Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25/07/2024, 16:02
Static task
static1
Behavioral task
behavioral1
Sample
7046c23f48f52b97038e69e782044cbd_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
7046c23f48f52b97038e69e782044cbd_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
7046c23f48f52b97038e69e782044cbd_JaffaCakes118.exe
-
Size
484KB
-
MD5
7046c23f48f52b97038e69e782044cbd
-
SHA1
e3e20833e358a5db26d3393f29e3eb8665aea9aa
-
SHA256
5fad4bfd723fec95c1bf2427014bfff853d92aab283e8411af08a598a2e86590
-
SHA512
2694e9b94f99d0e350427fd89408aef3ebd4c4ff656669d7599aca491aaf6547f14da11593d4c6b4bfe9bf22a3ec29abb484891356f169e20cbc6a5aff0ac4ba
-
SSDEEP
12288:5P9GBWQch+L/ZgHP+v7xK0DmFwUfIp7JVyvWt1aBnSFAPHzeO:5PoBHch+uudKNffiv1aVSaPTeO
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" gkvuus.exe Set value (int) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" V6oUpCF0mC.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\Control Panel\International\Geo\Nation V6oUpCF0mC.exe Key value queried \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\Control Panel\International\Geo\Nation 7046c23f48f52b97038e69e782044cbd_JaffaCakes118.exe -
Executes dropped EXE 10 IoCs
pid Process 3440 V6oUpCF0mC.exe 2456 gkvuus.exe 4828 ayhost.exe 1872 ayhost.exe 3708 byhost.exe 872 byhost.exe 2548 cyhost.exe 3408 cyhost.exe 1436 cyhost.exe 4136 dyhost.exe -
resource yara_rule behavioral2/memory/1712-2-0x0000000000400000-0x00000000004BE000-memory.dmp upx behavioral2/memory/1712-4-0x0000000000400000-0x00000000004BE000-memory.dmp upx behavioral2/memory/1712-5-0x0000000000400000-0x00000000004BE000-memory.dmp upx behavioral2/memory/3408-80-0x0000000000400000-0x0000000000448000-memory.dmp upx behavioral2/memory/1712-87-0x0000000000400000-0x00000000004BE000-memory.dmp upx behavioral2/memory/1436-159-0x0000000000400000-0x0000000000448000-memory.dmp upx behavioral2/memory/2548-160-0x0000000000400000-0x0000000000448000-memory.dmp upx behavioral2/memory/2548-275-0x0000000000400000-0x0000000000448000-memory.dmp upx behavioral2/memory/1712-279-0x0000000000400000-0x00000000004BE000-memory.dmp upx -
Adds Run key to start application 2 TTPs 54 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gkvuus = "C:\\Users\\Admin\\gkvuus.exe /T" gkvuus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gkvuus = "C:\\Users\\Admin\\gkvuus.exe /N" gkvuus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gkvuus = "C:\\Users\\Admin\\gkvuus.exe /e" gkvuus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gkvuus = "C:\\Users\\Admin\\gkvuus.exe /p" gkvuus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gkvuus = "C:\\Users\\Admin\\gkvuus.exe /i" gkvuus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gkvuus = "C:\\Users\\Admin\\gkvuus.exe /u" gkvuus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gkvuus = "C:\\Users\\Admin\\gkvuus.exe /Z" gkvuus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gkvuus = "C:\\Users\\Admin\\gkvuus.exe /X" gkvuus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gkvuus = "C:\\Users\\Admin\\gkvuus.exe /z" gkvuus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gkvuus = "C:\\Users\\Admin\\gkvuus.exe /h" gkvuus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gkvuus = "C:\\Users\\Admin\\gkvuus.exe /L" gkvuus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gkvuus = "C:\\Users\\Admin\\gkvuus.exe /F" gkvuus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gkvuus = "C:\\Users\\Admin\\gkvuus.exe /o" V6oUpCF0mC.