Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
26-04-2024 09:44
Static task
static1
Behavioral task
behavioral1
Sample
007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe
-
Size
5.5MB
-
MD5
007f485b70277dc3d8a978edfd561241
-
SHA1
462d813115a1435ab9235ad4f02d1df2660ab847
-
SHA256
330721800674398e1a450deb059418e7dd7758eec2aeccfa1fe054eeb0850e4a
-
SHA512
3b8139a4375561d8979e2aa25b4fc21eedea74f909e0909c38647d4ca84d15e8ee435377f1714f910914107306da9c9adc0e6316d287ed3808796ab3dec59e28
-
SSDEEP
98304:OoskEEoskE0oskEeoskEkoskEWoskE4oskE0oskEYoskEC:X
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 12 IoCs
Processes:
Gaara.exesystem32.exeKazekage.exesmss.exe007f485b70277dc3d8a978edfd561241_JaffaCakes118.execsrss.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe, drivers\\csrss.exe" Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,drivers\\system32.exe" Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe, drivers\\csrss.exe" system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,drivers\\system32.exe" system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,drivers\\system32.exe" Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe, drivers\\csrss.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe, drivers\\csrss.exe" Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe, drivers\\csrss.exe" 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,drivers\\system32.exe" 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,drivers\\system32.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe, drivers\\csrss.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,drivers\\system32.exe" csrss.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 6 IoCs
Processes:
csrss.exeKazekage.exe007f485b70277dc3d8a978edfd561241_JaffaCakes118.exesmss.exeGaara.exesystem32.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" csrss.exe Set value (int) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Kazekage.exe Set value (int) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" smss.exe Set value (int) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Gaara.exe Set value (int) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" system32.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 6 IoCs
Processes:
smss.exeGaara.exesystem32.execsrss.exeKazekage.exe007f485b70277dc3d8a978edfd561241_JaffaCakes118.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" smss.exe Set value (int) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" Gaara.exe Set value (int) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" system32.exe Set value (int) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" csrss.exe Set value (int) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" Kazekage.exe Set value (int) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe -
Processes:
Kazekage.exe007f485b70277dc3d8a978edfd561241_JaffaCakes118.exesmss.exeGaara.exesystem32.execsrss.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Kazekage.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Gaara.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" system32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" csrss.exe -
Disables RegEdit via registry modification 6 IoCs
Processes:
Gaara.exesystem32.execsrss.exeKazekage.exe007f485b70277dc3d8a978edfd561241_JaffaCakes118.exesmss.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Gaara.exe Set value (int) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" system32.exe Set value (int) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" csrss.exe Set value (int) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Kazekage.exe Set value (int) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" smss.exe -
Disables use of System Restore points 1 TTPs
-
Drops file in Drivers directory 24 IoCs
Processes:
smss.execsrss.exeKazekage.exeGaara.exesystem32.exe007f485b70277dc3d8a978edfd561241_JaffaCakes118.exedescription ioc process File opened for modification C:\Windows\SysWOW64\drivers\Kazekage.exe smss.exe File opened for modification C:\Windows\SysWOW64\drivers\system32.exe csrss.exe File created C:\Windows\SysWOW64\drivers\Kazekage.exe Kazekage.exe File opened for modification C:\Windows\SysWOW64\drivers\system32.exe Kazekage.exe File created C:\Windows\SysWOW64\drivers\system32.exe Kazekage.exe File created C:\Windows\SysWOW64\drivers\system32.exe csrss.exe File opened for modification C:\Windows\SysWOW64\drivers\Kazekage.exe Gaara.exe File opened for modification C:\Windows\SysWOW64\drivers\Kazekage.exe Kazekage.exe File created C:\Windows\SysWOW64\drivers\Kazekage.exe system32.exe File created C:\Windows\SysWOW64\drivers\system32.exe smss.exe File created C:\Windows\SysWOW64\drivers\system32.exe Gaara.exe File created C:\Windows\SysWOW64\drivers\Kazekage.exe 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\system32.exe 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\system32.exe smss.exe File opened for modification C:\Windows\SysWOW64\drivers\Kazekage.exe system32.exe File opened for modification C:\Windows\SysWOW64\drivers\system32.exe system32.exe File created C:\Windows\SysWOW64\drivers\Kazekage.exe smss.exe File created C:\Windows\SysWOW64\drivers\Kazekage.exe csrss.exe File opened for modification C:\Windows\SysWOW64\drivers\Kazekage.exe 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe File created C:\Windows\SysWOW64\drivers\system32.exe 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\system32.exe Gaara.exe File opened for modification C:\Windows\SysWOW64\drivers\Kazekage.exe csrss.exe File created C:\Windows\SysWOW64\drivers\system32.exe system32.exe File created C:\Windows\SysWOW64\drivers\Kazekage.exe Gaara.exe -
Sets file execution options in registry 2 TTPs 64 IoCs
Processes:
csrss.exe007f485b70277dc3d8a978edfd561241_JaffaCakes118.exeGaara.exeKazekage.exesmss.exesystem32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KakashiHatake.exe\Debugger = "cmd.exe /c del" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Obito.exe 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedt32.exe\Debugger = "drivers\\Kazekage.exe" 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Obito.exe\Debugger = "cmd.exe /c del" Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kspoold.exe\Debugger = "cmd.exe /c del" Kazekage.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Funny UST Scandal.exe\Debugger = "cmd.exe /c del" 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Funny UST Scandal.exe Gaara.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Obito.exe\Debugger = "cmd.exe /c del" Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rin.exe\Debugger = "cmd.exe /c del" 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe\Debugger = "drivers\\Kazekage.exe" smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kspool.exe Gaara.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Obito.exe Gaara.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kspoold.exe\Debugger = "cmd.exe /c del" system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\Debugger = "drivers\\Kazekage.exe" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rin.exe system32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Thumbs.com Kazekage.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Obito.exe csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HokageFile.exe\Debugger = "cmd.exe /c del" Kazekage.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procexp.exe 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HokageFile.exe\Debugger = "cmd.exe /c del" Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KakashiHatake.exe\Debugger = "cmd.exe /c del" system32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KakashiHatake.exe csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HOKAGE4.exe\Debugger = "cmd.exe /c del" smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Funny UST Scandal.exe system32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KakashiHatake.exe 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Funny UST Scandal.avi.exe\Debugger = "cmd.exe /c del" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kspool.exe\Debugger = "cmd.exe /c del" 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KakashiHatake.exe smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rin.exe Gaara.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HOKAGE4.exe\Debugger = "cmd.exe /c del" system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "drivers\\Kazekage.exe" 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HOKAGE4.exe Gaara.