Analysis
-
max time kernel
149s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
04-04-2024 21:25
Static task
static1
Behavioral task
behavioral1
Sample
c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe
-
Size
1.2MB
-
MD5
c31df3d8b2b8f9368e7957d0033af4e1
-
SHA1
ca78c2b18414a92a2303e34d35f8d03bec4fbc61
-
SHA256
d46d599d0e3c35af86e70d0b9d0633fe735def84ac997637862069d61a08e667
-
SHA512
2c3f40743c6f5b86fc4d0330bedc676a84c236721a230b06d6dd71d492a1e867f076bea1134a7e68d0d78fda477d5c4a6a366f906fb0e31e746dcc8be9e384f3
-
SSDEEP
24576:8uPmLDUMihIXCE58ow3HAr8KXIE5rbc918VQAPM1mFJ:8u+LIIX7Rw3HAr8KXIE9bc917AeQJ
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation Isass.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation Isass.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation Isass.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation Isass.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation Isass.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation Isass.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation Isass.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation Isass.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation Isass.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation Isass.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation Isass.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation Isass.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation Isass.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation Isass.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation Isass.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation Isass.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation Isass.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation Isass.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation Isass.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation Isass.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation Isass.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation Isass.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation Isass.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation Isass.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation Isass.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation Isass.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation Isass.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation Isass.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation Isass.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation Isass.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation Isass.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation Isass.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation Isass.exe -
Executes dropped EXE 37 IoCs
pid Process 2060 Isass.exe 4352 Isass.exe 3788 Isass.exe 4972 Isass.exe 1312 Isass.exe 4332 Isass.exe 5020 Isass.exe 5064 Isass.exe 2696 Isass.exe 3840 Isass.exe 3068 Isass.exe 4496 Isass.exe 3112 Isass.exe 4324 Isass.exe 3244 Isass.exe 4284 Isass.exe 3804 Isass.exe 4020 Isass.exe 4424 Isass.exe 4376 Isass.exe 2696 Isass.exe 3064 Isass.exe 436 Isass.exe 4844 Isass.exe 384 Isass.exe 4352 Isass.exe 2064 Isass.exe 4640 Isass.exe 3264 Isass.exe 1880 Isass.exe 4868 Isass.exe 4988 Isass.exe 228 Isass.exe 624 Isass.exe 2512 Isass.exe 4104 Isass.exe 3032 Isass.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Users\\Public\\Microsoft Build\\Isass.exe" c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Users\\Public\\Microsoft Build\\Isass.exe" c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4348 c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe 4348 c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe 2060 Isass.exe 2060 Isass.exe 4352 Isass.exe 4352 Isass.exe 4352 Isass.exe 4352 Isass.exe 4352 Isass.exe 4352 Isass.exe 4168 c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe 4168 c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe 3788 Isass.exe 3788 Isass.exe 3788 Isass.exe 3788 Isass.exe 3788 Isass.exe 3788 Isass.exe 2524 c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe 2524 c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe 4972 Isass.exe 4972 Isass.exe 4972 Isass.exe 4972 Isass.exe 4972 Isass.exe 4972 Isass.exe 4292 c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe 4292 c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe 1312 Isass.exe 1312 Isass.exe 1312 Isass.exe 1312 Isass.exe 1312 Isass.exe 1312 Isass.exe 2904 c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe 2904 c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe 4332 Isass.exe 4332 Isass.exe 4332 Isass.exe 4332 Isass.exe 4332 Isass.exe 4332 Isass.exe 2408 c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe 2408 c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe 5020 Isass.exe 5020 Isass.exe 5020 Isass.exe 5020 Isass.exe 5020 Isass.exe 5020 Isass.exe 3192 c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe 3192 c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe 5064 Isass.exe 5064 Isass.exe 5064 Isass.exe 5064 Isass.exe 5064 Isass.exe 5064 Isass.exe 1880 c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe 1880 c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe 2696 Isass.exe 2696 Isass.exe 2696 Isass.exe 2696 Isass.