Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
20/06/2024, 12:01
Static task
static1
Behavioral task
behavioral1
Sample
05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe
-
Size
76KB
-
MD5
05cdfb4b706fb9cd7d6a7bda1c914e2f
-
SHA1
600b39263330c0540663258a90b80e969a66b51a
-
SHA256
be9f21483d3992e06ab32dd76b07f33efa28e5fd58c3e2028918cef7bbd5ecbf
-
SHA512
88d8361445503f7699ac6a0cdc1246abbb06071b58fb9380ec00ab8daf4a1961fafec9140c6f54981a27d4d8d0a786d841449406f5eeba481b9761ad3e6f1447
-
SSDEEP
1536:/WCxNHViTUuhH+HnqqXznnGIu8X+o+2K:XLHViwuheHnqYjGIu84
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2180 servicesc.exe -
Loads dropped DLL 2 IoCs
pid Process 2844 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe 2844 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2180 servicesc.exe 2180 servicesc.exe 2180 servicesc.exe 2180 servicesc.exe 2180 servicesc.exe 2180 servicesc.exe 2180 servicesc.exe 2180 servicesc.exe 2180 servicesc.exe 2180 servicesc.exe 2180 servicesc.exe 2180 servicesc.exe 2180 servicesc.exe 2180 servicesc.exe 2180 servicesc.exe 2180 servicesc.exe 2180 servicesc.exe 2180 servicesc.exe 2180 servicesc.exe 2180 servicesc.exe 2180 servicesc.exe 2180 servicesc.exe 2180 servicesc.exe 2180 servicesc.exe 2180 servicesc.exe 2180 servicesc.exe 2180 servicesc.exe 2180 servicesc.exe 2180 servicesc.exe 2180 servicesc.exe 2180 servicesc.exe 2180 servicesc.exe 2180 servicesc.exe 2180 servicesc.exe 2180 servicesc.exe 2180 servicesc.exe 2180 servicesc.exe 2180 servicesc.exe 2180 servicesc.exe 2180 servicesc.exe 2180 servicesc.exe 2180 servicesc.exe 2180 servicesc.exe 2180 servicesc.exe 2180 servicesc.exe 2180 servicesc.exe 2180 servicesc.exe 2180 servicesc.exe 2180 servicesc.exe 2180 servicesc.exe 2180 servicesc.exe 2180 servicesc.exe 2180 servicesc.exe 2180 servicesc.exe 2180 servicesc.exe 2180 servicesc.exe 2180 servicesc.exe 2180 servicesc.exe 2180 servicesc.exe 2180 servicesc.exe 2180 servicesc.exe 2180 servicesc.exe 2180 servicesc.exe 2180 servicesc.exe -
Suspicious use of SetWindowsHookEx 34 IoCs
pid Process 2844 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe 2844 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe 2844 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe 2180 servicesc.exe 2952 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe 2952 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe 2952 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe 1200 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe 1200 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe 1200 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe 2316 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe 2316 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe 2316 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe 1988 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe 1988 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe 1988 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe 2508 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe 2508 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe 2508 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe 1880 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe 1880 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe 1880 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe 1044 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe 1044 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe 1044 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe 2640 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe 2640 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe 2640 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe 2204 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe 2204 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe 2204 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe 1528 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe 1528 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe 1528 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2844 wrote to memory of 1872 2844 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe 28 PID 2844 wrote to memory of 1872 2844 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe 28 PID 2844 wrote to memory of 1872 2844 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe 28 PID 2844 wrote to memory of 1872 2844 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe 28 PID 2844 wrote to memory of 2180 2844 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe 30 PID 2844 wrote to memory of 2180 2844 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe 30 PID 2844 wrote to memory of 2180 2844 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe 30 PID 2844 wrote to memory of 2180 2844 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe 30 PID 2180 wrote to memory of 2952 2180 servicesc.exe 32 PID 2180 wrote to memory of 2952 2180 servicesc.exe 32 PID 2180 wrote to memory of 2952 2180 servicesc.exe 32 PID 2180 wrote to memory of 2952 2180 servicesc.exe 32 PID 2952 wrote to memory of 1600 2952 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe 33 PID 2952 wrote to memory of 1600 2952 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe 33 PID 2952 wrote to memory of 1600 2952 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe 33 PID 2952 wrote to memory of 1600 2952 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe 33 PID 2180 wrote to memory of 1200 2180 servicesc.exe 36 PID 2180 wrote to memory of 1200 2180 servicesc.exe 36 PID 2180 wrote to memory of 1200 2180 servicesc.exe 36 PID 2180 wrote to memory of 1200 2180 servicesc.exe 36 PID 1200 wrote to memory of 268 1200 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe 37 PID 1200 wrote to memory of 268 1200 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe 37 PID 1200 wrote to memory of 268 1200 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe 37 PID 1200 wrote to memory of 268 1200 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe 37 PID 2180 wrote to memory of 2316 2180 servicesc.exe 40 PID 2180 wrote to memory of 2316 2180 servicesc.exe 40 PID 2180 wrote to memory of 2316 2180 servicesc.exe 40 PID 2180 wrote to memory of 2316 2180 servicesc.exe 40 PID 2316 wrote to memory of 2336 2316 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe 41 PID 2316 wrote to memory of 2336 2316 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe 41 PID 2316 wrote to memory of 2336 2316 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe 41 PID 2316 wrote to memory of 2336 2316 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe 41 PID 2180 wrote to memory of 1988 2180 servicesc.exe 46 PID 2180 wrote to memory of 1988 2180 servicesc.exe 46 PID 2180 wrote to memory of 1988 2180 servicesc.exe 46 PID 2180 wrote to memory of 1988 2180 servicesc.exe 46 PID 1988 wrote to memory of 2676 1988 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe 47 PID 1988 wrote to memory of 2676 1988 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe 47 PID 1988 wrote to memory of 2676 1988 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe 47 PID 1988 wrote to memory of 2676 1988 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe 47 PID 2180 wrote to memory of 2508 2180 servicesc.exe 50 PID 2180 wrote to memory of 2508 2180 servicesc.exe 50 PID 2180 wrote to memory of 2508 2180 servicesc.exe 50 PID 2180 wrote to memory of 2508 2180 servicesc.exe 50 PID 2508 wrote to memory of 2484 2508 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe 51 PID 2508 wrote to memory of 2484 2508 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe 51 PID 2508 wrote to memory of 2484 2508 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe 51 PID 2508 wrote to memory of 2484 2508 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe 51 PID 2180 wrote to memory of 1880 2180 servicesc.exe 54 PID 2180 wrote to memory of 1880 2180 servicesc.exe 54 PID 2180 wrote to memory of 1880 2180 servicesc.exe 54 PID 2180 wrote to memory of 1880 2180 servicesc.exe 54 PID 1880 wrote to memory of 2952 1880 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe 55 PID 1880 wrote to memory of 2952 1880 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe 55 PID 1880 wrote to memory of 2952 1880 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe 55 PID 1880 wrote to memory of 2952 1880 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe 55 PID 2180 wrote to memory of 1044 2180 servicesc.exe 58 PID 2180 wrote to memory of 1044 2180 servicesc.exe 58 PID 2180 wrote to memory of 1044 2180 servicesc.exe 58 PID 2180 wrote to memory of 1044 2180 servicesc.exe 58 PID 1044 wrote to memory of 1740 1044 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe 59 PID 1044 wrote to memory of 1740 1044 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe 59 PID 1044 wrote to memory of 1740 1044 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe 59 PID 1044 wrote to memory of 1740 1044 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe 59
Processes
-
C:\Users\Admin\AppData\Local\Temp\05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Drivers32" /v wavemapper /t reg_sz /d "msaom32.drv" /f2⤵PID:1872
-
-
C:\Users\Admin\AppData\Local\Temp\servicesc.exeC:\Users\Admin\AppData\Local\Temp\servicesc.exe 05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe3⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Drivers32" /v wavemapper /t reg_sz /d "msaom32.drv" /f4⤵PID:1600
-
-
-
C:\Users\Admin\AppData\Local\Temp\05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe3⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Drivers32" /v wavemapper /t reg_sz /d "msaom32.drv" /f4⤵PID:268
-
-
-
C:\Users\Admin\AppData\Local\Temp\05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe3⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Drivers32" /v wavemapper /t reg_sz /d "msaom32.drv" /f4⤵PID:2336
-
-
-
C:\Users\Admin\AppData\Local\Temp\05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe3⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Drivers32" /v wavemapper /t reg_sz /d "msaom32.drv" /f4⤵PID:2676
-
-
-
C:\Users\Admin\AppData\Local\Temp\05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe3⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Drivers32" /v wavemapper /t reg_sz /d "msaom32.drv" /f4⤵PID:2484
