Malware Analysis Report

2025-08-05 14:55

Sample ID 250704-v4dj1swyez
Target JaffaCakes118_1c7039ad3300c33937a4dbace449d68d
SHA256 7cba5943a26d2978cfe40816315127064ba477ec76bfc7306a6075ab021a6218
Tags
execution discovery installer spyware stealer adware
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V16

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral5

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral9

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral14

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral6

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral12

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral13

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral15

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral4

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral7

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral16

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral8

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral10

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral11

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

7cba5943a26d2978cfe40816315127064ba477ec76bfc7306a6075ab021a6218

Threat Level: Shows suspicious behavior

The file JaffaCakes118_1c7039ad3300c33937a4dbace449d68d was found to be: Shows suspicious behavior.

Malicious Activity Summary

execution discovery installer spyware stealer adware

Reads user/profile data of web browsers

Checks computer location settings

Executes dropped EXE

Loads dropped DLL

Checks installed software on the system

Installs/modifies Browser Helper Object

Drops file in System32 directory

Drops file in Program Files directory

Program crash

Command and Scripting Interpreter: JavaScript

Enumerates physical storage devices

Unsigned PE

System Location Discovery: System Language Discovery

NSIS installer

Suspicious behavior: EnumeratesProcesses

Modifies registry class

Suspicious use of WriteProcessMemory

Modifies Internet Explorer settings

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2025-07-04 17:32

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

NSIS installer

installer
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Analysis: behavioral5

Detonation Overview

Submitted

2025-07-04 17:32

Reported

2025-07-04 17:34

Platform

win10v2004-20250502-en

Max time kernel

102s

Max time network

147s

Command Line

wscript.exe C:\Users\Admin\AppData\Local\Temp\ffRichMediaViewV1release2984chaction.js

Signatures

Command and Scripting Interpreter: JavaScript

execution

Processes

C:\Windows\system32\wscript.exe

wscript.exe C:\Users\Admin\AppData\Local\Temp\ffRichMediaViewV1release2984chaction.js

Network

Country Destination Domain Proto
US 8.8.8.8:53 c.pki.goog udp
GB 142.250.180.3:80 c.pki.goog tcp

Files

N/A

Analysis: behavioral9

Detonation Overview

Submitted

2025-07-04 17:32

Reported

2025-07-04 17:34

Platform

win10v2004-20250610-en

Max time kernel

104s

Max time network

129s

Command Line

wscript.exe C:\Users\Admin\AppData\Local\Temp\ff\chrome\content\ffRichMediaViewV1release2984ffaction.js

Signatures

Command and Scripting Interpreter: JavaScript

execution

Processes

C:\Windows\system32\wscript.exe

wscript.exe C:\Users\Admin\AppData\Local\Temp\ff\chrome\content\ffRichMediaViewV1release2984ffaction.js

Network

Country Destination Domain Proto
GB 2.18.27.76:443 www.bing.com tcp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 20.42.65.85:443 tcp
US 8.8.8.8:53 c.pki.goog udp
GB 142.250.180.3:80 c.pki.goog tcp

Files

N/A

Analysis: behavioral14

Detonation Overview

Submitted

2025-07-04 17:32

Reported

2025-07-04 17:34

Platform

win11-20250619-en

Max time kernel

101s

Max time network

110s

Command Line

"C:\Users\Admin\AppData\Local\Temp\uninstall.exe"

Signatures

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe N/A

Reads user/profile data of web browsers

spyware stealer

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\uninstall.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe N/A

NSIS installer

installer
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Processes

C:\Users\Admin\AppData\Local\Temp\uninstall.exe

"C:\Users\Admin\AppData\Local\Temp\uninstall.exe"

C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe

"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\

Network

Country Destination Domain Proto
US 52.111.227.13:443 tcp

Files

C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe

MD5 64af24c71dff40b69397c3a69581427c
SHA1 bbb4c291ee344c0170dee0bb75dc16928171b67c
SHA256 88a61cfb1ca6536eec088b1bd3f47f21736e33cb8692a5edb3b6d33e476f0e84
SHA512 c3972b8e63c3a6fd3b47d23f8c0a5058dd05d543365ab611a03f985d02b379fd53205caf3a0e6aad99467da173bd3dd9fe45b6550da95fca934c30400a824feb

C:\Users\Admin\AppData\Local\Temp\nslAEA0.tmp\aminsis.dll

MD5 450753ad96785a240a39deccab3af0d0
SHA1 21c544064d2ffa6444508268ce258a330d459fc5
SHA256 1c371dcc6c3428ea98fb0d2dcb612b4ebc731f3ed72e683c8e33058cd2a952d3
SHA512 c41b834f4228b7668316095569c836b4e0d55c5fbf310c65b0e0453ef0e74a3ce8f9357cea90b80f6590f85dd7708eeb4eec27518811ea4aab20c0e7f5643dab

Analysis: behavioral2

Detonation Overview

Submitted

2025-07-04 17:32

Reported

2025-07-04 17:34

Platform

win11-20250610-en

Max time kernel

121s

Max time network

104s

Command Line

"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c7039ad3300c33937a4dbace449d68d.exe"

