Analysis
-
max time kernel
51s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
28/07/2024, 00:51
Static task
static1
Behavioral task
behavioral1
Sample
041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe
-
Size
450KB
-
MD5
041ef0cd8731e7e9bd0c35f6e16d2807
-
SHA1
b506a49f244359bf5062665271d773bd595c4570
-
SHA256
f84e452ab2a7a2eab3b47a74fcf7e88f3a6f2a7cc8b0399da062adbe92497d78
-
SHA512
affe94963e905441a002e97edb39ba64d304e8e0504d67b155e7fbdc1e4e1ab8c5041145a2970c88366754fe062ce70486e42d360c4aa51d99f506a6b8159df9
-
SSDEEP
6144:8EicAkEicAKKJNfTxo2i4Qiza4O7N68XEicAkEicAKKJNfTxo2i4Qiza4O7N686:gc7ctKJ16Gna4Y6Uc7ctKJ16Gna4Y6h
Malware Config
Signatures
-
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe\debugger = "ntsd -d" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\debugger = "ntsd -d" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ZhuDongFangYu.exe reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ZhuDongFangYu.exe\debugger = "ntsd -d" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe reg.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe " cmd.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification \??\c:\Windows\SysWOW64\regedit.exe 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification \??\c:\Program Files\VideoLAN\VLC\uninstall.exe 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmplayer.exe 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe File opened for modification \??\c:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateBroker.exe 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\WORDICON.EXE 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe File opened for modification \??\c:\Program Files\Java\jdk1.7.0_80\bin\jstack.exe 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe File opened for modification \??\c:\Program Files\Java\jre7\bin\unpack200.exe 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe File opened for modification \??\c:\Program Files (x86)\Adobe\Reader 9.0\Reader\reader_sl.exe 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe File opened for modification \??\c:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\Setup.exe 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe File opened for modification \??\c:\Program Files (x86)\Common Files\microsoft shared\VSTA\8.0\x86\vsta_ep32.exe 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe File opened for modification \??\c:\Program Files\Java\jre7\bin\javacpl.exe 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\crashreporter.exe 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe File opened for modification \??\c:\Program Files\Google\Chrome\Application\chrome.exe 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe File opened for modification \??\c:\Program Files\Java\jre7\bin\jp2launcher.exe 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\maintenanceservice.exe 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe File opened for modification \??\c:\Program Files\Windows Mail\wab.exe 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe File opened for modification \??\c:\Program Files (x86)\Google\Update\Install\{95CA7C0F-EA8C-4FCD-8952-D8E66C033579}\chrome_installer.exe 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe File opened for modification \??\c:\Program Files (x86)\Windows Media Player\setup_wm.exe 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe File opened for modification \??\c:\Program Files (x86)\Windows Media Player\wmplayer.exe 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe File opened for modification \??\c:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\106.0.5249.119\chrome_installer.exe 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\MSTORE.EXE 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe File opened for modification \??\c:\Program Files\Java\jdk1.7.0_80\bin\serialver.exe 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe File opened for modification \??\c:\Program Files\Java\jdk1.7.0_80\jre\bin\rmiregistry.exe 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe File opened for modification \??\c:\Program Files\Java\jdk1.7.0_80\jre\bin\servertool.exe 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe File opened for modification \??\c:\Program Files\Java\jre7\bin\policytool.exe 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe File opened for modification \??\c:\Program Files\Java\jre7\bin\rmid.exe 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe File opened for modification \??\c:\Program Files (x86)\Common Files\Adobe\Updater6\AdobeUpdaterInstallMgr.exe 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe File opened for modification \??\c:\Program Files\Java\jdk1.7.0_80\bin\rmiregistry.exe 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe File opened for modification \??\c:\Program Files\Java\jdk1.7.0_80\jre\bin\java-rmi.exe 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe File opened for modification \??\c:\Program Files (x86)\Adobe\Reader 9.0\Reader\AdobeCollabSync.exe 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe File opened for modification \??\c:\Program Files (x86)\Windows Media Player\wmpshare.exe 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe File opened for modification \??\c:\Program Files\Common Files\Microsoft Shared\MSInfo\msinfo32.exe 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe File opened for modification \??\c:\Program Files\Java\jdk1.7.0_80\bin\keytool.exe 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe File opened for modification \??\c:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32Info.exe 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe File opened for modification \??\c:\Program Files\DVD Maker\DVDMaker.exe 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe File opened for modification \??\c:\Program Files\Java\jdk1.7.0_80\bin\java.exe 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe File opened for modification \??\c:\Program Files\Java\jdk1.7.0_80\jre\bin\keytool.exe 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe File opened for modification \??\c:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\nbexec64.exe 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe File opened for modification \??