Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28-06-2024 13:01
Static task
static1
Behavioral task
behavioral1
Sample
1a373251aee83c1d463d78a008f0ea0d_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1a373251aee83c1d463d78a008f0ea0d_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
1a373251aee83c1d463d78a008f0ea0d_JaffaCakes118.exe
-
Size
228KB
-
MD5
1a373251aee83c1d463d78a008f0ea0d
-
SHA1
022b8b0e1ffce77745b6135c8e73c655184a3c51
-
SHA256
40b868f699c522fd8542ccf1a2f52d99801c0928dc2dab6bdaa153e1883d6859
-
SHA512
99749d22aead59ce4b4cd6d62dcb016fd3fa90417385f8fc1230d30b0e95ca930d349b76e99ce3a891f6c6ee0f39db540d12d664bd8ab986656b435cd5972656
-
SSDEEP
768:JWO+aqbbfbYpgNFmqchFsTR4KydW/s9dXziRSLbry75rVilqwMUTLIlnS70XIL70:ArsMUFrDY/cNeRSLy75r8AZUTLIl9f
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 9 IoCs
Processes:
taskmgr.exeiexplarer.exeinstall.exewininst.exelsass.exedrweb.exenvsvc32.execmd.exeavp.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" taskmgr.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" iexplarer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" install.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" wininst.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" lsass.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" drweb.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" nvsvc32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" avp.exe -
Disables RegEdit via registry modification 9 IoCs
Processes:
cmd.exeavp.exeiexplarer.exeinstall.exenvsvc32.exelsass.exedrweb.exewininst.exetaskmgr.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" avp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" iexplarer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" install.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" nvsvc32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" lsass.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" drweb.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" wininst.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" taskmgr.exe -
Disables use of System Restore points 1 TTPs
-
ACProtect 1.3x - 1.4x DLL software 6 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule C:\Windows\SysWOW64\eeamapos5.dll acprotect C:\Windows\SysWOW64\au3k2v9h.dll acprotect behavioral1/memory/1244-41-0x0000000010000000-0x000000001001A000-memory.dmp acprotect behavioral1/memory/1244-52-0x0000000010000000-0x000000001001A000-memory.dmp acprotect behavioral1/memory/1244-95-0x0000000010000000-0x000000001001A000-memory.dmp acprotect behavioral1/memory/1244-202-0x0000000010000000-0x000000001001A000-memory.dmp acprotect -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1588 cmd.exe -
Executes dropped EXE 12 IoCs
Processes:
ridxv.exebh9fbfk3fx25s0j.exel8a396i7.exeinstall.exelsass.exewininst.exetaskmgr.exedrweb.exenvsvc32.execmd.exeiexplarer.exeavp.exepid process 1160 ridxv.exe 3032 bh9fbfk3fx25s0j.exe 2576 l8a396i7.exe 1128 install.exe 1272 lsass.exe 1600 wininst.exe 1320 taskmgr.exe 2004 drweb.exe 2900 nvsvc32.exe 1816 cmd.exe 956 iexplarer.exe 1848 avp.exe -
Loads dropped DLL 27 IoCs
Processes:
1a373251aee83c1d463d78a008f0ea0d_JaffaCakes118.exeridxv.exerundll32.exeRegsvr32.exebh9fbfk3fx25s0j.exeinstall.exepid process 2336 1a373251aee83c1d463d78a008f0ea0d_JaffaCakes118.exe 2336 1a373251aee83c1d463d78a008f0ea0d_JaffaCakes118.exe 2336 1a373251aee83c1d463d78a008f0ea0d_JaffaCakes118.exe 2336 1a373251aee83c1d463d78a008f0ea0d_JaffaCakes118.exe 1160 ridxv.exe 1160 ridxv.exe 1244 rundll32.exe 1244 rundll32.exe 1244 rundll32.exe 1244 rundll32.exe 1256 Regsvr32.exe 3032 bh9fbfk3fx25s0j.exe 1128 install.exe 1128 install.exe 1128 install.exe 3032 bh9fbfk3fx25s0j.exe 3032 bh9fbfk3fx25s0j.exe 3032 bh9fbfk3fx25s0j.exe 3032 bh9fbfk3fx25s0j.exe 3032 bh9fbfk3fx25s0j.exe 3032 bh9fbfk3fx25s0j.exe 3032 bh9fbfk3fx25s0j.exe 3032 bh9fbfk3fx25s0j.exe 3032 bh9fbfk3fx25s0j.exe 3032 bh9fbfk3fx25s0j.exe 3032 bh9fbfk3fx25s0j.exe 3032 bh9fbfk3fx25s0j.exe -
Processes:
resource yara_rule C:\Windows\SysWOW64\eeamapos5.dll upx C:\Windows\SysWOW64\au3k2v9h.dll upx behavioral1/memory/1256-40-0x0000000010000000-0x000000001001B000-memory.dmp upx behavioral1/memory/1244-41-0x0000000010000000-0x000000001001A000-memory.dmp upx behavioral1/memory/1244-52-0x0000000010000000-0x000000001001A000-memory.dmp upx behavioral1/memory/1244-95-0x0000000010000000-0x000000001001A000-memory.dmp upx behavioral1/memory/1244-202-0x0000000010000000-0x000000001001A000-memory.dmp upx -
Adds Run key to start application 2 TTPs 22 IoCs
Processes:
l8a396i7.exedrweb.exeiexplarer.exewininst.exeavp.exetaskmgr.exerundll32.exenvsvc32.exelsass.execmd.exeinstall.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\LvbdhfngcAM = "C:\\Users\\Admin\\AppData\\Local\\Temp\\l8a396i7.exe" l8a396i7.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\Lvbdhfngob = "C:\\Users\\Admin\\AppData\\Local\\Temp\\drweb.exe" drweb.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\Mqruqc = "C:\\Windows\\iexplarer.exe" iexplarer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Lvbdhfngruf = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wininst.exe" wininst.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\Lvbdhfngoe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\avp.exe" avp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Lvbdhfngosf = "C:\\Users\\Admin\\AppData\\Local\\Temp\\taskmgr.exe" taskmgr.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\uPc+kt0NhrOJsiv = "rundll32.exe C:\\Windows\\system32\\eeamapos5.dll, SystemServer" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LvbdhfngcAM = "C:\\Users\\Admin\\AppData\\Local\\Temp\\l8a396i7.exe" l8a396i7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Mqruqc = "C:\\Windows\\iexplarer.exe" iexplarer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\LvbdhfngsfP = "C:\\Users\\Admin\\AppData\\Local\\Temp\\nvsvc32.exe" nvsvc32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\Lvbdhfngruf = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wininst.exe" wininst.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\Mqsuc = "C:\\Windows\\lsass.exe" lsass.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\Lvbdhfngosf = "C:\\Users\\Admin\\AppData\\Local\\Temp\\taskmgr.exe" taskmgr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Lvbdhfngob = "C:\\Users\\Admin\\AppData\\Local\\Temp\\drweb.exe" drweb.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\Lvbdhfngnb = "C:\\Users\\Admin\\AppData\\Local\\Temp\\cmd.exe" cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Lvbdhfngnb = "C:\\Users\\Admin\\AppData\\Local\\Temp\\cmd.exe" cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\uPc+kt0NhrOJsiv = "rundll32.exe C:\\Windows\\system32\\eeamapos5.dll, SystemServer" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\Lvbdhfngotd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\install.exe" install.