Malware Analysis Report

2024-09-11 12:59

Sample ID 240613-tea7xszaqm
Target a6600bbc94769a3917bd904750eb3419_JaffaCakes118
SHA256 9c3bb8ebaa6719d2cb7247ae6f093c1a8f7ed7ab1d4877bc7be58d0f734e37d9
Tags
evasion persistence trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

9c3bb8ebaa6719d2cb7247ae6f093c1a8f7ed7ab1d4877bc7be58d0f734e37d9

Threat Level: Known bad

The file a6600bbc94769a3917bd904750eb3419_JaffaCakes118 was found to be: Known bad.

Malicious Activity Summary

evasion persistence trojan

Modifies Windows Defender Real-time Protection settings

Windows security bypass

Executes dropped EXE

Windows security modification

Loads dropped DLL

Adds Run key to start application

Drops file in Windows directory

Unsigned PE

Program crash

Suspicious behavior: EnumeratesProcesses

Suspicious use of WriteProcessMemory

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-06-13 15:57

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-13 15:57

Reported

2024-06-13 16:00

Platform

win7-20240611-en

Max time kernel

144s

Max time network

152s

Command Line

"C:\Users\Admin\AppData\Local\Temp\a6600bbc94769a3917bd904750eb3419_JaffaCakes118.exe"

Signatures

Modifies Windows Defender Real-time Protection settings

evasion trojan
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection C:\Windows\T405969330203590\winsvcs.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" C:\Windows\T405969330203590\winsvcs.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" C:\Windows\T405969330203590\winsvcs.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" C:\Windows\T405969330203590\winsvcs.exe N/A

Windows security bypass

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" C:\Windows\T405969330203590\winsvcs.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" C:\Windows\T405969330203590\winsvcs.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" C:\Windows\T405969330203590\winsvcs.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesOverride = "1" C:\Windows\T405969330203590\winsvcs.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" C:\Windows\T405969330203590\winsvcs.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" C:\Windows\T405969330203590\winsvcs.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\T405969330203590\winsvcs.exe N/A

Windows security modification

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" C:\Windows\T405969330203590\winsvcs.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" C:\Windows\T405969330203590\winsvcs.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesOverride = "1" C:\Windows\T405969330203590\winsvcs.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" C:\Windows\T405969330203590\winsvcs.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" C:\Windows\T405969330203590\winsvcs.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" C:\Windows\T405969330203590\winsvcs.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AutoUpdateDisableNotify = "1" C:\Windows\T405969330203590\winsvcs.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Services = "C:\\Windows\\T405969330203590\\winsvcs.exe" C:\Users\Admin\AppData\Local\Temp\a6600bbc94769a3917bd904750eb3419_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Services = "C:\\Windows\\T405969330203590\\winsvcs.exe" C:\Users\Admin\AppData\Local\Temp\a6600bbc94769a3917bd904750eb3419_JaffaCakes118.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\T405969330203590\winsvcs.exe C:\Users\Admin\AppData\Local\Temp\a6600bbc94769a3917bd904750eb3419_JaffaCakes118.exe N/A
File opened for modification C:\Windows\T405969330203590\winsvcs.exe C:\Users\Admin\AppData\Local\Temp\a6600bbc94769a3917bd904750eb3419_JaffaCakes118.exe N/A
File opened for modification C:\Windows\T405969330203590 C:\Users\Admin\AppData\Local\Temp\a6600bbc94769a3917bd904750eb3419_JaffaCakes118.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6600bbc94769a3917bd904750eb3419_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6600bbc94769a3917bd904750eb3419_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6600bbc94769a3917bd904750eb3419_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6600bbc94769a3917bd904750eb3419_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6600bbc94769a3917bd904750eb3419_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6600bbc94769a3917bd904750eb3419_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6600bbc94769a3917bd904750eb3419_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6600bbc94769a3917bd904750eb3419_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6600bbc94769a3917bd904750eb3419_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6600bbc94769a3917bd904750eb3419_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6600bbc94769a3917bd904750eb3419_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6600bbc94769a3917bd904750eb3419_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6600bbc94769a3917bd904750eb3419_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6600bbc94769a3917bd904750eb3419_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6600bbc94769a3917bd904750eb3419_JaffaCakes118.exe N/A
N/A N/A C:\Windows\T405969330203590\winsvcs.exe N/A
N/A N/A C:\Windows\T405969330203590\winsvcs.exe N/A
N/A N/A C:\Windows\T405969330203590\winsvcs.exe N/A
N/A N/A C:\Windows\T405969330203590\winsvcs.exe N/A
N/A N/A C:\Windows\T405969330203590\winsvcs.exe N/A
N/A N/A C:\Windows\T405969330203590\winsvcs.exe N/A
N/A N/A C:\Windows\T405969330203590\winsvcs.exe N/A
N/A N/A C:\Windows\T405969330203590\winsvcs.exe N/A
N/A N/A C:\Windows\T405969330203590\winsvcs.exe N/A
N/A N/A C:\Windows\T405969330203590\winsvcs.exe N/A
N/A N/A C:\Windows\T405969330203590\winsvcs.exe N/A
N/A N/A C:\Windows\T405969330203590\winsvcs.exe N/A
N/A N/A C:\Windows\T405969330203590\winsvcs.exe N/A
N/A N/A C:\Windows\T405969330203590\winsvcs.exe N/A
N/A N/A C:\Windows\T405969330203590\winsvcs.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\a6600bbc94769a3917bd904750eb3419_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\a6600bbc94769a3917bd904750eb3419_JaffaCakes118.exe"