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gkvuus = "C:\\Users\\Admin\\gkvuus.exe /s" gkvuus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gkvuus = "C:\\Users\\Admin\\gkvuus.exe /k" gkvuus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gkvuus = "C:\\Users\\Admin\\gkvuus.exe /x" gkvuus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gkvuus = "C:\\Users\\Admin\\gkvuus.exe /O" gkvuus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gkvuus = "C:\\Users\\Admin\\gkvuus.exe /R" gkvuus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gkvuus = "C:\\Users\\Admin\\gkvuus.exe /l" gkvuus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gkvuus = "C:\\Users\\Admin\\gkvuus.exe /M" gkvuus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gkvuus = "C:\\Users\\Admin\\gkvuus.exe /E" gkvuus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gkvuus = "C:\\Users\\Admin\\gkvuus.exe /b" gkvuus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gkvuus = "C:\\Users\\Admin\\gkvuus.exe /K" gkvuus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gkvuus = "C:\\Users\\Admin\\gkvuus.exe /a" gkvuus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gkvuus = "C:\\Users\\Admin\\gkvuus.exe /C" gkvuus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gkvuus = "C:\\Users\\Admin\\gkvuus.exe /Y" gkvuus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gkvuus = "C:\\Users\\Admin\\gkvuus.exe /c" gkvuus.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Program Files (x86)\\Internet Explorer\\lvvm.exe" cyhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gkvuus = "C:\\Users\\Admin\\gkvuus.exe /j" gkvuus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gkvuus = "C:\\Users\\Admin\\gkvuus.exe /H" gkvuus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gkvuus = "C:\\Users\\Admin\\gkvuus.exe /W" gkvuus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gkvuus = "C:\\Users\\Admin\\gkvuus.exe /S" gkvuus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gkvuus = "C:\\Users\\Admin\\gkvuus.exe /I" gkvuus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gkvuus = "C:\\Users\\Admin\\gkvuus.exe /B" gkvuus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gkvuus = "C:\\Users\\Admin\\gkvuus.exe /q" gkvuus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gkvuus = "C:\\Users\\Admin\\gkvuus.exe /P" gkvuus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gkvuus = "C:\\Users\\Admin\\gkvuus.exe /Q" gkvuus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gkvuus = "C:\\Users\\Admin\\gkvuus.exe /J" gkvuus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gkvuus = "C:\\Users\\Admin\\gkvuus.exe /v" gkvuus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gkvuus = "C:\\Users\\Admin\\gkvuus.exe /A" gkvuus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gkvuus = "C:\\Users\\Admin\\gkvuus.exe /r" gkvuus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gkvuus = "C:\\Users\\Admin\\gkvuus.exe /y" gkvuus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gkvuus = "C:\\Users\\Admin\\gkvuus.exe /U" gkvuus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gkvuus = "C:\\Users\\Admin\\gkvuus.exe /f" gkvuus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gkvuus = "C:\\Users\\Admin\\gkvuus.exe /w" gkvuus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gkvuus = "C:\\Users\\Admin\\gkvuus.exe /g" gkvuus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gkvuus = "C:\\Users\\Admin\\gkvuus.exe /o" gkvuus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gkvuus = "C:\\Users\\Admin\\gkvuus.exe /d" gkvuus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gkvuus = "C:\\Users\\Admin\\gkvuus.exe /G" gkvuus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gkvuus = "C:\\Users\\Admin\\gkvuus.exe /t" gkvuus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gkvuus = "C:\\Users\\Admin\\gkvuus.exe /m" gkvuus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gkvuus = "C:\\Users\\Admin\\gkvuus.exe /D" gkvuus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gkvuus = "C:\\Users\\Admin\\gkvuus.exe /n" gkvuus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gkvuus = "C:\\Users\\Admin\\gkvuus.exe /V" gkvuus.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 2192 tasklist.exe 4172 tasklist.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2184 set thread context of 1712 2184 7046c23f48f52b97038e69e782044cbd_JaffaCakes118.exe 84 PID 4828 set thread context of 1872 4828 ayhost.exe 100 PID 3708 set thread context of 872 3708 byhost.exe 102 PID 872 set thread context of 4692 872 byhost.exe 103 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\Internet Explorer\lvvm.exe cyhost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2116 872 WerFault.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7046c23f48f52b97038e69e782044cbd_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language byhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language byhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dyhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7046c23f48f52b97038e69e782044cbd_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cyhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language V6oUpCF0mC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gkvuus.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ayhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3440 V6oUpCF0mC.exe 3440 V6oUpCF0mC.exe 3440 V6oUpCF0mC.exe 3440 V6oUpCF0mC.exe 1872 ayhost.exe 1872 ayhost.exe 2456 gkvuus.exe 2456 gkvuus.exe 2456 gkvuus.exe 2456 gkvuus.exe 2456 gkvuus.exe 2456 gkvuus.exe 1872 ayhost.exe 1872 ayhost.exe 2456 gkvuus.exe 2456 gkvuus.exe 2456 gkvuus.exe 2456 gkvuus.exe 2456 gkvuus.exe 2456 gkvuus.exe 2456 gkvuus.exe 2456 gkvuus.exe 1872 ayhost.exe 1872 ayhost.exe 1872 ayhost.exe 1872 ayhost.exe 1872 ayhost.exe 1872 ayhost.exe 2456 gkvuus.exe 2456 gkvuus.exe 2456 gkvuus.exe 2456 gkvuus.exe 2456 gkvuus.exe 2456 gkvuus.exe 1872 ayhost.exe 1872 ayhost.exe 2456 gkvuus.exe 2456 gkvuus.exe 1872 ayhost.exe 1872 ayhost.exe 2456 gkvuus.exe 2456 gkvuus.exe 1872 ayhost.exe 1872 ayhost.exe 2456 gkvuus.exe 2456 gkvuus.exe 2456 gkvuus.exe 2456 gkvuus.exe 1872 ayhost.exe 1872 ayhost.exe 2456 gkvuus.exe 2456 gkvuus.exe 1872 ayhost.exe 1872 ayhost.exe 2456 gkvuus.exe 2456 gkvuus.exe 1872 ayhost.exe 1872 ayhost.exe 1872 ayhost.exe 1872 ayhost.exe 1872 ayhost.exe 1872 ayhost.exe 2456 gkvuus.exe 2456 gkvuus.