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Lvbdhfngotd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\install.exe" install.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LvbdhfngsfP = "C:\\Users\\Admin\\AppData\\Local\\Temp\\nvsvc32.exe" nvsvc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Mqsuc = "C:\\Windows\\lsass.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Lvbdhfngoe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\avp.exe" avp.exe -
Drops file in System32 directory 2 IoCs
Processes:
1a373251aee83c1d463d78a008f0ea0d_JaffaCakes118.exedescription ioc process File created C:\Windows\SysWOW64\au3k2v9h.dll 1a373251aee83c1d463d78a008f0ea0d_JaffaCakes118.exe File created C:\Windows\SysWOW64\eeamapos5.dll 1a373251aee83c1d463d78a008f0ea0d_JaffaCakes118.exe -
Drops file in Windows directory 4 IoCs
Processes:
bh9fbfk3fx25s0j.exedescription ioc process File created C:\Windows\lsass.exe bh9fbfk3fx25s0j.exe File opened for modification C:\Windows\lsass.exe bh9fbfk3fx25s0j.exe File created C:\Windows\iexplarer.exe bh9fbfk3fx25s0j.exe File opened for modification C:\Windows\iexplarer.exe bh9fbfk3fx25s0j.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Processes:
nvsvc32.exewininst.execmd.exetaskmgr.exeavp.exedrweb.exeiexplarer.exeinstall.exelsass.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\New Windows\PopupMgr = "yes" nvsvc32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\New Windows\PopupMgr = "yes" wininst.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\New Windows\PopupMgr = "yes" cmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\New Windows\PopupMgr = "yes" taskmgr.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\New Windows\PopupMgr = "yes" avp.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\New Windows\PopupMgr = "yes" drweb.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\New Windows\PopupMgr = "yes" iexplarer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\New Windows\PopupMgr = "yes" install.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\New Windows\PopupMgr = "yes" lsass.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
bh9fbfk3fx25s0j.exepid process 3032 bh9fbfk3fx25s0j.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
1a373251aee83c1d463d78a008f0ea0d_JaffaCakes118.exeridxv.exebh9fbfk3fx25s0j.exedescription pid process target process PID 2336 wrote to memory of 1256 2336 1a373251aee83c1d463d78a008f0ea0d_JaffaCakes118.exe Regsvr32.exe PID 2336 wrote to memory of 1256 2336 1a373251aee83c1d463d78a008f0ea0d_JaffaCakes118.exe Regsvr32.exe PID 2336 wrote to memory of 1256 2336 1a373251aee83c1d463d78a008f0ea0d_JaffaCakes118.exe Regsvr32.exe PID 2336 wrote to memory of 1256 2336 1a373251aee83c1d463d78a008f0ea0d_JaffaCakes118.exe Regsvr32.exe PID 2336 wrote to memory of 1256 2336 1a373251aee83c1d463d78a008f0ea0d_JaffaCakes118.exe Regsvr32.exe PID 2336 wrote to memory of 1256 2336 1a373251aee83c1d463d78a008f0ea0d_JaffaCakes118.exe Regsvr32.exe PID 2336 wrote to memory of 1256 2336 1a373251aee83c1d463d78a008f0ea0d_JaffaCakes118.exe Regsvr32.exe PID 2336 wrote to memory of 1244 2336 