Analysis
-
max time kernel
134s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/04/2024, 04:04
Static task
static1
Behavioral task
behavioral1
Sample
0455c01a665c97c3eda086033ce883f1_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0455c01a665c97c3eda086033ce883f1_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
0455c01a665c97c3eda086033ce883f1_JaffaCakes118.exe
-
Size
9.8MB
-
MD5
0455c01a665c97c3eda086033ce883f1
-
SHA1
f10cf61641897b5368dc6e7b25e20eff45244849
-
SHA256
7717e734290dd3c62e044998f66afc5bc9bbef025cb2f460837402a13b452970
-
SHA512
05822f7ab2101d88cff3ddd7541ada6fb9120cf4a47f731d28ddf65e71363bb53a76cf3c9fed19344d91b740ccaa1ffe0d8c1c048d605d4f9391cd766b17f90f
-
SSDEEP
98304:9wIDQAiikwIDQAiiaYwIDQAiikwIDQAiia:CuQIuQJuQIuQ
Malware Config
Signatures
-
Drops startup file 6 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ 289.#.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ 913.#.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ 741.#.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ 0455c01a665c97c3eda086033ce883f1_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ 513.#.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ 348.#.exe -
Executes dropped EXE 9 IoCs
pid Process 3044 348.#.exe 2116 513.#.exe 2396 289.#.exe 1604 913.#.exe 1572 912.#.exe 2284 741.#.exe 2608 877.#.exe 1464 596.#.exe 780 345.#.exe -
Loads dropped DLL 18 IoCs
pid Process 2960 0455c01a665c97c3eda086033ce883f1_JaffaCakes118.exe 2960 0455c01a665c97c3eda086033ce883f1_JaffaCakes118.exe 3044 348.#.exe 3044 348.#.exe 2116 513.#.exe 2116 513.#.exe 2396 289.#.exe 2396 289.#.exe 1604 913.#.exe 1604 913.#.exe 1572 912.#.exe 1572 912.#.exe 2284 741.#.exe 2284 741.#.exe 2608 877.#.exe 2608 877.#.exe 1464 596.#.exe 1464 596.#.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WinFirewall = "C:\\905c0769f9a06c95a24ddf945\\patcher.exe" 289.#.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WinFirewall = "C:\\905c0769f9a06c95a24ddf945\\patcher.exe" 913.#.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WinFirewall = "C:\\905c0769f9a06c95a24ddf945\\patcher.exe" 912.#.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WinFirewall = "C:\\905c0769f9a06c95a24ddf945\\patcher.exe" 345.#.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WinFirewall = "C:\\905c0769f9a06c95a24ddf945\\patcher.exe" 596.#.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WinFirewall = "C:\\905c0769f9a06c95a24ddf945\\patcher.exe" 0455c01a665c97c3eda086033ce883f1_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WinFirewall = "C:\\905c0769f9a06c95a24ddf945\\patcher.exe" 348.#.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WinFirewall = "C:\\905c0769f9a06c95a24ddf945\\patcher.exe" 513.#.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WinFirewall = "C:\\905c0769f9a06c95a24ddf945\\patcher.exe" 741.#.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WinFirewall = "C:\\905c0769f9a06c95a24ddf945\\patcher.exe" 877.#.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Mail\en-US\ 513.#.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Slate\ 289.#.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\SubsetList\ 913.#.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ff\ 348.#.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\ 289.#.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\ 513.#.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Triedit\it-IT\ 0455c01a665c97c3eda086033ce883f1_JaffaCakes118.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\misc\ 289.#.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\META-INF\ 348.#.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\meta\reader\ 0455c01a665c97c3eda086033ce883f1_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\BrightYellow\ 513.#.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\css\ 0455c01a665c97c3eda086033ce883f1_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\ 289.