JaffaCakes118.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{465A6059-DA60-49DC-90A3-DF407297CC9A}\ = "IConnectors" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4DAC7F6A-8BD2-4816-8283-9BEAB56D8739}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C3BE8465-5CFC-4C65-8AEC-AC50C2CCA89D}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{79867DC0-0AE6-11D4-B052-00409575855B}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B7D5F98A-8248-4144-A86F-19E3A0C46955}\ = "_IConnectorEvents" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{4A6A09A1-32E9-4293-9E1D-1E131806E801}\TypeLib\ = "{2E73E231-6A73-429F-AC58-4592BCCD6AC5}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{2F5E6FB2-D765-458E-BE53-031AF5E4269B}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{89698CC5-DD69-4F34-BDCA-7FA190FCAA37}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F0AE2345-D700-4B48-97DB-A12506966B3C}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4DAC7F6A-8BD2-4816-8283-9BEAB56D8739}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{739022A5-2615-45BF-A30A-AEC6C70B049B}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{96144532-C2BD-409D-8F3E-F2EFEDA7B4FB}\TypeLib\ = "{2E73E231-6A73-429F-AC58-4592BCCD6AC5}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{96144532-C2BD-409D-8F3E-F2EFEDA7B4FB}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C3BE8465-5CFC-4C65-8AEC-AC50C2CCA89D}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{f4894f79-8121-4df2-b79e-ed73fa8ade6f}\TypeLib\ = "{2E73E231-6A73-429F-AC58-4592BCCD6AC5}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4A6A09A1-32E9-4293-9E1D-1E131806E801}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{465A6059-DA60-49DC-90A3-DF407297CC9A}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{96144532-C2BD-409D-8F3E-F2EFEDA7B4FB}\TypeLib\ = "{2E73E231-6A73-429F-AC58-4592BCCD6AC5}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{89698CC5-DD69-4F34-BDCA-7FA190FCAA37}\TypeLib\ = "{2E73E231-6A73-429F-AC58-4592BCCD6AC5}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{2F5E6FB2-D765-458E-BE53-031AF5E4269B}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{84E87512-7776-4F59-B119-165DEE47E60A}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{465A6059-DA60-49DC-90A3-DF407297CC9A} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{96144532-C2BD-409D-8F3E-F2EFEDA7B4FB}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4F45FE87-19D5-45E3-9207-06AF2BAA93D3}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4A6A09A1-32E9-4293-9E1D-1E131806E801}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{BF262B62-CC1C-4FB9-AB52-5B54AFA357EE}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{4F45FE87-19D5-45E3-9207-06AF2BAA93D3}\TypeLib regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
DesktopLayer.exepid Process 2120 DesktopLayer.exe 2120 DesktopLayer.exe 2120 DesktopLayer.exe 2120 DesktopLayer.exe -
Suspicious use of WriteProcessMemory 25 IoCs
Processes:
regsvr32.exeregsvr32.exeregsvr32Srv.exeDesktopLayer.exedescription pid Process procid_target PID 2500 wrote to memory of 2460 2500 regsvr32.exe 30 PID 2500 wrote to memory of 2460 2500 regsvr32.exe 30 PID 2500 wrote to memory of 2460 2500 regsvr32.exe 30 PID 2500 wrote to memory of 2460 2500 regsvr32.exe 30 PID 2500 wrote to memory of 2460 2500 regsvr32.exe 30 PID 2500 wrote to memory of 2460 2500 regsvr32.exe 30 PID 2500 wrote to memory of 2460 2500 regsvr32.exe 30 PID 2460 wrote to memory of 1232 2460 regsvr32.exe 31 PID 2460 wrote to memory of 1232 2460 regsvr32.exe 31 PID 2460 wrote to memory of 1232 2460 regsvr32.exe 31 PID 2460 wrote to memory of 1232 2460 regsvr32.exe 31 PID 1232 wrote to memory of 2120 1232 regsvr32Srv.exe 32 PID 1232 wrote to memory of 2120 1232 regsvr32Srv.exe 32 PID 1232 wrote to memory of 2120 1232 regsvr32Srv.exe 32 PID 1232 wrote to memory of 2120 1232 regsvr32Srv.exe 32 PID 2120 wrote to memory of 2472 2120 DesktopLayer.exe 33 PID 2120 wrote to memory of 2472 2120 DesktopLayer.exe 33 PID 2120 wrote to memory of 2472 2120 DesktopLayer.exe 33 PID 2120 wrote to memory of 2472 2120 DesktopLayer.exe 33 PID 2120 wrote to memory of 2472 2120 DesktopLayer.exe 33 PID 2120 wrote to memory of 2472 2120 DesktopLayer.exe 33 PID 2120 wrote to memory of 2472 2120 DesktopLayer.exe 33 PID 2120 wrote to memory of 2472 2120 DesktopLayer.exe 33 PID 2120 wrote to memory of 2472 2120 DesktopLayer.exe 33 PID 2120 wrote to memory of 2472 2120 DesktopLayer.exe 33
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\9007273412e2efa69dbcfcbdd71b1a6b_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\9007273412e2efa69dbcfcbdd71b1a6b_JaffaCakes118.dll2⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\SysWOW64\regsvr32Srv.exeC:\Windows\SysWOW64\regsvr32Srv.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe5⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:2472
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\epl-v10.html
Filesize165KB
MD562b74c5f9e5f4542112a67e9c96548b7
SHA13393bd4ee69c12bdb68f0eaeb0a8449d1c86539c
SHA256e133fce80b01a3e79bbd59fe559ffbd360f6d98d3213652c97211359e391c212
SHA5124a25bf8ea66c5fe50d59c78d157f0f0d9da66bfd9ec5720efc19616b10213452224b3d1e653f188ea88fe763efe64e0b94b0cfcee3feda31a371ad8e9fa98dd4
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\license.html
Filesize162KB
MD50b58cfff3333de448176fe397beb9fbb
SHA1257a8c72b2c09ecee53f1b56898ff47b8cf2eccc
SHA25675660b3a047ffa68014976c9219352af3f434bf099a422c02c017a7f471be72b
SHA512952eb5ce9d7b7f0b2173778fabf3fea790412c2c328dabd005663ab9337ba2a28cb0311a982f1d146eb270a5ed51031fb0704987568fd7bda779768eaab3bd01
-
Filesize
76KB
MD5395eeaefab2ddeb8384cc1148372698a
SHA1df1b8db968cde6b267504617bc67436a2feb4289
SHA256843a48356f299924f97639a8079b954c88e1ec20cb2bb936386c2c471c098e36
SHA5124b6848f3d481a84403cd3ff72f7b5b4a9323a85e8a423dc4e07e948387cf0ecc4902f25ccede5683d04a7f100a27f11d4edfdb658e344bd32e9c648fce32c083