C:\Windows\T405969330203590\winsvcs.exe

C:\Windows\T405969330203590\winsvcs.exe

Network

Country Destination Domain Proto
NL 92.63.197.48:80 tcp
NL 92.63.197.48:80 tcp
NL 92.63.197.48:80 tcp
NL 92.63.197.48:80 tcp
NL 92.63.197.48:80 tcp
NL 92.63.197.48:80 tcp
NL 92.63.197.48:80 tcp

Files

memory/2212-0-0x0000000000400000-0x000000000045E000-memory.dmp

memory/2212-2-0x0000000000550000-0x0000000000650000-memory.dmp

memory/2212-3-0x0000000000400000-0x000000000040C000-memory.dmp

\Windows\T405969330203590\winsvcs.exe

MD5 a6600bbc94769a3917bd904750eb3419
SHA1 859af2db53e25db37da6f8331ee59f1e5b81276e
SHA256 9c3bb8ebaa6719d2cb7247ae6f093c1a8f7ed7ab1d4877bc7be58d0f734e37d9
SHA512 4a36b69b53842dd5490f1f8fbefefc10cc822f4bb3e93e27bb14c86c49220b9469c10fa650f0ecd1d543495857b35839e33fdf6c245df4da6fc319d90dab6dc4

memory/2212-12-0x0000000000220000-0x000000000027E000-memory.dmp

memory/2568-14-0x0000000000400000-0x000000000045E000-memory.dmp

memory/2568-16-0x0000000000400000-0x000000000045E000-memory.dmp

memory/2212-17-0x0000000000400000-0x000000000045E000-memory.dmp

memory/2568-21-0x0000000000400000-0x000000000045E000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-13 15:57

Reported

2024-06-13 16:00

Platform

win10v2004-20240508-en

Max time kernel

147s

Max time network

149s

Command Line

"C:\Users\Admin\AppData\Local\Temp\a6600bbc94769a3917bd904750eb3419_JaffaCakes118.exe"

Signatures

Modifies Windows Defender Real-time Protection settings

evasion trojan
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection C:\Windows\T405969330203590\winsvcs.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" C:\Windows\T405969330203590\winsvcs.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" C:\Windows\T405969330203590\winsvcs.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" C:\Windows\T405969330203590\winsvcs.exe N/A

