Malware Analysis Report

2025-03-14 22:36

Sample ID 240406-r5legacf4x
Target e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118
SHA256 c065e85103fef84d4c006b7c564871c4b998d87e3e3a5537eb3fd3de1ebdd9cc
Tags
persistence spyware stealer upx
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

c065e85103fef84d4c006b7c564871c4b998d87e3e3a5537eb3fd3de1ebdd9cc

Threat Level: Shows suspicious behavior

The file e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118 was found to be: Shows suspicious behavior.

Malicious Activity Summary

persistence spyware stealer upx

Executes dropped EXE

Loads dropped DLL

Reads user/profile data of web browsers

UPX packed file

Adds Run key to start application

Unsigned PE

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

Modifies Internet Explorer Phishing Filter

Modifies Internet Explorer settings

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-04-06 14:46

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-04-06 14:46

Reported

2024-04-06 14:49

Platform

win7-20240220-en

Max time kernel

150s

Max time network

132s

Command Line

wininit.exe

Signatures

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A

Reads user/profile data of web browsers

spyware stealer

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\trivax1.Bin.exe = "C:\\trivax1.Bin\\trivax1.Bin.exe" C:\trivax1.Bin\trivax1.Bin.exe N/A

Modifies Internet Explorer Phishing Filter

Description Indicator Process Target
Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PhishingFilter\ShownServiceDownBalloon = "0" C:\trivax1.Bin\trivax1.Bin.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PhishingFilter C:\trivax1.Bin\trivax1.Bin.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PhishingFilter\EnabledV8 = "0" C:\trivax1.Bin\trivax1.Bin.exe N/A

