Analysis
-
max time kernel
35s -
max time network
35s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
02/03/2025, 12:00
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_4014db815996cdacdf3bb0e4e83f2dfa.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_4014db815996cdacdf3bb0e4e83f2dfa.exe
Resource
win10v2004-20250217-en
Errors
General
-
Target
JaffaCakes118_4014db815996cdacdf3bb0e4e83f2dfa.exe
-
Size
6.5MB
-
MD5
4014db815996cdacdf3bb0e4e83f2dfa
-
SHA1
a23415316f3820fb0f276ffb1b72637b5e09a3e6
-
SHA256
62e0d9686d8ff84b01797ac16e9893ad9388b0905127843db0b4745976f5e00c
-
SHA512
bdf1c3509bf02233878f22baa1437feacf49bba07c01a01183255ad06cfdded922aac9d453138d44b7e65e301f3637dd64142405090f09bad02b2ab948490c88
-
SSDEEP
196608:qv3gGGJjVPLMloDujzv+0+8I5KKruB5a5z0:qvYbTVDaVe5KMCay
Malware Config
Signatures
-
Blackshades
Blackshades is a remote access trojan with various capabilities.
-
Blackshades family
-
Blackshades payload 6 IoCs
resource yara_rule behavioral2/memory/3660-24-0x0000000000400000-0x0000000000497000-memory.dmp family_blackshades behavioral2/memory/3660-34-0x0000000000400000-0x0000000000497000-memory.dmp family_blackshades behavioral2/memory/3660-36-0x0000000000400000-0x0000000000497000-memory.dmp family_blackshades behavioral2/memory/3660-47-0x0000000000400000-0x0000000000497000-memory.dmp family_blackshades behavioral2/memory/3660-258-0x0000000000400000-0x0000000000497000-memory.dmp family_blackshades behavioral2/memory/3660-266-0x0000000000400000-0x0000000000497000-memory.dmp family_blackshades -
Modifies firewall policy service 3 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\setup.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\setup.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\svchost.exe = "C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe:*:Enabled:Windows Messanger" reg.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\svchost = "C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe" setup.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{19AE9AB4-AF4C-900A-2D9B-F228DD2F3EFB} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{19AE9AB4-AF4C-900A-2D9B-F228DD2F3EFB}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe" setup.exe Key created \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Active Setup\Installed Components\{19AE9AB4-AF4C-900A-2D9B-F228DD2F3EFB} setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Active Setup\Installed Components\{19AE9AB4-AF4C-900A-2D9B-F228DD2F3EFB}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe" setup.exe -
Drops file in Drivers directory 15 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Drivers\RegKill.sys.tmp SETUPA~1.EXE File created C:\Windows\SysWOW64\Drivers\RegKill.sys SETUPA~1.EXE File opened for modification C:\Windows\system32\Drivers\RegKill.sys.tmp SETUPA~1.EXE File opened for modification C:\Windows\SysWOW64\Drivers\AnyDVD.sys SETUPA~1.EXE File opened for modification C:\Windows\system32\Drivers\ElbyCDIO.sys SETUPA~1.EXE File opened for modification C:\Windows\system32\Drivers\AnyDVD.sys.tmp SETUPA~1.EXE File opened for modification C:\Windows\system32\Drivers\AnyDVD.sys SETUPA~1.EXE File opened for modification C:\Windows\SysWOW64\Drivers\AnyDVD.sys.tmp SETUPA~1.EXE File created C:\Windows\SysWOW64\Drivers\AnyDVD.sys SETUPA~1.EXE File opened for modification C:\Windows\SysWOW64\Drivers\RegKill.sys SETUPA~1.EXE File created C:\Windows\system32\Drivers\ElbyCDIO.sys SETUPA~1.EXE File opened for modification C:\Windows\system32\Drivers\ElbyCDIO.sys.tmp SETUPA~1.EXE File opened for modification C:\Windows\system32\Drivers\RegKill.sys SETUPA~1.EXE File created C:\Windows\system32\Drivers\RegKill.sys SETUPA~1.EXE File created C:\Windows\system32\Drivers\AnyDVD.sys SETUPA~1.EXE -
Executes dropped EXE 6 IoCs