#.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\css\ 913.#.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pa\ 741.#.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Web Server Extensions\ 741.#.exe File opened for modification C:\Program Files\Windows Media Player\Icons\ 0455c01a665c97c3eda086033ce883f1_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\images\ 513.#.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Updater6\Adobe_Updater.exe 0455c01a665c97c3eda086033ce883f1_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\ 741.#.exe File opened for modification C:\Program Files\Mozilla Firefox\pingsender.exe 348.#.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\js\ 289.#.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\es\ 741.#.exe File opened for modification C:\Program Files (x86)\Common Files\SpeechEngines\Microsoft\TTS20\es-ES\ 0455c01a665c97c3eda086033ce883f1_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\BrightOrange\ 289.#.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\ 348.#.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\gl\ 912.#.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\3082\ 289.#.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\kinit.exe 0455c01a665c97c3eda086033ce883f1_JaffaCakes118.exe File opened for modification C:\Program Files\VideoLAN\VLC\skins\ 513.#.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\Computers\ 0455c01a665c97c3eda086033ce883f1_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\ 289.#.exe File opened for modification C:\Program Files (x86)\Common Files\DESIGNER\ 348.#.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\Discussion\ 289.#.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\de-DE\ 913.#.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\ 0455c01a665c97c3eda086033ce883f1_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ 348.#.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\jdk16\windows-amd64\ 513.#.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\ 0455c01a665c97c3eda086033ce883f1_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\AddInViews\ 289.#.exe File opened for modification C:\Program Files (x86)\Common Files\System\msadc\ja-JP\ 289.#.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\ 913.#.exe File opened for modification C:\Program Files\Windows Media Player\Visualizations\ 912.#.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\images\ 912.#.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\css\ 348.#.exe File opened for modification C:\Program Files (x86)\Microsoft.NET\RedistList\ 289.#.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\packetizer\ 348.#.exe File opened for modification C:\Program Files\Uninstall Information\ 289.#.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\8.0\ 348.#.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\ 913.#.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\ 877.#.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\or\LC_MESSAGES\ 0455c01a665c97c3eda086033ce883f1_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Media Player\Visualizations\ 513.#.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\css\ 912.#.exe File opened for modification C:\Program Files\Windows Media Player\it-IT\ 513.#.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\AddInSideAdapters\ 513.#.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\logs\ 912.#.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\msinfo32.exe 596.#.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\unpack200.exe 0455c01a665c97c3eda086033ce883f1_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\SpringGreen\ 0455c01a665c97c3eda086033ce883f1_JaffaCakes118.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sl\ 913.