Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
15/04/2024, 12:17
Static task
static1
Behavioral task
behavioral1
Sample
f108f094a548e30b37404ae2659f150d_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f108f094a548e30b37404ae2659f150d_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f108f094a548e30b37404ae2659f150d_JaffaCakes118.exe
-
Size
132KB
-
MD5
f108f094a548e30b37404ae2659f150d
-
SHA1
e9c0084df3e7c67eb36be507b32aaefc153bad54
-
SHA256
6bea815b69430ea27a8f5acd15d7d11fadc7a203654a6a448b8819dfdb810649
-
SHA512
8c15609f561eec2b6ead070ada9e484453ce68f8609c87fb5beabd34ffe48e5e939e634940e7790279d1aa36ea5148589e31fedeca81668f9dbbe8fd7d67dca8
-
SSDEEP
768:j/raHM782f9rvs2Zg5nicskQzTGfxgzh3emu4v/eB4z7VP7LdGSu2HyTAzfMgTA1:j/roM7ZJfUQWgY54v
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" f108f094a548e30b37404ae2659f150d_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" msng.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\Control Panel\International\Geo\Nation f108f094a548e30b37404ae2659f150d_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 4596 msng.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\msng = "C:\\Windows\\system32\\msng.exe" f108f094a548e30b37404ae2659f150d_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\msng = "C:\\Windows\\system32\\msng.exe" msng.exe -
Enumerates connected drives 3 TTPs 3 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\a: msng.exe File opened (read-only) \??\b: msng.exe File opened (read-only) \??\e: msng.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32.exe f108f094a548e30b37404ae2659f150d_JaffaCakes118.exe File created C:\Windows\SysWOW64\rundII32.exe msng.exe File opened for modification C:\Windows\SysWOW64\rundII32.exe msng.exe File created C:\Windows\SysWOW64\rundll32.exe msng.exe File created C:\Windows\SysWOW64\msng.exe f108f094a548e30b37404ae2659f150d_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\msng.exe f108f094a548e30b37404ae2659f150d_JaffaCakes118.exe File created C:\Windows\SysWOW64\rundII32.exe f108f094a548e30b37404ae2659f150d_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe -
Modifies registry class 36 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0 = 4e003100000000008f583762100054656d7000003a0009000400efbe8c58335c8f5837622e00000099e10100000001000000000000000000000000000000e9282301540065006d007000000014000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0 = a6003100000000008f58376210004631303846307e3100008e0009000400efbe8f5837628f5837622e000000d4330200000009000000000000000000000000000000e9282301660031003000380066003000390034006100350034003800650033003000620033003700340030003400610065003200360035003900660031003500300064005f004a006100660066006100430061006b0065007300310031003800000018000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0 = 50003100000000008c580f5f10004c6f63616c003c0009000400efbe8c58335c8f5837622e00000098e10100000001000000000000000000000000000000b7df4e004c006f00630061006c00000014000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 19002f433a5c000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Key created \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" explorer.exe Key created \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 = 50003100000000008c587d66100041646d696e003c0009000400efbe8c58335c8f5837622e0000007ae10100000001000000000000000000000000000000f3d36500410064006d0069006e00000014000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0\NodeSlot = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags explorer.exe Key created \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 