Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/05/2024, 19:28 UTC

General

  • Target

    3bb4ff5b5a89a36b3d778c2eb16e78db_JaffaCakes118.exe

  • Size

    504KB

  • MD5

    3bb4ff5b5a89a36b3d778c2eb16e78db

  • SHA1

    b9c448d3353e334b989534d18e790996fc1e0ff5

  • SHA256

    dac3c80a4012abff4b112bed6050aae6a8fc8221ac652af65e526428a54f4805

  • SHA512

    8d06c5a36c00c52209f4d59c36f955bf9b104d8f538aeef34dd4739959f8cb4860b6e0039ba4c1a5907c92f1eb53e859c6a86490b39ee7cd1f0b6825ef3b9404

  • SSDEEP

    12288:k6PSxv0wQ/aD3cknoqCLd3n8ULVVAwBEzDRZ452Vn:k6BwAGoPL6ULV2NR+5w

Malware Config

Signatures

  • Imminent RAT

    Remote-access trojan based on Imminent Monitor remote admin software.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • NTFS ADS 4 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3bb4ff5b5a89a36b3d778c2eb16e78db_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3bb4ff5b5a89a36b3d778c2eb16e78db_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3704
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\Temp\3bb4ff5b5a89a36b3d778c2eb16e78db_JaffaCakes118.exe:Zone.Identifier"
      2⤵
      • NTFS ADS
      PID:4932
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\Temp\3bb4ff5b5a89a36b3d778c2eb16e78db_JaffaCakes118.exe:Zone.Identifier"
      2⤵
      • NTFS ADS
      PID:1404
    • C:\Users\Admin\AppData\Local\Temp\3bb4ff5b5a89a36b3d778c2eb16e78db_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\3bb4ff5b5a89a36b3d778c2eb16e78db_JaffaCakes118.exe"
      2⤵
      • Checks computer location settings
      • Deletes itself
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3856
      • C:\Users\Admin\AppData\Local\Temp\3bb4ff5b5a89a36b3d778c2eb16e78db_jaffacakes118\3bb4ff5b5a89a36b3d778c2eb16e78db_jaffacakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\3bb4ff5b5a89a36b3d778c2eb16e78db_jaffacakes118\3bb4ff5b5a89a36b3d778c2eb16e78db_jaffacakes118.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2360
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\Temp\3bb4ff5b5a89a36b3d778c2eb16e78db_jaffacakes118\3bb4ff5b5a89a36b3d778c2eb16e78db_jaffacakes118.exe:Zone.Identifier"
          4⤵
          • NTFS ADS
          PID:3228
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\Temp\3bb4ff5b5a89a36b3d778c2eb16e78db_jaffacakes118\3bb4ff5b5a89a36b3d778c2eb16e78db_jaffacakes118.exe:Zone.Identifier"
          4⤵
          • NTFS ADS
          PID:3940
        • C:\Users\Admin\AppData\Local\Temp\3bb4ff5b5a89a36b3d778c2eb16e78db_jaffacakes118\3bb4ff5b5a89a36b3d778c2eb16e78db_jaffacakes118.exe
          "C:\Users\Admin\AppData\Local\Temp\3bb4ff5b5a89a36b3d778c2eb16e78db_jaffacakes118\3bb4ff5b5a89a36b3d778c2eb16e78db_jaffacakes118.exe"
          4⤵
          • Executes dropped EXE
          PID:4272
        • C:\Users\Admin\AppData\Local\Temp\3bb4ff5b5a89a36b3d778c2eb16e78db_jaffacakes118\3bb4ff5b5a89a36b3d778c2eb16e78db_jaffacakes118.exe
          "C:\Users\Admin\AppData\Local\Temp\3bb4ff5b5a89a36b3d778c2eb16e78db_jaffacakes118\3bb4ff5b5a89a36b3d778c2eb16e78db_jaffacakes118.exe"
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4612
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2360 -s 1660
          4⤵
          • Program crash
          PID:3344
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 1000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\3bb4ff5b5a89a36b3d778c2eb16e78db_JaffaCakes118.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4052
        • C:\Windows\SysWOW64\PING.EXE
          ping 1.1.1.1 -n 1 -w 1000
          4⤵
          • Runs ping.exe
          PID:2736
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3704 -s 1640
      2⤵
      • Program crash
      PID:4800
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3704 -ip 3704
    1⤵
      PID:1372
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 2360 -ip 2360
      1⤵
        PID:3700
      • C:\Windows\system32\wbem\WmiApSrv.exe
        C:\Windows\system32\wbem\WmiApSrv.exe
        1⤵
          PID:5104

        Network

        • flag-us
          DNS
          20.160.190.20.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          20.160.190.20.in-addr.arpa
          IN PTR
          Response
        • flag-us
          DNS
          88.156.103.20.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          88.156.103.20.in-addr.arpa
          IN PTR
          Response
        • flag-be
          GET
          https://www.bing.com/th?id=OADD2.10239359720591_10PHTLBML42K6TRZO&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=24&h=24&dynsize=1&qlt=90
          Remote address:
          88.221.83.192:443
          Request
          GET /th?id=OADD2.10239359720591_10PHTLBML42K6TRZO&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=24&h=24&dynsize=1&qlt=90 HTTP/2.0
          host: www.bing.com
          accept: */*
          accept-encoding: gzip, deflate, br
          user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
          Response
          HTTP/2.0 200
          cache-control: public, max-age=2592000
          content-type: image/png
          access-control-allow-origin: *
          access-control-allow-headers: *
          access-control-allow-methods: GET, POST, OPTIONS
          timing-allow-origin: *
          report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
          nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
          content-length: 1107
          date: Sun, 12 May 2024 19:28:42 GMT
          alt-svc: h3=":443"; ma=93600
          x-cdn-traceid: 0.bc53dd58.1715542122.162953fc
        • flag-us
          DNS
          249.197.17.2.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          249.197.17.2.in-addr.arpa
          IN PTR
          Response
          249.197.17.2.in-addr.arpa
          IN PTR
          a2-17-197-249deploystaticakamaitechnologiescom
        • flag-us
          DNS
          192.83.221.88.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          192.83.221.88.in-addr.arpa
          IN PTR
          Response
          192.83.221.88.in-addr.arpa
          IN PTR
          a88-221-83-192deploystaticakamaitechnologiescom
        • flag-us
          DNS
          192.83.221.88.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          192.83.221.88.in-addr.arpa
          IN PTR
        • flag-us
          DNS
          183.59.114.20.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          183.59.114.20.in-addr.arpa
          IN PTR
          Response
        • flag-us
          DNS
          206.23.85.13.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          206.23.85.13.in-addr.arpa
          IN PTR
          Response
        • flag-us
          DNS
          172.210.232.199.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          172.210.232.199.in-addr.arpa
          IN PTR
          Response
        • flag-us
          DNS
          hadkhadma.hopto.org
          3bb4ff5b5a89a36b3d778c2eb16e78db_jaffacakes118.exe
          Remote address:
          8.8.8.8:53
          Request
          hadkhadma.hopto.org
          IN A
          Response
        • flag-us
          DNS
          hadkhadma.hopto.org
          3bb4ff5b5a89a36b3d778c2eb16e78db_jaffacakes118.exe
          Remote address:
          8.8.8.8:53
          Request
          hadkhadma.hopto.org
          IN A
          Response
        • flag-us
          DNS
          hadkhadma.hopto.org
          3bb4ff5b5a89a36b3d778c2eb16e78db_jaffacakes118.exe
          Remote address:
          8.8.8.8:53
          Request
          hadkhadma.hopto.org
          IN A
          Response
        • flag-us
          DNS
          hadkhadma.hopto.org
          3bb4ff5b5a89a36b3d778c2eb16e78db_jaffacakes118.exe
          Remote address:
          8.8.8.8:53
          Request
          hadkhadma.hopto.org
          IN A
          Response
        • flag-us
          DNS
          hadkhadma.hopto.org
          3bb4ff5b5a89a36b3d778c2eb16e78db_jaffacakes118.exe
          Remote address:
          8.8.8.8:53
          Request
          hadkhadma.hopto.org
          IN A
          Response
        • flag-us
          DNS
          hadkhadma.hopto.org
          3bb4ff5b5a89a36b3d778c2eb16e78db_jaffacakes118.exe
          Remote address:
          8.8.8.8:53
          Request
          hadkhadma.hopto.org
          IN A
          Response
        • flag-us
          DNS
          hadkhadma.hopto.org
          3bb4ff5b5a89a36b3d778c2eb16e78db_jaffacakes118.exe
          Remote address:
          8.8.8.8:53
          Request
          hadkhadma.hopto.org
          IN A
          Response
        • flag-us
          DNS
          hadkhadma.hopto.org
          3bb4ff5b5a89a36b3d778c2eb16e78db_jaffacakes118.exe
          Remote address:
          8.8.8.8:53
          Request
          hadkhadma.hopto.org
          IN A
          Response
        • flag-us
          DNS
          hadkhadma.hopto.org
          3bb4ff5b5a89a36b3d778c2eb16e78db_jaffacakes118.exe
          Remote address:
          8.8.8.8:53
          Request
          hadkhadma.hopto.org
          IN A
          Response
        • flag-us
          DNS
          hadkhadma.hopto.org
          3bb4ff5b5a89a36b3d778c2eb16e78db_jaffacakes118.exe
          Remote address:
          8.8.8.8:53
          Request
          hadkhadma.hopto.org
          IN A
          Response
        • flag-us
          DNS
          hadkhadma.hopto.org
          3bb4ff5b5a89a36b3d778c2eb16e78db_jaffacakes118.exe
          Remote address:
          8.8.8.8:53
          Request
          hadkhadma.hopto.org
          IN A
          Response
        • flag-us
          DNS
          hadkhadma.hopto.org
          3bb4ff5b5a89a36b3d778c2eb16e78db_jaffacakes118.exe
          Remote address:
          8.8.8.8:53
          Request
          hadkhadma.hopto.org
          IN A
          Response
        • flag-us
          DNS
          43.229.111.52.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          43.229.111.52.in-addr.arpa
          IN PTR
          Response
        • flag-us
          DNS
          240.197.17.2.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          240.197.17.2.in-addr.arpa
          IN PTR
          Response
          240.197.17.2.in-addr.arpa
          IN PTR
          a2-17-197-240deploystaticakamaitechnologiescom
        • flag-us
          DNS
          hadkhadma.hopto.org
          3bb4ff5b5a89a36b3d778c2eb16e78db_jaffacakes118.exe
          Remote address:
          8.8.8.8:53
          Request
          hadkhadma.hopto.org
          IN A
          Response
        • flag-us
          DNS
          hadkhadma.hopto.org
          3bb4ff5b5a89a36b3d778c2eb16e78db_jaffacakes118.exe
          Remote address:
          8.8.8.8:53
          Request
          hadkhadma.hopto.org
          IN A
          Response
        • flag-us
          DNS
          hadkhadma.hopto.org
          3bb4ff5b5a89a36b3d778c2eb16e78db_jaffacakes118.exe
          Remote address:
          8.8.8.8:53
          Request
          hadkhadma.hopto.org
          IN A
          Response
        • flag-us
          DNS
          hadkhadma.hopto.org
          3bb4ff5b5a89a36b3d778c2eb16e78db_jaffacakes118.exe
          Remote address:
          8.8.8.8:53
          Request
          hadkhadma.hopto.org
          IN A
          Response
        • flag-us
          DNS
          hadkhadma.hopto.org
          3bb4ff5b5a89a36b3d778c2eb16e78db_jaffacakes118.exe
          Remote address:
          8.8.8.8:53
          Request
          hadkhadma.hopto.org
          IN A
        • flag-us
          DNS
          hadkhadma.hopto.org
          3bb4ff5b5a89a36b3d778c2eb16e78db_jaffacakes118.exe
          Remote address:
          8.8.8.8:53
          Request
          hadkhadma.hopto.org
          IN A
          Response
        • flag-us
          DNS
          hadkhadma.hopto.org
          3bb4ff5b5a89a36b3d778c2eb16e78db_jaffacakes118.exe
          Remote address:
          8.8.8.8:53
          Request
          hadkhadma.hopto.org
          IN A
          Response
        • flag-us
          DNS
          hadkhadma.hopto.org
          3bb4ff5b5a89a36b3d778c2eb16e78db_jaffacakes118.exe
          Remote address:
          8.8.8.8:53
          Request
          hadkhadma.hopto.org
          IN A
          Response
        • flag-us
          DNS
          hadkhadma.hopto.org
          3bb4ff5b5a89a36b3d778c2eb16e78db_jaffacakes118.exe
          Remote address:
          8.8.8.8:53
          Request
          hadkhadma.hopto.org
          IN A
          Response
        • flag-us
          DNS
          hadkhadma.hopto.org
          3bb4ff5b5a89a36b3d778c2eb16e78db_jaffacakes118.exe
          Remote address:
          8.8.8.8:53
          Request
          hadkhadma.hopto.org
          IN A
          Response
        • flag-us
          DNS
          hadkhadma.hopto.org
          3bb4ff5b5a89a36b3d778c2eb16e78db_jaffacakes118.exe
          Remote address:
          8.8.8.8:53
          Request
          hadkhadma.hopto.org
          IN A
          Response
        • flag-us
          DNS
          10.173.189.20.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          10.173.189.20.in-addr.arpa
          IN PTR
          Response
        • 88.221.83.192:443
          https://www.bing.com/th?id=OADD2.10239359720591_10PHTLBML42K6TRZO&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=24&h=24&dynsize=1&qlt=90
          tls, http2
          1.4kB
          6.3kB
          16
          11

          HTTP Request

          GET https://www.bing.com/th?id=OADD2.10239359720591_10PHTLBML42K6TRZO&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=24&h=24&dynsize=1&qlt=90

          HTTP Response

          200
        • 8.8.8.8:53
          20.160.190.20.in-addr.arpa
          dns
          72 B
          158 B
          1
          1

          DNS Request

          20.160.190.20.in-addr.arpa

        • 8.8.8.8:53
          88.156.103.20.in-addr.arpa
          dns
          72 B
          158 B
          1
          1

          DNS Request

          88.156.103.20.in-addr.arpa

        • 8.8.8.8:53
          249.197.17.2.in-addr.arpa
          dns
          71 B
          135 B
          1
          1

          DNS Request

          249.197.17.2.in-addr.arpa

        • 8.8.8.8:53
          192.83.221.88.in-addr.arpa
          dns
          144 B
          137 B
          2
          1

          DNS Request

          192.83.221.88.in-addr.arpa

          DNS Request

          192.83.221.88.in-addr.arpa

        • 8.8.8.8:53
          183.59.114.20.in-addr.arpa
          dns
          72 B
          158 B
          1
          1

          DNS Request

          183.59.114.20.in-addr.arpa

        • 8.8.8.8:53
          206.23.85.13.in-addr.arpa
          dns
          71 B
          145 B
          1
          1

          DNS Request

          206.23.85.13.in-addr.arpa

        • 8.8.8.8:53
          172.210.232.199.in-addr.arpa
          dns
          74 B
          128 B
          1
          1

          DNS Request

          172.210.232.199.in-addr.arpa

        • 8.8.8.8:53
          hadkhadma.hopto.org
          dns
          3bb4ff5b5a89a36b3d778c2eb16e78db_jaffacakes118.exe
          65 B
          125 B
          1
          1

          DNS Request

          hadkhadma.hopto.org

        • 8.8.8.8:53
          hadkhadma.hopto.org
          dns
          3bb4ff5b5a89a36b3d778c2eb16e78db_jaffacakes118.exe
          65 B
          125 B
          1
          1

