Analysis
-
max time kernel
150s -
max time network
78s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22/07/2024, 18:00
Static task
static1
Behavioral task
behavioral1
Sample
643584014e1ca57e7b0d124d27fdc719_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
643584014e1ca57e7b0d124d27fdc719_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
643584014e1ca57e7b0d124d27fdc719_JaffaCakes118.exe
-
Size
484KB
-
MD5
643584014e1ca57e7b0d124d27fdc719
-
SHA1
5fc0b7f479e8e52f3eb251ed87cf068732e64d72
-
SHA256
c91a8f6b64d181d9e4df587860aeb73b6136bc6f20db78ac725292407c109f09
-
SHA512
e050664fb958cbd778ad6e678d0b9c2e89fed1f2f6996dc8619fda43ee655b8a4b846ad5c6679f2654fb6ec6886e97fd66464469e687e3fb4ab88120e0599a02
-
SSDEEP
12288:zP9GBWQch+L/ZgHP+v7xK0DmFwUfIp7JVyvWt1aBnSFAPHzeO:zPoBHch+uudKNffiv1aVSaPTeO
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" V6oUpCF0mC.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" pkgoat.exe -
Deletes itself 1 IoCs
pid Process 2924 cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 2708 V6oUpCF0mC.exe 2760 pkgoat.exe 2676 ayhost.exe 2116 ayhost.exe 1392 byhost.exe 1008 byhost.exe 2688 cyhost.exe 332 csrss.exe 1708 cyhost.exe 1604 cyhost.exe 2744 dyhost.exe -
Loads dropped DLL 14 IoCs
pid Process 2292 643584014e1ca57e7b0d124d27fdc719_JaffaCakes118.exe 2292 643584014e1ca57e7b0d124d27fdc719_JaffaCakes118.exe 2708 V6oUpCF0mC.exe 2708 V6oUpCF0mC.exe 2292 643584014e1ca57e7b0d124d27fdc719_JaffaCakes118.exe 2292 643584014e1ca57e7b0d124d27fdc719_JaffaCakes118.exe 2292 643584014e1ca57e7b0d124d27fdc719_JaffaCakes118.exe 2292 643584014e1ca57e7b0d124d27fdc719_JaffaCakes118.exe 2292 643584014e1ca57e7b0d124d27fdc719_JaffaCakes118.exe 2292 643584014e1ca57e7b0d124d27fdc719_JaffaCakes118.exe 2688 cyhost.exe 856 DllHost.exe 2292 643584014e1ca57e7b0d124d27fdc719_JaffaCakes118.exe 2292 643584014e1ca57e7b0d124d27fdc719_JaffaCakes118.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2292-4-0x0000000000400000-0x00000000004BE000-memory.dmp upx behavioral1/memory/2292-15-0x0000000000400000-0x00000000004BE000-memory.dmp upx behavioral1/memory/2292-13-0x0000000000400000-0x00000000004BE000-memory.dmp upx behavioral1/memory/2292-10-0x0000000000400000-0x00000000004BE000-memory.dmp upx behavioral1/memory/2292-6-0x0000000000400000-0x00000000004BE000-memory.dmp upx behavioral1/memory/2292-12-0x0000000000400000-0x00000000004BE000-memory.dmp upx behavioral1/memory/1708-140-0x0000000000400000-0x0000000000448000-memory.dmp upx behavioral1/memory/2292-141-0x0000000000400000-0x00000000004BE000-memory.dmp upx behavioral1/memory/2688-146-0x0000000000400000-0x0000000000448000-memory.dmp upx behavioral1/memory/2292-346-0x0000000000400000-0x00000000004BE000-memory.dmp upx -
Adds Run key to start application 2 TTPs 53 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\pkgoat = "C:\\Users\\Admin\\pkgoat.exe /k" pkgoat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\pkgoat = "C:\\Users\\Admin\\pkgoat.exe /X" pkgoat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\pkgoat = "C:\\Users\\Admin\\pkgoat.exe /b" pkgoat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\pkgoat = "C:\\Users\\Admin\\pkgoat.exe /z" pkgoat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\pkgoat = "C:\\Users\\Admin\\pkgoat.exe /L" pkgoat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\pkgoat = "C:\\Users\\Admin\\pkgoat.exe /J" pkgoat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\pkgoat = "C:\\Users\\Admin\\pkgoat.exe /l" pkgoat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\pkgoat = "C:\\Users\\Admin\\pkgoat.exe /c" pkgoat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\pkgoat = "C:\\Users\\Admin\\pkgoat.exe /t" pkgoat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\pkgoat = "C:\\Users\\Admin\\pkgoat.exe /C" pkgoat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\pkgoat = "C:\\Users\\Admin\\pkgoat.exe /R" pkgoat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\pkgoat = "C:\\Users\\Admin\\pkgoat.exe /V" pkgoat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\pkgoat = "C:\\Users\\Admin\\pkgoat.exe /o" pkgoat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\pkgoat = "C:\\Users\\Admin\\pkgoat.exe /p" pkgoat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\pkgoat = "C:\\Users\\Admin\\pkgoat.exe /F" pkgoat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\pkgoat = "C:\\Users\\Admin\\pkgoat.exe /G" pkgoat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\pkgoat = "C:\\Users\\Admin\\pkgoat.exe /m" pkgoat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\pkgoat = "C:\\Users\\Admin\\pkgoat.exe /s" pkgoat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\pkgoat = "C:\\Users\\Admin\\pkgoat.exe /W" pkgoat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\pkgoat = "C:\\Users\\Admin\\pkgoat.exe /a" pkgoat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\pkgoat = "C:\\Users\\Admin\\pkgoat.exe /K" pkgoat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\pkgoat = "C:\\Users\\Admin\\pkgoat.exe /Z" pkgoat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\pkgoat = "C:\\Users\\Admin\\pkgoat.exe /H" pkgoat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\pkgoat = "C:\\Users\\Admin\\pkgoat.exe /B" pkgoat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\pkgoat = "C:\\Users\\Admin\\pkgoat.exe /y" pkgoat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\pkgoat = "C:\\Users\\Admin\\pkgoat.exe /Q" pkgoat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\pkgoat = "C:\\Users\\Admin\\pkgoat.exe /u" pkgoat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\pkgoat = "C:\\Users\\Admin\\pkgoat.exe /T" pkgoat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\pkgoat = "C:\\Users\\Admin\\pkgoat.exe /w" pkgoat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\pkgoat = "C:\\Users\\Admin\\pkgoat.exe /r" pkgoat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\pkgoat = "C:\\Users\\Admin\\pkgoat.exe /D" pkgoat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\pkgoat = "C:\\Users\\Admin\\pkgoat.exe /h" pkgoat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\pkgoat = "C:\\Users\\Admin\\pkgoat.exe /v" pkgoat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\pkgoat = "C:\\Users\\Admin\\pkgoat.exe /E" pkgoat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\pkgoat = "C:\\Users\\Admin\\pkgoat.exe /d" pkgoat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\pkgoat = "C:\\Users\\Admin\\pkgoat.exe /Y" pkgoat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\pkgoat = "C:\\Users\\Admin\\pkgoat.exe /N" pkgoat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\pkgoat = "C:\\Users\\Admin\\pkgoat.exe /f" pkgoat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\pkgoat = "C:\\Users\\Admin\\pkgoat.exe /j" pkgoat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\pkgoat = "C:\\Users\\Admin\\pkgoat.exe /I" pkgoat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\pkgoat = "C:\\Users\\Admin\\pkgoat.exe /x" pkgoat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\pkgoat = "C:\\Users\\Admin\\pkgoat.exe /A" pkgoat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\pkgoat = "C:\\Users\\Admin\\pkgoat.exe /g" pkgoat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\pkgoat = "C:\\Users\\Admin\\pkgoat.exe /U" V6oUpCF0mC.