#.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\WATERMAR\ 912.#.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\es\ 348.#.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\cmm\ 912.#.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\assembly\GAC_MSIL\Microsoft.Security.ApplicationId.Wizards.AutomaticRuleGenerationWizard.resources\6.1.0.0_de_31bf3856ad364e35\ 913.#.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Microsoft.Tpm.Resources\ 913.#.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Microsoft.MediaCenter.UI\ 0455c01a665c97c3eda086033ce883f1_JaffaCakes118.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Microsoft.Office.Interop.Access\ 513.#.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.Web.Entity.Design.resources\3.5.0.0_fr_b77a5c561934e089\ 913.#.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.Windows.Presentation\3.5.0.0__b77a5c561934e089\ 513.#.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.Xml.Linq\ 913.#.exe File opened for modification C:\Windows\assembly\GAC_MSIL\UIAutomationTypes.resources\3.0.0.0_fr_31bf3856ad364e35\ 513.#.exe File opened for modification C:\Windows\assembly\GAC_MSIL\WindowsBase.resources\3.0.0.0_ja_31bf3856ad364e35\ 913.#.exe File opened for modification C:\Windows\assembly\GAC_32\Microsoft.GroupPolicy.AdmTmplEditor\ 0455c01a665c97c3eda086033ce883f1_JaffaCakes118.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Microsoft.Windows.Diagnosis.TroubleshootingPack.Resources\6.1.0.0_en_31bf3856ad364e35\ 913.#.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Microsoft.PowerShell.GraphicalHost.Resources\1.0.0.0_ja_31bf3856ad364e35\ 0455c01a665c97c3eda086033ce883f1_JaffaCakes118.exe File opened for modification C:\Windows\assembly\GAC_MSIL\microsoft.transactions.bridge.resources\3.0.0.0_fr_b03f5f7f11d50a3a\ 913.#.exe File opened for modification C:\Windows\assembly\GAC_MSIL\system.identitymodel.selectors.resources\3.0.0.0_de_b77a5c561934e089\ 0455c01a665c97c3eda086033ce883f1_JaffaCakes118.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Microsoft.Office.Tools.Common.v9.0\9.0.0.0__b03f5f7f11d50a3a\ 513.#.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Microsoft.ApplicationId.RuleWizard.Resources\6.1.0.0_fr_31bf3856ad364e35\ 0455c01a665c97c3eda086033ce883f1_JaffaCakes118.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Microsoft.Synchronization.Data\1.0.0.0__89845dcd8080cc91\ 513.#.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Microsoft.Windows.Diagnosis.SDHost.Resources\1.0.0.0_it_31bf3856ad364e35\ 0455c01a665c97c3eda086033ce883f1_JaffaCakes118.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Microsoft.Windows.Diagnosis.TroubleshootingPack.Resources\6.1.0.0_es_31bf3856ad364e35\ 0455c01a665c97c3eda086033ce883f1_JaffaCakes118.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Microsoft.Windows.Diagnosis.SDHost.Resources\1.0.0.0_it_31bf3856ad364e35\ 913.#.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.Data.OracleClient.resources\2.0.0.0_es_b77a5c561934e089\ 913.#.exe File opened for modification C:\Windows\assembly\GAC_MSIL\system.management.resources\2.0.0.0_es_b03f5f7f11d50a3a\ 913.#.exe File opened for modification C:\Windows\assembly\GAC_MSIL\ehiUPnP\6.1.0.0__31bf3856ad364e35\ 0455c01a665c97c3eda086033ce883f1_JaffaCakes118.exe File opened for modification C:\Windows\assembly\GAC\Microsoft.Ink\1.0.2201.0__31bf3856ad364e35\ 741.#.exe File opened for modification C:\Windows\assembly\GAC_MSIL\system.servicemodel.resources\3.0.0.0_de_b77a5c561934e089\ 913.#.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.DirectoryServices.AccountManagement.resources\3.5.0.0_it_b77a5c561934e089\ 913.#.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.Web.Extensions.Design\3.5.0.0__31bf3856ad364e35\ 913.#.exe File opened for modification C:\Windows\assembly\GAC_32\System.Data\ 741.