Analysis
-
max time kernel
150s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
29/03/2025, 19:19
Behavioral task
behavioral1
Sample
JaffaCakes118_9462b737c1559858d26f4d49ff0341ab.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_9462b737c1559858d26f4d49ff0341ab.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_9462b737c1559858d26f4d49ff0341ab.exe
-
Size
125KB
-
MD5
9462b737c1559858d26f4d49ff0341ab
-
SHA1
b7b15bfcb2a0dc1c4d82560987df4828f5c3742a
-
SHA256
3e7158db9e3287b1a3fc89b3b7b609e4879e553c7d59cfddc0117fa764b4844f
-
SHA512
d0e6c9eae2390b1991fb2d533d1f195fa2d7387d966f033312d979899d5bee6979e4497546eb3b8d513c81e91b5c3b2edfbc085177ca2b1f0be4cf03344e6586
-
SSDEEP
3072:K7pn7qMJA3QLOmQX1McZhrdp37hEriLzVecQe5:Gjy3VX/ZxAi1ecd
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Windows\\Csrss.exe" Csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Windows\\Csrss.exe" JaffaCakes118_9462b737c1559858d26f4d49ff0341ab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe" JaffaCakes118_9462b737c1559858d26f4d49ff0341ab.exe -
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run JaffaCakes118_9462b737c1559858d26f4d49ff0341ab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Runtime Process = "C:\\Windows\\Csrss.exe" JaffaCakes118_9462b737c1559858d26f4d49ff0341ab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run Csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Runtime Process = "C:\\Windows\\Csrss.exe" Csrss.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 12 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{44BBA855-CC51-11CF-AAFA-00AA00B6017B} Csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{44BBA855-CC51-11CF-AAFA-00AA00B6017B}\ComponentID = "Runtime Process" Csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{44BBA855-CC51-11CF-AAFA-00AA00B6017B}\IsInstalled = "0x00000001 [1]" Csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{44BBA855-CC51-11CF-AAFA-00AA00B6017B}\Locale = "en" Csrss.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{44BBA855-CC51-11CF-AAFA-00AA00B6017B} JaffaCakes118_9462b737c1559858d26f4d49ff0341ab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{44BBA855-CC51-11CF-AAFA-00AA00B6017B}\ComponentID = "Runtime Process" JaffaCakes118_9462b737c1559858d26f4d49ff0341ab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{44BBA855-CC51-11CF-AAFA-00AA00B6017B}\Locale = "en" JaffaCakes118_9462b737c1559858d26f4d49ff0341ab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{44BBA855-CC51-11CF-AAFA-00AA00B6017B}\Version = "4,88,55,1" JaffaCakes118_9462b737c1559858d26f4d49ff0341ab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{44BBA855-CC51-11CF-AAFA-00AA00B6017B}\StubPath = "C:\\Windows\\Csrss.exe" Csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{44BBA855-CC51-11CF-AAFA-00AA00B6017B}\Version = "4,88,55,1" Csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{44BBA855-CC51-11CF-AAFA-00AA00B6017B}\StubPath = "C:\\Windows\\Csrss.exe" JaffaCakes118_9462b737c1559858d26f4d49ff0341ab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{44BBA855-CC51-11CF-AAFA-00AA00B6017B}\IsInstalled = "0x00000001 [1]" JaffaCakes118_9462b737c1559858d26f4d49ff0341ab.exe -
A potential corporate email address has been identified in the URL: [email protected]
-
Executes dropped EXE 9 IoCs
pid Process 776 Csrss.exe 2588 Csrss.exe 444 Csrss.exe 3912 Csrss.exe 3512 Csrss.exe 1948 Csrss.exe 232 Csrss.exe 2560 Csrss.exe 188 Csrss.exe -
Loads dropped DLL 4 IoCs
pid Process 2636 regsvr32.exe 644 JaffaCakes118_9462b737c1559858d26f4d49ff0341ab.exe 4448 regsvr32.exe 776 Csrss.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices\Runtime Process = "C:\\Windows\\Csrss.exe" Csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Runtime Process = "C:\\Windows\\Csrss.exe" JaffaCakes118_9462b737c1559858d26f4d49ff0341ab.exe Set value (str) \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Runtime Process = "C:\\Windows\\Csrss.exe" JaffaCakes118_9462b737c1559858d26f4d49ff0341ab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\Runtime Process = "C:\\Windows\\Csrss.exe" JaffaCakes118_9462b737c1559858d26f4d49ff0341ab.exe Set value (str) \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices\Runtime Process = "C:\\Windows\\Csrss.exe" JaffaCakes118_9462b737c1559858d26f4d49ff0341ab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Runtime Process = "C:\\Windows\\Csrss.exe" Csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Runtime Process = "C:\\Windows\\Csrss.exe" Csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\Runtime Process = "C:\\Windows\\Csrss.exe" Csrss.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\winconf.bat JaffaCakes118_9462b737c1559858d26f4d49ff0341ab.exe File opened for modification C:\Windows\SysWOW64\okl.okl Csrss.exe File opened for modification C:\Windows\SysWOW64\Mswinsck.ocx JaffaCakes118_9462b737c1559858d26f4d49ff0341ab.exe -
