Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21/07/2024, 19:26
Static task
static1
Behavioral task
behavioral1
Sample
6116c0edc9a70e39cd5ce0c2cf6944c2_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6116c0edc9a70e39cd5ce0c2cf6944c2_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6116c0edc9a70e39cd5ce0c2cf6944c2_JaffaCakes118.exe
-
Size
564KB
-
MD5
6116c0edc9a70e39cd5ce0c2cf6944c2
-
SHA1
d0fe346918eeea017289b450552a26ffe2311c58
-
SHA256
85782efb7daa0bf8f6f658e210bcfc45a526198393416f1557d96a764342570c
-
SHA512
9a277c9e2ce66efe82bd084d6d37fff7430ba5350cb83e6dea3ceb4547677595795d4c0b232837fd9789ad953b5173d2f32a884ac2d4620e9f15686c4f2f8e3a
-
SSDEEP
12288:hiEPVIq0TcwMi7tBNMLpJVeVvsZWILqY02JwwA1x33GwTuIj+w:hiRq0TcwvypSVvsfLNzJwwAkX
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Local\\c8f83bbb\\X" Explorer.EXE -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" hooloh.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" Za0Fr02eH4.exe -
Deletes itself 1 IoCs
pid Process 1140 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2508 Za0Fr02eH4.exe 2232 hooloh.exe 2644 2eaz.exe 2760 2eaz.exe 2872 2eaz.exe 2596 2eaz.exe 2604 2eaz.exe 1884 2eaz.exe 320 3eaz.exe 2800 X 332 csrss.exe -
Loads dropped DLL 10 IoCs
pid Process 1900 6116c0edc9a70e39cd5ce0c2cf6944c2_JaffaCakes118.exe 1900 6116c0edc9a70e39cd5ce0c2cf6944c2_JaffaCakes118.exe 2508 Za0Fr02eH4.exe 2508 Za0Fr02eH4.exe 1900 6116c0edc9a70e39cd5ce0c2cf6944c2_JaffaCakes118.exe 1900 6116c0edc9a70e39cd5ce0c2cf6944c2_JaffaCakes118.exe 1900 6116c0edc9a70e39cd5ce0c2cf6944c2_JaffaCakes118.exe 1900 6116c0edc9a70e39cd5ce0c2cf6944c2_JaffaCakes118.exe 320 3eaz.exe 320 3eaz.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2872-45-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2872-51-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2872-50-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2872-48-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2872-43-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2872-52-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2604-76-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral1/memory/2596-75-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2604-73-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral1/memory/2604-71-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral1/memory/2596-60-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2596-63-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2596-62-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2596-57-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2596-55-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/1884-89-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral1/memory/1884-94-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral1/memory/1884-88-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral1/memory/1884-86-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral1/memory/1884-83-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral1/memory/1884-81-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral1/memory/2604-68-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral1/memory/2604-66-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral1/memory/2872-140-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2596-141-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2604-146-0x0000000000400000-0x0000000000407000-memory.dmp upx -
