Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10/08/2024, 21:26
Static task
static1
Behavioral task
behavioral1
Sample
87bcb409b6c3e7c060354e479fdd3cab_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
87bcb409b6c3e7c060354e479fdd3cab_JaffaCakes118.exe
-
Size
857KB
-
MD5
87bcb409b6c3e7c060354e479fdd3cab
-
SHA1
193e15ec146e808ab5156952765b302ca99a7f97
-
SHA256
8397efdc04aead539d74e705f0dd47ddd5e26f03940446ad3fd62d6f7fcabdc5
-
SHA512
9b491a69b053f2b6a41b77f134a33bd423a543e13ac64a419bf7a40231b8aa33b574e344b14a187ebf8409dc7ae3102b0bd275a87be41be1a525755e41fb4714
-
SSDEEP
24576:7fcCIjsCJAd/QUnMaQ4Skool7J0798icV0/:7fcCUvQnF07T
Malware Config
Extracted
cybergate
2.6
windows7
djidane2008.no-ip.biz:81
***MUTEX***
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
5
-
ftp_password
downgradeur
-
ftp_port
21
-
ftp_server
pokemon2.solidwebhost.com
-
ftp_username
pokemon2
-
injected_process
explorer.exe
-
install_dir
windows
-
install_file
win32.exe
-
install_flag
true
-
keylogger_enable_ftp
true
-
message_box_caption
texto da mensagem
-
message_box_title
tÃtulo da mensagem
-
password
abcd1234
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
description pid Process procid_target PID 4876 created 1476 4876 WerFault.exe 97 -
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run fIl31.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\windows\\win32.exe" fIl31.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run fIl31.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\windows\\win32.exe" fIl31.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{10E0OBO6-5UX8-70E2-LT0B-TB0NQ1340IX4} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{10E0OBO6-5UX8-70E2-LT0B-TB0NQ1340IX4}\StubPath = "C:\\Windows\\windows\\win32.exe" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{10E0OBO6-5UX8-70E2-LT0B-TB0NQ1340IX4} fIl31.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{10E0OBO6-5UX8-70E2-LT0B-TB0NQ1340IX4}\StubPath = "C:\\Windows\\windows\\win32.exe Restart" fIl31.exe -
Executes dropped EXE 2 IoCs
pid Process 4348 fIl31.exe 1476 win32.exe -
resource yara_rule behavioral2/files/0x0008000000023482-11.dat upx behavioral2/memory/4348-12-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral2/memory/4348-17-0x0000000024010000-0x0000000024072000-memory.dmp upx behavioral2/memory/4348-77-0x0000000024080000-0x00000000240E2000-memory.dmp upx behavioral2/memory/2728-81-0x0000000024080000-0x00000000240E2000-memory.dmp upx behavioral2/memory/2728-82-0x0000000024080000-0x00000000240E2000-memory.dmp upx behavioral2/memory/4348-147-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral2/memory/1476-613-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral2/memory/2728-976-0x0000000024080000-0x00000000240E2000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\windows\\win32.exe" fIl31.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\windows\\win32.exe" fIl31.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\windows\win32.exe fIl31.exe File opened for modification C:\Windows\windows\win32.exe fIl31.exe File opened for modification C:\Windows\windows\win32.exe explorer.exe File opened for modification C:\Windows\windows\ explorer.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 468 1476 WerFault.exe 97 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fIl31.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language win32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WerFault.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4348 fIl31.exe 4348 fIl31.exe 4964 explorer.exe 4964 explorer.exe 4964 explorer.exe 4964 explorer.exe 4964 explorer.exe 4964 explorer.exe 4964 explorer.exe 4964 explorer.exe 4964 explorer.exe 4964 explorer.exe 468 WerFault.exe 468 WerFault.exe 4964 explorer.exe 4964 explorer.exe 4964 explorer.exe 4964 explorer.exe 4964 explorer.exe 4964 explorer.exe 4964 explorer.exe 4964 explorer.exe 4964 explorer.exe 4964 explorer.exe 4964 explorer.exe 4964 explorer.exe 4964 explorer.exe 4964 explorer.exe 4964 explorer.exe 4964 explorer.exe 4964 explorer.exe 4964 explorer.exe 4964 explorer.exe 4964 explorer.exe 4964 explorer.exe 4964 explorer.exe 4964 explorer.exe 4964 explorer.exe 4964 explorer.exe 4964 explorer.exe 4964 explorer.exe 4964 explorer.exe 4964 explorer.exe 4964 explorer.exe 4964 explorer.exe 4964 explorer.exe 4964 explorer.exe 4964 explorer.exe 4964 explorer.exe 4964 explorer.exe 4964 explorer.exe 4964 explorer.exe 4964 explorer.exe 4964 explorer.exe 4964 explorer.exe 4964 explorer.exe 4964 explorer.exe 4964 explorer.exe 4964 explorer.exe 4964 explorer.exe 4964 explorer.exe 4964 explorer.exe 4964 explorer.exe 4964 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4964 explorer.