Signatures

Reads user/profile data of web browsers

spyware stealer

Checks installed software on the system

discovery

Installs/modifies Browser Helper Object

stealer adware
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{405ba82f-4c9c-4c0e-b262-284304b85735}\NoExplorer = "1" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{405ba82f-4c9c-4c0e-b262-284304b85735} C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{405ba82f-4c9c-4c0e-b262-284304b85735}\ = "RichMediaViewV1release2984" C:\Windows\SysWOW64\regsvr32.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File opened for modification C:\Windows\System32\GroupPolicy C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c7039ad3300c33937a4dbace449d68d.exe N/A
File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c7039ad3300c33937a4dbace449d68d.exe N/A
File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c7039ad3300c33937a4dbace449d68d.exe N/A
File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c7039ad3300c33937a4dbace449d68d.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files (x86)\RichMediaViewV1\RichMediaViewV1release2984\ch\RichMediaViewV1release2984.crx C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c7039ad3300c33937a4dbace449d68d.exe N/A
File created C:\Program Files (x86)\RichMediaViewV1\RichMediaViewV1release2984\ff\chrome\content\ffRichMediaViewV1release2984.js C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c7039ad3300c33937a4dbace449d68d.exe N/A
File opened for modification C:\Program Files (x86)\RichMediaViewV1\RichMediaViewV1release2984\ff\chrome\content\ffRichMediaViewV1release2984ffaction.js C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c7039ad3300c33937a4dbace449d68d.exe N/A
File opened for modification C:\Program Files (x86)\RichMediaViewV1\RichMediaViewV1release2984\ff\chrome\content\icons\Thumbs.db C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c7039ad3300c33937a4dbace449d68d.exe N/A
File opened for modification C:\Program Files (x86)\RichMediaViewV1\RichMediaViewV1release2984\ch\RichMediaViewV1release2984.crx C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c7039ad3300c33937a4dbace449d68d.exe N/A
File opened for modification C:\Program Files (x86)\RichMediaViewV1\RichMediaViewV1release2984\ff\chrome.manifest C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c7039ad3300c33937a4dbace449d68d.exe N/A
File created C:\Program Files (x86)\RichMediaViewV1\RichMediaViewV1release2984\ff\install.rdf C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c7039ad3300c33937a4dbace449d68d.exe N/A
File opened for modification C:\Program Files (x86)\RichMediaViewV1\RichMediaViewV1release2984\ff\chrome\content C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c7039ad3300c33937a4dbace449d68d.exe N/A
File opened for modification C:\Program Files (x86)\RichMediaViewV1\RichMediaViewV1release2984\ff\chrome\content\ffRichMediaViewV1release2984.js C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c7039ad3300c33937a4dbace449d68d.exe N/A
File created C:\Program Files (x86)\RichMediaViewV1\RichMediaViewV1release2984\ff\chrome\content\ffRichMediaViewV1release2984ffaction.js C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c7039ad3300c33937a4dbace449d68d.exe N/A
File created C:\Program Files (x86)\RichMediaViewV1\RichMediaViewV1release2984\ff\chrome\content\icons\default\RichMediaViewV1release2984_32.png C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c7039ad3300c33937a4dbace449d68d.exe N/A
File created C:\Program Files (x86)\RichMediaViewV1\RichMediaViewV1release2984\ie\RichMediaViewV1release2984.dll C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c7039ad3300c33937a4dbace449d68d.exe N/A
File created C:\Program Files (x86)\RichMediaViewV1\RichMediaViewV1release2984\ff\chrome.manifest C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c7039ad3300c33937a4dbace449d68d.exe N/A
File created C:\Program Files (x86)\RichMediaViewV1\RichMediaViewV1release2984\ff\chrome\content\overlay.xul C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c7039ad3300c33937a4dbace449d68d.exe N/A
File opened for modification C:\Program Files (x86)\RichMediaViewV1\RichMediaViewV1release2984\ff\chrome\content\overlay.xul C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c7039ad3300c33937a4dbace449d68d.exe N/A
File created C:\Program Files (x86)\RichMediaViewV1\RichMediaViewV1release2984\ff\chrome\content\icons\Thumbs.db C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c7039ad3300c33937a4dbace449d68d.exe N/A
File opened for modification C:\Program Files (x86)\RichMediaViewV1\RichMediaViewV1release2984\ff\chrome\content\icons\default\RichMediaViewV1release2984_32.png C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c7039ad3300c33937a4dbace449d68d.exe N/A
File opened for modification C:\Program Files (x86)\RichMediaViewV1\RichMediaViewV1release2984\ff\install.rdf C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c7039ad3300c33937a4dbace449d68d.exe N/A
File opened for modification C:\Program Files (x86)\RichMediaViewV1\RichMediaViewV1release2984\ff\chrome C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c7039ad3300c33937a4dbace449d68d.exe N/A
File opened for modification C:\Program Files (x86)\RichMediaViewV1\RichMediaViewV1release2984\ff\chrome\content\icons C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c7039ad3300c33937a4dbace449d68d.exe N/A
File opened for modification C:\Program Files (x86)\RichMediaViewV1\RichMediaViewV1release2984\ff\chrome\content\icons\default C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c7039ad3300c33937a4dbace449d68d.exe N/A
File created C:\Program Files (x86)\RichMediaViewV1\RichMediaViewV1release2984\uninstall.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c7039ad3300c33937a4dbace449d68d.exe N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c7039ad3300c33937a4dbace449d68d.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\regsvr32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\gpupdate.exe N/A

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-2238466657-712128251-1221219315-1000\Software\Microsoft\Internet Explorer\Approved Extensions C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c7039ad3300c33937a4dbace449d68d.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-2238466657-712128251-1221219315-1000\Software\Microsoft\Internet Explorer\Approved Extensions\{405ba82f-4c9c-4c0e-b262-284304b85735} = 51667a6c4c1d3b1b3fb44b5aa31b6707a86c6d0303fa1028 C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c7039ad3300c33937a4dbace449d68d.exe N/A

