Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
15-06-2024 14:23
Static task
static1
Behavioral task
behavioral1
Sample
aed7120328d1178bb11ae8a029fc6854_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
aed7120328d1178bb11ae8a029fc6854_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
aed7120328d1178bb11ae8a029fc6854_JaffaCakes118.exe
-
Size
262KB
-
MD5
aed7120328d1178bb11ae8a029fc6854
-
SHA1
a81d2fce8c1f7dcefde149f0ed53f36e9af6f062
-
SHA256
0167b5509d7491f76be962a85b4b2638aac06a4cef0fc3dbff155a63dc058d25
-
SHA512
9eef5728d823a12bc63010b64f6fb4c63bc144fd480d38547a93d48fa7e7d828f36537d21cab4a724f5caf810767b9d2b14c1abda0407d634cde01bb49a12f19
-
SSDEEP
6144:yeuqqTPZEnjdVF1pTsF1lVVBsVEiMTJeIBjFWLXx/:yEqTPKd71i6W4IBgLXl
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.es\# DECRYPT MY FILES #.txt
cerber
http://cerberhhyed5frqa.sims6n.win/1B12-00A0-AF97-0044-3E25
http://cerberhhyed5frqa.m5gid4.win/1B12-00A0-AF97-0044-3E25
http://cerberhhyed5frqa.wewiso.win/1B12-00A0-AF97-0044-3E25
http://cerberhhyed5frqa.moneu5.win/1B12-00A0-AF97-0044-3E25
http://cerberhhyed5frqa.wins4n.win/1B12-00A0-AF97-0044-3E25
http://cerberhhyed5frqa.onion/1B12-00A0-AF97-0044-3E25
Extracted
C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.es\# DECRYPT MY FILES #.html
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Contacts a large (16389) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 2800 bcdedit.exe 2780 bcdedit.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{32FA63F1-D64D-114D-3379-634918E2D550}\\xpsrchvw.exe\"" aed7120328d1178bb11ae8a029fc6854_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{32FA63F1-D64D-114D-3379-634918E2D550}\\xpsrchvw.exe\"" xpsrchvw.exe -
Deletes itself 1 IoCs
pid Process 2120 cmd.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\xpsrchvw.lnk aed7120328d1178bb11ae8a029fc6854_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\xpsrchvw.lnk xpsrchvw.exe -
Executes dropped EXE 1 IoCs
pid Process 3064 xpsrchvw.exe -
Loads dropped DLL 3 IoCs
pid Process 1916 aed7120328d1178bb11ae8a029fc6854_JaffaCakes118.exe 1916 aed7120328d1178bb11ae8a029fc6854_JaffaCakes118.exe 3064 xpsrchvw.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\xpsrchvw = "\"C:\\Users\\Admin\\AppData\\Roaming\\{32FA63F1-D64D-114D-3379-634918E2D550}\\xpsrchvw.exe\"" xpsrchvw.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\xpsrchvw = "\"C:\\Users\\Admin\\AppData\\Roaming\\{32FA63F1-D64D-114D-3379-634918E2D550}\\xpsrchvw.exe\"" aed7120328d1178bb11ae8a029fc6854_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\xpsrchvw = "\"C:\\Users\\Admin\\AppData\\Roaming\\{32FA63F1-D64D-114D-3379-634918E2D550}\\xpsrchvw.exe\"" aed7120328d1178bb11ae8a029fc6854_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\xpsrchvw = "\"C:\\Users\\Admin\\AppData\\Roaming\\{32FA63F1-D64D-114D-3379-634918E2D550}\\xpsrchvw.exe\"" xpsrchvw.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA xpsrchvw.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ipinfo.io -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp2F0C.bmp" xpsrchvw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2620 vssadmin.exe -
Kills process with taskkill 2 IoCs