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4964 explorer.exe Token: SeDebugPrivilege 4964 explorer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4348 fIl31.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4884 wrote to memory of 4348 4884 87bcb409b6c3e7c060354e479fdd3cab_JaffaCakes118.exe 87 PID 4884 wrote to memory of 4348 4884 87bcb409b6c3e7c060354e479fdd3cab_JaffaCakes118.exe 87 PID 4884 wrote to memory of 4348 4884 87bcb409b6c3e7c060354e479fdd3cab_JaffaCakes118.exe 87 PID 4348 wrote to memory of 3496 4348 fIl31.exe 56 PID 4348 wrote to memory of 3496 4348 fIl31.exe 56 PID 4348 wrote to memory of 3496 4348 fIl31.exe 56 PID 4348 wrote to memory of 3496 4348 fIl31.exe 56 PID 4348 wrote to memory of 3496 4348 fIl31.exe 56 PID 4348 wrote to memory of 3496 4348 fIl31.exe 56 PID 4348 wrote to memory of 3496 4348 fIl31.exe 56 PID 4348 wrote to memory of 3496 4348 fIl31.exe 56 PID 4348 wrote to memory of 3496 4348 fIl31.exe 56 PID 4348 wrote to memory of 3496 4348 fIl31.exe 56 PID 4348 wrote to memory of 3496 4348 fIl31.exe 56 PID 4348 wrote to memory of 3496 4348 fIl31.exe 56 PID 4348 wrote to memory of 3496 4348 fIl31.exe 56 PID 4348 wrote to memory of 3496 4348 fIl31.exe 56 PID 4348 wrote to memory of 3496 4348 fIl31.exe 56 PID 4348 wrote to memory of 3496 4348 fIl31.exe 56 PID 4348 wrote to memory of 3496 4348 fIl31.exe 56 PID 4348 wrote to memory of 3496 4348 fIl31.exe 56 PID 4348 wrote to memory of 3496 4348 fIl31.exe 56 PID 4348 wrote to memory of 3496 4348 fIl31.exe 56 PID 4348 wrote to memory of 3496 4348 fIl31.exe 56 PID 4348 wrote to memory of 3496 4348 fIl31.exe 56 PID 4348 wrote to memory of 3496 4348 fIl31.exe 56 PID 4348 wrote to memory of 3496 4348 fIl31.exe 56 PID 4348 wrote to memory of 3496 4348 fIl31.exe 56 PID 4348 wrote to memory of 3496 4348 fIl31.exe 56 PID 4348 wrote to memory of 3496 4348 fIl31.exe 56 PID 4348 wrote to memory of 3496 4348 fIl31.exe 56 PID 4348 wrote to memory of 3496 4348 fIl31.exe 56 PID 4348 wrote to memory of 3496 4348 fIl31.exe 56 PID 4348 wrote to memory of 3496 4348 fIl31.exe 56 PID 4348 wrote to memory of 3496 4348 fIl31.exe 56 PID 4348 wrote to memory of 3496 4348 fIl31.exe 56 PID 4348 wrote to memory of 3496 4348 fIl31.exe 56 PID 4348 wrote to memory of 3496 4348 fIl31.exe 56 PID 4348 wrote to memory of 3496 4348 fIl31.exe 56 PID 4348 wrote to memory of 3496 4348 fIl31.exe 56 PID 4348 wrote to memory of 3496 4348 fIl31.exe 56 PID 4348 wrote to memory of 3496 4348 fIl31.exe 56 PID 4348 wrote to memory of 3496 4348 fIl31.exe 56 PID 4348 wrote to memory of 3496 4348 fIl31.exe 56 PID 4348 wrote to memory of 3496 4348 fIl31.exe 56 PID 4348 wrote to memory of 3496 4348 fIl31.exe 56 PID 4348 wrote to memory of 3496 4348 fIl31.exe 56 PID 4348 wrote to memory of 3496 4348 fIl31.exe 56 PID 4348 wrote to memory of 3496 4348 fIl31.exe 56 PID 4348 wrote to memory of 3496 4348 fIl31.exe 56 PID 4348 wrote to memory of 3496 4348 fIl31.exe 56 PID 4348 wrote to memory of 3496 4348 fIl31.exe 56 PID 4348 wrote to memory of 3496 4348 fIl31.exe 56 PID 4348 wrote to memory of 3496 4348 fIl31.exe 56 PID 4348 wrote to memory of 3496 4348 fIl31.exe 56 PID 4348 wrote to memory of 3496 4348 fIl31.exe 56 PID 4348 wrote to memory of 3496 4348 fIl31.exe 56 PID 4348 wrote to memory of 3496 4348 fIl31.exe 56 PID 4348 wrote to memory of 3496 4348 fIl31.exe 56 PID 4348 wrote to memory of 3496 4348 fIl31.exe 56 PID 4348 wrote to memory of 3496 4348 fIl31.exe 56 PID 4348 wrote to memory of 3496 4348 fIl31.exe 56 PID 4348 wrote to memory of 3496 4348 fIl31.exe 56 PID 4348 wrote to memory of 3496 4348 fIl31.exe 56
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:612