78003100000000008c58335c1100557365727300640009000400efbe874f77488f5837622e000000c70500000000010000000000000000003a00000000009e173b0055007300650072007300000040007300680065006c006c00330032002e0064006c006c002c002d0032003100380031003300000014000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 = 56003100000000008c58335c12004170704461746100400009000400efbe8c58335c8f5837622e00000085e101000000010000000000000000000000000000009ba225004100700070004400610074006100000016000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4596 msng.exe 4596 msng.exe 4596 msng.exe 4596 msng.exe 4788 msedge.exe 4788 msedge.exe 4596 msng.exe 4596 msng.exe 4600 msedge.exe 4600 msedge.exe 4596 msng.exe 4596 msng.exe 4596 msng.exe 4596 msng.exe 4596 msng.exe 4596 msng.exe 4596 msng.exe 4596 msng.exe 4596 msng.exe 4596 msng.exe 4596 msng.exe 4596 msng.exe 4596 msng.exe 4596 msng.exe 4596 msng.exe 4596 msng.exe 4596 msng.exe 4596 msng.exe 4596 msng.exe 4596 msng.exe 4596 msng.exe 4596 msng.exe 4596 msng.exe 4596 msng.exe 4596 msng.exe 4596 msng.exe 4596 msng.exe 4596 msng.exe 4596 msng.exe 4596 msng.exe 4596 msng.exe 4596 msng.exe 4596 msng.exe 4596 msng.exe 4596 msng.exe 4596 msng.exe 4596 msng.exe 4596 msng.exe 4400 identity_helper.exe 4400 identity_helper.exe 4596 msng.exe 4596 msng.exe 4596 msng.exe 4596 msng.exe 4596 msng.exe 4596 msng.exe 4596 msng.exe 4596 msng.exe 4596 msng.exe 4596 msng.exe 4596 msng.exe 4596 msng.exe 4596 msng.exe 4596 msng.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4596 msng.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1952 f108f094a548e30b37404ae2659f150d_JaffaCakes118.exe 4596 msng.exe 4932 explorer.exe 4932 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1952 wrote to memory of 2064 1952 f108f094a548e30b37404ae2659f150d_JaffaCakes118.exe 87 PID 1952 wrote to memory of 2064 1952 f108f094a548e30b37404ae2659f150d_JaffaCakes118.exe 87 PID 1952 wrote to memory of 2064 1952 f108f094a548e30b37404ae2659f150d_JaffaCakes118.exe 87 PID 1952 wrote to memory of 4596 1952 f108f094a548e30b37404ae2659f150d_JaffaCakes118.exe 88 PID 1952 wrote to memory of 4596 1952 f108f094a548e30b37404ae2659f150d_JaffaCakes118.exe 88 PID 1952 wrote to memory of 4596 1952 f108f094a548e30b37404ae2659f150d_JaffaCakes118.exe 88 PID 4596 wrote to memory of 4996 4596 msng.exe 90 PID 4596 wrote to memory of 4996 4596 msng.exe 90 PID 4596 wrote to memory of 4996 4596 msng.exe 90 PID 2008 wrote to memory of 4600 2008 explorer.exe 92 PID 2008 wrote to memory of 4600 2008 explorer.exe 92 PID 4600 wrote to memory of 1732 4600 msedge.exe 94 PID 4600 wrote to memory of 1732 4600 msedge.exe 94 PID 4600 wrote to memory of 692 4600 msedge.exe 95 PID 4600 wrote to memory of 692 4600 msedge.exe 95 PID 4600 wrote to memory of 692 4600 msedge.exe 95 PID 4600 wrote to memory of 692 4600 msedge.exe 95 PID 4600 wrote to memory of 692 4600 msedge.exe 95 PID 4600 wrote to memory of 692 4600 msedge.exe 95 PID 4600 wrote to memory of 692 4600 msedge.exe 95 PID 4600 wrote to memory of 692 4600 msedge.exe 95 PID 4600 wrote to memory of 692 4600 msedge.exe 95 PID 4600 wrote to memory of 692 4600 msedge.exe 95 PID 4600 wrote to memory of 692 4600 msedge.exe 95 PID 4600 wrote to memory of 692 4600 msedge.exe 95 PID 4600 wrote to memory of 692 4600 msedge.exe 95 PID 4600 wrote to memory of 692 4600 msedge.exe 95 PID 4600 wrote to memory of 692 4600 msedge.exe 95 PID 4600 wrote to memory of 692 4600 msedge.exe 95 PID 4600 wrote to memory of 692 4600 msedge.exe 95 PID 4600 wrote to memory of 692 4600 msedge.exe 95 PID 4600 wrote to memory of 692 4600 msedge.exe 95 PID 4600 wrote to memory of 692 4600 msedge.exe 95 PID 4600 wrote to memory of 692 4600 msedge.exe 95 PID 4600 wrote to memory of 692 4600 msedge.exe 95 PID 4600 wrote to memory of 692 4600 msedge.exe 95 PID 4600 wrote to memory of 692 4600 msedge.exe 95 PID 4600 wrote to