Modifies registry class

Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B96B50C3-CB22-46EC-9144-2B31608332A0}\TypeLib\ = "{83332AB3-CEB0-493E-9686-476AE8E95EB2}" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B96B50C3-CB22-46EC-9144-2B31608332A0}\TypeLib\ = "{83332AB3-CEB0-493E-9686-476AE8E95EB2}" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{405ba82f-4c9c-4c0e-b262-284304b85735}\Version\ = "1.1" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{83332AB3-CEB0-493E-9686-476AE8E95EB2}\1.1 C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B96B50C3-CB22-46EC-9144-2B31608332A0}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B96B50C3-CB22-46EC-9144-2B31608332A0}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{405ba82f-4c9c-4c0e-b262-284304b85735} C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c7039ad3300c33937a4dbace449d68d.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{83332AB3-CEB0-493E-9686-476AE8E95EB2} C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{83332AB3-CEB0-493E-9686-476AE8E95EB2}\1.1\FLAGS\ = "0" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{83332AB3-CEB0-493E-9686-476AE8E95EB2}\1.1\0\win32\ = "C:\\Program Files (x86)\\RichMediaViewV1\\RichMediaViewV1release2984\\ie\\RichMediaViewV1release2984.dll" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B96B50C3-CB22-46EC-9144-2B31608332A0}\TypeLib\Version = "1.1" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{83332AB3-CEB0-493E-9686-476AE8E95EB2}\1.1\ = "RichMediaViewV1release2984Lib" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{83332AB3-CEB0-493E-9686-476AE8E95EB2}\1.1\FLAGS C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B96B50C3-CB22-46EC-9144-2B31608332A0}\TypeLib C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B96B50C3-CB22-46EC-9144-2B31608332A0}\TypeLib\Version = "1.1" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B96B50C3-CB22-46EC-9144-2B31608332A0} C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{405ba82f-4c9c-4c0e-b262-284304b85735}\ = "RichMediaViewV1release2984" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{405ba82f-4c9c-4c0e-b262-284304b85735}\Programmable C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{405ba82f-4c9c-4c0e-b262-284304b85735}\InprocServer32 C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{83332AB3-CEB0-493E-9686-476AE8E95EB2}\1.1\0 C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{83332AB3-CEB0-493E-9686-476AE8E95EB2}\1.1\HELPDIR C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{405ba82f-4c9c-4c0e-b262-284304b85735} C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{405ba82f-4c9c-4c0e-b262-284304b85735}\TypeLib\ = "{83332ab3-ceb0-493e-9686-476ae8e95eb2}" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{83332AB3-CEB0-493E-9686-476AE8E95EB2}\1.1\0\win32 C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B96B50C3-CB22-46EC-9144-2B31608332A0} C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B96B50C3-CB22-46EC-9144-2B31608332A0}\ = "IRichMediaViewV1release2984BHO" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B96B50C3-CB22-46EC-9144-2B31608332A0}\ProxyStubClsid32 C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{405ba82f-4c9c-4c0e-b262-284304b85735}\InprocServer32\ThreadingModel = "Apartment" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{405ba82f-4c9c-4c0e-b262-284304b85735}\TypeLib C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{83332AB3-CEB0-493E-9686-476AE8E95EB2}\1.1\HELPDIR\ = "C:\\Program Files (x86)\\RichMediaViewV1\\RichMediaViewV1release2984\\ie" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B96B50C3-CB22-46EC-9144-2B31608332A0}\ProxyStubClsid32 C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B96B50C3-CB22-46EC-9144-2B31608332A0}\TypeLib C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{405ba82f-4c9c-4c0e-b262-284304b85735}\ = "Rich Media View" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c7039ad3300c33937a4dbace449d68d.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B96B50C3-CB22-46EC-9144-2B31608332A0}\ = "IRichMediaViewV1release2984BHO" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{405ba82f-4c9c-4c0e-b262-284304b85735}\InprocServer32\ = "C:\\Program Files (x86)\\RichMediaViewV1\\RichMediaViewV1release2984\\ie\\RichMediaViewV1release2984.dll" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{405ba82f-4c9c-4c0e-b262-284304b85735}\Version C:\Windows\SysWOW64\regsvr32.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c7039ad3300c33937a4dbace449d68d.exe

"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c7039ad3300c33937a4dbace449d68d.exe"

C:\Windows\SysWOW64\regsvr32.exe

regsvr32 "C:\Program Files (x86)\RichMediaViewV1\RichMediaViewV1release2984\ie\RichMediaViewV1release2984.dll" /s

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum

C:\Windows\SysWOW64\gpupdate.exe

"C:\Windows\System32\gpupdate.exe" /force

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp

Files

C:\Users\Admin\AppData\Local\Temp\nsuB7E7.tmp\aminsis.dll

MD5 450753ad96785a240a39deccab3af0d0
SHA1 21c544064d2ffa6444508268ce258a330d459fc5
SHA256 1c371dcc6c3428ea98fb0d2dcb612b4ebc731f3ed72e683c8e33058cd2a952d3
SHA512 c41b834f4228b7668316095569c836b4e0d55c5fbf310c65b0e0453ef0e74a3ce8f9357cea90b80f6590f85dd7708eeb4eec27518811ea4aab20c0e7f5643dab

C:\Program Files (x86)\RichMediaViewV1\RichMediaViewV1release2984\ie\RichMediaViewV1release2984.dll

MD5 ea0eb71b283758d746896255bb91a35a
SHA1 3ea49116a5fc20de6ebd480e55b709f366a9ba50
SHA256 6a951bc2332458d71b5a47284de8bf8407758025932f61dcb9f168ef4080a49e
SHA512 2866908d432132082a1a337649a930eb5a9fea1cd9e289eb22521d0fd080db6e98565f4225b18684193897cccf5b35bfbd5106a30b584f89b3a16214c252520b

Analysis: behavioral6

Detonation Overview

Submitted

2025-07-04 17:32

Reported

2025-07-04 17:34

Platform

win11-20250610-en

Max time kernel

101s

Max time network

105s

Command Line

wscript.exe C:\Users\Admin\AppData\Local\Temp\ffRichMediaViewV1release2984chaction.js

