Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
10/07/2024, 06:32
Static task
static1
Behavioral task
behavioral1
Sample
33aafe1a0a917c2371680d76d141d67c_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
33aafe1a0a917c2371680d76d141d67c_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
33aafe1a0a917c2371680d76d141d67c_JaffaCakes118.exe
-
Size
65KB
-
MD5
33aafe1a0a917c2371680d76d141d67c
-
SHA1
7c41c9a948ec58214341d231bdbf77cddaf8c7db
-
SHA256
91d1491ab1a5aacb13571273a8c24883f474289b1c082bfdf6170e74fa7253cd
-
SHA512
2c9c0d109c59bd035566fc4dcb7f845f3912b22287bbe312bd5f011cc48a8b6c8be0d09ecbb2b114240a76facaeae2a5c9566e9b08b64f2c39b0c1798b2c0079
-
SSDEEP
1536:FIYbNcmmAKwiqcMyY93Bi9L2xtPj1dRuJd9V:GYbN5KKiN03uJB
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation 33aafe1a0a917c2371680d76d141d67c_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation inl95C8.tmp Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation xzz9BA5.tmp -
Executes dropped EXE 3 IoCs
pid Process 3760 inl95C8.tmp 1468 xzz9BA5.tmp 2892 clientex.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\clientex.exe xzz9BA5.tmp -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\microsoft shared\ink\en-US\TabTip.exe.mui xzz9BA5.tmp File opened for modification C:\Program Files\Java\jre-1.8\bin\jabswitch.exe xzz9BA5.tmp File opened for modification C:\Program Files\Microsoft Office\root\Integration\Integrator.exe xzz9BA5.tmp File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.Loader.exe xzz9BA5.tmp File opened for modification C:\Program Files\Microsoft Office\root\Office16\msoasb.exe xzz9BA5.tmp File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\pubs.exe xzz9BA5.tmp File opened for modification C:\Program Files\Windows Media Player\es-ES\wmpnscfg.exe.mui xzz9BA5.tmp File opened for modification C:\Program Files\Windows Photo Viewer\es-ES\ImagingDevices.exe.mui xzz9BA5.tmp File opened for modification C:\Program Files\Windows Defender\es-ES\OfflineScannerShell.exe.mui xzz9BA5.tmp File opened for modification C:\Program Files\Windows Media Player\fr-FR\wmpnetwk.exe.mui xzz9BA5.tmp File opened for modification C:\Program Files\Windows Media Player\wmpconfig.exe xzz9BA5.tmp File opened for modification C:\Program Files\WindowsApps\Microsoft.Xbox.TCUI_1.23.28002.0_x64__8wekyb3d8bbwe\TCUI-App.exe xzz9BA5.tmp File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\java-rmi.exe xzz9BA5.tmp File opened for modification C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE xzz9BA5.tmp File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\joticon.exe xzz9BA5.tmp File opened for modification C:\Program Files\Java\jdk-1.8\bin\jconsole.exe xzz9BA5.tmp File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\Common.DBConnection64.exe xzz9BA5.tmp File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\filecompare.exe xzz9BA5.tmp File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\codecpacks.heif.exe xzz9BA5.tmp File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2018.826.98.0_x64__8wekyb3d8bbwe\WindowsCamera.exe xzz9BA5.tmp File opened for modification C:\Program Files\Java\jdk-1.8\bin\javac.exe xzz9BA5.tmp File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSOSYNC.EXE xzz9BA5.tmp File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\DATABASECOMPARE.EXE xzz9BA5.tmp File opened for modification C:\Program Files\Windows Security\BrowserCore\BrowserCore.exe xzz9BA5.tmp File opened for modification C:\Program Files\Java\jdk-1.8\bin\xjc.exe xzz9BA5.tmp File opened for modification C:\Program Files\Java\jre-1.8\bin\jp2launcher.exe