memory of 692 4600 msedge.exe 95 PID 4600 wrote to memory of 692 4600 msedge.exe 95 PID 4600 wrote to memory of 692 4600 msedge.exe 95 PID 4600 wrote to memory of 692 4600 msedge.exe 95 PID 4600 wrote to memory of 692 4600 msedge.exe 95 PID 4600 wrote to memory of 692 4600 msedge.exe 95 PID 4600 wrote to memory of 692 4600 msedge.exe 95 PID 4600 wrote to memory of 692 4600 msedge.exe 95 PID 4600 wrote to memory of 692 4600 msedge.exe 95 PID 4600 wrote to memory of 692 4600 msedge.exe 95 PID 4600 wrote to memory of 692 4600 msedge.exe 95 PID 4600 wrote to memory of 692 4600 msedge.exe 95 PID 4600 wrote to memory of 692 4600 msedge.exe 95 PID 4600 wrote to memory of 692 4600 msedge.exe 95 PID 4600 wrote to memory of 692 4600 msedge.exe 95 PID 4600 wrote to memory of 692 4600 msedge.exe 95 PID 4600 wrote to memory of 4788 4600 msedge.exe 96 PID 4600 wrote to memory of 4788 4600 msedge.exe 96 PID 4600 wrote to memory of 4524 4600 msedge.exe 97 PID 4600 wrote to memory of 4524 4600 msedge.exe 97 PID 4600 wrote to memory of 4524 4600 msedge.exe 97 PID 4600 wrote to memory of 4524 4600 msedge.exe 97 PID 4600 wrote to memory of 4524 4600 msedge.exe 97 PID 4600 wrote to memory of 4524 4600 msedge.exe 97 PID 4600 wrote to memory of 4524 4600 msedge.exe 97 PID 4600 wrote to memory of 4524 4600 msedge.exe 97 PID 4600 wrote to memory of 4524 4600 msedge.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\f108f094a548e30b37404ae2659f150d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f108f094a548e30b37404ae2659f150d_JaffaCakes118.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\System32\explorer.exe" C:\Users\Admin\AppData\Local\Temp\f108f094a548e30b37404ae2659f150d_JaffaCakes1182⤵PID:2064
-
-
C:\Windows\SysWOW64\msng.exe"C:\Windows\system32\msng.exe" fuckystart2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe http://www.OpenClose.ir3⤵PID:4996
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4932
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.openclose.ir/2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffedd0f46f8,0x7ffedd0f4708,0x7ffedd0f47183⤵PID:1732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,13372019147844615844,4823842101754817739,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:23⤵PID:692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,13372019147844615844,4823842101754817739,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2348 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,13372019147844615844,4823842101754817739,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2804 /prefetch:83⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,13372019147844615844,4823842101754817739,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:13⤵PID:2452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,13372019147844615844,4823842101754817739,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3176 /prefetch:13⤵PID:3776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,13372019147844615844,4823842101754817739,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4740 /prefetch:13⤵PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,13372019147844615844,4823842101754817739,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3460 /prefetch:13⤵PID:4740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,13372019147844615844,4823842101754817739,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4728 /prefetch:13⤵PID:4608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,13372019147844615844,4823842101754817739,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4704 /prefetch:13⤵PID:3992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,13372019147844615844,4823842101754817739,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5356 /prefetch:83⤵PID:772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,13372019147844615844,4823842101754817739,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5356 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,13372019147844615844,4823842101754817739,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5072 /prefetch:13⤵PID:1512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,13372019147844615844,4823842101754817739,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4688 /prefetch:13⤵PID:2032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,13372019147844615844,4823842101754817739,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2068 /prefetch:13⤵PID:3684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,13372019147844615844,4823842101754817739,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5964 /prefetch:13⤵PID:3752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,13372019147844615844,4823842101754817739,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5948 /prefetch:23⤵PID:4100
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4300
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3408
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c4e86f72f6f2bdd2f68d77a7f5477091
SHA1e489acc011f1c8edca2308577653e19e0daf2974
SHA2562abddff8823bde0650a10297709c4ea22258a3e5c79620805f6da52664eb762c
SHA512ca6093a136006f6808ce12a1b3e92dd8f53d6500ed253ecfafa8aa5a97e375641df25b0f3360acf6e063e9ee8bdb814c469973fae663a217cc0932c9122a746b
-
Filesize
152B
MD5d7068dbc5d66be9ce2817196103217ab
SHA1ecc24ad138e575547b358803789f6ee31a66260a
SHA256b89d90e5fc2e8b7e9057196ca5caa49e1974ca4c58b95d779f95393bea6373c5
SHA5125f429904ac12a13d3889874b1f2cc9c05ec5f15a40f844e74a91e8294e6af344c5f1b1fa72487a5e4759a703f8e5be0f8906f7310f9d3553875a08024c627960
-
Filesize
5KB
MD55609676cb43b4b0eb96226cc56d2cad6
SHA18e5271f9dadb8cb4d801ac1664c830d44c93a5af
SHA2566011a96095a88805033dc23bf5cd2ed74bbac499e5d1faf76567766f31a59347
SHA512e0f0d6f2461ecaa75c30812fd06d74a1d7666ac6c63bc4f74af629570d4c68250eab47446e3d7e8cbe5a30d2a95472db93ddad6158727f4f63f1fadab5c2550c
-
Filesize
5KB
MD5ea8a736eddf8f520eb8716e70603db76
SHA1789fd75a0f699aff20a2d4bd1d19a2fb41bf4b67
SHA256b547fad179922c82410beed38eac83adb023d706efdbbfcf2840024315800236
SHA512d614c6b72ece6c0c26a1098e86de1d1928315b7f3179a1c0c7b1c2626c7bc291dc95db4cde7626c32db9ee46347eacbbb8607071eacd822c78aec02799707bad
-
Filesize
24KB
MD59e699fa6cf4922d4d223dc5d994fe9ef
SHA14c201219f45689ec69e236a99e2b8783222c6d25
SHA256ccdffba38d1a7abbf06e286f7a360718f52a4b6c8f4f7d87394a86d44f862ed0
SHA51294a8e29d6f5f5d780b567fb23f0973bef99ecc173249a79b90965fe3ddb2abce4dc48d3ca3ee3270e4f58416eaefb4ae1fb99ea59a266853fbd2e1efe8cc83d2
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5f56b89524dbf45b4a2c93bafd20c461d
SHA186f154ab7ccad391bed58712659715ad6721964f
SHA256364d84c1b676d1ca44113738ffca9be7b9aad5232ed813389d8012c110309ede
SHA51277e14e6aaddf27c958a658886bcf524d4bdcaf304125a1af4b16b88e7025393feba415f8b9206bfebfcc5bf2c1bca428bf1a2ef5b2346c84a08567880df256ff
-
Filesize
132KB
MD5f108f094a548e30b37404ae2659f150d
SHA1e9c0084df3e7c67eb36be507b32aaefc153bad54
SHA2566bea815b69430ea27a8f5acd15d7d11fadc7a203654a6a448b8819dfdb810649
SHA5128c15609f561eec2b6ead070ada9e484453ce68f8609c87fb5beabd34ffe48e5e939e634940e7790279d1aa36ea5148589e31fedeca81668f9dbbe8fd7d67dca8
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641
-
Filesize
82B
MD56e6af377dd9909cc5032efa36c4be990
SHA15c281890e8b826ea70b86c2ca8848712b59b57f3
SHA2565ab2e0bd58b23954ee570426e49d37eabc11c9243ac630e85da2e55637e38856
SHA512110b6b2d53a052b0a818958120e15a7b02ac662a81d954ed7e9ea714bb1cbf2579799689b6f4d373bad56963a5e505418fffd11438525ee90c3646f8c8ebe533