pid Process 2560 taskkill.exe 2920 taskkill.exe -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Control Panel\Desktop aed7120328d1178bb11ae8a029fc6854_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{32FA63F1-D64D-114D-3379-634918E2D550}\\xpsrchvw.exe\"" aed7120328d1178bb11ae8a029fc6854_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Control Panel\Desktop xpsrchvw.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{32FA63F1-D64D-114D-3379-634918E2D550}\\xpsrchvw.exe\"" xpsrchvw.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a807600000000020000000000106600000001000020000000f6fa3bd34e43f9b83bfd324405e5eac32ef6c17607d847d372df2814e707248a000000000e8000000002000020000000f03fca08ecd6e18c1cf225b18f888501b6066a44ffea8d35bbf053066272b6fe200000006ebcc38c9edb4459ad865bd1f347976edb36fadcb5e64ed2bdb6d8dff0b7b57e40000000344ce2fb4b7a4e58bf59d3eb7b1d08f15035fed769f957f8554099ef092154de8c4001980147747db9295dc62e7c75c45e9df225e425fa76cb05197d0579ccfc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0ebceed2fbfda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2A272951-2B23-11EF-BE23-DE271FC37611} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 2856 PING.EXE 2736 PING.EXE -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 3064 xpsrchvw.exe 3064 xpsrchvw.exe 3064 xpsrchvw.exe 3064 xpsrchvw.exe 3064 xpsrchvw.exe 3064 xpsrchvw.exe 3064 xpsrchvw.exe 3064 xpsrchvw.exe 3064 xpsrchvw.exe 3064 xpsrchvw.exe 3064 xpsrchvw.exe 3064 xpsrchvw.exe 3064 xpsrchvw.exe 3064 xpsrchvw.exe 3064 xpsrchvw.exe 3064 xpsrchvw.exe 3064 xpsrchvw.exe 3064 xpsrchvw.exe -
Suspicious use of AdjustPrivilegeToken 51 IoCs
description pid Process Token: SeDebugPrivilege 1916 aed7120328d1178bb11ae8a029fc6854_JaffaCakes118.exe Token: SeDebugPrivilege 2560 taskkill.exe Token: SeDebugPrivilege 3064 xpsrchvw.exe Token: SeBackupPrivilege 2452 vssvc.exe Token: SeRestorePrivilege 2452 vssvc.exe Token: SeAuditPrivilege 2452 vssvc.exe Token: SeIncreaseQuotaPrivilege 984 wmic.exe Token: SeSecurityPrivilege 984 wmic.exe Token: SeTakeOwnershipPrivilege 984 wmic.exe Token: SeLoadDriverPrivilege 984 wmic.exe Token: SeSystemProfilePrivilege 984 wmic.exe Token: SeSystemtimePrivilege 984 wmic.exe Token: SeProfSingleProcessPrivilege 984 wmic.exe Token: SeIncBasePriorityPrivilege 984 wmic.exe Token: SeCreatePagefilePrivilege 984 wmic.exe Token: SeBackupPrivilege 984 wmic.exe Token: SeRestorePrivilege 984 wmic.exe Token: SeShutdownPrivilege 984 wmic.exe Token: SeDebugPrivilege 984 wmic.exe Token: SeSystemEnvironmentPrivilege 984 wmic.exe Token: SeRemoteShutdownPrivilege 984 wmic.exe Token: SeUndockPrivilege 984 wmic.exe Token: SeManageVolumePrivilege 984 wmic.exe Token: 33 984 wmic.exe Token: 34 984 wmic.exe Token: 35 984 wmic.exe Token: SeIncreaseQuotaPrivilege 984 wmic.exe Token: SeSecurityPrivilege 984 wmic.exe Token: SeTakeOwnershipPrivilege 984 wmic.exe Token: SeLoadDriverPrivilege 984 wmic.exe Token: SeSystemProfilePrivilege 984 wmic.exe Token: SeSystemtimePrivilege 984 wmic.exe Token: SeProfSingleProcessPrivilege 984 wmic.exe Token: SeIncBasePriorityPrivilege 984 wmic.exe Token: SeCreatePagefilePrivilege 984 wmic.exe Token: SeBackupPrivilege 984 wmic.exe Token: SeRestorePrivilege 984 wmic.exe Token: SeShutdownPrivilege 984 wmic.exe Token: SeDebugPrivilege 984 wmic.exe Token: SeSystemEnvironmentPrivilege 984 wmic.exe Token: SeRemoteShutdownPrivilege 984 wmic.exe Token: SeUndockPrivilege 984 wmic.exe Token: SeManageVolumePrivilege 984 wmic.exe Token: 33 984 wmic.exe Token: 34 984 wmic.exe Token: 35 984 wmic.exe Token: 33 2624 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2624 AUDIODG.EXE Token: 33 2624 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2624 AUDIODG.EXE Token: SeDebugPrivilege 2920 taskkill.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1004 iexplore.exe 1004 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 1004 iexplore.exe 1004 iexplore.exe 1004 iexplore.exe 1004 iexplore.exe 1064 IEXPLORE.EXE 1064 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 62 IoCs