xzz9BA5.tmp File opened for modification C:\Program Files\Microsoft Office\root\Office16\officeappguardwin32.exe xzz9BA5.tmp File opened for modification C:\Program Files\Windows Media Player\ja-JP\wmpnscfg.exe.mui xzz9BA5.tmp File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\PaintStudio.View.exe xzz9BA5.tmp File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeBridge\SkypeBridge.exe.config xzz9BA5.tmp File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\msinfo32.exe.mui xzz9BA5.tmp File opened for modification C:\Program Files\Windows Media Player\it-IT\wmplayer.exe.mui xzz9BA5.tmp File opened for modification C:\Program Files\Windows Media Player\wmpnetwk.exe xzz9BA5.tmp File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_x64__8wekyb3d8bbwe\LocalBridge.exe.config xzz9BA5.tmp File opened for modification C:\Program Files\Internet Explorer\ExtExport.exe xzz9BA5.tmp File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstatd.exe xzz9BA5.tmp File opened for modification C:\Program Files\Microsoft Office\root\Office16\ONENOTEM.EXE xzz9BA5.tmp File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\ja-JP\msinfo32.exe.mui xzz9BA5.tmp File opened for modification C:\Program Files\Java\jdk-1.8\bin\jarsigner.exe xzz9BA5.tmp File opened for modification C:\Program Files\Java\jdk-1.8\bin\servertool.exe xzz9BA5.tmp File opened for modification C:\Program Files\Microsoft Office\root\Office16\PerfBoost.exe xzz9BA5.tmp File opened for modification C:\Program Files\Windows Media Player\en-US\setup_wm.exe.mui xzz9BA5.tmp File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe xzz9BA5.tmp File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\ssvagent.exe xzz9BA5.tmp File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\AppSharingHookController.exe xzz9BA5.tmp File opened for modification C:\Program Files\Windows Photo Viewer\ImagingDevices.exe xzz9BA5.tmp File opened for modification C:\Program Files\Java\jdk-1.8\bin\jmap.exe xzz9BA5.tmp File opened for modification C:\Program Files\Microsoft Office\root\Office16\msotd.exe xzz9BA5.tmp File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\msinfo32.exe.mui xzz9BA5.tmp File opened for modification C:\Program Files\Microsoft Office\root\Office16\protocolhandler.exe xzz9BA5.tmp File opened for modification C:\Program Files\Microsoft Office\root\Office16\VPREVIEW.EXE xzz9BA5.tmp File opened for modification C:\Program Files\Windows Photo Viewer\en-US\ImagingDevices.exe.mui xzz9BA5.tmp File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\msinfo32.exe.mui xzz9BA5.tmp File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSOUC.EXE xzz9BA5.tmp File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.106\notification_helper.exe xzz9BA5.tmp File opened for modification C:\Program Files\Microsoft Office\Office16\OSPPREARM.EXE xzz9BA5.tmp File opened for modification C:\Program Files\Internet Explorer\en-US\ieinstal.exe.mui xzz9BA5.tmp File opened for modification C:\Program Files\Java\jdk-1.8\bin\idlj.exe xzz9BA5.tmp File opened for modification C:\Program Files\Microsoft Office\root\Client\AppVDllSurrogate64.exe xzz9BA5.tmp File opened for modification C:\Program Files\Microsoft Office\root\Office16\msoia.exe xzz9BA5.tmp File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxIdentityProvider_12.50.6001.0_x64__8wekyb3d8bbwe\XboxIdp.exe xzz9BA5.tmp File opened for modification C:\Program Files\Microsoft Office\root\Office16\IEContentService.exe xzz9BA5.tmp File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe xzz9BA5.tmp File opened for modification C:\Program Files\Windows Media Player\de-DE\wmpnetwk.exe.mui xzz9BA5.tmp -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\LOGS\DPX\setupact.log expand.exe File opened for modification C:\Windows\LOGS\DPX\setuperr.log expand.exe File opened for modification C:\Windows\LOGS\DPX\setupact.log expand.exe File opened for modification C:\Windows\LOGS\DPX\setuperr.log expand.