Analysis
-
max time kernel
149s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23/01/2025, 14:18 UTC
Behavioral task
behavioral1
Sample
JaffaCakes118_180db7e810bf0f1117487007f0ef09b8.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_180db7e810bf0f1117487007f0ef09b8.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_180db7e810bf0f1117487007f0ef09b8.exe
-
Size
875KB
-
MD5
180db7e810bf0f1117487007f0ef09b8
-
SHA1
149e8a5bbd67e5d9072ebc8a6f96d452c10a1c03
-
SHA256
bac2bab7e7613b445d7f815a1cc8184747862821f82c29a8fbb6308a1f99bae6
-
SHA512
e24797226dbc342765cb3c9b7b16f3ea8bf3a33db97ef7df2b91f56555570de5f7ca144ced81f5a91660d6d33d8a618c8ce5c73e39c66f2bc81ed5a56aa5804a
-
SSDEEP
24576:B5T0kUJQzdHVFQlyOW8oooiAhYJWtA7q:B53UoHVFQAp5iAOgtAG
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 2 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2168-153-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot behavioral1/memory/1344-165-0x0000000000400000-0x000000000046B000-memory.dmp family_cycbot -
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" cthost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" bphis.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" Ww9OoYLk.exe -
Modiloader family
-
Pony family
-
ModiLoader Second Stage 9 IoCs
resource yara_rule behavioral1/memory/1576-9-0x0000000000400000-0x000000000041F000-memory.dmp modiloader_stage2 behavioral1/memory/2284-15-0x0000000000400000-0x0000000000535000-memory.dmp modiloader_stage2 behavioral1/memory/2284-12-0x0000000000400000-0x0000000000535000-memory.dmp modiloader_stage2 behavioral1/files/0x000900000001878d-43.dat modiloader_stage2 behavioral1/memory/2556-66-0x0000000000400000-0x000000000041E000-memory.dmp modiloader_stage2 behavioral1/files/0x00060000000191fd-70.dat modiloader_stage2 behavioral1/memory/916-88-0x0000000000400000-0x000000000041E000-memory.dmp modiloader_stage2 behavioral1/memory/2284-105-0x0000000000400000-0x0000000000535000-memory.dmp modiloader_stage2 behavioral1/memory/2284-354-0x0000000000400000-0x0000000000535000-memory.dmp modiloader_stage2 -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Deletes itself 1 IoCs
pid Process 2324 cmd.exe -
Executes dropped EXE 13 IoCs
pid Process 2356 Ww9OoYLk.exe 2668 bphis.exe 2556 athost.exe 2924 athost.exe 916 bthost.exe 1156 bthost.exe 1344 cthost.exe 1808 dthost.exe 336 csrss.exe 2168 cthost.exe 2312 ethost.exe 2764 cthost.exe 2144 760A.tmp -
Loads dropped DLL 19 IoCs
pid Process 2284 JaffaCakes118_180db7e810bf0f1117487007f0ef09b8.exe 2284 JaffaCakes118_180db7e810bf0f1117487007f0ef09b8.exe 2356 Ww9OoYLk.exe 2356 Ww9OoYLk.exe 2284 JaffaCakes118_180db7e810bf0f1117487007f0ef09b8.exe 2284 JaffaCakes118_180db7e810bf0f1117487007f0ef09b8.exe 2284 JaffaCakes118_180db7e810bf0f1117487007f0ef09b8.exe 2284 JaffaCakes118_180db7e810bf0f1117487007f0ef09b8.exe 2284 JaffaCakes118_180db7e810bf0f1117487007f0ef09b8.exe 2284 JaffaCakes118_180db7e810bf0f1117487007f0ef09b8.exe 2284 JaffaCakes118_180db7e810bf0f1117487007f0ef09b8.exe 2284 JaffaCakes118_180db7e810bf0f1117487007f0ef09b8.exe 1344 cthost.exe 1020 DllHost.exe 2284 JaffaCakes118_180db7e810bf0f1117487007f0ef09b8.exe 2284 JaffaCakes118_180db7e810bf0f1117487007f0ef09b8.exe 1344 cthost.exe 1344 cthost.exe 2144 760A.tmp -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 54 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\bphis = "C:\\Users\\Admin\\bphis.exe /E" bphis.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\bphis = "C:\\Users\\Admin\\bphis.exe /R" bphis.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\bphis = "C:\\Users\\Admin\\bphis.exe /P" bphis.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\bphis = "C:\\Users\\Admin\\bphis.exe /T" bphis.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\bphis = "C:\\Users\\Admin\\bphis.exe /Q" bphis.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\bphis = "C:\\Users\\Admin\\bphis.exe /M" bphis.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\bphis = "C:\\Users\\Admin\\bphis.exe /D" bphis.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\bphis = "C:\\Users\\Admin\\bphis.exe /G" bphis.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\bphis = "C:\\Users\\Admin\\bphis.exe /z" bphis.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\bphis = "C:\\Users\\Admin\\bphis.exe /B" bphis.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\bphis = "C:\\Users\\Admin\\bphis.exe /c" bphis.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\bphis = "C:\\Users\\Admin\\bphis.exe /C" bphis.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\bphis = "C:\\Users\\Admin\\bphis.exe /u" bphis.