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\pkgoat = "C:\\Users\\Admin\\pkgoat.exe /O" pkgoat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\pkgoat = "C:\\Users\\Admin\\pkgoat.exe /U" pkgoat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\pkgoat = "C:\\Users\\Admin\\pkgoat.exe /M" pkgoat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\pkgoat = "C:\\Users\\Admin\\pkgoat.exe /P" pkgoat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\pkgoat = "C:\\Users\\Admin\\pkgoat.exe /i" pkgoat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\pkgoat = "C:\\Users\\Admin\\pkgoat.exe /n" pkgoat.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Program Files (x86)\\Internet Explorer\\lvvm.exe" cyhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\pkgoat = "C:\\Users\\Admin\\pkgoat.exe /q" pkgoat.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\pkgoat = "C:\\Users\\Admin\\pkgoat.exe /e" pkgoat.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created \systemroot\assembly\GAC_64\Desktop.ini csrss.exe File created \systemroot\assembly\GAC_32\Desktop.ini csrss.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2520 set thread context of 2292 2520 643584014e1ca57e7b0d124d27fdc719_JaffaCakes118.exe 30 PID 2676 set thread context of 2116 2676 ayhost.exe 38 PID 1392 set thread context of 1008 1392 byhost.exe 40 PID 1008 set thread context of 936 1008 byhost.exe 41 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\Internet Explorer\lvvm.exe cyhost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 2768 tasklist.exe 2668 tasklist.exe -
Modifies registry class 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{21240613-e5f7-3097-7118-07a5e49ca0cc}\u = "860049491" explorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{21240613-e5f7-3097-7118-07a5e49ca0cc}\cid = "5077238432561062379" explorer.exe Key created \registry\machine\Software\Classes\Interface\{21240613-e5f7-3097-7118-07a5e49ca0cc} explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2708 V6oUpCF0mC.exe 2708 V6oUpCF0mC.exe 2116 ayhost.exe 2760 pkgoat.exe 2760 pkgoat.exe 936 explorer.exe 936 explorer.exe 936 explorer.exe 2760 pkgoat.exe 2116 ayhost.exe 2760 pkgoat.exe 2760 pkgoat.exe 2760 pkgoat.exe 2116 ayhost.exe 2760 pkgoat.exe 2116 ayhost.exe 2116 ayhost.exe 2760 pkgoat.exe 2760 pkgoat.exe 2760 pkgoat.exe 2116 ayhost.exe 2760 pkgoat.exe 2116 ayhost.exe 2760 pkgoat.exe 2116 ayhost.exe 2760 pkgoat.exe 2760 pkgoat.exe 2116 ayhost.exe 2760 pkgoat.exe 2116 ayhost.exe 2116 ayhost.exe 2760 pkgoat.exe 2116 ayhost.exe 2116 ayhost.exe 2760 pkgoat.exe 2760 pkgoat.exe 2116 ayhost.exe 2116 ayhost.exe 2760 pkgoat.exe 2116 ayhost.exe 2760 pkgoat.exe 2760 pkgoat.exe 2116 ayhost.exe 2116 ayhost.exe 2116 ayhost.exe 2760 pkgoat.exe 2116 ayhost.exe 2760 pkgoat.exe 2116 ayhost.exe 2760 pkgoat.exe 2760 pkgoat.exe 2116 ayhost.exe 2116 ayhost.exe 2116 ayhost.exe 2760 pkgoat.exe 2116 ayhost.exe 2116 ayhost.exe 2760 pkgoat.exe 2116 ayhost.exe 2760 pkgoat.exe 2760 pkgoat.exe 2116 ayhost.exe 2760 pkgoat.exe 2116 ayhost.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2768 tasklist.exe Token: SeDebugPrivilege 936 explorer.exe Token: SeDebugPrivilege 2668 tasklist.