#.exe File opened for modification C:\Windows\assembly\GAC_32\System.Data.OracleClient\2.0.0.0__b77a5c561934e089\ 741.#.exe File opened for modification C:\Windows\assembly\GAC_MSIL\SYSTEM.CONFIGURATION.resources\2.0.0.0_ja_b03f5f7f11d50a3a\ 0455c01a665c97c3eda086033ce883f1_JaffaCakes118.exe File opened for modification C:\Windows\assembly\GAC_32\Microsoft.GroupPolicy.AdmTmplEditor.Resources\6.1.0.0_ja_31bf3856ad364e35\ 741.#.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Microsoft.Office.InfoPath.FormControl\14.0.0.0__71e9bce111e9429c\ 913.#.exe File opened for modification C:\Windows\assembly\GAC_MSIL\WindowsFormsIntegration.resources\3.0.0.0_fr_31bf3856ad364e35\ 913.#.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Policy.6.0.Microsoft.MediaCenter\ 913.#.exe File opened for modification C:\Windows\assembly\GAC_MSIL\ehiWUapi\ 0455c01a665c97c3eda086033ce883f1_JaffaCakes118.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Microsoft.Security.ApplicationId.PolicyManagement.Cmdlets\ 0455c01a665c97c3eda086033ce883f1_JaffaCakes118.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.Data.Linq.resources\3.5.0.0_it_b77a5c561934e089\ 0455c01a665c97c3eda086033ce883f1_JaffaCakes118.exe File opened for modification C:\Windows\assembly\GAC_32\Microsoft.SharePoint.BusinessData.Administration.Client\14.0.0.0__71e9bce111e9429c\ 513.#.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Diagnostics\1.0.0.0__31bf3856ad364e35\ 513.#.exe File opened for modification C:\Windows\assembly\GAC_MSIL\MICROSOFT.VISUALBASIC.COMPATIBILITY.DATA.resources\8.0.0.0_de_b03f5f7f11d50a3a\ 0455c01a665c97c3eda086033ce883f1_JaffaCakes118.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Microsoft.VisualStudio.Tools.Office.HostAdapter.v10.0\ 913.#.exe File opened for modification C:\Windows\assembly\GAC_MSIL\system.servicemodel.resources\ 513.#.exe File opened for modification C:\Windows\assembly\GAC_32\Microsoft.Office.BusinessData\14.0.0.0__71e9bce111e9429c\ 741.#.exe File opened for modification C:\Windows\assembly\GAC_64\Microsoft.Security.ApplicationId.PolicyManagement.PolicyEngineApi.Interop\6.1.0.0__31bf3856ad364e35\ 741.#.exe File opened for modification C:\Windows\assembly\GAC_MSIL\TaskScheduler.Resources\6.1.0.0_de_31bf3856ad364e35\ 0455c01a665c97c3eda086033ce883f1_JaffaCakes118.exe File opened for modification C:\Windows\assembly\GAC_64\Microsoft.MediaCenter.Mheg\ 513.#.exe File opened for modification C:\Windows\assembly\GAC_64\Microsoft.Security.ApplicationId.PolicyManagement.PolicyEngineApi.Interop\6.1.0.0__31bf3856ad364e35\ 0455c01a665c97c3eda086033ce883f1_JaffaCakes118.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Policy.12.0.Microsoft.Office.Interop.Excel\14.0.0.0__71e9bce111e9429c\ 513.#.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Policy.12.0.Microsoft.Office.Interop.Outlook\14.0.0.0__71e9bce111e9429c\ 513.#.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.Xml\2.0.0.0__b77a5c561934e089\ 0455c01a665c97c3eda086033ce883f1_JaffaCakes118.exe File opened for modification C:\Windows\assembly\GAC_32\Microsoft.GroupPolicy.AdmTmplEditor.Resources\6.1.0.0_it_31bf3856ad364e35\ 0455c01a665c97c3eda086033ce883f1_JaffaCakes118.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Microsoft.Windows.Diagnosis.Commands.UpdateDiagRootcause.Resources\ 513.#.exe File opened for modification C:\Windows\assembly\GAC_MSIL\MMCFxCommon.Resources\3.0.0.0_fr_31bf3856ad364e35\ 513.#.exe File opened for modification C:\Windows\assembly\GAC_MSIL\policy.3.5.System.Data.SqlServerCe\ 913.#.exe File opened for modification C:\Windows\assembly\GAC_MSIL\PresentationBuildTasks\ 513.#.exe File opened for modification C:\Windows\assembly\GAC_MSIL\System.DirectoryServices.AccountManagement.resources\ 513.