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\bphis = "C:\\Users\\Admin\\bphis.exe /f" bphis.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\bphis = "C:\\Users\\Admin\\bphis.exe /l" bphis.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\bphis = "C:\\Users\\Admin\\bphis.exe /U" bphis.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\bphis = "C:\\Users\\Admin\\bphis.exe /q" bphis.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\bphis = "C:\\Users\\Admin\\bphis.exe /s" bphis.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\bphis = "C:\\Users\\Admin\\bphis.exe /y" bphis.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\bphis = "C:\\Users\\Admin\\bphis.exe /x" bphis.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\bphis = "C:\\Users\\Admin\\bphis.exe /L" bphis.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\bphis = "C:\\Users\\Admin\\bphis.exe /W" bphis.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\bphis = "C:\\Users\\Admin\\bphis.exe /F" bphis.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\bphis = "C:\\Users\\Admin\\bphis.exe /Z" bphis.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\bphis = "C:\\Users\\Admin\\bphis.exe /Y" bphis.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\bphis = "C:\\Users\\Admin\\bphis.exe /n" bphis.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\bphis = "C:\\Users\\Admin\\bphis.exe /j" bphis.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\bphis = "C:\\Users\\Admin\\bphis.exe /d" bphis.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\bphis = "C:\\Users\\Admin\\bphis.exe /V" bphis.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\bphis = "C:\\Users\\Admin\\bphis.exe /H" bphis.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\bphis = "C:\\Users\\Admin\\bphis.exe /i" bphis.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\bphis = "C:\\Users\\Admin\\bphis.exe /X" bphis.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\bphis = "C:\\Users\\Admin\\bphis.exe /S" bphis.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\bphis = "C:\\Users\\Admin\\bphis.exe /k" bphis.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\933.exe = "C:\\Program Files (x86)\\LP\\2315\\933.exe" cthost.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\bphis = "C:\\Users\\Admin\\bphis.exe /b" bphis.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\bphis = "C:\\Users\\Admin\\bphis.exe /A" bphis.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\bphis = "C:\\Users\\Admin\\bphis.exe /K" bphis.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\bphis = "C:\\Users\\Admin\\bphis.exe /J" bphis.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\bphis = "C:\\Users\\Admin\\bphis.exe /N" bphis.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\bphis = "C:\\Users\\Admin\\bphis.exe /p" bphis.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\bphis = "C:\\Users\\Admin\\bphis.exe /w" bphis.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\bphis = "C:\\Users\\Admin\\bphis.exe /a" bphis.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\bphis = "C:\\Users\\Admin\\bphis.exe /m" bphis.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\bphis = "C:\\Users\\Admin\\bphis.exe /E" Ww9OoYLk.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\bphis = "C:\\Users\\Admin\\bphis.exe /h" bphis.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\bphis = "C:\\Users\\Admin\\bphis.exe /v" bphis.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\bphis = "C:\\Users\\Admin\\bphis.exe /O" bphis.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\bphis = "C:\\Users\\Admin\\bphis.exe /t" bphis.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\bphis = "C:\\Users\\Admin\\bphis.exe /I" bphis.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\bphis = "C:\\Users\\Admin\\bphis.exe /g" bphis.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\bphis = "C:\\Users\\Admin\\bphis.exe /r" bphis.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\bphis = "C:\\Users\\Admin\\bphis.exe /e" bphis.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\bphis = "C:\\Users\\Admin\\bphis.exe /o" bphis.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created \systemroot\assembly\GAC_64\Desktop.ini csrss.exe File created \systemroot\assembly\GAC_32\Desktop.ini csrss.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum bthost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 bthost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum athost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 athost.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 2632 tasklist.exe 2432 tasklist.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1576 set thread context of 2284 1576 JaffaCakes118_180db7e810bf0f1117487007f0ef09b8.exe 31 PID 2556 set thread context of 2924 2556 athost.exe 39 PID 916 set thread context of 1156 916 bthost.exe 41 PID 1808 set thread context of 2220 1808 dthost.exe 45 -