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2520 643584014e1ca57e7b0d124d27fdc719_JaffaCakes118.exe 2292 643584014e1ca57e7b0d124d27fdc719_JaffaCakes118.exe 2708 V6oUpCF0mC.exe 2760 pkgoat.exe 2676 ayhost.exe 1392 byhost.exe 2744 dyhost.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 332 csrss.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2520 wrote to memory of 2292 2520 643584014e1ca57e7b0d124d27fdc719_JaffaCakes118.exe 30 PID 2520 wrote to memory of 2292 2520 643584014e1ca57e7b0d124d27fdc719_JaffaCakes118.exe 30 PID 2520 wrote to memory of 2292 2520 643584014e1ca57e7b0d124d27fdc719_JaffaCakes118.exe 30 PID 2520 wrote to memory of 2292 2520 643584014e1ca57e7b0d124d27fdc719_JaffaCakes118.exe 30 PID 2520 wrote to memory of 2292 2520 643584014e1ca57e7b0d124d27fdc719_JaffaCakes118.exe 30 PID 2520 wrote to memory of 2292 2520 643584014e1ca57e7b0d124d27fdc719_JaffaCakes118.exe 30 PID 2520 wrote to memory of 2292 2520 643584014e1ca57e7b0d124d27fdc719_JaffaCakes118.exe 30 PID 2520 wrote to memory of 2292 2520 643584014e1ca57e7b0d124d27fdc719_JaffaCakes118.exe 30 PID 2292 wrote to memory of 2708 2292 643584014e1ca57e7b0d124d27fdc719_JaffaCakes118.exe 31 PID 2292 wrote to memory of 2708 2292 643584014e1ca57e7b0d124d27fdc719_JaffaCakes118.exe 31 PID 2292 wrote to memory of 2708 2292 643584014e1ca57e7b0d124d27fdc719_JaffaCakes118.exe 31 PID 2292 wrote to memory of 2708 2292 643584014e1ca57e7b0d124d27fdc719_JaffaCakes118.exe 31 PID 2708 wrote to memory of 2760 2708 V6oUpCF0mC.exe 32 PID 2708 wrote to memory of 2760 2708 V6oUpCF0mC.exe 32 PID 2708 wrote to memory of 2760 2708 V6oUpCF0mC.exe 32 PID 2708 wrote to memory of 2760 2708 V6oUpCF0mC.exe 32 PID 2708 wrote to memory of 2640 2708 V6oUpCF0mC.exe 33 PID 2708 wrote to memory of 2640 2708 V6oUpCF0mC.exe 33 PID 2708 wrote to memory of 2640 2708 V6oUpCF0mC.exe 33 PID 2708 wrote to memory of 2640 2708 V6oUpCF0mC.exe 33 PID 2640 wrote to memory of 2768 2640 cmd.exe 35 PID 2640 wrote to memory of 2768 2640 cmd.exe 35 PID 2640 wrote to memory of 2768 2640 cmd.exe 35 PID 2640 wrote to memory of 2768 2640 cmd.exe 35 PID 2292 wrote to memory of 2676 2292 643584014e1ca57e7b0d124d27fdc719_JaffaCakes118.exe 37 PID 2292 wrote to memory of 2676 2292 643584014e1ca57e7b0d124d27fdc719_JaffaCakes118.exe 37 PID 2292 wrote to memory of 2676 2292 643584014e1ca57e7b0d124d27fdc719_JaffaCakes118.exe 37 PID 2292 wrote to memory of 2676 2292 643584014e1ca57e7b0d124d27fdc719_JaffaCakes118.exe 37 PID 2676 wrote to memory of 2116 2676 ayhost.exe 38 PID 2676 wrote to memory of 2116 2676 ayhost.exe 38 PID 2676 wrote to memory of 2116 2676 ayhost.exe 38 PID 2676 wrote to memory of 2116 2676 ayhost.exe 38 PID 2676 wrote to memory of 2116 2676 ayhost.exe 38 PID 2676 wrote to memory of 2116 2676 ayhost.exe 38 PID 2676 wrote to memory of 2116 2676 ayhost.exe 38 PID 2676 wrote to memory of 2116 2676 ayhost.exe 38 PID 2676 wrote to memory of 2116 2676 ayhost.exe 38 PID 2676 wrote to memory of 2116 2676 ayhost.exe 38 PID 2676 wrote to memory of 2116 2676 ayhost.exe 38 PID 2292 wrote to memory of 1392 2292 643584014e1ca57e7b0d124d27fdc719_JaffaCakes118.exe 39 PID 2292 wrote to memory of 1392 2292 643584014e1ca57e7b0d124d27fdc719_JaffaCakes118.exe 39 PID 2292 wrote to memory of 1392 2292 643584014e1ca57e7b0d124d27fdc719_JaffaCakes118.exe 39 PID 2292 wrote to memory of 1392 2292 643584014e1ca57e7b0d124d27fdc719_JaffaCakes118.exe 39 PID 1392 wrote to memory of 1008 1392 byhost.exe 40 PID 1392 wrote to memory of 1008 1392 byhost.exe 40 PID 1392 wrote to memory of 1008 1392 byhost.exe 40 PID 1392 wrote to memory of 1008 1392 byhost.exe 40 PID 1392 wrote to memory of 1008 1392 byhost.exe 40 PID 1392 wrote to memory of 1008 1392 byhost.exe 40 PID 1392 wrote to memory of 1008 1392 byhost.exe 40 PID 1392 wrote to memory of 1008 1392 byhost.exe 40 PID 1392 wrote to memory of 1008 1392 byhost.exe 40 PID 1392 wrote to memory of 1008 1392 byhost.exe 40 PID 1008 wrote to memory of 936 1008 byhost.exe 41 PID 1008 wrote to memory of 936 1008 byhost.exe 41 PID 1008 wrote to memory of 936 1008 byhost.exe 41 PID 1008 wrote to memory of 936 1008 byhost.exe 41 PID 1008 wrote to memory of 936 1008 byhost.exe 41 PID 2292 wrote to memory of 2688 2292 643584014e1ca57e7b0d124d27fdc719_JaffaCakes118.exe 42 PID 2292 wrote to memory of 2688 2292 643584014e1ca57e7b0d124d27fdc719_JaffaCakes118.exe 42 PID 2292 wrote to memory of 2688 2292 643584014e1ca57e7b0d124d27fdc719_JaffaCakes118.exe 42 PID 2292 wrote to memory of 2688 2292 643584014e1ca57e7b0d124d27fdc719_JaffaCakes118.exe 42 PID 936 wrote to memory of 332 936 explorer.exe 2 PID 2688 wrote to memory of 1708 2688 cyhost.exe 43
Processes
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Suspicious use of UnmapMainImage
PID:332
-
C:\Users\Admin\AppData\Local\Temp\643584014e1ca57e7b0d124d27fdc719_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\643584014e1ca57e7b0d124d27fdc719_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\643584014e1ca57e7b0d124d27fdc719_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\643584014e1ca57e7b0d124d27fdc719_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Users\Admin\V6oUpCF0mC.exeC:\Users\Admin\V6oUpCF0mC.exe3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\pkgoat.exe"C:\Users\Admin\pkgoat.exe"4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2760
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del V6oUpCF0mC.exe4⤵
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2768
-
-
-
-
C:\Users\Admin\ayhost.exeC:\Users\Admin\ayhost.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Users\Admin\ayhost.exe"C:\Users\Admin\ayhost.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2116
-
-
-
C:\Users\Admin\byhost.exeC:\Users\Admin\byhost.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Users\Admin\byhost.exe"C:\Users\Admin\byhost.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Windows\explorer.exe0000003C*5⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:936
-
-
-
-
C:\Users\Admin\cyhost.exeC:\Users\Admin\cyhost.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Users\Admin\cyhost.exeC:\Users\Admin\cyhost.exe startC:\Users\Admin\AppData\Roaming\conhost.exe%C:\Users\Admin\AppData\Roaming4⤵
- Executes dropped EXE
PID:1708
-
-
C:\Users\Admin\cyhost.exeC:\Users\Admin\cyhost.exe startC:\Users\Admin\AppData\Local\Temp\dwm.exe%C:\Users\Admin\AppData\Local\Temp4⤵
- Executes dropped EXE
PID:1604
-
-
-
C:\Users\Admin\dyhost.exeC:\Users\Admin\dyhost.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2744
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 643584014e1ca57e7b0d124d27fdc719_JaffaCakes118.exe3⤵
- Deletes itself
PID:2924 -
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2668
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵
- Loads dropped DLL
PID:856
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
600B
MD50747d1f4c0cf402b5aaab5d8f6e1ca81
SHA15d4b58cae4fefafcaa6947d45c056ed3b0f5f1f3
SHA256215e303dc63ebd9a9bb5502b85173bdc3c655da39dbc98fc671ae2ec6e892366
SHA512db5a57e1c23181ee9b68ca14da36559d0b70634683b825154309b926caf96070540b5f6ceabca565035ff2d5e55e5f9128f88f278a916117172d3917ccc5690d
-
Filesize
996B
MD5e72ece3d792c217354fff5e64a7045d3
SHA1ba8e8bd5ffad3e82676f1d9c0c89e1ec8559cc59
SHA2566b1ab449ce751b9ec680489f73079693dbfb245f406d57afc9f80b35d9f9f70c
SHA5122e3fc6c006fcf1b862c227d21382ab65bd71c46cfb115aeaa2d820f5ec750ac453b91e81790917d4f0cc11bd406cd418cc5c05e179ff3127ca7f88ca7948b95e
-
Filesize
1KB
MD578acfb6e213565c0f240dde2b5421bd2
SHA1d6a789d6536aea19ad79d72cf6fcaa8bbd043424
SHA25636976bc3cc1578e68b133a08f8b3fa57fdb334ec0f277db074e09a8e543497b8
SHA51266ab470773c1f55550bbfa237433b751cea545fb188d0ff18449cd0980d602c5acabfcabb8ce23b2c22d0789a2205d88bc565480583fcd31208bdcda775b341c
-
Filesize
68KB
MD52c7c2d4e9c03a1818621def0e1281a81
SHA1c92b29a7f6e9998c7a86b9b57cff15f28647a127
SHA2569fb6cf502b6a872ed2e58666672db9fdc0eb57e6ff5a5677b6dbc8de42193f3e
SHA512431cadf9b1d4de1dd0c5efebd5bae2af2ac0f6c98a2d71a5f7bc72e2421ecf77d67616d805bb643680192de6c8921e894a48a538276492567524c4267a4e4a66
-
Filesize
53KB
MD568689b2e7472e2cfb3f39da8a59505d9
SHA15be15784ab1193dc13ac24ec1efcabded5fe2df4
SHA256f304eb2cf6479a4fb36fef81c6df4d0225e251002e8f06f26ee196210bf3d168
SHA512269999061cd54b23b92d385689682e687ae9030bc5d26d79dd5e99f72fa4b4eef41f5a7b555325bd558771db92e2feb8a67fb40c87223be9e23ccb498b3bbc88
-
Filesize
332KB
MD5b96dc0230580570446ab648e20a7e3b3
SHA127483df87ef7093d51062fb2d2fc9944f94c23fb
SHA2562c65220c1c3ec6cb3282759e1d583b598ad43bf09484239325ae06b961bf0af0
SHA512b8dd8743eb45f9dcc0d74b5cf450ef2950482e5c33dcdb5ab9494ad2e396d7ea5ebd80d477fca52a25a46cede6e2c31eb2647612090fda72d7e61e49913c042f
-
Filesize
136KB
MD51d0f81b6e185ec95e716d2a0b2ba69a1
SHA109399ffa69ae8bfd9794104bc4b7b4f481980e3a
SHA256abe89315434ce50001a90c9bdd662a0c42fa90d95acdf5baed5823d760e4f878
SHA5126c4ecc1346bfc9952d7a1a2cb30ed5076bec24db099bb3fe20a248b19f56c075ff592d03100a1a3660ad5f47dfaff6a64b6b2bebe1bcbc7ce747f968a4c7e6b1
-
Filesize
168KB
MD5234bf3937f8fe09351acc53c059b40d2
SHA1256f162b65eacc7a1fee35722fbfdbd55bba93c7
SHA25686c568452305c3943eb7d1530cef65c75f6fac39d178082783db8b12fc8eef2b
SHA5126c768729abebd0b9bde9712ee827262c433ac928bb638b9176ef7f4085c2d2b4fdfa3cacffdb7da477d23a1e0ce32e63cba2ab9ace1f45dfcc8109b2c68812b7
-
Filesize
24KB
MD59814ec05c8857737f599ba75b1610fb1
SHA1aa9d9b016c2feda03cf6ad1bbca332070eb9b295
SHA256a68f44fa166ade605dfd2e5827a8ca3fa21141eda423c096d1f41d9bf172e597
SHA512c9daf5d8015ab4d5e0c333b986e04a917a596aef6d61baf43f53e5da346e3e665cd16eb5da35726713689dca991a03fbfa137b7f3f879c77779a477a89a0268d
-
Filesize
332KB
MD5f79e8aa98ea718f891b40dd78b7174a5
SHA16cc62182c6e465390422b6ade4f6cd41566601c6
SHA256596e0ec2d4d252eee0b0776ffe3e2c63c43878b56d1b92dab5a75473376d197a
SHA51291a667608ea1a1848e9e68aa88386571552b81ff137015bc8ba581ab6806b9b9f6be34b1dbe3ae327401de45a6f44df93dd6abbfb3eff7336443f75a719cb0fd
-
Filesize
4KB
MD5ff7d5ec20bf73c02317e7a740fffe018
SHA1365ac8cfe5b939854cc1c341caf051bcc45f9372
SHA2561e230847d7034f5ab3bf010f569315e00673859af0574fc9f915636ed905779a
SHA51230854c0d703fd7c6cbc0769d9be4125baa2577ec529d5e48177a434685b66752fd79c50f0321324e23eeb985738f403347748afefae7d8a3bfad388a5b512a44
-
Filesize
5KB
MD53e7a118b119428247edfc5d5ef3761bc
SHA1140e4cb00107678160411f016c4c17611580a209
SHA25697c19f4103a16798202e50a501375d0bf3d7ec1bb654dda230337e85b01b1ec5
SHA512b0e27a4d7aa62f937f275b9f413f75857846ae670bf3aed6e55c1db865485fda89e33dcdffa02ae2ab25f48d5f63f869232f9e6d69f9cdc8a5c93f39de09a925