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4348 wrote to memory of 2060 4348 c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe 86 PID 4348 wrote to memory of 2060 4348 c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe 86 PID 4348 wrote to memory of 2060 4348 c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe 86 PID 4348 wrote to memory of 4352 4348 c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe 89 PID 4348 wrote to memory of 4352 4348 c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe 89 PID 4348 wrote to memory of 4352 4348 c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe 89 PID 4352 wrote to memory of 4168 4352 Isass.exe 90 PID 4352 wrote to memory of 4168 4352 Isass.exe 90 PID 4352 wrote to memory of 4168 4352 Isass.exe 90 PID 4168 wrote to memory of 3788 4168 c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe 91 PID 4168 wrote to memory of 3788 4168 c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe 91 PID 4168 wrote to memory of 3788 4168 c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe 91 PID 3788 wrote to memory of 2524 3788 Isass.exe 92 PID 3788 wrote to memory of 2524 3788 Isass.exe 92 PID 3788 wrote to memory of 2524 3788 Isass.exe 92 PID 2524 wrote to memory of 4972 2524 c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe 93 PID 2524 wrote to memory of 4972 2524 c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe 93 PID 2524 wrote to memory of 4972 2524 c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe 93 PID 4972 wrote to memory of 4292 4972 Isass.exe 94 PID 4972 wrote to memory of 4292 4972 Isass.exe 94 PID 4972 wrote to memory of 4292 4972 Isass.exe 94 PID 4292 wrote to memory of 1312 4292 c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe 95 PID 4292 wrote to memory of 1312 4292 c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe 95 PID 4292 wrote to memory of 1312 4292 c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe 95 PID 1312 wrote to memory of 2904 1312 Isass.exe 96 PID 1312 wrote to memory of 2904 1312 Isass.exe 96 PID 1312 wrote to memory of 2904 1312 Isass.exe 96 PID 2904 wrote to memory of 4332 2904 c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe 97 PID 2904 wrote to memory of 4332 2904 c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe 97 PID 2904 wrote to memory of 4332 2904 c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe 97 PID 4332 wrote to memory of 2408 4332 Isass.exe 98 PID 4332 wrote to memory of 2408 4332 Isass.exe 98 PID 4332 wrote to memory of 2408 4332 Isass.exe 98 PID 2408 wrote to memory of 5020 2408 c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe 99 PID 2408 wrote to memory of 5020 2408 c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe 99 PID 2408 wrote to memory of 5020 2408 c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe 99 PID 5020 wrote to memory of 3192 5020 Isass.exe 101 PID 5020 wrote to memory of 3192 5020 Isass.exe 101 PID 5020 wrote to memory of 3192 5020 Isass.exe 101 PID 3192 wrote to memory of 5064 3192 c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe 152 PID 3192 wrote to memory of 5064 3192 c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe 152 PID 3192 wrote to memory of 5064 3192 c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe 152 PID 5064 wrote to memory of 1880 5064 Isass.exe 153 PID 5064 wrote to memory of 1880 5064 Isass.exe 153 PID 5064 wrote to memory of 1880 5064 Isass.exe 153 PID 1880 wrote to memory of 2696 1880 c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe 154 PID 1880 wrote to memory of 2696 1880 c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe 154 PID 1880 wrote to memory of 2696 1880 c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe 154 PID 2696 wrote to memory of 4024 2696 Isass.exe 105 PID 2696 wrote to memory of 4024 2696 Isass.exe 105 PID 2696 wrote to memory of 4024 2696 Isass.exe 105 PID 4024 wrote to memory of 3840 4024 c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe 106 PID 4024 wrote to memory of 3840 4024 c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe 106 PID 4024 wrote to memory of 3840 4024 c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe 106 PID 3840 wrote to memory of 532 3840 Isass.exe 107 PID 3840 wrote to memory of 532 3840 Isass.exe 107 PID 3840 wrote to memory of 532 3840 Isass.exe 107 PID 532 wrote to memory of 3068 532 c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe 136 PID 532 wrote to memory of 3068 532 c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe 136 PID 532 wrote to memory of 3068 532 c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe 136 PID 3068 wrote to memory of 5072 3068 Isass.exe 109 PID 3068 wrote to memory of 5072 3068 Isass.exe 109 PID 3068 wrote to memory of 5072 3068 Isass.exe 109 PID 5072 wrote to memory of 4496 5072 c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2060
-
-
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe"3⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3788 -
C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe"5⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe"7⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe8⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe"9⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe10⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe"11⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe"13⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe14⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe"15⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe16⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe"17⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe18⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3840 -
C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe"19⤵
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe20⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe"21⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe22⤵
- Checks computer location settings
- Executes dropped EXE
PID:4496 -
C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe"23⤵
- Checks computer location settings
PID:4568 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe24⤵
- Checks computer location settings
- Executes dropped EXE
PID:3112 -
C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe"25⤵
- Checks computer location settings
PID:3764 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe26⤵
- Checks computer location settings
- Executes dropped EXE
PID:4324 -
C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe"27⤵PID:896
-
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe28⤵
- Executes dropped EXE
PID:3244 -