Signatures

Command and Scripting Interpreter: JavaScript

execution

Processes

C:\Windows\system32\wscript.exe

wscript.exe C:\Users\Admin\AppData\Local\Temp\ffRichMediaViewV1release2984chaction.js

Network

Files

N/A

Analysis: behavioral12

Detonation Overview

Submitted

2025-07-04 17:32

Reported

2025-07-04 17:34

Platform

win11-20250619-en

Max time kernel

101s

Max time network

104s

Command Line

regsvr32 /s C:\Users\Admin\AppData\Local\Temp\ie\RichMediaViewV1release2984.dll

Signatures

Installs/modifies Browser Helper Object

stealer adware
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{405ba82f-4c9c-4c0e-b262-284304b85735} C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{405ba82f-4c9c-4c0e-b262-284304b85735}\ = "RichMediaViewV1release2984" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{405ba82f-4c9c-4c0e-b262-284304b85735}\NoExplorer = "1" C:\Windows\SysWOW64\regsvr32.exe N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\regsvr32.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{405ba82f-4c9c-4c0e-b262-284304b85735} C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{405ba82f-4c9c-4c0e-b262-284304b85735}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ie\\RichMediaViewV1release2984.dll" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{405ba82f-4c9c-4c0e-b262-284304b85735}\TypeLib C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{83332AB3-CEB0-493E-9686-476AE8E95EB2} C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{83332AB3-CEB0-493E-9686-476AE8E95EB2}\1.1 C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{83332AB3-CEB0-493E-9686-476AE8E95EB2}\1.1\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ie" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B96B50C3-CB22-46EC-9144-2B31608332A0} C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B96B50C3-CB22-46EC-9144-2B31608332A0} C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{83332AB3-CEB0-493E-9686-476AE8E95EB2}\1.1\FLAGS\ = "0" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B96B50C3-CB22-46EC-9144-2B31608332A0}\ProxyStubClsid32 C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{83332AB3-CEB0-493E-9686-476AE8E95EB2}\1.1\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ie\\RichMediaViewV1release2984.dll" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B96B50C3-CB22-46EC-9144-2B31608332A0}\TypeLib\Version = "1.1" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B96B50C3-CB22-46EC-9144-2B31608332A0}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B96B50C3-CB22-46EC-9144-2B31608332A0}\TypeLib\Version = "1.1" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{405ba82f-4c9c-4c0e-b262-284304b85735}\InprocServer32 C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{405ba82f-4c9c-4c0e-b262-284304b85735}\Version C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{83332AB3-CEB0-493E-9686-476AE8E95EB2}\1.1\FLAGS C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{83332AB3-CEB0-493E-9686-476AE8E95EB2}\1.1\0 C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{83332AB3-CEB0-493E-9686-476AE8E95EB2}\1.1\0\win32 C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B96B50C3-CB22-46EC-9144-2B31608332A0}\TypeLib C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B96B50C3-CB22-46EC-9144-2B31608332A0}\ = "IRichMediaViewV1release2984BHO" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{405ba82f-4c9c-4c0e-b262-284304b85735}\Version\ = "1.1" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{83332AB3-CEB0-493E-9686-476AE8E95EB2}\1.1\HELPDIR C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{405ba82f-4c9c-4c0e-b262-284304b85735}\InprocServer32\ThreadingModel = "Apartment" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{405ba82f-4c9c-4c0e-b262-284304b85735}\TypeLib\ = "{83332ab3-ceb0-493e-9686-476ae8e95eb2}" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B96B50C3-CB22-46EC-9144-2B31608332A0}\ProxyStubClsid32 C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B96B50C3-CB22-46EC-9144-2B31608332A0}\TypeLib C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{405ba82f-4c9c-4c0e-b262-284304b85735}\ = "RichMediaViewV1release2984" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{83332AB3-CEB0-493E-9686-476AE8E95EB2}\1.1\ = "RichMediaViewV1release2984Lib" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B96B50C3-CB22-46EC-9144-2B31608332A0}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B96B50C3-CB22-46EC-9144-2B31608332A0}\TypeLib\ = "{83332AB3-CEB0-493E-9686-476AE8E95EB2}" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{405ba82f-4c9c-4c0e-b262-284304b85735}\Programmable C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B96B50C3-CB22-46EC-9144-2B31608332A0}\ = "IRichMediaViewV1release2984BHO" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B96B50C3-CB22-46EC-9144-2B31608332A0}\TypeLib\ = "{83332AB3-CEB0-493E-9686-476AE8E95EB2}" C:\Windows\SysWOW64\regsvr32.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4080 wrote to memory of 2808 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 4080 wrote to memory of 2808 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 4080 wrote to memory of 2808 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe

Processes

C:\Windows\system32\regsvr32.exe

regsvr32 /s C:\Users\Admin\AppData\Local\Temp\ie\RichMediaViewV1release2984.dll

C:\Windows\SysWOW64\regsvr32.exe

/s C:\Users\Admin\AppData\Local\Temp\ie\RichMediaViewV1release2984.dll

Network

Files

N/A

Analysis: behavioral13

Detonation Overview

Submitted

2025-07-04 17:32

Reported

2025-07-04 17:34

Platform

win10v2004-20250502-en

Max time kernel

103s

Max time network

143s

Command Line

"C:\Users\Admin\AppData\Local\Temp\uninstall.exe"

Signatures

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe N/A

Reads user/profile data of web browsers

spyware stealer

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\uninstall.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe N/A

NSIS installer

installer
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Processes

C:\Users\Admin\AppData\Local\Temp\uninstall.exe

"C:\Users\Admin\AppData\Local\Temp\uninstall.exe"

C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe

"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\

Network

Country Destination Domain Proto
US 8.8.8.8:53 c.pki.goog udp
GB 142.250.180.3:80 c.pki.goog tcp