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{5C2F9B53-3E86-11EF-AF84-EE1473AF0696} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31117971" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "816437644" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31117971" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d6ae7fc137728b4d8f1885e01307ea05000000000200000000001066000000010000200000004eb65c66d3ab7b5b4bee74b675f45126f2169312e336cab34732abac829ec8be000000000e8000000002000020000000538a5f7b8cf7a990ebb004c4a94d6719a8f8f852bc82bd4d076540f0b898be4920000000ccf881445b83963ed118889b6daa908a50a7ce510edb79b1dc2a63c44c276bdc40000000adf25aec6a16be97e7686e6af22b73f3fa9bc63e2a31a8da490750bef5ac99e1f883960d7df414e3f35f8abd542b6c574b0b8bd3300d2726529533877a3ee64f iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427358201" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31117971" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "816437644" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "836750072" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d6ae7fc137728b4d8f1885e01307ea0500000000020000000000106600000001000020000000b17ca7ef6a06539d9f0e03b1fd7ad791be1ede3988a7fe628b55d06846b923f7000000000e800000000200002000000087af118f5f6fcfebc801615ff40016a22bedbc7b62e5b32ce84e0a85228506cb20000000992d7f0fc47e73bea17f8b455b2a460ff57e33f5b70012268b5c7fe68c32ba9e40000000cc9be654d2f1fa4444db1eefa0fd55975f1e622023325b2451cbab494c60454612d750f893799b71a387e7f81cb4da93a83a44371d794a9dd33f7e0d32286f20 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90dde63193d2da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6061fc3193d2da01 iexplore.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2528 33aafe1a0a917c2371680d76d141d67c_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 3760 inl95C8.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 348 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 348 iexplore.exe 348 iexplore.exe 2160 IEXPLORE.EXE 2160 IEXPLORE.EXE 2160 IEXPLORE.EXE 2160 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2528 wrote to memory of 2976 2528 33aafe1a0a917c2371680d76d141d67c_JaffaCakes118.exe 84 PID 2528 wrote to memory of 2976 2528 33aafe1a0a917c2371680d76d141d67c_JaffaCakes118.exe 84 PID 2528 wrote to memory of 2976 2528 33aafe1a0a917c2371680d76d141d67c_JaffaCakes118.exe 84 PID 2528 wrote to memory of 4228 2528 33aafe1a0a917c2371680d76d141d67c_JaffaCakes118.exe 86 PID 2528 wrote to memory of 4228 2528 33aafe1a0a917c2371680d76d141d67c_JaffaCakes118.exe 86 PID 2528 wrote to memory of 4228 2528 33aafe1a0a917c2371680d76d141d67c_JaffaCakes118.exe 86 PID 2528 wrote to memory of 3148 2528 33aafe1a0a917c2371680d76d141d67c_JaffaCakes118.exe 87 PID 2528 wrote to memory of 3148 2528 33aafe1a0a917c2371680d76d141d67c_JaffaCakes118.exe 87 PID 2528 wrote to memory of 3148 2528 33aafe1a0a917c2371680d76d141d67c_JaffaCakes118.exe 87 PID 2528 wrote to memory of 2056 2528 33aafe1a0a917c2371680d76d141d67c_JaffaCakes118.exe 90 PID 2528 wrote to memory of 2056 2528 33aafe1a0a917c2371680d76d141d67c_JaffaCakes118.exe 90 PID 2528 wrote to memory of 2056 2528 33aafe1a0a917c2371680d76d141d67c_JaffaCakes118.exe 90 PID 2056 