description pid Process procid_target PID 1916 wrote to memory of 3064 1916 aed7120328d1178bb11ae8a029fc6854_JaffaCakes118.exe 28 PID 1916 wrote to memory of 3064 1916 aed7120328d1178bb11ae8a029fc6854_JaffaCakes118.exe 28 PID 1916 wrote to memory of 3064 1916 aed7120328d1178bb11ae8a029fc6854_JaffaCakes118.exe 28 PID 1916 wrote to memory of 3064 1916 aed7120328d1178bb11ae8a029fc6854_JaffaCakes118.exe 28 PID 1916 wrote to memory of 2120 1916 aed7120328d1178bb11ae8a029fc6854_JaffaCakes118.exe 29 PID 1916 wrote to memory of 2120 1916 aed7120328d1178bb11ae8a029fc6854_JaffaCakes118.exe 29 PID 1916 wrote to memory of 2120 1916 aed7120328d1178bb11ae8a029fc6854_JaffaCakes118.exe 29 PID 1916 wrote to memory of 2120 1916 aed7120328d1178bb11ae8a029fc6854_JaffaCakes118.exe 29 PID 2120 wrote to memory of 2560 2120 cmd.exe 31 PID 2120 wrote to memory of 2560 2120 cmd.exe 31 PID 2120 wrote to memory of 2560 2120 cmd.exe 31 PID 2120 wrote to memory of 2560 2120 cmd.exe 31 PID 2120 wrote to memory of 2856 2120 cmd.exe 33 PID 2120 wrote to memory of 2856 2120 cmd.exe 33 PID 2120 wrote to memory of 2856 2120 cmd.exe 33 PID 2120 wrote to memory of 2856 2120 cmd.exe 33 PID 3064 wrote to memory of 2620 3064 xpsrchvw.exe 34 PID 3064 wrote to memory of 2620 3064 xpsrchvw.exe 34 PID 3064 wrote to memory of 2620 3064 xpsrchvw.exe 34 PID 3064 wrote to memory of 2620 3064 xpsrchvw.exe 34 PID 3064 wrote to memory of 984 3064 xpsrchvw.exe 38 PID 3064 wrote to memory of 984 3064 xpsrchvw.exe 38 PID 3064 wrote to memory of 984 3064 xpsrchvw.exe 38 PID 3064 wrote to memory of 984 3064 xpsrchvw.exe 38 PID 3064 wrote to memory of 2800 3064 xpsrchvw.exe 40 PID 3064 wrote to memory of 2800 3064 xpsrchvw.exe 40 PID 3064 wrote to memory of 2800 3064 xpsrchvw.exe 40 PID 3064 wrote to memory of 2800 3064 xpsrchvw.exe 40 PID 3064 wrote to memory of 2780 3064 xpsrchvw.exe 42 PID 3064 wrote to memory of 2780 3064 xpsrchvw.exe 42 PID 3064 wrote to memory of 2780 3064 xpsrchvw.exe 42 PID 3064 wrote to memory of 2780 3064 xpsrchvw.exe 42 PID 3064 wrote to memory of 1004 3064 xpsrchvw.exe 48 PID 3064 wrote to memory of 1004 3064 xpsrchvw.exe 48 PID 3064 wrote to memory of 1004 3064 xpsrchvw.exe 48 PID 3064 wrote to memory of 1004 3064 xpsrchvw.exe 48 PID 3064 wrote to memory of 860 3064 xpsrchvw.exe 49 PID 3064 wrote to memory of 860 3064 xpsrchvw.exe 49 PID 3064 wrote to memory of 860 3064 xpsrchvw.exe 49 PID 3064 wrote to memory of 860 3064 xpsrchvw.exe 49 PID 1004 wrote to memory of 1064 1004 iexplore.exe 50 PID 1004 wrote to memory of 1064 1004 iexplore.exe 50 PID 1004 wrote to memory of 1064 1004 iexplore.exe 50 PID 1004 wrote to memory of 1064 1004 iexplore.exe 50 PID 1004 wrote to memory of 3012 1004 iexplore.exe 51 PID 1004 wrote to memory of 3012 1004 iexplore.exe 51 PID 1004 wrote to memory of 3012 1004 iexplore.exe 51 PID 1004 wrote to memory of 3012 1004 iexplore.exe 51 PID 3064 wrote to memory of 2480 3064 xpsrchvw.exe 52 PID 3064 wrote to memory of 2480 3064 xpsrchvw.exe 52 PID 3064 wrote to memory of 2480 3064 xpsrchvw.exe 52 PID 3064 wrote to memory of 2480 3064 xpsrchvw.exe 52 PID 3064 wrote to memory of 2152 3064 xpsrchvw.exe 56 PID 3064 wrote to memory of 2152 3064 xpsrchvw.exe 56 PID 3064 wrote to memory of 2152 3064 xpsrchvw.exe 56 PID 3064 wrote to memory of 2152 3064 xpsrchvw.exe 56 PID 2152 wrote to memory of 2920 2152 cmd.exe 58 PID 2152 wrote to memory of 2920 2152 cmd.exe 58 PID 2152 wrote to memory of 2920 2152 cmd.exe 58 PID 2152 wrote to memory of 2736 2152 cmd.exe 60 PID 2152 wrote to memory of 2736 2152 cmd.exe 60 PID 2152 wrote to memory of 2736 2152 cmd.exe 60 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\aed7120328d1178bb11ae8a029fc6854_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\aed7120328d1178bb11ae8a029fc6854_JaffaCakes118.exe"1⤵