#.exe File created C:\Windows\assembly\GAC_MSIL\ComSvcConfig\3.0.0.0__b03f5f7f11d50a3a\ComSvcConfig.exe 0455c01a665c97c3eda086033ce883f1_JaffaCakes118.exe File opened for modification C:\Windows\assembly\GAC_32\Policy.1.2.Microsoft.Interop.Security.AzRoles\ 913.#.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility.Resources\1.0.0.0_it_31bf3856ad364e35\ 0455c01a665c97c3eda086033ce883f1_JaffaCakes118.exe File opened for modification C:\Windows\assembly\GAC_MSIL\MICROSOFT.VISUALBASIC.COMPATIBILITY.resources\8.0.0.0_de_b03f5f7f11d50a3a\ 0455c01a665c97c3eda086033ce883f1_JaffaCakes118.exe File opened for modification C:\Windows\assembly\GAC_64\Microsoft.MediaCenter.TV.Tuners.Interop\6.1.0.0__31bf3856ad364e35\ 513.#.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Microsoft.BackgroundIntelligentTransfer.Management.Resources\1.0.0.0_it_31bf3856ad364e35\ 0455c01a665c97c3eda086033ce883f1_JaffaCakes118.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Diagnostics\ 913.#.exe File opened for modification C:\Windows\assembly\GAC_MSIL\Policy.12.0.Microsoft.Office.InfoPath\14.0.0.0__71e9bce111e9429c\ 913.#.exe -
NTFS ADS 10 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\:\systemlog.bak 877.#.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\:\systemlog.bak 596.#.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\:\systemlog.bak 345.#.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\:\systemlog.bak 741.#.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\:\systemlog.bak 0455c01a665c97c3eda086033ce883f1_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\:\systemlog.bak 348.#.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\:\systemlog.bak 513.#.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\:\systemlog.bak 289.#.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\:\systemlog.bak 913.#.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\:\systemlog.bak 912.#.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2960 0455c01a665c97c3eda086033ce883f1_JaffaCakes118.exe 3044 348.#.exe 2116 513.#.exe 2396 289.#.exe 1604 913.#.exe 1572 912.#.exe 2284 741.#.exe 2608 877.#.exe 1464 596.#.exe 780 345.#.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2960 wrote to memory of 3044 2960 0455c01a665c97c3eda086033ce883f1_JaffaCakes118.exe 28 PID 2960 wrote to memory of 3044 2960 0455c01a665c97c3eda086033ce883f1_JaffaCakes118.exe 28 PID 2960 wrote to memory of 3044 2960 0455c01a665c97c3eda086033ce883f1_JaffaCakes118.exe 28 PID 2960 wrote to memory of 3044 2960 0455c01a665c97c3eda086033ce883f1_JaffaCakes118.exe 28 PID 3044 wrote to memory of 2116 3044 348.#.exe 29 PID 3044 wrote to memory of 2116 3044 348.#.exe 29 PID 3044 wrote to memory of 2116 3044 348.#.exe 29 PID 3044 wrote to memory of 2116 3044 348.#.exe 29 PID 2116 wrote to memory of 2396 2116 513.#.exe 30 PID 2116 wrote to memory of 2396 2116 513.#.exe 30 PID 2116 wrote to memory of 2396 2116 513.#.exe 30 PID 2116 wrote to memory of 2396 2116 513.#.exe 30 PID 2396 wrote to memory of 1604 2396 289.#.exe 31 PID 2396 wrote to memory of 1604 2396 289.#.exe 31 PID 2396 wrote to memory of 1604 2396 289.#.exe 31 PID 2396 wrote to memory of 1604 2396 289.#.exe 31 PID 1604 wrote to memory of 1572 1604 913.#.exe 34 PID 1604 wrote to memory of 1572 1604 913.#.exe 34 PID 1604 wrote to memory of 1572 1604 913.#.exe 34 PID 1604 wrote to memory of 1572 1604 913.#.exe 34 PID 1572 wrote to memory of 2284 1572 912.#.exe 35 PID 1572 wrote to memory of 2284 1572 912.#.exe 35 PID 1572 wrote to memory of 2284 1572 912.#.exe 35 PID 1572 wrote to memory of 2284 1572 912.#.exe 35 PID 2284 wrote to memory of 2608 2284 741.#.exe 36 PID 2284 wrote to memory of 2608 2284 741.#.exe 36 PID 2284 wrote to memory of 2608 2284 741.#.exe 36 PID 2284 wrote to memory of 2608 2284 741.#.exe 36 PID 2608 wrote to memory of 1464 2608 877.#.exe 37 PID 2608 wrote to memory of 1464 2608 877.#.exe 37 PID 2608 wrote to memory of 1464 2608 877.#.exe 37 PID 2608 wrote to memory of 1464 2608 877.#.exe 37 PID 1464 wrote to memory of 780 1464 596.#.exe 38 PID 1464 wrote to memory of 780 1464 596.#.exe 38 PID 1464 wrote to memory of 780 1464 596.#.exe 38 PID 1464 wrote to memory of 780 1464 596.#.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\0455c01a665c97c3eda086033ce883f1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0455c01a665c97c3eda086033ce883f1_JaffaCakes118.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
