Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-01-2025 17:38
Behavioral task
behavioral1
Sample
JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe
-
Size
740KB
-
MD5
7af578439c23caca854aa5a5519c1a30
-
SHA1
d3af78f2885ecc390cc74fd4e63b8abae9644772
-
SHA256
5d5bb2ad4bbb98e74dc68cb02e46d82c0a44996434fdad66b0cfcf500bed786f
-
SHA512
8d97215f7bd107bdba9d1444048573a96855b479a9b2b05cd776c463b593aa722e2c90d94c889b0cf34fbabc04b1475e42bd6fdb4c0073cd23ec0bc5a71ef145
-
SSDEEP
12288:qUc6SBLLTSEgBAnhc1kG1PaGLX/0lIxDa+Y2:b2BLHSn6q1vPaGLX/QIxDaU
Malware Config
Signatures
-
Detect Neshta payload 3 IoCs
resource yara_rule behavioral1/files/0x0001000000010314-10.dat family_neshta behavioral1/memory/3060-437-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/3060-547-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Ramnit family
-
Executes dropped EXE 3 IoCs
pid Process 772 JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe 1672 JaffaCakes118_7af578439c23caca854aa5a5519c1a30Srv.exe 2752 DesktopLayer.exe -
Loads dropped DLL 10 IoCs
pid Process 3060 JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe 772 JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe 1672 JaffaCakes118_7af578439c23caca854aa5a5519c1a30Srv.exe 2364 WerFault.exe 2364 WerFault.exe 2364 WerFault.exe 2364 WerFault.exe 2364 WerFault.exe 3060 JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe 3060 JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/files/0x00080000000162e4-2.dat upx behavioral1/memory/772-15-0x0000000000400000-0x000000000050E000-memory.dmp upx behavioral1/files/0x00080000000164de-13.dat upx behavioral1/memory/1672-19-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2752-33-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/772-35-0x0000000000400000-0x000000000050E000-memory.dmp upx behavioral1/memory/2752-31-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1672-22-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORE.EXE JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe File opened for modification C:\PROGRA~2\WINDOW~4\ImagingDevices.exe JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Resource\Icons\SC_REA~1.EXE JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\TextConv\WksConv\Wkconv.exe JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~2.EXE JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOF5E2~1.EXE JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe JaffaCakes118_7af578439c23caca854aa5a5519c1a30Srv.exe File opened for modification C:\PROGRA~2\COMMON~1\ADOBEA~1\Versions\1.0\ADOBEA~1.EXE JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\Oarpmany.exe JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpshare.exe JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\Eula.exe JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\ink\mip.exe JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXE JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CNFNOT32.EXE JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GRAPH.EXE JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe File opened for modification C:\PROGRA~2\WINDOW~2\ACCESS~1\wordpad.exe JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe File opened for modification C:\Program Files (x86)\Microsoft\px9C20.tmp JaffaCakes118_7af578439c23caca854aa5a5519c1a30Srv.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\Setup.exe JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTE.EXE JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\SELFCERT.EXE JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\XLICONS.EXE JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\BCSSync.exe JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe File opened for modification C:\PROGRA~2\WINDOW~1\wab.exe JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe File opened for modification C:\PROGRA~2\WI54FB~1\WMPDMC.exe JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\ODeploy.exe JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOUC.EXE JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmlaunch.exe JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpconfig.exe JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\SOURCE~1\OSE.EXE JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXE JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\misc.exe JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WINWORD.EXE JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ACROBR~1.EXE JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DWTRIG20.EXE JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\1033\ONELEV.EXE JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\IECONT~1.EXE JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\EQUATION\EQNEDT32.EXE JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOHTMED.EXE JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WORDICON.EXE JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\SETUPF~1\{AC76B~1\Setup.exe JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~1.EXE JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe File opened for modification C:\PROGRA~2\MIE74D~1\DESKTO~1.EXE JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ACCICONS.EXE JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOSYNC.EXE JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~3.EXE JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORDB.EXE JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2364 772 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_7af578439c23caca854aa5a5519c1a30Srv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DesktopLayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "442174209" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C8E85C01-CAC2-11EF-9D9B-465533733A50} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2752 DesktopLayer.exe 2752 DesktopLayer.exe 2752 DesktopLayer.exe 2752 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2860 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2860 iexplore.exe 2860 iexplore.exe 2640 IEXPLORE.EXE 2640 IEXPLORE.EXE 2640 IEXPLORE.EXE 2640 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 3060 wrote to memory of 772 3060 JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe 30 PID 3060 wrote to memory of 772 3060 JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe 30 PID 3060 wrote to memory of 772 3060 JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe 30 PID 3060 wrote to memory of 772 3060 JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe 30 PID 772 wrote to memory of 1672 772 JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe 31 PID 772 wrote to memory of 1672 772 JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe 31 PID 772 wrote to memory of 1672 772 JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe 31 PID 772 wrote to memory of 1672 772 JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe 31 PID 772 wrote to memory of 2364 772 JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe 32 PID 772 wrote to memory of 2364 772 JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe 32 PID 772 wrote to memory of 2364 772 JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe 32 PID 772 wrote to memory of 2364 772 JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe 32 PID 1672 wrote to memory of 2752 1672 JaffaCakes118_7af578439c23caca854aa5a5519c1a30Srv.exe 33 PID 1672 wrote to memory of 2752 1672 JaffaCakes118_7af578439c23caca854aa5a5519c1a30Srv.exe 33 PID 1672 wrote to memory of 2752 1672 JaffaCakes118_7af578439c23caca854aa5a5519c1a30Srv.exe 33 PID 1672 wrote to memory of 2752 1672 JaffaCakes118_7af578439c23caca854aa5a5519c1a30Srv.exe 33 PID 2752 wrote to memory of 2860 2752 DesktopLayer.exe 34 PID 2752 wrote to memory of 2860 2752 DesktopLayer.exe 34 PID 2752 wrote to memory of 2860 2752 DesktopLayer.exe 34 PID 2752 wrote to memory of 2860 2752 DesktopLayer.exe 34 PID 2860 wrote to memory of 2640 2860 iexplore.exe 35 PID 2860 wrote to memory of 2640 2860 iexplore.exe 35 PID 2860 wrote to memory of 2640 2860 iexplore.exe 35 PID 2860 wrote to memory of 2640 2860 iexplore.