Malware Analysis Report

2024-08-06 14:44

Sample ID 240701-n9ldgstfqq
Target 1b3c5144369e21c102063fc18adae793_JaffaCakes118
SHA256 b0deda9f8354364d78134de41f845a194f29dc6e24f6e68c6d959e2e518f3791
Tags
nanocore evasion keylogger spyware stealer trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

b0deda9f8354364d78134de41f845a194f29dc6e24f6e68c6d959e2e518f3791

Threat Level: Known bad

The file 1b3c5144369e21c102063fc18adae793_JaffaCakes118 was found to be: Known bad.

Malicious Activity Summary

nanocore evasion keylogger spyware stealer trojan

NanoCore

Drops startup file

Executes dropped EXE

Loads dropped DLL

Checks whether UAC is enabled

Suspicious use of SetThreadContext

Drops file in Program Files directory

Drops file in Windows directory

Unsigned PE

Suspicious behavior: GetForegroundWindowSpam

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-07-01 12:05

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-07-01 12:05

Reported

2024-07-01 12:08

Platform

win7-20240508-en

Max time kernel

150s

Max time network

152s

Command Line

"C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe"

Signatures

NanoCore

keylogger trojan stealer spyware nanocore

Drops startup file

Description Indicator Process Target
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Silverlight.exe C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe N/A
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Silverlight.exe C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Windows\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\7-Zip\7zFM.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\7-Zip\Uninstall.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\notification_helper.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\7-Zip\7z.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Common Files\Microsoft Shared\VSTO\10.0\VSTOInstaller.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\7-Zip\7zG.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe C:\Windows\svchost.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\svchost.exe C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1868 wrote to memory of 2040 N/A C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe C:\Windows\svchost.exe
PID 1868 wrote to memory of 2040 N/A C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe C:\Windows\svchost.exe
PID 1868 wrote to memory of 2040 N/A C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe C:\Windows\svchost.exe
PID 1868 wrote to memory of 2040 N/A C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe C:\Windows\svchost.exe
PID 2040 wrote to memory of 2748 N/A C:\Windows\svchost.exe C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe
PID 2040 wrote to memory of 2748 N/A C:\Windows\svchost.exe C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe
PID 2040 wrote to memory of 2748 N/A C:\Windows\svchost.exe C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe
PID 2040 wrote to memory of 2748 N/A C:\Windows\svchost.exe C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe
PID 2748 wrote to memory of 2560 N/A C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe
PID 2748 wrote to memory of 2560 N/A C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe
PID 2748 wrote to memory of 2560 N/A C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe
PID 2748 wrote to memory of 2560 N/A C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe
PID 2748 wrote to memory of 2560 N/A C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe
PID 2748 wrote to memory of 2560 N/A C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe
PID 2748 wrote to memory of 2560 N/A C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe
PID 2748 wrote to memory of 2560 N/A C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe
PID 2748 wrote to memory of 2560 N/A C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe

Processes

C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe"

C:\Windows\svchost.exe

"C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe"

C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe"

C:\Windows\svchost.exe

C:\Windows\svchost.exe

C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe

C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 queda2122.ddns.net udp
US 8.8.8.8:53 queda2122.ddns.net udp
US 8.8.8.8:53 queda2122.ddns.net udp
US 8.8.8.8:53 queda212.ddns.net udp
US 8.8.8.8:53 queda212.ddns.net udp
US 8.8.8.8:53 queda212.ddns.net udp
US 8.8.8.8:53 queda2122.ddns.net udp
US 8.8.8.8:53 queda2122.ddns.net udp
US 8.8.8.8:53 queda2122.ddns.net udp
US 8.8.8.8:53 queda212.ddns.net udp
US 8.8.8.8:53 queda212.ddns.net udp
US 8.8.8.8:53 queda212.ddns.net udp
US 8.8.8.8:53 queda2122.ddns.net udp
US 8.8.8.8:53 queda2122.ddns.net udp
US 8.8.8.8:53 queda2122.ddns.net udp
US 8.8.8.8:53 queda212.ddns.net udp
US 8.8.8.8:53 queda212.ddns.net udp
US 8.8.8.8:53 queda212.ddns.net udp
US 8.8.8.8:53 queda2122.ddns.net udp
US 8.8.8.8:53 queda2122.ddns.net udp
US 8.8.8.8:53 queda2122.ddns.net udp
US 8.8.8.8:53 queda212.ddns.net udp
US 8.8.8.8:53 queda212.ddns.net udp
US 8.8.8.8:53 queda212.ddns.net udp
US 8.8.8.8:53 queda2122.ddns.net udp
US 8.8.8.8:53 queda2122.ddns.net udp
US 8.8.8.8:53 queda2122.ddns.net udp
US 8.8.8.8:53 queda212.ddns.net udp