resource yara_rule behavioral2/memory/644-0-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral2/files/0x00080000000240a5-10.dat upx behavioral2/memory/644-21-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral2/memory/644-19-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral2/memory/2588-26-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral2/memory/444-29-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral2/memory/188-46-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral2/memory/3512-48-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral2/memory/1948-56-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral2/memory/2560-58-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral2/memory/776-67-0x0000000000400000-0x0000000000458000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\Csrss.exe JaffaCakes118_9462b737c1559858d26f4d49ff0341ab.exe File created C:\Windows\Csrss.exe JaffaCakes118_9462b737c1559858d26f4d49ff0341ab.exe File opened for modification C:\Windows\Csrss.exe Csrss.exe -
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Csrss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Csrss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Csrss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_9462b737c1559858d26f4d49ff0341ab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Csrss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Csrss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Csrss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Csrss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Csrss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Csrss.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\FLAGS regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock\ = "Microsoft WinSock Control, version 6.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock\CurVer regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Implemented Categories\{0DE86A57-2BAA-11CF-A229-00AA003D7352} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD897-BB45-11CF-9ABC-0080C7E7B78D}\InprocServer32\ = "C:\\Windows\\SysWow64\\Mswinsck.ocx" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\MiscStatus\1 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Implemented Categories\{0DE86A52-2BAA-11CF-A229-00AA003D7352} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Implemented Categories\{40FC6ED4-2438-11CF-A3DB-080036F12502} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\ = "{248DD890-BB45-11CF-9ABC-0080C7E7B78D}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\MiscStatus\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD897-BB45-11CF-9ABC-0080C7E7B78D} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\0\win32\ = "C:\\Windows\\SysWow64\\Mswinsck.ocx" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\InprocServer32\ = "C:\\Windows\\SysWow64\\Mswinsck.ocx" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Control regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Version\ = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Control regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD897-BB45-11CF-9ABC-0080C7E7B78D}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Implemented Categories\{0DE86A57-2BAA-11CF-A229-00AA003D7352} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\VersionIndependentProgID\ = "MSWinsock.Winsock" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\ = "{248DD890-BB45-11CF-9ABC-0080C7E7B78D}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock\ = "Microsoft WinSock Control, version 6.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock.1\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Version regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Programmable regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock.1\CLSID\ = "{248DD896-BB45-11CF-9ABC-0080C7E7B78D}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\ProgID\ = "MSWinsock.Winsock.