Files

C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe

MD5 64af24c71dff40b69397c3a69581427c
SHA1 bbb4c291ee344c0170dee0bb75dc16928171b67c
SHA256 88a61cfb1ca6536eec088b1bd3f47f21736e33cb8692a5edb3b6d33e476f0e84
SHA512 c3972b8e63c3a6fd3b47d23f8c0a5058dd05d543365ab611a03f985d02b379fd53205caf3a0e6aad99467da173bd3dd9fe45b6550da95fca934c30400a824feb

C:\Users\Admin\AppData\Local\Temp\nsuAB35.tmp\aminsis.dll

MD5 450753ad96785a240a39deccab3af0d0
SHA1 21c544064d2ffa6444508268ce258a330d459fc5
SHA256 1c371dcc6c3428ea98fb0d2dcb612b4ebc731f3ed72e683c8e33058cd2a952d3
SHA512 c41b834f4228b7668316095569c836b4e0d55c5fbf310c65b0e0453ef0e74a3ce8f9357cea90b80f6590f85dd7708eeb4eec27518811ea4aab20c0e7f5643dab

Analysis: behavioral15

Detonation Overview

Submitted

2025-07-04 17:32

Reported

2025-07-04 17:34

Platform

win10v2004-20250619-en

Max time kernel

101s

Max time network

140s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\aminsis.dll,#1

Signatures

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\rundll32.exe

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\rundll32.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3916 wrote to memory of 2464 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 3916 wrote to memory of 2464 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 3916 wrote to memory of 2464 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\aminsis.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\aminsis.dll,#1

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 2464 -ip 2464

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2464 -s 624

Network

Country Destination Domain Proto
US 8.8.8.8:53 g.bing.com udp
US 150.171.28.10:443 g.bing.com tcp
GB 2.18.27.76:443 www.bing.com tcp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 c.pki.goog udp
GB 142.250.180.3:80 c.pki.goog tcp

Files

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2025-07-04 17:32

Reported

2025-07-04 17:34

Platform

win10v2004-20250619-en

Max time kernel

121s

Max time network

136s

Command Line

"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c7039ad3300c33937a4dbace449d68d.exe"

Signatures

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-4144907350-1836498122-2806216936-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c7039ad3300c33937a4dbace449d68d.exe N/A

Reads user/profile data of web browsers

spyware stealer

Checks installed software on the system

discovery

Installs/modifies Browser Helper Object

stealer adware
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{405ba82f-4c9c-4c0e-b262-284304b85735} C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{405ba82f-4c9c-4c0e-b262-284304b85735}\ = "RichMediaViewV1release2984" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{405ba82f-4c9c-4c0e-b262-284304b85735}\NoExplorer = "1" C:\Windows\SysWOW64\regsvr32.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File opened for modification C:\Windows\System32\GroupPolicy C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c7039ad3300c33937a4dbace449d68d.exe N/A
File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c7039ad3300c33937a4dbace449d68d.exe N/A
File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c7039ad3300c33937a4dbace449d68d.exe N/A
File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c7039ad3300c33937a4dbace449d68d.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files (x86)\RichMediaViewV1\RichMediaViewV1release2984\ch\RichMediaViewV1release2984.crx C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c7039ad3300c33937a4dbace449d68d.exe N/A
File opened for modification C:\Program Files (x86)\RichMediaViewV1\RichMediaViewV1release2984\ff\chrome.manifest C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c7039ad3300c33937a4dbace449d68d.exe N/A
File opened for modification C:\Program Files (x86)\RichMediaViewV1\RichMediaViewV1release2984\ff\chrome\content\icons C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c7039ad3300c33937a4dbace449d68d.exe N/A
File created C:\Program Files (x86)\RichMediaViewV1\RichMediaViewV1release2984\uninstall.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c7039ad3300c33937a4dbace449d68d.exe N/A
File created C:\Program Files (x86)\RichMediaViewV1\RichMediaViewV1release2984\ie\RichMediaViewV1release2984.dll C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c7039ad3300c33937a4dbace449d68d.exe N/A
File created C:\Program Files (x86)\RichMediaViewV1\RichMediaViewV1release2984\ff\install.rdf C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c7039ad3300c33937a4dbace449d68d.exe N/A
File opened for modification C:\Program Files (x86)\RichMediaViewV1\RichMediaViewV1release2984\ff\chrome\content\ffRichMediaViewV1release2984ffaction.js C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c7039ad3300c33937a4dbace449d68d.exe N/A
File created C:\Program Files (x86)\RichMediaViewV1\RichMediaViewV1release2984\ff\chrome\content\icons\Thumbs.db C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c7039ad3300c33937a4dbace449d68d.exe N/A
File created C:\Program Files (x86)\RichMediaViewV1\RichMediaViewV1release2984\ff\chrome\content\overlay.xul C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c7039ad3300c33937a4dbace449d68d.exe N/A
File created C:\Program Files (x86)\RichMediaViewV1\RichMediaViewV1release2984\ff\chrome.manifest C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c7039ad3300c33937a4dbace449d68d.exe N/A
File opened for modification C:\Program Files (x86)\RichMediaViewV1\RichMediaViewV1release2984\ff\chrome C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c7039ad3300c33937a4dbace449d68d.exe N/A
File opened for modification C:\Program Files (x86)\RichMediaViewV1\RichMediaViewV1release2984\ff\chrome\content C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c7039ad3300c33937a4dbace449d68d.exe N/A
File created C:\Program Files (x86)\RichMediaViewV1\RichMediaViewV1release2984\ff\chrome\content\ffRichMediaViewV1release2984.js C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c7039ad3300c33937a4dbace449d68d.exe N/A
File opened for modification C:\Program Files (x86)\RichMediaViewV1\RichMediaViewV1release2984\ff\chrome\content\ffRichMediaViewV1release2984.js C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c7039ad3300c33937a4dbace449d68d.exe N/A
File created C:\Program Files (x86)\RichMediaViewV1\RichMediaViewV1release2984\ff\chrome\content\ffRichMediaViewV1release2984ffaction.js C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c7039ad3300c33937a4dbace449d68d.exe N/A
File opened for modification C:\Program Files (x86)\RichMediaViewV1\RichMediaViewV1release2984\ff\chrome\content\icons\default C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c7039ad3300c33937a4dbace449d68d.exe N/A
File opened for modification C:\Program Files (x86)\RichMediaViewV1\RichMediaViewV1release2984\ch\RichMediaViewV1release2984.crx C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c7039ad3300c33937a4dbace449d68d.exe N/A
File opened for modification C:\Program Files (x86)\RichMediaViewV1\RichMediaViewV1release2984\ff\install.rdf C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c7039ad3300c33937a4dbace449d68d.exe N/A
File opened for modification C:\Program Files (x86)\RichMediaViewV1\RichMediaViewV1release2984\ff\chrome\content\overlay.xul C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c7039ad3300c33937a4dbace449d68d.exe N/A
File opened for modification C:\Program Files (x86)\RichMediaViewV1\RichMediaViewV1release2984\ff\chrome\content\icons\Thumbs.db C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c7039ad3300c33937a4dbace449d68d.exe N/A
File created C:\Program Files (x86)\RichMediaViewV1\RichMediaViewV1release2984\ff\chrome\content\icons\default\RichMediaViewV1release2984_32.png C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c7039ad3300c33937a4dbace449d68d.exe N/A
File opened for modification C:\Program Files (x86)\RichMediaViewV1\RichMediaViewV1release2984\ff\chrome\content\icons\default\RichMediaViewV1release2984_32.png C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c7039ad3300c33937a4dbace449d68d.exe N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c7039ad3300c33937a4dbace449d68d.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\regsvr32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\gpupdate.exe N/A

