Malware Analysis Report

2024-08-06 15:22

Sample ID 240517-sw1ngaea9w
Target 50333dad192d9888ce17fa31bd466256_JaffaCakes118
SHA256 875f4d76e04760152792fddf09287455f38338fec927995d4227c0ff779ce2e4
Tags
nanocore evasion keylogger spyware stealer trojan persistence
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

875f4d76e04760152792fddf09287455f38338fec927995d4227c0ff779ce2e4

Threat Level: Known bad

The file 50333dad192d9888ce17fa31bd466256_JaffaCakes118 was found to be: Known bad.

Malicious Activity Summary

nanocore evasion keylogger spyware stealer trojan persistence

NanoCore

Registers new Print Monitor

Checks computer location settings

Executes dropped EXE

Loads dropped DLL

Drops desktop.ini file(s)

Checks whether UAC is enabled

Suspicious use of SetThreadContext

Drops file in Windows directory

Enumerates physical storage devices

Unsigned PE

Checks SCSI registry key(s)

Suspicious behavior: EnumeratesProcesses

Suspicious use of WriteProcessMemory

Suspicious use of AdjustPrivilegeToken

Suspicious behavior: GetForegroundWindowSpam

Runs ping.exe

Modifies data under HKEY_USERS

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-05-17 15:29

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-17 15:29

Reported

2024-05-17 15:31

Platform

win7-20240220-en

Max time kernel

148s

Max time network

149s

Command Line

"C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe"

Signatures

NanoCore

keylogger trojan stealer spyware nanocore

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe N/A

Enumerates physical storage devices

Runs ping.exe

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\PING.EXE N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2220 wrote to memory of 2712 N/A C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe
PID 2220 wrote to memory of 2712 N/A C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe
PID 2220 wrote to memory of 2712 N/A C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe
PID 2220 wrote to memory of 2712 N/A C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe
PID 2220 wrote to memory of 2712 N/A C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe
PID 2220 wrote to memory of 2712 N/A C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe
PID 2220 wrote to memory of 2712 N/A C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe
PID 2220 wrote to memory of 2712 N/A C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe
PID 2220 wrote to memory of 2712 N/A C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe
PID 2712 wrote to memory of 2644 N/A C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe C:\Windows\SysWOW64\cmd.exe
PID 2712 wrote to memory of 2644 N/A C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe C:\Windows\SysWOW64\cmd.exe
PID 2712 wrote to memory of 2644 N/A C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe C:\Windows\SysWOW64\cmd.exe
PID 2712 wrote to memory of 2644 N/A C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe C:\Windows\SysWOW64\cmd.exe
PID 2644 wrote to memory of 2564 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\PING.EXE
PID 2644 wrote to memory of 2564 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\PING.EXE
PID 2644 wrote to memory of 2564 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\PING.EXE
PID 2644 wrote to memory of 2564 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\PING.EXE
PID 2644 wrote to memory of 2700 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe
PID 2644 wrote to memory of 2700 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe
PID 2644 wrote to memory of 2700 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe
PID 2644 wrote to memory of 2700 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe
PID 2700 wrote to memory of 2732 N/A C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe
PID 2700 wrote to memory of 2732 N/A C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe
PID 2700 wrote to memory of 2732 N/A C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe
PID 2700 wrote to memory of 2732 N/A C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe
PID 2700 wrote to memory of 2732 N/A C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe
PID 2700 wrote to memory of 2732 N/A C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe
PID 2700 wrote to memory of 2732 N/A C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe
PID 2700 wrote to memory of 2732 N/A C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe
PID 2700 wrote to memory of 2732 N/A C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe

Processes

C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe"

C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 8000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe"&start C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe

C:\Windows\SysWOW64\PING.EXE

ping 1.1.1.1 -n 1 -w 8000

C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe

C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe

C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe

"C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe"

C:\Windows\System32\spoolsv.exe

C:\Windows\System32\spoolsv.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp

Files

memory/2220-0-0x0000000074BC1000-0x0000000074BC2000-memory.dmp

memory/2220-1-0x0000000074BC0000-0x000000007516B000-memory.dmp

memory/2220-2-0x0000000074BC0000-0x000000007516B000-memory.dmp

memory/2712-10-0x0000000000080000-0x00000000000C6000-memory.dmp

memory/2712-12-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

memory/2712-22-0x0000000000080000-0x00000000000C6000-memory.dmp

memory/2712-19-0x0000000000080000-0x00000000000C6000-memory.dmp

memory/2712-15-0x0000000000080000-0x00000000000C6000-memory.dmp

memory/2712-14-0x0000000000080000-0x00000000000C6000-memory.dmp

memory/2712-4-0x0000000000080000-0x00000000000C6000-memory.dmp

memory/2712-8-0x0000000000080000-0x00000000000C6000-memory.dmp

memory/2712-6-0x0000000000080000-0x00000000000C6000-memory.dmp

memory/2712-23-0x0000000074BC0000-0x000000007516B000-memory.dmp

memory/2712-24-0x0000000074BC0000-0x000000007516B000-memory.dmp

memory/2712-26-0x0000000074BC0000-0x000000007516B000-memory.dmp

C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe

MD5 50333dad192d9888ce17fa31bd466256
SHA1 0e13f68a360abd1e3e2f8e3601ed0bf1641196f0
SHA256 875f4d76e04760152792fddf09287455f38338fec927995d4227c0ff779ce2e4
SHA512 c3e9529180fb4327305de547e154fd720a9574ce3dbb97a09f07613255aa3b37b4f5aa97da3ca4e424d9dcbf320c783816b0c2453e5852cc1397fffef12a13e3

memory/2732-44-0x0000000000400000-0x0000000000446000-memory.dmp

memory/2732-43-0x0000000000400000-0x0000000000446000-memory.dmp

memory/2732-40-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\svhost.exe

MD5 278edbd499374bf73621f8c1f969d894
SHA1 a81170af14747781c5f5f51bb1215893136f0bc0
SHA256 c6999b9f79932c3b4f1c461a69d9dc8dc301d6a155abc33efe1b6e9e4a038391
SHA512 93b0b5c3324bd2df83310f96d34c9176c94d2d676766599c1af33c98ba1efe63187056671f7c6f80c956e5bd0a725f108804021ad93326286bb9c3a96f6550b9

memory/2220-45-0x0000000074BC0000-0x000000007516B000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-17 15:29

Reported

2024-05-17 15:31

Platform

win10v2004-20240508-en

Max time kernel

148s

Max time network

149s

Command Line

"C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe"

Signatures

NanoCore

keylogger trojan stealer spyware nanocore

Registers new Print Monitor

persistence
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\Appmon\Ports C:\Windows\System32\spoolsv.exe N/A
Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\WSD Port\Adapters\WSPrint C:\Windows\System32\spoolsv.exe N/A
Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\Appmon C:\Windows\System32\spoolsv.exe N/A
Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\Microsoft Shared Fax Monitor C:\Windows\System32\spoolsv.exe N/A
Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\Standard TCP/IP Port C:\Windows\System32\spoolsv.exe N/A
Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\Standard TCP/IP Port\Ports C:\Windows\System32\spoolsv.exe N/A
Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\USB Monitor C:\Windows\System32\spoolsv.exe N/A
Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\WSD Port C:\Windows\System32\spoolsv.exe N/A
Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\WSD Port\Ports C:\Windows\System32\spoolsv.exe N/A
Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\WSD Port\Adapters\IPP C:\Windows\System32\spoolsv.exe N/A
Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\Local Port C:\Windows\System32\spoolsv.exe N/A
Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\WSD Port\Adapters\WSPrint\OfflinePorts C:\Windows\System32\spoolsv.exe N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe N/A

Drops desktop.ini file(s)

Description Indicator Process Target
File created C:\Windows\assembly\Desktop.ini C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe N/A
File opened for modification C:\Windows\assembly\Desktop.ini C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\assembly C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe N/A
File created C:\Windows\assembly\Desktop.ini C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe N/A
File opened for modification C:\Windows\assembly\Desktop.ini C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe N/A

Enumerates physical storage devices

Checks SCSI registry key(s)

