Analysis
-
max time kernel
33s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/03/2025, 12:00
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_4014db815996cdacdf3bb0e4e83f2dfa.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_4014db815996cdacdf3bb0e4e83f2dfa.exe
Resource
win10v2004-20250217-en
Errors
General
-
Target
JaffaCakes118_4014db815996cdacdf3bb0e4e83f2dfa.exe
-
Size
6.5MB
-
MD5
4014db815996cdacdf3bb0e4e83f2dfa
-
SHA1
a23415316f3820fb0f276ffb1b72637b5e09a3e6
-
SHA256
62e0d9686d8ff84b01797ac16e9893ad9388b0905127843db0b4745976f5e00c
-
SHA512
bdf1c3509bf02233878f22baa1437feacf49bba07c01a01183255ad06cfdded922aac9d453138d44b7e65e301f3637dd64142405090f09bad02b2ab948490c88
-
SSDEEP
196608:qv3gGGJjVPLMloDujzv+0+8I5KKruB5a5z0:qvYbTVDaVe5KMCay
Malware Config
Signatures
-
Blackshades
Blackshades is a remote access trojan with various capabilities.
-
Blackshades family
-
Blackshades payload 5 IoCs
resource yara_rule behavioral1/memory/2480-53-0x0000000000400000-0x0000000000497000-memory.dmp family_blackshades behavioral1/memory/2480-71-0x0000000000400000-0x0000000000497000-memory.dmp family_blackshades behavioral1/memory/2480-87-0x0000000000400000-0x0000000000497000-memory.dmp family_blackshades behavioral1/memory/2480-303-0x0000000000400000-0x0000000000497000-memory.dmp family_blackshades behavioral1/memory/2480-306-0x0000000000400000-0x0000000000497000-memory.dmp family_blackshades -
Modifies firewall policy service 3 TTPs 8 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\setup.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\setup.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\svchost.exe = "C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\svchost = "C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe" setup.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{19AE9AB4-AF4C-900A-2D9B-F228DD2F3EFB} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{19AE9AB4-AF4C-900A-2D9B-F228DD2F3EFB}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe" setup.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\SOFTWARE\Microsoft\Active Setup\Installed Components\{19AE9AB4-AF4C-900A-2D9B-F228DD2F3EFB} setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Active Setup\Installed Components\{19AE9AB4-AF4C-900A-2D9B-F228DD2F3EFB}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe" setup.exe -
Drops file in Drivers directory 15 IoCs
description ioc Process File opened for modification C:\Windows\system32\Drivers\RegKill.sys SETUPA~1.EXE File opened for modification C:\Windows\SysWOW64\Drivers\AnyDVD.sys SETUPA~1.EXE File opened for modification C:\Windows\SysWOW64\Drivers\RegKill.sys SETUPA~1.EXE File created C:\Windows\system32\Drivers\RegKill.sys SETUPA~1.EXE File opened for modification C:\Windows\system32\Drivers\AnyDVD.sys.tmp SETUPA~1.EXE File created C:\Windows\SysWOW64\Drivers\AnyDVD.sys SETUPA~1.EXE File created C:\Windows\SysWOW64\Drivers\RegKill.sys SETUPA~1.EXE File opened for modification C:\Windows\system32\Drivers\RegKill.sys.tmp SETUPA~1.EXE File opened for modification C:\Windows\system32\Drivers\AnyDVD.sys SETUPA~1.EXE File opened for modification C:\Windows\SysWOW64\Drivers\AnyDVD.sys.tmp SETUPA~1.EXE File opened for modification C:\Windows\SysWOW64\Drivers\RegKill.sys.tmp SETUPA~1.EXE File opened for modification C:\Windows\system32\Drivers\ElbyCDIO.sys.tmp SETUPA~1.EXE File created C:\Windows\system32\Drivers\AnyDVD.sys SETUPA~1.EXE File opened for modification C:\Windows\system32\Drivers\ElbyCDIO.sys SETUPA~1.EXE File created C:\Windows\system32\Drivers\ElbyCDIO.sys SETUPA~1.EXE -
Executes dropped EXE 6 IoCs
pid Process 3036 setup.exe 1840 setup.exe 2480 setup.exe 2248 SETUPA~1.EXE 832 AnyDVDTray.exe 2500 SetRegACL.exe -
Loads dropped DLL 22 IoCs
