Analysis
-
max time kernel
121s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
25-05-2024 08:17
Static task
static1
Behavioral task
behavioral1
Sample
715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe
-
Size
268KB
-
MD5
715d071a8f0a8552a002d6347a52e13a
-
SHA1
b093a35a0b2faff292e497b6f4b0b4ef45d3376f
-
SHA256
f7d8c91adc09d8fee7aef8ab5e0f5a0f0006e77da858317913196983376ab448
-
SHA512
729666be58aa195c28d89e11e28f6c7c514324a496f4726e593efad51b46c6d5116890afeb2b0e127cf1cdcbbac0f16ed1a1f972365e6dcf4fdfd8e595556495
-
SSDEEP
6144:KxxVTj+/q0bykF+hS/e2bm3y+7C30/VFB7koPM4GMMhhGtED0:AeiWykF+PlyVsXDUD0
Malware Config
Extracted
C:\Users\Admin\Desktop\_READ_THI$_FILE_RV7GEK_.txt
http://p27dokhpz2n7nvgr.onion/780D-A0F8-F958-0446-9D74
http://p27dokhpz2n7nvgr.1a7wnt.top/780D-A0F8-F958-0446-9D74
http://p27dokhpz2n7nvgr.1czh7o.top/780D-A0F8-F958-0446-9D74
http://p27dokhpz2n7nvgr.1hpvzl.top/780D-A0F8-F958-0446-9D74
http://p27dokhpz2n7nvgr.1pglcs.top/780D-A0F8-F958-0446-9D74
http://p27dokhpz2n7nvgr.1cewld.top/780D-A0F8-F958-0446-9D74
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Blocklisted process makes network request 5 IoCs
Processes:
mshta.exeflow pid process 2180 2808 mshta.exe 2184 2808 mshta.exe 2186 2808 mshta.exe 2188 2808 mshta.exe 2190 2808 mshta.exe -
Contacts a large (1095) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Modifies Windows Firewall 2 TTPs 2 IoCs
Processes:
netsh.exenetsh.exepid process 2876 netsh.exe 2768 netsh.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1756 cmd.exe -
Drops file in System32 directory 38 IoCs
Processes:
715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exedescription ioc process File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\outlook 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\word 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\onenote 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\powerpoint 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\powerpoint 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\word 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\word 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft sql server 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\documents 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\word 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\office 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft sql server 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\excel 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\office 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\powerpoint 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\steam 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\bitcoin 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\office 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\onenote 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\outlook 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\thunderbird 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\desktop 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\excel 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\outlook 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\the bat! 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\thunderbird 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\microsoft sql server 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\office 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\outlook 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\steam 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\the bat! 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\onenote 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\excel 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\excel 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\microsoft sql server 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\onenote 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\powerpoint 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\bitcoin 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp3E48.bmp" 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe -
Drops file in Program Files directory 20 IoCs
Processes:
715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exedescription ioc process File opened for modification \??\c:\program files (x86)\thunderbird 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\program files\ 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\ 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\bitcoin 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\excel 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\microsoft\excel 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\microsoft\word 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\onenote 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\microsoft\office 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\microsoft\outlook 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\word 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\microsoft\microsoft sql server 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\microsoft\onenote 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\microsoft\powerpoint 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\outlook 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\powerpoint 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\steam 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\the bat! 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\microsoft sql server 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\office 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe -
Drops file in Windows directory 64 IoCs
Processes:
715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exedescription ioc process File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\the bat! 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\thunderbird 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\bitcoin 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\office 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\onenote 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\excel 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\word 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\office 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\microsoft sql server 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\onenote 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\powerpoint 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\documents 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\bitcoin 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\word 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\word 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\office 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\outlook 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\powerpoint 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\desktop 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft sql server 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\powerpoint 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\word 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\outlook 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\microsoft sql server 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\office 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\onenote 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\steam 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\excel 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\excel 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\steam 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\excel 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\office 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\office 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\powerpoint 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\steam 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\the bat! 