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-4144907350-1836498122-2806216936-1000\Software\Microsoft\Internet Explorer\Approved Extensions C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c7039ad3300c33937a4dbace449d68d.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-4144907350-1836498122-2806216936-1000\SOFTWARE\Microsoft\Internet Explorer\Approved Extensions\{405ba82f-4c9c-4c0e-b262-284304b85735} = 51667a6c4c1d3b1b3fb2485daf166106ad6c6a0305f3112f C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c7039ad3300c33937a4dbace449d68d.exe N/A

Modifies registry class

Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{405ba82f-4c9c-4c0e-b262-284304b85735}\InprocServer32\ = "C:\\Program Files (x86)\\RichMediaViewV1\\RichMediaViewV1release2984\\ie\\RichMediaViewV1release2984.dll" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B96B50C3-CB22-46EC-9144-2B31608332A0}\TypeLib C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B96B50C3-CB22-46EC-9144-2B31608332A0}\TypeLib\ = "{83332AB3-CEB0-493E-9686-476AE8E95EB2}" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B96B50C3-CB22-46EC-9144-2B31608332A0} C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{405ba82f-4c9c-4c0e-b262-284304b85735}\ = "RichMediaViewV1release2984" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{405ba82f-4c9c-4c0e-b262-284304b85735}\InprocServer32 C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{405ba82f-4c9c-4c0e-b262-284304b85735}\InprocServer32\ThreadingModel = "Apartment" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{405ba82f-4c9c-4c0e-b262-284304b85735}\TypeLib\ = "{83332ab3-ceb0-493e-9686-476ae8e95eb2}" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{83332AB3-CEB0-493E-9686-476AE8E95EB2}\1.1\0 C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B96B50C3-CB22-46EC-9144-2B31608332A0} C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B96B50C3-CB22-46EC-9144-2B31608332A0}\TypeLib C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{83332AB3-CEB0-493E-9686-476AE8E95EB2}\1.1\FLAGS C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{83332AB3-CEB0-493E-9686-476AE8E95EB2}\1.1\FLAGS\ = "0" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{83332AB3-CEB0-493E-9686-476AE8E95EB2}\1.1\0\win32 C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B96B50C3-CB22-46EC-9144-2B31608332A0}\ = "IRichMediaViewV1release2984BHO" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B96B50C3-CB22-46EC-9144-2B31608332A0}\ProxyStubClsid32 C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B96B50C3-CB22-46EC-9144-2B31608332A0}\TypeLib\Version = "1.1" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{83332AB3-CEB0-493E-9686-476AE8E95EB2} C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{83332AB3-CEB0-493E-9686-476AE8E95EB2}\1.1\ = "RichMediaViewV1release2984Lib" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{405ba82f-4c9c-4c0e-b262-284304b85735} C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{405ba82f-4c9c-4c0e-b262-284304b85735}\TypeLib C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B96B50C3-CB22-46EC-9144-2B31608332A0}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{405ba82f-4c9c-4c0e-b262-284304b85735}\Version C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{83332AB3-CEB0-493E-9686-476AE8E95EB2}\1.1\0\win32\ = "C:\\Program Files (x86)\\RichMediaViewV1\\RichMediaViewV1release2984\\ie\\RichMediaViewV1release2984.dll" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B96B50C3-CB22-46EC-9144-2B31608332A0}\TypeLib\ = "{83332AB3-CEB0-493E-9686-476AE8E95EB2}" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B96B50C3-CB22-46EC-9144-2B31608332A0}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{83332AB3-CEB0-493E-9686-476AE8E95EB2}\1.1 C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{405ba82f-4c9c-4c0e-b262-284304b85735}\Programmable C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{405ba82f-4c9c-4c0e-b262-284304b85735}\Version\ = "1.1" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B96B50C3-CB22-46EC-9144-2B31608332A0}\ProxyStubClsid32 C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{405ba82f-4c9c-4c0e-b262-284304b85735} C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c7039ad3300c33937a4dbace449d68d.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{83332AB3-CEB0-493E-9686-476AE8E95EB2}\1.1\HELPDIR C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{83332AB3-CEB0-493E-9686-476AE8E95EB2}\1.1\HELPDIR\ = "C:\\Program Files (x86)\\RichMediaViewV1\\RichMediaViewV1release2984\\ie" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{405ba82f-4c9c-4c0e-b262-284304b85735}\ = "Rich Media View" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c7039ad3300c33937a4dbace449d68d.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B96B50C3-CB22-46EC-9144-2B31608332A0}\TypeLib\Version = "1.1" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B96B50C3-CB22-46EC-9144-2B31608332A0}\ = "IRichMediaViewV1release2984BHO" C:\Windows\SysWOW64\regsvr32.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c7039ad3300c33937a4dbace449d68d.exe

