Analysis
-
max time kernel
152s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
02-05-2024 07:56
Static task
static1
Behavioral task
behavioral1
Sample
0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe
-
Size
2.0MB
-
MD5
0def4e4fe77fc4499d9ade8db0f9c82a
-
SHA1
29e2459ce9aa0767b84e9efe70913559d606d5d1
-
SHA256
ee9a1d78f2e0d7d33d7ca9cdffcdc8bc55cff875ec1d3a969803b373c502824b
-
SHA512
87ec521cd5f94eb10cf7283be15a3c0bff285ad5b870643e81dac3fdd2fea3b3d078d2619dbee906c235a892f47522cfed220bbfe953ef1aa31b297b2853902e
-
SSDEEP
24576:pu6Jx3O0c+JY5UZ+XC0kGso/WafjjCAMPfh5Km4jLE741cDA9JQAyAWMg4SCdOfP:LI0c++OCvkGsUWafdY
Malware Config
Extracted
hawkeye_reborn
10.0.0.0
Protocol: smtp- Host:
mail.ancopottary.com - Port:
587 - Username:
[email protected] - Password:
niconpay$
c5a6e58d-97f5-486b-ab80-4e435504662a
-
fields
map[_AntiDebugger:false _AntiVirusKiller:true _BotKiller:false _ClipboardLogger:true _Delivery:0 _DisableCommandPrompt:false _DisableRegEdit:false _DisableTaskManager:false _Disablers:false _EmailPassword:niconpay$ _EmailPort:587 _EmailSSL:true _EmailServer:mail.ancopottary.com _EmailUsername:[email protected] _ExecutionDelay:10 _FTPPort:0 _FTPSFTP:false _FakeMessageIcon:0 _FakeMessageShow:false _FileBinder:false _HideFile:false _HistoryCleaner:false _Install:false _InstallLocation:0 _InstallStartup:false _InstallStartupPersistance:false _KeyStrokeLogger:true _LogInterval:10 _MeltFile:false _Mutex:c5a6e58d-97f5-486b-ab80-4e435504662a _PasswordStealer:true _ProcessElevation:false _ProcessProtection:false _ScreenshotLogger:false _SystemInfo:true _Version:10.0.0.0 _WebCamLogger:false _WebsiteBlocker:false _WebsiteVisitor:false _WebsiteVisitorVisible:false _ZoneID:false]
-
name
HawkEye RebornX, Version=10.0.0.0, Culture=neutral, PublicKeyToken=null
Signatures
-
HawkEye Reborn
HawkEye Reborn is an enhanced version of the HawkEye malware kit.
-
Sets file execution options in registry 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avscan.exe RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AvastUI.exe RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgnt.exe RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bdagent.exe RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe\Debugger = "rundll32.exe" RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\egui.exe RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\instup.exe RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\egui.exe RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp.exe RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe\Debugger = "rundll32.exe" RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AvastSvc.exe RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgui.exe RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mbamscheduler.exe RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ccuac.exe RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\spybotsd.exe RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ccuac.exe\Debugger = "rundll32.exe" RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgidsagent.exe RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bdagent.exe RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avconfig.exe RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MSASCui.exe RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AvastSvc.exe RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgnt.exe RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avcenter.exe RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\spybotsd.exe RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avcenter.exe RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avconfig.exe\Debugger = "rundll32.exe" RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\instup.exe RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\zlclient.exe\Debugger = "rundll32.exe" RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ccuac.exe RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AvastSvc.exe RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgwdsvc.exe RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AvastUI.exe RegAsm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgui.exe\Debugger = "rundll32.exe" RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MSASCui.exe RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mbampt.exe RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgcsrvx.exe RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bdagent.exe RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avguard.exe RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgnt.exe RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\instup.exe RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mbampt.exe RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wireshark.exe RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgui.exe RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgnt.exe RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgrsx.exe RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mbamgui.exe RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ccuac.exe RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avscan.exe RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgui.exe RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mbamservice.exe RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp.exe RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp.exe RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wireshark.exe RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mbam.exe RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bdagent.exe RegAsm.exe -
Drops startup file 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ThumbnailExtractionHost.url 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe -
Looks up external IP address via web service 9 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 50 bot.whatismyipaddress.com 61 bot.whatismyipaddress.com 65 bot.whatismyipaddress.com 66 bot.whatismyipaddress.com 69 bot.whatismyipaddress.com 51 bot.whatismyipaddress.com 52 bot.whatismyipaddress.com 56 bot.whatismyipaddress.com 63 bot.whatismyipaddress.com -
Suspicious use of SetThreadContext 10 IoCs
description pid Process procid_target PID 3844 set thread context of 3924 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 97 PID 3844 set thread context of 4036 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 99 PID 3844 set thread context of 4408 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 101 PID 3844 set thread context of 4328 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 102 PID 3844 set thread context of 2040 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 103 PID 3844 set thread context of 3748 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 104 PID 3844 set thread context of 4604 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 105 PID 3844 set thread context of 3604 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 106 PID 3844 set thread context of 4384 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 107 PID 3844 set thread context of 1556 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 108 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 50 IoCs