Windows security bypass

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" C:\Windows\T405969330203590\winsvcs.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" C:\Windows\T405969330203590\winsvcs.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" C:\Windows\T405969330203590\winsvcs.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" C:\Windows\T405969330203590\winsvcs.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" C:\Windows\T405969330203590\winsvcs.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" C:\Windows\T405969330203590\winsvcs.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\T405969330203590\winsvcs.exe N/A

Windows security modification

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" C:\Windows\T405969330203590\winsvcs.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" C:\Windows\T405969330203590\winsvcs.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" C:\Windows\T405969330203590\winsvcs.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AutoUpdateDisableNotify = "1" C:\Windows\T405969330203590\winsvcs.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" C:\Windows\T405969330203590\winsvcs.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" C:\Windows\T405969330203590\winsvcs.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" C:\Windows\T405969330203590\winsvcs.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Services = "C:\\Windows\\T405969330203590\\winsvcs.exe" C:\Users\Admin\AppData\Local\Temp\a6600bbc94769a3917bd904750eb3419_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Services = "C:\\Windows\\T405969330203590\\winsvcs.exe" C:\Users\Admin\AppData\Local\Temp\a6600bbc94769a3917bd904750eb3419_JaffaCakes118.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\T405969330203590\winsvcs.exe C:\Users\Admin\AppData\Local\Temp\a6600bbc94769a3917bd904750eb3419_JaffaCakes118.exe N/A
File opened for modification C:\Windows\T405969330203590\winsvcs.exe C:\Users\Admin\AppData\Local\Temp\a6600bbc94769a3917bd904750eb3419_JaffaCakes118.exe N/A
File opened for modification C:\Windows\T405969330203590 C:\Users\Admin\AppData\Local\Temp\a6600bbc94769a3917bd904750eb3419_JaffaCakes118.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6600bbc94769a3917bd904750eb3419_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6600bbc94769a3917bd904750eb3419_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6600bbc94769a3917bd904750eb3419_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6600bbc94769a3917bd904750eb3419_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6600bbc94769a3917bd904750eb3419_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6600bbc94769a3917bd904750eb3419_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6600bbc94769a3917bd904750eb3419_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6600bbc94769a3917bd904750eb3419_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6600bbc94769a3917bd904750eb3419_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6600bbc94769a3917bd904750eb3419_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6600bbc94769a3917bd904750eb3419_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6600bbc94769a3917bd904750eb3419_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6600bbc94769a3917bd904750eb3419_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6600bbc94769a3917bd904750eb3419_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6600bbc94769a3917bd904750eb3419_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6600bbc94769a3917bd904750eb3419_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6600bbc94769a3917bd904750eb3419_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6600bbc94769a3917bd904750eb3419_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6600bbc94769a3917bd904750eb3419_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6600bbc94769a3917bd904750eb3419_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6600bbc94769a3917bd904750eb3419_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6600bbc94769a3917bd904750eb3419_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6600bbc94769a3917bd904750eb3419_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6600bbc94769a3917bd904750eb3419_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6600bbc94769a3917bd904750eb3419_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6600bbc94769a3917bd904750eb3419_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6600bbc94769a3917bd904750eb3419_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6600bbc94769a3917bd904750eb3419_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6600bbc94769a3917bd904750eb3419_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a6600bbc94769a3917bd904750eb3419_JaffaCakes118.exe N/A
N/A N/A C:\Windows\T405969330203590\winsvcs.exe N/A
N/A N/A C:\Windows\T405969330203590\winsvcs.exe N/A
N/A N/A C:\Windows\T405969330203590\winsvcs.exe N/A
N/A N/A C:\Windows\T405969330203590\winsvcs.exe N/A
N/A N/A C:\Windows\T405969330203590\winsvcs.exe N/A
N/A N/A C:\Windows\T405969330203590\winsvcs.exe N/A
N/A N/A C:\Windows\T405969330203590\winsvcs.exe N/A
N/A N/A C:\Windows\T405969330203590\winsvcs.exe N/A
N/A N/A C:\Windows\T405969330203590\winsvcs.exe N/A
N/A N/A C:\Windows\T405969330203590\winsvcs.exe N/A
N/A N/A C:\Windows\T405969330203590\winsvcs.exe N/A
N/A N/A C:\Windows\T405969330203590\winsvcs.exe N/A
N/A N/A C:\Windows\T405969330203590\winsvcs.exe N/A
N/A N/A C:\Windows\T405969330203590\winsvcs.exe N/A
N/A N/A C:\Windows\T405969330203590\winsvcs.exe N/A
N/A N/A C:\Windows\T405969330203590\winsvcs.exe N/A
N/A N/A C:\Windows\T405969330203590\winsvcs.exe N/A
N/A N/A C:\Windows\T405969330203590\winsvcs.exe N/A
N/A N/A C:\Windows\T405969330203590\winsvcs.exe N/A
N/A N/A C:\Windows\T405969330203590\winsvcs.exe N/A
N/A N/A C:\Windows\T405969330203590\winsvcs.exe N/A
N/A N/A C:\Windows\T405969330203590\winsvcs.exe N/A
N/A N/A C:\Windows\T405969330203590\winsvcs.exe N/A
N/A N/A C:\Windows\T405969330203590\winsvcs.exe N/A
N/A N/A C:\Windows\T405969330203590\winsvcs.exe N/A
N/A N/A C:\Windows\T405969330203590\winsvcs.exe N/A
N/A N/A C:\Windows\T405969330203590\winsvcs.exe N/A
N/A N/A C:\Windows\T405969330203590\winsvcs.exe N/A
N/A N/A C:\Windows\T405969330203590\winsvcs.exe N/A
N/A N/A C:\Windows\T405969330203590\winsvcs.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\a6600bbc94769a3917bd904750eb3419_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\a6600bbc94769a3917bd904750eb3419_JaffaCakes118.exe"