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Thumbs.com\Debugger = "cmd.exe /c del" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Thumbs.com 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kspoold.exe smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Thumbs.com system32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HokageFile.exe Kazekage.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kspool.exe 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Thumbs.com\Debugger = "cmd.exe /c del" 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedt32.exe\Debugger = "drivers\\Kazekage.exe" Gaara.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe system32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kspoold.exe 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe\Debugger = "drivers\\Kazekage.exe" Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Funny UST Scandal.avi.exe\Debugger = "cmd.exe /c del" Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Thumbs.com\Debugger = "cmd.exe /c del" Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedt32.exe\Debugger = "drivers\\Kazekage.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe\Debugger = "drivers\\Kazekage.exe" Gaara.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Funny UST Scandal.avi.exe system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kspoold.exe\Debugger = "cmd.exe /c del" smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Obito.exe system32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procexp.exe Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HOKAGE4.exe\Debugger = "cmd.exe /c del" Gaara.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HokageFile.exe\Debugger = "cmd.exe /c del" system32.exe -
Executes dropped EXE 30 IoCs
Processes:
smss.exesmss.exeGaara.exesmss.exeGaara.execsrss.exesmss.exeGaara.execsrss.exeKazekage.exesmss.exeGaara.execsrss.exeKazekage.exesystem32.exesmss.exeGaara.execsrss.exeKazekage.exesystem32.exesystem32.exeKazekage.exesystem32.execsrss.exeKazekage.exesystem32.exeGaara.execsrss.exeKazekage.exesystem32.exepid process 1676 smss.exe 4732 smss.exe 2008 Gaara.exe 3856 smss.exe 4812 Gaara.exe 4316 csrss.exe 5096 smss.exe 3844 Gaara.exe 5052 csrss.exe 3232 Kazekage.exe 1696 smss.exe 856 Gaara.exe 2524 csrss.exe 1928 Kazekage.exe 4032 system32.exe 1388 smss.exe 2840 Gaara.exe 5040 csrss.exe 4772 Kazekage.exe 4676 system32.exe 4144 system32.exe 3536 Kazekage.exe 448 system32.exe 4656 csrss.exe 4528 Kazekage.exe 2928 system32.exe 3952 Gaara.exe 3388 csrss.exe 3856 Kazekage.exe 2656 system32.exe -
Loads dropped DLL 18 IoCs
Processes:
smss.exesmss.exeGaara.exesmss.exeGaara.execsrss.exesmss.exeGaara.execsrss.exesmss.exeGaara.execsrss.exesmss.exeGaara.execsrss.execsrss.exeGaara.execsrss.exepid process 1676 smss.exe 4732 smss.exe 2008 Gaara.exe 3856 smss.exe 4812 Gaara.exe 4316 csrss.exe 5096 smss.exe 3844 Gaara.exe 5052 csrss.exe 1696 smss.exe 856 Gaara.exe 2524 csrss.exe 1388 smss.exe 2840 Gaara.exe 5040 csrss.exe 4656 csrss.exe 3952 Gaara.exe 3388 csrss.exe -
Adds Run key to start application 2 TTPs 24 IoCs
Processes:
Kazekage.exesmss.exeGaara.exesystem32.execsrss.exe007f485b70277dc3d8a978edfd561241_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\FreeAV = "Fonts\\Admin 26 - 4 - 2024\\Gaara.exe" Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DesertSand = "Fonts\\Admin 26 - 4 - 2024\\smss.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemRun = "drivers\\csrss.exe" Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DesertSand = "Fonts\\Admin 26 - 4 - 2024\\smss.exe" system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\644r4 = "26-4-2024.exe" system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemRun = "drivers\\csrss.exe" system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemRun = "drivers\\csrss.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DesertSand = "Fonts\\Admin 26 - 4 - 2024\\smss.exe" Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\FreeAV = "Fonts\\Admin 26 - 4 - 2024\\Gaara.exe" 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DesertSand = "Fonts\\Admin 26 - 4 - 2024\\smss.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\644r4 = "26-4-2024.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemRun = "drivers\\csrss.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\FreeAV = "Fonts\\Admin 26 - 4 - 2024\\Gaara.exe" Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\FreeAV = "Fonts\\Admin 26 - 4 - 2024\\Gaara.exe" system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\FreeAV = "Fonts\\Admin 26 - 4 - 2024\\Gaara.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\FreeAV = "Fonts\\Admin 26 - 4 - 2024\\Gaara.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DesertSand = "Fonts\\Admin 26 - 4 - 2024\\smss.exe" 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\644r4 = "26-4-2024.exe" 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemRun = "drivers\\csrss.exe" 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\644r4 = "26-4-2024.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DesertSand = "Fonts\\Admin 26 - 4 - 2024\\smss.exe" Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\644r4 = "26-4-2024.exe" Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\644r4 = "26-4-2024.exe" Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemRun = "drivers\\csrss.exe" Kazekage.exe -
Processes:
csrss.exeKazekage.exe007f485b70277dc3d8a978edfd561241_JaffaCakes118.exesmss.exeGaara.exesystem32.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" csrss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Kazekage.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Gaara.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" system32.exe -
Drops desktop.ini file(s) 64 IoCs
Processes:
Gaara.execsrss.exe007f485b70277dc3d8a978edfd561241_JaffaCakes118.exeKazekage.exesmss.exesystem32.exedescription ioc process File opened for modification \??\M:\Desktop.ini Gaara.exe File opened for modification \??\Y:\Desktop.ini Gaara.exe File opened for modification \??\J:\Desktop.ini csrss.exe File opened for modification \??\H:\Desktop.ini 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe File opened for modification \??\Z:\Desktop.ini 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe File opened for modification \??\U:\Desktop.ini Gaara.exe File opened for modification \??\S:\Desktop.ini Kazekage.exe File opened for modification D:\Desktop.ini smss.exe File opened for modification \??\K:\Desktop.ini Gaara.exe File opened for modification \??\J:\Desktop.ini Gaara.exe File opened for modification \??\Q:\Desktop.ini Gaara.exe File opened for modification \??\W:\Desktop.ini Gaara.exe File opened for modification \??\S:\Desktop.ini system32.exe File opened for modification \??\V:\Desktop.ini system32.exe File opened for modification \??\W:\Desktop.ini Kazekage.exe File opened for modification \??\W:\Desktop.ini 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe File opened for modification \??\R:\Desktop.ini smss.exe File opened for modification \??\M:\Desktop.ini csrss.exe File opened for modification F:\Desktop.ini Kazekage.exe File opened for modification \??\I:\Desktop.ini Kazekage.exe File opened for modification \??\P:\Desktop.ini Kazekage.exe File opened for modification C:\Desktop.ini 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe File opened for modification \??\H:\Desktop.ini csrss.exe File opened for modification \??\I:\Desktop.ini csrss.exe File opened for modification \??\K:\Desktop.ini csrss.exe File opened for modification \??\E:\Desktop.ini 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe File opened for modification \??\M:\Desktop.ini system32.exe File opened for modification \??\P:\Desktop.ini csrss.exe File opened for modification \??\J:\Desktop.ini system32.exe File opened for modification \??\K:\Desktop.ini system32.exe File opened for modification \??\M:\Desktop.ini 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe File opened for modification \??\Z:\Desktop.ini Gaara.exe File opened for modification \??\V:\Desktop.ini Gaara.exe File opened for modification \??\Z:\Desktop.ini Kazekage.exe File opened for modification \??\O:\Desktop.ini 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe File opened for modification \??\L:\Desktop.ini Gaara.exe File opened for modification \??\I:\Desktop.ini smss.exe File opened for modification \??\L:\Desktop.ini smss.exe File opened for modification \??\I:\Desktop.ini Gaara.exe File opened for modification \??\G:\Desktop.ini system32.exe File opened for modification \??