Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
95s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
10/07/2024, 08:53
Static task
static1
Behavioral task
behavioral1
Sample
340d8df768269411ee6196e347585b68_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
340d8df768269411ee6196e347585b68_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
340d8df768269411ee6196e347585b68_JaffaCakes118.exe
-
Size
1.9MB
-
MD5
340d8df768269411ee6196e347585b68
-
SHA1
c9a828abe5fbf97f3593c9797c4fb7142e4b482d
-
SHA256
893ce8410fb15a7802523f033f4abdffd8ef35c1a2342199e6c09c54173dff9d
-
SHA512
e03a0ba6521f2b30da8cc7c6948af23bfbfb4d532a605187d607cac6810e3c9161dd4f1a4f2d3f4b36709c8ba349831daae8cc44ae7cfc74657c18a25fbfa182
-
SSDEEP
49152:fHqjfedt0TY2oHtMYQ0M/pBi1tR6TRJLu:Wfedt0TYH+0M/pBmkTjLu
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 5 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D27CDB6E-AE6D-11CF-96B8-444553540000} msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D27CDB6E-AE6D-11CF-96B8-444553540000}\ = "Macromedia Shockwave Flash" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D27CDB6E-AE6D-11CF-96B8-444553540000}\Locale = "EN" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D27CDB6E-AE6D-11CF-96B8-444553540000}\Version = "8.0" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D27CDB6E-AE6D-11CF-96B8-444553540000}\ComponentID = "Flash" msiexec.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\Control Panel\International\Geo\Nation 340d8df768269411ee6196e347585b68_JaffaCakes118.exe -
Loads dropped DLL 6 IoCs
pid Process 3556 MsiExec.exe 3556 MsiExec.exe 3556 MsiExec.exe 3556 MsiExec.exe 3556 MsiExec.exe 3556 MsiExec.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 5 1964 msiexec.exe 9 1964 msiexec.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\P: msiexec.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\Macromed\Flash\Flash8.ocx msiexec.exe File created C:\Windows\SysWOW64\Macromed\Flash\GetFlash.exe msiexec.exe File created C:\Windows\SysWOW64\Macromed\Flash\GetFlash.exe.manifest msiexec.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File opened for modification C:\Windows\Installer\MSI8770.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI881D.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI8A34.tmp msiexec.exe File opened for modification C:\Windows\Installer\e57858b.msi msiexec.exe File created C:\Windows\Installer\SourceHash{6815FCDD-401D-481E-BA88-31B4754C2B46} msiexec.exe File created C:\Windows\Installer\e57858f.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI8977.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSI883D.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI8919.tmp msiexec.exe File created C:\Windows\Installer\e57858b.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{D27CDB6E-AE6D-11CF-96B8-444553540000}\Compatibility Flags = "0" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{D27CDB6E-AE6D-11CF-96B8-444553540000} msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{D27CDB6E-AE6D-11CF-96B8-444553540000}\ msiexec.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ShockwaveFlash.ShockwaveFlash.3\CLSID\ = "{D27CDB6E-AE6D-11cf-96B8-444553540000}" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ShockwaveFlash.ShockwaveFlash.4\ = "Shockwave Flash Object" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D27CDB6D-AE6D-11CF-96B8-444553540000}\ProxyStubClsid32 MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\FlashFactory.FlashFactory.1\ = "Macromedia Flash Factory Object" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\Control MsiExec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\Programmable MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\ToolboxBitmap32\ = "C:\\Windows\\SysWow64\\Macromed\\Flash\\Flash8.ocx, 1" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mfp\ = "MacromediaFlashPaper.MacromediaFlashPaper" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sol\Content Type = "text/plain" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\Control MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{307F64C0-621D-4D56-BBC6-91EFC13CE40D}\TypeLib\Version = "1.0" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\VersionIndependentProgID MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D27CDB6C-AE6D-11CF-96B8-444553540000}\ = "IShockwaveFlash" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\ProgID MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\InprocServer32 MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/futuresplash\Extension = ".spl" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1171A62F-05D2-11D1-83FC-00A0C9089C5A}\Programmable MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{307F64C0-621D-4D56-BBC6-91EFC13CE40D}\TypeLib\Version = "1.0" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{57A0E746-3863-4D20-A811-950C84F1DB9B}\1.0\FLAGS MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{57A0E747-3863-4D20-A811-950C84F1DB9B}\TypeLib\Version = "1.0" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\EnableFullPage\.mfp MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\FlashProp.FlashProp\CurVer MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D27CDB6D-AE6D-11CF-96B8-444553540000} MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D27CDB6D-AE6D-11CF-96B8-444553540000}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{57A0E747-3863-4D20-A811-950C84F1DB9B}\ProxyStubClsid32 MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{57A0E747-3863-4D20-A811-950C84F1DB9B}\TypeLib\ = "{57A0E746-3863-4D20-A811-950C84F1DB9B}" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ShockwaveFlash.ShockwaveFlash.3\ = "Shockwave Flash Object" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\Programmable MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000} MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D27CDB6D-AE6D-11CF-96B8-444553540000}\ProxyStubClsid32 MsiExec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\Programmable MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/futuresplash\CLSID = "{D27CDB6E-AE6D-11cf-96B8-444553540000}" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ShockwaveFlash.ShockwaveFlash.1\CLSID MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\VersionIndependentProgID\ = "ShockwaveFlash.ShockwaveFlash" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D27CDB6B-AE6D-11CF-96B8-444553540000}\1.0\ = "Shockwave Flash" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{57A0E746-3863-4D20-A811-950C84F1DB9B}\1.0 MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{307F64C0-621D-4D56-BBC6-91EFC13CE40D}\ = "ISimpleTextSelection" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\Version MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D27CDB6B-AE6D-11CF-96B8-444553540000}\1.0\HELPDIR MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D27CDB6D-AE6D-11CF-96B8-444553540000}\TypeLib\Version = "1.0" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{57A0E747-3863-4D20-A811-950C84F1DB9B}\ = "IFlashAccessibility" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ShockwaveFlash.ShockwaveFlash.1\CLSID\ = "{D27CDB6E-AE6D-11cf-96B8-444553540000}" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\VersionIndependentProgID\ = "FlashFactory.FlashFactory" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\TypeLib\ = "{D27CDB6B-AE6D-11cf-96B8-444553540000}" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\FlashProp.FlashProp.1\CLSID\ = "{1171A62F-05D2-11D1-83FC-00A0C9089C5A}" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{57A0E747-3863-4D20-A811-950C84F1DB9B}\TypeLib MsiExec.exe Key created \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000_Classes\Local Settings 340d8df768269411ee6196e347585b68_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\Implemented Categories\{7DD95801-9882-11CF-9FA9-00AA006C42C4} MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\Version MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\FlashProp.FlashProp MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D27CDB6D-AE6D-11CF-96B8-444553540000}\TypeLib\ = "{D27CDB6B-AE6D-11CF-96B8-444553540000}" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\EnableFullPage MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D27CDB6D-AE6D-11CF-96B8-444553540000}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ShockwaveFlash.ShockwaveFlash\ = "Shockwave Flash Object" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1171A62F-05D2-11D1-83FC-00A0C9089C5A}\InprocServer32\ = "C:\\Windows\\SysWow64\\Macromed\\Flash\\Flash8.ocx" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D27CDB6D-AE6D-11CF-96B8-444553540000}\ = "_IShockwaveFlashEvents" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D27CDB6D-AE6D-11CF-96B8-444553540000}\TypeLib\Version = "1.0" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\ProgID\ = "ShockwaveFlash.ShockwaveFlash.1" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.spl\ = "ShockwaveFlash.ShockwaveFlash" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ShockwaveFlash.ShockwaveFlash.6 MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D27CDB6D-AE6D-11CF-96B8-444553540000}\TypeLib MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D27CDB6B-AE6D-11CF-96B8-444553540000}\1.0\0\win32 MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000} MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\TypeLib\ = "{D27CDB6B-AE6D-11cf-96B8-444553540000}" MsiExec.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1964 msiexec.exe 1964 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4824 msiexec.exe Token: SeIncreaseQuotaPrivilege 4824 msiexec.exe Token: SeSecurityPrivilege 1964 msiexec.exe Token: SeCreateTokenPrivilege 4824 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 4824 msiexec.exe Token: SeLockMemoryPrivilege 4824 msiexec.exe Token: SeIncreaseQuotaPrivilege 4824 msiexec.exe Token: SeMachineAccountPrivilege 4824 msiexec.exe Token: SeTcbPrivilege 4824 msiexec.exe Token: SeSecurityPrivilege 4824 msiexec.exe Token: SeTakeOwnershipPrivilege 4824 msiexec.exe Token: SeLoadDriverPrivilege 4824 msiexec.exe Token: SeSystemProfilePrivilege 4824 msiexec.exe Token: SeSystemtimePrivilege 4824 msiexec.exe Token: SeProfSingleProcessPrivilege 4824 msiexec.exe Token: SeIncBasePriorityPrivilege 4824 msiexec.exe Token: SeCreatePagefilePrivilege 4824 msiexec.exe Token: SeCreatePermanentPrivilege 4824 msiexec.exe Token: SeBackupPrivilege 4824 msiexec.exe Token: SeRestorePrivilege 4824 msiexec.exe Token: SeShutdownPrivilege 4824 msiexec.exe Token: SeDebugPrivilege 4824 msiexec.exe Token: SeAuditPrivilege 4824 msiexec.exe Token: SeSystemEnvironmentPrivilege 4824 msiexec.exe Token: SeChangeNotifyPrivilege 4824 msiexec.exe Token: SeRemoteShutdownPrivilege 4824 msiexec.exe Token: SeUndockPrivilege 4824 msiexec.exe Token: SeSyncAgentPrivilege 4824 msiexec.exe Token: SeEnableDelegationPrivilege 4824 msiexec.exe Token: SeManageVolumePrivilege 4824 msiexec.exe Token: SeImpersonatePrivilege 4824 msiexec.exe Token: SeCreateGlobalPrivilege 4824 msiexec.exe Token: SeRestorePrivilege 1964 msiexec.exe Token: SeTakeOwnershipPrivilege 1964 msiexec.exe Token: SeRestorePrivilege 1964 msiexec.exe Token: SeTakeOwnershipPrivilege 1964 msiexec.exe Token: SeRestorePrivilege 1964 msiexec.exe Token: SeTakeOwnershipPrivilege 1964 msiexec.exe Token: SeRestorePrivilege 1964 msiexec.exe Token: SeTakeOwnershipPrivilege 1964 msiexec.exe Token: SeRestorePrivilege 1964 msiexec.exe Token: SeTakeOwnershipPrivilege 1964 msiexec.exe Token: SeRestorePrivilege 1964 msiexec.exe Token: SeTakeOwnershipPrivilege 1964 msiexec.exe Token: SeRestorePrivilege 1964 msiexec.exe Token: SeTakeOwnershipPrivilege 1964 msiexec.exe Token: SeRestorePrivilege 1964 msiexec.exe Token: SeTakeOwnershipPrivilege 1964 msiexec.exe Token: SeRestorePrivilege 1964 msiexec.exe Token: SeTakeOwnershipPrivilege 1964 msiexec.exe Token: SeRestorePrivilege 1964 msiexec.exe Token: SeTakeOwnershipPrivilege 1964 msiexec.exe Token: SeRestorePrivilege 1964 msiexec.exe Token: SeTakeOwnershipPrivilege 1964 msiexec.exe Token: SeRestorePrivilege 1964 msiexec.exe Token: SeTakeOwnershipPrivilege 1964 msiexec.exe Token: SeRestorePrivilege 1964 msiexec.exe Token: SeTakeOwnershipPrivilege 1964 msiexec.exe Token: SeRestorePrivilege 1964 msiexec.exe Token: SeTakeOwnershipPrivilege 1964 msiexec.exe Token: SeRestorePrivilege 1964 msiexec.exe Token: SeTakeOwnershipPrivilege 1964 msiexec.exe Token: SeRestorePrivilege 1964 msiexec.exe Token: SeTakeOwnershipPrivilege 1964 msiexec.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3656 340d8df768269411ee6196e347585b68_JaffaCakes118.exe 3656 340d8df768269411ee6196e347585b68_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3656 wrote to memory of 4824 3656 340d8df768269411ee6196e347585b68_JaffaCakes118.exe 84 PID 3656 wrote to memory of 4824 3656 340d8df768269411ee6196e347585b68_JaffaCakes118.exe 84 PID 3656 wrote to memory of 4824 3656 340d8df768269411ee6196e347585b68_JaffaCakes118.exe 84 PID 1964 wrote to memory of 3556 1964 msiexec.exe 87 PID 1964 wrote to memory of 3556 1964 msiexec.exe 87 PID 1964 wrote to memory of 3556 1964 msiexec.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\340d8df768269411ee6196e347585b68_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\340d8df768269411ee6196e347585b68_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\IFViewer\1980214704\FP.msi" /Q2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4824
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Boot or Logon Autostart Execution: Active Setup
- Blocklisted process makes network request
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding F1665DA1BDA441F0BA639E23411A03F52⤵
- Loads dropped DLL
- Modifies registry class
PID:3556
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD598c595758da2ba77d54aa0616278ca3d
SHA13f30ac9efcfeb5f776da3a5ec5cd5ee82551d906
SHA2560035cbc819c41de882962fac97ace970f97c8baab73665f090af402e14bdbed3
SHA512e4f1d5f46f8a2b78098256df7c4e0b12f0c1a7e7540039c25c1d13df5d3fa25e6661abe7e651e9f89f44740fa987f70c5c515d130d6a54a6be41eeb97b2fa5d9
-
Filesize
383B
MD59b5ff186d7f86b39ebf05cfd7116d223
SHA14bf138a50256c47921620f9542ea062d0cf16e5b
SHA25656a431c6a202613c6ff3b53fd4d1f82d91d4d7e91dd1fccdc8f9037a1f6ccd5c
SHA5124be6950b3dd4933d7f4ee88fc5f0d727f893b2213244c5b07e15a8d3ae9f5a81de0ca7ce94150da1372dba31847520aba732ebf55e06126fe69447175a0ead75
-
Filesize
386B
MD52357e7b2a591b85b9d1f492d39e4c894
SHA1d917b0a2e35547d913b51c0ad9103b7514c02a73
SHA25690a5c2612a1a3a5e35de806f56d9520c457a4605d104f596c330e143cbe8fa71
SHA5125f2f2d186b8ec882b44a9e6a116e2869f99740d66dc1ec498ecb8e7cae8b5ad9a7babac416133cae61165713b5aa429b5c2490cc3f03b8c5af879b6fb81456f7
-
Filesize
397B
MD51558c7133098a2f21a33b189f8134299
SHA19340efa292ffc561036165a6d6578bdffcef11f5
SHA2560d69fbb9c0d1a609986f11ab226c7f60a141db9d09d96a41542bb0bf9322eb9b
SHA5127339d19f23f78371656629fef6a44c94631fda1bcc1ced07774c4e5dcf9a969311cbc4fea22a17630d6249a1fe9558370d960cba7639abbb787c4b8e03deec61
-
Filesize
1.6MB
MD5ec72ab0a198db9fa267a110095aff70a
SHA17ace4d0b2799efddea2ebeaa687feb84583711ce
SHA256086075830772885fe24607bcf8ecd186a1d706f7f57436aed2175667a3cdfaf7
SHA512cc4d92b629bde79686aa180323f57aab99861733b6be163b0419616b636aac8999e7ee5c14595a69daa98365848116a10d5e472e4490ff84622247ba437e0339
-
Filesize
80KB
MD5f6a6b99623d80fc8e10d04a82f61a806
SHA1fa1d7586ec148d4caf5f4258bc6a495c28b5955f
SHA256adb43809b9d164a220cf80045fcbb4aabd665f83715ac05def245ede8e0f1355
SHA512812bf82bb81a576c4079c27460d18b9fe02457a49715c93ede665c3070a000144585ca779df1083a8ca84ff5a42ad50f70ae9d31a058da1c05b0e1766f6555ec
-
Filesize
104KB
MD541c809ec8fd59ffcbfff35da8d9cf41b
SHA1c6e8b1ef8fcd49ac88ce097157beaeff4d7468e2
SHA256fe9b3c74f09a6c66dab66269550f277c8aa82c7e93b5e9963a116c44619d55b2
SHA512e51ecdba17d0aa037ea6e229e66879e50317b677e2b4760a4dcb7883ab49598b3b166e9b26dcfab5a1904373d70af6234899092bc7a614b9fca14cfbed0ad42d
-
Filesize
1.4MB
MD5900373c059c2b51ca91bf110dbdecb33
SHA1102b086d6054c2cea813ef316ce24440c458762b
SHA25631453fd8f743c19e27f8fa04ee88dfebe95a7884cdfbc15ab0eb8994829aad61
SHA512b17d68cd1e4f1c2fcc7f07de657af144302d4a0cb7b6a0d6bbed4fcd39227481abae73df2d59bf13a31a47b2b6aba820182881b43e638aa00da75ba6b94adbfe