\c:\Program Files\Windows NT\Accessories\wordpad.exe 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe File opened for modification \??\c:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Oarpmany.exe 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe File opened for modification \??\c:\Program Files (x86)\Common Files\microsoft shared\EQUATION\EQNEDT32.EXE 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe File opened for modification \??\c:\Program Files (x86)\Windows Media Player\wmpenc.exe 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe File opened for modification \??\c:\Program Files\Java\jdk1.7.0_80\bin\jstat.exe 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe File opened for modification \??\c:\Program Files\Java\jdk1.7.0_80\bin\policytool.exe 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe File opened for modification \??\c:\Program Files\Java\jdk1.7.0_80\jre\bin\javaw.exe 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe File opened for modification \??\c:\Program Files\Java\jre7\bin\javaws.exe 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe File opened for modification \??\c:\Program Files\Windows Journal\PDIALOG.exe 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe File opened for modification \??\c:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Adobe AIR Updater.exe 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe File opened for modification \??\c:\Program Files\Common Files\Microsoft Shared\ink\FlickLearningWizard.exe 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmpnscfg.exe 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe File opened for modification \??\c:\Program Files\Java\jdk1.7.0_80\bin\tnameserv.exe 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\default-browser-agent.exe 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe File opened for modification \??\c:\Program Files\Java\jdk1.7.0_80\bin\jdb.exe 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe File opened for modification \??\c:\Program Files\Java\jdk1.7.0_80\bin\jstatd.exe 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe File opened for modification \??\c:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\MSOICONS.EXE 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe File opened for modification \??\c:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateSetup.exe 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe File opened for modification \??\c:\Program Files\Java\jdk1.7.0_80\bin\jarsigner.exe 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe File opened for modification \??\c:\Program Files\Java\jdk1.7.0_80\bin\javap.exe 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe File opened for modification \??\c:\Program Files\Java\jdk1.7.0_80\bin\jvisualvm.exe 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe File opened for modification \??\c:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdate.exe 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe File opened for modification \??\c:\Program Files\Common Files\Microsoft Shared\ink\TabTip.exe 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe File opened for modification \??\c:\Program Files\Common Files\Microsoft Shared\VSTO\10.0\VSTOInstaller.exe 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe File opened for modification \??\c:\Program Files\Java\jdk1.7.0_80\bin\unpack200.exe 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe File opened for modification \??\c:\Program Files\Java\jre7\bin\tnameserv.exe 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File opened for modification \??\c:\Windows\hh.exe 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe File opened for modification \??\c:\Windows\winhlp32.exe 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe File opened for modification \??\c:\Windows\write.exe 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe File opened for modification \??\c:\Windows\Boot\PCAT\memtest.exe 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe File opened for modification \??\c:\Windows\bfsvc.exe 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe File opened for modification \??\c:\Windows\explorer.exe 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe File opened for modification \??\c:\Windows\notepad.exe 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe File opened for modification \??\c:\Windows\splwow64.exe 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe File opened for modification \??\c:\Windows\twunk_16.exe 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe File opened for modification \??\c:\Windows\twunk_32.exe 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe File opened for modification \??\c:\Windows\fveupdate.exe 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe File opened for modification \??\c:\Windows\HelpPane.exe 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe -
Modifies registry class 14 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\zipfile\Shell\Open cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.txt cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\jpgfile cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe " cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\zipfile cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.txt \ = " exefile" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\jpgfile\Shell\Open cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\zipfile\Shell cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\zipfile\Shell\Open\Command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe " cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\jpgfile\Shell\Open\Command cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\jpgfile\Shell\Open\Command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe " cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe " cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\zipfile\Shell\Open\Command cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\jpgfile\Shell cmd.