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"2⤵PID:784
-
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:316
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:684
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:780
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵PID:796
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding2⤵PID:2888
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:3816
-
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca2⤵PID:3920
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:3988
-
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca2⤵PID:4080
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:4180
-
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding2⤵PID:4456
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:1736
-
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca2⤵PID:4648
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:4292
-
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe2⤵PID:2364
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:1292
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca2⤵PID:3980
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:1352
-
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding2⤵PID:1464
-
-
C:\Windows\System32\mousocoreworker.exeC:\Windows\System32\mousocoreworker.exe -Embedding2⤵PID:3452
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca2⤵PID:1800
-
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.12⤵PID:1936
-
-
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exeC:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding2⤵PID:4968
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca2⤵PID:4104
-
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.12⤵PID:5108
-
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.12⤵PID:3968
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca2⤵PID:1256
-
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.12⤵PID:2788
-
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.12⤵PID:2996
-
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.12⤵PID:2676
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}2⤵PID:3392
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca2⤵PID:2432
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS -p1⤵PID:904
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:948
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:408
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p1⤵PID:1040
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:1048
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:1124
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1148
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵PID:3192
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1176
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1184
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1196
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1280
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1364
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:2648
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1376
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1432
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1616
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1632
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1640
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1712
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1744
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1772
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1816
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:1948
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1996
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:2008
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:1740
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:2056
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2132
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p1⤵PID:2196
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2252
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2348
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2416