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Users\Admin\AppData\Local\Temp\3582-490\JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\JaffaCakes118_7af578439c23caca854aa5a5519c1a30.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Users\Admin\AppData\Local\Temp\3582-490\JaffaCakes118_7af578439c23caca854aa5a5519c1a30Srv.exeC:\Users\Admin\AppData\Local\Temp\3582-490\JaffaCakes118_7af578439c23caca854aa5a5519c1a30Srv.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2860 CREDAT:275457 /prefetch:26⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2640
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 772 -s 2003⤵
- Loads dropped DLL
- Program crash
PID:2364
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
547KB
MD5cf6c595d3e5e9667667af096762fd9c4
SHA19bb44da8d7f6457099cb56e4f7d1026963dce7ce
SHA256593e60cc30ae0789448547195af77f550387f6648d45847ea244dd0dd7abf03d
SHA512ff4f789df9e6a6d0fbe12b3250f951fcf11e857906c65e96a30bb46266e7e1180d6103a03db2f3764e0d1346b2de7afba8259ba080057e4a268e45e8654dfa80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d90348ce63bba8fdf36d4944527824e
SHA14018a0ed2c02dc439d105daba64db36527686e93
SHA2562859bccd10bbbd37ec4ba63a2812d6833f9a371e4c3dc7bb1ec527cd80c1e3f6
SHA5121f77c03d2a4bc987539cef8ed61a50d4d2bcb5905ba4b5554f8f1c63a9ecded86fd751bd3a8b53505e14dd9fc5d98ac1b0e6efcc2a7f4eeb4669eb76f3be7f06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e22b81a688b2335dd7cea9a02dab681b
SHA12d702ceb1f37013ef14ad5afa4bee269d01f099e
SHA2567237b8234bb226b7f5580e63a198e4fb51cb6edee897055e446447b93cc32242
SHA51217883c616431854389b3964c2e2eae098060221323d837cfce16527b8d13d40330a3259f8c3872fab07482d2631eed01e6c278f51c061fe46106704d104615e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfc751ccd1cd878eb4e4d51e1e90a410
SHA1a170104e31362410009d70adb0b79c7ee2e675c9
SHA25687f6fa2fbc3af3b958c63a53889bde562301bd341f8e55a68ef83b23a5b314ee
SHA5126a6d0536f2d4a2e72ca09f49f9da267d0ecb12d27c32ea8432b3a1a9301ffd743b8efc7b9118556d515488c4a4240d92f9a345b00d559b7728830cb0c9e38c21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5877fae542430f21c0bdc34fbad223cd6
SHA14f58246625c391ac327fe8f339c57bb016bc7a8b
SHA2568b4e2d801d1d9fd417639f85cd153b13572a2cdc216bed02d2d969d3b74fb22d
SHA51238f0e973a3c06a6df8ebe9e67189813a23ed53fb7d4e129ef771328ddf0894762a92c4de49743e7579301cd5b6b90b75d866567e321a443f4250c30c80b6b9e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bdf5daee1f80a9d7ea07c839628320a
SHA1d63f04d5dc506a8517b29d3eacfbc756a5df3792
SHA2566b609e22a8186d2d5dbfa8bc605fe4528d35875ef358ae4fc57ba5f58b9dbf23
SHA512a12dcb689f4498bbdc93e7c3b4cbb7079fc17e2fdee89b38b46d2b92235a74133905d8faa0eafb49dac78368400facc878ddd941cf3ff4defdb5e487b7641251
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5928b7de44e1fd15c9d9bdad1fd03e8be
SHA1ba449b4775fd47f4b299aefd8034cf6637dd236a
SHA2561a67eb9d5c3ebc516a2157369f7697e6a6dd6fc08a51f868f8fe6d4c6042ab86
SHA512fc5b2878b5f2de9a998b64a0d5871c66b66e016b078a94aa2cc02ec87ed6ec3633e4c75d653950837e586cbc8b7dcaf70c9df4e6aba4b2e28d7c5cd33a2d3793
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5572b5f364f7149144bf64f83f7d2f96d
SHA1a937b920273ec44de5d5362637aa2eb5a5fa9547
SHA256ce5ba47ec261989752a4d685679097572b05ddf5f67aee1f0e3105df1ff5dbf8
SHA512615aac01e57b37d8339b084a23e7572b7d4a9524186113c44b90e92c989e0233657b9a81baac1d6e530f036eb05b7339fb1826e0a69be3f1aa9ffccccf1df962
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f5587e7a1d3d2d559d5cea726a4fd83
SHA135f99d042978a91e276c0048e5d3df6178a502bd
SHA25602be2a1e63ac4fd9ac3d77bf44c832221537e4df53195c429b8b7c4712bfd9c6
SHA5121873569360c93fa2fbf031062ed0e89a348c04b0cbd256f79ec729ecef3b1fa93756de68172243dd6cb3bf19c0a116825278252c71bd70c0d0491c6471aabf83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d10f40ffd9283ee512b29e5803ab74db