wrote to memory of 4248 2056 cmd.exe 93 PID 2056 wrote to memory of 4248 2056 cmd.exe 93 PID 2056 wrote to memory of 4248 2056 cmd.exe 93 PID 3148 wrote to memory of 948 3148 cmd.exe 94 PID 3148 wrote to memory of 948 3148 cmd.exe 94 PID 3148 wrote to memory of 948 3148 cmd.exe 94 PID 2528 wrote to memory of 348 2528 33aafe1a0a917c2371680d76d141d67c_JaffaCakes118.exe 95 PID 2528 wrote to memory of 348 2528 33aafe1a0a917c2371680d76d141d67c_JaffaCakes118.exe 95 PID 2528 wrote to memory of 2936 2528 33aafe1a0a917c2371680d76d141d67c_JaffaCakes118.exe 96 PID 2528 wrote to memory of 2936 2528 33aafe1a0a917c2371680d76d141d67c_JaffaCakes118.exe 96 PID 2528 wrote to memory of 2936 2528 33aafe1a0a917c2371680d76d141d67c_JaffaCakes118.exe 96 PID 348 wrote to memory of 2160 348 iexplore.exe 98 PID 348 wrote to memory of 2160 348 iexplore.exe 98 PID 348 wrote to memory of 2160 348 iexplore.exe 98 PID 4228 wrote to memory of 3760 4228 cmd.exe 92 PID 4228 wrote to memory of 3760 4228 cmd.exe 92 PID 4228 wrote to memory of 3760 4228 cmd.exe 92 PID 2976 wrote to memory of 1468 2976 cmd.exe 97 PID 2976 wrote to memory of 1468 2976 cmd.exe 97 PID 2976 wrote to memory of 1468 2976 cmd.exe 97 PID 3760 wrote to memory of 1640 3760 inl95C8.tmp 101 PID 3760 wrote to memory of 1640 3760 inl95C8.tmp 101 PID 3760 wrote to memory of 1640 3760 inl95C8.tmp 101 PID 1468 wrote to memory of 2892 1468 xzz9BA5.tmp 103 PID 1468 wrote to memory of 2892 1468 xzz9BA5.tmp 103 PID 1468 wrote to memory of 2892 1468 xzz9BA5.tmp 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\33aafe1a0a917c2371680d76d141d67c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\33aafe1a0a917c2371680d76d141d67c_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\run_xz_file.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\xzz9BA5.tmpC:\Users\Admin\AppData\Local\Temp\xzz9BA5.tmp3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Windows\SysWOW64\clientex.exe"C:\Windows\system32\clientex.exe"4⤵
- Executes dropped EXE
PID:2892
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\run_dws_file.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Users\Admin\AppData\Local\Temp\inl95C8.tmpC:\Users\Admin\AppData\Local\Temp\inl95C8.tmp lsm-yiwetm.tmp3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\inl95C8.tmp > nul4⤵PID:1640
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp_ext_favurl_cab.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Windows\SysWOW64\expand.exeexpand.exe "C:\Users\Admin\AppData\Local\Temp\favorites_url.cab" -F:*.* "C:\Users\Admin\Favorites"3⤵
- Drops file in Windows directory
PID:948
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp_ext_deskurl_cab.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\expand.exeexpand.exe "C:\Users\Admin\AppData\Local\Temp\desktop_url.cab" -F:*.* "C:\Users\Admin\Desktop"3⤵
- Drops file in Windows directory
PID:4248
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://tc.92mh.com/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:348 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:348 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2160
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\33AAFE~1.EXE > nul2⤵PID:2936
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
770B
MD538fa2d02e4dff6e43b967cce18d93403
SHA12ff885c783d6a7265e15732fb7ee6bedab28b1b8
SHA2561ca07061059a6c50d2deac5f444900666f9b424ad01ee68ea359ffa44788b114
SHA512bea28a57605172873831fd5f45afd0f09d536b053d9d08e039eb0d1cdae049f061b84d6fb032c0bb71766bf563742c93b6689ec843f7cbbbdc6945938cb3eb0e
-
Filesize
60B
MD50631d9e866ea2cfc3957badf1040d449