resource yara_rule behavioral1/memory/2284-15-0x0000000000400000-0x0000000000535000-memory.dmp upx behavioral1/memory/2284-11-0x0000000000400000-0x0000000000535000-memory.dmp upx behavioral1/memory/2284-3-0x0000000000400000-0x0000000000535000-memory.dmp upx behavioral1/memory/2284-12-0x0000000000400000-0x0000000000535000-memory.dmp upx behavioral1/memory/2284-2-0x0000000000400000-0x0000000000535000-memory.dmp upx behavioral1/memory/2284-8-0x0000000000400000-0x0000000000535000-memory.dmp upx behavioral1/memory/1156-93-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1156-92-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1156-91-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1156-86-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1156-82-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1156-80-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2284-105-0x0000000000400000-0x0000000000535000-memory.dmp upx behavioral1/memory/2168-153-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1344-165-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2284-354-0x0000000000400000-0x0000000000535000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\LP\2315\933.exe cthost.exe File opened for modification C:\Program Files (x86)\LP\2315\760A.tmp cthost.exe File opened for modification C:\Program Files (x86)\LP\2315\933.exe cthost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 17 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dthost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cthost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ethost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 760A.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_180db7e810bf0f1117487007f0ef09b8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language athost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cthost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cthost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_180db7e810bf0f1117487007f0ef09b8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bphis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ww9OoYLk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bthost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_Classes\Local Settings explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2356 Ww9OoYLk.exe 2356 Ww9OoYLk.exe 2924 athost.exe 2924 athost.exe 2924 athost.exe 1156 bthost.exe 2668 bphis.exe 1344 cthost.exe 1344 cthost.exe 1344 cthost.exe 1344 cthost.exe 1344 cthost.exe 1344 cthost.exe 2668 bphis.exe 2668 bphis.exe 2668 bphis.exe 1808 dthost.exe 1808 dthost.exe 1808 dthost.exe 2668 bphis.exe 2668 bphis.exe 2668 bphis.exe 2924 athost.exe 2924 athost.exe 2668 bphis.exe 2668 bphis.exe 2668 bphis.exe 2668 bphis.exe 2668 bphis.exe 2668 bphis.exe 2668 bphis.exe 2924 athost.exe 2924 athost.exe 2668 bphis.exe 2668 bphis.exe 2668 bphis.exe 2668 bphis.exe 2668 bphis.exe 2668 bphis.exe 2668 bphis.exe 2668 bphis.exe 2924 athost.exe 2924 athost.exe 2668 bphis.exe 2668 bphis.exe 2668 bphis.exe 2668 bphis.exe 2668 bphis.exe 2668 bphis.exe 2668 bphis.exe 2924 athost.exe 2924 athost.exe 2668 bphis.exe 2668 bphis.exe 2668 bphis.exe 2668 bphis.exe 2668 bphis.exe 2668 bphis.exe 2668 bphis.exe 2668 bphis.exe 2924 athost.exe 2924 athost.exe 2668 bphis.exe 2668 bphis.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3064 explorer.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2632 tasklist.exe Token: SeRestorePrivilege 1992 msiexec.exe Token: SeTakeOwnershipPrivilege 1992 msiexec.exe Token: SeSecurityPrivilege 1992 msiexec.exe Token: SeDebugPrivilege 1808 dthost.exe Token: SeDebugPrivilege 1808 dthost.exe Token: SeShutdownPrivilege 3064 explorer.exe Token: SeShutdownPrivilege 3064 explorer.exe Token: SeShutdownPrivilege 3064 explorer.exe Token: SeShutdownPrivilege 3064 explorer.exe Token: SeShutdownPrivilege 3064 explorer.exe Token: SeShutdownPrivilege 3064 explorer.exe Token: SeShutdownPrivilege 3064 explorer.exe Token: SeShutdownPrivilege 3064 explorer.exe Token: SeShutdownPrivilege 3064 explorer.exe Token: SeShutdownPrivilege 3064 explorer.exe Token: SeShutdownPrivilege 3064 explorer.exe Token: SeShutdownPrivilege 3064 explorer.exe Token: SeDebugPrivilege 2432 tasklist.exe Token: SeAssignPrimaryTokenPrivilege 828 svchost.exe Token: SeIncreaseQuotaPrivilege 828 svchost.exe Token: SeSecurityPrivilege 828 