Analysis
-
max time kernel
150s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-12-2024 05:22
Static task
static1
Behavioral task
behavioral1
Sample
f78185d7e35f70d1e9ae88545cfbb3b8_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f78185d7e35f70d1e9ae88545cfbb3b8_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
f78185d7e35f70d1e9ae88545cfbb3b8_JaffaCakes118.exe
-
Size
914KB
-
MD5
f78185d7e35f70d1e9ae88545cfbb3b8
-
SHA1
07308ea95155535301d9d8b33f0dd4ce3485704e
-
SHA256
848aaaf10168fe96c7ce4a7b836c92f6eacaa059f479da357975e5d5252e1536
-
SHA512
21a7bf00a56afff3f95e6af9ab8c6421035dbd13103db2678f3edefd3db169fb28de3a62c4fe460dfe0f940bfbe3e41021f58d3a75e8843201b86c94721d8502
-
SSDEEP
24576:Xh6XqAaeKch19xKNoTjJubG8vQDPbxZEJNyssWwcQKL:eqAaeKch19xKNoTl+G8vQjbkUssWwQL
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modifies firewall policy service 3 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Windows\system32\NvTaskbarInh.exe = "C:\\Windows\\system32\\NvTaskbarInh.exe:*:Enabled:Explorer" NvTaskbarInh.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List NvTaskbarInh.exe -
Modiloader family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NvTaskbarInh.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UACDisableNotify = "1" NvTaskbarInh.exe -
ModiLoader Second Stage 5 IoCs
resource yara_rule behavioral1/memory/1924-117-0x0000000000400000-0x000000000042C000-memory.dmp modiloader_stage2 behavioral1/memory/1924-115-0x0000000000400000-0x000000000042C000-memory.dmp modiloader_stage2 behavioral1/memory/1924-113-0x0000000000400000-0x000000000042C000-memory.dmp modiloader_stage2 behavioral1/memory/1924-111-0x0000000000400000-0x000000000042C000-memory.dmp modiloader_stage2 behavioral1/memory/1924-109-0x0000000000400000-0x000000000042C000-memory.dmp modiloader_stage2 -
Executes dropped EXE 8 IoCs
pid Process 2576 CWBUITSK.EXE 2348 NvTaskbarInh.exe 1152 NvTaskbarInh.exe 2620 statcvs.exe 2696 foxit.exe 1924 statcvs.exe 1328 statcvs.exe 2456 statcvs.exe -
Loads dropped DLL 24 IoCs
pid Process 2148 f78185d7e35f70d1e9ae88545cfbb3b8_JaffaCakes118.exe 2148 f78185d7e35f70d1e9ae88545cfbb3b8_JaffaCakes118.exe 2148 f78185d7e35f70d1e9ae88545cfbb3b8_JaffaCakes118.exe 2148 f78185d7e35f70d1e9ae88545cfbb3b8_JaffaCakes118.exe 2348 NvTaskbarInh.exe 2348 NvTaskbarInh.exe 1152 NvTaskbarInh.exe 1152 NvTaskbarInh.exe 1152 NvTaskbarInh.exe 1152 NvTaskbarInh.exe 2620 statcvs.exe 1152 NvTaskbarInh.exe 2696 foxit.exe 628 rundll32.exe 628 rundll32.exe 628 rundll32.exe 628 rundll32.exe 2620 statcvs.exe 1924 statcvs.exe 1924 statcvs.exe 1980 rundll32.exe 1980 rundll32.exe 1980 rundll32.exe 1980 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UACDisableNotify = "1" NvTaskbarInh.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f78185d7e35f70d1e9ae88545cfbb3b8_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\Nvidia Control Center3 = "C:\\Windows\\system32\\NvTaskbarInh.exe" NvTaskbarInh.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\Osexa = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\cfpifsAP.dll\",Startup" rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NvTaskbarInh.exe -