- NTFS ADS
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\348.#.exeC:\Users\Admin\AppData\Local\Temp\348.#.exe2⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- NTFS ADS
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\513.#.exeC:\Users\Admin\AppData\Local\Temp\513.#.exe3⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
- NTFS ADS
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\289.#.exeC:\Users\Admin\AppData\Local\Temp\289.#.exe4⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- NTFS ADS
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\913.#.exeC:\Users\Admin\AppData\Local\Temp\913.#.exe5⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
- NTFS ADS
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\912.#.exeC:\Users\Admin\AppData\Local\Temp\912.#.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- NTFS ADS
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\741.#.exeC:\Users\Admin\AppData\Local\Temp\741.#.exe7⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
- NTFS ADS
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\877.#.exeC:\Users\Admin\AppData\Local\Temp\877.#.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- NTFS ADS
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\596.#.exeC:\Users\Admin\AppData\Local\Temp\596.#.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- NTFS ADS
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Users\Admin\AppData\Local\Temp\345.#.exeC:\Users\Admin\AppData\Local\Temp\345.#.exe10⤵
- Executes dropped EXE
- Adds Run key to start application
- NTFS ADS
- Suspicious use of SetWindowsHookEx
PID:780 -
C:\Users\Admin\AppData\Local\Temp\221.#.exeC:\Users\Admin\AppData\Local\Temp\221.#.exe11⤵PID:2724
-
C:\Users\Admin\AppData\Local\Temp\218.#.exeC:\Users\Admin\AppData\Local\Temp\218.#.exe12⤵PID:2420
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10.1MB
MD52e8db501a6a81ca468ada7f17d5a78dd
SHA1850847fef4c7e774555aeb60ed973cc2c4c4a3e1
SHA2565e57e13a5056f32a3a870a4e1e9f0bbb0ee2ebcd7b94a4ea9249e92087b64985
SHA5125baa96f47ec53ae01f5c296d1f0bebab8dcd1ed69d9c932413ef0e2325ae777afa553c00519d4cceba663df1a01bc82badb4df47a7161f2b815101fa2ed10721
-
Filesize
9.8MB
MD5811a66469d27d5b71245b2acbe19a0a6
SHA163245c3b4001ef501f6029132426f244526e8617
SHA25672ec3d5a243f8c910618cc894c8ae5ec17321a2fe46fb3133942f97ec5aab1d0
SHA51231c0f73e2632a6b61187efb6ea8408ff24390a5573773586e4918989afee6f4578befbacdf0dec5428c3bbbe35082b38001c74500bb708767cdb2c2113edd0ac
-
Filesize
9.8MB
MD5786dcfd90a48e00ad2f0b6bd7bbac000
SHA1893389176617b9e1081b72017b38b7ebddaf03b4
SHA25653f538fc399f7f8bbea0ed63b192f15aff24b3dcc1496ef0b1c22ea7e6319bed
SHA512d56dbe333f96ddc290d61b1102c51e2bd0273f879f201ec90d0f807be09caaef849e6fef1f727184a74ee3c9008259e4ec5eca6eec9aa7b455316bb5eed446ab
-
Filesize
9.9MB
MD5c1caca0171a6b58b390cd26f9799f191
SHA161ffa6e1529a93d399abfa57fc9e43ee33b1d6fa
SHA256bb252fe553ff3762c14e5e286b1464d2652ede6baa938ea7ad8a0f577af72d3a
SHA5128807ad00941f9f6dcef999dd1f662c4651c874e50b5715b2c46135a30598ddc2127cc5d3c6f3c8cdcbe9713b99043ec8d6f6e460cbe9322a9961f6d589c435f9
-
Filesize
9.8MB
MD50455c01a665c97c3eda086033ce883f1
SHA1f10cf61641897b5368dc6e7b25e20eff45244849
SHA2567717e734290dd3c62e044998f66afc5bc9bbef025cb2f460837402a13b452970
SHA51205822f7ab2101d88cff3ddd7541ada6fb9120cf4a47f731d28ddf65e71363bb53a76cf3c9fed19344d91b740ccaa1ffe0d8c1c048d605d4f9391cd766b17f90f