\R:\Desktop.ini system32.exe File opened for modification \??\W:\Desktop.ini csrss.exe File opened for modification \??\H:\Desktop.ini Kazekage.exe File opened for modification \??\J:\Desktop.ini 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe File opened for modification \??\B:\Desktop.ini csrss.exe File opened for modification \??\S:\Desktop.ini csrss.exe File opened for modification \??\I:\Desktop.ini system32.exe File opened for modification \??\X:\Desktop.ini smss.exe File opened for modification \??\L:\Desktop.ini system32.exe File opened for modification \??\Q:\Desktop.ini system32.exe File opened for modification \??\A:\Desktop.ini Kazekage.exe File opened for modification \??\Q:\Desktop.ini 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe File opened for modification \??\X:\Desktop.ini 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe File opened for modification \??\J:\Desktop.ini Kazekage.exe File opened for modification \??\R:\Desktop.ini Kazekage.exe File opened for modification \??\T:\Desktop.ini Kazekage.exe File opened for modification \??\U:\Desktop.ini Kazekage.exe File opened for modification \??\L:\Desktop.ini 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe File opened for modification \??\V:\Desktop.ini csrss.exe File opened for modification \??\Y:\Desktop.ini csrss.exe File opened for modification D:\Desktop.ini Kazekage.exe File opened for modification \??\X:\Desktop.ini system32.exe File opened for modification \??\V:\Desktop.ini 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe File opened for modification \??\V:\Desktop.ini smss.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
csrss.exesmss.exeGaara.exeKazekage.exesystem32.exe007f485b70277dc3d8a978edfd561241_JaffaCakes118.exedescription ioc process File opened (read-only) \??\W: csrss.exe File opened (read-only) \??\N: smss.exe File opened (read-only) \??\H: Gaara.exe File opened (read-only) \??\O: Kazekage.exe File opened (read-only) \??\A: Gaara.exe File opened (read-only) \??\J: Gaara.exe File opened (read-only) \??\A: Kazekage.exe File opened (read-only) \??\L: smss.exe File opened (read-only) \??\S: system32.exe File opened (read-only) \??\H: smss.exe File opened (read-only) \??\R: system32.exe File opened (read-only) \??\H: csrss.exe File opened (read-only) \??\U: csrss.exe File opened (read-only) \??\V: csrss.exe File opened (read-only) \??\E: 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe File opened (read-only) \??\B: smss.exe File opened (read-only) \??\W: system32.exe File opened (read-only) \??\X: system32.exe File opened (read-only) \??\J: csrss.exe File opened (read-only) \??\J: Kazekage.exe File opened (read-only) \??\B: 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe File opened (read-only) \??\I: 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe File opened (read-only) \??\W: Gaara.exe File opened (read-only) \??\W: Kazekage.exe File opened (read-only) \??\M: 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe File opened (read-only) \??\X: 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe File opened (read-only) \??\Y: smss.exe File opened (read-only) \??\R: Gaara.exe File opened (read-only) \??\I: csrss.exe File opened (read-only) \??\W: 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe File opened (read-only) \??\S: smss.exe File opened (read-only) \??\O: system32.exe File opened (read-only) \??\P: csrss.exe File opened (read-only) \??\M: Kazekage.exe File opened (read-only) \??\T: 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe File opened (read-only) \??\W: smss.exe File opened (read-only) \??\A: csrss.exe File opened (read-only) \??\X: Kazekage.exe File opened (read-only) \??\I: Gaara.exe File opened (read-only) \??\X: Gaara.exe File opened (read-only) \??\T: Gaara.exe File opened (read-only) \??\B: system32.exe File opened (read-only) \??\U: system32.exe File opened (read-only) \??\E: csrss.exe File opened (read-only) \??\R: csrss.exe File opened (read-only) \??\N: 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe File opened (read-only) \??\P: 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe File opened (read-only) \??\E: smss.exe File opened (read-only) \??\S: Kazekage.exe File opened (read-only) \??\J: system32.exe File opened (read-only) \??\T: system32.exe File opened (read-only) \??\M: csrss.exe File opened (read-only) \??\Z: csrss.exe File opened (read-only) \??\L: Kazekage.exe File opened (read-only) \??\Y: Kazekage.exe File opened (read-only) \??\Z: Gaara.exe File opened (read-only) \??\Q: Kazekage.exe File opened (read-only) \??\V: Kazekage.exe File opened (read-only) \??\I: smss.exe File opened (read-only) \??\J: smss.exe File opened (read-only) \??\Y: Gaara.exe File opened (read-only) \??\G: csrss.exe File opened (read-only) \??\G: Kazekage.exe File opened (read-only) \??\Z: Kazekage.exe -
Drops autorun.inf file 1 TTPs 64 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
smss.exesystem32.execsrss.exe007f485b70277dc3d8a978edfd561241_JaffaCakes118.exeKazekage.exeGaara.exedescription ioc process File created \??\B:\Autorun.inf smss.exe File created \??\X:\Autorun.inf smss.exe File opened for modification \??\W:\Autorun.inf system32.exe File opened for modification \??\A:\Autorun.inf csrss.exe File created \??\L:\Autorun.inf 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe File created D:\Autorun.inf smss.exe File opened for modification \??\Y:\Autorun.inf smss.exe File opened for modification \??\B:\Autorun.inf Kazekage.exe File created \??\W:\Autorun.inf system32.exe File opened for modification \??\B:\Autorun.inf smss.exe File opened for modification \??\E:\Autorun.inf Kazekage.exe File opened for modification F:\Autorun.inf Kazekage.exe File created \??\G:\Autorun.inf Kazekage.exe File opened for modification \??\I:\Autorun.inf system32.exe File created \??\S:\Autorun.inf system32.exe File opened for modification \??\P:\Autorun.inf Kazekage.exe File created \??\Z:\Autorun.inf Kazekage.exe File created \??\U:\Autorun.inf system32.exe File opened for modification \??\Z:\Autorun.inf system32.exe File opened for modification \??\H:\Autorun.inf csrss.exe File opened for modification \??\P:\Autorun.inf 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe File created \??\R:\Autorun.inf Kazekage.exe File opened for modification \??\X:\Autorun.inf csrss.exe File created \??\J:\Autorun.inf 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe File created \??\X:\Autorun.inf 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe File created D:\Autorun.inf Gaara.exe File opened for modification \??\W:\Autorun.inf Kazekage.exe File opened for modification \??\Y:\Autorun.inf 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe File created \??\K:\Autorun.inf Gaara.exe File created \??\X:\Autorun.inf Gaara.exe File created \??\V:\Autorun.inf Kazekage.exe File opened for modification \??\L:\Autorun.inf csrss.exe File opened for modification \??\A:\Autorun.inf Gaara.exe File opened for modification \??\H:\Autorun.inf Gaara.exe File opened for modification \??\W:\Autorun.inf csrss.exe File created C:\Autorun.inf 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe File opened for modification \??\I:\Autorun.inf 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe File created \??\Z:\Autorun.inf 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe File created \??\I:\Autorun.inf Kazekage.exe File opened for modification \??\O:\Autorun.inf system32.exe File opened for modification D:\Autorun.inf csrss.exe File opened for modification \??\J:\Autorun.inf smss.exe File created \??\V:\Autorun.inf smss.exe File created \??\T:\Autorun.inf Gaara.exe File created \??\T:\Autorun.inf Kazekage.exe File created \??\X:\Autorun.inf Kazekage.exe File opened for modification \??\N:\Autorun.inf system32.exe File opened for modification \??\M:\Autorun.inf 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe File created \??\W:\Autorun.inf smss.exe File opened for modification \??\Z:\Autorun.inf Gaara.exe File created \??\Z:\Autorun.inf csrss.exe File opened for modification \??\E:\Autorun.inf 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe File opened for modification \??\K:\Autorun.inf Kazekage.exe File opened for modification \??\P:\Autorun.inf system32.exe File created \??\E:\Autorun.inf 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe File opened for modification F:\Autorun.inf smss.exe File created \??\J:\Autorun.inf smss.exe File opened for modification \??\J:\Autorun.inf Gaara.exe File opened for modification \??\Q:\Autorun.inf Gaara.exe File opened for modification \??\I:\Autorun.inf Kazekage.exe File opened for modification \??\O:\Autorun.inf smss.exe File created \??\X:\Autorun.inf csrss.exe File opened for modification \??\O:\Autorun.inf Gaara.exe File created \??\U:\Autorun.inf Gaara.exe -