Enumerates connected drives 3 TTPs 20 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\R: NvTaskbarInh.exe File opened (read-only) \??\S: NvTaskbarInh.exe File opened (read-only) \??\I: NvTaskbarInh.exe File opened (read-only) \??\J: NvTaskbarInh.exe File opened (read-only) \??\M: NvTaskbarInh.exe File opened (read-only) \??\O: NvTaskbarInh.exe File opened (read-only) \??\P: NvTaskbarInh.exe File opened (read-only) \??\Q: NvTaskbarInh.exe File opened (read-only) \??\V: NvTaskbarInh.exe File opened (read-only) \??\W: NvTaskbarInh.exe File opened (read-only) \??\H: NvTaskbarInh.exe File opened (read-only) \??\K: NvTaskbarInh.exe File opened (read-only) \??\L: NvTaskbarInh.exe File opened (read-only) \??\X: NvTaskbarInh.exe File opened (read-only) \??\Y: NvTaskbarInh.exe File opened (read-only) \??\E: NvTaskbarInh.exe File opened (read-only) \??\N: NvTaskbarInh.exe File opened (read-only) \??\U: NvTaskbarInh.exe File opened (read-only) \??\G: NvTaskbarInh.exe File opened (read-only) \??\T: NvTaskbarInh.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\NvTaskbarInh.exe NvTaskbarInh.exe File created C:\Windows\SysWOW64\statcvs.exe NvTaskbarInh.exe File created C:\Windows\SysWOW64\foxit.exe NvTaskbarInh.exe File opened for modification C:\Windows\SysWOW64\NvTaskbarInh.exe NvTaskbarInh.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2348 set thread context of 1152 2348 NvTaskbarInh.exe 33 PID 2620 set thread context of 1924 2620 statcvs.exe 37 PID 1328 set thread context of 2456 1328 statcvs.exe 39 -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\program files\emule\incoming\Starcraft2 REGION-UNLOCKER.exe NvTaskbarInh.exe File created C:\program files\morpheus\my shared folder\Tuneup Ultilities 2010.exe NvTaskbarInh.exe File created C:\program files\winmx\shared\DVD Tools Nero 10.5.6.0.exe NvTaskbarInh.exe File created C:\program files\morpheus\my shared folder\Internet Download Manager V5.exe NvTaskbarInh.exe File created C:\program files\tesla\files\Starcraft2 battle.net keys.txt.exe NvTaskbarInh.exe File created C:\program files\grokster\my grokster\AVS Video Converter v6.3.1.365 CRACKED.exe NvTaskbarInh.exe File created C:\program files\emule\incoming\Norton Anti-Virus 2010 crack.exe NvTaskbarInh.exe File created C:\program files\tesla\files\BitDefender AntiVirus 2010 Keygen.exe NvTaskbarInh.exe File created C:\program files\emule\incoming\Starcraft2 battle.net key generator.exe NvTaskbarInh.exe File created C:\program files\icq\shared folder\Download Boost 2.0.exe NvTaskbarInh.exe File created C:\program files\grokster\my grokster\Adobe Acrobat Reader keygen.exe NvTaskbarInh.exe File created C:\program files\morpheus\my shared folder\Myspace theme collection.exe NvTaskbarInh.exe File created C:\program files\winmx\shared\Download Accelerator Plus v9.exe NvTaskbarInh.exe File created C:\program files\morpheus\my shared folder\Super Utilities Pro 2009 11.0.exe NvTaskbarInh.exe File created C:\program files\winmx\shared\Internet Download Manager V5.exe NvTaskbarInh.exe File created C:\program files\winmx\shared\Myspace theme collection.exe NvTaskbarInh.exe File created C:\program files\icq\shared folder\Sony Vegas Pro v9.0a incl crack.exe NvTaskbarInh.exe File created C:\program files\grokster\my grokster\RapidShare Killer AIO 2010.exe NvTaskbarInh.exe File created C:\program files\icq\shared folder\Trojan Killer v2.9.4173.exe NvTaskbarInh.exe File created C:\program files\tesla\files\Windows2008 keygen and activator.exe NvTaskbarInh.exe File created C:\program files\emule\incoming\MagicISO Magic ISO Maker v5.5.0276 Cracked.exe