description pid Process procid_target PID 3844 wrote to memory of 3924 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 97 PID 3844 wrote to memory of 3924 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 97 PID 3844 wrote to memory of 3924 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 97 PID 3844 wrote to memory of 3924 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 97 PID 3844 wrote to memory of 3924 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 97 PID 3844 wrote to memory of 4036 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 99 PID 3844 wrote to memory of 4036 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 99 PID 3844 wrote to memory of 4036 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 99 PID 3844 wrote to memory of 4036 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 99 PID 3844 wrote to memory of 4036 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 99 PID 3844 wrote to memory of 4408 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 101 PID 3844 wrote to memory of 4408 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 101 PID 3844 wrote to memory of 4408 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 101 PID 3844 wrote to memory of 4408 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 101 PID 3844 wrote to memory of 4408 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 101 PID 3844 wrote to memory of 4328 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 102 PID 3844 wrote to memory of 4328 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 102 PID 3844 wrote to memory of 4328 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 102 PID 3844 wrote to memory of 4328 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 102 PID 3844 wrote to memory of 4328 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 102 PID 3844 wrote to memory of 2040 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 103 PID 3844 wrote to memory of 2040 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 103 PID 3844 wrote to memory of 2040 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 103 PID 3844 wrote to memory of 2040 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 103 PID 3844 wrote to memory of 2040 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 103 PID 3844 wrote to memory of 3748 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 104 PID 3844 wrote to memory of 3748 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 104 PID 3844 wrote to memory of 3748 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 104 PID 3844 wrote to memory of 3748 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 104 PID 3844 wrote to memory of 3748 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 104 PID 3844 wrote to memory of 4604 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 105 PID 3844 wrote to memory of 4604 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 105 PID 3844 wrote to memory of 4604 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 105 PID 3844 wrote to memory of 4604 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 105 PID 3844 wrote to memory of 4604 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 105 PID 3844 wrote to memory of 3604 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 106 PID 3844 wrote to memory of 3604 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 106 PID 3844 wrote to memory of 3604 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 106 PID 3844 wrote to memory of 3604 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 106 PID 3844 wrote to memory of 3604 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 106 PID 3844 wrote to memory of 4384 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 107 PID 3844 wrote to memory of 4384 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 107 PID 3844 wrote to memory of 4384 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 107 PID 3844 wrote to memory of 4384 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 107 PID 3844 wrote to memory of 4384 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 107 PID 3844 wrote to memory of 1556 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 108 PID 3844 wrote to memory of 1556 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 108 PID 3844 wrote to memory of 1556 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 108 PID 3844 wrote to memory of 1556 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 108 PID 3844 wrote to memory of 1556 3844 0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0def4e4fe77fc4499d9ade8db0f9c82a_JaffaCakes118.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3844 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v2.0.50727\\\\RegAsm.exe"2⤵
- Sets file execution options in registry
PID:3924
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v2.0.50727\\\\RegAsm.exe"2⤵
- Sets file execution options in registry
PID:4036
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v2.0.50727\\\\RegAsm.exe"2⤵
- Sets file execution options in registry
PID:4408
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v2.0.50727\\\\RegAsm.exe"2⤵
- Sets file execution options in registry
PID:4328
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v2.0.50727\\\\RegAsm.exe"2⤵
- Sets file execution options in registry
PID:2040
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v2.0.50727\\\\RegAsm.exe"2⤵
- Sets file execution options in registry
PID:3748
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v2.0.50727\\\\RegAsm.exe"2⤵
- Sets file execution options in registry
PID:4604
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v2.0.50727\\\\RegAsm.exe"2⤵
- Sets file execution options in registry
PID:3604
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v2.0.50727\\\\RegAsm.exe"2⤵
- Sets file execution options in registry
PID:4384
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v2.0.50727\\\\RegAsm.exe"2⤵PID:1556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4160 --field-trial-handle=2304,i,6987730730348465820,3913273227385401271,262144 --variations-seed-version /prefetch:81⤵PID:4660
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
680B
MD58faf48455ffc017246b08e89f6ba1956
SHA12f6c39d9828b3f95dc050f52a38cd7d3f543baf8
SHA2569a643ce75fdfe840ea158010f28f8520bea2a60220494b44a25039a2a318fc35
SHA512dafd4f1bf894ef1c61ff65dbcb8d5a151b33d8e39f3e354e6e433c8c7c0e8c2105615bffde8d796e361b77ccbe917a70ca4d03cc8cb6396f0495ff9e5b7010a9