- Adds policy Run key to start application
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Users\Admin\AppData\Roaming\{32FA63F1-D64D-114D-3379-634918E2D550}\xpsrchvw.exe"C:\Users\Admin\AppData\Roaming\{32FA63F1-D64D-114D-3379-634918E2D550}\xpsrchvw.exe"2⤵
- Adds policy Run key to start application
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Sets desktop wallpaper using registry
- Modifies Control Panel
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\system32\vssadmin.exe"C:\Windows\system32\vssadmin.exe" delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2620
-
-
C:\Windows\system32\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:984
-
-
C:\Windows\System32\bcdedit.exe"C:\Windows\System32\bcdedit.exe" /set {default} recoveryenabled no3⤵
- Modifies boot configuration data using bcdedit
PID:2800
-
-
C:\Windows\System32\bcdedit.exe"C:\Windows\System32\bcdedit.exe" /set {default} bootstatuspolicy ignoreallfailures3⤵
- Modifies boot configuration data using bcdedit
PID:2780
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1004 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1064
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1004 CREDAT:537601 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3012
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt3⤵PID:860
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"3⤵PID:2480
-
-
C:\Windows\system32\cmd.exe/d /c taskkill /t /f /im "xpsrchvw.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{32FA63F1-D64D-114D-3379-634918E2D550}\xpsrchvw.exe" > NUL3⤵
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\system32\taskkill.exetaskkill /t /f /im "xpsrchvw.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2920
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.14⤵
- Runs ping.exe
PID:2736
-
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "aed7120328d1178bb11ae8a029fc6854_JaffaCakes118.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\aed7120328d1178bb11ae8a029fc6854_JaffaCakes118.exe" > NUL2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "aed7120328d1178bb11ae8a029fc6854_JaffaCakes118.exe"3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2560
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.13⤵
- Runs ping.exe
PID:2856
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2452
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵PID:2896
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x51c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2624
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
219B
MD535a3e3b45dcfc1e6c4fd4a160873a0d1
SHA1a0bcc855f2b75d82cbaae3a8710f816956e94b37
SHA2568ad5e0f423ce1ff13f45a79746813f0f1d56993d7f125ab96f3d93fb54bdc934
SHA5126d8e68b969ef67903aff526e983b0fb496678e4c819139e560a11f754a36c4b5770ac2ecf3fc1d9cb5aaa84f80363b4f55553255569503893192911b80d9d853
-
Filesize
12KB
MD59fe12f21c75913c26027f1217dd0b335
SHA12a889c4843c8a40d3f8234244065a2eb8ed49be2
SHA256a3be2fe7b3a6edac32371ef555a19166ff81c313958aa58e2730848ff804679a
SHA5127fc179fdc5715e06a9838a8c1c4a20ab57650d0d0989dbb6e0786c6590744f2cbe8419d2a41aad048206e8ea2c4c87cad1d981e7f8f6ca2cb1ce23be8e1d4d9f
-
Filesize
10KB
MD531e8dc49c6fc31deb98d7556aa5a9b97
SHA1cb34697e7ca5f6e65ae04085d16d4531d4800dba
SHA256c5e398124199f2c3cf5db58a8183b046af3db13a50d2de8a7dc5210f141318a6
SHA51289d7ccc45458645bd8ef6068c857dbc05f323cd5bf9530c5e76ba2bf0d6f4be591ad37e22434243556acf6d35d1b0fb266985162a34dd6b068811de3cfa19cc3
-
Filesize
