Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
22/07/2024, 17:44
Static task
static1
Behavioral task
behavioral1
Sample
642828913b14f027828764150ea5d18f_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
642828913b14f027828764150ea5d18f_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
642828913b14f027828764150ea5d18f_JaffaCakes118.exe
-
Size
238KB
-
MD5
642828913b14f027828764150ea5d18f
-
SHA1
656ec6e56db3bd0176d46b44af23b20ab616eee4
-
SHA256
1d14c73c9b45a28d1d259b1b05dace849e2f79b0a73aa3015697159259a12721
-
SHA512
c763047021f5acf9e25d70c506483b186e4d5a5f47178a2f9a985e9a4d0551977d03b3888e2fe756204c2b5441bc1f0890d74c4532e7a1cee009192e597bd59c
-
SSDEEP
6144:mgP/Cp0w0NQmvG3W9D8fDAIWXkUIh6g+j:Kpwemv0W9DaW0Ue6x
Malware Config
Signatures
-
Executes dropped EXE 29 IoCs
pid Process 3024 Netcro.bat 2656 Netcro.bat 2132 Netcro.bat 588 Netcro.bat 1508 Netcro.bat 348 Netcro.bat 1264 Netcro.bat 3036 Netcro.bat 1260 Netcro.bat 2892 Netcro.bat 2904 Netcro.bat 2424 Netcro.bat 1740 Netcro.bat 1440 Netcro.bat 2144 Netcro.bat 1380 Netcro.bat 2124 Netcro.bat 324 Netcro.bat 2888 Netcro.bat 3064 Netcro.bat 1316 Netcro.bat 3012 Netcro.bat 2220 Netcro.bat 1132 Netcro.bat 316 Netcro.bat 1732 Netcro.bat 1332 Netcro.bat 2516 Netcro.bat 1112 Netcro.bat -
Loads dropped DLL 29 IoCs
pid Process 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe -
resource yara_rule behavioral1/files/0x000f000000015dac-31.dat upx behavioral1/memory/2764-36-0x0000000003730000-0x0000000003787000-memory.dmp upx behavioral1/memory/2764-62-0x0000000003730000-0x0000000003787000-memory.dmp upx behavioral1/memory/2764-64-0x0000000003730000-0x0000000003787000-memory.dmp upx behavioral1/memory/2656-95-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/3024-94-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2656-113-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/588-118-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/588-103-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/3024-110-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2132-102-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2132-120-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/348-119-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2892-122-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1740-141-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1132-155-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/3036-167-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1508-165-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/3012-163-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1264-161-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1380-159-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2144-157-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1260-153-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1732-151-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2424-149-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1440-147-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/316-145-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2904-143-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1112-140-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2220-138-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2516-136-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2888-134-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/3064-132-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1316-130-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1332-128-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/324-126-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2124-124-0x0000000000400000-0x0000000000457000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 41 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9343812e-1c37-4a49-a12e-4b2d810d956b} 642828913b14f027828764150ea5d18f_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9343812e-1c37-4a49-a12e-4b2d810d956b} 642828913b14f027828764150ea5d18f_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{daf95313-e44d-46af-be1b-cbacea2c3065} 642828913b14f027828764150ea5d18f_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0875DCB6-C686-4243-9432-ADCCF0B9F2D7}\VERSIONINDEPENDENTPROGID 642828913b14f027828764150ea5d18f_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b} 642828913b14f027828764150ea5d18f_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F02C1A0D-BE21-4350-88B0-7367FC96EF3C} 642828913b14f027828764150ea5d18f_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{04731B67-D933-450a-90E6-4ACD2E9408FE} 642828913b14f027828764150ea5d18f_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9343812e-1c37-4a49-a12e-4b2d810d956b}\INPROCSERVER32 642828913b14f027828764150ea5d18f_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0875DCB6-C686-4243-9432-ADCCF0B9F2D7} 642828913b14f027828764150ea5d18f_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{89D83576-6BD1-4c86-9454-BEB04E94C819} 642828913b14f027828764150ea5d18f_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B0FBD52D-C4A7-4A19-985D-11309D1AC8AE} 642828913b14f027828764150ea5d18f_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{59031a47-3f72-44a7-89c5-5595fe6b30ee} 642828913b14f027828764150ea5d18f_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD7A2E7B-21CB-41b2-A086-B309680C6B7E} 642828913b14f027828764150ea5d18f_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0875DCB6-C686-4243-9432-ADCCF0B9F2D7}\SHELLFOLDER 642828913b14f027828764150ea5d18f_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{138508bc-1e03-49ea-9c8f-ea9e1d05d65d} 642828913b14f027828764150ea5d18f_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5399E694-6CE5-4D6C-8FCE-1D8870FDCBA0} 642828913b14f027828764150ea5d18f_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B0FBD52D-C4A7-4A19-985D-11309D1AC8AE}\VERSIONINDEPENDENTPROGID 642828913b14f027828764150ea5d18f_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{04731B67-D933-450a-90E6-4ACD2E9408FE}\INPROCSERVER32 642828913b14f027828764150ea5d18f_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9343812e-1c37-4a49-a12e-4b2d810d956b}\SHELLFOLDER 642828913b14f027828764150ea5d18f_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0875DCB6-C686-4243-9432-ADCCF0B9F2D7}\INPROCSERVER32 642828913b14f027828764150ea5d18f_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0875DCB6-C686-4243-9432-ADCCF0B9F2D7} 642828913b14f027828764150ea5d18f_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B0FBD52D-C4A7-4A19-985D-11309D1AC8AE}\PROGRAMMABLE 642828913b14f027828764150ea5d18f_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{04731B67-D933-450a-90E6-4ACD2E9408FE}\DEFAULTICON 642828913b14f027828764150ea5d18f_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B0FBD52D-C4A7-4A19-985D-11309D1AC8AE}\INPROCSERVER32 642828913b14f027828764150ea5d18f_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B0FBD52D-C4A7-4A19-985D-11309D1AC8AE}\PROGID 642828913b14f027828764150ea5d18f_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B0FBD52D-C4A7-4A19-985D-11309D1AC8AE}\SHELLFOLDER 642828913b14f027828764150ea5d18f_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{26EE0668-A00A-44D7-9371-BEB064C98683} 642828913b14f027828764150ea5d18f_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{138508bc-1e03-49ea-9c8f-ea9e1d05d65d}\DEFAULTICON 642828913b14f027828764150ea5d18f_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{138508bc-1e03-49ea-9c8f-ea9e1d05d65d}\INPROCSERVER32 642828913b14f027828764150ea5d18f_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{138508bc-1e03-49ea-9c8f-ea9e1d05d65d}\SHELLFOLDER 642828913b14f027828764150ea5d18f_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{138508bc-1e03-49ea-9c8f-ea9e1d05d65d} 642828913b14f027828764150ea5d18f_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9343812e-1c37-4a49-a12e-4b2d810d956b}\DEFAULTICON 642828913b14f027828764150ea5d18f_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{04731B67-D933-450a-90E6-4ACD2E9408FE}\SHELLFOLDER 642828913b14f027828764150ea5d18f_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{04731B67-D933-450a-90E6-4ACD2E9408FE} 642828913b14f027828764150ea5d18f_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{11016101-E366-4D22-BC06-4ADA335C892B} 642828913b14f027828764150ea5d18f_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B4FB3F98-C1EA-428d-A78A-D1F5659CBA93} 642828913b14f027828764150ea5d18f_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{031E4825-7B94-4dc3-B131-E946B44C8DD5} 642828913b14f027828764150ea5d18f_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0875DCB6-C686-4243-9432-ADCCF0B9F2D7}\PROGID 642828913b14f027828764150ea5d18f_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B0FBD52D-C4A7-4a19-985D-11309D1AC8AE} 642828913b14f027828764150ea5d18f_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{e345f35f-9397-435c-8f95-4e922c26259e} 642828913b14f027828764150ea5d18f_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{ED228FDF-9EA8-4870-83b1-96b02CFE0D52} 642828913b14f027828764150ea5d18f_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeBackupPrivilege 2656 Netcro.bat Token: SeRestorePrivilege 2656 Netcro.bat Token: SeBackupPrivilege 3024 Netcro.bat Token: SeRestorePrivilege 3024 Netcro.bat Token: SeSecurityPrivilege 2656 Netcro.bat Token: SeSecurityPrivilege 3024 Netcro.bat Token: SeSecurityPrivilege 3024 Netcro.bat Token: SeBackupPrivilege 2132 Netcro.bat Token: SeRestorePrivilege 2132 Netcro.bat Token: SeSecurityPrivilege 2132 Netcro.bat Token: SeBackupPrivilege 588 Netcro.bat Token: SeRestorePrivilege 588 Netcro.bat Token: SeSecurityPrivilege 588 Netcro.bat Token: SeBackupPrivilege 348 Netcro.bat Token: SeRestorePrivilege 348 Netcro.bat Token: SeSecurityPrivilege 348 Netcro.bat Token: SeBackupPrivilege 2892 Netcro.bat Token: SeRestorePrivilege 2892 Netcro.bat Token: SeBackupPrivilege 2124 Netcro.bat Token: SeRestorePrivilege 2124 Netcro.bat Token: SeBackupPrivilege 1316 Netcro.bat Token: SeBackupPrivilege 3064 Netcro.bat Token: SeBackupPrivilege 324 Netcro.bat Token: SeBackupPrivilege 1332 Netcro.bat Token: SeRestorePrivilege 3064 Netcro.bat Token: SeRestorePrivilege 324 Netcro.bat Token: SeRestorePrivilege 1332 Netcro.bat Token: SeRestorePrivilege 1316 Netcro.bat Token: SeBackupPrivilege 1740 Netcro.bat Token: SeRestorePrivilege 1740 Netcro.bat Token: SeBackupPrivilege 2888 Netcro.bat Token: SeRestorePrivilege 2888 Netcro.bat Token: SeBackupPrivilege 2516 Netcro.bat Token: SeBackupPrivilege 2220 Netcro.bat Token: SeBackupPrivilege 1112 Netcro.bat Token: SeRestorePrivilege 2516 Netcro.bat Token: SeRestorePrivilege 2220 Netcro.bat Token: SeRestorePrivilege 1112 Netcro.bat Token: SeBackupPrivilege 1380 Netcro.bat Token: SeRestorePrivilege 1380 Netcro.bat Token: SeSecurityPrivilege 1380 Netcro.bat Token: SeBackupPrivilege 2144 Netcro.bat Token: SeRestorePrivilege 2144 Netcro.bat Token: SeSecurityPrivilege 2144 Netcro.bat Token: SeSecurityPrivilege 2144 Netcro.bat Token: SeBackupPrivilege 2904 Netcro.bat Token: SeRestorePrivilege 2904 Netcro.bat Token: SeBackupPrivilege 316 Netcro.bat Token: SeRestorePrivilege 316 Netcro.bat Token: SeBackupPrivilege 1440 Netcro.bat Token: SeRestorePrivilege 1440 Netcro.bat Token: SeBackupPrivilege 2424 Netcro.bat Token: SeRestorePrivilege 2424 Netcro.bat Token: SeBackupPrivilege 1732 Netcro.bat Token: SeRestorePrivilege 1732 Netcro.bat Token: SeBackupPrivilege 1260 Netcro.bat Token: SeRestorePrivilege 1260 Netcro.bat Token: SeBackupPrivilege 1132 Netcro.bat Token: SeRestorePrivilege 1132 Netcro.bat Token: SeBackupPrivilege 1264 Netcro.bat Token: SeRestorePrivilege 1264 Netcro.bat Token: SeSecurityPrivilege 1264 Netcro.bat Token: SeBackupPrivilege 3012 Netcro.bat Token: SeRestorePrivilege 3012 Netcro.bat -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2764 wrote to memory of 2656 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 32 PID 2764 wrote to memory of 2656 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 32 PID 2764 wrote to memory of 2656 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 32 PID 2764 wrote to memory of 2656 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 32 PID 2764 wrote to memory of 3024 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 33 PID 2764 wrote to memory of 3024 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 33 PID 2764 wrote to memory of 3024 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 33 PID 2764 wrote to memory of 3024 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 33 PID 2764 wrote to memory of 2132 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 34 PID 2764 wrote to memory of 2132 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 34 PID 2764 wrote to memory of 2132 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 34 PID 2764 wrote to memory of 2132 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 34 PID 2764 wrote to memory of 348 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 37 PID 2764 wrote to memory of 348 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 37 PID 2764 wrote to memory of 348 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 37 PID 2764 wrote to memory of 348 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 37 PID 2764 wrote to memory of 588 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 38 PID 2764 wrote to memory of 588 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 38 PID 2764 wrote to memory of 588 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 38 PID 2764 wrote to memory of 588 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 38 PID 2764 wrote to memory of 1508 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 39 PID 2764 wrote to memory of 1508 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 39 PID 2764 wrote to memory of 1508 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 39 PID 2764 wrote to memory of 1508 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 39 PID 2764 wrote to memory of 2144 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 42 PID 2764 wrote to memory of 2144 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 42 PID 2764 wrote to memory of 2144 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 42 PID 2764 wrote to memory of 2144 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 42 PID 2764 wrote to memory of 1264 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 45 PID 2764 wrote to memory of 1264 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 45 PID 2764 wrote to memory of 1264 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 45 PID 2764 wrote to memory of 1264 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 45 PID 2764 wrote to memory of 1380 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 46 PID 2764 wrote to memory of 1380 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 46 PID 2764 wrote to memory of 1380 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 46 PID 2764 wrote to memory of 1380 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 46 PID 2764 wrote to memory of 3036 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 47 PID 2764 wrote to memory of 3036 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 47 PID 2764 wrote to memory of 3036 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 47 PID 2764 wrote to memory of 3036 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 47 PID 2764 wrote to memory of 2124 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 48 PID 2764 wrote to memory of 2124 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 48 PID 2764 wrote to memory of 2124 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 48 PID 2764 wrote to memory of 2124 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 48 PID 2764 wrote to memory of 1260 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 49 PID 2764 wrote to memory of 1260 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 49 PID 2764 wrote to memory of 1260 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 49 PID 2764 wrote to memory of 1260 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 49 PID 2764 wrote to memory of 324 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 50 PID 2764 wrote to memory of 324 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 50 PID 2764 wrote to memory of 324 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 50 PID 2764 wrote to memory of 324 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 50 PID 2764 wrote to memory of 2892 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 51 PID 2764 wrote to memory of 2892 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 51 PID 2764 wrote to memory of 2892 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 51 PID 2764 wrote to memory of 2892 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 51 PID 2764 wrote to memory of 2888 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 52 PID 2764 wrote to memory of 2888 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 52 PID 2764 wrote to memory of 2888 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 52 PID 2764 wrote to memory of 2888 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 52 PID 2764 wrote to memory of 2904 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 53 PID 2764 wrote to memory of 2904 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 53 PID 2764 wrote to memory of 2904 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 53 PID 2764 wrote to memory of 2904 2764 642828913b14f027828764150ea5d18f_JaffaCakes118.exe 53
Processes
-
C:\Users\Admin\AppData\Local\Temp\642828913b14f027828764150ea5d18f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\642828913b14f027828764150ea5d18f_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Users\Admin\AppData\Local\Temp\Netcro.batNetcro.bat -on "C:\Users\Public\Desktop\上网主页.lnk" -ot file -op "dacl:p_nc;sacl:p_nc" -actn setprot -actn clear -clr "dacl,sacl" -actn ace -ace "n:everyone;p:read_ex"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2656
-
-
C:\Users\Admin\AppData\Local\Temp\Netcro.batNetcro.bat -on "C:\Users\Admin\Desktop\Internet Explorer.lnk" -ot file -op "dacl:p_nc;sacl:p_nc" -actn setprot -actn clear -clr "dacl,sacl" -actn ace -ace "n:everyone;p:read_ex"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3024
-
-
C:\Users\Admin\AppData\Local\Temp\Netcro.batNetcro.bat -on "C:\Users\Public\Desktop\Internet Explorer.lnk" -ot file -op "dacl:p_nc;sacl:p_nc" -actn setprot -actn clear -clr "dacl,sacl" -actn ace -ace "n:everyone;p:read_ex"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2132
-
-
C:\Users\Admin\AppData\Local\Temp\Netcro.batNetcro.bat -on "C:\Users\Public\Desktop\淘宝购物.lnk" -ot file -op "dacl:p_nc;sacl:p_nc" -actn setprot -actn clear -clr "dacl,sacl" -actn ace -ace "n:everyone;p:read_ex"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:348
-
-
C:\Users\Admin\AppData\Local\Temp\Netcro.batNetcro.bat -on "C:\Users\Public\Desktop\在线小游戏.lnk" -ot file -op "dacl:p_nc;sacl:p_nc" -actn setprot -actn clear -clr "dacl,sacl" -actn ace -ace "n:everyone;p:read_ex"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:588
-
-
C:\Users\Admin\AppData\Local\Temp\Netcro.batNetcro.bat -on "C:\Users\Admin\AppData\Local\Temp\tb.ico" -ot file -op "dacl:p_nc;sacl:p_nc" -actn setprot -actn clear -clr "dacl,sacl" -actn ace -ace "n:everyone;p:read_ex"2⤵
- Executes dropped EXE
PID:1508
-
-
C:\Users\Admin\AppData\Local\Temp\Netcro.batNetcro.bat -on "C:\Users\Admin\AppData\Local\Temp\642828913b14f027828764150ea5d18f_JaffaCakes118.exe" -ot file -op "dacl:p_nc;sacl:p_nc" -actn setprot -actn clear -clr "dacl,sacl" -actn ace -ace "n:everyone;p:read_ex"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2144
-
-
C:\Users\Admin\AppData\Local\Temp\Netcro.batNetcro.bat -on "C:\Program Files\Realtek\ations.sot" -ot file -op "dacl:p_nc;sacl:p_nc" -actn setprot -actn clear -clr "dacl,sacl" -actn ace -ace "n:everyone;p:read_ex"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1264
-
-
C:\Users\Admin\AppData\Local\Temp\Netcro.batNetcro.bat -on "C:\Program Files\Realtek\youwo.sot" -ot file -op "dacl:p_nc;sacl:p_nc" -actn setprot -actn clear -clr "dacl,sacl" -actn ace -ace "n:everyone;p:read_ex"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1380
-
-
C:\Users\Admin\AppData\Local\Temp\Netcro.batNetcro.bat -on "C:\Program Files\Realtek\duoyu.oed" -ot file -op "dacl:p_nc;sacl:p_nc" -actn setprot -actn clear -clr "dacl,sacl" -actn ace -ace "n:everyone;p:read_ex"2⤵
- Executes dropped EXE
PID:3036
-
-
C:\Users\Admin\AppData\Local\Temp\Netcro.batNetcro.bat -on "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Desktop\NameSpace\{031E4825-7B94-4dc3-B131-E946B44C8DD5}" -ot reg -actn ace -ace "n:everyone;p:full"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2124
-
-
C:\Users\Admin\AppData\Local\Temp\Netcro.batNetcro.bat -on "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Desktop\NameSpace\{0875DCB6-C686-4243-9432-ADCCF0B9F2D7}" -ot reg -actn ace -ace "n:everyone;p:full"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1260
-
-
C:\Users\Admin\AppData\Local\Temp\Netcro.batNetcro.bat -on "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Desktop\NameSpace\{138508bc-1e03-49ea-9c8f-ea9e1d05d65d}" -ot reg -actn ace -ace "n:everyone;p:full"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:324
-
-
C:\Users\Admin\AppData\Local\Temp\Netcro.batNetcro.bat -on "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Desktop\NameSpace\{4336a54d-038b-4685-ab02-99bb52d3fb8b}" -ot reg -actn ace -ace "n:everyone;p:full"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2892
-
-
C:\Users\Admin\AppData\Local\Temp\Netcro.batNetcro.bat -on "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Desktop\NameSpace\{5399E694-6CE5-4D6C-8FCE-1D8870FDCBA0}" -ot reg -actn ace -ace "n:everyone;p:full"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2888
-
-
C:\Users\Admin\AppData\Local\Temp\Netcro.batNetcro.bat -on "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Desktop\NameSpace\{89D83576-6BD1-4c86-9454-BEB04E94C819}" -ot reg -actn ace -ace "n:everyone;p:full"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2904
-
-
C:\Users\Admin\AppData\Local\Temp\Netcro.batNetcro.bat -on "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Desktop\NameSpace\{B0FBD52D-C4A7-4a19-985D-11309D1AC8AE}" -ot reg -actn ace -ace "n:everyone;p:full"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3064
-
-
C:\Users\Admin\AppData\Local\Temp\Netcro.batNetcro.bat -on "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Desktop\NameSpace\{BD7A2E7B-21CB-41b2-A086-B309680C6B7E}" -ot reg -actn ace -ace "n:everyone;p:full"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2424
-
-
C:\Users\Admin\AppData\Local\Temp\Netcro.batNetcro.bat -on "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Desktop\NameSpace\{e345f35f-9397-435c-8f95-4e922c26259e}" -ot reg -actn ace -ace "n:everyone;p:full"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1316
-
-
C:\Users\Admin\AppData\Local\Temp\Netcro.batNetcro.bat -on "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Desktop\NameSpace\{F02C1A0D-BE21-4350-88B0-7367FC96EF3C}" -ot reg -actn ace -ace "n:everyone;p:full"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1740
-
-
C:\Users\Admin\AppData\Local\Temp\Netcro.batNetcro.bat -on "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Desktop\NameSpace\{04731B67-D933-450a-90E6-4ACD2E9408FE}" -ot reg -actn ace -ace "n:everyone;p:full"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3012
-
-
C:\Users\Admin\AppData\Local\Temp\Netcro.batNetcro.bat -on "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Desktop\NameSpace\{26EE0668-A00A-44D7-9371-BEB064C98683}" -ot reg -actn ace -ace "n:everyone;p:full"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1440
-
-
C:\Users\Admin\AppData\Local\Temp\Netcro.batNetcro.bat -on "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Desktop\NameSpace\{59031a47-3f72-44a7-89c5-5595fe6b30ee}" -ot reg -actn ace -ace "n:everyone;p:full"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2220
-
-
C:\Users\Admin\AppData\Local\Temp\Netcro.batNetcro.bat -on "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Desktop\NameSpace\{9343812e-1c37-4a49-a12e-4b2d810d956b}" -ot reg -actn ace -ace "n:everyone;p:full"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1332
-
-
C:\Users\Admin\AppData\Local\Temp\Netcro.batNetcro.bat -on "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Desktop\NameSpace\{daf95313-e44d-46af-be1b-cbacea2c3065}" -ot reg -actn ace -ace "n:everyone;p:full"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:316
-
-
C:\Users\Admin\AppData\Local\Temp\Netcro.batNetcro.bat -on "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Desktop\NameSpace\{11016101-E366-4D22-BC06-4ADA335C892B}" -ot reg -actn ace -ace "n:everyone;p:full"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2516
-
-
C:\Users\Admin\AppData\Local\Temp\Netcro.batNetcro.bat -on "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Desktop\NameSpace\{B4FB3F98-C1EA-428d-A78A-D1F5659CBA93}" -ot reg -actn ace -ace "n:everyone;p:full"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1132
-
-
C:\Users\Admin\AppData\Local\Temp\Netcro.batNetcro.bat -on "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Desktop\NameSpace\{ED228FDF-9EA8-4870-83b1-96b02CFE0D52}" -ot reg -actn ace -ace "n:everyone;p:full"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1112
-
-
C:\Users\Admin\AppData\Local\Temp\Netcro.batNetcro.bat -on "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Desktop\NameSpace\{ED228FDF-9EA8-4870-83b1-96b02CFE0D52}" -ot reg -actn ace -ace "n:everyone;p:full"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1732
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5969d294f013edda2002e9a98b6db4c33
SHA11f897c30b1e521f93423db8b9c35fb6c1d1e6246
SHA2563b1c764951a112ef65eb3fac04d4e7d0eadfed1e3742d948c7814dbbb3092050
SHA51289bf460b146ac8a6c1e1a4cf682a502b3da01633a29e8253f02cc02182c16670b8a5ac1c99335e405086c2cbd8fbe09c48f40fc0d56b721c3a71aea795e921ec
-
Filesize
1KB
MD5033fda28f96c5f739b513d559fbe11a2
SHA1f3a50dcf3c00f6b603e83e744443b80014280571
SHA256505b112065fb1332348ac3c6f7221c5cf3e616a7d4d7e218fc27e6bba6a4b0a0
SHA51208ee5e41d1baee079780e6afaa25ff7cf8ce3d659cdf4cc14ee4b8deccc4aeab09f03f4e60d8d1551d411c1e88fc257c838d10f019695179ff908fd89bc3be05
-
Filesize
136KB
MD5627985c64dd0a467645025c2f5b34be2
SHA1e577e48ddddcf86f2bc0920af3d080139c34ee0e
SHA2567bac250643d481ea8f492efc3a9e226e6f8b04bfa474d37321a16c215066791b
SHA5126556c0ec4aaf17be4aa6459667358e936f40bd5ccae49658c80e164df8f4a9d449bbb744fd63811d2d4de9f4da6b0a0c241317110e10bd7afef8c97871da60b1