NvTaskbarInh.exe File created C:\program files\grokster\my grokster\Sophos antivirus updater bypass.exe NvTaskbarInh.exe File created C:\program files\morpheus\my shared folder\Norton Internet Security 2010 crack.exe NvTaskbarInh.exe File created C:\program files\morpheus\my shared folder\Total Commander7 license+keygen.exe NvTaskbarInh.exe File created C:\program files\limewire\shared\Download Accelerator Plus v9.exe NvTaskbarInh.exe File created C:\program files\grokster\my grokster\Starcraft2 battle.net keys.txt.exe NvTaskbarInh.exe File created C:\program files\limewire\shared\VmWare 7.0 keygen.exe NvTaskbarInh.exe File created C:\program files\limewire\shared\CleanMyPC Registry Cleaner v6.02.exe NvTaskbarInh.exe File created C:\program files\winmx\shared\Winamp.Pro.v7.33.PowerPack.Portable+installer.exe NvTaskbarInh.exe File created C:\program files\emule\incoming\Download Boost 2.0.exe NvTaskbarInh.exe File created C:\program files\tesla\files\G-Force Platinum v3.7.5.exe NvTaskbarInh.exe File created C:\program files\tesla\files\Sophos antivirus updater bypass.exe NvTaskbarInh.exe File created C:\program files\icq\shared folder\VmWare 7.0 keygen.exe NvTaskbarInh.exe File created C:\program files\emule\incoming\VmWare 7.0 keygen.exe NvTaskbarInh.exe File created C:\program files\emule\incoming\VmWare keygen.exe NvTaskbarInh.exe File created C:\program files\limewire\shared\K-Lite Mega Codec v5.6.1 Portable.exe NvTaskbarInh.exe File created C:\program files\grokster\my grokster\Ashampoo Snap 3.02.exe NvTaskbarInh.exe File created C:\program files\limewire\shared\Starcraft2 battle.net key generator.exe NvTaskbarInh.exe File created C:\program files\emule\incoming\Adobe Illustrator CS4 crack.exe NvTaskbarInh.exe File created C:\program files\tesla\files\LimeWire Pro v4.18.3.exe NvTaskbarInh.exe File created C:\program files\icq\shared folder\K-Lite Mega Codec v5.5.1.exe NvTaskbarInh.exe File created C:\program files\emule\incoming\Adobe Acrobat Reader keygen.exe NvTaskbarInh.exe File created C:\program files\winmx\shared\Windows 7 Ultimate keygen.exe NvTaskbarInh.exe File created C:\program files\icq\shared folder\Starcraft2 battle.net key generator.exe NvTaskbarInh.exe File created C:\program files\morpheus\my shared folder\WinRAR v3.x keygen RaZoR.exe NvTaskbarInh.exe File created C:\program files\morpheus\my shared folder\Norton Anti-Virus 2010 crack.exe NvTaskbarInh.exe File created C:\program files\limewire\shared\Ad-aware 2010.exe NvTaskbarInh.exe File created C:\program files\limewire\shared\Motorola, nokia, ericsson mobil phone tools.exe NvTaskbarInh.exe File created C:\program files\icq\shared folder\Rapidshare Auto Downloader 3.8.exe NvTaskbarInh.exe File created C:\program files\morpheus\my shared folder\CleanMyPC Registry Cleaner v6.02.exe NvTaskbarInh.exe File created C:\program files\limewire\shared\Mp3 Splitter and Joiner Pro v3.48.exe NvTaskbarInh.exe File created C:\program files\tesla\files\Grand Theft Auto Episodes From Liberty City 2010.exe NvTaskbarInh.exe File created C:\program files\icq\shared folder\Ashampoo Snap 3.02.exe NvTaskbarInh.exe File created C:\program files\emule\incoming\Power ISO v4.2 + keygen axxo.exe NvTaskbarInh.exe File created C:\program files\icq\shared folder\Windows 2008 Enterprise Server VMWare Virtual Machine.exe NvTaskbarInh.exe File created C:\program files\emule\incoming\Total