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery C:\trivax1.Bin\trivax1.Bin.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\ClearBrowsingHistoryOnExit = "0" C:\trivax1.Bin\trivax1.Bin.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2072 wrote to memory of 1180 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\Explorer.EXE
PID 2072 wrote to memory of 388 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\system32\wininit.exe
PID 2072 wrote to memory of 436 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\system32\winlogon.exe
PID 2072 wrote to memory of 492 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\system32\lsass.exe
PID 2072 wrote to memory of 500 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\system32\lsm.exe
PID 2072 wrote to memory of 596 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\system32\svchost.exe
PID 2072 wrote to memory of 680 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\system32\svchost.exe
PID 2072 wrote to memory of 744 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\System32\svchost.exe
PID 2072 wrote to memory of 812 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\System32\svchost.exe
PID 2072 wrote to memory of 856 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\system32\svchost.exe
PID 2072 wrote to memory of 960 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\system32\svchost.exe
PID 2072 wrote to memory of 280 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\system32\svchost.exe
PID 2072 wrote to memory of 1044 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\System32\spoolsv.exe
PID 2072 wrote to memory of 1052 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\system32\taskhost.exe
PID 2072 wrote to memory of 1104 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\system32\Dwm.exe
PID 2072 wrote to memory of 1136 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\system32\svchost.exe
PID 2072 wrote to memory of 1180 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\Explorer.EXE
PID 2072 wrote to memory of 320 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\system32\DllHost.exe
PID 2072 wrote to memory of 2148 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\system32\svchost.exe
PID 2072 wrote to memory of 2244 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\system32\sppsvc.exe
PID 2072 wrote to memory of 2576 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\trivax1.Bin\trivax1.Bin.exe
PID 2072 wrote to memory of 2576 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\trivax1.Bin\trivax1.Bin.exe
PID 2072 wrote to memory of 2576 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\trivax1.Bin\trivax1.Bin.exe
PID 2072 wrote to memory of 2576 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\trivax1.Bin\trivax1.Bin.exe
PID 2576 wrote to memory of 1180 N/A C:\trivax1.Bin\trivax1.Bin.exe C:\Windows\Explorer.EXE
PID 2576 wrote to memory of 388 N/A C:\trivax1.Bin\trivax1.Bin.exe C:\Windows\system32\wininit.exe
PID 2576 wrote to memory of 436 N/A C:\trivax1.Bin\trivax1.Bin.exe C:\Windows\system32\winlogon.exe
PID 2576 wrote to memory of 492 N/A C:\trivax1.Bin\trivax1.Bin.exe C:\Windows\system32\lsass.exe
PID 2576 wrote to memory of 500 N/A C:\trivax1.Bin\trivax1.Bin.exe C:\Windows\system32\lsm.exe
PID 2576 wrote to memory of 596 N/A C:\trivax1.Bin\trivax1.Bin.exe C:\Windows\system32\svchost.exe
PID 2576 wrote to memory of 680 N/A C:\trivax1.Bin\trivax1.Bin.exe C:\Windows\system32\svchost.exe
PID 2576 wrote to memory of 744 N/A C:\trivax1.Bin\trivax1.Bin.exe C:\Windows\System32\svchost.exe
PID 2576 wrote to memory of 812 N/A C:\trivax1.Bin\trivax1.Bin.exe C:\Windows\System32\svchost.exe
PID 2576 wrote to memory of 856 N/A C:\trivax1.Bin\trivax1.Bin.exe C:\Windows\system32\svchost.exe
PID 2576 wrote to memory of 960 N/A C:\trivax1.Bin\trivax1.Bin.exe C:\Windows\system32\svchost.exe
PID 2576 wrote to memory of 280 N/A C:\trivax1.Bin\trivax1.Bin.exe C:\Windows\system32\svchost.exe
PID 2576 wrote to memory of 1044 N/A C:\trivax1.Bin\trivax1.Bin.exe C:\Windows\System32\spoolsv.exe
PID 2576 wrote to memory of 1052 N/A C:\trivax1.Bin\trivax1.Bin.exe C:\Windows\system32\taskhost.exe
PID 2576 wrote to memory of 1104 N/A C:\trivax1.Bin\trivax1.Bin.exe C:\Windows\system32\Dwm.exe
PID 2576 wrote to memory of 1136 N/A C:\trivax1.Bin\trivax1.Bin.exe C:\Windows\system32\svchost.exe
PID 2576 wrote to memory of 1180 N/A C:\trivax1.Bin\trivax1.Bin.exe C:\Windows\Explorer.EXE
PID 2576 wrote to memory of 320 N/A C:\trivax1.Bin\trivax1.Bin.exe C:\Windows\system32\DllHost.exe
PID 2576 wrote to memory of 2148 N/A C:\trivax1.Bin\trivax1.Bin.exe C:\Windows\system32\svchost.exe
PID 2576 wrote to memory of 2244 N/A C:\trivax1.Bin\trivax1.Bin.exe C:\Windows\system32\sppsvc.exe
PID 2576 wrote to memory of 2072 N/A C:\trivax1.Bin\trivax1.Bin.exe C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe
PID 2576 wrote to memory of 1888 N/A C:\trivax1.Bin\trivax1.Bin.exe C:\Windows\system32\DllHost.exe
PID 2576 wrote to memory of 536 N/A C:\trivax1.Bin\trivax1.Bin.exe C:\Windows\system32\wbem\WMIADAP.EXE
PID 2576 wrote to memory of 1148 N/A C:\trivax1.Bin\trivax1.Bin.exe C:\Windows\system32\wbem\wmiprvse.exe
PID 2576 wrote to memory of 940 N/A C:\trivax1.Bin\trivax1.Bin.exe C:\Windows\system32\DllHost.exe
PID 2576 wrote to memory of 2572 N/A C:\trivax1.Bin\trivax1.Bin.exe C:\Windows\system32\DllHost.exe