1a373251aee83c1d463d78a008f0ea0d_JaffaCakes118.exe rundll32.exe PID 2336 wrote to memory of 1244 2336 1a373251aee83c1d463d78a008f0ea0d_JaffaCakes118.exe rundll32.exe PID 2336 wrote to memory of 1244 2336 1a373251aee83c1d463d78a008f0ea0d_JaffaCakes118.exe rundll32.exe PID 2336 wrote to memory of 1244 2336 1a373251aee83c1d463d78a008f0ea0d_JaffaCakes118.exe rundll32.exe PID 2336 wrote to memory of 1244 2336 1a373251aee83c1d463d78a008f0ea0d_JaffaCakes118.exe rundll32.exe PID 2336 wrote to memory of 1244 2336 1a373251aee83c1d463d78a008f0ea0d_JaffaCakes118.exe rundll32.exe PID 2336 wrote to memory of 1244 2336 1a373251aee83c1d463d78a008f0ea0d_JaffaCakes118.exe rundll32.exe PID 2336 wrote to memory of 1160 2336 1a373251aee83c1d463d78a008f0ea0d_JaffaCakes118.exe ridxv.exe PID 2336 wrote to memory of 1160 2336 1a373251aee83c1d463d78a008f0ea0d_JaffaCakes118.exe ridxv.exe PID 2336 wrote to memory of 1160 2336 1a373251aee83c1d463d78a008f0ea0d_JaffaCakes118.exe ridxv.exe PID 2336 wrote to memory of 1160 2336 1a373251aee83c1d463d78a008f0ea0d_JaffaCakes118.exe ridxv.exe PID 2336 wrote to memory of 3032 2336 1a373251aee83c1d463d78a008f0ea0d_JaffaCakes118.exe bh9fbfk3fx25s0j.exe PID 2336 wrote to memory of 3032 2336 1a373251aee83c1d463d78a008f0ea0d_JaffaCakes118.exe bh9fbfk3fx25s0j.exe PID 2336 wrote to memory of 3032 2336 1a373251aee83c1d463d78a008f0ea0d_JaffaCakes118.exe bh9fbfk3fx25s0j.exe PID 2336 wrote to memory of 3032 2336 1a373251aee83c1d463d78a008f0ea0d_JaffaCakes118.exe bh9fbfk3fx25s0j.exe PID 1160 wrote to memory of 2576 1160 ridxv.exe l8a396i7.exe PID 1160 wrote to memory of 2576 1160 ridxv.exe l8a396i7.exe PID 1160 wrote to memory of 2576 1160 ridxv.exe l8a396i7.exe PID 1160 wrote to memory of 2576 1160 ridxv.exe l8a396i7.exe PID 2336 wrote to memory of 2488 2336 1a373251aee83c1d463d78a008f0ea0d_JaffaCakes118.exe explorer.exe PID 2336 wrote to memory of 2488 2336 1a373251aee83c1d463d78a008f0ea0d_JaffaCakes118.exe explorer.exe PID 2336 wrote to memory of 2488 2336 1a373251aee83c1d463d78a008f0ea0d_JaffaCakes118.exe explorer.exe PID 2336 wrote to memory of 2488 2336 1a373251aee83c1d463d78a008f0ea0d_JaffaCakes118.exe explorer.exe PID 2336 wrote to memory of 1588 2336 1a373251aee83c1d463d78a008f0ea0d_JaffaCakes118.exe cmd.exe PID 2336 wrote to memory of 1588 2336 1a373251aee83c1d463d78a008f0ea0d_JaffaCakes118.exe cmd.exe PID 2336 wrote to memory of 1588 2336 1a373251aee83c1d463d78a008f0ea0d_JaffaCakes118.exe cmd.exe PID 2336 wrote to memory of 1588 2336 1a373251aee83c1d463d78a008f0ea0d_JaffaCakes118.exe cmd.exe PID 3032 wrote to memory of 1128 3032 bh9fbfk3fx25s0j.exe install.exe PID 3032 wrote to memory of 1128 3032 bh9fbfk3fx25s0j.exe install.exe PID 3032 wrote to memory of 1128 3032 bh9fbfk3fx25s0j.exe install.exe PID 3032 wrote to memory of 1128 3032 bh9fbfk3fx25s0j.exe install.exe PID 3032 wrote to memory of 1128 3032 bh9fbfk3fx25s0j.exe install.exe PID 3032 wrote to memory of 1128 3032 bh9fbfk3fx25s0j.exe install.exe PID 3032 wrote to memory of 1128 3032 bh9fbfk3fx25s0j.exe install.exe PID 3032 wrote to memory of 1272 3032 bh9fbfk3fx25s0j.exe lsass.exe PID 3032 wrote to memory of 1272 3032 bh9fbfk3fx25s0j.exe lsass.exe PID 3032 wrote to memory of 1272 3032 bh9fbfk3fx25s0j.exe lsass.exe PID 3032 wrote to memory of 1272 3032 bh9fbfk3fx25s0j.exe lsass.exe PID 3032 wrote to memory of 1600 3032 bh9fbfk3fx25s0j.exe