Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
25/11/2024, 11:25
Static task
static1
Behavioral task
behavioral1
Sample
9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe
-
Size
304KB
-
MD5
9b2d426bc57f9b99a0d4f9af9afd0f8c
-
SHA1
5f9704a27425919e908c18a1e291329bc6c0260d
-
SHA256
dfd047ceb85a0a2f9fd534c2a92e46c445f13c1ff070c3bac2e7f895c6c2e46e
-
SHA512
4e34f5e65a9a6a5667e416dae40bc94e8e4d6a0157d50597687999ebeb69f0d6810e8423909d36da3cb08e903275f3569b665553c0ce0b3be1dc8e3029730dd2
-
SSDEEP
6144:PuVY71GIAKyRWTL6PeULRjRL6ewhNhJDt2DG/LTwbc8:H1wBWTaZRjRuLhJJUGjTad
Malware Config
Signatures
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Executes dropped EXE 2 IoCs
pid Process 868 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe 3004 suop.exe -
Loads dropped DLL 8 IoCs
pid Process 2420 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe 2420 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe 2420 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe 868 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe 868 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe 2420 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe 3004 suop.exe 3004 suop.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\Ohciduuxsy = "C:\\Users\\Admin\\AppData\\Roaming\\Evuxa\\suop.exe" suop.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 868 set thread context of 2848 868 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe 34 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~1.EXE 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpshare.exe 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\Oarpmany.exe 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOF5E2~1.EXE 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOSYNC.EXE 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTEM.EXE 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\POWERPNT.EXE 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\PPTICO.EXE 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WINWORD.EXE 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~1\wab.exe 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~4\ImagingDevices.exe 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOICONS.EXE 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORDB.EXE 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBE_~1.EXE 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GO664E~1.EXE 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\BCSSync.exe 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\VPREVIEW.EXE 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOHTMED.EXE 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\OIS.EXE 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmlaunch.exe 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\Setup.exe 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\SOURCE~1\OSE.EXE 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSQRY32.EXE 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~2\ACCESS~1\wordpad.exe 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ADOBEC~1.EXE 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOXMLED.EXE 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CNFNOT32.EXE 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ACROBR~1.EXE 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\ADOBEA~1\Versions\1.0\ADOBEA~1.EXE 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\EQUATION\EQNEDT32.EXE 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\ink\mip.exe 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ACCICONS.EXE 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOUC.EXE 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Resource\Icons\SC_REA~1.EXE 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\IECONT~1.EXE 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\misc.exe 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTE.EXE 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\SELFCERT.EXE 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\Eula.exe 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DWTRIG20.EXE 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\TextConv\WksConv\Wkconv.exe 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\1033\ONELEV.EXE 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CLVIEW.EXE 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GRAPH.EXE 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language suop.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Privacy 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe -
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\69931ED0-00000001.eml:OECustomProperty WinMail.exe -
Suspicious behavior: EnumeratesProcesses 45 IoCs
pid Process 3004 suop.exe 3004 suop.exe 3004 suop.exe 3004 suop.exe 3004 suop.exe 3004 suop.exe 3004 suop.exe 3004 suop.exe 3004 suop.exe 3004 suop.exe 3004 suop.exe 3004 suop.exe 3004 suop.exe 3004 suop.exe 3004 suop.exe 3004 suop.exe 3004 suop.exe 3004 suop.exe 3004 suop.exe 3004 suop.exe 3004 suop.exe 3004 suop.exe 3004 suop.exe 3004 suop.exe 3004 suop.exe 3004 suop.exe 3004 suop.exe 3004 suop.exe 3004 suop.exe 3004 suop.exe 3004 suop.exe 3004 suop.exe 3004 suop.exe 3004 suop.exe 3004 suop.exe 3004 suop.exe 3004 suop.exe 3004 suop.exe 3004 suop.exe 3004 suop.exe 3004 suop.exe 3004 suop.exe 3004 suop.exe 3004 suop.exe 3004 suop.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeSecurityPrivilege 868 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe Token: SeSecurityPrivilege 868 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe Token: SeSecurityPrivilege 2420 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe Token: SeSecurityPrivilege 2420 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe Token: SeSecurityPrivilege 2420 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe Token: SeSecurityPrivilege 2420 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe Token: SeSecurityPrivilege 2420 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe Token: SeSecurityPrivilege 2420 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe Token: SeManageVolumePrivilege 1532 WinMail.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1532 WinMail.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1532 WinMail.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1532 WinMail.exe -
Suspicious use of WriteProcessMemory 62 IoCs
description pid Process procid_target PID 2420 wrote to memory of 868 2420 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe 31 PID 2420 wrote to memory of 868 2420 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe 31 PID 2420 wrote to memory of 868 2420 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe 31 PID 2420 wrote to memory of 868 2420 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe 31 PID 868 wrote to memory of 3004 868 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe 32 PID 868 wrote to memory of 3004 868 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe 32 PID 868 wrote to memory of 3004 868 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe 32 PID 868 wrote to memory of 3004 868 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe 32 PID 3004 wrote to memory of 1100 3004 suop.exe 19 PID 3004 wrote to memory of 1100 3004 suop.exe 19 PID 3004 wrote to memory of 1100 3004 suop.exe 19 PID 3004 wrote to memory of 1100 3004 suop.exe 19 PID 3004 wrote to memory of 1100 3004 suop.exe 19 PID 3004 wrote to memory of 1152 3004 suop.exe 20 PID 3004 wrote to memory of 1152 3004 suop.exe 20 PID 3004 wrote to memory of 1152 3004 suop.exe 20 PID 3004 wrote to memory of 1152 3004 suop.exe 20 PID 3004 wrote to memory of 1152 3004 suop.exe 20 PID 3004 wrote to memory of 1176 3004 suop.exe 21 PID 3004 wrote to memory of 1176 3004 suop.exe 21 PID 3004 wrote to memory of 1176 3004 suop.exe 21 PID 3004 wrote to memory of 1176 3004 suop.exe 21 PID 3004 wrote to memory of 1176 3004 suop.exe 21 PID 3004 wrote to memory of 1264 3004 suop.exe 25 PID 3004 wrote to memory of 1264 3004 suop.exe 25 PID 3004 wrote to memory of 1264 3004 suop.exe 25 PID 3004 wrote to memory of 1264 3004 suop.exe 25 PID 3004 wrote to memory of 1264 3004 suop.exe 25 PID 3004 wrote to memory of 2420 3004 suop.exe 30 PID 3004 wrote to memory of 2420 3004 suop.exe 30 PID 3004 wrote to memory of 2420 3004 suop.exe 30 PID 3004 wrote to memory of 2420 3004 suop.exe 30 PID 3004 wrote to memory of 2420 3004 suop.exe 30 PID 3004 wrote to memory of 868 3004 suop.exe 31 PID 3004 wrote to memory of 868 3004 suop.exe 31 PID 3004 wrote to memory of 868 3004 suop.exe 31 PID 3004 wrote to memory of 868 3004 suop.exe 31 PID 3004 wrote to memory of 868 3004 suop.exe 31 PID 868 wrote to memory of 2848 868 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe 34 PID 868 wrote to memory of 2848 868 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe 34 PID 868 wrote to memory of 2848 868 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe 34 PID 868 wrote to memory of 2848 868 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe 34 PID 868 wrote to memory of 2848 868 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe 34 PID 868 wrote to memory of 2848 868 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe 34 PID 868 wrote to memory of 2848 868 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe 34 PID 868 wrote to memory of 2848 868 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe 34 PID 868 wrote to memory of 2848 868 9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe 34 PID 3004 wrote to memory of 2752 3004 suop.exe 36 PID 3004 wrote to memory of 2752 3004 suop.exe 36 PID 3004 wrote to memory of 2752 3004 suop.exe 36 PID 3004 wrote to memory of 2752 3004 suop.exe 36 PID 3004 wrote to memory of 2752 3004 suop.exe 36 PID 3004 wrote to memory of 2688 3004 suop.exe 37 PID 3004 wrote to memory of 2688 3004 suop.exe 37 PID 3004 wrote to memory of 2688 3004 suop.exe 37 PID 3004 wrote to memory of 2688 3004 suop.exe 37 PID 3004 wrote to memory of 2688 3004 suop.exe 37 PID 3004 wrote to memory of 2520 3004 suop.exe 39 PID 3004 wrote to memory of 2520 3004 suop.exe 39 PID 3004 wrote to memory of 2520 3004 suop.exe 39 PID 3004 wrote to memory of 2520 3004 suop.exe 39 PID 3004 wrote to memory of 2520 3004 suop.exe 39
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1100
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1152
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1176
-
C:\Users\Admin\AppData\Local\Temp\9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\9b2d426bc57f9b99a0d4f9af9afd0f8c_JaffaCakes118.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Users\Admin\AppData\Roaming\Evuxa\suop.exe"C:\Users\Admin\AppData\Roaming\Evuxa\suop.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3004
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp570d2136.bat"4⤵
- System Location Discovery: System Language Discovery
PID:2848
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1264
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" -Embedding1⤵
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1532
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2752
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2688
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2520
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
1Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
859KB
MD5754309b7b83050a50768236ee966224f
SHA110ed7efc2e594417ddeb00a42deb8fd9f804ed53
SHA256acd32dd903e5464b0ecd153fb3f71da520d2e59a63d4c355d9c1874c919d04e6
SHA512e5aaddf62c08c8fcc1ae3f29df220c5c730a2efa96dd18685ee19f5a9d66c4735bb4416c4828033661990604669ed345415ef2dc096ec75e1ab378dd804b1614
-
Filesize
2.0MB
MD5511f33be7390f997b24aac42a71a8a8e
SHA15fac8f755b0fea80e1b41b9284a34621c94672d3
SHA2566336e20f8793cbd99181f81d1c70ba9ceefc73a95e2b220c9b62f38ffc303496
SHA51277f993ed8a3c603149f73bdc8c196943f6e12c0c8502fdb2f63506b8c8b33dd529ddb2351288828d9929e521b63cde5da0b001f7b386258c432fa387fef345a6
-
Filesize
289B
MD5179304b039294b3507a77bb8b4fc6c86
SHA14498ed7455ecf2d89a9ffb486e1a297037007941
SHA256411c698552c0b606fe63c0390da27c2c48e2c6282e8dcf589fc7282f13a6f672
SHA512bd5d8f405abd8bbd08df7465495687d03e24904fb087c718dfa313b89f9eac97a53ec2eeb003629e8b4e6f89f5efe8d6d3c546e13d9e9aa2708d2b274ba2df97
-
Filesize
4KB
MD58a8ec85e5fd5cfecc23645549595aa68
SHA17540354802ac40adc19bb83d7a6a3d1319ba1ece
SHA2561958189113263765b0cc4f3abbb799a795a2a6c9444043a2ec99e3059e3b6902
SHA51237603fecdad2f64de2e67c24f5ddc958a81da58d53363085bbe57e0c3b66145096b0d419124ff3428371d0c39d33e79d4d54e3b41d08f7ee71c9db938cf8dd1e
-
Filesize
252KB
MD59e2b9928c89a9d0da1d3e8f4bd96afa7
SHA1ec66cda99f44b62470c6930e5afda061579cde35
SHA2568899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043
SHA5122ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156
-
Filesize
264KB
MD53dadd43c2e923846c1711033d11c0aaf
SHA1c68d8ebaeb481d0bd5f42fec95565c8deb61ccfd
SHA25629804382216ebb8a432b69b49ffd174f3ea9fd754f3a6babc2ae48edf47bd20d
SHA5123dd200650b056e4f5caac8f9c3889e3e95fb03d181c8c480f451e7b58430f9dcf7c4bddce1a9e31df5684d2ecc827af79e6cb4307dd7ae9ed713307332140265
-
Filesize
264KB
MD5588097a0f8b7d49f355c09b6f675226d
SHA13a6be6defd400da0315c9ae15d33fdad535c1c77
SHA256a82bab67d4139967eadb4926c6c741bf487629b985625d46b9ae921dd7a25f35
SHA512ca91cc3e129b348a8ed3e311d32d7d8f5fa8e4218a6de52b8846bb4b8680e14d5a024aa6de2848b573efe7943b80c3a1a529ed29217eba428729510a5a78fe18