Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27/06/2024, 18:04
Static task
static1
Behavioral task
behavioral1
Sample
16f902491090535d69774895fde63bf4_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
16f902491090535d69774895fde63bf4_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
16f902491090535d69774895fde63bf4_JaffaCakes118.exe
-
Size
124KB
-
MD5
16f902491090535d69774895fde63bf4
-
SHA1
f7273cac1b3ed08cc15275a5eb3a6771daa6b91b
-
SHA256
76869418b743d0c1c2ff4241f62f2ae0c63af1233dfb577eb71baad3be896f96
-
SHA512
1a32ec1437b121956a0a366ffa93511b42c17a59b032333482fa5eea5b462805772f02014a808a95f7dca48e050d23cd5c4305a67c37624c4441acafe12ac691
-
SSDEEP
1536:ylUNYw+Awk9/0WmGOq4OroRm2oO0jYlcwrLpdUGvd:yxAws/ldrom9cDr9OG
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\info.exe" 16f902491090535d69774895fde63bf4_JaffaCakes118.exe -
Drops file in Drivers directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\IsDrv120.sys 16f902491090535d69774895fde63bf4_JaffaCakes118.exe File created C:\Windows\SysWOW64\drivers\IsDrv118.sys 16f902491090535d69774895fde63bf4_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\IsDrv120.sys 16f902491090535d69774895fde63bf4_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\IsDrv118.sys 16f902491090535d69774895fde63bf4_JaffaCakes118.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 26 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ccenter.exe 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ccenter.exe\Debugger = "C:\\info.exe" 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icesword.exe 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\syssafe.exe 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sreng.exe\Debugger = "C:\\info.exe" 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\autorun.exe\Debugger = "C:\\info.exe" 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ravmon.exe 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmd.exe\Debugger = "C:\\info.exe" 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rfwmain.exe\Debugger = "C:\\info.exe" 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kwatch.exe\Debugger = "C:\\info.exe" 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmd.exe 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\Debugger = "C:\\info.exe" 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kwatch.exe 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sreng.exe 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rfwmain.exe 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp.exe\Debugger = "C:\\info.exe" 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ravmon.exe\Debugger = "C:\\info.exe" 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icesword.exe\Debugger = "C:\\info.exe" 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\syssafe.exe\Debugger = "C:\\info.exe" 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp.exe 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\notepad.exe 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\notepad.exe\Debugger = "C:\\info.exe" 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe\Debugger = "C:\\info.exe" 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\autorun.exe 16f902491090535d69774895fde63bf4_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\B-A-I-D-U-C-O-M = "C:\\info.exe" 16f902491090535d69774895fde63bf4_JaffaCakes118.exe -
Drops autorun.inf file 1 TTPs 48 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created \??\Y:\autorun.inf 16f902491090535d69774895fde63bf4_JaffaCakes118.exe File opened for modification \??\I:\autorun.inf 16f902491090535d69774895fde63bf4_JaffaCakes118.exe File opened for modification \??\W:\autorun.inf 16f902491090535d69774895fde63bf4_JaffaCakes118.exe File created D:\autorun.inf 16f902491090535d69774895fde63bf4_JaffaCakes118.exe File created F:\autorun.inf 16f902491090535d69774895fde63bf4_JaffaCakes118.exe File created \??\P:\autorun.inf 16f902491090535d69774895fde63bf4_JaffaCakes118.exe File created \??\T:\autorun.inf 16f902491090535d69774895fde63bf4_JaffaCakes118.exe File created \??\U:\autorun.inf 16f902491090535d69774895fde63bf4_JaffaCakes118.exe File opened for modification \??\X:\autorun.inf 16f902491090535d69774895fde63bf4_JaffaCakes118.exe File created \??\c:\autorun.inf 16f902491090535d69774895fde63bf4_JaffaCakes118.exe File opened for modification F:\autorun.inf 16f902491090535d69774895fde63bf4_JaffaCakes118.exe File opened for modification \??\Q:\autorun.inf 16f902491090535d69774895fde63bf4_JaffaCakes118.exe File opened for modification \??\V:\autorun.inf 16f902491090535d69774895fde63bf4_JaffaCakes118.exe File opened for modification \??\T:\autorun.inf 16f902491090535d69774895fde63bf4_JaffaCakes118.exe File opened for modification \??\Y:\autorun.inf 16f902491090535d69774895fde63bf4_JaffaCakes118.exe File created \??\E:\autorun.inf 16f902491090535d69774895fde63bf4_JaffaCakes118.exe File created \??\M:\autorun.inf 16f902491090535d69774895fde63bf4_JaffaCakes118.exe File created \??\R:\autorun.inf 16f902491090535d69774895fde63bf4_JaffaCakes118.exe File opened for modification D:\autorun.inf 16f902491090535d69774895fde63bf4_JaffaCakes118.exe File opened for modification \??\G:\autorun.inf 16f902491090535d69774895fde63bf4_JaffaCakes118.exe File opened for modification \??\S:\autorun.inf 16f902491090535d69774895fde63bf4_JaffaCakes118.exe File opened for modification \??\U:\autorun.inf 16f902491090535d69774895fde63bf4_JaffaCakes118.exe File created \??\O:\autorun.inf 16f902491090535d69774895fde63bf4_JaffaCakes118.exe File created \??\V:\autorun.inf 16f902491090535d69774895fde63bf4_JaffaCakes118.exe File created \??\Z:\autorun.inf 16f902491090535d69774895fde63bf4_JaffaCakes118.exe File opened for modification \??\E:\autorun.inf 16f902491090535d69774895fde63bf4_JaffaCakes118.exe File opened for modification \??