Unexpected DNS network traffic destination 5 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 31.193.3.240 Destination IP 31.193.3.240 Destination IP 31.193.3.240 Destination IP 31.193.3.240 Destination IP 31.193.3.240 -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\hooloh = "C:\\Users\\Admin\\hooloh.exe /z" hooloh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\hooloh = "C:\\Users\\Admin\\hooloh.exe /I" hooloh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\hooloh = "C:\\Users\\Admin\\hooloh.exe /c" hooloh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\hooloh = "C:\\Users\\Admin\\hooloh.exe /v" hooloh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\hooloh = "C:\\Users\\Admin\\hooloh.exe /U" hooloh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\hooloh = "C:\\Users\\Admin\\hooloh.exe /b" hooloh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\hooloh = "C:\\Users\\Admin\\hooloh.exe /Y" hooloh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\hooloh = "C:\\Users\\Admin\\hooloh.exe /w" hooloh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\hooloh = "C:\\Users\\Admin\\hooloh.exe /K" hooloh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\hooloh = "C:\\Users\\Admin\\hooloh.exe /W" hooloh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\hooloh = "C:\\Users\\Admin\\hooloh.exe /h" hooloh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\hooloh = "C:\\Users\\Admin\\hooloh.exe /E" hooloh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\hooloh = "C:\\Users\\Admin\\hooloh.exe /t" hooloh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\hooloh = "C:\\Users\\Admin\\hooloh.exe /k" hooloh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\hooloh = "C:\\Users\\Admin\\hooloh.exe /m" hooloh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\hooloh = "C:\\Users\\Admin\\hooloh.exe /e" hooloh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\hooloh = "C:\\Users\\Admin\\hooloh.exe /P" hooloh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\hooloh = "C:\\Users\\Admin\\hooloh.exe /r" hooloh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\hooloh = "C:\\Users\\Admin\\hooloh.exe /L" hooloh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\hooloh = "C:\\Users\\Admin\\hooloh.exe /A" hooloh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\hooloh = "C:\\Users\\Admin\\hooloh.exe /O" hooloh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\hooloh = "C:\\Users\\Admin\\hooloh.exe /d" hooloh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\hooloh = "C:\\Users\\Admin\\hooloh.exe /o" hooloh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\hooloh = "C:\\Users\\Admin\\hooloh.exe /s" Za0Fr02eH4.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\hooloh = "C:\\Users\\Admin\\hooloh.exe /y" hooloh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\hooloh = "C:\\Users\\Admin\\hooloh.exe /u" hooloh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\hooloh = "C:\\Users\\Admin\\hooloh.exe /s" hooloh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\hooloh = "C:\\Users\\Admin\\hooloh.exe /F" hooloh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\hooloh = "C:\\Users\\Admin\\hooloh.exe /N" hooloh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\hooloh = "C:\\Users\\Admin\\hooloh.exe /i" hooloh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\hooloh = "C:\\Users\\Admin\\hooloh.exe /D" hooloh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\hooloh = "C:\\Users\\Admin\\hooloh.exe /X" hooloh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\hooloh = "C:\\Users\\Admin\\hooloh.exe /S" hooloh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\hooloh = "C:\\Users\\Admin\\hooloh.exe /Q" hooloh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\hooloh = "C:\\Users\\Admin\\hooloh.exe /G" hooloh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\hooloh = "C:\\Users\\Admin\\hooloh.exe /j" hooloh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\hooloh = "C:\\Users\\Admin\\hooloh.exe /J" hooloh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\hooloh = "C:\\Users\\Admin\\hooloh.exe /n" hooloh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\hooloh = "C:\\Users\\Admin\\hooloh.exe /g" hooloh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\hooloh = "C:\\Users\\Admin\\hooloh.exe /f" hooloh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\hooloh = "C:\\Users\\Admin\\hooloh.exe /a" hooloh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\hooloh = "C:\\Users\\Admin\\hooloh.exe /Z" hooloh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\hooloh = "C:\\Users\\Admin\\hooloh.exe /M" hooloh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\hooloh = "C:\\Users\\Admin\\hooloh.exe /p" hooloh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\hooloh = "C:\\Users\\Admin\\hooloh.exe /B" hooloh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\hooloh = "C:\\Users\\Admin\\hooloh.exe /q" hooloh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\hooloh = "C:\\Users\\Admin\\hooloh.exe /H" hooloh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\hooloh = "C:\\Users\\Admin\\hooloh.exe /x" hooloh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\hooloh = "C:\\Users\\Admin\\hooloh.exe /T" hooloh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\hooloh = "C:\\Users\\Admin\\hooloh.exe /C" hooloh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\hooloh = "C:\\Users\\Admin\\hooloh.exe /V" hooloh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\hooloh = "C:\\Users\\Admin\\hooloh.exe /l" hooloh.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 2eaz.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 2eaz.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 2644 set thread context of 2760 2644 2eaz.exe 38 PID 2644 set thread context of 2872 2644 2eaz.exe 39 PID 2644 set thread context of 2596 2644 2eaz.exe 40 PID 2644 set thread context of 2604 2644 2eaz.exe 41 PID 2644 set thread context of 1884 2644 2eaz.exe 42 PID 320 set thread context of 1912 320 3eaz.exe 46 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 2168 tasklist.exe 1936 tasklist.exe -
Modifies registry class 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{306523b1-67e6-a19c-f1a3-041401197efc}\cid = "18182523599891116830" 3eaz.exe Key created \registry\machine\Software\Classes\Interface\{306523b1-67e6-a19c-f1a3-041401197efc} 3eaz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{306523b1-67e6-a19c-f1a3-041401197efc}\u = "188" 3eaz.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2508 Za0Fr02eH4.exe 2508 Za0Fr02eH4.exe 2872 2eaz.exe 320 3eaz.exe 320 3eaz.exe 320 3eaz.exe 320 3eaz.exe 2800 X 2232 hooloh.exe 2232 hooloh.exe 2872 2eaz.exe 2232 hooloh.exe 2232 hooloh.exe 2232 hooloh.exe 2232 hooloh.exe 2232 hooloh.exe 2232 hooloh.exe 2232 hooloh.exe 2232 hooloh.exe 2232 hooloh.exe 2232 hooloh.exe 2232 hooloh.exe 2232 hooloh.exe 2232 hooloh.exe 2232 hooloh.exe 2232 hooloh.exe 2232 hooloh.exe 2232 hooloh.exe 2232 hooloh.exe 2232 hooloh.exe 2232 hooloh.exe 2232 hooloh.exe 2232 hooloh.exe 2232 hooloh.exe 2232 hooloh.exe 2232 hooloh.exe 2232 hooloh.exe 2232 hooloh.exe 2232 hooloh.exe 2232 hooloh.exe 2232 hooloh.exe 2232 hooloh.exe 2232 hooloh.exe 2232 hooloh.exe 2232 hooloh.exe 2232 hooloh.exe 2232 hooloh.exe 2232 hooloh.exe 2232 hooloh.exe 2232 hooloh.exe 2232 hooloh.exe 2232 hooloh.exe 2232 hooloh.exe 2232 hooloh.exe 2232 hooloh.exe 2232 hooloh.exe 2232 hooloh.exe 2232 hooloh.exe 2232 hooloh.exe 2232 hooloh.exe 2232 hooloh.exe 2232 hooloh.exe 2232 hooloh.exe 2232 hooloh.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2168 tasklist.exe Token: SeDebugPrivilege 320 3eaz.exe Token: SeDebugPrivilege 320 3eaz.exe Token: SeDebugPrivilege 1936 tasklist.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1900 6116c0edc9a70e39cd5ce0c2cf6944c2_JaffaCakes118.exe 2508 Za0Fr02eH4.exe 2232 hooloh.exe 2644 2eaz.exe 2604 2eaz.exe 1884 2eaz.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 332 csrss.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1900 wrote to memory of 2508 1900 6116c0edc9a70e39cd5ce0c2cf6944c2_JaffaCakes118.exe 31 PID 1900 wrote to memory of 2508 1900 6116c0edc9a70e39cd5ce0c2cf6944c2_JaffaCakes118.exe 31 PID 1900 wrote to memory of 2508 1900 6116c0edc9a70e39cd5ce0c2cf6944c2_JaffaCakes118.exe 31 PID 1900 wrote to memory of 2508 1900 6116c0edc9a70e39cd5ce0c2cf6944c2_JaffaCakes118.exe 31 PID 2508 wrote to memory of 2232 2508 Za0Fr02eH4.exe 32 PID 2508 wrote to memory of 2232 2508 Za0Fr02eH4.exe 32 PID 2508 wrote to memory of 2232 2508 Za0Fr02eH4.exe 32 PID 2508 wrote to memory of 2232 2508 Za0Fr02eH4.exe 32 PID 2508 wrote to memory of 2164 2508 Za0Fr02eH4.exe 33 PID 2508 wrote to memory of 2164 2508 Za0Fr02eH4.exe 33 PID 2508 wrote to memory of 2164 2508 Za0Fr02eH4.exe 33 PID 2508 wrote to memory of 2164 2508 Za0Fr02eH4.exe 33 PID 2164 wrote to memory of 2168 2164 cmd.exe 35 PID 2164 wrote to memory of 2168 2164 cmd.exe 35 PID 2164 wrote to memory of 2168 2164 cmd.exe 35 PID 2164 wrote to memory of 2168 2164 cmd.exe 35 PID 1900 wrote to memory of 2644 1900 6116c0edc9a70e39cd5ce0c2cf6944c2_JaffaCakes118.exe 36 PID 1900 wrote to memory of 2644 1900 6116c0edc9a70e39cd5ce0c2cf6944c2_JaffaCakes118.exe 36 PID 1900 wrote to memory of 2644 1900 6116c0edc9a70e39cd5ce0c2cf6944c2_JaffaCakes118.exe 36 PID 1900 wrote to memory of 2644 1900 6116c0edc9a70e39cd5ce0c2cf6944c2_JaffaCakes118.exe 36 PID 2644 wrote to memory of 2760 2644 2eaz.exe 38 PID 2644 wrote to memory of 2760 2644 2eaz.exe 38 PID 2644 wrote to memory of 2760 2644 2eaz.exe 38 PID 2644 wrote to memory of 2760 2644 2eaz.exe 38 PID 2644 wrote to memory of 2760 2644 2eaz.exe 38 PID 2644 wrote to memory of 2872 2644 2eaz.exe 39 PID 2644 wrote to memory of 2872 2644 2eaz.exe 39 PID 2644 wrote to memory of 2872 2644 2eaz.exe 39 PID 2644 wrote to memory of 2872 2644 2eaz.exe 39 PID 2644 wrote to memory of 2872 2644 2eaz.exe 39 PID 2644 wrote to memory of 2872 2644 2eaz.exe 39 PID 2644 wrote to memory of 2872 2644 2eaz.exe 39 PID 2644 wrote to memory of 2872 2644 2eaz.exe 39 PID 2644 wrote to memory of 2596 2644 2eaz.exe 40 PID 2644 wrote to memory of 2596 2644 2eaz.exe 40 PID 2644 wrote to memory of 2596 2644 2eaz.exe 40 PID 2644 wrote to memory of 2596 2644 2eaz.exe 40 PID 2644 wrote to memory of 2596 2644 2eaz.exe 40 PID 2644 wrote to memory of 2596 2644 2eaz.exe 40 PID 2644 wrote to memory of 2596 2644 2eaz.exe 40 PID 2644 wrote to memory of 2596 2644 2eaz.exe 40 PID 2644 wrote to memory of 2604 2644 2eaz.exe 41 PID 2644 wrote to memory of 2604 2644 2eaz.exe 41 PID 2644 wrote to memory of 2604 2644 2eaz.exe 41 PID 2644 wrote to memory of 2604 2644 2eaz.exe 41 PID 2644 wrote to memory of 2604 2644 2eaz.exe 41 PID 2644 wrote to memory of 2604 2644 2eaz.exe 41 PID 2644 wrote to memory of 2604 2644 2eaz.exe 41 PID 2644 wrote to memory of 2604 2644 2eaz.exe 41 PID 2644 wrote to memory of 1884 2644 2eaz.exe 42 PID 2644 wrote to memory of 1884 2644 2eaz.exe 42 PID 2644 wrote to memory of 1884 2644 2eaz.exe 42 PID 2644 wrote to memory of 1884 2644 2eaz.exe 42 PID 2644 wrote to memory of 1884 2644 2eaz.exe 42 PID 2644 wrote to memory of 1884 2644 2eaz.exe 42 PID 2644 wrote to memory of 1884 2644 2eaz.exe 42 PID 2644 wrote to memory of 1884 2644 2eaz.exe 42 PID 1900 wrote to memory of 320 1900 6116c0edc9a70e39cd5ce0c2cf6944c2_JaffaCakes118.exe 43 PID 1900 wrote to memory of 320 1900 6116c0edc9a70e39cd5ce0c2cf6944c2_JaffaCakes118.exe 43 PID 1900 wrote to memory of 320 1900 6116c0edc9a70e39cd5ce0c2cf6944c2_JaffaCakes118.exe 43 PID 1900 wrote to memory of 320 1900 6116c0edc9a70e39cd5ce0c2cf6944c2_JaffaCakes118.exe 43 PID 320 wrote to memory of 1176 320 3eaz.exe 21 PID 320 wrote to memory of 332 320 3eaz.exe 2 PID 320 wrote to memory of 2800 320 3eaz.exe 44
Processes
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:332
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies WinLogon for persistence
PID:1176 -
C:\Users\Admin\AppData\Local\Temp\6116c0edc9a70e39cd5ce0c2cf6944c2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6116c0edc9a70e39cd5ce0c2cf6944c2_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Users\Admin\Za0Fr02eH4.exeC:\Users\Admin\Za0Fr02eH4.exe3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Users\Admin\hooloh.exe"C:\Users\Admin\hooloh.exe"4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2232
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del Za0Fr02eH4.exe4⤵
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2168
-
-
-
-
C:\Users\Admin\2eaz.exeC:\Users\Admin\2eaz.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Users\Admin\2eaz.exe"C:\Users\Admin\2eaz.exe"4⤵
- Executes dropped EXE
PID:2760
-
-
C:\Users\Admin\2eaz.exe"C:\Users\Admin\2eaz.exe"4⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
PID:2872
-
-
C:\Users\Admin\2eaz.exe"C:\Users\Admin\2eaz.exe"4⤵
- Executes dropped EXE
PID:2596
-
-
C:\Users\Admin\2eaz.exe"C:\Users\Admin\2eaz.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2604
-
-
C:\Users\Admin\2eaz.exe"C:\Users\Admin\2eaz.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1884
-
-
-
C:\Users\Admin\3eaz.exeC:\Users\Admin\3eaz.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Users\Admin\AppData\Local\c8f83bbb\X*0*bc*3aab31e*31.193.3.240:534⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2800
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"4⤵PID:1912
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 6116c0edc9a70e39cd5ce0c2cf6944c2_JaffaCakes118.exe3⤵
- Deletes itself
PID:1140 -
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1936
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2960
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD572de2dadaf875e2fd7614e100419033c
SHA15f17c5330e91a42daa9ff24c4aa602bd1a72bf6e
SHA256c44993768a4dc5a58ddbfc9cb05ce2a7d3a0a56be45643d70a72bcf811b6c381
SHA512e2520a53326a7d3b056e65d0cf60e9d823ffb34ca026cdddc7ea3a714f8396c53c37e13a887fc86a7dd7076c97fdfad53c3f5a68342ebc1bdec948c76bda8df3
-
Filesize
29KB
MD51149c1bd71248a9d170e4568fb08df30
SHA16f77f183d65709901f476c5d6eebaed060a495f9
SHA256c2dcf387cb4d218f50463338291e7db38afbdab9aab88fc54e7f9283df1792d1
SHA5129e6eac8facb23b38552d37c9f3cb24098f871d2885ecb3630fcd0199c5600b12a42f095f9fbeb90e5632496491d46fd987660cdda695e92dc386bd482d3ff459
-
Filesize
184KB
MD5b5e4ef8f155546bb96b2725ec36f8dd9
SHA17e1301b8759c39f37993c7145d233f9fd45fa1c9
SHA256c5ce89c5116fe9796e3324b2045fc53369e099bf92d22d7303a55ae67d0a5755
SHA512b6ba29f78fd3ad4895a9aa6d30f46ecabee67d5ff38a3c0dfc5f5dd5bb170ec2bbf47dd963285fcc90097804523ba12fd41418005f7abf3367875ac21f23e904
-
Filesize
254KB
MD50c0be014832905bc4bb981a03f279d6e
SHA116e8d3cf157ed3afb5041df2bbe97f4422c5a1dc
SHA25613b0b4e5adf34babefd24eb5886a2b9a5d0d2e6cce61a77c2cbd501e22d36f48
SHA5121be55754d1ab77f9ef9c588599428f5754a6cc349471e5f63ca98a5a5d54e40210616937e9f53abe4912b5aa637620b85cb0665e3b60661fd1ca046f7da65060
-
Filesize
212KB
MD5c613e1456c877e1487154fbafe1a298e
SHA1af8c9d76cfb43659ced915b12bba47d0bba11ba0
SHA256b21afd7848d64eadace47bc6f278f4ec2f89b8a42d9be9f55123b0e2de7320f9
SHA512a675e9cd0f4ad741ddaacc15b4a119ab862009b1c62a97ac43a760c6ca5c2ea10e8f00928cd89489759aeea3f91a505b842536a5c221bb6a7b2ecf9a33fc3663
-
Filesize
212KB
MD5671f4f97411dd2047567a382f05a4c37
SHA17c2e6a3abb584323cf2bd79266e5d89203584e6a
SHA2563e3f95d8e7f7d04caa270ba571af8f3778e867ec677de7f0878663d9011b9f17
SHA512a629fbc66b976791bb8edd1d1bd56566f91628510372a818e6348018ba3f26731dc9c6516fa0ce712916c2704082d517fdc3242745d1c081a97c0b0221067050
-
Filesize
2KB
MD54c1216e054fa7e280096b6d0f4f0f0f1
SHA16fc93cae784ee44268d6e2694907b84731cd2b10
SHA2568c010147b0085b640564224367f4be72df0929aff8a2277f8e4713201808c2a7
SHA5129d2bb2dc2cbff314655401a515f5811504b6417b2831a023ccd9ca26f782147654917eb53fbf54e3cee9583023f2729c70b4f57171e8e41edd10a00dd6fa0244