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\word 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft sql server 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\microsoft sql server 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\office 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\desktop 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\powerpoint 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\onenote 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\powerpoint 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\documents 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\bitcoin 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\outlook 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\powerpoint 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\outlook 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\outlook 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\office 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\thunderbird 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\excel 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\excel 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\onenote 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\excel 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\onenote 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\word 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\onenote 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\outlook 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\ 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\bitcoin 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft sql server 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\thunderbird 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 1760 taskkill.exe -
Processes:
mshta.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exetaskkill.exedescription pid process Token: SeShutdownPrivilege 1516 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe Token: SeDebugPrivilege 1760 taskkill.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
DllHost.exepid process 2944 DllHost.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.execmd.exedescription pid process target process PID 1516 wrote to memory of 2876 1516 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe netsh.exe PID 1516 wrote to memory of 2876 1516 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe netsh.exe PID 1516 wrote to memory of 2876 1516 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe netsh.exe PID 1516 wrote to memory of 2876 1516 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe netsh.exe PID 1516 wrote to memory of 2768 1516 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe netsh.exe PID 1516 wrote to memory of 2768 1516 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe netsh.exe PID 1516 wrote to memory of 2768 1516 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe netsh.exe PID 1516 wrote to memory of 2768 1516 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe netsh.exe PID 1516 wrote to memory of 2808 1516 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe mshta.exe PID 1516 wrote to memory of 2808 1516 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe mshta.exe PID 1516 wrote to memory of 2808 1516 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe mshta.exe PID 1516 wrote to memory of 2808 1516 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe mshta.exe PID 1516 wrote to memory of 2804 1516 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe NOTEPAD.EXE PID 1516 wrote to memory of 2804 1516 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe NOTEPAD.EXE PID 1516 wrote to memory of 2804 1516 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe NOTEPAD.EXE PID 1516 wrote to memory of 2804 1516 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe NOTEPAD.EXE PID 1516 wrote to memory of 1756 1516 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe cmd.exe PID 1516 wrote to memory of 1756 1516 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe cmd.exe PID 1516 wrote to memory of 1756 1516 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe cmd.exe PID 1516 wrote to memory of 1756 1516 715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe cmd.exe PID 1756 wrote to memory of 1760 1756 cmd.exe taskkill.exe PID 1756 wrote to memory of 1760 1756 cmd.exe taskkill.exe PID 1756 wrote to memory of 1760 1756 cmd.exe taskkill.exe PID 1756 wrote to memory of 1760 1756 cmd.exe taskkill.exe PID 1756 wrote to memory of 1668 1756 cmd.exe PING.EXE PID 1756 wrote to memory of 1668 1756 cmd.exe PING.EXE PID 1756 wrote to memory of 1668 1756 cmd.exe PING.EXE PID 1756 wrote to memory of 1668 1756 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\netsh.exeC:\Windows\system32\netsh.exe advfirewall set allprofiles state on2⤵
- Modifies Windows Firewall
-
C:\Windows\SysWOW64\netsh.exeC:\Windows\system32\netsh.exe advfirewall reset2⤵
- Modifies Windows Firewall
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\_READ_THI$_FILE_AQ8PK_.hta"2⤵
- Blocklisted process makes network request
- Modifies Internet Explorer settings
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\_READ_THI$_FILE_RV7GEK_.txt2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "715d071a8f0a8552a002d6347a52e13a_JaffaCakes118.exe"3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.13⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Cab5C93.tmpFilesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\Local\Temp\Tar5CA6.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
C:\Users\Admin\Desktop\_READ_THI$_FILE_18S9_.jpegFilesize
150KB
MD50baa1082b928ed95dbc8e3fb2b3d720b
SHA106bf2b1c2c786eeb6900e4441bcb96de9da7fe0d
SHA2562ce8bfc93884de484e41ccc588ae78ab5fca01657d5f4d3b4ad3691b1116f22f
SHA51249ec0177653991975876407fdf53dcd3893f924b2213641d592cc03d771e2f9403ed317b2b95eb951702902794fa05c3e21e97af23c2595f172874f1ff7bd9cf
-
C:\Users\Admin\Desktop\_READ_THI$_FILE_AQ8PK_.htaFilesize
75KB
MD5c22eb7b712631abf33ff8965fec61361
SHA1f55299e238df2382c93a5d64cba364aa1a47fd2d
SHA256e0d74a8f7731ea8237d62df4dfa7f8a1dadbcb89011e41fff5caf6b9189a4bae
SHA512821e233635240994526e2ec631059515e3fd3b9ae06ef11e93ef316e730fbeb6557a84c11ace684f2d034d5f566dc9a6e0ba14be60b51ad8ebe75739d8b4a270
-
C:\Users\Admin\Desktop\_READ_THI$_FILE_RV7GEK_.txtFilesize
1KB
MD5b9f2772c6320c316d57abed2c15c7380
SHA160701a73de9e922f0886abcd51fa94118b1bbedf
SHA256941784e12276bba13c41f1ce2671f7b37159d8788de49a1c701a76a57877c889
SHA512f83662437646d38ead23a87795c31d95947109c55c054f063e5675d6ad862b913e6c170dccbfbc1f9442027ba81b0b572cecfc5d91d37a01aea4b9662bf2e8b0
-
memory/1516-6-0x0000000000400000-0x0000000000446000-memory.dmpFilesize
280KB
-
memory/1516-0-0x0000000000400000-0x0000000000446000-memory.dmpFilesize
280KB
-
memory/1516-63-0x0000000004610000-0x0000000004612000-memory.dmpFilesize
8KB
-
memory/1516-3-0x0000000000280000-0x0000000000281000-memory.dmpFilesize
4KB
-
memory/1516-85-0x0000000000400000-0x0000000000446000-memory.dmpFilesize
280KB
-
memory/1516-2-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/1516-1-0x0000000000400000-0x0000000000446000-memory.dmpFilesize
280KB
-
memory/2944-64-0x0000000000170000-0x0000000000172000-memory.dmpFilesize
8KB