\R:\autorun.inf 16f902491090535d69774895fde63bf4_JaffaCakes118.exe File opened for modification \??\J:\autorun.inf 16f902491090535d69774895fde63bf4_JaffaCakes118.exe File opened for modification \??\M:\autorun.inf 16f902491090535d69774895fde63bf4_JaffaCakes118.exe File opened for modification \??\Z:\autorun.inf 16f902491090535d69774895fde63bf4_JaffaCakes118.exe File created \??\J:\autorun.inf 16f902491090535d69774895fde63bf4_JaffaCakes118.exe File created \??\K:\autorun.inf 16f902491090535d69774895fde63bf4_JaffaCakes118.exe File created \??\L:\autorun.inf 16f902491090535d69774895fde63bf4_JaffaCakes118.exe File created \??\N:\autorun.inf 16f902491090535d69774895fde63bf4_JaffaCakes118.exe File created \??\Q:\autorun.inf 16f902491090535d69774895fde63bf4_JaffaCakes118.exe File opened for modification \??\N:\autorun.inf 16f902491090535d69774895fde63bf4_JaffaCakes118.exe File created \??\G:\autorun.inf 16f902491090535d69774895fde63bf4_JaffaCakes118.exe File created \??\I:\autorun.inf 16f902491090535d69774895fde63bf4_JaffaCakes118.exe File created \??\S:\autorun.inf 16f902491090535d69774895fde63bf4_JaffaCakes118.exe File opened for modification \??\H:\autorun.inf 16f902491090535d69774895fde63bf4_JaffaCakes118.exe File opened for modification \??\K:\autorun.inf 16f902491090535d69774895fde63bf4_JaffaCakes118.exe File opened for modification \??\O:\autorun.inf 16f902491090535d69774895fde63bf4_JaffaCakes118.exe File opened for modification \??\P:\autorun.inf 16f902491090535d69774895fde63bf4_JaffaCakes118.exe File created \??\H:\autorun.inf 16f902491090535d69774895fde63bf4_JaffaCakes118.exe File created \??\W:\autorun.inf 16f902491090535d69774895fde63bf4_JaffaCakes118.exe File created \??\X:\autorun.inf 16f902491090535d69774895fde63bf4_JaffaCakes118.exe File opened for modification C:\autorun.inf 16f902491090535d69774895fde63bf4_JaffaCakes118.exe File opened for modification \??\L:\autorun.inf 16f902491090535d69774895fde63bf4_JaffaCakes118.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_0FB9553B978E7F00C6B2309507DEB64A svchost.exe File created C:\Windows\SysWOW64\SysSafe.exe 16f902491090535d69774895fde63bf4_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\SysSafe.exe 16f902491090535d69774895fde63bf4_JaffaCakes118.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776 svchost.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.baidu.com.cn/" 16f902491090535d69774895fde63bf4_JaffaCakes118.exe -
Modifies data under HKEY_USERS 40 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates svchost.exe Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\Disallowed svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs svchost.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\SmartCardRoot svchost.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\CA svchost.exe Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\CA svchost.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\Disallowed svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs svchost.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\Root svchost.exe Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\TrustedPeople svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs svchost.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\TrustedPeople svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs svchost.exe Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\trust svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates svchost.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\trust svchost.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeSystemtimePrivilege 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Token: SeSystemtimePrivilege 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Token: SeSystemtimePrivilege 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Token: SeSystemtimePrivilege 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Token: SeSystemtimePrivilege 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Token: SeSystemtimePrivilege 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Token: SeSystemtimePrivilege 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Token: SeSystemtimePrivilege 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Token: SeSystemtimePrivilege 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Token: SeSystemtimePrivilege 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Token: SeSystemtimePrivilege 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Token: SeSystemtimePrivilege 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Token: SeSystemtimePrivilege 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Token: SeSystemtimePrivilege 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Token: SeSystemtimePrivilege 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Token: SeSystemtimePrivilege 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Token: SeSystemtimePrivilege 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Token: SeSystemtimePrivilege 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Token: SeSystemtimePrivilege 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Token: SeSystemtimePrivilege 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Token: SeSystemtimePrivilege 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Token: SeSystemtimePrivilege 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Token: SeSystemtimePrivilege 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Token: SeSystemtimePrivilege 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Token: SeSystemtimePrivilege 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Token: SeSystemtimePrivilege 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Token: SeSystemtimePrivilege 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Token: SeSystemtimePrivilege 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Token: SeSystemtimePrivilege 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Token: SeSystemtimePrivilege 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Token: SeSystemtimePrivilege 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Token: SeSystemtimePrivilege 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Token: SeSystemtimePrivilege 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Token: SeSystemtimePrivilege 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Token: SeSystemtimePrivilege 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Token: SeSystemtimePrivilege 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Token: SeSystemtimePrivilege 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Token: SeSystemtimePrivilege 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Token: SeSystemtimePrivilege 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Token: SeSystemtimePrivilege 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Token: SeSystemtimePrivilege 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Token: SeSystemtimePrivilege 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Token: SeSystemtimePrivilege 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Token: SeSystemtimePrivilege 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Token: SeSystemtimePrivilege 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Token: SeSystemtimePrivilege 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Token: SeSystemtimePrivilege 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Token: SeSystemtimePrivilege 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Token: SeSystemtimePrivilege 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Token: SeSystemtimePrivilege 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Token: SeSystemtimePrivilege 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Token: SeSystemtimePrivilege 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Token: SeSystemtimePrivilege 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Token: SeSystemtimePrivilege 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Token: SeSystemtimePrivilege 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Token: SeSystemtimePrivilege 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Token: SeSystemtimePrivilege 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Token: SeSystemtimePrivilege 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Token: SeSystemtimePrivilege 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Token: SeSystemtimePrivilege 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Token: SeSystemtimePrivilege 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Token: SeSystemtimePrivilege 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Token: SeSystemtimePrivilege 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe Token: SeSystemtimePrivilege 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3868 wrote to memory of 5076 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe 89 PID 3868 wrote to memory of 5076 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe 89 PID 3868 wrote to memory of 5076 3868 16f902491090535d69774895fde63bf4_JaffaCakes118.exe 89 PID 5076 wrote to memory of 2372 5076 net.exe 91 PID 5076 wrote to memory of 2372 5076 net.exe 91 PID 5076 wrote to memory of 2372 5076 net.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\16f902491090535d69774895fde63bf4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\16f902491090535d69774895fde63bf4_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Adds Run key to start application
- Drops autorun.inf file
- Drops file in System32 directory
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Windows\SysWOW64\net.exenet stop cryptsvc2⤵
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop cryptsvc3⤵PID:2372
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:3296
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4172 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:81⤵PID:4160
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Image File Execution Options Injection
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749
Filesize290B
MD533d563b3d8989cb393030706ce00039f
SHA129bb2ce3489790498b03780e555dce3ee7157dba
SHA256ab9f044d8161f906023bcecf3749ae35c17917f0dfe12e95092f996ee2247648
SHA5129b13ee78cc392ace226e0cdbbbae6329ea180cacac94ed1f5874d370c7b4a4a15ddffb4cbb5214187ab15ec5eac4a7b4a3f4e8d8636d9ad0b7272705f0b6eaff
-
Filesize
4B
MD5e89854dfc541758037d0d9898aac114b
SHA1352c5f759fbd5da2383af80f897e0012db3d45ed
SHA256f015c4c4e29b4b0d404d2b8dd98be87d41bf486b711aeba13379eee5095ecbaf
SHA512b555df0a92d57756da8887a945d1fc668b494973fe3011828e43dcf9b381a4197eaf9121010716173fea331cf3f2fea9cf85e4fb2dc550fcb32cb61448be7465
-
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749
Filesize330B
MD50099d790fbf62a56397430bbffb33cec
SHA1dee8a7993f59d72b2fc2d6e5da7ef82b771f478f
SHA2563c2bddb4a42085348f2a17c25b27846419127011b802cf18f2c158fd1b315eab
SHA5127c50580b77383084368488e8ad63057c06101e6dfb7e3d1810d71ef51df2548195ab93893a06d0939857d16f8b0d30318a0c298ad228b284a6bbf000ceccf5c6
-
Filesize
119B
MD58815ca284498e1a366afbb10c60e95e9
SHA1fb02189ab180d7d72567cf31c8ee3ed2a85dbed1
SHA2560ef510e196e2d7432dff036164ffd3845fbb0f8cd59511a93b032e7b42c326be
SHA512d683e4954f450296472ebfbf1fd3704e9fb1db65bf99f61d58c81dfcc5414a44bfe31198c29167c0c171bcc0e77b89e393039bb61b17b7c9d5a9803bcde5361d
-
Filesize
124KB
MD516f902491090535d69774895fde63bf4
SHA1f7273cac1b3ed08cc15275a5eb3a6771daa6b91b
SHA25676869418b743d0c1c2ff4241f62f2ae0c63af1233dfb577eb71baad3be896f96
SHA5121a32ec1437b121956a0a366ffa93511b42c17a59b032333482fa5eea5b462805772f02014a808a95f7dca48e050d23cd5c4305a67c37624c4441acafe12ac691