-
-
-
C:\Users\Admin\AppData\Local\Temp\05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe3⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Drivers32" /v wavemapper /t reg_sz /d "msaom32.drv" /f4⤵PID:2952
-
-
-
C:\Users\Admin\AppData\Local\Temp\05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe3⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Drivers32" /v wavemapper /t reg_sz /d "msaom32.drv" /f4⤵PID:1740
-
-
-
C:\Users\Admin\AppData\Local\Temp\05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe3⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2640 -
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Drivers32" /v wavemapper /t reg_sz /d "msaom32.drv" /f4⤵PID:2620
-
-
-
C:\Users\Admin\AppData\Local\Temp\05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe3⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2204 -
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Drivers32" /v wavemapper /t reg_sz /d "msaom32.drv" /f4⤵PID:1504
-
-
-
C:\Users\Admin\AppData\Local\Temp\05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\05cdfb4b706fb9cd7d6a7bda1c914e2f_JaffaCakes118.exe3⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1528 -
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Drivers32" /v wavemapper /t reg_sz /d "msaom32.drv" /f4⤵PID:1320
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\G17BROQF\ErrorPageTemplate[1]
Filesize2KB
MD5f4fe1cb77e758e1ba56b8a8ec20417c5
SHA1f4eda06901edb98633a686b11d02f4925f827bf0
SHA2568d018639281b33da8eb3ce0b21d11e1d414e59024c3689f92be8904eb5779b5f
SHA51262514ab345b6648c5442200a8e9530dfb88a0355e262069e0a694289c39a4a1c06c6143e5961074bfac219949102a416c09733f24e8468984b96843dc222b436
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\G17BROQF\httpErrorPagesScripts[1]
Filesize8KB
MD53f57b781cb3ef114dd0b665151571b7b
SHA1ce6a63f996df3a1cccb81720e21204b825e0238c
SHA25646e019fa34465f4ed096a9665d1827b54553931ad82e98be01edb1ddbc94d3ad
SHA5128cbf4ef582332ae7ea605f910ad6f8a4bc28513482409fa84f08943a72cac2cf0fa32b6af4c20c697e1fac2c5ba16b5a64a23af0c11eefbf69625b8f9f90c8fa
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\G17BROQF\navcancl[1]
Filesize2KB
MD54bcfe9f8db04948cddb5e31fe6a7f984
SHA142464c70fc16f3f361c2419751acd57d51613cdf
SHA256bee0439fcf31de76d6e2d7fd377a24a34ac8763d5bf4114da5e1663009e24228
SHA512bb0ef3d32310644285f4062ad5f27f30649c04c5a442361a5dbe3672bd8cb585160187070872a31d9f30b70397d81449623510365a371e73bda580e00eef0e4e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\J8SD872Q\NewErrorPageTemplate[1]
Filesize1KB
MD5cdf81e591d9cbfb47a7f97a2bcdb70b9
SHA18f12010dfaacdecad77b70a3e781c707cf328496
SHA256204d95c6fb161368c795bb63e538fe0b11f9e406494bb5758b3b0d60c5f651bd
SHA512977dcc2c6488acaf0e5970cef1a7a72c9f9dc6bb82da54f057e0853c8e939e4ab01b163eb7a5058e093a8bc44ecad9d06880fdc883e67e28ac67fee4d070a4cc
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\J8SD872Q\bullet[1]
Filesize447B
MD526f971d87ca00e23bd2d064524aef838
SHA17440beff2f4f8fabc9315608a13bf26cabad27d9
SHA2561d8e5fd3c1fd384c0a7507e7283c7fe8f65015e521b84569132a7eabedc9d41d
SHA512c62eb51be301bb96c80539d66a73cd17ca2021d5d816233853a37db72e04050271e581cc99652f3d8469b390003ca6c62dad2a9d57164c620b7777ae99aa1b15
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\J8SD872Q\dnserrordiagoff[1]
Filesize1KB
MD547f581b112d58eda23ea8b2e08cf0ff0
SHA16ec1df5eaec1439573aef0fb96dabfc953305e5b
SHA256b1c947d00db5fce43314c56c663dbeae0ffa13407c9c16225c17ccefc3afa928
SHA512187383eef3d646091e9f68eff680a11c7947b3d9b54a78cc6de4a04629d7037e9c97673ac054a6f1cf591235c110ca181a6b69ecba0e5032168f56f4486fff92
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MNCIS1YI\background_gradient[1]
Filesize453B
MD520f0110ed5e4e0d5384a496e4880139b
SHA151f5fc61d8bf19100df0f8aadaa57fcd9c086255
SHA2561471693be91e53c2640fe7baeecbc624530b088444222d93f2815dfce1865d5b
SHA5125f52c117e346111d99d3b642926139178a80b9ec03147c00e27f07aab47fe38e9319fe983444f3e0e36def1e86dd7c56c25e44b14efdc3f13b45ededa064db5a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MNCIS1YI\errorPageStrings[1]
Filesize2KB
MD5e3e4a98353f119b80b323302f26b78fa
SHA120ee35a370cdd3a8a7d04b506410300fd0a6a864
SHA2569466d620dc57835a2475f8f71e304f54aee7160e134ba160baae0f19e5e71e66
SHA512d8e4d73c76804a5abebd5dbc3a86dcdb6e73107b873175a8de67332c113fb7c4899890bf7972e467866fa4cd100a7e2a10a770e5a9c41cbf23b54351b771dcee
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\TTL9DZJ3\info_48[1]
Filesize4KB
MD55565250fcc163aa3a79f0b746416ce69
SHA1b97cc66471fcdee07d0ee36c7fb03f342c231f8f
SHA25651129c6c98a82ea491f89857c31146ecec14c4af184517450a7a20c699c84859
SHA512e60ea153b0fece4d311769391d3b763b14b9a140105a36a13dad23c2906735eaab9092236deb8c68ef078e8864d6e288bef7ef1731c1e9f1ad9b0170b95ac134
-
Filesize
32KB
MD59c0c3f36050671fd62bbc9fb99c96113
SHA10722154e81a065baebd42df01b451f1b25e7e217
SHA256d6fffe4e441dbb09c864a308a5606d38b9f0f6e5d51eb944b111229118433a96
SHA512bb28a9d8e990e977630e3c42daee6d31274ce3006258bf902b7c3902f422090e2f168d109a195f0e58b5c96fd5a61f17440c7d5370d90e4cb99d9f4b8f7070dc