svchost.exe Token: SeTakeOwnershipPrivilege 828 svchost.exe Token: SeLoadDriverPrivilege 828 svchost.exe Token: SeSystemtimePrivilege 828 svchost.exe Token: SeBackupPrivilege 828 svchost.exe Token: SeRestorePrivilege 828 svchost.exe Token: SeShutdownPrivilege 828 svchost.exe Token: SeSystemEnvironmentPrivilege 828 svchost.exe Token: SeUndockPrivilege 828 svchost.exe Token: SeManageVolumePrivilege 828 svchost.exe Token: SeAssignPrimaryTokenPrivilege 828 svchost.exe Token: SeIncreaseQuotaPrivilege 828 svchost.exe Token: SeSecurityPrivilege 828 svchost.exe Token: SeTakeOwnershipPrivilege 828 svchost.exe Token: SeLoadDriverPrivilege 828 svchost.exe Token: SeSystemtimePrivilege 828 svchost.exe Token: SeBackupPrivilege 828 svchost.exe Token: SeRestorePrivilege 828 svchost.exe Token: SeShutdownPrivilege 828 svchost.exe Token: SeSystemEnvironmentPrivilege 828 svchost.exe Token: SeUndockPrivilege 828 svchost.exe Token: SeManageVolumePrivilege 828 svchost.exe Token: SeAssignPrimaryTokenPrivilege 828 svchost.exe Token: SeIncreaseQuotaPrivilege 828 svchost.exe Token: SeSecurityPrivilege 828 svchost.exe Token: SeTakeOwnershipPrivilege 828 svchost.exe Token: SeLoadDriverPrivilege 828 svchost.exe Token: SeSystemtimePrivilege 828 svchost.exe Token: SeBackupPrivilege 828 svchost.exe Token: SeRestorePrivilege 828 svchost.exe Token: SeShutdownPrivilege 828 svchost.exe Token: SeSystemEnvironmentPrivilege 828 svchost.exe Token: SeUndockPrivilege 828 svchost.exe Token: SeManageVolumePrivilege 828 svchost.exe Token: SeAssignPrimaryTokenPrivilege 828 svchost.exe Token: SeIncreaseQuotaPrivilege 828 svchost.exe Token: SeSecurityPrivilege 828 svchost.exe Token: SeTakeOwnershipPrivilege 828 svchost.exe Token: SeLoadDriverPrivilege 828 svchost.exe Token: SeSystemtimePrivilege 828 svchost.exe Token: SeBackupPrivilege 828 svchost.exe Token: SeRestorePrivilege 828 svchost.exe Token: SeShutdownPrivilege 828 svchost.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 3064 explorer.exe 3064 explorer.exe 3064 explorer.exe 3064 explorer.exe 3064 explorer.exe 3064 explorer.exe 3064 explorer.exe 3064 explorer.exe 3064 explorer.exe 3064 explorer.exe 3064 explorer.exe 3064 explorer.exe 3064 explorer.exe 3064 explorer.exe 3064 explorer.exe 3064 explorer.exe 3064 explorer.exe 3064 explorer.exe 3064 explorer.exe 3064 explorer.exe 3064 explorer.exe 3064 explorer.exe 3064 explorer.exe 3064 explorer.exe 3064 explorer.exe 3064 explorer.exe 3064 explorer.exe 3064 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 3064 explorer.exe 3064 explorer.exe 3064 explorer.exe 3064 explorer.exe 3064 explorer.exe 3064 explorer.exe 3064 explorer.exe 3064 explorer.exe 3064 explorer.exe 3064 explorer.exe 3064 explorer.exe 3064 explorer.exe 3064 explorer.exe 3064 explorer.exe 3064 explorer.exe 3064 explorer.exe 3064 explorer.exe 3064 explorer.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2284 JaffaCakes118_180db7e810bf0f1117487007f0ef09b8.exe 2356 Ww9OoYLk.exe 2668 bphis.exe 2312 ethost.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 336 csrss.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1576 wrote to memory of 2284 1576 JaffaCakes118_180db7e810bf0f1117487007f0ef09b8.exe 31 PID 1576 wrote to memory of 2284 1576 JaffaCakes118_180db7e810bf0f1117487007f0ef09b8.exe 31 PID 1576 wrote to memory of 2284 1576 JaffaCakes118_180db7e810bf0f1117487007f0ef09b8.exe 31 PID 1576 wrote to memory of 2284 1576 JaffaCakes118_180db7e810bf0f1117487007f0ef09b8.exe 31 PID 1576 wrote to memory of 2284 1576 JaffaCakes118_180db7e810bf0f1117487007f0ef09b8.exe 31 PID 1576 wrote to memory of 2284 1576 JaffaCakes118_180db7e810bf0f1117487007f0ef09b8.exe 31 PID 1576 wrote to memory of 2284 1576 JaffaCakes118_180db7e810bf0f1117487007f0ef09b8.exe 31 PID 1576 wrote to memory of 2284 1576 JaffaCakes118_180db7e810bf0f1117487007f0ef09b8.exe 31 PID 2284 wrote to memory of 2356 2284 JaffaCakes118_180db7e810bf0f1117487007f0ef09b8.exe 32 PID 2284 wrote to memory of 2356 2284 JaffaCakes118_180db7e810bf0f1117487007f0ef09b8.exe 32 PID 2284 wrote to memory of 2356 2284 JaffaCakes118_180db7e810bf0f1117487007f0ef09b8.exe 32 PID 2284 wrote to memory of 2356 2284 JaffaCakes118_180db7e810bf0f1117487007f0ef09b8.exe 32 PID 2356 wrote to memory of 2668 2356 Ww9OoYLk.exe 33 PID 2356 wrote to memory of 2668 2356 Ww9OoYLk.exe 33 PID 2356 wrote to memory of 2668 2356 Ww9OoYLk.exe 33 PID 2356 wrote to memory of 2668 2356 Ww9OoYLk.exe 33 PID 2356 wrote to memory of 2812 2356 Ww9OoYLk.exe 34 PID 2356 wrote to memory of 2812 2356 Ww9OoYLk.exe 34 PID 2356 wrote to memory of 2812 2356 Ww9OoYLk.exe 34 PID 2356 wrote to memory of 2812 2356 Ww9OoYLk.exe 34 PID 2812 wrote to