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2192 tasklist.exe Token: SeDebugPrivilege 4172 tasklist.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2184 7046c23f48f52b97038e69e782044cbd_JaffaCakes118.exe 1712 7046c23f48f52b97038e69e782044cbd_JaffaCakes118.exe 3440 V6oUpCF0mC.exe 2456 gkvuus.exe 4828 ayhost.exe 3708 byhost.exe 4136 dyhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2184 wrote to memory of 1712 2184 7046c23f48f52b97038e69e782044cbd_JaffaCakes118.exe 84 PID 2184 wrote to memory of 1712 2184 7046c23f48f52b97038e69e782044cbd_JaffaCakes118.exe 84 PID 2184 wrote to memory of 1712 2184 7046c23f48f52b97038e69e782044cbd_JaffaCakes118.exe 84 PID 2184 wrote to memory of 1712 2184 7046c23f48f52b97038e69e782044cbd_JaffaCakes118.exe 84 PID 2184 wrote to memory of 1712 2184 7046c23f48f52b97038e69e782044cbd_JaffaCakes118.exe 84 PID 2184 wrote to memory of 1712 2184 7046c23f48f52b97038e69e782044cbd_JaffaCakes118.exe 84 PID 2184 wrote to memory of 1712 2184 7046c23f48f52b97038e69e782044cbd_JaffaCakes118.exe 84 PID 2184 wrote to memory of 1712 2184 7046c23f48f52b97038e69e782044cbd_JaffaCakes118.exe 84 PID 1712 wrote to memory of 3440 1712 7046c23f48f52b97038e69e782044cbd_JaffaCakes118.exe 89 PID 1712 wrote to memory of 3440 1712 7046c23f48f52b97038e69e782044cbd_JaffaCakes118.exe 89 PID 1712 wrote to memory of 3440 1712 7046c23f48f52b97038e69e782044cbd_JaffaCakes118.exe 89 PID 3440 wrote to memory of 2456 3440 V6oUpCF0mC.exe 94 PID 3440 wrote to memory of 2456 3440 V6oUpCF0mC.exe 94 PID 3440 wrote to memory of 2456 3440 V6oUpCF0mC.exe 94 PID 3440 wrote to memory of 4436 3440 V6oUpCF0mC.exe 95 PID 3440 wrote to memory of 4436 3440 V6oUpCF0mC.exe 95 PID 3440 wrote to memory of 4436 3440 V6oUpCF0mC.exe 95 PID 4436 wrote to memory of 2192 4436 cmd.exe 98 PID 4436 wrote to memory of 2192 4436 cmd.exe 98 PID 4436 wrote to memory of 2192 4436 cmd.exe 98 PID 1712 wrote to memory of 4828 1712 7046c23f48f52b97038e69e782044cbd_JaffaCakes118.exe 99 PID 1712 wrote to memory of 4828 1712 7046c23f48f52b97038e69e782044cbd_JaffaCakes118.exe 99 PID 1712 wrote to memory of 4828 1712 7046c23f48f52b97038e69e782044cbd_JaffaCakes118.exe 99 PID 4828 wrote to memory of 1872 4828 ayhost.exe 100 PID 4828 wrote to memory of 1872 4828 ayhost.exe 100 PID 4828 wrote to memory of 1872 4828 ayhost.exe 100 PID 4828 wrote to memory of 1872 4828 ayhost.exe 100 PID 4828 wrote to memory of 1872 4828 ayhost.exe 100 PID 4828 wrote to memory of 1872 4828 ayhost.exe 100 PID 4828 wrote to memory of 1872 4828 ayhost.exe 100 PID 4828 wrote to memory of 1872 4828 ayhost.exe 100 PID 4828 wrote to memory of 1872 4828 ayhost.exe 100 PID 4828 wrote to memory of 1872 4828 ayhost.exe 100 PID 1712 wrote to memory of 3708 1712 7046c23f48f52b97038e69e782044cbd_JaffaCakes118.exe 101 PID 1712 wrote to memory of 3708 1712 7046c23f48f52b97038e69e782044cbd_JaffaCakes118.exe 101 PID 1712 wrote to memory of 3708 1712 7046c23f48f52b97038e69e782044cbd_JaffaCakes118.exe 101 PID 3708 wrote to memory of 872 3708 byhost.exe 102 PID 3708 wrote to memory of 872 3708 byhost.exe 102 PID 3708 wrote to memory