Commander7 license+keygen.exe NvTaskbarInh.exe File created C:\program files\emule\incoming\Daemon Tools Pro 4.50.exe NvTaskbarInh.exe File created C:\program files\limewire\shared\Windows 7 Ultimate keygen.exe NvTaskbarInh.exe File created C:\program files\icq\shared folder\WinRAR v3.x keygen RaZoR.exe NvTaskbarInh.exe File created C:\program files\icq\shared folder\PDF Unlocker v2.0.3.exe NvTaskbarInh.exe File created C:\program files\limewire\shared\Adobe Illustrator CS4 crack.exe NvTaskbarInh.exe File created C:\program files\limewire\shared\Sophos antivirus updater bypass.exe NvTaskbarInh.exe File created C:\program files\icq\shared folder\Total Commander7 license+keygen.exe NvTaskbarInh.exe File created C:\program files\icq\shared folder\Internet Download Manager V5.exe NvTaskbarInh.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\statcvs.exe statcvs.exe File created C:\Windows\statcvs.exe statcvs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f78185d7e35f70d1e9ae88545cfbb3b8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NvTaskbarInh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language foxit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language statcvs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language statcvs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NvTaskbarInh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language statcvs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language statcvs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1152 NvTaskbarInh.exe 1152 NvTaskbarInh.exe 1152 NvTaskbarInh.exe 1152 NvTaskbarInh.exe 1152 NvTaskbarInh.exe 1152 NvTaskbarInh.exe 1152 NvTaskbarInh.exe 1152 NvTaskbarInh.exe 1152 NvTaskbarInh.exe 1152 NvTaskbarInh.exe 1152 NvTaskbarInh.exe 1152 NvTaskbarInh.exe 1152 NvTaskbarInh.exe 1152 NvTaskbarInh.exe 1152 NvTaskbarInh.exe 1152 NvTaskbarInh.exe 1152 NvTaskbarInh.exe 1152 NvTaskbarInh.exe 1152 NvTaskbarInh.exe 1152 NvTaskbarInh.exe 1152 NvTaskbarInh.exe 1152 NvTaskbarInh.exe 1152 NvTaskbarInh.exe 1152 NvTaskbarInh.exe 1152 NvTaskbarInh.exe 1152 NvTaskbarInh.exe 1152 NvTaskbarInh.exe 1152 NvTaskbarInh.exe 1152 NvTaskbarInh.exe 1152 NvTaskbarInh.exe 1152 NvTaskbarInh.exe 1152 NvTaskbarInh.exe 1152 NvTaskbarInh.exe 1152 NvTaskbarInh.exe 1152 NvTaskbarInh.exe 1152 NvTaskbarInh.exe 1152 NvTaskbarInh.exe 1152 NvTaskbarInh.exe 1152 NvTaskbarInh.exe 1152 NvTaskbarInh.exe 1152 NvTaskbarInh.exe 1152 NvTaskbarInh.exe 1152 NvTaskbarInh.exe 1152 NvTaskbarInh.exe 1152 NvTaskbarInh.exe 1152 NvTaskbarInh.exe 1152 NvTaskbarInh.exe 1152 NvTaskbarInh.exe 1152 NvTaskbarInh.exe 1152 NvTaskbarInh.exe 1152 NvTaskbarInh.exe 1152 NvTaskbarInh.exe 1152 NvTaskbarInh.exe 1152 NvTaskbarInh.exe 1152 NvTaskbarInh.exe 1152 NvTaskbarInh.exe 1152 NvTaskbarInh.exe 1152 NvTaskbarInh.exe 1152 NvTaskbarInh.exe 1152 NvTaskbarInh.exe 1152 NvTaskbarInh.exe 1152 NvTaskbarInh.exe 1152 NvTaskbarInh.exe 1152 NvTaskbarInh.