memory of 2632 2812 cmd.exe 36 PID 2812 wrote to memory of 2632 2812 cmd.exe 36 PID 2812 wrote to memory of 2632 2812 cmd.exe 36 PID 2812 wrote to memory of 2632 2812 cmd.exe 36 PID 2284 wrote to memory of 2556 2284 JaffaCakes118_180db7e810bf0f1117487007f0ef09b8.exe 38 PID 2284 wrote to memory of 2556 2284 JaffaCakes118_180db7e810bf0f1117487007f0ef09b8.exe 38 PID 2284 wrote to memory of 2556 2284 JaffaCakes118_180db7e810bf0f1117487007f0ef09b8.exe 38 PID 2284 wrote to memory of 2556 2284 JaffaCakes118_180db7e810bf0f1117487007f0ef09b8.exe 38 PID 2556 wrote to memory of 2924 2556 athost.exe 39 PID 2556 wrote to memory of 2924 2556 athost.exe 39 PID 2556 wrote to memory of 2924 2556 athost.exe 39 PID 2556 wrote to memory of 2924 2556 athost.exe 39 PID 2556 wrote to memory of 2924 2556 athost.exe 39 PID 2556 wrote to memory of 2924 2556 athost.exe 39 PID 2556 wrote to memory of 2924 2556 athost.exe 39 PID 2556 wrote to memory of 2924 2556 athost.exe 39 PID 2556 wrote to memory of 2924 2556 athost.exe 39 PID 2556 wrote to memory of 2924 2556 athost.exe 39 PID 2284 wrote to memory of 916 2284 JaffaCakes118_180db7e810bf0f1117487007f0ef09b8.exe 40 PID 2284 wrote to memory of 916 2284 JaffaCakes118_180db7e810bf0f1117487007f0ef09b8.exe 40 PID 2284 wrote to memory of 916 2284 JaffaCakes118_180db7e810bf0f1117487007f0ef09b8.exe 40 PID 2284 wrote to memory of 916 2284 JaffaCakes118_180db7e810bf0f1117487007f0ef09b8.exe 40 PID 916 wrote to memory of 1156 916 bthost.exe 41 PID 916 wrote to memory of 1156 916 bthost.exe 41 PID 916 wrote to memory of 1156 916 bthost.exe 41 PID 916 wrote to memory of 1156 916 bthost.exe 41 PID 916 wrote to memory of 1156 916 bthost.exe 41 PID 916 wrote to memory of 1156 916 bthost.exe 41 PID 916 wrote to memory of 1156 916 bthost.exe 41 PID 916 wrote to memory of 1156 916 bthost.exe 41 PID 2284 wrote to memory of 1344 2284 JaffaCakes118_180db7e810bf0f1117487007f0ef09b8.exe 42 PID 2284 wrote to memory of 1344 2284 JaffaCakes118_180db7e810bf0f1117487007f0ef09b8.exe 42 PID 2284 wrote to memory of 1344 2284 JaffaCakes118_180db7e810bf0f1117487007f0ef09b8.exe 42 PID 2284 wrote to memory of 1344 2284 JaffaCakes118_180db7e810bf0f1117487007f0ef09b8.exe 42 PID 2284 wrote to memory of 1808 2284 JaffaCakes118_180db7e810bf0f1117487007f0ef09b8.exe 44 PID 2284 wrote to memory of 1808 2284 JaffaCakes118_180db7e810bf0f1117487007f0ef09b8.exe 44 PID 2284 wrote to memory of 1808 2284 JaffaCakes118_180db7e810bf0f1117487007f0ef09b8.exe 44 PID 2284 wrote to memory of 1808 2284 JaffaCakes118_180db7e810bf0f1117487007f0ef09b8.exe 44 PID 1808 wrote to memory of 336 1808 dthost.exe 2 PID 1808 wrote to memory of 2220 1808 dthost.exe 45 PID 1808 wrote to memory of 2220 1808 dthost.exe 45 PID 1808 wrote to memory of 2220 1808 dthost.exe 45 PID 1808 wrote to memory of 2220 1808 dthost.exe 45 PID 1808 wrote to memory of 2220 1808 dthost.exe 45 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" cthost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer cthost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Suspicious use of UnmapMainImage
PID:336
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs1⤵
- Suspicious use of AdjustPrivilegeToken
PID:828
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_180db7e810bf0f1117487007f0ef09b8.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_180db7e810bf0f1117487007f0ef09b8.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_180db7e810bf0f1117487007f0ef09b8.exeJaffaCakes118_180db7e810bf0f1117487007f0ef09b8.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Users\Admin\Ww9OoYLk.exeC:\Users\Admin\Ww9OoYLk.exe3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Users\Admin\bphis.exe"C:\Users\Admin\bphis.exe"4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2668
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del Ww9OoYLk.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2632
-
-
-
-
C:\Users\Admin\athost.exeC:\Users\Admin\athost.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Users\Admin\athost.exeathost.exe4⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
PID:2924
-
-
-
C:\Users\Admin\bthost.exeC:\Users\Admin\bthost.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Users\Admin\bthost.exebthost.exe4⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
PID:1156
-
-
-
C:\Users\Admin\cthost.exeC:\Users\Admin\cthost.exe3⤵
- Modifies security service
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- System policy modification
PID:1344 -
C:\Users\Admin\cthost.exeC:\Users\Admin\cthost.exe startC:\Users\Admin\AppData\Roaming\503FF\E4023.exe%C:\Users\Admin\AppData\Roaming\503FF4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2168