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock.1\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\MiscStatus\1 regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD897-BB45-11CF-9ABC-0080C7E7B78D} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock\CurVer\ = "MSWinsock.Winsock.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\0\win32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\ = "IMSWinsockControl" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\ToolboxBitmap32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD897-BB45-11CF-9ABC-0080C7E7B78D}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\ = "{248DD890-BB45-11CF-9ABC-0080C7E7B78D}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD897-BB45-11CF-9ABC-0080C7E7B78D} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\ = "Microsoft WinSock Control, version 6.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock.1\ = "Microsoft WinSock Control, version 6.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\0\win32\ = "C:\\Windows\\SysWow64\\Mswinsck.ocx" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\VersionIndependentProgID\ = "MSWinsock.Winsock" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\VersionIndependentProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\InprocServer32\ = "C:\\Windows\\SysWow64\\Mswinsck.ocx" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Version\ = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock\CurVer\ = "MSWinsock.Winsock.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\ProgID\ = "MSWinsock.Winsock.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock.1\ = "Microsoft WinSock Control, version 6.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\HELPDIR\ regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 776 Csrss.exe 776 Csrss.exe 776 Csrss.exe 776 Csrss.exe 776 Csrss.exe 776 Csrss.exe 776 Csrss.exe 776 Csrss.exe 776 Csrss.exe 776 Csrss.exe 776 Csrss.exe 776 Csrss.exe 776 Csrss.exe 776 Csrss.exe 776 Csrss.exe 776 Csrss.exe 776 Csrss.exe 776 Csrss.exe 776 Csrss.exe 776 Csrss.exe 776 Csrss.exe 776 Csrss.exe 776 Csrss.exe 776 Csrss.exe 776 Csrss.exe 776 Csrss.exe 776 Csrss.exe 776 Csrss.exe 776 Csrss.exe 776 Csrss.exe 776 Csrss.exe 776 Csrss.exe 776 Csrss.exe 776 Csrss.exe 776 Csrss.exe 776 Csrss.exe 776 Csrss.exe 776 Csrss.exe 776 Csrss.exe 776 Csrss.exe 776 Csrss.exe 776 Csrss.exe 776 Csrss.exe 776 Csrss.exe 776 Csrss.exe 776 Csrss.exe 776 Csrss.exe 776 Csrss.exe 776 Csrss.exe 776 Csrss.exe 776 Csrss.exe 776 Csrss.exe 776 Csrss.exe 776 Csrss.exe 776 Csrss.exe 776 Csrss.exe 776 Csrss.exe 776 Csrss.exe 776 Csrss.exe 776 Csrss.exe 776 Csrss.exe 776 Csrss.exe 776 Csrss.exe 776 Csrss.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 644 JaffaCakes118_9462b737c1559858d26f4d49ff0341ab.exe 776 Csrss.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 644 JaffaCakes118_9462b737c1559858d26f4d49ff0341ab.exe Token: SeIncBasePriorityPrivilege 776 Csrss.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 644 JaffaCakes118_9462b737c1559858d26f4d49ff0341ab.exe 776 Csrss.exe 2588 Csrss.exe 444 Csrss.exe 3912 Csrss.exe 3512 Csrss.exe 1948 Csrss.exe 2560 Csrss.exe 232 Csrss.exe 188 Csrss.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 644 wrote to memory of 2636 644 JaffaCakes118_9462b737c1559858d26f4d49ff0341ab.exe 86 PID 644 wrote to memory of 2636 644 JaffaCakes118_9462b737c1559858d26f4d49ff0341ab.exe 86 PID 644 wrote to memory of 2636 644 JaffaCakes118_9462b737c1559858d26f4d49ff0341ab.exe 86 PID 644 wrote to memory of 776 644 JaffaCakes118_9462b737c1559858d26f4d49ff0341ab.exe 98 PID 644 wrote to memory of 776 644 JaffaCakes118_9462b737c1559858d26f4d49ff0341ab.exe 98 PID 644 wrote to memory of 776 644 JaffaCakes118_9462b737c1559858d26f4d49ff0341ab.exe 98 PID 776 wrote to memory of 4448 776 Csrss.exe 99 PID 776 wrote to memory of 4448 776 Csrss.exe 99 PID 776 wrote to memory of 4448 776 Csrss.exe 99 PID 644 wrote to memory of 4648 644 JaffaCakes118_9462b737c1559858d26f4d49ff0341ab.exe 112 PID 644 wrote to memory of 4648 644 JaffaCakes118_9462b737c1559858d26f4d49ff0341ab.exe 112 PID 644 wrote to memory of 4648 644 JaffaCakes118_9462b737c1559858d26f4d49ff0341ab.exe 112 PID 5060 wrote to memory of 2588 5060 cmd.exe 120 PID 5060 wrote to memory of 2588 5060 cmd.exe 120 PID 5060 wrote