pid Process 884 setup.exe 4748 setup.exe 3660 setup.exe 1252 SETUPA~1.EXE 2272 AnyDVDTray.exe 1324 SetRegACL.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" JaffaCakes118_4014db815996cdacdf3bb0e4e83f2dfa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe" setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe" setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AnyDVD = "\"C:\\Program Files (x86)\\SlySoft\\AnyDVD\\AnyDVD.exe\"" SETUPA~1.EXE -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 setup.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ElbyCDIO.dll.tmp SETUPA~1.EXE File opened for modification C:\Windows\SysWOW64\ElbyCDIO.dll SETUPA~1.EXE File created C:\Windows\SysWOW64\ElbyCDIO.dll SETUPA~1.EXE -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 884 set thread context of 4748 884 setup.exe 88 PID 4748 set thread context of 3660 4748 setup.exe 90 -
resource yara_rule behavioral2/memory/3660-15-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral2/files/0x000a000000023c5f-18.dat upx behavioral2/memory/3660-24-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral2/memory/1252-23-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/3660-20-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral2/memory/3660-34-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral2/memory/1252-35-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/3660-36-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral2/memory/3660-47-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral2/memory/1252-50-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/files/0x000b000000023c62-57.dat upx behavioral2/memory/3660-258-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral2/memory/1252-261-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/1252-263-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/3660-266-0x0000000000400000-0x0000000000497000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\SlySoft\AnyDVD\manual\images\slysoft-logo_l.gif SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVD-uninst.exe SETUPA~1.EXE File created C:\Program Files (x86)\SlySoft\AnyDVD\language\AnyDVDca.lng SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\language\AnyDVDko.lng.tmp SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\manual\da\index.html SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\RegAnyDVD.exe SETUPA~1.EXE File created C:\Program Files (x86)\SlySoft\AnyDVD\eraser\NTSC\VIDEO_TS\VTS_01_1.VOB SETUPA~1.EXE File created C:\Program Files (x86)\SlySoft\AnyDVD\language\AnyDVDcz.lng SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\language\AnyDVDda.lng.tmp SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\language\AnyDVDel.lng.tmp SETUPA~1.EXE File created C:\Program Files (x86)\SlySoft\AnyDVD\language\AnyDVDhu.lng SETUPA~1.EXE File created C:\Program Files (x86)\SlySoft\AnyDVD\language\AnyDVDua.lng SETUPA~1.EXE File created C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVD-uninst.exe SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\language\AnyDVDfi.lng.tmp SETUPA~1.EXE File created C:\Program Files (x86)\SlySoft\AnyDVD\language\AnyDVDpt.lng SETUPA~1.EXE File created C:\Program Files (x86)\SlySoft\AnyDVD\language\AnyDVDsl.lng SETUPA~1.EXE File created C:\Program Files (x86)\SlySoft\AnyDVD\manual\el\index.html SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\manual\en\index.html.tmp SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\SetDisplayFrequency.exe.tmp SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\ExecuteWithUAC.exe SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\eraser\NTSC\VIDEO_TS\VTS_01_1.VOB SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\manual\pt\index.html SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\language\AnyDVDlt.lng SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\language\AnyDVDsl.lng.tmp SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\language\AnyDVDsr.lng SETUPA~1.EXE File created C:\Program Files (x86)\SlySoft\AnyDVD\manual\changes.txt SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\RegAnyDVD.exe.tmp SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVD.exe SETUPA~1.EXE File created C:\Program Files (x86)\SlySoft\AnyDVD\language\AnyDVDda.lng SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\language\AnyDVDzh.lng SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\language\resource.h SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\manual\tw\index.html SETUPA~1.EXE File created C:\Program Files (x86)\SlySoft\AnyDVD\InstallHelp.dll SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\HelpLauncher.exe SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\language\AnyDVDtr.lng SETUPA~1.EXE File created C:\Program Files (x86)\SlySoft\AnyDVD\language\AnyDVDde.lng SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\language\AnyDVDzh.lng.tmp SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\language\AnyDVDno.lng.tmp SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\language\AnyDVDse.lng.tmp SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\manual\es\index.html.tmp SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\language\AnyDVDit.lng.tmp SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\manual\changes.txt SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\eraser\NTSC\VIDEO_TS\VTS_01_0.IFO.tmp SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\language\AnyDVDja.lng.tmp SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\language\AnyDVDsk.lng.tmp SETUPA~1.EXE File created C:\Program Files (x86)\SlySoft\AnyDVD\AnyDVDtray.exe SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\eraser\PAL\VIDEO_TS\VTS_02_0.IFO.tmp SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\language\AnyDVDbr.lng.tmp SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\language\AnyDVDnl.lng.tmp SETUPA~1.EXE File created C:\Program Files (x86)\SlySoft\AnyDVD\AnyDialog.dll SETUPA~1.EXE File created C:\Program Files (x86)\SlySoft\AnyDVD\language\AnyDVDzh.lng SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\manual\el\index.html SETUPA~1.EXE File created C:\Program Files (x86)\SlySoft\AnyDVD\language\AnyDVDsr.lng SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\language\AnyDVDua.lng.tmp SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\manual\images\slysoft-logo_l.gif.tmp SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\language\AnyDVDit.lng SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\manual\fi\index.html.tmp SETUPA~1.EXE File created C:\Program Files (x86)\SlySoft\AnyDVD\SetRegACL.exe SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\manual\ua\index.html SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\language\AnyDVDcz.lng.tmp SETUPA~1.EXE File created C:\Program Files (x86)\SlySoft\AnyDVD\language\AnyDVDes.lng SETUPA~1.EXE File created C:\Program Files (x86)\SlySoft\AnyDVD\language\AnyDVDru.lng SETUPA~1.EXE File opened for modification C:\Program Files (x86)\SlySoft\AnyDVD\language\AnyDVDfa.lng SETUPA~1.EXE File created C:\Program Files (x86)\SlySoft\AnyDVD\language\AnyDVDid.lng SETUPA~1.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_4014db815996cdacdf3bb0e4e83f2dfa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AnyDVDTray.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SetRegACL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SETUPA~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "160" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe -
Modifies registry class 24 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" SETUPA~1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/anydvd SETUPA~1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.AnyDVDHD SETUPA~1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Applications\RegAnyDVD.exe SETUPA~1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Applications\RegAnyDVD.exe\shell\open SETUPA~1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SlySoft.AnyDVD.1\shell\open\command SETUPA~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SlySoft.AnyDVD.1\shell\open\command\ = "\"C:\\Program Files (x86)\\SlySoft\\AnyDVD\\RegAnyDVD.exe\" \"%1\"" SETUPA~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/anydvd\Extension = ".AnyDVD" SETUPA~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.AnyDVD\ = "SlySoft.AnyDVD.1" SETUPA~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.AnyDVD\Content Type = "application/anydvd" SETUPA~1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Applications\RegAnyDVD.exe\shell\open\command SETUPA~1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key SETUPA~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/anydvdhd\Extension = ".AnyDVDHD" SETUPA~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.AnyDVDHD\ = "SlySoft.AnyDVD.1" SETUPA~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.AnyDVDHD\Content Type = "application/anydvdhd" SETUPA~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Applications\RegAnyDVD.exe\shell\open\command\ = "\"C:\\Program Files (x86)\\SlySoft\\AnyDVD\\RegAnyDVD.exe\" \"%1\"" SETUPA~1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SlySoft.AnyDVD.1 SETUPA~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SlySoft.AnyDVD.1\ = "AnyDVD Registration Key" SETUPA~1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SlySoft.AnyDVD.1\shell SETUPA~1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/anydvdhd SETUPA~1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.AnyDVD SETUPA~1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Applications SETUPA~1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Applications\RegAnyDVD.exe\shell SETUPA~1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SlySoft.AnyDVD.1\shell\open SETUPA~1.EXE -
Modifies registry key 1 TTPs 4 IoCs
pid Process 4988 reg.exe 224 reg.exe 228 reg.exe 3828 reg.exe -
Suspicious use of AdjustPrivilegeToken 38 IoCs
description pid Process Token: 1 3660 setup.exe Token: SeCreateTokenPrivilege 3660 setup.exe Token: SeAssignPrimaryTokenPrivilege 3660 setup.exe Token: SeLockMemoryPrivilege 3660 setup.exe Token: SeIncreaseQuotaPrivilege 3660 setup.exe Token: SeMachineAccountPrivilege 3660 setup.exe Token: SeTcbPrivilege 3660 setup.exe Token: SeSecurityPrivilege 3660 setup.exe Token: SeTakeOwnershipPrivilege 3660 setup.exe Token: SeLoadDriverPrivilege 3660 setup.exe Token: SeSystemProfilePrivilege 3660 setup.exe Token: SeSystemtimePrivilege 3660 setup.exe Token: SeProfSingleProcessPrivilege 3660 setup.exe Token: SeIncBasePriorityPrivilege 3660 setup.exe Token: SeCreatePagefilePrivilege 3660 setup.exe Token: SeCreatePermanentPrivilege 3660 setup.exe Token: SeBackupPrivilege 3660 setup.exe Token: SeRestorePrivilege 3660 setup.exe Token: SeShutdownPrivilege 3660 setup.exe Token: SeDebugPrivilege 3660 setup.exe Token: SeAuditPrivilege 3660 setup.exe Token: SeSystemEnvironmentPrivilege 3660 setup.exe Token: SeChangeNotifyPrivilege 3660 setup.exe Token: SeRemoteShutdownPrivilege 3660 setup.exe Token: SeUndockPrivilege 3660 setup.exe Token: SeSyncAgentPrivilege 3660 setup.exe Token: SeEnableDelegationPrivilege 3660 setup.exe Token: SeManageVolumePrivilege 3660 setup.exe Token: SeImpersonatePrivilege 3660 setup.exe Token: SeCreateGlobalPrivilege 3660 setup.exe Token: 31 3660 setup.exe Token: 32 3660 setup.exe Token: 33 3660 setup.exe Token: 34 3660 setup.exe Token: 35 3660 setup.exe Token: SeDebugPrivilege 3660 setup.exe Token: SeShutdownPrivilege 1252 SETUPA~1.EXE Token: SeDebugPrivilege 3660 setup.