C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe"29⤵
- Checks computer location settings
PID:4920 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe30⤵
- Checks computer location settings
- Executes dropped EXE
PID:4284 -
C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe"31⤵
- Checks computer location settings
PID:3288 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe32⤵
- Checks computer location settings
- Executes dropped EXE
PID:3804 -
C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe"33⤵
- Checks computer location settings
PID:3752 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe34⤵
- Checks computer location settings
- Executes dropped EXE
PID:4020 -
C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe"35⤵
- Checks computer location settings
PID:1604 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe36⤵
- Checks computer location settings
- Executes dropped EXE
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe"37⤵
- Checks computer location settings
PID:3724 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe38⤵
- Checks computer location settings
- Executes dropped EXE
PID:4376 -
C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe"39⤵
- Checks computer location settings
PID:1880 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe40⤵
- Checks computer location settings
- Executes dropped EXE
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe"41⤵
- Checks computer location settings
PID:3000 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe42⤵
- Checks computer location settings
- Executes dropped EXE
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe"43⤵
- Checks computer location settings
PID:3068 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe44⤵
- Checks computer location settings
- Executes dropped EXE
PID:436 -
C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe"45⤵
- Checks computer location settings
PID:3608 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe46⤵
- Checks computer location settings
- Executes dropped EXE
PID:4844 -
C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe"47⤵
- Checks computer location settings
PID:4408 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe48⤵
- Checks computer location settings
- Executes dropped EXE
PID:384 -
C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe"49⤵
- Checks computer location settings
PID:4716 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe50⤵
- Checks computer location settings
- Executes dropped EXE
PID:4352 -
C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe"51⤵
- Checks computer location settings
PID:2632 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe52⤵
- Checks computer location settings
- Executes dropped EXE
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe"53⤵PID:4996
-
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe54⤵
- Checks computer location settings
- Executes dropped EXE
PID:4640 -
C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe"55⤵
- Checks computer location settings
PID:4020 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe56⤵
- Checks computer location settings
- Executes dropped EXE
PID:3264 -
C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe"57⤵
- Checks computer location settings
PID:5064 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe58⤵
- Checks computer location settings
- Executes dropped EXE
PID:1880 -
C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe"59⤵
- Checks computer location settings
PID:2696 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe60⤵
- Checks computer location settings
- Executes dropped EXE
PID:4868 -
C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe"61⤵
- Checks computer location settings
PID:2388 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe62⤵
- Checks computer location settings
- Executes dropped EXE
PID:4988 -
C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe"63⤵PID:3176
-
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe64⤵
- Checks computer location settings
- Executes dropped EXE
PID:228 -
C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe"65⤵
- Checks computer location settings
PID:1440 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe66⤵
- Checks computer location settings
- Executes dropped EXE
PID:624 -
C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe"67⤵
- Checks computer location settings
PID:1364 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe68⤵
- Executes dropped EXE
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe"69⤵
- Checks computer location settings
PID:4920 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe70⤵
- Checks computer location settings
- Executes dropped EXE
PID:4104 -
C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe"71⤵
- Checks computer location settings
PID:3752 -
C:\Users\Public\Microsoft Build\Isass.exe"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\c31df3d8b2b8f9368e7957d0033af4e1_JaffaCakes118.exe72⤵
- Checks computer location settings
- Executes dropped EXE
PID:3032
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
524KB
MD525833df880df030d5ef536273d1eb341
SHA143e86ae135fe5456287fa71712a1e27867b02193
SHA256081dc59cc46bb97d20568013ae6007be41b9c1e8ff7e8327ea91e0edca32f862
SHA512ae2efa715fa92cd280cad38194cf4fe8f50481b97cbcd8c89f0e56db5ecd7726bcd2e7e57c73c9473e05fc12059d21ec56737747452019b18e3a3f9d8c402e09
-
Filesize
624KB
MD51dd29920d53ec6d8215c9668a90d0a34
SHA1cc2c4a1abeeab01b3eaf201d66cc0f86b48acfcb
SHA25662b51132132d1aa915e4b1fea6073a49a10560fbd9bf78aabd740dd20f5bd7ac
SHA512c99ebe656d200c8cc55b31995ec74a1a482c21a7c7c6b5b90ae782d247e9ca858d9e79227e8882beb5a766eed78f75ce41025a119ed2172c08f77fed8ad3c124
-
Filesize
5.7MB
MD529d86a632fe3fe3f663dcbbca1afbb92
SHA155f1d5e98a94a693a0423b774b1fa0ce15f1a678
SHA256d631e52d758950e85d23fb41c3bd9b556d91dacb77a9fdd296628386ee8f547d
SHA5129e616281a5c9939966c88dadf837fbf8bd15f2ce2efcec783fff0ffc400607c2ee75637e1b75e135891b438a6c0b3746b119a7c38ae16755a37cf7ae4958c81d