of 872 3708 byhost.exe 102 PID 3708 wrote to memory of 872 3708 byhost.exe 102 PID 3708 wrote to memory of 872 3708 byhost.exe 102 PID 3708 wrote to memory of 872 3708 byhost.exe 102 PID 3708 wrote to memory of 872 3708 byhost.exe 102 PID 3708 wrote to memory of 872 3708 byhost.exe 102 PID 3708 wrote to memory of 872 3708 byhost.exe 102 PID 872 wrote to memory of 4692 872 byhost.exe 103 PID 872 wrote to memory of 4692 872 byhost.exe 103 PID 872 wrote to memory of 4692 872 byhost.exe 103 PID 1712 wrote to memory of 2548 1712 7046c23f48f52b97038e69e782044cbd_JaffaCakes118.exe 109 PID 1712 wrote to memory of 2548 1712 7046c23f48f52b97038e69e782044cbd_JaffaCakes118.exe 109 PID 1712 wrote to memory of 2548 1712 7046c23f48f52b97038e69e782044cbd_JaffaCakes118.exe 109 PID 2548 wrote to memory of 3408 2548 cyhost.exe 111 PID 2548 wrote to memory of 3408 2548 cyhost.exe 111 PID 2548 wrote to memory of 3408 2548 cyhost.exe 111 PID 2548 wrote to memory of 1436 2548 cyhost.exe 114 PID 2548 wrote to memory of 1436 2548 cyhost.exe 114 PID 2548 wrote to memory of 1436 2548 cyhost.exe 114 PID 1712 wrote to memory of 4136 1712 7046c23f48f52b97038e69e782044cbd_JaffaCakes118.exe 118 PID 1712 wrote to memory of 4136 1712 7046c23f48f52b97038e69e782044cbd_JaffaCakes118.exe 118 PID 1712 wrote to memory of 4136 1712 7046c23f48f52b97038e69e782044cbd_JaffaCakes118.exe 118 PID 1712 wrote to memory of 3936 1712 7046c23f48f52b97038e69e782044cbd_JaffaCakes118.exe 120 PID 1712 wrote to memory of 3936 1712 7046c23f48f52b97038e69e782044cbd_JaffaCakes118.exe 120 PID 1712 wrote to memory of 3936 1712 7046c23f48f52b97038e69e782044cbd_JaffaCakes118.exe 120 PID 3936 wrote to memory of 4172 3936 cmd.exe 122
Processes
-
C:\Users\Admin\AppData\Local\Temp\7046c23f48f52b97038e69e782044cbd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7046c23f48f52b97038e69e782044cbd_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\7046c23f48f52b97038e69e782044cbd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7046c23f48f52b97038e69e782044cbd_JaffaCakes118.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\V6oUpCF0mC.exeC:\Users\Admin\V6oUpCF0mC.exe3⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Users\Admin\gkvuus.exe"C:\Users\Admin\gkvuus.exe"4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2456
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del V6oUpCF0mC.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2192
-
-
-
-
C:\Users\Admin\ayhost.exeC:\Users\Admin\ayhost.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Users\Admin\ayhost.exe"C:\Users\Admin\ayhost.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1872
-
-
-
C:\Users\Admin\byhost.exeC:\Users\Admin\byhost.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Users\Admin\byhost.exe"C:\Users\Admin\byhost.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Windows\explorer.exe000000D0*5⤵PID:4692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 872 -s 2405⤵
- Program crash
PID:2116
-
-
-
-
C:\Users\Admin\cyhost.exeC:\Users\Admin\cyhost.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\cyhost.exeC:\Users\Admin\cyhost.exe startC:\Users\Admin\AppData\Roaming\conhost.exe%C:\Users\Admin\AppData\Roaming4⤵
- Executes dropped EXE
PID:3408
-
-