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 884 setup.exe 4748 setup.exe 3660 setup.exe 3660 setup.exe 3660 setup.exe 832 LogonUI.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 8 wrote to memory of 884 8 JaffaCakes118_4014db815996cdacdf3bb0e4e83f2dfa.exe 87 PID 8 wrote to memory of 884 8 JaffaCakes118_4014db815996cdacdf3bb0e4e83f2dfa.exe 87 PID 8 wrote to memory of 884 8 JaffaCakes118_4014db815996cdacdf3bb0e4e83f2dfa.exe 87 PID 884 wrote to memory of 4748 884 setup.exe 88 PID 884 wrote to memory of 4748 884 setup.exe 88 PID 884 wrote to memory of 4748 884 setup.exe 88 PID 884 wrote to memory of 4748 884 setup.exe 88 PID 884 wrote to memory of 4748 884 setup.exe 88 PID 884 wrote to memory of 4748 884 setup.exe 88 PID 884 wrote to memory of 4748 884 setup.exe 88 PID 884 wrote to memory of 4748 884 setup.exe 88 PID 4748 wrote to memory of 3660 4748 setup.exe 90 PID 4748 wrote to memory of 3660 4748 setup.exe 90 PID 4748 wrote to memory of 3660 4748 setup.exe 90 PID 4748 wrote to memory of 3660 4748 setup.exe 90 PID 4748 wrote to memory of 3660 4748 setup.exe 90 PID 4748 wrote to memory of 3660 4748 setup.exe 90 PID 4748 wrote to memory of 3660 4748 setup.exe 90 PID 4748 wrote to memory of 3660 4748 setup.exe 90 PID 8 wrote to memory of 1252 8 JaffaCakes118_4014db815996cdacdf3bb0e4e83f2dfa.exe 91 PID 8 wrote to memory of 1252 8 JaffaCakes118_4014db815996cdacdf3bb0e4e83f2dfa.exe 91 PID 8 wrote to memory of 1252 8 JaffaCakes118_4014db815996cdacdf3bb0e4e83f2dfa.exe 91 PID 3660 wrote to memory of 4388 3660 setup.exe 93 PID 3660 wrote to memory of 4388 3660 setup.exe 93 PID 3660 wrote to memory of 4388 3660 setup.exe 93 PID 3660 wrote to memory of 1372 3660 setup.exe 94 PID 3660 wrote to memory of 1372 3660 setup.exe 94 PID 3660 wrote to memory of 1372 3660 setup.exe 94 PID 3660 wrote to memory of 3748 3660 setup.exe 95 PID 3660 wrote to memory of 3748 3660 setup.exe 95 PID 3660 wrote to memory of 3748 3660 setup.exe 95 PID 3660 wrote to memory of 4284 3660 setup.exe 96 PID 3660 wrote to memory of 4284 3660 setup.exe 96 PID 3660 wrote to memory of 4284 3660 setup.exe 96 PID 1372 wrote to memory of 224 1372 cmd.exe 101 PID 1372 wrote to memory of 224 1372 cmd.exe 101 PID 1372 wrote to memory of 224 1372 cmd.exe 101 PID 4388 wrote to memory of 228 4388 cmd.exe 102 PID 4388 wrote to memory of 228 4388 cmd.exe 102 PID 4388 wrote to memory of 228 4388 cmd.exe 102 PID 4284 wrote to memory of 4988 4284 cmd.exe 103 PID 4284 wrote to memory of 4988 4284 cmd.exe 103 PID 4284 wrote to memory of 4988 4284 cmd.exe 103 PID 3748 wrote to memory of 3828 3748 cmd.exe 104 PID 3748 wrote to memory of 3828 3748 cmd.exe 104 PID 3748 wrote to memory of 3828 3748 cmd.exe 104 PID 1252 wrote to memory of 2272 1252 SETUPA~1.EXE 113 PID 1252 wrote to memory of 2272 1252 SETUPA~1.EXE 113 PID 1252 wrote to memory of 2272 1252 SETUPA~1.EXE 113 PID 1252 wrote to memory of 1324 1252 SETUPA~1.EXE 114 PID 1252 wrote to memory of 1324 1252 SETUPA~1.EXE 114 PID 1252 wrote to memory of 1324 1252 SETUPA~1.EXE 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4014db815996cdacdf3bb0e4e83f2dfa.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4014db815996cdacdf3bb0e4e83f2dfa.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\setup.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\setup.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\setup.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\setup.exe"3⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\setup.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\setup.exe"4⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f6⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:228
