Malware Analysis Report

2024-09-11 13:00

Sample ID 240613-rzpvpsshpe
Target a6100c665fd57bfde92a882459e042ab_JaffaCakes118
SHA256 d71325d6cd03bc49ec0b3f3eb66984c605a02064fe8cf2bfd608769746b4b0b2
Tags
evasion persistence trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

d71325d6cd03bc49ec0b3f3eb66984c605a02064fe8cf2bfd608769746b4b0b2

Threat Level: Known bad

The file a6100c665fd57bfde92a882459e042ab_JaffaCakes118 was found to be: Known bad.

Malicious Activity Summary

evasion persistence trojan

Modifies Windows Defender Real-time Protection settings

Windows security bypass

Windows security modification

Executes dropped EXE

Loads dropped DLL

Adds Run key to start application

Drops file in Windows directory

Unsigned PE

Program crash

Suspicious behavior: EnumeratesProcesses

Suspicious use of WriteProcessMemory

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-06-13 14:38

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-13 14:38

Reported

2024-06-13 14:40

Platform

win10v2004-20240508-en

Max time kernel

149s

Max time network

147s

Command Line

"C:\Users\Admin\AppData\Local\Temp\a6100c665fd57bfde92a882459e042ab_JaffaCakes118.exe"

Signatures

Modifies Windows Defender Real-time Protection settings

evasion trojan
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection C:\Windows\T40506932020485930\winsvcs.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" C:\Windows\T40506932020485930\winsvcs.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" C:\Windows\T40506932020485930\winsvcs.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" C:\Windows\T40506932020485930\winsvcs.exe N/A

Windows security bypass

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" C:\Windows\T40506932020485930\winsvcs.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" C:\Windows\T40506932020485930\winsvcs.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" C:\Windows\T40506932020485930\winsvcs.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" C:\Windows\T40506932020485930\winsvcs.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" C:\Windows\T40506932020485930\winsvcs.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" C:\Windows\T40506932020485930\winsvcs.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\T40506932020485930\winsvcs.exe N/A