Drops file in System32 directory 39 IoCs
Processes:
system32.exe007f485b70277dc3d8a978edfd561241_JaffaCakes118.exeGaara.exeKazekage.execsrss.exesmss.exedescription ioc process File created C:\Windows\SysWOW64\msvbvm60.dll system32.exe File opened for modification C:\Windows\SysWOW64\Desktop.ini 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\mscomctl.ocx 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Desktop.ini Gaara.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll Gaara.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll Kazekage.exe File opened for modification C:\Windows\SysWOW64\26-4-2024.exe Gaara.exe File opened for modification C:\Windows\SysWOW64\26-4-2024.exe system32.exe File opened for modification C:\Windows\SysWOW64\Desktop.ini csrss.exe File opened for modification C:\Windows\SysWOW64\ smss.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll smss.exe File opened for modification C:\Windows\SysWOW64\mscomctl.ocx csrss.exe File created C:\Windows\SysWOW64\msvbvm60.dll Gaara.exe File created C:\Windows\SysWOW64\mscomctl.ocx 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Desktop.ini smss.exe File opened for modification C:\Windows\SysWOW64\mscomctl.ocx smss.exe File opened for modification C:\Windows\SysWOW64\mscomctl.ocx Gaara.exe File opened for modification C:\Windows\SysWOW64\Desktop.ini Kazekage.exe File opened for modification C:\Windows\SysWOW64\mscomctl.ocx Kazekage.exe File created C:\Windows\SysWOW64\msvbvm60.dll csrss.exe File created C:\Windows\SysWOW64\Desktop.ini 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ Kazekage.exe File opened for modification C:\Windows\SysWOW64\ csrss.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll csrss.exe File opened for modification C:\Windows\SysWOW64\26-4-2024.exe csrss.exe File opened for modification C:\Windows\SysWOW64\ Gaara.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Desktop.ini system32.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll system32.exe File created C:\Windows\SysWOW64\msvbvm60.dll smss.exe File opened for modification C:\Windows\SysWOW64\26-4-2024.exe Kazekage.exe File opened for modification C:\Windows\SysWOW64\mscomctl.ocx system32.exe File opened for modification C:\Windows\SysWOW64\26-4-2024.exe 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe File created C:\Windows\SysWOW64\msvbvm60.dll 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe File created C:\Windows\SysWOW64\msvbvm60.dll Kazekage.exe File opened for modification C:\Windows\SysWOW64\ system32.exe File created C:\Windows\SysWOW64\26-4-2024.exe 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\26-4-2024.exe smss.exe -
Sets desktop wallpaper using registry 2 TTPs 6 IoCs
Processes:
007f485b70277dc3d8a978edfd561241_JaffaCakes118.exesmss.exeGaara.execsrss.exeKazekage.exesystem32.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\Desktop\Wallpaper = "C:\\Windows\\Fonts\\The Kazekage.jpg" 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\Desktop\Wallpaper = "C:\\Windows\\Fonts\\The Kazekage.jpg" smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\Desktop\Wallpaper = "C:\\Windows\\Fonts\\The Kazekage.jpg" Gaara.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\Desktop\Wallpaper = "C:\\Windows\\Fonts\\The Kazekage.jpg" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\Desktop\Wallpaper = "C:\\Windows\\Fonts\\The Kazekage.jpg" Kazekage.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\Desktop\Wallpaper = "C:\\Windows\\Fonts\\The Kazekage.jpg" system32.exe -
Drops file in Windows directory 64 IoCs
Processes:
Gaara.exesystem32.exe007f485b70277dc3d8a978edfd561241_JaffaCakes118.exesmss.execsrss.exeKazekage.exedescription ioc process File opened for modification C:\Windows\Fonts\Admin 26 - 4 - 2024\Gaara.exe Gaara.exe File opened for modification C:\Windows\system\mscoree.dll system32.exe File opened for modification C:\Windows\msvbvm60.dll system32.exe File opened for modification C:\Windows\ 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe File created C:\Windows\Fonts\Admin 26 - 4 - 2024\Gaara.exe smss.exe File created C:\Windows\Fonts\Admin 26 - 4 - 2024\csrss.exe smss.exe File opened for modification C:\Windows\ system32.exe File created C:\Windows\Fonts\Admin 26 - 4 - 2024\csrss.exe 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe File created C:\Windows\WBEM\msvbvm60.dll 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe File opened for modification C:\Windows\Fonts\The Kazekage.jpg csrss.exe File created C:\Windows\WBEM\msvbvm60.dll Kazekage.exe File opened for modification C:\Windows\mscomctl.ocx 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe File created C:\Windows\Fonts\Admin 26 - 4 - 2024\Gaara.exe system32.exe File opened for modification C:\Windows\ Kazekage.exe File created C:\Windows\Fonts\Admin 26 - 4 - 2024\smss.exe smss.exe File opened for modification C:\Windows\Fonts\Admin 26 - 4 - 2024\csrss.exe csrss.exe File opened for modification C:\Windows\system\msvbvm60.dll csrss.exe File created C:\Windows\Fonts\Admin 26 - 4 - 2024\csrss.exe Kazekage.exe File opened for modification C:\Windows\system\msvbvm60.dll Kazekage.exe File opened for modification C:\Windows\mscomctl.ocx csrss.exe File opened for modification C:\Windows\Fonts\Admin 26 - 4 - 2024\smss.exe smss.exe File created C:\Windows\Fonts\Admin 26 - 4 - 2024\msvbvm60.dll Gaara.exe File created C:\Windows\Fonts\Admin 26 - 4 - 2024\msvbvm60.dll Kazekage.exe File created C:\Windows\mscomctl.ocx 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe File opened for modification C:\Windows\mscomctl.ocx system32.exe File created C:\Windows\Fonts\Admin 26 - 4 - 2024\csrss.exe Gaara.exe File created C:\Windows\Fonts\Admin 26 - 4 - 2024\msvbvm60.dll 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe File opened for modification C:\Windows\Fonts\Admin 26 - 4 - 2024\csrss.exe smss.exe File created C:\Windows\Fonts\Admin 26 - 4 - 2024\smss.exe csrss.exe File created C:\Windows\Fonts\Admin 26 - 4 - 2024\Gaara.exe Kazekage.exe File opened for modification C:\Windows\Fonts\Admin 26 - 4 - 2024\Gaara.exe system32.exe File opened for modification C:\Windows\Fonts\Admin 26 - 4 - 2024\csrss.exe Gaara.exe File created C:\Windows\Fonts\Admin 26 - 4 - 2024\msvbvm60.dll csrss.exe File opened for modification C:\Windows\system\mscoree.dll Kazekage.exe File opened for modification C:\Windows\Fonts\Admin 26 - 4 - 2024\smss.exe csrss.exe File created C:\Windows\WBEM\msvbvm60.dll csrss.exe File opened for modification C:\Windows\Fonts\Admin 26 - 4 - 2024\smss.exe Kazekage.exe File created C:\Windows\Fonts\Admin 26 - 4 - 2024\smss.exe 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe File opened for modification C:\Windows\Fonts\Admin 26 - 4 - 2024\smss.exe 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe File created C:\Windows\msvbvm60.dll 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe File created C:\Windows\system\msvbvm60.dll 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe File created C:\Windows\WBEM\msvbvm60.dll Gaara.exe File opened for modification C:\Windows\Fonts\Admin 26 - 4 - 2024\csrss.exe Kazekage.exe File opened for modification C:\Windows\msvbvm60.dll Kazekage.exe File opened for modification C:\Windows\Fonts\Admin 26 - 4 - 2024\smss.exe system32.exe File opened for modification C:\Windows\mscomctl.ocx Gaara.exe File opened for modification C:\Windows\ csrss.exe File opened for modification C:\Windows\Fonts\The Kazekage.jpg smss.exe File opened for modification C:\Windows\Fonts\Admin 26 - 4 - 2024\Gaara.exe smss.exe File created C:\Windows\Fonts\Admin 26 - 4 - 2024\smss.exe Gaara.exe File created C:\Windows\Fonts\Admin 26 - 4 - 2024\Gaara.exe Gaara.exe File opened for modification C:\Windows\mscomctl.ocx Kazekage.exe File opened for modification C:\Windows\system\msvbvm60.dll smss.exe File opened for modification C:\Windows\Fonts\The Kazekage.jpg Kazekage.exe File opened for modification C:\Windows\system\msvbvm60.dll system32.exe File opened for modification C:\Windows\ Gaara.exe File created C:\Windows\Fonts\Admin 26 - 4 - 2024\smss.exe system32.exe File created C:\Windows\Fonts\Admin 26 - 4 - 2024\msvbvm60.dll system32.exe File created C:\Windows\WBEM\msvbvm60.dll system32.exe File created C:\Windows\Fonts\The Kazekage.jpg 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe File opened for modification C:\Windows\Fonts\Admin 26 - 4 - 2024\csrss.exe 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe File opened for modification C:\Windows\system\msvbvm60.dll Gaara.exe File opened for modification C:\Windows\system\mscoree.dll csrss.exe File opened for modification C:\Windows\msvbvm60.dll csrss.exe -