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2148 wrote to memory of 2576 2148 f78185d7e35f70d1e9ae88545cfbb3b8_JaffaCakes118.exe 30 PID 2148 wrote to memory of 2576 2148 f78185d7e35f70d1e9ae88545cfbb3b8_JaffaCakes118.exe 30 PID 2148 wrote to memory of 2576 2148 f78185d7e35f70d1e9ae88545cfbb3b8_JaffaCakes118.exe 30 PID 2148 wrote to memory of 2576 2148 f78185d7e35f70d1e9ae88545cfbb3b8_JaffaCakes118.exe 30 PID 2148 wrote to memory of 2576 2148 f78185d7e35f70d1e9ae88545cfbb3b8_JaffaCakes118.exe 30 PID 2148 wrote to memory of 2576 2148 f78185d7e35f70d1e9ae88545cfbb3b8_JaffaCakes118.exe 30 PID 2148 wrote to memory of 2576 2148 f78185d7e35f70d1e9ae88545cfbb3b8_JaffaCakes118.exe 30 PID 2148 wrote to memory of 2348 2148 f78185d7e35f70d1e9ae88545cfbb3b8_JaffaCakes118.exe 31 PID 2148 wrote to memory of 2348 2148 f78185d7e35f70d1e9ae88545cfbb3b8_JaffaCakes118.exe 31 PID 2148 wrote to memory of 2348 2148 f78185d7e35f70d1e9ae88545cfbb3b8_JaffaCakes118.exe 31 PID 2148 wrote to memory of 2348 2148 f78185d7e35f70d1e9ae88545cfbb3b8_JaffaCakes118.exe 31 PID 2148 wrote to memory of 2348 2148 f78185d7e35f70d1e9ae88545cfbb3b8_JaffaCakes118.exe 31 PID 2148 wrote to memory of 2348 2148 f78185d7e35f70d1e9ae88545cfbb3b8_JaffaCakes118.exe 31 PID 2148 wrote to memory of 2348 2148 f78185d7e35f70d1e9ae88545cfbb3b8_JaffaCakes118.exe 31 PID 2348 wrote to memory of 1152 2348 NvTaskbarInh.exe 33 PID 2348 wrote to memory of 1152 2348 NvTaskbarInh.exe 33 PID 2348 wrote to memory of 1152 2348 NvTaskbarInh.exe 33 PID 2348 wrote to memory of 1152 2348 NvTaskbarInh.exe 33 PID 2348 wrote to memory of 1152 2348 NvTaskbarInh.exe 33 PID 2348 wrote to memory of 1152 2348 NvTaskbarInh.exe 33 PID 2348 wrote to memory of 1152 2348 NvTaskbarInh.exe 33 PID 2348 wrote to memory of 1152 2348 NvTaskbarInh.exe 33 PID 2348 wrote to memory of 1152 2348 NvTaskbarInh.exe 33 PID 2348 wrote to memory of 1152 2348 NvTaskbarInh.exe 33 PID 2348 wrote to memory of 1152 2348 NvTaskbarInh.exe 33 PID 2348 wrote to memory of 1152 2348 NvTaskbarInh.exe 33 PID 2348 wrote to memory of 1152 2348 NvTaskbarInh.exe 33 PID 2348 wrote to memory of 1152 2348 NvTaskbarInh.exe 33 PID 1152 wrote to memory of 2620 1152 NvTaskbarInh.exe 34 PID 1152 wrote to memory of 2620 1152 NvTaskbarInh.exe 34 PID 1152 wrote to memory of 2620 1152 NvTaskbarInh.exe 34 PID 1152 wrote to memory of 2620 1152 NvTaskbarInh.exe 34 PID 1152 wrote to memory of 2620 1152 NvTaskbarInh.exe 34 PID 1152 wrote to memory of 2620 1152 NvTaskbarInh.exe 34 PID 1152 wrote to memory of 2620 1152 NvTaskbarInh.exe 34 PID 1152 wrote to memory of 2696 1152 NvTaskbarInh.exe 35 PID 1152 wrote to memory of 2696 1152 NvTaskbarInh.exe 35 PID 1152 wrote to memory of 2696 1152 NvTaskbarInh.exe 35 PID 1152 wrote to memory of 2696 1152 NvTaskbarInh.exe 35 PID 1152 wrote to memory of 2696 1152 NvTaskbarInh.exe 35 PID 1152 wrote to memory of 2696 1152 NvTaskbarInh.exe 35 PID 1152 wrote to memory of 2696 1152 NvTaskbarInh.exe 35 PID 2696 wrote to memory of 628 2696 foxit.exe 36 PID 2696 wrote to memory of 628 2696 foxit.exe 36 PID 2696 wrote to memory of 628 2696 foxit.exe 36 PID 2696 wrote to memory of 628 2696 foxit.exe 36 PID 2696 wrote to memory of 628 2696 foxit.exe 36 PID 2696 wrote to memory of 628 2696 foxit.exe 36 PID 2696 wrote to memory of 628 2696 foxit.exe 36 PID 2620 wrote to memory of 1924 2620 statcvs.exe 37 PID 2620 wrote to memory of 1924 2620 statcvs.exe 37 PID 2620 wrote to memory of 1924 2620 statcvs.exe 37 PID 2620 wrote to memory of 1924 2620 statcvs.exe 37 PID 2620 wrote to memory of 1924 2620 statcvs.exe 37 PID 2620 wrote to memory of 1924 2620 statcvs.exe 37 PID 2620 wrote to memory of 1924 2620 statcvs.exe 37 PID 2620 wrote to memory of 1924 2620 statcvs.exe 37 PID 2620 wrote to memory of 1924 2620 statcvs.exe 37 PID 2620 wrote to memory of 