Processes

C:\Windows\system32\wininit.exe

wininit.exe

C:\Windows\system32\winlogon.exe

winlogon.exe

C:\Windows\system32\lsass.exe

C:\Windows\system32\lsass.exe

C:\Windows\system32\lsm.exe

C:\Windows\system32\lsm.exe

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k DcomLaunch

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k RPCSS

C:\Windows\System32\svchost.exe

C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted

C:\Windows\System32\svchost.exe

C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k netsvcs

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k LocalService

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k NetworkService

C:\Windows\System32\spoolsv.exe

C:\Windows\System32\spoolsv.exe

C:\Windows\system32\taskhost.exe

"taskhost.exe"

C:\Windows\system32\Dwm.exe

"C:\Windows\system32\Dwm.exe"

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork

C:\Windows\Explorer.EXE

C:\Windows\Explorer.EXE

C:\Windows\system32\DllHost.exe

C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation

C:\Windows\system32\sppsvc.exe

C:\Windows\system32\sppsvc.exe

C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe"

C:\trivax1.Bin\trivax1.Bin.exe

"C:\trivax1.Bin\trivax1.Bin.exe"

C:\Windows\system32\DllHost.exe

C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}

C:\Windows\system32\wbem\WMIADAP.EXE

wmiadap.exe /F /T /R

C:\Windows\system32\wbem\wmiprvse.exe

C:\Windows\system32\wbem\wmiprvse.exe -Embedding

C:\Windows\system32\DllHost.exe

C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}

C:\Windows\system32\DllHost.exe

C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}

Network

Country Destination Domain Proto
US 8.8.8.8:53 traxbax.com udp
UA 213.155.21.32:8080 tcp
US 8.8.8.8:53 www.microsoft.com udp
NL 72.246.173.187:80 www.microsoft.com tcp
NL 72.246.173.187:80 www.microsoft.com tcp
NL 72.246.173.187:80 www.microsoft.com tcp
US 8.8.8.8:53 itunesgiftstore.com udp

Files

memory/2072-0-0x0000000000400000-0x0000000000466000-memory.dmp

memory/2072-1-0x0000000000400000-0x0000000000466000-memory.dmp

memory/2072-2-0x0000000000220000-0x0000000000286000-memory.dmp

memory/2072-3-0x0000000000400000-0x0000000000466000-memory.dmp

memory/2072-4-0x0000000000290000-0x0000000000291000-memory.dmp

memory/2072-5-0x0000000000290000-0x0000000000292000-memory.dmp

\trivax1.Bin\trivax1.Bin.exe

MD5 e2c610a8dc66be4914ef40cc90fd26c1
SHA1 4ff62851b7e7b101c7e63e5fd63312f7a4baba23
SHA256 c065e85103fef84d4c006b7c564871c4b998d87e3e3a5537eb3fd3de1ebdd9cc
SHA512 bab0fcebd69387a4a50d07747e8f3d4e2e3e438eb89d428c6aaef1eaa4b9ad148279bab1483d89cfde3887da287bf90b260895c604da54f0acb5d9c6114cd8ff