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2748 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2748 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 2748 wrote to memory of 2648 2748 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe 30 PID 2748 wrote to memory of 2648 2748 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe 30 PID 2748 wrote to memory of 2648 2748 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe 30 PID 2748 wrote to memory of 2648 2748 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe 30 PID 2748 wrote to memory of 2236 2748 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe 32 PID 2748 wrote to memory of 2236 2748 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe 32 PID 2748 wrote to memory of 2236 2748 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe 32 PID 2748 wrote to memory of 2236 2748 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe 32 PID 2748 wrote to memory of 1892 2748 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe 33 PID 2748 wrote to memory of 1892 2748 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe 33 PID 2748 wrote to memory of 1892 2748 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe 33 PID 2748 wrote to memory of 1892 2748 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe 33 PID 2748 wrote to memory of 1656 2748 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe 34 PID 2748 wrote to memory of 1656 2748 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe 34 PID 2748 wrote to memory of 1656 2748 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe 34 PID 2748 wrote to memory of 1656 2748 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe 34 PID 2748 wrote to memory of 1896 2748 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe 35 PID 2748 wrote to memory of 1896 2748 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe 35 PID 2748 wrote to memory of 1896 2748 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe 35 PID 2748 wrote to memory of 1896 2748 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe 35 PID 2748 wrote to memory of 1108 2748 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe 37 PID 2748 wrote to memory of 1108 2748 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe 37 PID 2748 wrote to memory of 1108 2748 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe 37 PID 2748 wrote to memory of 1108 2748 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe 37 PID 2748 wrote to memory of 2000 2748 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe 38 PID 2748 wrote to memory of 2000 2748 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe 38 PID 2748 wrote to memory of 2000 2748 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe 38 PID 2748 wrote to memory of 2000 2748 041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe 38 PID 2236 wrote to memory of 3044 2236 cmd.exe 44 PID 2236 wrote to memory of 3044 2236 cmd.exe 44 PID 2236 wrote to memory of 3044 2236 cmd.exe 44 PID 2236 wrote to memory of 3044 2236 cmd.exe 44 PID 2236 wrote to memory of 3036 2236 cmd.exe 45 PID 2236 wrote to memory of 3036 2236 cmd.exe 45 PID 2236 wrote to memory of 3036 2236 cmd.exe 45 PID 2236 wrote to memory of 3036 2236 cmd.exe 45 PID 2236 wrote to memory of 2920 2236 cmd.exe 46 PID 2236 wrote to memory of 2920 2236 cmd.exe 46 PID 2236 wrote to memory of 2920 2236 cmd.exe 46 PID 2236 wrote to memory of 2920 2236 cmd.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\cmd.execmd.exe2⤵
- System Location Discovery: System Language Discovery
PID:2648
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\123.bat2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\reg.exereg add "hklm\software\microsoft\windows nt\currentversion\Image File Execution Options\ZhuDongFangYu.exe" /v debugger /t reg_sz /d "ntsd -d" /f3⤵
- Event Triggered Execution: Image File Execution Options Injection
- System Location Discovery: System Language Discovery
PID:3044
-
-
C:\Windows\SysWOW64\reg.exereg add "hklm\software\microsoft\windows nt\currentversion\Image File Execution Options\360tray.exe" /v debugger /t reg_sz /d "ntsd -d" /f3⤵
- Event Triggered Execution: Image File Execution Options Injection
- System Location Discovery: System Language Discovery
PID:3036
-
-
C:\Windows\SysWOW64\reg.exereg add "hklm\software\microsoft\windows nt\currentversion\Image File Execution Options\taskmgr.exe" /v debugger /t reg_sz /d "ntsd -d" /f3⤵
- Event Triggered Execution: Image File Execution Options Injection
- System Location Discovery: System Language Discovery
PID:2920
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c assoc .txt = exefile2⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1892
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ftype comfile=C:\Users\Admin\AppData\Local\Temp\041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe2⤵
- Modifies system executable filetype association
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1656
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ftype zipfile=C:\Users\Admin\AppData\Local\Temp\041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe2⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1896
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ftype jpgfile=C:\Users\Admin\AppData\Local\Temp\041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe2⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1108
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ftype txtfile=C:\Users\Admin\AppData\Local\Temp\041ef0cd8731e7e9bd0c35f6e16d2807_JaffaCakes118.exe2⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2000
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
443B
MD570170ba16a737a438223b88279dc6c85
SHA1cc066efa0fca9bc9f44013660dea6b28ddfd6a24
SHA256d3674f4b34a8ca8167160519aa5c66b6024eb09f4cb0c9278bc44370b0efec6a
SHA51237cc8c954544374d0a1ca4d012c9bd0b47781bc9bb8d0c15a8a95b9934893db3bedee867b984c20edabe54c39574abf7250de433aade6c0d544b8dd2c972c6da
-
Filesize
450KB
MD57f008c8037624750bf34439dd2b2c183
SHA15ef8931c303177fcf0af98e340caa12e8e3653d3
SHA25699b807834d57b608fb61388eb310af6053fe03ecc2d6dffc9d4c1cd176903efd
SHA512e72815103a9956a139dafc74cbd27745d9437c4bab8891ce1056bc6d9cfe291f2f8b9084faf3f01e45785dba93a43fbead4236cc335e76349df2ad6d33b48147