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 C:\Windows\System32\spoolsv.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0002 C:\Windows\System32\spoolsv.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0002 C:\Windows\System32\spoolsv.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID C:\Windows\System32\spoolsv.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID C:\Windows\System32\spoolsv.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID C:\Windows\System32\spoolsv.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0002 C:\Windows\System32\spoolsv.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 C:\Windows\System32\spoolsv.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0002 C:\Windows\System32\spoolsv.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 C:\Windows\System32\spoolsv.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID C:\Windows\System32\spoolsv.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 C:\Windows\System32\spoolsv.exe N/A

Modifies data under HKEY_USERS

Description Indicator Process Target
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts C:\Windows\System32\spoolsv.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Microsoft XPS Document Writer = "winspool,Ne00:,15,45" C:\Windows\System32\spoolsv.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Devices\Send To OneNote 2016 = "winspool,nul:" C:\Windows\System32\spoolsv.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Devices\Microsoft Print to PDF = "winspool,Ne01:" C:\Windows\System32\spoolsv.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Fax = "winspool,Ne02:,15,45" C:\Windows\System32\spoolsv.exe N/A
Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows NT\CurrentVersion\Devices C:\Windows\System32\spoolsv.exe N/A
Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts C:\Windows\System32\spoolsv.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Microsoft XPS Document Writer = "winspool,Ne00:,15,45" C:\Windows\System32\spoolsv.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Devices\Fax = "winspool,Ne02:" C:\Windows\System32\spoolsv.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Devices\Send To OneNote 2016 = "winspool,nul:" C:\Windows\System32\spoolsv.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Send To OneNote 2016 = "winspool,nul:,15,45" C:\Windows\System32\spoolsv.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Devices\Microsoft XPS Document Writer = "winspool,Ne00:" C:\Windows\System32\spoolsv.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Devices\Microsoft XPS Document Writer = "winspool,Ne00:" C:\Windows\System32\spoolsv.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Devices\Fax = "winspool,Ne02:" C:\Windows\System32\spoolsv.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Fax = "winspool,Ne02:,15,45" C:\Windows\System32\spoolsv.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Send To OneNote 2016 = "winspool,nul:,15,45" C:\Windows\System32\spoolsv.exe N/A
Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts C:\Windows\System32\spoolsv.exe N/A
Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\Devices C:\Windows\System32\spoolsv.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows NT\CurrentVersion\Devices C:\Windows\System32\spoolsv.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Devices\Microsoft Print to PDF = "winspool,Ne01:" C:\Windows\System32\spoolsv.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Microsoft Print to PDF = "winspool,Ne01:,15,45" C:\Windows\System32\spoolsv.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Microsoft Print to PDF = "winspool,Ne01:,15,45" C:\Windows\System32\spoolsv.exe N/A

Runs ping.exe

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\PING.EXE N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3964 wrote to memory of 3004 N/A C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe
PID 3964 wrote to memory of 3004 N/A C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe
PID 3964 wrote to memory of 3004 N/A C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe
PID 3964 wrote to memory of 3004 N/A C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe
PID 3964 wrote to memory of 3004 N/A C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe
PID 3964 wrote to memory of 3004 N/A C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe
PID 3964 wrote to memory of 3004 N/A C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe
PID 3964 wrote to memory of 3004 N/A C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe
PID 3004 wrote to memory of 3036 N/A C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe C:\Windows\SysWOW64\cmd.exe
PID 3004 wrote to memory of 3036 N/A C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe C:\Windows\SysWOW64\cmd.exe
PID 3004 wrote to memory of 3036 N/A C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe C:\Windows\SysWOW64\cmd.exe
PID 3036 wrote to memory of 2620 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\PING.EXE
PID 3036 wrote to memory of 2620 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\PING.EXE
PID 3036 wrote to memory of 2620 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\PING.EXE
PID 3036 wrote to memory of 1500 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe
PID 3036 wrote to memory of 1500 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe
PID 3036 wrote to memory of 1500 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe
PID 1500 wrote to memory of 2160 N/A C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe
PID 1500 wrote to memory of 2160 N/A C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe
PID 1500 wrote to memory of 2160 N/A C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe
PID 1500 wrote to memory of 2160 N/A C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe
PID 1500 wrote to memory of 2160 N/A C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe
PID 1500 wrote to memory of 2160 N/A C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe
PID 1500 wrote to memory of 2160 N/A C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe
PID 1500 wrote to memory of 2160 N/A C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe

Processes

C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe"

C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 8000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe"&start C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe

C:\Windows\SysWOW64\PING.EXE

ping 1.1.1.1 -n 1 -w 8000

C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe

C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe

C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe

"C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe"

C:\Windows\System32\spoolsv.exe

C:\Windows\System32\spoolsv.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 232.168.11.51.in-addr.arpa udp
US 8.8.8.8:53 203.107.17.2.in-addr.arpa udp
US 8.8.8.8:53 71.31.126.40.in-addr.arpa udp
NL 23.62.61.129:443 www.bing.com tcp
US 8.8.8.8:53 205.47.74.20.in-addr.arpa udp
US 8.8.8.8:53 129.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.8.8:53 4.4.8.8.in-addr.arpa udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.8.8:53 183.142.211.20.in-addr.arpa udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 18.24.18.2.in-addr.arpa udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.8.8:53 25.24.18.2.in-addr.arpa udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 14.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 43.58.199.20.in-addr.arpa udp
US 8.8.8.8:53 200.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.8.8:53 76.234.34.23.in-addr.arpa udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 info.securedns.site udp
US 8.8.4.4:53 info.securedns.site udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.8.8:53 okay.tinydns.tech udp
US 8.8.4.4:53 okay.tinydns.tech udp
US 8.8.8.8:53 92.16.208.104.in-addr.arpa udp

Files

memory/3964-0-0x0000000074A02000-0x0000000074A03000-memory.dmp

memory/3964-1-0x0000000074A00000-0x0000000074FB1000-memory.dmp

memory/3964-2-0x0000000074A00000-0x0000000074FB1000-memory.dmp

memory/3004-6-0x0000000000400000-0x0000000000446000-memory.dmp

memory/3004-7-0x0000000074A00000-0x0000000074FB1000-memory.dmp

memory/3004-8-0x0000000074A00000-0x0000000074FB1000-memory.dmp

memory/3004-11-0x0000000074A00000-0x0000000074FB1000-memory.dmp

C:\Users\Admin\AppData\Roaming\Adobe\Vault\spoolsv.exe

MD5 50333dad192d9888ce17fa31bd466256
SHA1 0e13f68a360abd1e3e2f8e3601ed0bf1641196f0
SHA256 875f4d76e04760152792fddf09287455f38338fec927995d4227c0ff779ce2e4
SHA512 c3e9529180fb4327305de547e154fd720a9574ce3dbb97a09f07613255aa3b37b4f5aa97da3ca4e424d9dcbf320c783816b0c2453e5852cc1397fffef12a13e3

memory/1500-15-0x0000000074A00000-0x0000000074FB1000-memory.dmp

memory/1500-17-0x0000000074A00000-0x0000000074FB1000-memory.dmp

memory/1500-16-0x0000000074A00000-0x0000000074FB1000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\svhost.exe

MD5 a64daca3cfbcd039df3ec29d3eddd001
SHA1 eee8b2573f71e8d5c3ee7e53af3e6772e090d0f3
SHA256 403752009f29381d5e4036b8be94589c89188f9ce8ef5f86959eaaada019ed36
SHA512 b6fe2d0ae3fcd4442579ecf10d498d61e0f042813c8fc4be8019da77d849cfcf0b168507139a1b5697227c272de9091788f8e03cf1ce13d5b5077568cfa6a479

C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\50333dad192d9888ce17fa31bd466256_JaffaCakes118.exe.log

MD5 a5dcc7c9c08af7dddd82be5b036a4416
SHA1 4f998ca1526d199e355ffb435bae111a2779b994
SHA256 e24033ceec97fd03402b03acaaabd1d1e378e83bb1683afbccac760e00f8ead5
SHA512 56035de734836c0c39f0b48641c51c26adb6e79c6c65e23ca96603f71c95b8673e2ef853146e87efc899dd1878d0bbc2c82d91fbf0fce81c552048e986f9bb5a

memory/3964-23-0x0000000074A00000-0x0000000074FB1000-memory.dmp

memory/1500-26-0x0000000074A00000-0x0000000074FB1000-memory.dmp