Windows security modification

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" C:\Windows\T40506932020485930\winsvcs.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" C:\Windows\T40506932020485930\winsvcs.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" C:\Windows\T40506932020485930\winsvcs.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" C:\Windows\T40506932020485930\winsvcs.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AutoUpdateDisableNotify = "1" C:\Windows\T40506932020485930\winsvcs.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" C:\Windows\T40506932020485930\winsvcs.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" C:\Windows\T40506932020485930\winsvcs.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Services = "C:\\Windows\\T40506932020485930\\winsvcs.exe" C:\Users\Admin\AppData\Local\Temp\a6100c665fd57bfde92a882459e042ab_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Services = "C:\\Windows\\T40506932020485930\\winsvcs.exe" C:\Users\Admin\AppData\Local\Temp\a6100c665fd57bfde92a882459e042ab_JaffaCakes118.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\T40506932020485930\winsvcs.exe C:\Users\Admin\AppData\Local\Temp\a6100c665fd57bfde92a882459e042ab_JaffaCakes118.exe N/A
File opened for modification C:\Windows\T40506932020485930\winsvcs.exe C:\Users\Admin\AppData\Local\Temp\a6100c665fd57bfde92a882459e042ab_JaffaCakes118.exe N/A
File opened for modification C:\Windows\T40506932020485930 C:\Users\Admin\AppData\Local\Temp\a6100c665fd57bfde92a882459e042ab_JaffaCakes118.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6100c665fd57bfde92a882459e042ab_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6100c665fd57bfde92a882459e042ab_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6100c665fd57bfde92a882459e042ab_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6100c665fd57bfde92a882459e042ab_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6100c665fd57bfde92a882459e042ab_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6100c665fd57bfde92a882459e042ab_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6100c665fd57bfde92a882459e042ab_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6100c665fd57bfde92a882459e042ab_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6100c665fd57bfde92a882459e042ab_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6100c665fd57bfde92a882459e042ab_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6100c665fd57bfde92a882459e042ab_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6100c665fd57bfde92a882459e042ab_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6100c665fd57bfde92a882459e042ab_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6100c665fd57bfde92a882459e042ab_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6100c665fd57bfde92a882459e042ab_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6100c665fd57bfde92a882459e042ab_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6100c665fd57bfde92a882459e042ab_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6100c665fd57bfde92a882459e042ab_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6100c665fd57bfde92a882459e042ab_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6100c665fd57bfde92a882459e042ab_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6100c665fd57bfde92a882459e042ab_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6100c665fd57bfde92a882459e042ab_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6100c665fd57bfde92a882459e042ab_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6100c665fd57bfde92a882459e042ab_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6100c665fd57bfde92a882459e042ab_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6100c665fd57bfde92a882459e042ab_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6100c665fd57bfde92a882459e042ab_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6100c665fd57bfde92a882459e042ab_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6100c665fd57bfde92a882459e042ab_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6100c665fd57bfde92a882459e042ab_JaffaCakes118.exe N/A
N/A N/A C:\Windows\T40506932020485930\winsvcs.exe N/A
N/A N/A C:\Windows\T40506932020485930\winsvcs.exe N/A
N/A N/A C:\Windows\T40506932020485930\winsvcs.exe N/A
N/A N/A C:\Windows\T40506932020485930\winsvcs.exe N/A
N/A N/A C:\Windows\T40506932020485930\winsvcs.exe N/A
N/A N/A C:\Windows\T40506932020485930\winsvcs.exe N/A
N/A N/A C:\Windows\T40506932020485930\winsvcs.exe N/A
N/A N/A C:\Windows\T40506932020485930\winsvcs.exe N/A
N/A N/A C:\Windows\T40506932020485930\winsvcs.exe N/A
N/A N/A C:\Windows\T40506932020485930\winsvcs.exe N/A
N/A N/A C:\Windows\T40506932020485930\winsvcs.exe N/A
N/A N/A C:\Windows\T40506932020485930\winsvcs.exe N/A
N/A N/A C:\Windows\T40506932020485930\winsvcs.exe N/A
N/A N/A C:\Windows\T40506932020485930\winsvcs.exe N/A
N/A N/A C:\Windows\T40506932020485930\winsvcs.exe N/A
N/A N/A C:\Windows\T40506932020485930\winsvcs.exe N/A
N/A N/A C:\Windows\T40506932020485930\winsvcs.exe N/A
N/A N/A C:\Windows\T40506932020485930\winsvcs.exe N/A
N/A N/A C:\Windows\T40506932020485930\winsvcs.exe N/A
N/A N/A C:\Windows\T40506932020485930\winsvcs.exe N/A
N/A N/A C:\Windows\T40506932020485930\winsvcs.exe N/A
N/A N/A C:\Windows\T40506932020485930\winsvcs.exe N/A
N/A N/A C:\Windows\T40506932020485930\winsvcs.exe N/A
N/A N/A C:\Windows\T40506932020485930\winsvcs.exe N/A
N/A N/A C:\Windows\T40506932020485930\winsvcs.exe N/A
N/A N/A C:\Windows\T40506932020485930\winsvcs.exe N/A
N/A N/A C:\Windows\T40506932020485930\winsvcs.exe N/A
N/A N/A C:\Windows\T40506932020485930\winsvcs.exe N/A
N/A N/A C:\Windows\T40506932020485930\winsvcs.exe N/A
N/A N/A C:\Windows\T40506932020485930\winsvcs.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\a6100c665fd57bfde92a882459e042ab_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\a6100c665fd57bfde92a882459e042ab_JaffaCakes118.exe"

C:\Windows\T40506932020485930\winsvcs.exe

C:\Windows\T40506932020485930\winsvcs.exe

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4672 -ip 4672

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4672 -s 528

Network

Country Destination Domain Proto
NL 92.63.197.48:80 tcp
NL 92.63.197.60:80 tcp
NL 92.63.197.112:80 tcp
US 8.8.8.8:53 rosugoshurgurhus.ru udp
US 8.8.8.8:53 gsisirfjjdissofj.ru udp
US 8.8.8.8:53 eeiieieiifigigid.ru udp
US 8.8.8.8:53 ruuiooototoroidj.ru udp
US 8.8.8.8:53 eogoehoshefheguh.ru udp
US 8.8.8.8:53 sgsourfsuofgsgur.ru udp
US 8.8.8.8:53 arosugoshurgurhusl.in udp