1924 2620 statcvs.exe 37 PID 2620 wrote to memory of 1924 2620 statcvs.exe 37 PID 2620 wrote to memory of 1924 2620 statcvs.exe 37 PID 2620 wrote to memory of 1924 2620 statcvs.exe 37 PID 2620 wrote to memory of 1924 2620 statcvs.exe 37 PID 1924 wrote to memory of 1328 1924 statcvs.exe 38 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NvTaskbarInh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f78185d7e35f70d1e9ae88545cfbb3b8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f78185d7e35f70d1e9ae88545cfbb3b8_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\CWBUITSK.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\CWBUITSK.EXE2⤵
- Executes dropped EXE
PID:2576
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\NvTaskbarInh.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\NvTaskbarInh.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\NvTaskbarInh.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\NvTaskbarInh.exe"3⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1152 -
C:\Windows\SysWOW64\statcvs.exe"C:\Windows\system32\statcvs.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\SysWOW64\statcvs.exe"C:\Windows\SysWOW64\statcvs.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\statcvs.exe"C:\Windows\statcvs.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1328 -
C:\Windows\statcvs.exe"C:\Windows\statcvs.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2456 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵PID:1968
-
-
-
-
-
-
C:\Windows\SysWOW64\foxit.exe"C:\Windows\system32\foxit.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\cfpifsAP.dll",Startup5⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:628 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\cfpifsAP.dll",iep6⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1980
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD51ec9daf45844cd7b6740ecf3b60ff0d4
SHA1f7e3583eb5cd9f014614ed5f30ae9b6eb5597ef9
SHA25685258219117d091659af9e7b28f4aca677c18eb2a962c27a92d9550f79325045
SHA512d3f5aea8572cc670f5cf7843369a1129851d6c2d832acf14b012a9d635a63883e29ae7b8204696d41332f112c6f178c8aee905fa561329c3a4adb0e96527f4bc
-
Filesize
962KB
MD55988f5eea2e0f6275a0f4232b4386bf9
SHA10d4352fa00586ca07c2a8238b0ab0b5a5e2aced2
SHA256c9bd30a42eedcf7e96088925f13ea4c4741d0ce5d8cdc9c1a033bd81a49164b6
SHA5126f29ac43baf202dfa802a7d4d9f12b55aa5f838fe342ac1638377e9bb12d915c4c29a974cc22776b63ec989d2d4915a32b0a6d15943d6c9bbb746828e8772fba
-
Filesize
78KB
MD53cd79b8e7d198f5fcff729911a0c0b42
SHA1053449f4b2c64dd4c7134b1d0b63c680b5c8b674
SHA2566f99507bbcc36a1f4cad50821dc65d8cead470b8f94b514b0440cabb4fb8afcd
SHA5126f800b7ae774957c251965af1ea2c26d67329dfee9ecd599025c9b3aaa2d6b6b8e204947f2e3f166a4b067f306e57e6deaf05e66c7a0532d969098e6ce707661
-
Filesize
78KB
MD5ff68d7e9435a7195144c09dc1d6c3fc0
SHA1dca962999faa110e44c0fe4f0aceeebcb740eb44
SHA256cd9ae5c0ef4a2447fec3944131e925babe6ed4ffaf9b69fdfc2153e7d4ced758
SHA5128ccab41fdf23ed30548420fc0ac98427866467e1ba474b112c92a9185ebae90f42ee91388ab69157a3dab8975e19c47df158022609cc4d9df36be96ca8074941
-
Filesize
411KB
MD5eaf07a44a7dcab1d1614e82518d93b67
SHA1c1742c8e1f6869568c45a4791ef61e0ab8f0c41d
SHA2566a00dd21ad5c795c9ebce734c58005dbd2a08d55035acbc622e29249fb4cec5b
SHA51260c642daae05bc4de105db5471ae05caacf4d5079e733d5b975c6573f5ca82f4e7b83398e9ef029ffd5a837562bbac499dcb30f6db7a64efa6339e53fa2f2604