85B
MD585ae0f16f0104e44a0e727411d46db8c
SHA199b1cbac3806e5cd6ab980aa696f2b2368b82ebb
SHA2565e86f90062c31ca492d10afb1de8d902c4210e46bf2c43003f5a8c783f6968ee
SHA512053d305cfd091941394f7ff2058deeeb3bab296942a600c7147be42cad8bb35ca1b3564f40468363e13c564b4838dcffe99e65963e6c56553d6d7452f40ebc65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1d505da729c6e2823d99410707b39cb
SHA180a9e22b7467c9071d920c21c06b357d0838af96
SHA2563bebc2152f14578d8903b23cc674f796444523a395c255c3ea26819efb01a78f
SHA51245ae832b93cc85c9d135253a870b9871394a297bce9d954c22ca40225a89fc2c8f4422736a4e83a96d1a31594b8007b84ae37cc9fa06bcafde88256cc15dd398
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5955367d1ddacf2590808f593af853a7c
SHA123e210b66e9b1eccc6b641fd89a3b450e3d18339
SHA2563934dce1d4535e6cb5853cc8483d537e6292466769b72f6b8e978fcf10445046
SHA512aa674d4bbc58095a43aa62cde2cab7c8cea346d85550b4790e0cd201e6091dcaea0986de95e7a4a1c81b1b19d696a1b65611f7e54f77eeb9d9a02cf881af4f95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e908ecf13599d03dc1b3ced57a19911
SHA188d04d04266422412cfd8847d08f2f964f0f0a27
SHA25669d30f1676c16c88f3c72b63eb962cfd8c14cf631eb9f0780375742bf4f044c7
SHA5128fe7db6f6580240d865f17502da3dbc4e1bb872305db3339f4a4b476c9768c8b1f5a0e3b3e0d118c8f3b251c18587d4670fb23a4b46a63224b4c653ef3d690de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5415918b5be1f121e71650f8485e86d86
SHA1854600f7faa0b62dd451978202031b2ffb186522
SHA256d31c0aa47f6fa77d1ed84070e400bd118c23161e76904a4bd41f03964b37d8bb
SHA5122172c18d8c1f16f24d48ef99293a7516ade241d39c9c5d1bd7542ba0b0905bca90cf57720b8162290277b057ced90a2513fee9a6acd9a3d7833564cad2c36ffa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd68821438a0007dfe538b2e7a4094c2
SHA193f5a56bf0f1e1f7279a68d6b396eb1da3dbe7af
SHA25620f6eed41ff64f6b4bc8fbf6363a027b5b348371ff1d8c157c3524e63ba15d60
SHA512c54851c36e00f28a3a7d6eee49918ac8de18eabe8fa077548e2cb932376828e491d67f93709071b1deee79ead467f6d975ead425ffdbb3964f0374e963a77a4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f29be4712ac8eb726dde3aecb274edd
SHA1c95cacba672146c9de06446654ee72c4bf138671
SHA256c15ceab04b75c02a5f7cb5638f94b11f5a6f151b85030fc770cfc7c92bdfc09c
SHA51271506cbd8d6d31f41d2ea33472e9cff5b3ae6c917f510858644c81d6923d47e1df9d938efe54f94ce52b494e1f0257f87cb1755afaa1bbdfbb0aa4735d5fbded
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d9f9cd523729de05df7403e5e2ffb47
SHA1337d39c9a805d931a22798089ce7d77c14836b70
SHA2567500c34aa2c9ea3d7d92f6277de80033d310df45c12b828d5d9a5a7fa00c56d0
SHA512b549d47c7466717100c2422785633aed2b02ce2e28e5e5b8a9fc49f5581bea6435b88e5f79ba38e1890c39bcdf31e2b5e51e25a2c756dff7cf52d0cfc77e1de8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e677921dc312d714cab144c0b40bb62f
SHA1eb11eafbee059d7c2f1e698408fdd013063918a4
SHA2566f84ffc41e08fe51c56d339978deb5a80ee0bd87acd35d3fe6a164a6cece121b
SHA512330ecd5876bd9425fecb6728a7f7eacf0eabbc06a30ed65fa3b3189f896c30699e66eca0cc15b514ab83b2098bb955f0f058978d16ef52a368ba6f5929f71de3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
1KB
MD5e88b73121829ac2b05b6c3422f2337b8
SHA16e5d45851eeafe7c1e0cb3a327505c150bfac493
SHA256c752c59990083ef031662c25e43ac714cadf59107d873f8468e37ea3883b2fb0
SHA512669ba2f8658e36a81895fbcf47dc5394c775fc093f71a7f51597fca49dc707f62a43be145fd946beba9bba3017de926970f35c76d3d9527c7799f17ef0a9ddb6
-
Filesize
262KB
MD5aed7120328d1178bb11ae8a029fc6854
SHA1a81d2fce8c1f7dcefde149f0ed53f36e9af6f062
SHA2560167b5509d7491f76be962a85b4b2638aac06a4cef0fc3dbff155a63dc058d25
SHA5129eef5728d823a12bc63010b64f6fb4c63bc144fd480d38547a93d48fa7e7d828f36537d21cab4a724f5caf810767b9d2b14c1abda0407d634cde01bb49a12f19