Files

memory/4672-1-0x00000000006D0000-0x00000000007D0000-memory.dmp

memory/4672-2-0x0000000000400000-0x000000000040D000-memory.dmp

C:\Windows\T40506932020485930\winsvcs.exe

MD5 a6100c665fd57bfde92a882459e042ab
SHA1 ef38713b3079724706c9eba5aebbae7eb474fd6a
SHA256 d71325d6cd03bc49ec0b3f3eb66984c605a02064fe8cf2bfd608769746b4b0b2
SHA512 87df7eae4082f83b3ee4870f75c9528a49151892e4512330d1984361303221e4048158a828e23ad89cf7b14d6239da590f27b2f55ff18bfc52abf3d20d37d136

memory/4672-8-0x0000000000400000-0x000000000042F000-memory.dmp

memory/3856-10-0x0000000000400000-0x000000000042F000-memory.dmp

memory/3856-11-0x0000000000400000-0x000000000042F000-memory.dmp

memory/3856-12-0x0000000000400000-0x000000000042F000-memory.dmp

memory/3856-15-0x0000000000400000-0x000000000042F000-memory.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-13 14:38

Reported

2024-06-13 14:40

Platform

win7-20240611-en

Max time kernel

151s

Max time network

158s

Command Line

"C:\Users\Admin\AppData\Local\Temp\a6100c665fd57bfde92a882459e042ab_JaffaCakes118.exe"

Signatures

Modifies Windows Defender Real-time Protection settings

evasion trojan
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection C:\Windows\T40506932020485930\winsvcs.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" C:\Windows\T40506932020485930\winsvcs.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" C:\Windows\T40506932020485930\winsvcs.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" C:\Windows\T40506932020485930\winsvcs.exe N/A

Windows security bypass

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" C:\Windows\T40506932020485930\winsvcs.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" C:\Windows\T40506932020485930\winsvcs.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesOverride = "1" C:\Windows\T40506932020485930\winsvcs.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" C:\Windows\T40506932020485930\winsvcs.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" C:\Windows\T40506932020485930\winsvcs.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" C:\Windows\T40506932020485930\winsvcs.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\T40506932020485930\winsvcs.exe N/A

Windows security modification

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AutoUpdateDisableNotify = "1" C:\Windows\T40506932020485930\winsvcs.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" C:\Windows\T40506932020485930\winsvcs.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" C:\Windows\T40506932020485930\winsvcs.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesOverride = "1" C:\Windows\T40506932020485930\winsvcs.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" C:\Windows\T40506932020485930\winsvcs.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" C:\Windows\T40506932020485930\winsvcs.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" C:\Windows\T40506932020485930\winsvcs.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Services = "C:\\Windows\\T40506932020485930\\winsvcs.exe" C:\Users\Admin\AppData\Local\Temp\a6100c665fd57bfde92a882459e042ab_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Services = "C:\\Windows\\T40506932020485930\\winsvcs.exe" C:\Users\Admin\AppData\Local\Temp\a6100c665fd57bfde92a882459e042ab_JaffaCakes118.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\T40506932020485930\winsvcs.exe C:\Users\Admin\AppData\Local\Temp\a6100c665fd57bfde92a882459e042ab_JaffaCakes118.exe N/A
File opened for modification C:\Windows\T40506932020485930\winsvcs.exe C:\Users\Admin\AppData\Local\Temp\a6100c665fd57bfde92a882459e042ab_JaffaCakes118.exe N/A
File opened for modification C:\Windows\T40506932020485930 C:\Users\Admin\AppData\Local\Temp\a6100c665fd57bfde92a882459e042ab_JaffaCakes118.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6100c665fd57bfde92a882459e042ab_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6100c665fd57bfde92a882459e042ab_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6100c665fd57bfde92a882459e042ab_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6100c665fd57bfde92a882459e042ab_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6100c665fd57bfde92a882459e042ab_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6100c665fd57bfde92a882459e042ab_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6100c665fd57bfde92a882459e042ab_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6100c665fd57bfde92a882459e042ab_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6100c665fd57bfde92a882459e042ab_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6100c665fd57bfde92a882459e042ab_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6100c665fd57bfde92a882459e042ab_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6100c665fd57bfde92a882459e042ab_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6100c665fd57bfde92a882459e042ab_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6100c665fd57bfde92a882459e042ab_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6100c665fd57bfde92a882459e042ab_JaffaCakes118.exe N/A
N/A N/A C:\Windows\T40506932020485930\winsvcs.exe N/A
N/A N/A C:\Windows\T40506932020485930\winsvcs.exe N/A
N/A N/A C:\Windows\T40506932020485930\winsvcs.exe N/A
N/A N/A C:\Windows\T40506932020485930\winsvcs.exe N/A
N/A N/A C:\Windows\T40506932020485930\winsvcs.exe N/A
N/A N/A C:\Windows\T40506932020485930\winsvcs.exe N/A
N/A N/A C:\Windows\T40506932020485930\winsvcs.exe N/A
N/A N/A C:\Windows\T40506932020485930\winsvcs.exe N/A
N/A N/A C:\Windows\T40506932020485930\winsvcs.exe N/A
N/A N/A C:\Windows\T40506932020485930\winsvcs.exe N/A
N/A N/A C:\Windows\T40506932020485930\winsvcs.exe N/A
N/A N/A C:\Windows\T40506932020485930\winsvcs.exe N/A
N/A N/A C:\Windows\T40506932020485930\winsvcs.exe N/A
N/A N/A C:\Windows\T40506932020485930\winsvcs.exe N/A
N/A N/A C:\Windows\T40506932020485930\winsvcs.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\a6100c665fd57bfde92a882459e042ab_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\a6100c665fd57bfde92a882459e042ab_JaffaCakes118.exe"

