Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
13/07/2024, 13:44
Static task
static1
Behavioral task
behavioral1
Sample
41eb30d817e52628e96a48dcba20789b_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
41eb30d817e52628e96a48dcba20789b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
41eb30d817e52628e96a48dcba20789b_JaffaCakes118.exe
-
Size
456KB
-
MD5
41eb30d817e52628e96a48dcba20789b
-
SHA1
72d45577071c0712fe808a9124f8c6efe443bf7e
-
SHA256
7a8416b9850330e8274de5c7cd47c9955a4df2c354513a86894e24bdae44ee94
-
SHA512
9e957aca540f780119f8b02ad224ccda1eb3f284ea219d7a4305b17281a26d69bd85b39ca4fd6b93f28a1a8882bb67ca70a594e2ccac89e8719f3a4f4da8a5d6
-
SSDEEP
12288:y4ik34n1GxipPy4ZNj2mOb/DNlq41TzXe9Yv:y4ik34n15iN/5lq41Tzuq
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" u8kSVi.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ytjow.exe -
Deletes itself 1 IoCs
pid Process 2004 cmd.exe -
Executes dropped EXE 6 IoCs
pid Process 2336 u8kSVi.exe 2888 ytjow.exe 2744 alay.exe 2668 alay.exe 2716 dlay.exe 1616 flay.exe -
Loads dropped DLL 10 IoCs
pid Process 1828 41eb30d817e52628e96a48dcba20789b_JaffaCakes118.exe 1828 41eb30d817e52628e96a48dcba20789b_JaffaCakes118.exe 2336 u8kSVi.exe 2336 u8kSVi.exe 1828 41eb30d817e52628e96a48dcba20789b_JaffaCakes118.exe 1828 41eb30d817e52628e96a48dcba20789b_JaffaCakes118.exe 1828 41eb30d817e52628e96a48dcba20789b_JaffaCakes118.exe 1828 41eb30d817e52628e96a48dcba20789b_JaffaCakes118.exe 1828 41eb30d817e52628e96a48dcba20789b_JaffaCakes118.exe 1828 41eb30d817e52628e96a48dcba20789b_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2668-48-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/2668-50-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/2668-49-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/2668-46-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/2668-43-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/2668-41-0x0000000000400000-0x000000000040E000-memory.dmp upx -
Adds Run key to start application 2 TTPs 53 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\ytjow = "C:\\Users\\Admin\\ytjow.exe /J" ytjow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\ytjow = "C:\\Users\\Admin\\ytjow.exe /K" ytjow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\ytjow = "C:\\Users\\Admin\\ytjow.exe /f" ytjow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\ytjow = "C:\\Users\\Admin\\ytjow.exe /T" ytjow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\ytjow = "C:\\Users\\Admin\\ytjow.exe /A" ytjow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\ytjow = "C:\\Users\\Admin\\ytjow.exe /d" ytjow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\ytjow = "C:\\Users\\Admin\\ytjow.exe /F" ytjow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\ytjow = "C:\\Users\\Admin\\ytjow.exe /I" ytjow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\ytjow = "C:\\Users\\Admin\\ytjow.exe /Y" ytjow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\ytjow = "C:\\Users\\Admin\\ytjow.exe /C" ytjow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\ytjow = "C:\\Users\\Admin\\ytjow.exe /h" ytjow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\ytjow = "C:\\Users\\Admin\\ytjow.exe /D" ytjow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\ytjow = "C:\\Users\\Admin\\ytjow.exe /Z" ytjow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\ytjow = "C:\\Users\\Admin\\ytjow.exe /B" ytjow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\ytjow = "C:\\Users\\Admin\\ytjow.exe /X" ytjow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\ytjow = "C:\\Users\\Admin\\ytjow.exe /U" ytjow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\ytjow = "C:\\Users\\Admin\\ytjow.exe /L" ytjow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\ytjow = "C:\\Users\\Admin\\ytjow.exe /o" ytjow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\ytjow = "C:\\Users\\Admin\\ytjow.exe /k" ytjow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\ytjow = "C:\\Users\\Admin\\ytjow.exe /E" ytjow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\ytjow = "C:\\Users\\Admin\\ytjow.exe /Q" ytjow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\ytjow = "C:\\Users\\Admin\\ytjow.exe /W" ytjow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\ytjow = "C:\\Users\\Admin\\ytjow.exe /O" ytjow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\ytjow = "C:\\Users\\Admin\\ytjow.exe /l" ytjow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\ytjow = "C:\\Users\\Admin\\ytjow.exe /t" ytjow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\ytjow = "C:\\Users\\Admin\\ytjow.exe /H" ytjow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\ytjow = "C:\\Users\\Admin\\ytjow.exe /c" ytjow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\ytjow = "C:\\Users\\Admin\\ytjow.exe /N" ytjow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\ytjow = "C:\\Users\\Admin\\ytjow.exe /e" ytjow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\ytjow = "C:\\Users\\Admin\\ytjow.exe /M" ytjow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\ytjow = "C:\\Users\\Admin\\ytjow.exe /i" ytjow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\ytjow = "C:\\Users\\Admin\\ytjow.exe /S" ytjow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\ytjow = "C:\\Users\\Admin\\ytjow.exe /b" ytjow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\ytjow = "C:\\Users\\Admin\\ytjow.exe /X" u8kSVi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\ytjow = "C:\\Users\\Admin\\ytjow.exe /j" ytjow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\ytjow = "C:\\Users\\Admin\\ytjow.exe /x" ytjow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\ytjow = "C:\\Users\\Admin\\ytjow.exe /y" ytjow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\ytjow = "C:\\Users\\Admin\\ytjow.exe /a" ytjow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\ytjow = "C:\\Users\\Admin\\ytjow.exe /V" ytjow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\ytjow = "C:\\Users\\Admin\\ytjow.exe /r" ytjow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\ytjow = "C:\\Users\\Admin\\ytjow.exe /v" ytjow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\ytjow = "C:\\Users\\Admin\\ytjow.exe /G" ytjow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\ytjow = "C:\\Users\\Admin\\ytjow.exe /g" ytjow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\ytjow = "C:\\Users\\Admin\\ytjow.exe /z" ytjow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\ytjow = "C:\\Users\\Admin\\ytjow.exe /q" ytjow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\ytjow = "C:\\Users\\Admin\\ytjow.exe /n" ytjow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\ytjow = "C:\\Users\\Admin\\ytjow.exe /u" ytjow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\ytjow = "C:\\Users\\Admin\\ytjow.exe /m" ytjow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\ytjow = "C:\\Users\\Admin\\ytjow.exe /s" ytjow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\ytjow = "C:\\Users\\Admin\\ytjow.exe /R" ytjow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\ytjow = "C:\\Users\\Admin\\ytjow.exe /w" ytjow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\ytjow = "C:\\Users\\Admin\\ytjow.exe /P" ytjow.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\ytjow = "C:\\Users\\Admin\\ytjow.exe /p" ytjow.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2744 set thread context of 2668 2744 alay.exe 37 PID 1616 set thread context of 572 1616 flay.exe 41 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 2700 tasklist.exe 2816 tasklist.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2336 u8kSVi.exe 2336 u8kSVi.exe 2668 alay.exe 2888 ytjow.exe 2668 alay.exe 2888 ytjow.exe 2888 ytjow.exe 2888 ytjow.exe 2888 ytjow.exe 2668 alay.exe 2888 ytjow.exe 2668 alay.exe 2668 alay.exe 2888 ytjow.exe 2888 ytjow.exe 2888 ytjow.exe 2668 alay.exe 2888 ytjow.exe 2668 alay.exe 2668 alay.exe 2888 ytjow.exe 2888 ytjow.exe 2888 ytjow.exe 2668 alay.exe 2668 alay.exe 2888 ytjow.exe 2668 alay.exe 2888 ytjow.exe 2668 alay.exe 2668 alay.exe 2888 ytjow.exe 2668 alay.exe 2888 ytjow.exe 2668 alay.exe 2888 ytjow.exe 2668 alay.exe 2888 ytjow.exe 2668 alay.exe 2888 ytjow.exe 2668 alay.exe 2668 alay.exe 2888 ytjow.exe 2668 alay.exe 2888 ytjow.exe 2668 alay.exe 2888 ytjow.exe 2888 ytjow.exe 2668 alay.exe 2668 alay.exe 2668 alay.exe 2668 alay.exe 2888 ytjow.exe 2668 alay.exe 2668 alay.exe 2888 ytjow.exe 2888 ytjow.exe 2888 ytjow.exe 2668 alay.exe 2668 alay.exe 2668 alay.exe 2888 ytjow.exe 2668 alay.exe 2668 alay.exe 2668 alay.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2700 tasklist.exe Token: SeDebugPrivilege 1616 flay.exe Token: SeDebugPrivilege 2816 tasklist.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1828 41eb30d817e52628e96a48dcba20789b_JaffaCakes118.exe 2336 u8kSVi.exe 2888 ytjow.exe 2744 alay.exe 2716 dlay.exe -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 1828 wrote to memory of 2336 1828 41eb30d817e52628e96a48dcba20789b_JaffaCakes118.exe 31 PID 1828 wrote to memory of 2336 1828 41eb30d817e52628e96a48dcba20789b_JaffaCakes118.exe 31 PID 1828 wrote to memory of 2336 1828 41eb30d817e52628e96a48dcba20789b_JaffaCakes118.exe 31 PID 1828 wrote to memory of 2336 1828 41eb30d817e52628e96a48dcba20789b_JaffaCakes118.exe 31 PID 2336 wrote to memory of 2888 2336 u8kSVi.exe 32 PID 2336 wrote to memory of 2888 2336 u8kSVi.exe 32 PID 2336 wrote to memory of 2888 2336 u8kSVi.exe 32 PID 2336 wrote to memory of 2888 2336 u8kSVi.exe 32 PID 2336 wrote to memory of 2132 2336 u8kSVi.exe 33 PID 2336 wrote to memory of 2132 2336 u8kSVi.exe 33 PID 2336 wrote to memory of 2132 2336 u8kSVi.exe 33 PID 2336 wrote to memory of 2132 2336 u8kSVi.exe 33 PID 1828 wrote to memory of 2744 1828 41eb30d817e52628e96a48dcba20789b_JaffaCakes118.exe 35 PID 1828 wrote to memory of 2744 1828 41eb30d817e52628e96a48dcba20789b_JaffaCakes118.exe 35 PID 1828 wrote to memory of 2744 1828 41eb30d817e52628e96a48dcba20789b_JaffaCakes118.exe 35 PID 1828 wrote to memory of 2744 1828 41eb30d817e52628e96a48dcba20789b_JaffaCakes118.exe 35 PID 2132 wrote to memory of 2700 2132 cmd.exe 36 PID 2132 wrote to memory of 2700 2132 cmd.exe 36 PID 2132 wrote to memory of 2700 2132 cmd.exe 36 PID 2132 wrote to memory of 2700 2132 cmd.exe 36 PID 2744 wrote to memory of 2668 2744 alay.exe 37 PID 2744 wrote to memory of 2668 2744 alay.exe 37 PID 2744 wrote to memory of 2668 2744 alay.exe 37 PID 2744 wrote to memory of 2668 2744 alay.exe 37 PID 2744 wrote to memory of 2668 2744 alay.exe 37 PID 2744 wrote to memory of 2668 2744 alay.exe 37 PID 2744 wrote to memory of 2668 2744 alay.exe 37 PID 2744 wrote to memory of 2668 2744 alay.exe 37 PID 1828 wrote to memory of 2716 1828 41eb30d817e52628e96a48dcba20789b_JaffaCakes118.exe 39 PID 1828 wrote to memory of 2716 1828 41eb30d817e52628e96a48dcba20789b_JaffaCakes118.exe 39 PID 1828 wrote to memory of 2716 1828 41eb30d817e52628e96a48dcba20789b_JaffaCakes118.exe 39 PID 1828 wrote to memory of 2716 1828 41eb30d817e52628e96a48dcba20789b_JaffaCakes118.exe 39 PID 1828 wrote to memory of 1616 1828 41eb30d817e52628e96a48dcba20789b_JaffaCakes118.exe 40 PID 1828 wrote to memory of 1616 1828 41eb30d817e52628e96a48dcba20789b_JaffaCakes118.exe 40 PID 1828 wrote to memory of 1616 1828 41eb30d817e52628e96a48dcba20789b_JaffaCakes118.exe 40 PID 1828 wrote to memory of 1616 1828 41eb30d817e52628e96a48dcba20789b_JaffaCakes118.exe 40 PID 1616 wrote to memory of 572 1616 flay.exe 41 PID 1616 wrote to memory of 572 1616 flay.exe 41 PID 1616 wrote to memory of 572 1616 flay.exe 41 PID 1616 wrote to memory of 572 1616 flay.exe 41 PID 1616 wrote to memory of 572 1616 flay.exe 41 PID 1828 wrote to memory of 2004 1828 41eb30d817e52628e96a48dcba20789b_JaffaCakes118.exe 43 PID 1828 wrote to memory of 2004 1828 41eb30d817e52628e96a48dcba20789b_JaffaCakes118.exe 43 PID 1828 wrote to memory of 2004 1828 41eb30d817e52628e96a48dcba20789b_JaffaCakes118.exe 43 PID 1828 wrote to memory of 2004 1828 41eb30d817e52628e96a48dcba20789b_JaffaCakes118.exe 43 PID 2004 wrote to memory of 2816 2004 cmd.exe 45 PID 2004 wrote to memory of 2816 2004 cmd.exe 45 PID 2004 wrote to memory of 2816 2004 cmd.exe 45 PID 2004 wrote to memory of 2816 2004 cmd.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\41eb30d817e52628e96a48dcba20789b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\41eb30d817e52628e96a48dcba20789b_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Users\Admin\u8kSVi.exeC:\Users\Admin\u8kSVi.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\ytjow.exe"C:\Users\Admin\ytjow.exe"3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2888
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del u8kSVi.exe3⤵
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2700
-
-
-
-
C:\Users\Admin\alay.exeC:\Users\Admin\alay.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\alay.exe"C:\Users\Admin\alay.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2668
-
-
-
C:\Users\Admin\dlay.exeC:\Users\Admin\dlay.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2716
-
-
C:\Users\Admin\flay.exeC:\Users\Admin\flay.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"3⤵PID:572
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 41eb30d817e52628e96a48dcba20789b_JaffaCakes118.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2816
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD51bf479c263ff9b58c1cc00c965f4c14a
SHA1494555c284279f4cb8b1ea9f91ce12c98e057fce
SHA2563b5a01e9c4a8fc9e2f6f33da669a8020b76751720d4c32a42e7ba49e955b1093
SHA51248134b823a6bd2877e200095c03521e75de79a2830d9e723138c00529e0c9436e4b368fb3bd37a5a67cfdbaa34405b8e3f9bd79a982adbf726d882e57823f161
-
Filesize
36KB
MD5ca22de79e6c6c38eb6dfef7fe1660b05
SHA1859243fbafb70d5631e96cf88fc3a4c917cecfca
SHA2568eff51c017894840eec5141933794e35a13de7baf085e20e697106bc4b2467b4
SHA512b136c8748cb46dabf6229477c3bd9b217562a7748c57c87f69c2874bd81e72cdda23ba7692602b7bc972e96716693af7ba0b33a9faf8ea25f4060a4c2dfff678
-
Filesize
264KB
MD59b3122a0ed7ec1eb344be414036da288
SHA1cf6a4651b24fc71db61e1870a360c3fa7d67c1ca
SHA256ca0ae1bd6a5328945c7805621a2efe10840b3023f70e180750ed0f9f87cc7df7
SHA512f57046121b54c8abd81bade8c2989530ac604e128c826397df63680fc7d8bc22715408613119bfa11920e736a7185950adf3d6c769df3f9b389d1020b22959e4
-
Filesize
248KB
MD576a6dee598367ca2ce4e90457622eb62
SHA1067b85364f34f26292739ea3c04706335c7a9ee4
SHA2562bae3eab43e8f1761f7aa29d259d9966bc8d8f19303a53f57b7d1d4e9b11929d
SHA5128125d4643b0cb63496eae85fae0907bb36c82100fd35af76dadb787b82af7d4014f071e63e2bf07021145786e11a64662693c0502cc2ba6df31a4be917c0474f
-
Filesize
248KB
MD5e6856bb71294c24c73b568a84a7ea096
SHA12db0b1782d2dc8ab1859778ee2079001b6a3528f
SHA256b6cf249d71121c0d911128f0f11bc8cbc036733061f33d01bbf9ca5ac8c4c221
SHA5125c85d1a68d6c5a4e407d50d986020e9b91702721409915ab597a970a1449a5baffc78d7e7680cad4afbb395ec01e6aecbabd766a3c5f7208222bb3e59651c74d