SHA13c310a8ba18e7f3b7f063dd57d4eed60d7451605
SHA256e919e66da04e3c38d814b314d37bb94e82ce2bed102b65766d477465bde1d3d9
SHA512a61b85b608d469cce7d1417b590a3889c3f54c8e4aa03275ed548cf4f4ea6cb7b0f92468d5aefa4b26a3b5586d9605aa924fa47904fa836564177f6573e6d984
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53467fe07a7adfb886fc381638707b1fb
SHA1217e16bd018eb43e7257fe26ce3f502ddc44e0a0
SHA256face08fb740134079b429ec0ff56f9b0676e4aa2a59fcd813c34c99df33d5848
SHA512b24e53fc0cc04f76ff2bacae197e74bcbe1b9fec7c2e483aefde2dc5dfc1b8edd4550b0911ad6951df90963cc1ee4126d06d5b3bed657505f3c08f32b99abff3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c3cd211fe48e06b72c41efc28ae628d
SHA1f25c74af934327e1bdea595e277eff0031b453d4
SHA256467e3b2f50638f508976f6baa376c296ac9d9bf0b1b17aaa2d31cbfe5bf72105
SHA51244f045c8bbc1534f018c1711d457f4fedd7c4e317e3aece0e9309a05f23e1e991044406cc2af3c30a28d218109d0044291931196f88791759426ea236f8a8d79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1a7fe570fadb56ab2f16759586e6b26
SHA1760b5a5e2aab5d0bdc980229aa5702c516be2719
SHA256da6add1971b1283181c7282cdbcf243b19b4d31b049c37e95c0f31b431cf051e
SHA5121ac1857cd30aa7438e527a872ecb6ef7138cca407aa5206f6388a094e4e71554de2d942e41d312de128c13dd5df3bbd3a44f26ac2055755320466b7d71173d31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566884e3f059dc16216d1732c2a448acf
SHA18a9076045938cd83e399510b36558da8002c669e
SHA25669abdece19bcc2c500b0ddbc292acb97125f06b4d76bccf1c9d0c182b0fa8c57
SHA512c54d51159663124b2416cb7562e8c38580bff6d576c7d5221dfb3f90effc9d109ec666cbcde4a96e1d831a1eea12d45b17438fbf80d6e21ccdc65d9ed95f6168
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5698ea18e2534df146363ec3b6df2b42c
SHA1786e2baf008ac4646c605ff2be5e37e2dee175f1
SHA25658e599316184314d76e1786e2502ea0e668baf7bb06501fc5df3e6270e2d7753
SHA5123e64429943ec6695c1c5a08a7b5c48e7f4179b2f33b7c0c85926139b0267cb4d205a44b3ef8d96fe2f1e4b160c18e5909f077e0e9099964d5f0962791ad98ac0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2e92712c3fdcc292da2907e326be51e
SHA17da76e54929a5ba39e30e8705d83866372317cdc
SHA256ebb6a4cfd5dcd6e11f50e0dfef87096be341a53d36e1daef23aae41c58d2d296
SHA512c63f83355e926067baa863298979afd830cd600b1b8ecc4609fd1001fccfc3054ae2a60482232800f720cfea8f5dd3e24c08b5a6cf0b1342845e70021709c89b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b8fb898ecaa5321fcf2f15b4cad9f2c
SHA14e2a43c864b757e0e7e18b4bd3d2a114ddba079c
SHA25629b7864bc3074acfc193b463469c07aeb8c618b527c1833b2926e383d416c2af
SHA51216054c683732cdd692cac3429791a180b2ca0f526d847305d4c922629def875653af6acad57cd3dedf4d880d9fc8c5d84598e0654bbee414137b8c0cc9336568
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c19dfd59939c37ca4d80a6a28dea57dd
SHA10fa78aa2de7dbe7e0c344f6ff27f27c252bbcc96
SHA256900932ce04fcacc6e85aa98026618b46a6bb9f8cc602f30f085e00e89523c445
SHA512c71f2b781aef19b20c7e8c972ae45b32ba5643604478f7bea5aef514ac3bfc25f8be3930ea2eea82fe48ecaec12923522ad7be22d8c66f636c7612dd61a9612d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525ad40a56046e3f0f3a69b0075314e71
SHA1efd9983fd2f61c022eaaff957fd78b9e9190ecfe
SHA25653d6e5f01fa1e6c05c38a630ebd952597a5bbc0976dde6d9b238421e212cb9db
SHA51205cc37520d9aef49f35c47f3340a863e257c5e0fe39ed80119325c604b4326f563cd29c913dfd0ed29b29c685579c8e85cec414961aab27a5134dd4089074421
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
252KB
MD59e2b9928c89a9d0da1d3e8f4bd96afa7
SHA1ec66cda99f44b62470c6930e5afda061579cde35
SHA2568899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043
SHA5122ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156
-
Filesize
699KB
MD54c586576edfde173d60c344d8ea45642
SHA186fd9c94839ccb7ae2b9192635cc9851b3c9ec84
SHA256f3cabf8053c0d51be2309b06164c37cf4e6eb70f19f82b05e41514deff1b5e7e
SHA5126281e009239fe7a321b9eb17975b885c158761dbcbeeee5065c55592dbd1c3d27a001d262e62bcfcb312f27d4dbff39b2287b7268b96fc09dcbe1b41ab11c84b
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a