C:\Windows\T40506932020485930\winsvcs.exe

C:\Windows\T40506932020485930\winsvcs.exe

Network

Country Destination Domain Proto
NL 92.63.197.48:80 tcp
NL 92.63.197.48:80 tcp
NL 92.63.197.60:80 tcp
NL 92.63.197.60:80 tcp
NL 92.63.197.112:80 tcp
NL 92.63.197.112:80 tcp
US 8.8.8.8:53 rosugoshurgurhus.ru udp
US 8.8.8.8:53 gsisirfjjdissofj.ru udp
US 8.8.8.8:53 rgouusrsuoonenue.ru udp
US 8.8.8.8:53 euignjsosjfhgidi.ru udp
US 8.8.8.8:53 oegoafaueoueuueu.ru udp
US 8.8.8.8:53 eueininiavaeiiae.ru udp
US 8.8.8.8:53 nfaiiaeiinbbivii.ru udp
US 8.8.8.8:53 pppsooodlldliifi.ru udp
US 8.8.8.8:53 aigiaeuiuueueuer.ru udp
US 8.8.8.8:53 cnnaiisdiififiur.ru udp
US 8.8.8.8:53 eeiieieiifigigid.ru udp
US 8.8.8.8:53 ruuiooototoroidj.ru udp
US 8.8.8.8:53 ddissisifigifidi.ru udp
US 8.8.8.8:53 cicicicciicciiis.ru udp
US 8.8.8.8:53 ssorgurufsogusru.ru udp
US 8.8.8.8:53 eoppgjrsokoedosh.ru udp
US 8.8.8.8:53 geoaueoafugaeije.ru udp
US 8.8.8.8:53 nnvmmsiisirurutt.ru udp

Files

memory/2104-1-0x00000000004F0000-0x00000000005F0000-memory.dmp

memory/2104-2-0x0000000000400000-0x000000000040D000-memory.dmp

\Windows\T40506932020485930\winsvcs.exe

MD5 a6100c665fd57bfde92a882459e042ab
SHA1 ef38713b3079724706c9eba5aebbae7eb474fd6a
SHA256 d71325d6cd03bc49ec0b3f3eb66984c605a02064fe8cf2bfd608769746b4b0b2
SHA512 87df7eae4082f83b3ee4870f75c9528a49151892e4512330d1984361303221e4048158a828e23ad89cf7b14d6239da590f27b2f55ff18bfc52abf3d20d37d136

memory/2104-12-0x0000000000400000-0x000000000042F000-memory.dmp

memory/1312-14-0x0000000000400000-0x000000000042F000-memory.dmp

memory/1312-15-0x0000000000400000-0x000000000042F000-memory.dmp

memory/1312-19-0x0000000000400000-0x000000000042F000-memory.dmp