Files

C:\Windows\svchost.exe

MD5 9e3c13b6556d5636b745d3e466d47467
SHA1 2ac1c19e268c49bc508f83fe3d20f495deb3e538
SHA256 20af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8
SHA512 5a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b

memory/1868-6-0x0000000000400000-0x0000000000438000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe

MD5 7c1ff03d7f14a5eabd43873bb4971b5f
SHA1 aca8440bef0d1b53d7b7396f7cb6b44891d4e9ef
SHA256 d84feff4c109ae89c3712afd4454ec8a2e9171930cee71d665fd7bbe705b095e
SHA512 e6d79aafc34567dc6057db11194bc6fcf9012e2eeb0373f695507339f05ca20ae8f5bf4460976d7f38731546110cfdd9798c883238f3ecaba37b07a63f7552fd

memory/2748-17-0x0000000074F51000-0x0000000074F52000-memory.dmp

memory/2040-16-0x0000000000400000-0x000000000040D000-memory.dmp

memory/2748-20-0x0000000074F50000-0x00000000754FB000-memory.dmp

memory/2748-21-0x0000000074F50000-0x00000000754FB000-memory.dmp

memory/2748-22-0x0000000074F50000-0x00000000754FB000-memory.dmp

memory/2748-24-0x0000000074F50000-0x00000000754FB000-memory.dmp

memory/2984-25-0x0000000000400000-0x000000000040D000-memory.dmp

memory/2748-26-0x0000000074F50000-0x00000000754FB000-memory.dmp

memory/2560-30-0x0000000000400000-0x0000000000438000-memory.dmp

memory/2560-35-0x0000000000400000-0x0000000000438000-memory.dmp

memory/2560-33-0x0000000000400000-0x0000000000438000-memory.dmp

memory/2560-36-0x0000000074F50000-0x00000000754FB000-memory.dmp

memory/2560-37-0x0000000074F50000-0x00000000754FB000-memory.dmp

memory/2560-38-0x0000000074F50000-0x00000000754FB000-memory.dmp

memory/2748-40-0x0000000074F50000-0x00000000754FB000-memory.dmp

memory/2560-46-0x0000000074F50000-0x00000000754FB000-memory.dmp

memory/2984-51-0x0000000000400000-0x000000000040D000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-07-01 12:05

Reported

2024-07-01 12:08

Platform

win10v2004-20240226-en

Max time kernel

154s

Max time network

162s

Command Line

"C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe"

Signatures

NanoCore

keylogger trojan stealer spyware nanocore

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Silverlight.exe C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Silverlight.exe C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\LICLUA.EXE C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\dotnet\dotnet.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\bin\jar.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\bin\javapackager.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\bin\javac.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\7-Zip\7zG.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\bin\jabswitch.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\bin\javap.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\bin\javafxpackager.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\bin\javah.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\7-Zip\7z.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\7-Zip\7zFM.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.0\createdump.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\notification_helper.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\bin\appletviewer.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\7-Zip\Uninstall.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\bin\jarsigner.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\bin\extcheck.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\bin\java-rmi.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\bin\javadoc.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.25\createdump.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\bin\idlj.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\bin\java.exe C:\Windows\svchost.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\svchost.exe C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2332 wrote to memory of 2904 N/A C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe C:\Windows\svchost.exe
PID 2332 wrote to memory of 2904 N/A C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe C:\Windows\svchost.exe
PID 2332 wrote to memory of 2904 N/A C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe C:\Windows\svchost.exe
PID 2904 wrote to memory of 4132 N/A C:\Windows\svchost.exe C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe
PID 2904 wrote to memory of 4132 N/A C:\Windows\svchost.exe C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe
PID 2904 wrote to memory of 4132 N/A C:\Windows\svchost.exe C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe
PID 4132 wrote to memory of 2780 N/A C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe
PID 4132 wrote to memory of 2780 N/A C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe
PID 4132 wrote to memory of 2780 N/A C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe
PID 4132 wrote to memory of 2780 N/A C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe
PID 4132 wrote to memory of 2780 N/A C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe
PID 4132 wrote to memory of 2780 N/A C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe
PID 4132 wrote to memory of 2780 N/A C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe
PID 4132 wrote to memory of 2780 N/A C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe

Processes

C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe"

C:\Windows\svchost.exe

"C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe"

C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe"

C:\Windows\svchost.exe

C:\Windows\svchost.exe

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1332 --field-trial-handle=3060,i,1774866140584649235,8085848018931772189,262144 --variations-seed-version /prefetch:8

C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe

C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe

Network

Country Destination Domain Proto
GB 142.250.200.42:443 tcp
US 8.8.8.8:53 82.90.14.23.in-addr.arpa udp
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 82.177.190.20.in-addr.arpa udp
US 8.8.8.8:53 157.123.68.40.in-addr.arpa udp
US 13.107.246.64:443 tcp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 queda2122.ddns.net udp
US 8.8.8.8:53 queda2122.ddns.net udp
US 8.8.8.8:53 queda2122.ddns.net udp
US 8.8.8.8:53 queda212.ddns.net udp
US 8.8.8.8:53 11.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 queda212.ddns.net udp
US 8.8.8.8:53 queda212.ddns.net udp
US 8.8.8.8:53 queda2122.ddns.net udp
US 8.8.8.8:53 queda2122.ddns.net udp
US 8.8.8.8:53 queda2122.ddns.net udp
US 8.8.8.8:53 queda212.ddns.net udp
US 8.8.8.8:53 queda212.ddns.net udp
US 8.8.8.8:53 queda212.ddns.net udp
US 8.8.8.8:53 queda2122.ddns.net udp
US 8.8.8.8:53 queda2122.ddns.net udp
US 8.8.8.8:53 queda2122.ddns.net udp
US 8.8.8.8:53 queda212.ddns.net udp
US 8.8.8.8:53 queda212.ddns.net udp
US 8.8.8.8:53 queda212.ddns.net udp
US 8.8.8.8:53 queda2122.ddns.net udp
US 8.8.8.8:53 14.173.189.20.in-addr.arpa udp
US 8.8.8.8:53 queda2122.ddns.net udp
US 8.8.8.8:53 queda2122.ddns.net udp
US 8.8.8.8:53 queda212.ddns.net udp

Files

C:\Windows\svchost.exe

MD5 9e3c13b6556d5636b745d3e466d47467
SHA1 2ac1c19e268c49bc508f83fe3d20f495deb3e538
SHA256 20af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8
SHA512 5a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b

memory/2332-3-0x0000000000400000-0x0000000000438000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\1b3c5144369e21c102063fc18adae793_JaffaCakes118.exe

MD5 7c1ff03d7f14a5eabd43873bb4971b5f
SHA1 aca8440bef0d1b53d7b7396f7cb6b44891d4e9ef
SHA256 d84feff4c109ae89c3712afd4454ec8a2e9171930cee71d665fd7bbe705b095e
SHA512 e6d79aafc34567dc6057db11194bc6fcf9012e2eeb0373f695507339f05ca20ae8f5bf4460976d7f38731546110cfdd9798c883238f3ecaba37b07a63f7552fd

memory/2904-10-0x0000000000400000-0x000000000040D000-memory.dmp

memory/4132-14-0x0000000074FA2000-0x0000000074FA3000-memory.dmp

memory/4132-15-0x0000000074FA0000-0x0000000075551000-memory.dmp

memory/4132-16-0x0000000074FA0000-0x0000000075551000-memory.dmp

memory/4132-17-0x0000000074FA0000-0x0000000075551000-memory.dmp

memory/4656-18-0x0000000000400000-0x000000000040D000-memory.dmp

memory/4132-21-0x0000000074FA2000-0x0000000074FA3000-memory.dmp

memory/4132-22-0x0000000074FA0000-0x0000000075551000-memory.dmp

memory/4132-23-0x0000000074FA0000-0x0000000075551000-memory.dmp

memory/4656-26-0x0000000000400000-0x000000000040D000-memory.dmp

memory/2780-27-0x0000000000400000-0x0000000000438000-memory.dmp

memory/2780-29-0x0000000074FA0000-0x0000000075551000-memory.dmp

memory/2780-30-0x0000000074FA0000-0x0000000075551000-memory.dmp

memory/2780-31-0x0000000074FA0000-0x0000000075551000-memory.dmp

memory/4132-34-0x0000000074FA0000-0x0000000075551000-memory.dmp

memory/2780-35-0x0000000074FA0000-0x0000000075551000-memory.dmp

memory/2780-38-0x0000000074FA0000-0x0000000075551000-memory.dmp

memory/2780-39-0x0000000074FA0000-0x0000000075551000-memory.dmp

memory/2780-40-0x0000000074FA0000-0x0000000075551000-memory.dmp

memory/2780-41-0x0000000074FA0000-0x0000000075551000-memory.dmp

memory/4656-43-0x0000000000400000-0x000000000040D000-memory.dmp