wininst.exe PID 3032 wrote to memory of 1600 3032 bh9fbfk3fx25s0j.exe wininst.exe PID 3032 wrote to memory of 1600 3032 bh9fbfk3fx25s0j.exe wininst.exe PID 3032 wrote to memory of 1600 3032 bh9fbfk3fx25s0j.exe wininst.exe PID 3032 wrote to memory of 1320 3032 bh9fbfk3fx25s0j.exe taskmgr.exe PID 3032 wrote to memory of 1320 3032 bh9fbfk3fx25s0j.exe taskmgr.exe PID 3032 wrote to memory of 1320 3032 bh9fbfk3fx25s0j.exe taskmgr.exe PID 3032 wrote to memory of 1320 3032 bh9fbfk3fx25s0j.exe taskmgr.exe PID 3032 wrote to memory of 2004 3032 bh9fbfk3fx25s0j.exe drweb.exe PID 3032 wrote to memory of 2004 3032 bh9fbfk3fx25s0j.exe drweb.exe PID 3032 wrote to memory of 2004 3032 bh9fbfk3fx25s0j.exe drweb.exe PID 3032 wrote to memory of 2004 3032 bh9fbfk3fx25s0j.exe drweb.exe PID 3032 wrote to memory of 2900 3032 bh9fbfk3fx25s0j.exe nvsvc32.exe PID 3032 wrote to memory of 2900 3032 bh9fbfk3fx25s0j.exe nvsvc32.exe PID 3032 wrote to memory of 2900 3032 bh9fbfk3fx25s0j.exe nvsvc32.exe PID 3032 wrote to memory of 2900 3032 bh9fbfk3fx25s0j.exe nvsvc32.exe PID 3032 wrote to memory of 1816 3032 bh9fbfk3fx25s0j.exe cmd.exe PID 3032 wrote to memory of 1816 3032 bh9fbfk3fx25s0j.exe cmd.exe PID 3032 wrote to memory of 1816 3032 bh9fbfk3fx25s0j.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a373251aee83c1d463d78a008f0ea0d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1a373251aee83c1d463d78a008f0ea0d_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Regsvr32.exeRegsvr32.exe /s C:\Windows\system32\au3k2v9h.dll2⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\system32\eeamapos5.dll, SystemServer2⤵
- Loads dropped DLL
- Adds Run key to start application
-
C:\Users\Admin\AppData\Local\Temp\ridxv.exeC:\Users\Admin\AppData\Local\Temp\ridxv.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\l8a396i7.exeC:\Users\Admin\AppData\Local\Temp\l8a396i7.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Users\Admin\AppData\Local\Temp\bh9fbfk3fx25s0j.exeC:\Users\Admin\AppData\Local\Temp\bh9fbfk3fx25s0j.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\install.exeC:\Users\Admin\AppData\Local\Temp\install.exe3⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies Internet Explorer settings
-
C:\Windows\lsass.exeC:\Windows\lsass.exe3⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer settings
-
C:\Users\Admin\AppData\Local\Temp\wininst.exeC:\Users\Admin\AppData\Local\Temp\wininst.exe3⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer settings
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exeC:\Users\Admin\AppData\Local\Temp\taskmgr.exe3⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer settings
-
C:\Users\Admin\AppData\Local\Temp\drweb.exeC:\Users\Admin\AppData\Local\Temp\drweb.exe3⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer settings
-
C:\Users\Admin\AppData\Local\Temp\nvsvc32.exeC:\Users\Admin\AppData\Local\Temp\nvsvc32.exe3⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer settings
-
C:\Users\Admin\AppData\Local\Temp\cmd.exeC:\Users\Admin\AppData\Local\Temp\cmd.exe3⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer settings
-
C:\Windows\iexplarer.exeC:\Windows\iexplarer.exe3⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer settings
-
C:\Users\Admin\AppData\Local\Temp\avp.exeC:\Users\Admin\AppData\Local\Temp\avp.exe3⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer settings