to memory of 2588 5060 cmd.exe 120 PID 1680 wrote to memory of 444 1680 cmd.exe 121 PID 1680 wrote to memory of 444 1680 cmd.exe 121 PID 1680 wrote to memory of 444 1680 cmd.exe 121 PID 4176 wrote to memory of 3912 4176 cmd.exe 122 PID 4176 wrote to memory of 3912 4176 cmd.exe 122 PID 4176 wrote to memory of 3912 4176 cmd.exe 122 PID 4116 wrote to memory of 3512 4116 cmd.exe 123 PID 4116 wrote to memory of 3512 4116 cmd.exe 123 PID 4116 wrote to memory of 3512 4116 cmd.exe 123 PID 1272 wrote to memory of 1948 1272 cmd.exe 124 PID 1272 wrote to memory of 1948 1272 cmd.exe 124 PID 1272 wrote to memory of 1948 1272 cmd.exe 124 PID 4948 wrote to memory of 232 4948 cmd.exe 125 PID 4948 wrote to memory of 232 4948 cmd.exe 125 PID 4948 wrote to memory of 232 4948 cmd.exe 125 PID 2396 wrote to memory of 2560 2396 cmd.exe 126 PID 2396 wrote to memory of 2560 2396 cmd.exe 126 PID 2396 wrote to memory of 2560 2396 cmd.exe 126 PID 956 wrote to memory of 188 956 cmd.exe 127 PID 956 wrote to memory of 188 956 cmd.exe 127 PID 956 wrote to memory of 188 956 cmd.exe 127
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9462b737c1559858d26f4d49ff0341ab.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9462b737c1559858d26f4d49ff0341ab.exe"1⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s C:\Windows\system32\Mswinsck.ocx2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2636
-
-
C:\Windows\Csrss.exeC:\Windows\Csrss.exe2⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s C:\Windows\system32\Mswinsck.ocx3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4448
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\winconf.bat2⤵
- System Location Discovery: System Language Discovery
PID:4648
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\Csrss.exe1⤵
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\Csrss.exeC:\Windows\Csrss.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2560
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\Csrss.exe1⤵
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Windows\Csrss.exeC:\Windows\Csrss.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:188
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\Csrss.exe1⤵
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Windows\Csrss.exeC:\Windows\Csrss.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1948
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\Csrss.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Windows\Csrss.exeC:\Windows\Csrss.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3512
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\Csrss.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Windows\Csrss.exeC:\Windows\Csrss.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3912
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\Csrss.exe1⤵
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Windows\Csrss.exeC:\Windows\Csrss.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2588
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\Csrss.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Windows\Csrss.exeC:\Windows\Csrss.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:232
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\Csrss.exe1⤵
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\Csrss.exeC:\Windows\Csrss.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:444
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
4Active Setup
1Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
125KB
MD59462b737c1559858d26f4d49ff0341ab
SHA1b7b15bfcb2a0dc1c4d82560987df4828f5c3742a
SHA2563e7158db9e3287b1a3fc89b3b7b609e4879e553c7d59cfddc0117fa764b4844f
SHA512d0e6c9eae2390b1991fb2d533d1f195fa2d7387d966f033312d979899d5bee6979e4497546eb3b8d513c81e91b5c3b2edfbc085177ca2b1f0be4cf03344e6586
-
Filesize
106KB
MD53d8fd62d17a44221e07d5c535950449b
SHA16c9d2ecdd7c2d1b9660d342e2b95a82229486d27
SHA256eba048e3a9cb11671d0e3c5a0b243b304d421762361fe24fd5ea08cb66704b09
SHA512501e22a0f99e18f6405356184506bc5849adc2c1df3bdee71f2b4514ab0e3e36673b4aecbd615d24ebb4be5a28570b2a6f80bd52331edb658f7a5f5a9d686d10
-
Filesize
176B
MD5ff8476f94098af0cd370ae8eb3b81072
SHA146ed4fe90cdecf0d8eaa1663ad878bcce5648162
SHA2562359f6fa0390301086709ac9be6e6623c7b30a87dd86e6393a833c3814003f06
SHA51299ed3b11ba68979071c5ce21bd3dfb097fd7a48b4044f09dfd88d7c61493f6a9c1170ab061a238a966bbbf4e857584e9a6aac1f02b3357795dd31144f4a4b825