-
-
C:\Users\Admin\cthost.exeC:\Users\Admin\cthost.exe startC:\Program Files (x86)\FFB22\lvvm.exe%C:\Program Files (x86)\FFB224⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2764
-
-
C:\Program Files (x86)\LP\2315\760A.tmp"C:\Program Files (x86)\LP\2315\760A.tmp"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2144
-
-
-
C:\Users\Admin\dthost.exeC:\Users\Admin\dthost.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"4⤵
- System Location Discovery: System Language Discovery
PID:2220
-
-
-
C:\Users\Admin\ethost.exeC:\Users\Admin\ethost.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2312
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del JaffaCakes118_180db7e810bf0f1117487007f0ef09b8.exe3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2324 -
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2432
-
-
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1992
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵
- Loads dropped DLL
PID:1020
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3064
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:800
Network
-
Remote address:8.8.8.8:53Requestcrl.microsoft.comIN AResponsecrl.microsoft.comIN CNAMEcrl.www.ms.akadns.netcrl.www.ms.akadns.netIN CNAMEa1363.dscg.akamai.neta1363.dscg.akamai.netIN A104.77.160.74a1363.dscg.akamai.netIN A104.77.160.93
-
Remote address:104.77.160.74:80RequestGET /pki/crl/products/MicRooCerAut2011_2011_03_22.crl HTTP/1.1
Connection: Keep-Alive
Accept: */*
If-Modified-Since: Thu, 11 Jul 2024 01:45:51 GMT
User-Agent: Microsoft-CryptoAPI/6.1
Host: crl.microsoft.com
ResponseHTTP/1.1 200 OK
Content-Type: application/octet-stream
Content-MD5: +oTkvMkqpdtzWrUHEQQM3g==
Last-Modified: Thu, 12 Dec 2024 00:06:56 GMT
ETag: 0x8DD1A40E476D877
Server: Windows-Azure-Blob/1.0 Microsoft-HTTPAPI/2.0
x-ms-request-id: 4de75d1f-301e-000e-252a-4c7e5a000000
x-ms-version: 2009-09-19
x-ms-lease-status: unlocked
x-ms-blob-type: BlockBlob
Date: Thu, 23 Jan 2025 14:18:36 GMT
Connection: keep-alive
-
Remote address:8.8.8.8:53Requestwww.microsoft.comIN AResponsewww.microsoft.comIN CNAMEwww.microsoft.com-c-3.edgekey.netwww.microsoft.com-c-3.edgekey.netIN CNAMEwww.microsoft.com-c-3.edgekey.net.globalredir.akadns.netwww.microsoft.com-c-3.edgekey.net.globalredir.akadns.netIN CNAMEe13678.dscb.akamaiedge.nete13678.dscb.akamaiedge.netIN A23.37.198.101
-
Remote address:23.37.198.101:80RequestGET /pkiops/crl/MicCodSigPCA2011_2011-07-08.crl HTTP/1.1
Connection: Keep-Alive
Accept: */*
If-Modified-Since: Sun, 18 Aug 2024 00:23:49 GMT
User-Agent: Microsoft-CryptoAPI/6.1
Host: www.microsoft.com
ResponseHTTP/1.1 200 OK
Content-Type: application/octet-stream
Content-MD5: HqJzZuA065RHozzmOcAUiQ==
Last-Modified: Tue, 14 Jan 2025 20:41:31 GMT
ETag: 0x8DD34DBD43549F4
x-ms-request-id: 32543bec-f01e-0011-1fcb-66cd5e000000
x-ms-version: 2009-09-19
x-ms-lease-status: unlocked
x-ms-blob-type: BlockBlob
Date: Thu, 23 Jan 2025 14:18:36 GMT
Connection: keep-alive
TLS_version: UNKNOWN
ms-cv: CASMicrosoftCV4a4a1507.0
ms-cv-esi: CASMicrosoftCV4a4a1507.0
X-RTag: RT
-
Remote address:8.8.8.8:53Requestcsc3-2004-crl.verisign.comIN AResponse
-
Remote address:8.8.8.8:53Requestbrowsermmorpg.comIN AResponsebrowsermmorpg.comIN A172.66.40.218browsermmorpg.comIN A172.66.43.38
-
Remote address:8.8.8.8:53Requestseeworldonlines.comIN AResponse
-
GEThttp://browsermmorpg.com/images/cpc2.png?pr=gHZutDyMv5rJciG1J8K%2B1MWCJbP4lltXIA%3D%3Dcthost.exeRemote address:172.66.40.218:80RequestGET /images/cpc2.png?pr=gHZutDyMv5rJciG1J8K%2B1MWCJbP4lltXIA%3D%3D HTTP/1.0
Connection: close
Host: browsermmorpg.com
Accept: */*
User-Agent: chrome/9.0
ResponseHTTP/1.1 301 Moved Permanently
Content-Type: text/html
Content-Length: 167
Connection: close
Cache-Control: max-age=3600
Expires: Thu, 23 Jan 2025 15:18:39 GMT
Location: https://browsermmorpg.com/images/cpc2.png?pr=gHZutDyMv5rJciG1J8K%2B1MWCJbP4lltXIA%3D%3D
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=azTdxTEqnNY7bnDCLC%2FhXK9k4tjnxb0AaCgLwoqE4NdHYFhP827bK%2F1zHKM76fBePehXDncFHflBQlZRkDVMJltwFcnYkcWr3SGdnUZl%2BXMafREOIDN4VtLD1PhiDgEGrwzVoA%3D%3D"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
Server: cloudflare
CF-RAY: 90686a0baf943da9-LHR
alt-svc: h3=":443"; ma=86400
server-timing: cfL4;desc="?proto=TCP&rtt=47224&min_rtt=47224&rtt_var=23612&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=160&delivery_rate=0&cwnd=243&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
-
Remote address:8.8.8.8:53Requestwebhomefordomains.comIN AResponse
-
Remote address:8.8.8.8:53Requestourthreedomains.comIN AResponse
-
