Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
20/07/2024, 05:13
Behavioral task
behavioral1
Sample
5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe
-
Size
9.9MB
-
MD5
5f26d790dec57efefd921b40fa58e3a6
-
SHA1
6f962d0cd28de9278c7f4c240aca635783001114
-
SHA256
0df4152fb09489d30a10b6e4864c3fe005a689e4923324dfd13e256d87f06d3d
-
SHA512
80acc1affc11a9951201d4989c3ec59cf477d90e27b6be2b9b03aea505446c14d2c537543b128cf76906fcefc6f543f36e6b81750283b71f65f8144bf1a1e009
-
SSDEEP
196608:i7effIPEsy58doQaTzwZ8Jq3QKnqVtxQnKnqVtxQu9OryfEQncryfEQuly58doQ6:i7effIPEsy58doQaTzwZ8Jq3QKnqVtxg
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe," 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe -
Drops file in Drivers directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\spools.exe 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\spools.exe 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\spools.exe 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe -
Sets service image path in registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Schedule\ImagePath = "C:\\Windows\\system32\\drivers\\spools.exe" 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Schedule\ImagePath = "C:\\Windows\\system32\\drivers\\spools.exe" 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe -
ACProtect 1.3x - 1.4x DLL software 4 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x00070000000234f6-10.dat acprotect behavioral2/memory/836-13-0x0000000010000000-0x000000001010B000-memory.dmp acprotect behavioral2/memory/836-17-0x0000000010000000-0x000000001010B000-memory.dmp acprotect behavioral2/memory/4536-32-0x0000000010000000-0x000000001010B000-memory.dmp acprotect -
Loads dropped DLL 2 IoCs
pid Process 836 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 4536 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/836-0-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral2/files/0x00080000000234f3-5.dat upx behavioral2/memory/4536-7-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral2/files/0x00070000000234f6-10.dat upx behavioral2/memory/836-13-0x0000000010000000-0x000000001010B000-memory.dmp upx behavioral2/memory/836-18-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral2/memory/836-17-0x0000000010000000-0x000000001010B000-memory.dmp upx behavioral2/files/0x000c0000000234ec-19.dat upx behavioral2/memory/4536-32-0x0000000010000000-0x000000001010B000-memory.dmp upx behavioral2/memory/4536-34-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral2/memory/3956-35-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral2/memory/3776-36-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral2/memory/784-37-0x0000000000400000-0x0000000000426000-memory.dmp upx -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ntuser = "C:\\Windows\\system32\\drivers\\spools.exe" 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\autoload = "C:\\Users\\Admin\\Local Settings\\Application Data\\cftmon.exe" 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe File opened (read-only) \??\M: 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe File opened (read-only) \??\R: 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe File opened (read-only) \??\E: 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe File opened (read-only) \??\I: 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe File opened (read-only) \??\I: 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe File opened (read-only) \??\N: 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe File opened (read-only) \??\Q: 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe File opened (read-only) \??\X: 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe File opened (read-only) \??\M: 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe File opened (read-only) \??\E: 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe File opened (read-only) \??\H: 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe File opened (read-only) \??\K: 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe File opened (read-only) \??\P: 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe File opened (read-only) \??\X: 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe File opened (read-only) \??\O: 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe File opened (read-only) \??\P: 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe File opened (read-only) \??\Q: 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe File opened (read-only) \??\T: 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe File opened (read-only) \??\K: 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe File opened (read-only) \??\L: 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe File opened (read-only) \??\X: 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe File opened (read-only) \??\G: 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe File opened (read-only) \??\H: 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe File opened (read-only) \??\H: 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe File opened (read-only) \??\Q: 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe File opened (read-only) \??\G: 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe File opened (read-only) \??\J: 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe File opened (read-only) \??\K: 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe File opened (read-only) \??\L: 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe File opened (read-only) \??\O: 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe File opened (read-only) \??\W: 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe File opened (read-only) \??\O: 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe File opened (read-only) \??\T: 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe File opened (read-only) \??\V: 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe File opened (read-only) \??\O: 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe File opened (read-only) \??\P: 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe File opened (read-only) \??\U: 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe File opened (read-only) \??\V: 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe File opened (read-only) \??\G: 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe File opened (read-only) \??\N: 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe File opened (read-only) \??\N: 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe File opened (read-only) \??\S: 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe File opened (read-only) \??\L: 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe File opened (read-only) \??\M: 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe File opened (read-only) \??\U: 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe File opened (read-only) \??\I: 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe File opened (read-only) \??\J: 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe File opened (read-only) \??\L: 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe File opened (read-only) \??\I: 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe File opened (read-only) \??\L: 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe File opened (read-only) \??\V: 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe File opened (read-only) \??\E: 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe File opened (read-only) \??\E: 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe File opened (read-only) \??\U: 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe File opened (read-only) \??\W: 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe File opened (read-only) \??\S: 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe File opened (read-only) \??\O: 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe File opened (read-only) \??\P: 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe File opened (read-only) \??\V: 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe File opened (read-only) \??\N: 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe File opened (read-only) \??\W: 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe File opened (read-only) \??\T: 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe File opened (read-only) \??\W: 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe -
Installs/modifies Browser Helper Object 2 TTPs 3 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C} reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{31D09BA0-12F5-4CCE-BE8A-2923E76605DA} reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects reg.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\UIHost = "logonui.exe" 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\ftpdll.dll 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ftpdll.dll 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1252 836 WerFault.exe 83 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 836 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 836 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 836 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 836 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 836 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 836 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 836 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 836 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 836 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 836 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 836 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 836 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 836 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 836 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 836 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 836 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 836 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 836 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 836 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 836 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 836 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 836 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 836 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 836 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 836 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 836 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 836 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 836 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 836 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 836 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 836 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 836 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 836 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 836 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 836 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 836 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 836 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 836 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 836 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 836 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 836 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 836 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 836 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 836 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 836 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 836 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 3956 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 3956 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 836 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 836 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 836 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 836 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 836 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 836 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 836 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 836 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 836 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 836 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 836 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 836 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 836 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 836 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 836 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 836 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 836 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 4536 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 836 wrote to memory of 3956 836 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 88 PID 836 wrote to memory of 3956 836 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 88 PID 836 wrote to memory of 3956 836 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 88 PID 836 wrote to memory of 460 836 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 92 PID 836 wrote to memory of 460 836 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 92 PID 836 wrote to memory of 460 836 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 92 PID 836 wrote to memory of 4536 836 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 95 PID 836 wrote to memory of 4536 836 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 95 PID 836 wrote to memory of 4536 836 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 95 PID 3956 wrote to memory of 3776 3956 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 100 PID 3956 wrote to memory of 3776 3956 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 100 PID 3956 wrote to memory of 3776 3956 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 100 PID 4536 wrote to memory of 784 4536 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 102 PID 4536 wrote to memory of 784 4536 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 102 PID 4536 wrote to memory of 784 4536 5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Drops file in Drivers directory
- Sets service image path in registry
- Loads dropped DLL
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Users\Admin\AppData\Local\Temp\5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe2⤵
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Users\Admin\AppData\Local\Temp\5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe3⤵
- Enumerates connected drives
PID:3776
-
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects" /f2⤵
- Installs/modifies Browser Helper Object
PID:460
-
-
C:\Users\Admin\AppData\Local\Temp\5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Loads dropped DLL
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Users\Admin\AppData\Local\Temp\5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\5f26d790dec57efefd921b40fa58e3a6_JaffaCakes118.exe3⤵
- Enumerates connected drives
PID:784
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 836 -s 16522⤵
- Program crash
PID:1252
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 836 -ip 8361⤵PID:4888
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
4Registry Run Keys / Startup Folder
2Winlogon Helper DLL
2Browser Extensions
1Privilege Escalation
Boot or Logon Autostart Execution
4Registry Run Keys / Startup Folder
2Winlogon Helper DLL
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57fb5fa1534dcf77f2125b2403b30a0ee
SHA1365d96812a69ac0a4611ea4b70a3f306576cc3ea
SHA25633a39e9ec2133230533a686ec43760026e014a3828c703707acbc150fe40fd6f
SHA512a9279fd60505a1bfeef6fb07834cad0fd5be02fd405573fc1a5f59b991e9f88f5e81c32fe910f69bdc6585e71f02559895149eaf49c25b8ff955459fd60c0d2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12
Filesize174B
MD53dd1a122c44731e4c4c063ca650e8288
SHA1c80570593913f4e91f1f62427f7dcdb2f59043fe
SHA256e5ef35b5188f5a3a461c16c247a799f23d82ed16911fb55984357f2aeacb8af4
SHA5123d08df026f4eddc33df3f18d596fd5bd1bd9d841c9129a3979cd42188597a3dd6ee36a48b79dd9448a14d1888035ea29b7051852d18311e6094d288d42d998ab
-
Filesize
9.9MB
MD5dd2b78905c97c8edd67b6b81661777b1
SHA11f1860efb5c43aa72113460cb48c27e59815006f
SHA2567d61388ee3ef81d837ee38d5d042f27780a5249b98516f3952b40416ee1c79a4
SHA512a74660e120e413ce349504df6c9e7ca72f3c39ac223b20f98ecb2ce3f6061b70f13b0cfc32bb03c6e1591f97e7d169b8a1ddc69fee62f14a46952a6bf183480d
-
Filesize
9.9MB
MD5a4c9fa76865b010386fff8fc4d83290b
SHA10936121612c5054e50a808ab68c9b53f8aa8de3c
SHA2568096e4d51dc78cb529c13879f8f373b646fc89cb00ea6c3eec68459eefdb836d
SHA512a8c48cdf5ca88c82d34b9d3da4ec1f7e3436be8ba7fb43f972bb1092eda9656ea795b05edf3add7beae387ed0f5486ce73d251abdc161f9dccb7c674a88ae0fa
-
Filesize
5KB
MD5d807aa04480d1d149f7a4cac22984188
SHA1ffd5be65fd10017e34c11cecd105ebf4aa6c0cd9
SHA256eddf092d901afe128322910c3ff41a3f242d33d6b4cdf91ece327076b324ccbb
SHA512875543583c20ab164f37a4fb2587d234ce0a15d649d22b0d1dae5933f0a7683db170578746ea4458c51fec26e2243c6ec00dc10db8d4289789e50d5800cf863e