Modifies Control Panel 64 IoCs
Processes:
system32.exe007f485b70277dc3d8a978edfd561241_JaffaCakes118.exesmss.exeGaara.execsrss.exeKazekage.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\Desktop\ConvertedWallpaper = "C:\\Windows\\Fonts\\The Kazekage.jpg" system32.exe Key created \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\Screen Saver.Marquee 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\Screen Saver.Marquee\Size = "72" 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\Desktop\SCRNSAVE.EXE = "ssmarque.scr" smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\Desktop\SCRNSAVE.EXE = "ssmarque.scr" Gaara.exe Key created \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\Desktop system32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\Screen Saver.Marquee\BackgroundColor = "0 0 0" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\Screen Saver.Marquee\Text = "Gaara The Kazekage ( Warning : don't save any porn stuffs files in this computer )" Kazekage.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\Screen Saver.Marquee\Mode.EXE = "1" smss.exe Key created \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\Screen Saver.Marquee Gaara.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\Desktop\SCRNSAVE.EXE = "ssmarque.scr" system32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\Screen Saver.Marquee\Speed = "4" system32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\Desktop\WallpaperStyle = "2" system32.exe Key created \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\Desktop Gaara.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\Screen Saver.Marquee\Mode.EXE = "1" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\Screen Saver.Marquee\Size = "72" Kazekage.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\Screen Saver.Marquee\TextColor = "255 0 0" 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\Desktop\WallpaperStyle = "2" smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\Screen Saver.Marquee\Speed = "4" Kazekage.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\Desktop\SCRNSAVE.EXE = "ssmarque.scr" 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\Screen Saver.Marquee\Size = "72" Gaara.exe Key created \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\Desktop Kazekage.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\Screen Saver.Marquee\Size = "72" csrss.exe Key created \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\Screen Saver.Marquee smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\Desktop\ScreenSaveTimeOut = "400" Gaara.exe Key created \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\Screen Saver.Marquee system32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\Desktop\ConvertedWallpaper = "C:\\Windows\\Fonts\\The Kazekage.jpg" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\Desktop\SCRNSAVE.EXE = "ssmarque.scr" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\Screen Saver.Marquee\TextColor = "255 0 0" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\Desktop\ConvertedWallpaper = "Fonts\\The Kazekage.jpg" Kazekage.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\Screen Saver.Marquee\BackgroundColor = "0 0 0" 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\Screen Saver.Marquee\Mode.EXE = "1" 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\Screen Saver.Marquee\Text = "Gaara The Kazekage ( Warning : don't save any porn stuffs files in this computer )" Gaara.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\Desktop\WallpaperStyle = "2" Kazekage.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\Desktop\WallpaperStyle = "2" Gaara.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\Desktop\SCRNSAVE.EXE = "ssmarque.scr" Kazekage.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\Screen Saver.Marquee\Mode.EXE = "1" Kazekage.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\Desktop\ConvertedWallpaper = "Fonts\\The Kazekage.jpg" 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\Desktop\ScreenSaveTimeOut = "400" 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\Desktop\ConvertedWallpaper = "Fonts\\The Kazekage.jpg" smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\Screen Saver.Marquee\Font = "Blackadder ITC" smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\Desktop\WallpaperStyle = "2" 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\Desktop\ConvertedWallpaper = "Fonts\\The Kazekage.jpg" system32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\Screen Saver.Marquee\Mode.EXE = "1" system32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\Screen Saver.Marquee\Speed = "4" Gaara.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\Desktop\ConvertedWallpaper = "C:\\Windows\\Fonts\\The Kazekage.jpg" Gaara.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\Desktop\ScreenSaveTimeOut = "400" Kazekage.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\Screen Saver.Marquee\Mode.EXE = "1" Gaara.exe Key created \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\Desktop smss.exe Key created \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\Screen Saver.Marquee csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\Screen Saver.Marquee\Font = "Blackadder ITC" 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\Screen Saver.Marquee\Text = "Gaara The Kazekage ( Warning : don't save any porn stuffs files in this computer )" 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\Screen Saver.Marquee\Text = "Gaara The Kazekage ( Warning : don't save any porn stuffs files in this computer )" smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\Desktop\ConvertedWallpaper = "Fonts\\The Kazekage.jpg" Gaara.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\Desktop\WallpaperStyle = "2" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\Desktop\ScreenSaveTimeOut = "400" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\Screen Saver.Marquee\Speed = "4" csrss.exe Key created \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\Screen Saver.Marquee Kazekage.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\Desktop\ScreenSaveTimeOut = "400" system32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\Screen Saver.Marquee\Size = "72" system32.exe Key created \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\Desktop csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\Screen Saver.Marquee\Speed = "4" smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\Screen Saver.Marquee\BackgroundColor = "0 0 0" Gaara.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\Screen Saver.Marquee\Font = "Blackadder ITC" system32.exe -
Processes:
system32.execsrss.exeKazekage.exesmss.exeGaara.exe007f485b70277dc3d8a978edfd561241_JaffaCakes118.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Software\Microsoft\Internet Explorer\Main system32.exe Key created \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Software\Microsoft\Internet Explorer\Main csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window Title = "!!! Hello HokageFile (AnbuTeam-Sampit), Is this my places, Wanna start a War !!!" csrss.exe Key created \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Software\Microsoft\Internet Explorer\Main Kazekage.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window Title = "!!! Hello HokageFile (AnbuTeam-Sampit), Is this my places, Wanna start a War !!!" Kazekage.exe Key created \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Software\Microsoft\Internet Explorer\Main smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window Title = "!!! Hello HokageFile (AnbuTeam-Sampit), Is this my places, Wanna start a War !!!" smss.exe Key created \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Software\Microsoft\Internet Explorer\Main Gaara.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window Title = "!!! Hello HokageFile (AnbuTeam-Sampit), Is this my places, Wanna start a War !!!" system32.exe Key created \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Software\Microsoft\Internet Explorer\Main 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window Title = "!!! Hello HokageFile (AnbuTeam-Sampit), Is this my places, Wanna start a War !!!" 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window Title = "!!! Hello HokageFile (AnbuTeam-Sampit), Is this my places, Wanna start a War !!!" Gaara.exe -