pid Process 2912 JaffaCakes118_4014db815996cdacdf3bb0e4e83f2dfa.exe 3036 setup.exe 3036 setup.exe 3036 setup.exe 3036 setup.exe 1840 setup.exe 1840 setup.exe 1840 setup.exe 2912 JaffaCakes118_4014db815996cdacdf3bb0e4e83f2dfa.exe 1840 setup.exe 2480 setup.exe 2480 setup.exe 2480 setup.exe 2248 SETUPA~1.EXE 2248 SETUPA~1.EXE 2248 SETUPA~1.EXE 832 AnyDVDTray.exe 2248 SETUPA~1.EXE 2248 SETUPA~1.EXE 2248 SETUPA~1.EXE 2500 SetRegACL.exe 2248 SETUPA~1.EXE -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe" setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe" setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\AnyDVD = "\"C:\\Program Files (x86)\\SlySoft\\AnyDVD\\AnyDVD.exe\"" SETUPA~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" JaffaCakes118_4014db815996cdacdf3bb0e4e83f2dfa.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 setup.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ElbyCDIO.dll.tmp SETUPA~1.EXE File opened for modification C:\Windows\SysWOW64\ElbyCDIO.dll SETUPA~1.EXE File created C:\Windows\SysWOW64\ElbyCDIO.dll SETUPA~1.EXE -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3036 set thread context of 1840 3036 setup.exe 31 PID 1840 set thread context of 2480 1840 setup.exe 33 -
resource yara_rule behavioral1/files/0x0008000000015cd1-33.dat upx behavioral1/memory/2248-58-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral1/memory/2480-53-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral1/memory/2480-52-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral1/memory/2480-48-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral1/memory/2480-46-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral1/memory/2480-42-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral1/memory/2480-40-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral1/memory/2480-71-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral1/memory/2248-72-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral1/memory/2480-87-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral1/memory/2248-86-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral1/files/0x0008000000015d0e-93.dat upx behavioral1/memory/2248-302-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral1/memory/2480-303-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral1/memory/2248-305-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral1/memory/2480-306-0x0000000000400000-0x0000000000497000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\SlySoft\AnyDVD\manual\fr\index.html SETUPA~1.EXE File created C:\Program Files (x86)\SlySoft\AnyDVD\language\AnyDVDda.lng SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\language\AnyDVDfi.lng.tmp SETUPA~1.EXE File created C:\Program Files (x86)\SlySoft\AnyDVD\language\AnyDVDfi.lng SETUPA~1.EXE File created C:\Program Files (x86)\SlySoft\AnyDVD\language\AnyDVDhe.lng SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\language\AnyDVDsl.lng.tmp SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\manual\en\index.html.tmp SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\HelpLauncher.exe.tmp SETUPA~1.EXE File created C:\Program Files (x86)\SlySoft\AnyDVD\eraser\NTSC\VIDEO_TS\VTS_02_1.VOB SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\language\AnyDVDsk.lng.tmp SETUPA~1.EXE File created C:\Program Files (x86)\SlySoft\AnyDVD\manual\changes.txt SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVD.exe.tmp SETUPA~1.EXE File created C:\Program Files (x86)\SlySoft\AnyDVD\eraser\PAL\VIDEO_TS\VIDEO_TS.IFO SETUPA~1.EXE File created C:\Program Files (x86)\SlySoft\AnyDVD\eraser\PAL\VIDEO_TS\VTS_02_0.IFO SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\language\AnyDVDet.lng SETUPA~1.EXE File created C:\Program Files (x86)\SlySoft\AnyDVD\language\AnyDVDit.lng SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\language\AnyDVDtw.lng SETUPA~1.EXE File created C:\Program Files (x86)\SlySoft\AnyDVD\SetRegACL.exe SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\ADvdDiscHlp64.exe.tmp SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\manual\da\index.html.tmp SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\manual\nl\index.html SETUPA~1.EXE File created C:\Program Files (x86)\SlySoft\AnyDVD\manual\se\index.html SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\language\AnyDVDfr.lng.tmp SETUPA~1.EXE File created C:\Program Files (x86)\SlySoft\AnyDVD\eraser\PAL\VIDEO_TS\VTS_01_1.VOB SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\RegAnyDVD.exe SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\eraser\PAL\VIDEO_TS\VIDEO_TS.IFO.tmp SETUPA~1.EXE File created C:\Program Files (x86)\SlySoft\AnyDVD\language\AnyDVDfa.lng SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVD.exe SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\HelpLauncher.exe SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\manual\images\slysoft-logo_l.gif.tmp SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\manual\ru\index.html.tmp SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\manual\ru\index.html SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\manual\es\index.html SETUPA~1.EXE File created C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVD.exe SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\language\AnyDVDde.lng SETUPA~1.EXE File created C:\Program Files (x86)\SlySoft\AnyDVD\manual\images\slysoft-logo_l.gif SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\eraser\PAL\VIDEO_TS\VTS_01_0.IFO SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\eraser\PAL\VIDEO_TS\VTS_02_1.VOB.tmp SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\language\AnyDVDnl.lng SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\manual\fr\index.html.tmp SETUPA~1.EXE File created C:\Program Files (x86)\SlySoft\AnyDVD\language\AnyDVDel.lng SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\manual\pt\index.html SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\eraser\PAL\VIDEO_TS\VIDEO_TS.IFO SETUPA~1.EXE File created C:\Program Files (x86)\SlySoft\AnyDVD\language\AnyDVDtw.lng SETUPA~1.EXE File created C:\Program Files (x86)\SlySoft\AnyDVD\ExecuteWithUAC.exe SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\language\AnyDVDno.lng.tmp SETUPA~1.EXE File created C:\Program Files (x86)\SlySoft\AnyDVD\language\AnyDVDca.lng SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\manual\el\index.html.tmp SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\manual\hu\index.html.tmp SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\eraser\NTSC\VIDEO_TS\VIDEO_TS.IFO SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\eraser\NTSC\VIDEO_TS\VTS_01_0.IFO SETUPA~1.EXE File created C:\Program Files (x86)\SlySoft\AnyDVD\language\AnyDVDbr.lng SETUPA~1.EXE File created C:\Program Files (x86)\SlySoft\AnyDVD\language\AnyDVDja.lng SETUPA~1.EXE File created C:\Program Files (x86)\SlySoft\AnyDVD\language\AnyDVDlt.lng SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\manual\el\index.html SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\manual\fi\index.html SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\AnyDialog.dll SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\eraser\NTSC\VIDEO_TS\VTS_02_0.IFO.tmp SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\language\AnyDVDfa.lng.tmp SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\language\AnyDVDno.lng SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\manual\fr\index.html SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\language\AnyDVDja.lng SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\eraser\NTSC\VIDEO_TS\VTS_02_1.VOB.tmp SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\eraser\PAL\VIDEO_TS\VTS_02_0.IFO SETUPA~1.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SetRegACL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AnyDVDTray.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_4014db815996cdacdf3bb0e4e83f2dfa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SETUPA~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry class 24 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" SETUPA~1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/anydvdhd SETUPA~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.AnyDVD\ = "SlySoft.AnyDVD.1" SETUPA~1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SlySoft.AnyDVD.1\shell SETUPA~1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.AnyDVD SETUPA~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.AnyDVDHD\Content Type = "application/anydvdhd" SETUPA~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Applications\RegAnyDVD.exe\shell\open\command\ = "\"C:\\Program Files (x86)\\SlySoft\\AnyDVD\\RegAnyDVD.exe\" \"%1\"" SETUPA~1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SlySoft.AnyDVD.1 SETUPA~1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SlySoft.AnyDVD.1\shell\open\command SETUPA~1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SlySoft.AnyDVD.1\shell\open SETUPA~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.AnyDVDHD\ = "SlySoft.AnyDVD.1" SETUPA~1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/anydvd SETUPA~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/anydvd\Extension = ".AnyDVD" SETUPA~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/anydvdhd\Extension = ".AnyDVDHD" SETUPA~1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.AnyDVDHD SETUPA~1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Applications\RegAnyDVD.exe\shell SETUPA~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SlySoft.AnyDVD.1\ = "AnyDVD Registration Key" SETUPA~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SlySoft.AnyDVD.1\shell\open\command\ = "\"C:\\Program Files (x86)\\SlySoft\\AnyDVD\\RegAnyDVD.exe\" \"%1\"" SETUPA~1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Applications\RegAnyDVD.exe\shell\open\command SETUPA~1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Applications SETUPA~1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Applications\RegAnyDVD.exe SETUPA~1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Applications\RegAnyDVD.exe\shell\open SETUPA~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.AnyDVD\Content Type = "application/anydvd" SETUPA~1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key SETUPA~1.EXE -
Modifies registry key 1 TTPs 4 IoCs
pid Process 2676 reg.exe 2632 reg.exe 2624 reg.exe 2616 reg.exe -
Suspicious use of AdjustPrivilegeToken 38 IoCs
description pid Process Token: 1 2480 setup.exe Token: SeCreateTokenPrivilege 2480 setup.exe Token: SeAssignPrimaryTokenPrivilege 2480 setup.exe Token: SeLockMemoryPrivilege 2480 setup.exe Token: SeIncreaseQuotaPrivilege 2480 setup.exe Token: SeMachineAccountPrivilege 2480 setup.exe Token: SeTcbPrivilege 2480 setup.exe Token: SeSecurityPrivilege 2480 setup.exe Token: SeTakeOwnershipPrivilege 2480 setup.exe Token: SeLoadDriverPrivilege 2480 setup.exe Token: SeSystemProfilePrivilege 2480 setup.exe Token: SeSystemtimePrivilege 2480 setup.exe Token: SeProfSingleProcessPrivilege 2480 setup.exe Token: SeIncBasePriorityPrivilege 2480 setup.exe Token: SeCreatePagefilePrivilege 2480 setup.exe Token: SeCreatePermanentPrivilege 2480 setup.exe Token: SeBackupPrivilege 2480 setup.exe Token: SeRestorePrivilege 2480 setup.exe Token: SeShutdownPrivilege 2480 setup.exe Token: SeDebugPrivilege 2480 setup.exe Token: SeAuditPrivilege 2480 setup.exe Token: SeSystemEnvironmentPrivilege 2480 setup.exe Token: SeChangeNotifyPrivilege 2480 setup.exe Token: SeRemoteShutdownPrivilege 2480 setup.exe Token: SeUndockPrivilege 2480 setup.exe Token: SeSyncAgentPrivilege 2480 setup.exe Token: SeEnableDelegationPrivilege 2480 setup.exe Token: SeManageVolumePrivilege 2480 setup.exe Token: SeImpersonatePrivilege 2480 setup.exe Token: SeCreateGlobalPrivilege 2480 setup.exe Token: 31 2480 setup.exe Token: 32 2480 setup.exe Token: 33 2480 setup.exe Token: 34 2480 setup.exe Token: 35 2480 setup.exe Token: SeDebugPrivilege 2480 setup.exe Token: SeShutdownPrivilege 2248 SETUPA~1.EXE Token: SeDebugPrivilege 2480 setup.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 3036 setup.exe 1840 setup.exe 2480 setup.exe 2480 setup.exe 2480 setup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2912 wrote to memory of 3036 2912 JaffaCakes118_4014db815996cdacdf3bb0e4e83f2dfa.exe 30 PID 2912 wrote to memory of 3036 2912 JaffaCakes118_4014db815996cdacdf3bb0e4e83f2dfa.exe 30 PID 2912 wrote to memory of 3036 2912 JaffaCakes118_4014db815996cdacdf3bb0e4e83f2dfa.exe 30 PID 2912 wrote to memory of 3036 2912 JaffaCakes118_4014db815996cdacdf3bb0e4e83f2dfa.exe 30 PID 2912 wrote to memory of 3036 2912 JaffaCakes118_4014db815996cdacdf3bb0e4e83f2dfa.exe 30 PID 2912 wrote to memory of 3036 2912 JaffaCakes118_4014db815996cdacdf3bb0e4e83f2dfa.exe 30 PID 2912 wrote to memory of 3036 2912 