SHA1456f7c37f7d1b6decf40743f5b48fa6e3b9f4b97
SHA256ff5c65f631ea1c63a3e81a17f0b905f4b60997390ff17ceb694fce139ca069f4
SHA512e0961420c302c6b0b64299fba2f4c0b20148fbb2cfa86baec2dec42c6a366e9a6005bf63e5a22e68484c760157ce846fa641210513e1a52b433ad3cbac4830bf
-
Filesize
45B
MD596bb8c48a175cd36d4178d320e0efb1d
SHA1783af4346db75a366ffe8f406ed2e0f757430e3e
SHA2565b10e1d7e012b10bd53aa3ffa2d4ea365c261a34e43340f998054bad8717484d
SHA512b9c0225e60f96eb20dd80bb1f724c39ec92d3470e60ccd232ff2b459891abd2af929c4ef5dc72001f294dcdf9eccf4e465f866de1fe2b3b4c219d2a210f327c0
-
Filesize
94B
MD5d5fc3a9ec15a6302543438928c29e284
SHA1fd4199e543f683a8830a88f8ac0d0f001952b506
SHA256b2160315eb2f3bcb2e7601e0ce7fbb4ed72094b891d3db3b5119b07eeccc568d
SHA5124d0378480f1e7d5bee5cf8f8cd3495745c05408785ab687b92be739cd64c077f0e3ee26d6d96e27eb6e2c3dec5f39a2766c45854dc2d6a5b6defc672aeafa0f9
-
Filesize
98B
MD58663de6fce9208b795dc913d1a6a3f5b
SHA1882193f208cf012eaf22eeaa4fef3b67e7c67c15
SHA2562909ea8555f2fc19097c1070a1da8fcfd6dc6886aa1d99d7e0c05e53feeb5b61
SHA5129381063e0f85e874be54ae22675393b82c6ab54b223090148e4acbeff6f22393c96c90b83d6538461b695528af01d1f1231cf5dc719f07d6168386974b490688
-
Filesize
154B
MD58d681a59ea75e91f730bd9ce3c42e514
SHA19d426029daeebf03c9053761e0e5a9f447f98e9c
SHA256afd3d42faa66d6703a32f2f5b41e0d679dd8210aacb284d1e46854207087cac7
SHA512ffece212187fb127e98a612a59e7f2df7e9ebc6fee600644e2eef80d62fcc7d411ffba435b48981c4d75ba0ca34f85ff57091f4098104651710220a28a13ba8d
-
Filesize
155B
MD55a17106c27138df10448c2c3be95f399
SHA156acc2ed4fea4171127a13dcdee08bdd39d674d6
SHA256c544ab13bd785ea3d5792873dedb102e87ea9a3b28fb1283be2eaac363ce360c
SHA5121d8839f36323dfb4458745dbf31a98bc676121db3e4ccda59ca8e177437c85a5811125119fbfa3b5bcde6c2fbf25ae910109e785e276c32fbfebe6437aea8198
-
Filesize
156B
MD58a275b261afcc166671132b6f03831e4
SHA103ac21edc1de2df748ee3a301a6b3de989c423c3
SHA2560296e167f4cfe36275cf1a705a6c56b30b15c0712ec5904b4ed3299f07beee8e
SHA512269cf3d57201d9c390cef3a8e74d63036d300ff464d20b419324d4575c04e004655179ac29da5e3b2b52a5e2b6f37ecbf6e512fa0c2c5d5af0c5a359af51d739
-
Filesize
158B
MD5d645085ab92574a2a17abd323415dde5
SHA149ebaa4499cacd9256f270f35f31684b7cd195b1
SHA25641ef37f97f886f32ec9e4d9ebf58079442d8bc8b102e9487de2f3f7da36e8058
SHA512a726352ef7725eb8f94609dc3b80b5314387416513e654487e6a0b96bab922412b15bfbc07f1643bc104543be7c4c8a1b1472374d8cfe7fa9a010d28a135d654
-
Filesize
157B
MD5993f72a439a3301caeb969c7faa7a8b9
SHA1176244349a0463cd0fc38cad426d89dc3b055311
SHA256b7ea84a9d48f22c799c3c3b96f29f0ae7c1b274e6402d6fbadae31fc053f2140
SHA512c373b12c16c65e966593990019b3a2fd96f703820976835c7ab3d042a997f617f49c1b5110e77833a18b3d2a2bef8fd3a97e77ea05dd7cdce9053840398320d8
-
Filesize
167KB
MD5b26608fca436aa50e17b85942a242324
SHA1ab8b473e3d7e822119bab0826bf90d4ab5ab420c
SHA256d50f0340b5fab132ec17f8aa717d1255db8de54718269467206f9fc61f82b5fb
SHA5120326fb1b4942bc902882f9d71e08dc6edd46037c88aff0c7c2026bbf6904fdf172d23c3dee81ea8afc046fb5e75a1e347a023f0aeaa06de1ef82c00fb816f160
-
Filesize
443B
MD501f8b2509f3844f8c6e8e198555d3ffb
SHA155b531078457f8a5583180b018b178f5294f6fcf
SHA256ab9b1350f19e5c3bcec4b6302ea996a20b07db71cc4f99d46d7b9314f208597e
SHA51298b2e3198935d14a6730d9e1dd22dd9f1c6fc692d5052aef9cde84f6745bde36bec984ea7dca2ada001423416eb6c9eac670dada67fe19c9ccccda83c504bd5d
-
Filesize
425B
MD5da68bc3b7c3525670a04366bc55629f5
SHA115fda47ecfead7db8f7aee6ca7570138ba7f1b71
SHA25673f3605192b676c92649034768378909a19d13883a7ea6f8ba1b096c78ffadb5
SHA5126fee416affcb6a74621479697bca6f14f5429b00de3aa595abe3c60c6b2e094877b59f8783bbe7bdd567fa565d0630bb02def5603f8f0ea92fe8f2c3ac5383c0