memory/2576-15-0x0000000000400000-0x0000000000466000-memory.dmp

memory/2576-16-0x0000000000400000-0x0000000000466000-memory.dmp

memory/2576-17-0x0000000000350000-0x00000000003B6000-memory.dmp

memory/1180-20-0x000000000BAD0000-0x000000000BB15000-memory.dmp

memory/2576-23-0x0000000000400000-0x0000000000466000-memory.dmp

memory/2576-25-0x00000000002E0000-0x0000000000325000-memory.dmp

memory/2576-28-0x00000000002E0000-0x0000000000325000-memory.dmp

memory/2576-32-0x00000000002E0000-0x0000000000325000-memory.dmp

memory/2576-36-0x0000000000220000-0x0000000000225000-memory.dmp

memory/2576-35-0x00000000002E0000-0x0000000000325000-memory.dmp

memory/2576-34-0x0000000000220000-0x0000000000225000-memory.dmp

memory/2576-67-0x0000000002B10000-0x0000000002B50000-memory.dmp

memory/2072-69-0x0000000000400000-0x0000000000466000-memory.dmp

memory/1180-85-0x000000000BB50000-0x000000000BB9F000-memory.dmp

memory/2576-102-0x0000000002DE0000-0x0000000002FA4000-memory.dmp

memory/2072-104-0x00000000779CF000-0x00000000779D1000-memory.dmp

memory/2072-107-0x00000000779CF000-0x00000000779D1000-memory.dmp

memory/2072-106-0x00000000779D1000-0x00000000779D3000-memory.dmp

memory/2072-108-0x000000000BAD0000-0x000000000BB15000-memory.dmp

memory/2072-113-0x00000000779CF000-0x00000000779D1000-memory.dmp

C:\trivax1.Bin\config.bin

MD5 96f4ed1e6523ea5fd57e457fe8e12977
SHA1 9c48d689c0d46dd4b30f3441715a384014993be2
SHA256 3e017d7f2bcc0fa41a28f1403d006ab19e46c209b276151c0e53ebda7fe50f64
SHA512 51f9c662f29090a940a6d231e8bf607f43368f73e415edc3138b2ae5f47ab7fb8c96f460e0c822549923c33077c2794aa01586941cecf0f2be739f096a351a08