Modifies registry class 51 IoCs
Processes:
smss.execsrss.exeKazekage.exe007f485b70277dc3d8a978edfd561241_JaffaCakes118.exeGaara.exesystem32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open\Command\ = "calc.exe" smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open\Command\ = "calc.exe" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open2\Command Kazekage.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Edit\Command 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Edit\Command\ = "calc.exe" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open2\Command\ = "calc.exe" Gaara.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open\Command system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open2\Command\ = "calc.exe" system32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Edit\Command\ = "calc.exe" Kazekage.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open2\Command 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open\Command smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Edit\Command\ = "calc.exe" Gaara.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Edit\Command smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Edit\Command Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ = "shutdown -r -f -t 0" Gaara.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Edit\Command csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open\Command\ = "calc.exe" 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open\Command Gaara.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Edit\Command system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Edit\Command\ = "calc.exe" system32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open2\Command\ = "calc.exe" 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open2\Command Gaara.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open\Command Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open\Command\ = "calc.exe" Kazekage.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command Gaara.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open\Command csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open\Command 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ = "shutdown -r -f -t 0" Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open\Command\ = "calc.exe" system32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open2\Command system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open2\Command\ = "calc.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open2\Command\ = "calc.exe" smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open2\Command csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ = "shutdown -r -f -t 0" system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ = "shutdown -r -f -t 0" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Edit\Command Kazekage.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open2\Command smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ = "shutdown -r -f -t 0" smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open2\Command\ = "calc.exe" Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Edit\Command\ = "calc.exe" 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ = "shutdown -r -f -t 0" 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Edit\Command\ = "calc.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open\Command\ = "calc.exe" Gaara.exe -
Runs ping.exe 1 TTPs 34 IoCs
Processes:
ping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exepid process 3204 ping.exe 3388 ping.exe 5108 ping.exe 4916 ping.exe 640 ping.exe 4848 ping.exe 4844 ping.exe 3668 ping.exe 3204 ping.exe 380 ping.exe 944 ping.exe 1076 ping.exe 732 ping.exe 3644 ping.exe 4648 ping.exe 1612 ping.exe 3568 ping.exe 340 ping.exe 1216 ping.exe 748 ping.exe 2436 ping.exe 4112 ping.exe 1904 ping.exe 2588 ping.exe 4044 ping.exe 3444 ping.exe 876 ping.exe 1528 ping.exe 4448 ping.exe 3576 ping.exe 2624 ping.exe 1088 ping.exe 4024 ping.exe 1904 ping.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
csrss.exeKazekage.exe007f485b70277dc3d8a978edfd561241_JaffaCakes118.exepid process 4316 csrss.exe 4316 csrss.exe 4316 csrss.exe 4316 csrss.exe 4316 csrss.exe 4316 csrss.exe 4316 csrss.exe 4316 csrss.exe 4316 csrss.exe 4316 csrss.exe 4316 csrss.exe 4316 csrss.exe 4316 csrss.exe 4316 csrss.exe 4316 csrss.exe 4316 csrss.exe 4316 csrss.exe 4316 csrss.exe 4316 csrss.exe 4316 csrss.exe 4316 csrss.exe 4316 csrss.exe 4316 csrss.exe 4316 csrss.exe 3232 Kazekage.exe 3232 Kazekage.exe 3232 Kazekage.exe 3232 Kazekage.exe 3232 Kazekage.exe 3232 Kazekage.exe 3232 Kazekage.exe 3232 Kazekage.exe 3232 Kazekage.exe 3232 Kazekage.exe 3232 Kazekage.exe 3232 Kazekage.exe 3232 Kazekage.exe 3232 Kazekage.exe 3232 Kazekage.exe 3232 Kazekage.exe 3232 Kazekage.exe 3232 Kazekage.exe 3232 Kazekage.exe 3232 Kazekage.exe 3232 Kazekage.exe 3232 Kazekage.exe 3232 Kazekage.exe 3232 Kazekage.exe 3892 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe 3892 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe 3892 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe 3892 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe 3892 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe 3892 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe 3892 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe 3892 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe 3892 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe 3892 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe 3892 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe 3892 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe 3892 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe 3892 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe 3892 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe 3892 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 31 IoCs
Processes:
007f485b70277dc3d8a978edfd561241_JaffaCakes118.exesmss.exesmss.exeGaara.exesmss.exeGaara.execsrss.exesmss.exeGaara.execsrss.exeKazekage.exesmss.exeGaara.execsrss.exeKazekage.exesystem32.exesmss.exeGaara.execsrss.exeKazekage.exesystem32.exesystem32.exeKazekage.exesystem32.execsrss.exeKazekage.exesystem32.exeGaara.execsrss.exeKazekage.exesystem32.exepid process 3892 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe 1676 smss.exe 4732 smss.exe 2008 Gaara.exe 3856 smss.exe 4812 Gaara.exe 4316 csrss.exe 5096 smss.exe 3844 Gaara.exe 5052 csrss.exe 3232 Kazekage.exe 1696 smss.exe 856 Gaara.exe 2524 csrss.exe 1928 Kazekage.exe 4032 system32.exe 1388 smss.exe 2840 Gaara.exe 5040 csrss.exe 4772 Kazekage.exe 4676 system32.exe 4144 system32.exe 3536 Kazekage.exe 448 system32.exe 4656 csrss.exe 4528 Kazekage.exe 2928 system32.exe 3952 Gaara.exe 3388 csrss.exe 3856 Kazekage.exe 2656 system32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
007f485b70277dc3d8a978edfd561241_JaffaCakes118.exesmss.exeGaara.execsrss.exeKazekage.exesystem32.exedescription pid process target process PID 3892 wrote to memory of 1676 3892 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe smss.exe PID 3892 wrote to memory of 1676 3892 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe smss.exe PID 3892 wrote to memory of 1676 3892 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe smss.exe PID 1676 wrote to memory of 4732 1676 smss.exe smss.exe PID 1676 wrote to memory of 4732 1676 smss.exe smss.exe PID 1676 wrote to memory of 4732 1676 smss.exe smss.exe PID 1676 wrote to memory of 2008 1676 smss.exe Gaara.exe PID 1676 wrote to memory of 2008 1676 smss.exe Gaara.exe PID 1676 wrote to memory of 2008 1676 smss.exe Gaara.exe PID 2008 wrote to memory of 3856 2008 Gaara.exe Kazekage.exe PID 2008 wrote to memory of 3856 2008 Gaara.exe Kazekage.exe PID 2008 wrote to memory of 3856 2008 Gaara.exe Kazekage.exe PID 2008 wrote to memory of 4812 2008 Gaara.exe Gaara.exe PID 2008 wrote to memory of 4812 2008 Gaara.exe Gaara.exe PID 2008 wrote to memory of 4812 2008 Gaara.exe Gaara.exe PID 2008 wrote to memory of 4316 2008 Gaara.exe csrss.exe PID 2008 wrote to memory of 4316 2008 Gaara.exe csrss.exe PID 2008 wrote to memory of 4316 2008 Gaara.exe csrss.exe PID 4316 wrote to memory of 5096 4316 csrss.exe smss.exe PID 4316 wrote to memory of 5096 4316 csrss.exe smss.exe PID 4316 wrote to memory of 5096 4316 csrss.exe smss.exe PID 4316 wrote to memory of 3844 4316 