C:\Users\Admin\cyhost.exeC:\Users\Admin\cyhost.exe startC:\Users\Admin\AppData\Local\Temp\dwm.exe%C:\Users\Admin\AppData\Local\Temp4⤵
- Executes dropped EXE
PID:1436
-
-
-
C:\Users\Admin\dyhost.exeC:\Users\Admin\dyhost.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4136
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 7046c23f48f52b97038e69e782044cbd_JaffaCakes118.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4172
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 872 -ip 8721⤵PID:3952
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD5cc926a0b7ee0c7f33e6439184dacb0d2
SHA1cd8245f7b5c83e459e2a4cc4429f716d4157e200
SHA256e08f808245962bed91fd8413e803c7aae064d88ac3f1159ef55c90f3578957fe
SHA512b83123dba601772d64fd47398c1ed51dced0f229fd446b4add0de0e20b4284f9ecd1a0e7f8933c6ea7f819608d130ee7163ecc8e425a04b47bc1b17957aaa07f
-
Filesize
1KB
MD59dd436ed577c40b18e7a62c2936a5bd1
SHA17eedd25497f804f905937725b20b0f15e412371c
SHA256b3c63e6264d0ccd393d6a44d753f66ee71d9d218f3c0704f9f281b4c74dcf1e9
SHA512d8be1e258802a0aea44977f6a485a1a426a3653fdef924372c1a7cef2d332dd7ab067d466c187e731feb263ef9b79fc763e52c848ea28b8193793eac43910d43
-
Filesize
600B
MD517a04449231717d35625b2f7c8859bcc
SHA149aaee4e309fe75bc1b29ac1d7613b0201f45f32
SHA25696413b36a7f42fce7562a95aa0ac1e92e28da8e2c2e73dacb34db51f814d9206
SHA512d6adf8350180af695f92b4c1dd507b35d7a194724f65005732d9a2d124e324b8650376b6608d469341313f1176e5cc1517ec62413a4a2bd0f9ed4e5e6a7068e5
-
Filesize
332KB
MD5b96dc0230580570446ab648e20a7e3b3
SHA127483df87ef7093d51062fb2d2fc9944f94c23fb
SHA2562c65220c1c3ec6cb3282759e1d583b598ad43bf09484239325ae06b961bf0af0
SHA512b8dd8743eb45f9dcc0d74b5cf450ef2950482e5c33dcdb5ab9494ad2e396d7ea5ebd80d477fca52a25a46cede6e2c31eb2647612090fda72d7e61e49913c042f
-
Filesize
68KB
MD52c7c2d4e9c03a1818621def0e1281a81
SHA1c92b29a7f6e9998c7a86b9b57cff15f28647a127
SHA2569fb6cf502b6a872ed2e58666672db9fdc0eb57e6ff5a5677b6dbc8de42193f3e
SHA512431cadf9b1d4de1dd0c5efebd5bae2af2ac0f6c98a2d71a5f7bc72e2421ecf77d67616d805bb643680192de6c8921e894a48a538276492567524c4267a4e4a66
-
Filesize
136KB
MD51d0f81b6e185ec95e716d2a0b2ba69a1
SHA109399ffa69ae8bfd9794104bc4b7b4f481980e3a
SHA256abe89315434ce50001a90c9bdd662a0c42fa90d95acdf5baed5823d760e4f878
SHA5126c4ecc1346bfc9952d7a1a2cb30ed5076bec24db099bb3fe20a248b19f56c075ff592d03100a1a3660ad5f47dfaff6a64b6b2bebe1bcbc7ce747f968a4c7e6b1
-
Filesize
168KB
MD5234bf3937f8fe09351acc53c059b40d2
SHA1256f162b65eacc7a1fee35722fbfdbd55bba93c7
SHA25686c568452305c3943eb7d1530cef65c75f6fac39d178082783db8b12fc8eef2b
SHA5126c768729abebd0b9bde9712ee827262c433ac928bb638b9176ef7f4085c2d2b4fdfa3cacffdb7da477d23a1e0ce32e63cba2ab9ace1f45dfcc8109b2c68812b7
-
Filesize
24KB
MD59814ec05c8857737f599ba75b1610fb1
SHA1aa9d9b016c2feda03cf6ad1bbca332070eb9b295
SHA256a68f44fa166ade605dfd2e5827a8ca3fa21141eda423c096d1f41d9bf172e597
SHA512c9daf5d8015ab4d5e0c333b986e04a917a596aef6d61baf43f53e5da346e3e665cd16eb5da35726713689dca991a03fbfa137b7f3f879c77779a477a89a0268d
-
Filesize
332KB
MD57532644cf656c0ccc78f0219f47a6f34
SHA1761409907deada22ae35eac10ab6de17aa9e1868
SHA25651449a40730658ed36d47938afac16e8f24f71ae5ce56720b62252305c6da076
SHA51207c2c88f897596855994d4a67dcf4b75555c2b764f323a637aa2efa41ab9dca5be8dfed617621e696cd8ade267b1e5d6d8ac25a7f76a91f4194222c6c3e277ca