memory/2072-114-0x00000000779D0000-0x00000000779D2000-memory.dmp

memory/2072-116-0x00000000779EC000-0x00000000779EE000-memory.dmp

memory/2072-128-0x000000000BAD0000-0x000000000BB15000-memory.dmp

memory/2072-130-0x0000000075B20000-0x0000000075C20000-memory.dmp

memory/2072-131-0x000000000BAD0000-0x000000000BB15000-memory.dmp

memory/2072-132-0x0000000000290000-0x0000000000291000-memory.dmp

memory/2072-134-0x000000000BAD0000-0x000000000BB15000-memory.dmp

memory/2072-139-0x000000000BAD0000-0x000000000BB15000-memory.dmp

memory/2072-140-0x00000000029A0000-0x00000000029D5000-memory.dmp

memory/2072-143-0x0000000075C30000-0x0000000075C65000-memory.dmp

memory/2072-144-0x0000000000880000-0x00000000008B5000-memory.dmp

memory/2072-150-0x0000000075C30000-0x0000000075C65000-memory.dmp

memory/2072-149-0x0000000075B20000-0x0000000075C20000-memory.dmp

memory/2576-154-0x00000000002E0000-0x0000000000325000-memory.dmp

memory/2576-155-0x0000000000220000-0x0000000000225000-memory.dmp

memory/2576-156-0x0000000002B10000-0x0000000002B50000-memory.dmp

memory/2576-160-0x0000000002DE0000-0x0000000002FA4000-memory.dmp

memory/2576-161-0x0000000002DE0000-0x0000000002FA4000-memory.dmp

memory/2576-178-0x0000000002DE0000-0x0000000002FA4000-memory.dmp

memory/2576-179-0x0000000002DE0000-0x0000000002FA4000-memory.dmp

memory/2576-180-0x0000000002DE0000-0x0000000002FA4000-memory.dmp

memory/2576-181-0x0000000002DE0000-0x0000000002EE0000-memory.dmp

memory/2576-182-0x0000000002DE0000-0x0000000002EE0000-memory.dmp

memory/2576-183-0x0000000002DE0000-0x0000000002EE0000-memory.dmp

memory/2576-184-0x0000000002DE0000-0x0000000002EE0000-memory.dmp

memory/2576-185-0x0000000002DE0000-0x0000000002EE0000-memory.dmp

memory/2576-186-0x0000000002DE0000-0x0000000002EE0000-memory.dmp

memory/2576-187-0x0000000002DE0000-0x0000000002EE0000-memory.dmp

memory/2576-188-0x0000000002DE0000-0x0000000002EE0000-memory.dmp

memory/2576-189-0x0000000002DE0000-0x0000000002EE0000-memory.dmp

memory/2576-190-0x0000000002DE0000-0x0000000002EE0000-memory.dmp

memory/2576-191-0x0000000002DE0000-0x0000000002EE0000-memory.dmp

memory/2576-193-0x0000000002DE0000-0x0000000002FA4000-memory.dmp

memory/2576-195-0x0000000002DE0000-0x0000000002FA4000-memory.dmp

memory/2576-196-0x0000000002DE0000-0x0000000002FA4000-memory.dmp

memory/2576-197-0x0000000002DE0000-0x0000000002EE0000-memory.dmp

memory/2576-198-0x0000000003C90000-0x0000000003E54000-memory.dmp

memory/2576-199-0x0000000003C90000-0x0000000003E54000-memory.dmp

memory/2576-200-0x0000000003C90000-0x0000000003E54000-memory.dmp

memory/2576-201-0x0000000003C90000-0x0000000003E54000-memory.dmp

memory/2576-202-0x0000000003C90000-0x0000000003E54000-memory.dmp

memory/2576-203-0x0000000003C90000-0x0000000003E54000-memory.dmp

memory/2576-204-0x0000000003C90000-0x0000000003E54000-memory.dmp

memory/2576-205-0x0000000003C90000-0x0000000003E54000-memory.dmp

memory/2576-206-0x0000000003C90000-0x0000000003E54000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-04-06 14:46

Reported

2024-04-06 14:49

Platform

win10v2004-20240226-en

Max time kernel

150s

Max time network

154s

Command Line

winlogon.exe

Signatures

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A

Reads user/profile data of web browsers

spyware stealer

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\trivax1.Bin.exe = "C:\\trivax1.Bin\\trivax1.Bin.exe" C:\trivax1.Bin\trivax1.Bin.exe N/A

Modifies Internet Explorer Phishing Filter

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\Software\Microsoft\Internet Explorer\PhishingFilter C:\trivax1.Bin\trivax1.Bin.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Internet Explorer\PhishingFilter\EnabledV8 = "0" C:\trivax1.Bin\trivax1.Bin.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Internet Explorer\PhishingFilter\ShownServiceDownBalloon = "0" C:\trivax1.Bin\trivax1.Bin.exe N/A