Remote address:8.8.8.8:53Requestwww.microsoft.comIN AResponsewww.microsoft.comIN CNAMEwww.microsoft.com-c-3.edgekey.netwww.microsoft.com-c-3.edgekey.netIN CNAMEwww.microsoft.com-c-3.edgekey.net.globalredir.akadns.netwww.microsoft.com-c-3.edgekey.net.globalredir.akadns.netIN CNAMEe13678.dscb.akamaiedge.nete13678.dscb.akamaiedge.netIN A23.37.198.101
-
Remote address:8.8.8.8:53Requestourdatatransfers.comIN AResponse
-
Remote address:8.8.8.8:53Requestwww.google.comIN AResponsewww.google.comIN A142.250.179.228
-
Remote address:142.250.179.228:80RequestGET / HTTP/1.0
Connection: close
Host: www.google.com
Accept: */*
ResponseHTTP/1.0 302 Found
x-hallmonitor-challenge: CgwI-5_JvAYQroq78QISBLXXsFM
Content-Type: text/html; charset=UTF-8
Content-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-etm0zKUzp8lFjb4cIOTMQg' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp
Date: Thu, 23 Jan 2025 14:19:39 GMT
Server: gws
Content-Length: 396
X-XSS-Protection: 0
X-Frame-Options: SAMEORIGIN
Set-Cookie: AEC=AZ6Zc-Wr2kcVkBkxqU5VgNAw9aFCYfvuPgzvPOXVrLdrX--_FmcuwTYNj-M; expires=Tue, 22-Jul-2025 14:19:39 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=lax
-
Remote address:142.250.179.228:80RequestGET / HTTP/1.1
Connection: close
Pragma: no-cache
Host: www.google.com
ResponseHTTP/1.1 302 Found
x-hallmonitor-challenge: CgwI_J_JvAYQuof6lQESBLXXsFM
Content-Type: text/html; charset=UTF-8
Content-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-xozfDSSPLSYkmo5-_62MmQ' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp
Date: Thu, 23 Jan 2025 14:19:40 GMT
Server: gws
Content-Length: 396
X-XSS-Protection: 0
X-Frame-Options: SAMEORIGIN
Set-Cookie: AEC=AZ6Zc-XoMXrYlGTbJElhHDwX1_0KvwWjLRyGZR5Ze82Btzz1FTSFJJVuEQ; expires=Tue, 22-Jul-2025 14:19:40 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=lax
Connection: close
-
GEThttp://www.google.com/sorry/index?continue=http://www.google.com/&q=EgS117BTGPufybwGIjDkeB-dhfnsRvZqnqQ7y1tB7CZXeEVxrHqZN0zfzvSXt0K58UnfbVvG6AD5UjLkukkyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUMcthost.exeRemote address:142.250.179.228:80RequestGET /sorry/index?continue=http://www.google.com/&q=EgS117BTGPufybwGIjDkeB-dhfnsRvZqnqQ7y1tB7CZXeEVxrHqZN0zfzvSXt0K58UnfbVvG6AD5UjLkukkyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM HTTP/1.1
Connection: close
Pragma: no-cache
Host: www.google.com
ResponseHTTP/1.1 429 Too Many Requests
Pragma: no-cache
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Content-Type: text/html
Server: HTTP server (unknown)
Content-Length: 3086
X-XSS-Protection: 0
Connection: close
-
445 B 1.7kB 5 4
HTTP Request
GET http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crlHTTP Response
200 -
439 B 1.7kB 5 4
HTTP Request
GET http://www.microsoft.com/pkiops/crl/MicCodSigPCA2011_2011-07-08.crlHTTP Response
200 -
-
-
-
-
-
172.66.40.218:80http://browsermmorpg.com/images/cpc2.png?pr=gHZutDyMv5rJciG1J8K%2B1MWCJbP4lltXIA%3D%3Dhttpcthost.exe436 B 1.3kB 6 5
HTTP Request
GET http://browsermmorpg.com/images/cpc2.png?pr=gHZutDyMv5rJciG1J8K%2B1MWCJbP4lltXIA%3D%3DHTTP Response
301 -
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
302 B 1.5kB 5 5
HTTP Request
GET http://www.google.com/HTTP Response
302 -
307 B 1.5kB 5 5
HTTP Request
GET http://www.google.com/HTTP Response
302 -
142.250.179.228:80http://www.google.com/sorry/index?continue=http://www.google.com/&q=EgS117BTGPufybwGIjDkeB-dhfnsRvZqnqQ7y1tB7CZXeEVxrHqZN0zfzvSXt0K58UnfbVvG6AD5UjLkukkyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUMhttpcthost.exe526 B 3.7kB 6 7
HTTP Request
GET http://www.google.com/sorry/index?continue=http://www.google.com/&q=EgS117BTGPufybwGIjDkeB-dhfnsRvZqnqQ7y1tB7CZXeEVxrHqZN0zfzvSXt0K58UnfbVvG6AD5UjLkukkyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUMHTTP Response
429 -
-
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 120 B 3 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 120 B 3 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 120 B 3 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 120 B 3 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 40 B 3 1
-
63 B 162 B 1 1
DNS Request
crl.microsoft.com
DNS Response
104.77.160.74104.77.160.93
-
63 B 230 B 1 1
DNS Request
www.microsoft.com
DNS Response
23.37.198.101
-
72 B 127 B 1 1
DNS Request
csc3-2004-crl.verisign.com
-
63 B 95 B 1 1
DNS Request
browsermmorpg.com
DNS Response
172.66.40.218172.66.43.38
-
65 B 138 B 1 1
DNS Request
seeworldonlines.com
-
67 B 140 B 1 1
DNS Request
webhomefordomains.com
-
65 B 138 B 1 1
DNS Request
ourthreedomains.com
-
63 B 230 B 1 1
DNS Request
www.microsoft.com
DNS Response
23.37.198.101
-
66 B 139 B 1 1
DNS Request
ourdatatransfers.com
-
60 B 76 B 1 1
DNS Request
www.google.com
DNS Response