C:\Windows\T405969330203590\winsvcs.exe

C:\Windows\T405969330203590\winsvcs.exe

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3516 -ip 3516

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 3516 -s 552

Network

Country Destination Domain Proto
NL 92.63.197.48:80 tcp
NL 92.63.197.48:80 tcp
NL 52.142.223.178:80 tcp
NL 92.63.197.48:80 tcp
NL 92.63.197.48:80 tcp
NL 92.63.197.48:80 tcp
NL 92.63.197.60:80 tcp
NL 92.63.197.60:80 tcp

Files

memory/3516-0-0x0000000000400000-0x000000000045E000-memory.dmp

memory/3516-2-0x0000000000520000-0x0000000000620000-memory.dmp

memory/3516-3-0x0000000000400000-0x000000000040C000-memory.dmp

C:\Windows\T405969330203590\winsvcs.exe

MD5 a6600bbc94769a3917bd904750eb3419
SHA1 859af2db53e25db37da6f8331ee59f1e5b81276e
SHA256 9c3bb8ebaa6719d2cb7247ae6f093c1a8f7ed7ab1d4877bc7be58d0f734e37d9
SHA512 4a36b69b53842dd5490f1f8fbefefc10cc822f4bb3e93e27bb14c86c49220b9469c10fa650f0ecd1d543495857b35839e33fdf6c245df4da6fc319d90dab6dc4

memory/2456-10-0x0000000000400000-0x000000000045E000-memory.dmp

memory/2456-11-0x0000000000400000-0x000000000045E000-memory.dmp

memory/3516-12-0x0000000000400000-0x000000000045E000-memory.dmp

memory/2456-15-0x0000000000400000-0x000000000045E000-memory.dmp