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\Software\Microsoft\Internet Explorer\Recovery C:\trivax1.Bin\trivax1.Bin.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\ClearBrowsingHistoryOnExit = "0" C:\trivax1.Bin\trivax1.Bin.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
N/A N/A C:\trivax1.Bin\trivax1.Bin.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A
Token: SeDebugPrivilege N/A C:\trivax1.Bin\trivax1.Bin.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1440 wrote to memory of 3528 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\Explorer.EXE
PID 1440 wrote to memory of 624 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\system32\winlogon.exe
PID 1440 wrote to memory of 684 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\system32\lsass.exe
PID 1440 wrote to memory of 792 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\system32\fontdrvhost.exe
PID 1440 wrote to memory of 800 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\system32\fontdrvhost.exe
PID 1440 wrote to memory of 808 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\system32\svchost.exe
PID 1440 wrote to memory of 908 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\system32\svchost.exe
PID 1440 wrote to memory of 960 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\system32\svchost.exe
PID 1440 wrote to memory of 60 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\system32\dwm.exe
PID 1440 wrote to memory of 396 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\system32\svchost.exe
PID 1440 wrote to memory of 700 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\system32\svchost.exe
PID 1440 wrote to memory of 1040 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\System32\svchost.exe
PID 1440 wrote to memory of 1048 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\system32\svchost.exe
PID 1440 wrote to memory of 1056 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\System32\svchost.exe
PID 1440 wrote to memory of 1064 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\system32\svchost.exe
PID 1440 wrote to memory of 1188 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\system32\svchost.exe
PID 1440 wrote to memory of 1224 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\System32\svchost.exe
PID 1440 wrote to memory of 1268 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\system32\svchost.exe
PID 1440 wrote to memory of 1336 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\system32\svchost.exe
PID 1440 wrote to memory of 1396 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\system32\svchost.exe
PID 1440 wrote to memory of 1448 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\system32\svchost.exe
PID 1440 wrote to memory of 1472 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\System32\svchost.exe
PID 1440 wrote to memory of 1484 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\system32\svchost.exe
PID 1440 wrote to memory of 1508 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\system32\svchost.exe
PID 1440 wrote to memory of 1596 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\system32\svchost.exe
PID 1440 wrote to memory of 1668 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\System32\svchost.exe
PID 1440 wrote to memory of 1720 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\System32\svchost.exe
PID 1440 wrote to memory of 1784 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\System32\svchost.exe
PID 1440 wrote to memory of 1876 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\System32\svchost.exe
PID 1440 wrote to memory of 1976 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\system32\svchost.exe
PID 1440 wrote to memory of 1984 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\System32\svchost.exe
PID 1440 wrote to memory of 1756 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\system32\svchost.exe
PID 1440 wrote to memory of 1912 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\system32\svchost.exe
PID 1440 wrote to memory of 2068 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\System32\svchost.exe
PID 1440 wrote to memory of 2124 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\System32\spoolsv.exe
PID 1440 wrote to memory of 2168 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\system32\svchost.exe
PID 1440 wrote to memory of 2240 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\System32\svchost.exe
PID 1440 wrote to memory of 2348 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\System32\svchost.exe
PID 1440 wrote to memory of 2484 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\system32\svchost.exe
PID 1440 wrote to memory of 2492 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\system32\svchost.exe
PID 1440 wrote to memory of 2696 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\system32\sihost.exe
PID 1440 wrote to memory of 2732 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\system32\svchost.exe
PID 1440 wrote to memory of 2752 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\system32\svchost.exe
PID 1440 wrote to memory of 2800 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\system32\svchost.exe
PID 1440 wrote to memory of 2812 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\sysmon.exe
PID 1440 wrote to memory of 2840 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\System32\svchost.exe
PID 1440 wrote to memory of 2848 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\system32\svchost.exe
PID 1440 wrote to memory of 2936 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\system32\taskhostw.exe
PID 1440 wrote to memory of 388 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\system32\svchost.exe
PID 1440 wrote to memory of 2928 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\system32\wbem\unsecapp.exe
PID 1440 wrote to memory of 3444 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\system32\svchost.exe
PID 1440 wrote to memory of 3528 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\Explorer.EXE
PID 1440 wrote to memory of 3680 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\system32\svchost.exe
PID 1440 wrote to memory of 3864 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\system32\DllHost.exe
PID 1440 wrote to memory of 4004 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
PID 1440 wrote to memory of 4076 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\System32\RuntimeBroker.exe
PID 1440 wrote to memory of 1356 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
PID 1440 wrote to memory of 4016 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\System32\RuntimeBroker.exe
PID 1440 wrote to memory of 2440 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\System32\RuntimeBroker.exe
PID 1440 wrote to memory of 4224 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\System32\svchost.exe
PID 1440 wrote to memory of 4472 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\system32\svchost.exe
PID 1440 wrote to memory of 1480 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
PID 1440 wrote to memory of 5028 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\system32\SppExtComObj.exe
PID 1440 wrote to memory of 4344 N/A C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe C:\Windows\system32\svchost.exe

Processes

C:\Windows\system32\winlogon.exe

winlogon.exe

C:\Windows\system32\lsass.exe

C:\Windows\system32\lsass.exe

C:\Windows\system32\fontdrvhost.exe

"fontdrvhost.exe"

C:\Windows\system32\fontdrvhost.exe

"fontdrvhost.exe"

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k DcomLaunch -p

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k RPCSS -p

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM

C:\Windows\system32\dwm.exe

"dwm.exe"