142.250.179.228
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
5Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD5a1d80ed250788260ffd66258555a4876
SHA110b81c2cdc4a7d645f9058c220587fac79281351
SHA256d4d9a7028cda13828d7a6796dd12369ab1d4af80946776aa5b5c0369dd322fb3
SHA512fee72d46425a0c1f755de2e34ad742ff579a86b2a3bff3485a15ddcbcf55d60c6297bb588650a9a673aa0a5e8f35f1ae0bc1a454154d26848c49cab700d7e5d8
-
Filesize
600B
MD58ba7b4e7f11aa9ea8df14e7c744feaea
SHA1786ca648d81fff87314f50257ec9f104dc9946bd
SHA25638d508f4a13676e02c01c7e0533db7aab4fff58f4519d98250d3baca257190f6
SHA5122d06723b31e6f8825a8f9afe651af191a79a20ab70278bc7c4252d11dbeb237f6cbf9a3df7a3b08a3c73b3409abddad4f790845ee3a70d52df5f36e57fbd1889
-
Filesize
996B
MD5eadfdef7239a823e387274c96da316af
SHA1710449aab4386745f6176c20f2cac521536c0d19
SHA25683df357e9e2e9289ebb3a0dd20ddc72fb23279332fb733e3099659fde1c78f3a
SHA5128c37c57b4fa878afad4a3e8a227a0409680144223a21098c377ec732ab6a22a3a5b0b1c2cdb42c3b9ee755ffa7841791606015fb5f9a6e49a8ed37c2c80bf746
-
Filesize
1KB
MD567a5727af823fb7dcab537006aa75973
SHA1df2577b42816f650c62d450b6df3962611b84fea
SHA25622382ba625a5579d198b55ffb272c8b207f00cb8872cc7c3a82e347a026607d1
SHA512352047493aeb3b544b3bbc986a1514b9553d193487b42c05d695f273e56ed1b88e5d4415dc37e031660776db9413a0b7eca4dcdead614eee4c309fe066402a88
-
Filesize
2KB
MD5142e42aa8e3bbb3109ede01c39060ff3
SHA129c25951f236bc372c24f01122c891d5b5351f68
SHA256887c2149fa7e8e52beeb718d9026bb6789d5fcb2dc21475672fdc25b790bff5a
SHA512860b7966ef67c30025bb5d8c51e8ee1427b269887576b0c7df82993f27201cd14500b16338fa46a94cb442be7527d7f6b362d8ce61e69cfe8ead3bf49031d867
-
Filesize
256KB
MD577e425fe955cbc4b6245cf8a3ed645b3
SHA1921dad95a28283f2138e8c36d4cbf295572d33ac
SHA25686b35dd61f186218356ecced37723e647b612cb8c44ef904917f4c783e424809
SHA512ee0a6ac25c021baf6974a23afd999bcdd519da465ee849ebd52d99ff437812165650fe8f05e5ff72f6eadf8d5a44d5c7c73853e4d5e00f8fbab45444fd56a44b
-
Filesize
263KB
MD56b7d559166467ef651497836feef65e3
SHA19edda6cd07a1960ba52abe17fc7402ff93d44ce6
SHA2566151ab998d7821e147551b5ff24b11d3194c207c3ff8322fe2e2860a8b978bb0
SHA512d58ddfe8ce3b9f4092d554713502065c351a46251ff0ce126dd05528771cd727bf636f15a4c76224d8db22117234d39b1a2bf8030b55aadcf98087a5a1814356
-
Filesize
256KB
MD5481d069bbaa141ef34eb9c48163a6a49
SHA1b7aa8b66c16b11a15108129f20379906732ddda6
SHA25663e856189d5381c37b128d6aa5307c5b8780ee66dce52b93509d2daceef93cf0
SHA5122543828694531ad966443cad95f7dae47c55ad95543ef4c2a417b228a885444673160a6ca6f217c647892694a758e8d6b379cf7d34d845400af573ffe562bbb7
-
Filesize
153KB
MD5f28e94ce33674d8cf13f31bb5f20f745
SHA1e79332b18af7b31caa195956c23303d35c2808c8
SHA25642f40ac82f47f4eb009dbd11d7233ed2e67f80392dd4fa770faa68dd973ded2f
SHA5128bcb1311302bbf1b6cfbbb863cffa95d5934c9bfc613cd2dc2abd425fe39ad2ec9cae7dca1e5b60d2acec4c9d422a35aeb5ab7b0433f25c01202ab3b4ca96112
-
Filesize
278KB
MD5d0bf4ea3b6fc02afd2c6ed5f4b0d142e
SHA12187968df184c18f945497dd410f90f4b6ff186d
SHA2563c7ee6117b9c2e39593f452e163f16334ab1b9196b5b5616c9ff7496bb4676a0
SHA512e0efb8672a81a8aa6c11a0f1f871033b10c6a5c6b28d30eab4f8ef7509fca8710c417b9cbbbf7844888f02858295304c23bf217e41d157e2bed594a39c2641f4
-
Filesize
227KB
MD5d39d17b38909180b0c65cb4081154100
SHA1b7a11d389d940273b91dd9ddb11137404eedceea
SHA256590aaa3add5efffd271c2b9cfc10fc304faf6caf83f2f9dd494a40a35b1053d3
SHA5125a0ccc785b15e92d38bf1436522dbe81645d2b16093f20f09dfd81602e9f496693a6b27a62f88e50cdf027147b89a21db1e15532d0d4e7c2fd65710ee2071fa6
-
Filesize
24KB
MD5b38b2a8c25efb39b245dbfa6c1ccc29b
SHA162fda766006bfbccbfaade649ceb29764c216ea4
SHA2561fee129dadbd67f7fab68c8fa285b5da0141785100b35bc7b66d55b10d24364d
SHA5128cdbb4e9404783ad4a2665a05a1e64e8ab393689c2425834e854933f58904910e248dfebc57c717313abbc62105d76875ebafd206ada15417beedd58bbd7e22d
-
Filesize
53KB
MD563e99b675a1337db6d8430195ea3efd2
SHA11baead2bf8f433dc82f9b2c03fd65ce697a92155
SHA2566616179477849205eb4075b75a042056d196f45d67f78929dbb3317a35ccbea9
SHA512f5b986eafa38dbc9ad7759784ac887ecbb9c8d8009a3f33e91b9c9ceeaf043ed3e4ddab8e6b6b77e54aed9fcecab02442c8ff253f2136ea06996d05ddd68199f
-
Filesize
4KB
MD5758f90d425814ea5a1d2694e44e7e295
SHA164d61731255ef2c3060868f92f6b81b4c9b5fe29
SHA256896221147d8172197cbbf06c45d461141ce6b4af38027c1a22d57c1165026433
SHA51211858e498309f611ee6241c026a402d6d979bffe28d4cbf7c9d5a89c3f3de25e1d253ab552ef7bc7cc43dd056307bd625e2e4f09beb21f0214c3946113b97ca9
-
Filesize
5KB
MD592f9cdae857253a3895faffa85b3d8b9
SHA1d28352ff5a02eeb98334e3d0f845a259b2aacff3
SHA2565653db84679ab49eec2e32127271dacd802b8ed53a5199c5fd5fe998be32a36b
SHA512f23ec0a005b5d84d26527cd6c26d494b9ecff4b099adfd780fe7953f5affb0f295f92dc663d79bcb60d42f82d249b7e61acb39a38bdbd66185da5bf6126737a6