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\p2hhr.bat" "C:\Users\Admin\AppData\Local\Temp\1a373251aee83c1d463d78a008f0ea0d_JaffaCakes118.exe""2⤵
- Deletes itself
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\l8a396i7.exeFilesize
29KB
MD523dbc5e7e623e3e419ecfd171213d1a4
SHA1598687c892428d75182924fa972751f7688fedf0
SHA2562b2f9d82a6874d5c1ab0d37a2d8f10fdba0344ddd06aa4e68a6a38aedefdcbbe
SHA5123e7ae53302cffd84eb5e566f7e4e575033355d2501a13fc6a34af099fe171662d33c03d4a1c8f78e27be579a5685b52ab2abb08ad58a57ef23c281a14fa747b9
-
C:\Users\Admin\AppData\Local\Temp\p2hhr.batFilesize
46B
MD54eb5eeba568b8c5912ccd65442c964ce
SHA1b4af6dd121ef6a57e5799e812bb795db0659a8a1
SHA256a0620011f49bc3947e6d1d8c45c3135f640c331b679ed0eb6f97d7028ec113e6
SHA512671b8be20b29af30450d4a36c8f71d6bc29718cfcac35b3788cd60c8141206ac3081a93c094234a6c7d1126e4690ce6536ab9a6535072d80a866b1ce83812b89
-
C:\Users\Admin\AppData\Local\Temp\yawghd72y7huhd.tmpFilesize
4B
MD5831d083d073a75faf6382b4dfc4c5d00
SHA1e14f9c00e6fbd690eaa8744531b3728e5fc397af
SHA256e8e38a319cac0e24fcd55cb71bcbd252253ee56b2ec17d4f86c060f13990e6b2
SHA5125d5dfa0b1a66f3edfb458cbf7f4cf1234a44967b7e172a1cf8468cc3d6ebfe08e3946de536efe1297f0e52bffba2ba61c12193874196331b891c209f703351a6
-
C:\Windows\SysWOW64\au3k2v9h.dllFilesize
29KB
MD55c4d06fe227d3a5dc48777cb9ebc7ef7
SHA1f71e593eb7141cf4450f5cad0de6dfd528339749
SHA2564e28eed9dd4cf48f72cf235d23066784298720a6215facdfbaf44d5cb60474c4
SHA512f737730fae1db1b5de054c05beb3f65d5d7f350cfd4b6fa0f26c809b7f52208a4507033539bc05bb36d929b82661eb497d3e8efec475ca4286631dc32a102343
-
C:\Windows\SysWOW64\eeamapos5.dllFilesize
29KB
MD5fa9815a7b21fc6bdac4ebab1c8d6b685
SHA15b5712306c0d194f7d0a1a7d1c1462b5f3c594df
SHA256086fb43eb71f1ed527124149d7e93310ea73678197a94453e273fead9cd60e11
SHA5122cbd7c5f19c84847046403c9be28e4c189de69b0786ba846162b2f58586c3787d3680a9ce184e19b6309ddbc1b291246cab71d8e04cb0595d5c37af6687804f8
-
C:\Windows\iexplarer.exeFilesize
58KB
MD547731a606c225b0e245e965dbc5c8e41
SHA1d44c7ef79cbdeaa4b8af1bc6d0f8b547269a1621
SHA2568df70c595f54f54e48f7d1ac26fc2529ce27ee5db66e629013b9ea6db3c35532
SHA512398cdb16f9243b89b4cb758225eaabc04719babaca11ffd2072e85edfac25693dd638ee006ff8959555c18b5af9e672936bc1a26dfcc6db9e107db10bb23756f
-
C:\Windows\lsass.exeFilesize
58KB
MD5993767ee2ffecda53293faf008b1e672
SHA15f869d9ebf0d5f666595c6743b8ed2c8ddb57a01
SHA256ec3b5a407735d71c6d71bfd954000338e91fed68c5273f5901983a37afd0da0a
SHA51218abe23d90bd64a2f87109e23d3e71764bfda30f27629460e5852d9bc77c1ef50b31e51ac4fca133aa213a9aeb60bc0cfb8a4479e0bce304b7132f5ba94d8b43
-
\Users\Admin\AppData\Local\Temp\avp.exeFilesize
58KB
MD56278f41d3eaaeac8e6f99943cfc8901e
SHA1e2e7e46a75b63e6859715af18ac4fd86a8916c7d
SHA25607e23c55ad0c1573c3f9a6d0c92a223c65b94bed0f6c718251712f8b2985647e
SHA51233b5b4790d3ec5cae8cc3ad4de8f957eb5955a22431e5fa1f2561d4153b50d239940c63902660e938c739670b904c0ad9004fcd399ba225ce867f121ba5d6812
-
\Users\Admin\AppData\Local\Temp\bh9fbfk3fx25s0j.exeFilesize
58KB
MD5549b38636d376d6f35e92809da5bbc24
SHA11dfa1224e21e8db7ebfc97eb0112b42e6c6347fd
SHA25613cdbc72c3a4e00ea7c77a45cb514d09821cd279b088e2d92be4c3ee1d438131
SHA512943f39ece4452298d61126e793a8caf7e7c4c14f4859d1bb195a7d2cd8c1c9d2de52c93c03cb4868d6cff2cdcff1b5fc4762be775f7b925f7f4a60a2eb419b26
-
\Users\Admin\AppData\Local\Temp\cmd.exeFilesize
58KB