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k netsvcs -p -s DsmSvc

C:\Windows\System32\svchost.exe

C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p

C:\Windows\System32\svchost.exe

C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule

C:\Windows\System32\svchost.exe

C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k LocalService -p -s nsi

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem

C:\Windows\System32\svchost.exe

C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS

C:\Windows\System32\svchost.exe

C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder

C:\Windows\System32\svchost.exe

C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc

C:\Windows\System32\svchost.exe

C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm

C:\Windows\System32\svchost.exe

C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache

C:\Windows\System32\svchost.exe

C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt

C:\Windows\System32\svchost.exe

C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection

C:\Windows\System32\spoolsv.exe

C:\Windows\System32\spoolsv.exe

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p

C:\Windows\System32\svchost.exe

C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation

C:\Windows\System32\svchost.exe

C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent

C:\Windows\system32\sihost.exe

sihost.exe

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer

C:\Windows\sysmon.exe

C:\Windows\sysmon.exe

C:\Windows\System32\svchost.exe

C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService

C:\Windows\system32\taskhostw.exe

taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker

C:\Windows\system32\wbem\unsecapp.exe

C:\Windows\system32\wbem\unsecapp.exe -Embedding

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc

C:\Windows\Explorer.EXE

C:\Windows\Explorer.EXE

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc

C:\Windows\system32\DllHost.exe

C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}

C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe

"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca

C:\Windows\System32\RuntimeBroker.exe

C:\Windows\System32\RuntimeBroker.exe -Embedding

C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe

"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca

C:\Windows\System32\RuntimeBroker.exe

C:\Windows\System32\RuntimeBroker.exe -Embedding

C:\Windows\System32\RuntimeBroker.exe

C:\Windows\System32\RuntimeBroker.exe -Embedding

C:\Windows\System32\svchost.exe

C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc

C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe

"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service

C:\Windows\system32\SppExtComObj.exe

C:\Windows\system32\SppExtComObj.exe -Embedding

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc

C:\Windows\System32\svchost.exe

C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager

C:\Windows\system32\DllHost.exe

C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}

C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe

"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k appmodel -p -s camsvc

C:\Windows\system32\wbem\wmiprvse.exe

C:\Windows\system32\wbem\wmiprvse.exe

C:\Windows\system32\backgroundTaskHost.exe

"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca

C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\e2c610a8dc66be4914ef40cc90fd26c1_JaffaCakes118.exe"

C:\Windows\System32\RuntimeBroker.exe

C:\Windows\System32\RuntimeBroker.exe -Embedding

C:\Windows\System32\RuntimeBroker.exe

C:\Windows\System32\RuntimeBroker.exe -Embedding

C:\trivax1.Bin\trivax1.Bin.exe

"C:\trivax1.Bin\trivax1.Bin.exe"

C:\Windows\System32\WaaSMedicAgent.exe

C:\Windows\System32\WaaSMedicAgent.exe 5737bb2e655e283517c3e784f92845f8 s0gY+OTzDEKHMLrlCGNZVw.0.1.0.0.0

C:\Windows\System32\Conhost.exe

\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv

C:\Windows\system32\wbem\wmiprvse.exe

C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding

C:\Windows\servicing\TrustedInstaller.exe

C:\Windows\servicing\TrustedInstaller.exe

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc

C:\Windows\System32\mousocoreworker.exe

C:\Windows\System32\mousocoreworker.exe -Embedding

Network

Country Destination Domain Proto
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
US 8.8.8.8:53 240.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 traxbax.com udp
US 8.8.8.8:53 www.microsoft.com udp
NL 72.246.173.187:80 www.microsoft.com tcp
US 8.8.8.8:53 187.173.246.72.in-addr.arpa udp
US 8.8.8.8:53 23.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 56.126.166.20.in-addr.arpa udp
US 8.8.8.8:53 28.143.109.104.in-addr.arpa udp
US 8.8.8.8:53 traxbax.com udp
NL 72.246.173.187:80 www.microsoft.com tcp
US 8.8.8.8:53 48.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 traxbax.com udp
NL 72.246.173.187:80 www.microsoft.com tcp
US 8.8.8.8:53 105.246.116.51.in-addr.arpa udp

Files

memory/1440-0-0x0000000000400000-0x0000000000466000-memory.dmp

memory/1440-1-0x0000000000400000-0x0000000000466000-memory.dmp

memory/1440-2-0x0000000002100000-0x0000000002166000-memory.dmp

memory/1440-4-0x00000000005C0000-0x00000000005C1000-memory.dmp

memory/1440-3-0x0000000000400000-0x0000000000466000-memory.dmp

memory/1440-5-0x00000000005C0000-0x00000000005C2000-memory.dmp

C:\trivax1.Bin\trivax1.Bin.exe

MD5 e2c610a8dc66be4914ef40cc90fd26c1
SHA1 4ff62851b7e7b101c7e63e5fd63312f7a4baba23
SHA256 c065e85103fef84d4c006b7c564871c4b998d87e3e3a5537eb3fd3de1ebdd9cc
SHA512 bab0fcebd69387a4a50d07747e8f3d4e2e3e438eb89d428c6aaef1eaa4b9ad148279bab1483d89cfde3887da287bf90b260895c604da54f0acb5d9c6114cd8ff

memory/3568-11-0x0000000000400000-0x0000000000466000-memory.dmp

memory/3568-12-0x0000000000400000-0x0000000000466000-memory.dmp

memory/3568-13-0x00000000020C0000-0x0000000002126000-memory.dmp

memory/3568-14-0x0000000000400000-0x0000000000466000-memory.dmp

memory/3568-15-0x0000000002070000-0x0000000002071000-memory.dmp

memory/3528-18-0x000000000C250000-0x000000000C2A1000-memory.dmp

memory/3568-20-0x0000000002130000-0x0000000002175000-memory.dmp

memory/3568-19-0x0000000002130000-0x0000000002175000-memory.dmp

memory/3568-23-0x0000000002130000-0x0000000002175000-memory.dmp

memory/3568-26-0x0000000002130000-0x0000000002175000-memory.dmp

memory/3568-29-0x0000000002130000-0x0000000002175000-memory.dmp

memory/3568-31-0x0000000002070000-0x0000000002075000-memory.dmp

memory/624-25-0x0000000002130000-0x0000000002175000-memory.dmp

memory/3568-34-0x0000000002130000-0x0000000002175000-memory.dmp

memory/1440-36-0x0000000000400000-0x0000000000466000-memory.dmp

memory/3568-27-0x0000000002070000-0x0000000002075000-memory.dmp

memory/3568-44-0x0000000003210000-0x0000000003660000-memory.dmp

memory/3568-54-0x0000000003210000-0x0000000003660000-memory.dmp

memory/1440-61-0x00000000005C0000-0x00000000005C1000-memory.dmp

memory/3528-89-0x000000000C2E0000-0x000000000C32B000-memory.dmp

memory/3568-111-0x0000000000400000-0x0000000000466000-memory.dmp

memory/3568-117-0x0000000002070000-0x0000000002071000-memory.dmp

memory/3568-119-0x0000000002130000-0x0000000002175000-memory.dmp

memory/3568-121-0x0000000002070000-0x0000000002075000-memory.dmp

memory/3568-125-0x0000000003210000-0x0000000003660000-memory.dmp

memory/3568-126-0x0000000003210000-0x0000000003660000-memory.dmp

memory/3568-132-0x0000000003210000-0x0000000003660000-memory.dmp

memory/3568-133-0x0000000003210000-0x0000000003660000-memory.dmp

memory/3568-139-0x0000000003210000-0x0000000003660000-memory.dmp

memory/3568-140-0x0000000003210000-0x0000000003660000-memory.dmp