JaffaCakes118_4014db815996cdacdf3bb0e4e83f2dfa.exe 30 PID 3036 wrote to memory of 1840 3036 setup.exe 31 PID 3036 wrote to memory of 1840 3036 setup.exe 31 PID 3036 wrote to memory of 1840 3036 setup.exe 31 PID 3036 wrote to memory of 1840 3036 setup.exe 31 PID 3036 wrote to memory of 1840 3036 setup.exe 31 PID 3036 wrote to memory of 1840 3036 setup.exe 31 PID 3036 wrote to memory of 1840 3036 setup.exe 31 PID 3036 wrote to memory of 1840 3036 setup.exe 31 PID 3036 wrote to memory of 1840 3036 setup.exe 31 PID 3036 wrote to memory of 1840 3036 setup.exe 31 PID 3036 wrote to memory of 1840 3036 setup.exe 31 PID 3036 wrote to memory of 1840 3036 setup.exe 31 PID 2912 wrote to memory of 2248 2912 JaffaCakes118_4014db815996cdacdf3bb0e4e83f2dfa.exe 32 PID 2912 wrote to memory of 2248 2912 JaffaCakes118_4014db815996cdacdf3bb0e4e83f2dfa.exe 32 PID 2912 wrote to memory of 2248 2912 JaffaCakes118_4014db815996cdacdf3bb0e4e83f2dfa.exe 32 PID 2912 wrote to memory of 2248 2912 JaffaCakes118_4014db815996cdacdf3bb0e4e83f2dfa.exe 32 PID 2912 wrote to memory of 2248 2912 JaffaCakes118_4014db815996cdacdf3bb0e4e83f2dfa.exe 32 PID 2912 wrote to memory of 2248 2912 JaffaCakes118_4014db815996cdacdf3bb0e4e83f2dfa.exe 32 PID 2912 wrote to memory of 2248 2912 JaffaCakes118_4014db815996cdacdf3bb0e4e83f2dfa.exe 32 PID 1840 wrote to memory of 2480 1840 setup.exe 33 PID 1840 wrote to memory of 2480 1840 setup.exe 33 PID 1840 wrote to memory of 2480 1840 setup.exe 33 PID 1840 wrote to memory of 2480 1840 setup.exe 33 PID 1840 wrote to memory of 2480 1840 setup.exe 33 PID 1840 wrote to memory of 2480 1840 setup.exe 33 PID 1840 wrote to memory of 2480 1840 setup.exe 33 PID 1840 wrote to memory of 2480 1840 setup.exe 33 PID 1840 wrote to memory of 2480 1840 setup.exe 33 PID 1840 wrote to memory of 2480 1840 setup.exe 33 PID 1840 wrote to memory of 2480 1840 setup.exe 33 PID 2480 wrote to memory of 2900 2480 setup.exe 34 PID 2480 wrote to memory of 2900 2480 setup.exe 34 PID 2480 wrote to memory of 2900 2480 setup.exe 34 PID 2480 wrote to memory of 2900 2480 setup.exe 34 PID 2480 wrote to memory of 2900 2480 setup.exe 34 PID 2480 wrote to memory of 2900 2480 setup.exe 34 PID 2480 wrote to memory of 2900 2480 setup.exe 34 PID 2480 wrote to memory of 2888 2480 setup.exe 35 PID 2480 wrote to memory of 2888 2480 setup.exe 35 PID 2480 wrote to memory of 2888 2480 setup.exe 35 PID 2480 wrote to memory of 2888 2480 setup.exe 35 PID 2480 wrote to memory of 2888 2480 setup.exe 35 PID 2480 wrote to memory of 2888 2480 setup.exe 35 PID 2480 wrote to memory of 2888 2480 setup.exe 35 PID 2480 wrote to memory of 2872 2480 setup.exe 36 PID 2480 wrote to memory of 2872 2480 setup.exe 36 PID 2480 wrote to memory of 2872 2480 setup.exe 36 PID 2480 wrote to memory of 2872 2480 setup.exe 36 PID 2480 wrote to memory of 2872 2480 setup.exe 36 PID 2480 wrote to memory of 2872 2480 setup.exe 36 PID 2480 wrote to memory of 2872 2480 setup.exe 36 PID 2480 wrote to memory of 2876 2480 setup.exe 37 PID 2480 wrote to memory of 2876 2480 setup.exe 37 PID 2480 wrote to memory of 2876 2480 setup.exe 37 PID 2480 wrote to memory of 2876 2480 setup.exe 37 PID 2480 wrote to memory of 2876 2480 setup.exe 37 PID 2480 wrote to memory of 2876 2480 setup.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4014db815996cdacdf3bb0e4e83f2dfa.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4014db815996cdacdf3bb0e4e83f2dfa.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\setup.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\setup.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\setup.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\setup.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\setup.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\setup.exe"4⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- System Location Discovery: System Language Discovery
PID:2900 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f6⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2632
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\setup.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\setup.exe:*:Enabled:Windows Messanger" /f5⤵