"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c7039ad3300c33937a4dbace449d68d.exe"

C:\Windows\SysWOW64\regsvr32.exe

regsvr32 "C:\Program Files (x86)\RichMediaViewV1\RichMediaViewV1release2984\ie\RichMediaViewV1release2984.dll" /s

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum

C:\Windows\SysWOW64\gpupdate.exe

"C:\Windows\System32\gpupdate.exe" /force

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 g.bing.com udp
US 150.171.28.10:443 g.bing.com tcp
GB 2.18.27.82:443 www.bing.com tcp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 c.pki.goog udp
GB 142.250.180.3:80 c.pki.goog tcp

Files

C:\Users\Admin\AppData\Local\Temp\nsc7FDF.tmp\aminsis.dll

MD5 450753ad96785a240a39deccab3af0d0
SHA1 21c544064d2ffa6444508268ce258a330d459fc5
SHA256 1c371dcc6c3428ea98fb0d2dcb612b4ebc731f3ed72e683c8e33058cd2a952d3
SHA512 c41b834f4228b7668316095569c836b4e0d55c5fbf310c65b0e0453ef0e74a3ce8f9357cea90b80f6590f85dd7708eeb4eec27518811ea4aab20c0e7f5643dab

C:\Program Files (x86)\RichMediaViewV1\RichMediaViewV1release2984\ie\RichMediaViewV1release2984.dll

MD5 ea0eb71b283758d746896255bb91a35a
SHA1 3ea49116a5fc20de6ebd480e55b709f366a9ba50
SHA256 6a951bc2332458d71b5a47284de8bf8407758025932f61dcb9f168ef4080a49e
SHA512 2866908d432132082a1a337649a930eb5a9fea1cd9e289eb22521d0fd080db6e98565f4225b18684193897cccf5b35bfbd5106a30b584f89b3a16214c252520b

Analysis: behavioral4

Detonation Overview

Submitted

2025-07-04 17:32

Reported

2025-07-04 17:34

Platform

win11-20250619-en

Max time kernel

101s

Max time network

105s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\aminsis.dll,#1

Signatures

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\rundll32.exe

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\rundll32.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2992 wrote to memory of 5068 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2992 wrote to memory of 5068 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2992 wrote to memory of 5068 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\aminsis.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\aminsis.dll,#1

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 5068 -ip 5068

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 5068 -s 540

Network

Files

N/A

Analysis: behavioral7

Detonation Overview

Submitted

2025-07-04 17:32

Reported

2025-07-04 17:34

Platform

win10v2004-20250619-en

Max time kernel

98s

Max time network

141s

Command Line

wscript.exe C:\Users\Admin\AppData\Local\Temp\ff\chrome\content\ffRichMediaViewV1release2984.js

Signatures

Command and Scripting Interpreter: JavaScript

execution

Processes

C:\Windows\system32\wscript.exe

wscript.exe C:\Users\Admin\AppData\Local\Temp\ff\chrome\content\ffRichMediaViewV1release2984.js

Network

Country Destination Domain Proto
GB 2.18.27.76:443 www.bing.com tcp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 c.pki.goog udp
GB 142.250.180.3:80 c.pki.goog tcp

Files

N/A

Analysis: behavioral16

Detonation Overview

Submitted

2025-07-04 17:32

Reported

2025-07-04 17:34

Platform

win11-20250619-en

Max time kernel

101s

Max time network

104s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\aminsis.dll,#1

Signatures

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\rundll32.exe

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\rundll32.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1896 wrote to memory of 3588 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 1896 wrote to memory of 3588 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 1896 wrote to memory of 3588 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\aminsis.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\aminsis.dll,#1

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3588 -ip 3588

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 3588 -s 536

Network

Files

N/A

Analysis: behavioral8

Detonation Overview

Submitted

2025-07-04 17:32

Reported

2025-07-04 17:34

Platform

win11-20250619-en

Max time kernel

99s

Max time network

102s

Command Line

wscript.exe C:\Users\Admin\AppData\Local\Temp\ff\chrome\content\ffRichMediaViewV1release2984.js

Signatures

Command and Scripting Interpreter: JavaScript

execution

Processes

C:\Windows\system32\wscript.exe

wscript.exe C:\Users\Admin\AppData\Local\Temp\ff\chrome\content\ffRichMediaViewV1release2984.js

Network

Files

N/A

Analysis: behavioral10

Detonation Overview

Submitted

2025-07-04 17:32

Reported

2025-07-04 17:34

Platform

win11-20250610-en

Max time kernel

102s

Max time network

104s

Command Line

wscript.exe C:\Users\Admin\AppData\Local\Temp\ff\chrome\content\ffRichMediaViewV1release2984ffaction.js

Signatures

Command and Scripting Interpreter: JavaScript

execution

Processes

C:\Windows\system32\wscript.exe

wscript.exe C:\Users\Admin\AppData\Local\Temp\ff\chrome\content\ffRichMediaViewV1release2984ffaction.js