MD5cd6369f02a6092f6b859588e15182cd9
SHA18dbd41a70f53b943b1574e2e1943ef40f22a3760
SHA2560cf30e50b73b13e986b60fcfb5ac7cd85faa0a881d0463b6f08c5bfebd857acb
SHA512a1a75dda022f0e1a5c7d82c0389c4e4fb96c0bdcdcdb222d4528343de8d1c6c6bb040fe3aeb8b200d4ecf540548bb2d65bda69a5b579b69f9b9b800dbdd87380
-
\Users\Admin\AppData\Local\Temp\install.exeFilesize
58KB
MD53333963a7c3fb1dfe30b529d7af5a333
SHA1e69a4ce7b48935640e867455da04c0f7b9cce63a
SHA256488358835f2d72122cb248c69a56cf9a7091ae31040b9e4216d10a1165d3af5e
SHA512e326116ef29ca85be50579a31245a1aa61e045daafd16b2bd9cf3e863f4968084abb352202cba2121e982741ee2cf44f4ccd6daa73f5c023edac836b20333dea
-
\Users\Admin\AppData\Local\Temp\ridxv.exeFilesize
29KB
MD5602ae0ce460afec64cdf36383b949279
SHA1bf9286b0bb0b2c13741877d0fce4df0d330a1f0b
SHA256f8646cfaa18ee7aec4be0544af623418e9cb5834ee22c62a5534bb1c59d27fe5
SHA5120668ea99e8e7166d99cbadf987aede84ad7db22eee2f317711da8a70ceb37a2a385509bb3ed960c96b38f256d98ef339d4bd222876b25afc9a03a15b0360d881
-
\Users\Admin\AppData\Local\Temp\taskmgr.exeFilesize
58KB
MD507b07c79285949744ddcba546edf879c
SHA1684fbbc5c2813daf641d896fafa761b503062a2e
SHA256bde69d1c9452f196adff8b5c84c51d39b384963d714221da59b683ea60a4b92d
SHA51284b6b0cb119c6950e2dfe8660ca5687f0d6c8850365869fcdea5fa5849acf573c8647d134c71191588ef622d2de77ffdcea9249adfc6f93bbf979d7370186233
-
\Users\Admin\AppData\Local\Temp\wininst.exeFilesize
58KB
MD59affcaf0b71f2ab75bbd2c9491b8c6b3
SHA10a3b7cda799c8e2bc5254dbfaa39750f0ba14ab7
SHA256239c45b1c2fb99960650cd774989b50141c6438b35cef283d81176ac9c5f25b0
SHA512f6feb73223a7b3e341735c6acaca40b4c6aae452c9efd50dc33904da2ea2884eb8afe1ef8c6326d132768622cfecc98d0e53deb23613028a84598075e12a26a2
-
memory/956-163-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/1128-154-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/1128-168-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/1160-28-0x0000000000400000-0x000000000041F000-memory.dmpFilesize
124KB
-
memory/1244-52-0x0000000010000000-0x000000001001A000-memory.dmpFilesize
104KB
-
memory/1244-41-0x0000000010000000-0x000000001001A000-memory.dmpFilesize
104KB
-
memory/1244-202-0x0000000010000000-0x000000001001A000-memory.dmpFilesize
104KB
-
memory/1244-95-0x0000000010000000-0x000000001001A000-memory.dmpFilesize
104KB
-
memory/1256-40-0x0000000010000000-0x000000001001B000-memory.dmpFilesize
108KB
-
memory/1272-172-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/1272-155-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/1320-174-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/1320-158-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/1600-157-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/1600-173-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/1816-161-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/1816-177-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/1848-164-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/1848-179-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/2004-159-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/2576-54-0x0000000000400000-0x000000000041F000-memory.dmpFilesize
124KB
-
memory/2900-160-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/3032-53-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/3032-147-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/3032-96-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB