Malware Analysis Report

2024-08-06 15:22

Sample ID 240517-3axd2agc8s
Target 50333dad192d9888ce17fa31bd466256JaffaCakes118.bin
SHA256 875f4d76e04760152792fddf09287455f38338fec927995d4227c0ff779ce2e4
Tags
nanocore evasion keylogger spyware stealer trojan persistence
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

875f4d76e04760152792fddf09287455f38338fec927995d4227c0ff779ce2e4

Threat Level: Known bad

The file 50333dad192d9888ce17fa31bd466256JaffaCakes118.bin was found to be: Known bad.

Malicious Activity Summary

nanocore evasion keylogger spyware stealer trojan persistence

NanoCore

Registers new Print Monitor

Executes dropped EXE

Loads dropped DLL

Checks computer location settings

Checks whether UAC is enabled

Drops desktop.ini file(s)

Suspicious use of SetThreadContext

Drops file in Windows directory

Unsigned PE

Enumerates physical storage devices

Suspicious behavior: EnumeratesProcesses

Suspicious use of WriteProcessMemory

Modifies data under HKEY_USERS

Suspicious behavior: GetForegroundWindowSpam

Runs ping.exe

Checks SCSI registry key(s)

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-05-17 23:19

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-17 23:19

Reported

2024-05-17 23:21

Platform

win7-20240419-en

Max time kernel

149s

Max time network

155s

Command Line

"C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256JaffaCakes118.exe"

Signatures

NanoCore

keylogger trojan stealer spyware nanocore

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe N/A

Enumerates physical storage devices

Runs ping.exe

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\PING.EXE N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256JaffaCakes118.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256JaffaCakes118.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 940 wrote to memory of 2772 N/A C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256JaffaCakes118.exe
PID 940 wrote to memory of 2772 N/A C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256JaffaCakes118.exe
PID 940 wrote to memory of 2772 N/A C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256JaffaCakes118.exe
PID 940 wrote to memory of 2772 N/A C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256JaffaCakes118.exe
PID 940 wrote to memory of 2772 N/A C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256JaffaCakes118.exe
PID 940 wrote to memory of 2772 N/A C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256JaffaCakes118.exe
PID 940 wrote to memory of 2772 N/A C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256JaffaCakes118.exe
PID 940 wrote to memory of 2772 N/A C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256JaffaCakes118.exe
PID 940 wrote to memory of 2772 N/A C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256JaffaCakes118.exe
PID 2772 wrote to memory of 2216 N/A C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256JaffaCakes118.exe C:\Windows\SysWOW64\cmd.exe
PID 2772 wrote to memory of 2216 N/A C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256JaffaCakes118.exe C:\Windows\SysWOW64\cmd.exe
PID 2772 wrote to memory of 2216 N/A C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256JaffaCakes118.exe C:\Windows\SysWOW64\cmd.exe
PID 2772 wrote to memory of 2216 N/A C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256JaffaCakes118.exe C:\Windows\SysWOW64\cmd.exe
PID 2216 wrote to memory of 2076 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\PING.EXE
PID 2216 wrote to memory of 2076 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\PING.EXE
PID 2216 wrote to memory of 2076 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\PING.EXE
PID 2216 wrote to memory of 2076 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\PING.EXE
PID 2216 wrote to memory of 2328 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe
PID 2216 wrote to memory of 2328 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe
PID 2216 wrote to memory of 2328 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe
PID 2216 wrote to memory of 2328 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe
PID 2328 wrote to memory of 2512 N/A C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe
PID 2328 wrote to memory of 2512 N/A C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe
PID 2328 wrote to memory of 2512 N/A C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe
PID 2328 wrote to memory of 2512 N/A C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe
PID 2328 wrote to memory of 2512 N/A C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe
PID 2328 wrote to memory of 2512 N/A C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe
PID 2328 wrote to memory of 2512 N/A C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe
PID 2328 wrote to memory of 2512 N/A C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe
PID 2328 wrote to memory of 2512 N/A C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe

Processes

C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256JaffaCakes118.exe"

C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256JaffaCakes118.exe"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 8000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256JaffaCakes118.exe"&start C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe

C:\Windows\SysWOW64\PING.EXE

ping 1.1.1.1 -n 1 -w 8000

C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe

C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe

C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe

"C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe"

C:\Windows\System32\spoolsv.exe

C:\Windows\System32\spoolsv.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp

Files

memory/940-0-0x0000000074281000-0x0000000074282000-memory.dmp

memory/940-1-0x0000000074280000-0x000000007482B000-memory.dmp

memory/940-2-0x0000000074280000-0x000000007482B000-memory.dmp

memory/2772-9-0x0000000000080000-0x00000000000C6000-memory.dmp

memory/2772-4-0x0000000000080000-0x00000000000C6000-memory.dmp

memory/2772-6-0x0000000000080000-0x00000000000C6000-memory.dmp

memory/2772-10-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

memory/2772-20-0x0000000000080000-0x00000000000C6000-memory.dmp

memory/2772-17-0x0000000000080000-0x00000000000C6000-memory.dmp

memory/2772-13-0x0000000000080000-0x00000000000C6000-memory.dmp

memory/2772-12-0x0000000000080000-0x00000000000C6000-memory.dmp

memory/2772-7-0x0000000000080000-0x00000000000C6000-memory.dmp

memory/2772-21-0x0000000074280000-0x000000007482B000-memory.dmp

memory/2772-22-0x0000000074280000-0x000000007482B000-memory.dmp

memory/2772-24-0x0000000074280000-0x000000007482B000-memory.dmp

\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe

MD5 50333dad192d9888ce17fa31bd466256
SHA1 0e13f68a360abd1e3e2f8e3601ed0bf1641196f0
SHA256 875f4d76e04760152792fddf09287455f38338fec927995d4227c0ff779ce2e4
SHA512 c3e9529180fb4327305de547e154fd720a9574ce3dbb97a09f07613255aa3b37b4f5aa97da3ca4e424d9dcbf320c783816b0c2453e5852cc1397fffef12a13e3

C:\Users\Admin\AppData\Local\Temp\svhost.exe

MD5 278edbd499374bf73621f8c1f969d894
SHA1 a81170af14747781c5f5f51bb1215893136f0bc0
SHA256 c6999b9f79932c3b4f1c461a69d9dc8dc301d6a155abc33efe1b6e9e4a038391
SHA512 93b0b5c3324bd2df83310f96d34c9176c94d2d676766599c1af33c98ba1efe63187056671f7c6f80c956e5bd0a725f108804021ad93326286bb9c3a96f6550b9

memory/2512-42-0x0000000000400000-0x0000000000446000-memory.dmp

memory/2512-41-0x0000000000400000-0x0000000000446000-memory.dmp

memory/2512-38-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

memory/940-43-0x0000000074280000-0x000000007482B000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-17 23:19

Reported

2024-05-17 23:21

Platform

win10v2004-20240508-en

Max time kernel

149s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256JaffaCakes118.exe"

Signatures

NanoCore

keylogger trojan stealer spyware nanocore

Registers new Print Monitor

persistence
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\Appmon\Ports C:\Windows\System32\spoolsv.exe N/A
Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\Microsoft Shared Fax Monitor C:\Windows\System32\spoolsv.exe N/A
Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\Standard TCP/IP Port C:\Windows\System32\spoolsv.exe N/A
Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\USB Monitor C:\Windows\System32\spoolsv.exe N/A
Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\WSD Port\Adapters\WSPrint C:\Windows\System32\spoolsv.exe N/A
Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\WSD Port\Adapters\WSPrint\OfflinePorts C:\Windows\System32\spoolsv.exe N/A
Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\Appmon C:\Windows\System32\spoolsv.exe N/A
Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\Local Port C:\Windows\System32\spoolsv.exe N/A
Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\Standard TCP/IP Port\Ports C:\Windows\System32\spoolsv.exe N/A
Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\WSD Port C:\Windows\System32\spoolsv.exe N/A
Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\WSD Port\Ports C:\Windows\System32\spoolsv.exe N/A
Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\WSD Port\Adapters\IPP C:\Windows\System32\spoolsv.exe N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256JaffaCakes118.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe N/A

Drops desktop.ini file(s)

Description Indicator Process Target
File created C:\Windows\assembly\Desktop.ini C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256JaffaCakes118.exe N/A
File opened for modification C:\Windows\assembly\Desktop.ini C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256JaffaCakes118.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\assembly\Desktop.ini C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256JaffaCakes118.exe N/A
File opened for modification C:\Windows\assembly\Desktop.ini C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256JaffaCakes118.exe N/A
File opened for modification C:\Windows\assembly C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256JaffaCakes118.exe N/A

Enumerates physical storage devices

Checks SCSI registry key(s)

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 C:\Windows\System32\spoolsv.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 C:\Windows\System32\spoolsv.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0002 C:\Windows\System32\spoolsv.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID C:\Windows\System32\spoolsv.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 C:\Windows\System32\spoolsv.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0002 C:\Windows\System32\spoolsv.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0002 C:\Windows\System32\spoolsv.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID C:\Windows\System32\spoolsv.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID C:\Windows\System32\spoolsv.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID C:\Windows\System32\spoolsv.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0002 C:\Windows\System32\spoolsv.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 C:\Windows\System32\spoolsv.exe N/A

Modifies data under HKEY_USERS

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\Devices C:\Windows\System32\spoolsv.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Microsoft Print to PDF = "winspool,Ne01:,15,45" C:\Windows\System32\spoolsv.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Fax = "winspool,Ne02:,15,45" C:\Windows\System32\spoolsv.exe N/A
Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows NT\CurrentVersion\Devices C:\Windows\System32\spoolsv.exe N/A
Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts C:\Windows\System32\spoolsv.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Devices\Microsoft XPS Document Writer = "winspool,Ne00:" C:\Windows\System32\spoolsv.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Devices\Fax = "winspool,Ne02:" C:\Windows\System32\spoolsv.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Devices\Send To OneNote 2016 = "winspool,nul:" C:\Windows\System32\spoolsv.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Devices\Microsoft Print to PDF = "winspool,Ne01:" C:\Windows\System32\spoolsv.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Devices\Fax = "winspool,Ne02:" C:\Windows\System32\spoolsv.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows NT\CurrentVersion\Devices C:\Windows\System32\spoolsv.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts C:\Windows\System32\spoolsv.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Send To OneNote 2016 = "winspool,nul:,15,45" C:\Windows\System32\spoolsv.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Microsoft XPS Document Writer = "winspool,Ne00:,15,45" C:\Windows\System32\spoolsv.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Send To OneNote 2016 = "winspool,nul:,15,45" C:\Windows\System32\spoolsv.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Devices\Microsoft XPS Document Writer = "winspool,Ne00:" C:\Windows\System32\spoolsv.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Microsoft XPS Document Writer = "winspool,Ne00:,15,45" C:\Windows\System32\spoolsv.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Microsoft Print to PDF = "winspool,Ne01:,15,45" C:\Windows\System32\spoolsv.exe N/A
Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts C:\Windows\System32\spoolsv.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Devices\Send To OneNote 2016 = "winspool,nul:" C:\Windows\System32\spoolsv.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Devices\Microsoft Print to PDF = "winspool,Ne01:" C:\Windows\System32\spoolsv.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Fax = "winspool,Ne02:,15,45" C:\Windows\System32\spoolsv.exe N/A

Runs ping.exe

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\PING.EXE N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256JaffaCakes118.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256JaffaCakes118.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3452 wrote to memory of 2276 N/A C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256JaffaCakes118.exe
PID 3452 wrote to memory of 2276 N/A C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256JaffaCakes118.exe
PID 3452 wrote to memory of 2276 N/A C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256JaffaCakes118.exe
PID 3452 wrote to memory of 2276 N/A C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256JaffaCakes118.exe
PID 3452 wrote to memory of 2276 N/A C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256JaffaCakes118.exe
PID 3452 wrote to memory of 2276 N/A C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256JaffaCakes118.exe
PID 3452 wrote to memory of 2276 N/A C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256JaffaCakes118.exe
PID 3452 wrote to memory of 2276 N/A C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256JaffaCakes118.exe
PID 2276 wrote to memory of 3300 N/A C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256JaffaCakes118.exe C:\Windows\SysWOW64\cmd.exe
PID 2276 wrote to memory of 3300 N/A C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256JaffaCakes118.exe C:\Windows\SysWOW64\cmd.exe
PID 2276 wrote to memory of 3300 N/A C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256JaffaCakes118.exe C:\Windows\SysWOW64\cmd.exe
PID 3300 wrote to memory of 3216 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\PING.EXE
PID 3300 wrote to memory of 3216 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\PING.EXE
PID 3300 wrote to memory of 3216 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\PING.EXE
PID 3300 wrote to memory of 4612 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe
PID 3300 wrote to memory of 4612 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe
PID 3300 wrote to memory of 4612 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe
PID 4612 wrote to memory of 2736 N/A C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe
PID 4612 wrote to memory of 2736 N/A C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe
PID 4612 wrote to memory of 2736 N/A C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe
PID 4612 wrote to memory of 2736 N/A C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe
PID 4612 wrote to memory of 2736 N/A C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe
PID 4612 wrote to memory of 2736 N/A C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe
PID 4612 wrote to memory of 2736 N/A C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe
PID 4612 wrote to memory of 2736 N/A C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe

Processes

C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256JaffaCakes118.exe"

C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256JaffaCakes118.exe"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 8000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256JaffaCakes118.exe"&start C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe

C:\Windows\SysWOW64\PING.EXE

ping 1.1.1.1 -n 1 -w 8000

C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe

C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe

C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe

"C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe"

C:\Windows\System32\spoolsv.exe

C:\Windows\System32\spoolsv.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
US 8.8.8.8:53 4.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 43.58.199.20.in-addr.arpa udp
NL 23.62.61.155:443 www.bing.com tcp
US 8.8.8.8:53 155.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.8.8:53 4.4.8.8.in-addr.arpa udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.8.8:53 183.142.211.20.in-addr.arpa udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 48.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 55.36.223.20.in-addr.arpa udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.8.8:53 76.234.34.23.in-addr.arpa udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp

Files

memory/3452-0-0x00000000751B2000-0x00000000751B3000-memory.dmp

memory/3452-1-0x00000000751B0000-0x0000000075761000-memory.dmp

memory/3452-2-0x00000000751B0000-0x0000000075761000-memory.dmp

memory/2276-6-0x0000000000400000-0x0000000000446000-memory.dmp

memory/2276-7-0x00000000751B0000-0x0000000075761000-memory.dmp

memory/2276-8-0x00000000751B0000-0x0000000075761000-memory.dmp

memory/2276-11-0x00000000751B0000-0x0000000075761000-memory.dmp

C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe

MD5 50333dad192d9888ce17fa31bd466256
SHA1 0e13f68a360abd1e3e2f8e3601ed0bf1641196f0
SHA256 875f4d76e04760152792fddf09287455f38338fec927995d4227c0ff779ce2e4
SHA512 c3e9529180fb4327305de547e154fd720a9574ce3dbb97a09f07613255aa3b37b4f5aa97da3ca4e424d9dcbf320c783816b0c2453e5852cc1397fffef12a13e3

memory/4612-15-0x00000000751B0000-0x0000000075761000-memory.dmp

memory/4612-16-0x00000000751B0000-0x0000000075761000-memory.dmp

memory/4612-17-0x00000000751B0000-0x0000000075761000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\svhost.exe

MD5 a64daca3cfbcd039df3ec29d3eddd001
SHA1 eee8b2573f71e8d5c3ee7e53af3e6772e090d0f3
SHA256 403752009f29381d5e4036b8be94589c89188f9ce8ef5f86959eaaada019ed36
SHA512 b6fe2d0ae3fcd4442579ecf10d498d61e0f042813c8fc4be8019da77d849cfcf0b168507139a1b5697227c272de9091788f8e03cf1ce13d5b5077568cfa6a479

C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\50333dad192d9888ce17fa31bd466256JaffaCakes118.exe.log

MD5 a5dcc7c9c08af7dddd82be5b036a4416
SHA1 4f998ca1526d199e355ffb435bae111a2779b994
SHA256 e24033ceec97fd03402b03acaaabd1d1e378e83bb1683afbccac760e00f8ead5
SHA512 56035de734836c0c39f0b48641c51c26adb6e79c6c65e23ca96603f71c95b8673e2ef853146e87efc899dd1878d0bbc2c82d91fbf0fce81c552048e986f9bb5a

memory/3452-23-0x00000000751B0000-0x0000000075761000-memory.dmp

memory/4612-26-0x00000000751B0000-0x0000000075761000-memory.dmp