          DNS Request

          hadkhadma.hopto.org

        • 8.8.8.8:53
          hadkhadma.hopto.org
          dns
          3bb4ff5b5a89a36b3d778c2eb16e78db_jaffacakes118.exe
          65 B
          125 B
          1
          1

          DNS Request

          hadkhadma.hopto.org

        • 8.8.8.8:53
          hadkhadma.hopto.org
          dns
          3bb4ff5b5a89a36b3d778c2eb16e78db_jaffacakes118.exe
          65 B
          125 B
          1
          1

          DNS Request

          hadkhadma.hopto.org

        • 8.8.8.8:53
          hadkhadma.hopto.org
          dns
          3bb4ff5b5a89a36b3d778c2eb16e78db_jaffacakes118.exe
          65 B
          125 B
          1
          1

          DNS Request

          hadkhadma.hopto.org

        • 8.8.8.8:53
          hadkhadma.hopto.org
          dns
          3bb4ff5b5a89a36b3d778c2eb16e78db_jaffacakes118.exe
          65 B
          125 B
          1
          1

          DNS Request

          hadkhadma.hopto.org

        • 8.8.8.8:53
          hadkhadma.hopto.org
          dns
          3bb4ff5b5a89a36b3d778c2eb16e78db_jaffacakes118.exe
          65 B
          125 B
          1
          1

          DNS Request

          hadkhadma.hopto.org

        • 8.8.8.8:53
          hadkhadma.hopto.org
          dns
          3bb4ff5b5a89a36b3d778c2eb16e78db_jaffacakes118.exe
          65 B
          125 B
          1
          1

          DNS Request

          hadkhadma.hopto.org

        • 8.8.8.8:53
          hadkhadma.hopto.org
          dns
          3bb4ff5b5a89a36b3d778c2eb16e78db_jaffacakes118.exe
          65 B
          125 B
          1
          1

          DNS Request

          hadkhadma.hopto.org

        • 8.8.8.8:53
          hadkhadma.hopto.org
          dns
          3bb4ff5b5a89a36b3d778c2eb16e78db_jaffacakes118.exe
          65 B
          125 B
          1
          1

          DNS Request

          hadkhadma.hopto.org

        • 8.8.8.8:53
          hadkhadma.hopto.org
          dns
          3bb4ff5b5a89a36b3d778c2eb16e78db_jaffacakes118.exe
          65 B
          125 B
          1
          1

          DNS Request

          hadkhadma.hopto.org

        • 8.8.8.8:53
          hadkhadma.hopto.org
          dns
          3bb4ff5b5a89a36b3d778c2eb16e78db_jaffacakes118.exe
          65 B
          125 B
          1
          1

          DNS Request

          hadkhadma.hopto.org

        • 8.8.8.8:53
          43.229.111.52.in-addr.arpa
          dns
          72 B
          158 B
          1
          1

          DNS Request

          43.229.111.52.in-addr.arpa

        • 8.8.8.8:53
          240.197.17.2.in-addr.arpa
          dns
          71 B
          135 B
          1
          1

          DNS Request

          240.197.17.2.in-addr.arpa

        • 8.8.8.8:53
          hadkhadma.hopto.org
          dns
          3bb4ff5b5a89a36b3d778c2eb16e78db_jaffacakes118.exe
          65 B
          125 B
          1
          1

          DNS Request

          hadkhadma.hopto.org

        • 8.8.8.8:53
          hadkhadma.hopto.org
          dns
          3bb4ff5b5a89a36b3d778c2eb16e78db_jaffacakes118.exe
          65 B
          125 B
          1
          1

          DNS Request

          hadkhadma.hopto.org

        • 8.8.8.8:53
          hadkhadma.hopto.org
          dns
          3bb4ff5b5a89a36b3d778c2eb16e78db_jaffacakes118.exe
          65 B
          125 B
          1
          1

          DNS Request

          hadkhadma.hopto.org

        • 8.8.8.8:53
          hadkhadma.hopto.org
          dns
          3bb4ff5b5a89a36b3d778c2eb16e78db_jaffacakes118.exe
          130 B
          125 B
          2
          1

          DNS Request

          hadkhadma.hopto.org

          DNS Request

          hadkhadma.hopto.org

        • 8.8.8.8:53
          hadkhadma.hopto.org
          dns
          3bb4ff5b5a89a36b3d778c2eb16e78db_jaffacakes118.exe
          65 B
          125 B
          1
          1

          DNS Request

          hadkhadma.hopto.org

        • 8.8.8.8:53
          hadkhadma.hopto.org
          dns
          3bb4ff5b5a89a36b3d778c2eb16e78db_jaffacakes118.exe
          65 B
          125 B
          1
          1

          DNS Request

          hadkhadma.hopto.org

        • 8.8.8.8:53
          hadkhadma.hopto.org
          dns
          3bb4ff5b5a89a36b3d778c2eb16e78db_jaffacakes118.exe
          65 B
          125 B
          1
          1

          DNS Request

          hadkhadma.hopto.org

        • 8.8.8.8:53
          hadkhadma.hopto.org
          dns
          3bb4ff5b5a89a36b3d778c2eb16e78db_jaffacakes118.exe
          65 B
          125 B
          1
          1

          DNS Request

          hadkhadma.hopto.org

        • 8.8.8.8:53
          hadkhadma.hopto.org
          dns
          3bb4ff5b5a89a36b3d778c2eb16e78db_jaffacakes118.exe
          65 B
          125 B
          1
          1

          DNS Request

          hadkhadma.hopto.org

        • 8.8.8.8:53
          hadkhadma.hopto.org
          dns
          3bb4ff5b5a89a36b3d778c2eb16e78db_jaffacakes118.exe
          65 B
          125 B
          1
          1

          DNS Request

          hadkhadma.hopto.org

        • 8.8.8.8:53
          10.173.189.20.in-addr.arpa
          dns
          72 B
          158 B
          1
          1

          DNS Request

          10.173.189.20.in-addr.arpa

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\3bb4ff5b5a89a36b3d778c2eb16e78db_jaffacakes118.exe.log

          Filesize

          1KB

          MD5

          2000734e67234d81547b2444338b1cb5

          SHA1

          d917a0237fc2457dac54a91278e21fb6fa037f9f

          SHA256

          68969eda649b087bfe2e5ef372a69170082ea59f3f173a16803b0c4921c98f20

          SHA512

          a412609db274a0c2d6040f3c1779a262063fb3394a061aefae6ab715ca027f3e23ea63eae8a6fc8fdb615ae53248cc5034e9a9572494217ec971a20dd978ce1e

        • C:\Users\Admin\AppData\Local\Temp\3bb4ff5b5a89a36b3d778c2eb16e78db_JaffaCakes118.exe

          Filesize

          504KB

          MD5

          3bb4ff5b5a89a36b3d778c2eb16e78db

          SHA1

          b9c448d3353e334b989534d18e790996fc1e0ff5

          SHA256

          dac3c80a4012abff4b112bed6050aae6a8fc8221ac652af65e526428a54f4805

          SHA512

          8d06c5a36c00c52209f4d59c36f955bf9b104d8f538aeef34dd4739959f8cb4860b6e0039ba4c1a5907c92f1eb53e859c6a86490b39ee7cd1f0b6825ef3b9404

        • C:\Users\Admin\AppData\Roaming\Imminent\Path.dat

          Filesize

          45B

          MD5

          c95f27b18ff9d3186958898f2722e8f4

          SHA1

          32af07c538bbe68b907d3e72f5e329ed05a1f56a

          SHA256

          a3386cea4585dd7bda41300ba54f12ce5e76434ce4bd535fc71c21b0b4ea5456

          SHA512

          082db17a43d6261a65922b2d314897b6108fa717d9748fc9fffe4a36060f71edb799aadd43825d4bb90f29581216e408f96081409c3835ea78787728993365e2

        • memory/3704-5-0x0000000005380000-0x00000000053AA000-memory.dmp

          Filesize

          168KB

        • memory/3704-12-0x00000000088C0000-0x00000000088CC000-memory.dmp

          Filesize

          48KB

        • memory/3704-26-0x0000000074810000-0x0000000074FC0000-memory.dmp

          Filesize

          7.7MB

        • memory/3704-6-0x0000000007F80000-0x0000000008142000-memory.dmp

          Filesize

          1.8MB

        • memory/3704-7-0x0000000007E20000-0x0000000007E86000-memory.dmp

          Filesize

          408KB

        • memory/3704-8-0x0000000074810000-0x0000000074FC0000-memory.dmp

          Filesize

          7.7MB

        • memory/3704-10-0x0000000008920000-0x0000000008942000-memory.dmp

          Filesize

          136KB

        • memory/3704-9-0x00000000088D0000-0x00000000088D8000-memory.dmp

          Filesize

          32KB

        • memory/3704-11-0x0000000004BC0000-0x0000000004BCC000-memory.dmp

          Filesize

          48KB

        • memory/3704-4-0x0000000005100000-0x00000000051BA000-memory.dmp

          Filesize

          744KB

        • memory/3704-13-0x00000000092D0000-0x000000000936C000-memory.dmp

          Filesize

          624KB

        • memory/3704-3-0x00000000051E0000-0x0000000005272000-memory.dmp

          Filesize

          584KB

        • memory/3704-2-0x0000000005790000-0x0000000005D34000-memory.dmp

          Filesize

          5.6MB

        • memory/3704-1-0x0000000000720000-0x00000000007A8000-memory.dmp

          Filesize

          544KB

        • memory/3704-0-0x000000007481E000-0x000000007481F000-memory.dmp

          Filesize

          4KB

        • memory/3744-46-0x0000000000DF0000-0x0000000000DF5000-memory.dmp

          Filesize

          20KB

        • memory/3744-47-0x0000000000DF0000-0x0000000000DF5000-memory.dmp

          Filesize

          20KB

        • memory/3744-45-0x0000000000DF0000-0x0000000000DF5000-memory.dmp

          Filesize

          20KB

        • memory/3856-18-0x0000000074810000-0x0000000074FC0000-memory.dmp

          Filesize

          7.7MB

        • memory/3856-17-0x0000000002ED0000-0x0000000002EE0000-memory.dmp

          Filesize

          64KB

        • memory/3856-14-0x0000000000400000-0x0000000000456000-memory.dmp

          Filesize

          344KB

        • memory/3856-16-0x0000000074810000-0x0000000074FC0000-memory.dmp

          Filesize

          7.7MB

        • memory/3856-22-0x00000000066A0000-0x00000000066A8000-memory.dmp

          Filesize

          32KB

        • memory/3856-21-0x0000000006680000-0x0000000006690000-memory.dmp

          Filesize

          64KB

        • memory/3856-27-0x0000000006D00000-0x0000000006D18000-memory.dmp

          Filesize

          96KB

        • memory/3856-40-0x0000000074810000-0x0000000074FC0000-memory.dmp

          Filesize

          7.7MB

        • memory/3856-20-0x0000000005610000-0x0000000005638000-memory.dmp

          Filesize

          160KB

        • memory/3856-19-0x0000000005440000-0x00000000054EE000-memory.dmp

          Filesize

          696KB

        • memory/3872-25-0x00000000007B0000-0x00000000007B5000-memory.dmp

          Filesize

          20KB

        • memory/3872-23-0x00000000007B0000-0x00000000007B5000-memory.dmp

          Filesize

          20KB

        • memory/3872-24-0x00000000007B0000-0x00000000007B5000-memory.dmp

          Filesize

          20KB

        • memory/4612-48-0x0000000006D50000-0x0000000006D68000-memory.dmp

          Filesize

          96KB

        • memory/4612-51-0x0000000006D80000-0x0000000006D96000-memory.dmp

          Filesize

          88KB

        • memory/4612-52-0x00000000070A0000-0x00000000070AA000-memory.dmp

          Filesize

          40KB

        We care about your privacy.

        This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.