Network

Files

N/A

Analysis: behavioral11

Detonation Overview

Submitted

2025-07-04 17:32

Reported

2025-07-04 17:34

Platform

win10v2004-20250610-en

Max time kernel

101s

Max time network

142s

Command Line

regsvr32 /s C:\Users\Admin\AppData\Local\Temp\ie\RichMediaViewV1release2984.dll

Signatures

Installs/modifies Browser Helper Object

stealer adware
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{405ba82f-4c9c-4c0e-b262-284304b85735} C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{405ba82f-4c9c-4c0e-b262-284304b85735}\ = "RichMediaViewV1release2984" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{405ba82f-4c9c-4c0e-b262-284304b85735}\NoExplorer = "1" C:\Windows\SysWOW64\regsvr32.exe N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\regsvr32.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{83332AB3-CEB0-493E-9686-476AE8E95EB2}\1.1\0 C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B96B50C3-CB22-46EC-9144-2B31608332A0} C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B96B50C3-CB22-46EC-9144-2B31608332A0}\ = "IRichMediaViewV1release2984BHO" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B96B50C3-CB22-46EC-9144-2B31608332A0}\TypeLib\Version = "1.1" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B96B50C3-CB22-46EC-9144-2B31608332A0}\TypeLib\ = "{83332AB3-CEB0-493E-9686-476AE8E95EB2}" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{405ba82f-4c9c-4c0e-b262-284304b85735}\TypeLib C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B96B50C3-CB22-46EC-9144-2B31608332A0}\TypeLib C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B96B50C3-CB22-46EC-9144-2B31608332A0}\ = "IRichMediaViewV1release2984BHO" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{405ba82f-4c9c-4c0e-b262-284304b85735}\TypeLib\ = "{83332ab3-ceb0-493e-9686-476ae8e95eb2}" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{83332AB3-CEB0-493E-9686-476AE8E95EB2}\1.1\ = "RichMediaViewV1release2984Lib" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{83332AB3-CEB0-493E-9686-476AE8E95EB2}\1.1\FLAGS\ = "0" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{83332AB3-CEB0-493E-9686-476AE8E95EB2}\1.1\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ie\\RichMediaViewV1release2984.dll" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B96B50C3-CB22-46EC-9144-2B31608332A0}\ProxyStubClsid32 C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{405ba82f-4c9c-4c0e-b262-284304b85735}\InprocServer32\ThreadingModel = "Apartment" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B96B50C3-CB22-46EC-9144-2B31608332A0} C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B96B50C3-CB22-46EC-9144-2B31608332A0}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B96B50C3-CB22-46EC-9144-2B31608332A0}\TypeLib C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B96B50C3-CB22-46EC-9144-2B31608332A0}\TypeLib\Version = "1.1" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{83332AB3-CEB0-493E-9686-476AE8E95EB2} C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{83332AB3-CEB0-493E-9686-476AE8E95EB2}\1.1\HELPDIR C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B96B50C3-CB22-46EC-9144-2B31608332A0}\ProxyStubClsid32 C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B96B50C3-CB22-46EC-9144-2B31608332A0}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{83332AB3-CEB0-493E-9686-476AE8E95EB2}\1.1\FLAGS C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{405ba82f-4c9c-4c0e-b262-284304b85735} C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{405ba82f-4c9c-4c0e-b262-284304b85735}\InprocServer32 C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{83332AB3-CEB0-493E-9686-476AE8E95EB2}\1.1\0\win32 C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{405ba82f-4c9c-4c0e-b262-284304b85735}\Programmable C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{405ba82f-4c9c-4c0e-b262-284304b85735}\Version C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{83332AB3-CEB0-493E-9686-476AE8E95EB2}\1.1\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ie" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B96B50C3-CB22-46EC-9144-2B31608332A0}\TypeLib\ = "{83332AB3-CEB0-493E-9686-476AE8E95EB2}" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{405ba82f-4c9c-4c0e-b262-284304b85735}\ = "RichMediaViewV1release2984" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{405ba82f-4c9c-4c0e-b262-284304b85735}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ie\\RichMediaViewV1release2984.dll" C:\Windows\SysWOW64\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{405ba82f-4c9c-4c0e-b262-284304b85735}\Version\ = "1.1" C:\Windows\SysWOW64\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{83332AB3-CEB0-493E-9686-476AE8E95EB2}\1.1 C:\Windows\SysWOW64\regsvr32.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 5236 wrote to memory of 4948 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 5236 wrote to memory of 4948 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe
PID 5236 wrote to memory of 4948 N/A C:\Windows\system32\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe

Processes

C:\Windows\system32\regsvr32.exe

regsvr32 /s C:\Users\Admin\AppData\Local\Temp\ie\RichMediaViewV1release2984.dll

C:\Windows\SysWOW64\regsvr32.exe

/s C:\Users\Admin\AppData\Local\Temp\ie\RichMediaViewV1release2984.dll

Network

Country Destination Domain Proto
GB 2.18.27.76:443 www.bing.com tcp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 c.pki.goog udp
GB 142.250.180.3:80 c.pki.goog tcp

Files

N/A

Analysis: behavioral3

Detonation Overview

Submitted

2025-07-04 17:32

Reported

2025-07-04 17:34

Platform

win10v2004-20250610-en

Max time kernel

101s

Max time network

136s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\aminsis.dll,#1

Signatures

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\rundll32.exe

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\rundll32.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2932 wrote to memory of 5984 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2932 wrote to memory of 5984 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2932 wrote to memory of 5984 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\aminsis.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\aminsis.dll,#1

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 5984 -ip 5984

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 5984 -s 624

Network

Country Destination Domain Proto
US 8.8.8.8:53 g.bing.com udp
US 150.171.27.10:443 g.bing.com tcp
GB 2.18.27.82:443 www.bing.com tcp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 c.pki.goog udp
GB 142.250.180.3:80 c.pki.goog tcp

Files

N/A