- System Location Discovery: System Language Discovery
PID:2888 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\setup.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\setup.exe:*:Enabled:Windows Messanger" /f6⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2624
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- System Location Discovery: System Language Discovery
PID:2872 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f6⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2676
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\svchost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\svchost.exe:*:Enabled:Windows Messanger" /f5⤵
- System Location Discovery: System Language Discovery
PID:2876 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\svchost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\svchost.exe:*:Enabled:Windows Messanger" /f6⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2616
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUPA~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUPA~1.EXE2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\nstB895.tmp\AnyDVDTray.exe"C:\Users\Admin\AppData\Local\Temp\nstB895.tmp\AnyDVDTray.exe" -c3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:832
-
-
C:\Program Files (x86)\SlySoft\AnyDVD\SetRegACL.exe"C:\Program Files (x86)\SlySoft\AnyDVD\SetRegACL.exe" Software\Microsoft\Windows\CurrentVersion\Explorer\DriveIcons 643⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2500
-
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:2980
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:1996
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
5Pre-OS Boot
1Bootkit
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD56880bce6d5c48861dfef9cf4025b443f
SHA1fd8431dada83de3e3d89c7ffbaddca831e7eb433
SHA25649609892beeeaf14dcf57e17a94053c5fcf42756cb2637375c96ea8952dca63e
SHA5120bb4af38190a60a968baf2abc5ff2cc651e2c3aee376596acae680bb3503957d417603397b9d0901dbb19919fd712066a54adb5240f5bcf02e444e49e8b53055
-
Filesize
4KB
MD5080c96bfa330dd18021b9507647a52a3
SHA11b7a2d89ec4eb3057ffa4f3245be7b2319d6af8a
SHA25603da71d1671acaf206e14d457f03557e961fa53b9da4ea20a6908ff0824009e0
SHA5128ddd8bbb70bc4038016468468f3f2e7742f3df76744f1fc33fe6a1690695e604e88eb7fc3f96843ba8f4b478611f5aed7d646228db73b5398e93d84e50bc2b00
-
Filesize
90KB
MD584169de84cde3677912c648bada4e600
SHA1434427ab22b4ebad7390ac8b0f3f6b9a04b6e42e
SHA25663f0eb9e9eb1cb6b7822ed37e998a7a77d6b79038dc58519d9e357debcbd9110
SHA512863165f2c27de8775bedae7f1ee2e61230786f7266611420538717d6adddd6edafd206c8b5dd39319ad2e2f2d8d4e6ce0d58320d763061c6ec4e213b045cad76
-
Filesize
52KB
MD5d866d346523fcb09f96384afcbd8f757
SHA1d53600fcaf09f42bf1c0b2411960bb66f702b76a
SHA256bd36f2094a3d2fd79a649f00e4196e45c50727dc745d570d1804e0834266a934
SHA5127547d86136d266f670bcc6d8b126ca58d38596dda3c47183799f7b79cb1461d118b825b91fa066fe1126b123e00351bc18fa335a43e36932f13c047bbe300e53
-
Filesize
6KB
MD5e2393ca981b0b538fa3923af06734f2d
SHA166a6bff64217d610553d98730c1a691ddf1202fc
SHA256ed31f5cc42b52ae1a8d47216883ee2ce6d9079ea274149621ac64fc9bb9a7023
SHA512f97440ace8250ad0604757731c2af09e8b9ac6df1cc2d433606e9ccf6198204ef155da5c159aff60a6fa7f5f9afa7e495db754c5fe047a75e92b4881b336fb30
-
Filesize
6.1MB
MD5b2eafc38fafbe40722dc7eed655e304c
SHA14cfa5482f6b4c72b16485d929bec020c8c7ad366
SHA2569d84ac796710b7b59b1f7772cd6c6da1fa8136c77d85ff0321b2c916686e346c
SHA512fb3c94765531ea9c9c1aa2d517316b0c50874e62350ed06a99231496a598b5cdbd5b7904157efe9be332bb087d932d67e8d53efa22001398cbe908ec78323618
-
Filesize
404KB
MD5e08181892440c61a291ce6a2b6854665
SHA18f15394936201860f27208598f997512e5cae5b0
SHA25662db06ca80a0b52f3c0adbfb431931fd59030d6318b4aa0640f295ec2786567f
SHA512a54d78a22241c537c3d960e5b5c9bcd297c3cd384b654f8585afc51b2e27ff584beb5ef5c9417a168b112aa4bd4ffd9a8ad2637d3fe6a13e8ce21768ec875ac9
-
Filesize
4.3MB
MD5f5e7fb080e61cb64a1c87ea184221bbb
SHA1dca8867a86fb72dfa5d169482c890d13b1cdf1a9
SHA2565b0bfac52b2f1cead27a118a7761b62e17ba4b008340e503749e7a57960e3870
SHA512da3a8221d7d46ad1a24638c4a0d2a80993eb7ea254d57f0de3ad7a9907932dbd883ef78201a8213d082bdb2fe1c8f0c968042bd1b5671e60faf1f4f431cfda78