csrss.exe wmiprvse.exe PID 4316 wrote to memory of 3844 4316 csrss.exe wmiprvse.exe PID 4316 wrote to memory of 3844 4316 csrss.exe wmiprvse.exe PID 4316 wrote to memory of 5052 4316 csrss.exe csrss.exe PID 4316 wrote to memory of 5052 4316 csrss.exe csrss.exe PID 4316 wrote to memory of 5052 4316 csrss.exe csrss.exe PID 4316 wrote to memory of 3232 4316 csrss.exe Kazekage.exe PID 4316 wrote to memory of 3232 4316 csrss.exe Kazekage.exe PID 4316 wrote to memory of 3232 4316 csrss.exe Kazekage.exe PID 3232 wrote to memory of 1696 3232 Kazekage.exe smss.exe PID 3232 wrote to memory of 1696 3232 Kazekage.exe smss.exe PID 3232 wrote to memory of 1696 3232 Kazekage.exe smss.exe PID 3232 wrote to memory of 856 3232 Kazekage.exe Gaara.exe PID 3232 wrote to memory of 856 3232 Kazekage.exe Gaara.exe PID 3232 wrote to memory of 856 3232 Kazekage.exe Gaara.exe PID 3232 wrote to memory of 2524 3232 Kazekage.exe csrss.exe PID 3232 wrote to memory of 2524 3232 Kazekage.exe csrss.exe PID 3232 wrote to memory of 2524 3232 Kazekage.exe csrss.exe PID 3232 wrote to memory of 1928 3232 Kazekage.exe Kazekage.exe PID 3232 wrote to memory of 1928 3232 Kazekage.exe Kazekage.exe PID 3232 wrote to memory of 1928 3232 Kazekage.exe Kazekage.exe PID 3232 wrote to memory of 4032 3232 Kazekage.exe system32.exe PID 3232 wrote to memory of 4032 3232 Kazekage.exe system32.exe PID 3232 wrote to memory of 4032 3232 Kazekage.exe system32.exe PID 4032 wrote to memory of 1388 4032 system32.exe smss.exe PID 4032 wrote to memory of 1388 4032 system32.exe smss.exe PID 4032 wrote to memory of 1388 4032 system32.exe smss.exe PID 4032 wrote to memory of 2840 4032 system32.exe Gaara.exe PID 4032 wrote to memory of 2840 4032 system32.exe Gaara.exe PID 4032 wrote to memory of 2840 4032 system32.exe Gaara.exe PID 4032 wrote to memory of 5040 4032 system32.exe csrss.exe PID 4032 wrote to memory of 5040 4032 system32.exe csrss.exe PID 4032 wrote to memory of 5040 4032 system32.exe csrss.exe PID 4032 wrote to memory of 4772 4032 system32.exe Kazekage.exe PID 4032 wrote to memory of 4772 4032 system32.exe Kazekage.exe PID 4032 wrote to memory of 4772 4032 system32.exe Kazekage.exe PID 4032 wrote to memory of 4676 4032 system32.exe system32.exe PID 4032 wrote to memory of 4676 4032 system32.exe system32.exe PID 4032 wrote to memory of 4676 4032 system32.exe system32.exe PID 4316 wrote to memory of 4144 4316 csrss.exe system32.exe PID 4316 wrote to memory of 4144 4316 csrss.exe system32.exe PID 4316 wrote to memory of 4144 4316 csrss.exe system32.exe PID 2008 wrote to memory of 3536 2008 Gaara.exe Kazekage.exe -
System policy modification 1 TTPs 12 IoCs
Processes:
Kazekage.exe007f485b70277dc3d8a978edfd561241_JaffaCakes118.exesmss.exeGaara.execsrss.exesystem32.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Kazekage.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Gaara.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System csrss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Kazekage.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Gaara.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System system32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" system32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" csrss.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\007f485b70277dc3d8a978edfd561241_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Sets file execution options in registry
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Windows directory
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3892 -
C:\Windows\Fonts\Admin 26 - 4 - 2024\smss.exe"C:\Windows\Fonts\Admin 26 - 4 - 2024\smss.exe"2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Sets file execution options in registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Windows directory
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1676 -
C:\Windows\Fonts\Admin 26 - 4 - 2024\smss.exe"C:\Windows\Fonts\Admin 26 - 4 - 2024\smss.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:4732 -
C:\Windows\Fonts\Admin 26 - 4 - 2024\Gaara.exe"C:\Windows\Fonts\Admin 26 - 4 - 2024\Gaara.exe"3⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Sets file execution options in registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Windows directory
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2008 -
C:\Windows\Fonts\Admin 26 - 4 - 2024\smss.exe"C:\Windows\Fonts\Admin 26 - 4 - 2024\smss.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:3856 -
C:\Windows\Fonts\Admin 26 - 4 - 2024\Gaara.exe"C:\Windows\Fonts\Admin 26 - 4 - 2024\Gaara.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:4812 -
C:\Windows\Fonts\Admin 26 - 4 - 2024\csrss.exe"C:\Windows\Fonts\Admin 26 - 4 - 2024\csrss.exe"4⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Sets file execution options in registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Windows directory
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4316 -
C:\Windows\Fonts\Admin 26 - 4 - 2024\smss.exe"C:\Windows\Fonts\Admin 26 - 4 - 2024\smss.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:5096 -
C:\Windows\Fonts\Admin 26 - 4 - 2024\Gaara.exe"C:\Windows\Fonts\Admin 26 - 4 - 2024\Gaara.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:3844 -
C:\Windows\Fonts\Admin 26 - 4 - 2024\csrss.exe"C:\Windows\Fonts\Admin 26 - 4 - 2024\csrss.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:5052 -
C:\Windows\SysWOW64\drivers\Kazekage.exeC:\Windows\system32\drivers\Kazekage.exe5⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Sets file execution options in registry
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Windows directory
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3232 -
C:\Windows\Fonts\Admin 26 - 4 - 2024\smss.exe"C:\Windows\Fonts\Admin 26 - 4 - 2024\smss.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1696 -
C:\Windows\Fonts\Admin 26 - 4 - 2024\Gaara.exe"C:\Windows\Fonts\Admin 26 - 4 - 2024\Gaara.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:856 -
C:\Windows\Fonts\Admin 26 - 4 - 2024\csrss.exe"C:\Windows\Fonts\Admin 26 - 4 - 2024\csrss.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2524 -
C:\Windows\SysWOW64\drivers\Kazekage.exeC:\Windows\system32\drivers\Kazekage.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1928 -
C:\Windows\SysWOW64\drivers\system32.exeC:\Windows\system32\drivers\system32.exe6⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Sets file execution options in registry
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Windows directory
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4032 -
C:\Windows\Fonts\Admin 26 - 4 - 2024\smss.exe"C:\Windows\Fonts\Admin 26 - 4 - 2024\smss.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1388 -
C:\Windows\Fonts\Admin 26 - 4 - 2024\Gaara.exe"C:\Windows\Fonts\Admin 26 - 4 - 2024\Gaara.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2840 -
C:\Windows\Fonts\Admin 26 - 4 - 2024\csrss.exe"C:\Windows\Fonts\Admin 26 - 4 - 2024\csrss.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:5040 -
C:\Windows\SysWOW64\drivers\Kazekage.exeC:\Windows\system32\drivers\Kazekage.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4772 -
C:\Windows\SysWOW64\drivers\system32.exeC:\Windows\system32\drivers\system32.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4676 -
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655007⤵
- Runs ping.exe
PID:876 -
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655007⤵
- Runs ping.exe
PID:1904 -
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655007⤵
- Runs ping.exe
PID:4112 -
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655007⤵
- Runs ping.exe
PID:3644 -
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655007⤵
- Runs ping.exe
PID:3204 -
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655007⤵
- Runs ping.exe
PID:1612 -
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655006⤵
- Runs ping.exe
PID:732 -
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655006⤵
- Runs ping.exe
PID:3388 -
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655006⤵
- Runs ping.exe
PID:1216 -
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655006⤵
- Runs ping.exe
PID:2436 -
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655006⤵
- Runs ping.exe
PID:4848 -
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655006⤵
- Runs ping.exe
PID:3576 -
C:\Windows\SysWOW64\drivers\system32.exeC:\Windows\system32\drivers\system32.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4144 -
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655005⤵
- Runs ping.exe