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\setup.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\setup.exe:*:Enabled:Windows Messanger" /f5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\setup.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\setup.exe:*:Enabled:Windows Messanger" /f6⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:224
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f6⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3828
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\svchost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\svchost.exe:*:Enabled:Windows Messanger" /f5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\svchost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\svchost.exe:*:Enabled:Windows Messanger" /f6⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4988
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUPA~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUPA~1.EXE2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Users\Admin\AppData\Local\Temp\nst9D49.tmp\AnyDVDTray.exe"C:\Users\Admin\AppData\Local\Temp\nst9D49.tmp\AnyDVDTray.exe" -c3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2272
-
-
C:\Program Files (x86)\SlySoft\AnyDVD\SetRegACL.exe"C:\Program Files (x86)\SlySoft\AnyDVD\SetRegACL.exe" Software\Microsoft\Windows\CurrentVersion\Explorer\DriveIcons 643⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1324
-
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa397a055 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:832
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
5Pre-OS Boot
1Bootkit
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD56880bce6d5c48861dfef9cf4025b443f
SHA1fd8431dada83de3e3d89c7ffbaddca831e7eb433
SHA25649609892beeeaf14dcf57e17a94053c5fcf42756cb2637375c96ea8952dca63e
SHA5120bb4af38190a60a968baf2abc5ff2cc651e2c3aee376596acae680bb3503957d417603397b9d0901dbb19919fd712066a54adb5240f5bcf02e444e49e8b53055
-
Filesize
4KB
MD5080c96bfa330dd18021b9507647a52a3
SHA11b7a2d89ec4eb3057ffa4f3245be7b2319d6af8a
SHA25603da71d1671acaf206e14d457f03557e961fa53b9da4ea20a6908ff0824009e0
SHA5128ddd8bbb70bc4038016468468f3f2e7742f3df76744f1fc33fe6a1690695e604e88eb7fc3f96843ba8f4b478611f5aed7d646228db73b5398e93d84e50bc2b00
-
Filesize
90KB
MD584169de84cde3677912c648bada4e600
SHA1434427ab22b4ebad7390ac8b0f3f6b9a04b6e42e
SHA25663f0eb9e9eb1cb6b7822ed37e998a7a77d6b79038dc58519d9e357debcbd9110
SHA512863165f2c27de8775bedae7f1ee2e61230786f7266611420538717d6adddd6edafd206c8b5dd39319ad2e2f2d8d4e6ce0d58320d763061c6ec4e213b045cad76
-
Filesize
52KB
MD5d866d346523fcb09f96384afcbd8f757
SHA1d53600fcaf09f42bf1c0b2411960bb66f702b76a
SHA256bd36f2094a3d2fd79a649f00e4196e45c50727dc745d570d1804e0834266a934
SHA5127547d86136d266f670bcc6d8b126ca58d38596dda3c47183799f7b79cb1461d118b825b91fa066fe1126b123e00351bc18fa335a43e36932f13c047bbe300e53
-
Filesize
6.1MB
MD5b2eafc38fafbe40722dc7eed655e304c
SHA14cfa5482f6b4c72b16485d929bec020c8c7ad366
SHA2569d84ac796710b7b59b1f7772cd6c6da1fa8136c77d85ff0321b2c916686e346c
SHA512fb3c94765531ea9c9c1aa2d517316b0c50874e62350ed06a99231496a598b5cdbd5b7904157efe9be332bb087d932d67e8d53efa22001398cbe908ec78323618
-
Filesize
404KB
MD5e08181892440c61a291ce6a2b6854665
SHA18f15394936201860f27208598f997512e5cae5b0
SHA25662db06ca80a0b52f3c0adbfb431931fd59030d6318b4aa0640f295ec2786567f
SHA512a54d78a22241c537c3d960e5b5c9bcd297c3cd384b654f8585afc51b2e27ff584beb5ef5c9417a168b112aa4bd4ffd9a8ad2637d3fe6a13e8ce21768ec875ac9
-
Filesize
4.3MB
MD5f5e7fb080e61cb64a1c87ea184221bbb
SHA1dca8867a86fb72dfa5d169482c890d13b1cdf1a9
SHA2565b0bfac52b2f1cead27a118a7761b62e17ba4b008340e503749e7a57960e3870
SHA512da3a8221d7d46ad1a24638c4a0d2a80993eb7ea254d57f0de3ad7a9907932dbd883ef78201a8213d082bdb2fe1c8f0c968042bd1b5671e60faf1f4f431cfda78