PID:3444 -
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655005⤵
- Runs ping.exe
PID:4448 -
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655005⤵
- Runs ping.exe
PID:4916 -
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655005⤵
- Runs ping.exe
PID:340 -
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655005⤵
- Runs ping.exe
PID:1528 -
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655005⤵
- Runs ping.exe
PID:944 -
C:\Windows\SysWOW64\drivers\Kazekage.exeC:\Windows\system32\drivers\Kazekage.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3536 -
C:\Windows\SysWOW64\drivers\system32.exeC:\Windows\system32\drivers\system32.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:448 -
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655004⤵
- Runs ping.exe
PID:4024 -
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655004⤵
- Runs ping.exe
PID:4044 -
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655004⤵
- Runs ping.exe
PID:3568 -
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655004⤵
- Runs ping.exe
PID:3668 -
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655004⤵
- Runs ping.exe
PID:4648 -
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655004⤵
- Runs ping.exe
PID:2588 -
C:\Windows\Fonts\Admin 26 - 4 - 2024\csrss.exe"C:\Windows\Fonts\Admin 26 - 4 - 2024\csrss.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:4656 -
C:\Windows\SysWOW64\drivers\Kazekage.exeC:\Windows\system32\drivers\Kazekage.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4528 -
C:\Windows\SysWOW64\drivers\system32.exeC:\Windows\system32\drivers\system32.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2928 -
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655003⤵
- Runs ping.exe
PID:1088 -
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655003⤵
- Runs ping.exe
PID:1076 -
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655003⤵
- Runs ping.exe
PID:1904 -
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655003⤵
- Runs ping.exe
PID:380 -
C:\Windows\Fonts\Admin 26 - 4 - 2024\Gaara.exe"C:\Windows\Fonts\Admin 26 - 4 - 2024\Gaara.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:3952 -
C:\Windows\Fonts\Admin 26 - 4 - 2024\csrss.exe"C:\Windows\Fonts\Admin 26 - 4 - 2024\csrss.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:3388 -
C:\Windows\SysWOW64\drivers\Kazekage.exeC:\Windows\system32\drivers\Kazekage.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3856 -
C:\Windows\SysWOW64\drivers\system32.exeC:\Windows\system32\drivers\system32.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2656 -
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655002⤵
- Runs ping.exe
PID:2624 -
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655002⤵
- Runs ping.exe
PID:4844 -
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655002⤵
- Runs ping.exe
PID:5108 -
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655002⤵
- Runs ping.exe
PID:748 -
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655002⤵
- Runs ping.exe
PID:640 -
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655002⤵
- Runs ping.exe
PID:3204
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵PID:3844
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
1Disable or Modify Tools
1Modify Registry
9Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
736B
MD5bb5d6abdf8d0948ac6895ce7fdfbc151
SHA19266b7a247a4685892197194d2b9b86c8f6dddbd
SHA2565db2e0915b5464d32e83484f8ae5e3c73d2c78f238fde5f58f9b40dbb5322de8
SHA512878444760e8df878d65bb62b4798177e168eb099def58ad3634f4348e96705c83f74324f9fa358f0eff389991976698a233ca53e9b72034ae11c86d42322a76c
-
Filesize
196B
MD51564dfe69ffed40950e5cb644e0894d1
SHA1201b6f7a01cc49bb698bea6d4945a082ed454ce4
SHA256be114a2dbcc08540b314b01882aa836a772a883322a77b67aab31233e26dc184
SHA51272df187e39674b657974392cfa268e71ef86dc101ebd2303896381ca56d3c05aa9db3f0ab7d0e428d7436e0108c8f19e94c2013814d30b0b95a23a6b9e341097
-
Filesize
5.5MB
MD5d15dc02c21c381e5bf360fb07b007771
SHA1e421b671f67bbf98a3f263d4b0aebcf52913d288
SHA256d1fce81166786d47cf8a1a9bcfe0530d0a1f4216df2de0e95b9433cba645da5e
SHA51224223404360077af81d77129d3886cf0fd265aec0854941d0b562ee2df071ef5ef3c67b407fb490ac324a84e99fd53aa1f650754c93690ad291c46b0120974e6
-
Filesize
5.5MB
MD58cc926a6c9c6c396247abd3916117841
SHA1f4c8b4a043366884636dac0d14b56d2531f1f2ce
SHA2566386455967bed176030d4e0bd2575363343f8c17a2817195be53bedc612d44d7
SHA5126fabdde87e0120d46b09f418c52969493daadeda935b628322ab3f63e48b6cf99dffd035d9858dbab9b104e281ade887a792ee7cc3b5e339bd8c82cb11d1302b
-
Filesize
5.5MB
MD52b9434595587e20b2c4e93b5d4453a13
SHA17c3fd5b0af424c5a6e14aea22fda4a3e19134eb5
SHA2565d01cca1f9b34f00ea0386d1774e4beb2455541226257517aa388aadcdd7a916
SHA5127a47cde74ef11fc2bdb19983c02360bfa7cfc7632bf11fb9c70f0307957ee580c1f99be023ae43efb0d56a13fb37950f2679d3663256de9435a9fd6b5586bd8d
-
Filesize
5.5MB
MD54103384af49c7008745a41422138e355
SHA1c4200bb89607fb32efe1b67e70ee9b7cf4985317
SHA2561092c08d6ce0554c760edced6c3a0f271192b447c5810024d07297956ec0cade
SHA51253f088e0dc23d7dd65db92ff85bcce2c86912f130ca7ec438341240691df305c6ebf8f524a8a2acbdcb350b944bcb695cc43193e20b21467f8beb8dc47586156
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
1.4MB
MD5d6b05020d4a0ec2a3a8b687099e335df
SHA1df239d830ebcd1cde5c68c46a7b76dad49d415f4
SHA2569824b98dab6af65a9e84c2ea40e9df948f9766ce2096e81feecad7db8dd6080a
SHA51278fd360faa4d34f5732056d6e9ad7b9930964441c69cf24535845d397de92179553b9377a25649c01eb5ac7d547c29cc964e69ede7f2af9fc677508a99251fff
-
Filesize
1.3MB
MD5d971efdda959b5ec87c6bb6bb2c6f350
SHA1f05962526cb25a1ea5e176265e235443eba4ec70
SHA2569a72d90064de8ee12ca1cd99511f5f682314cb4bde1b2884f6dad6d0c74a252d
SHA512bc78144c2fa562f7b8eab80be69f7ed148d48d600d72d98c018649fb19fceb4600bbae723e5eb36c410026e7940180e2eb2d4715bb660f35e813b4cc257758ef
-
Filesize
5.5MB
MD5007f485b70277dc3d8a978edfd561241
SHA1462d813115a1435ab9235ad4f02d1df2660ab847
SHA256330721800674398e1a450deb059418e7dd7758eec2aeccfa1fe054eeb0850e4a
SHA5123b8139a4375561d8979e2aa25b4fc21eedea74f909e0909c38647d4ca84d15e8ee435377f1714f910914107306da9c9adc0e6316d287ed3808796ab3dec59e28
-
Filesize
3.6MB
MD5bc552a660422bb3904e9d695955aaad3
SHA195b0d7ad83d8dbbab437bfb93de5ae4a8371c629
SHA2569d2397793f3e5246cca5b9b7b4505b060be47ffaa15bd7e7e2ed467a2745867c
SHA512c36a79165fdb34ea17f942a72164baffccdd637e2a1439e5a9e7d692c763aa2e50a6623c3c641c9b27530846dc5371d0287ae71ec5a9315c0972fb4880aeb658
-
Filesize
65B
MD564acfa7e03b01f48294cf30d201a0026
SHA110facd995b38a095f30b4a800fa454c0bcbf8438
SHA256ba8159d865d106e7b4d0043007a63d1541e1de455dc8d7ff0edd3013bd425c62
SHA51265a9b2e639de74a2a7faa83463a03f5f5b526495e3c793ec1e144c422ed0b842dd304cd5ff4f8aec3d76d826507030c5916f70a231429cea636ec2d8ab43931a
-
Filesize
5.5MB
MD53e8d0d07c4e6868a9261bf75c8aaffac
SHA14e3dddd6e458d2c6fad85df7251ba5e7473a9068
SHA2563e09b9eb168262ad90abc1dce9d06848e7804a52f7a1e32be5e5f4b36296d0b4
SHA51217070199f845bc879853dfaeed4afad703bcb2b11e9ab9af8b731012ba7428d89e5d73654b527910c1f57a3eb6f445462afda963050adf3cfbfcf9d6ed7084ec
-
Filesize
4.8MB
MD58c175b82618202fa6ea58b20063c4e95
SHA1a8daf2417746e8cc8c466e5ba533a2ab0bbc4c8c
SHA25623efe3e7a5d2ac6f03c38a57a84b482dcdc282df5bd5b7145196e46646fd3ebb
SHA51229d771777ffa8b1c1005a00f0f05f6621a4417de2db5611c26d08af8de1d0b105465a39659f157b21eefe62b828627f33d54275e9a41098c79c34156a24abbda
-
Filesize
2.2MB
MD516cbd7c82be91d7d75f1b517522cdfac
SHA108606e6499697b67cd891d0f7603fc74e0de682b
SHA256cdd30a9e6500ce294b812572d5dfbf50441e0b7dd8fc398711f89d4092ac8b00
SHA512d8435797ecb0d8d551c18da00b520a57cec836a9a5f2bf1a330660a6168d31615dc0e6b1c106d1145da088d083843be4229ad29236591d74e4f04c275cec3ba9
-
Filesize
5.5MB
MD529be54f740f6c2eafcd0afb6b723ce00
SHA1eae3255dd335e299a27531e6a0f6f37dd01dc044
SHA2560cc49ab54e944087f9f9849c53d8d8006d65c400d969934a8f810b76050343d8
SHA512229f251bc46484800c2ae88a3c0145f048e3b3ade160253e252e1cb0d8577fc79306789ee9c31eecfa98e2a3a24b95270f8d4ec5847c3d326aada26bd364ad71
-
Filesize
4.5MB
MD5d3181f3e809511b7b5c176286f34592e
SHA15e32d3feedd482abec04fab2741c6b6c167fa1f5
SHA2562a7eeb90c4b5f4966e56c121000f9d6a88be02454c4c5d05f29f144def114e58
SHA512f3ff6c5f09ac8a968ec34976900695b14515f1fdb8987c101a8d1075a24cc3b9e8b58fa84eff4f003b4fd9a2106924b172847a65ed2403014f5944322b8e5a62
-
Filesize
5.5MB
MD5d2b79d9714eb8d8bcc7b2ebc9efba745
SHA125fd087dfe0ee55d0a99ab70b15546d2ba5ba77f
SHA256ba18943af192a194f0d24922bf7ea90c9e2b5e043529eec85f4a150ad2c3ac45
SHA512591dd60e5565cf43a8d658d0104770a99b83712ae450c47fb81dda48bec67b60dad775e56272f509179a2ea87e01add5b05325cc2a86f45c3669bed10fc29018
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a