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2424
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵PID:2516
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2600
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2636
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2652
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2684
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:3116
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵PID:3232
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:3416
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3496
-
C:\Users\Admin\AppData\Local\Temp\87bcb409b6c3e7c060354e479fdd3cab_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\87bcb409b6c3e7c060354e479fdd3cab_JaffaCakes118.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\fIl31.exeC:\Users\Admin\AppData\Local\Temp\\fIl31.exe3⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- System Location Discovery: System Language Discovery
PID:2728
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:4964 -
C:\Windows\windows\win32.exe"C:\Windows\windows\win32.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1476 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1476 -s 5766⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:468
-
-
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3596
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:2344
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:3908
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:4504
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:1664
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵PID:1588
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:3200
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc1⤵PID:1840
-
C:\Windows\System32\WaaSMedicAgent.exeC:\Windows\System32\WaaSMedicAgent.exe a9c9e96d9de55ee9268838563a2c94fb /fE5ENUGkUGyHK8eUvAuKg.0.1.0.0.01⤵PID:4524
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:1456
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵PID:4376
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k WerSvcGroup1⤵PID:4240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1476 -ip 14762⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- System Location Discovery: System Language Discovery
PID:4876
-
-
C:\Windows\servicing\TrustedInstaller.exeC:\Windows\servicing\TrustedInstaller.exe1⤵PID:3436
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc1⤵PID:1624
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD55c9f9d4a7ae41c19ddc6a913ad45ace4
SHA1aee08e70a10f669fa535830179b44660231f2725
SHA2562dcd88c37ff79324466f9051c6559cd0f102161285048bfaa736daf9bee474e2
SHA5124721c1bb63565b66dfb17473ea7feba263e4551c61ab9bbe2d69b9a1d49dbc98a035fdcadc26db0c62fcef77841662eed3ec486d96afd303eaecfd6ee8fb432c
-
Filesize
8B
MD5ea4dae81782465f3a0b3770c4ad37885
SHA1ae4f79705ec222cf32e8ec7ff00d0bf54f1bd0e3
SHA25661fe0ac557820d7eaea8cfa52d47648369c47023d4c9e082873653d28e316952
SHA512bca51e2d0a7ef0bfeed22ddf6d1c491108c860af2ec2da3f2cc6149369272180fd0d0a192b61f74f23d4a3a2a7592577e3f13adcc9802180010ac2ef460269ef
-
Filesize
8B
MD5b6811573cf6acbdbdd52f871dfd7a24d
SHA107ef54e9a34d4210d9dae175cda1d292b97ae221
SHA25676b2f32973674f92823ba893eae6dd62a0b5d8941f512668b6bf618cf9263db1
SHA512a0429eb236b1b7ada7cce202d114c02a377027deeff39122acf76426f6df2027b11734367ccda268377d6b1e77d6c16cc97d8830917ec7baf2a5ab5c27f4ebf5
-
Filesize
8B
MD5b7361b042083ac2155194025626e67ef
SHA195b8c6f958ea71fbc6c271dc4a76dbae7608c536
SHA25637e0038993022666fa495633c17f931ee412a6521cbd11288b7ba11fb5a28feb
SHA512be84070a035c86202eef63cf654465c1d21b82c94af7627b9e0f8ba3186ac704bb531ceb0fee1ffa784f80b47dcc2998c59cf8b9f538b6a3088eaee4f67472f9
-
Filesize
8B
MD5d570dfeb20e49917aa6b415f4d71304d
SHA190b09307cd23c4d28aefc25d4236a3314034daf9
SHA2568be108e7cbeb1bdc897a8996c6531da810b45a50dffccbd6d336812c94a83c99
SHA51214873bb1057f816693abcf63c2591853328883e0e9dc522436f8ee4fb98ccda578903d37ccfef22621b709352adca39caee55f1820ecbb0c41b58833f87e45e9
-
Filesize
284KB
MD5dabcb4a33b995d02ba3bfa43bc0a57d5
SHA180800790c04f06833d98cace18d0cb19d1cd118e
SHA256806b0d6b86ec37d510eaa570eaf55a60fcf50c96e6a9a09f855e2ae0e962d22a
SHA51288c05901262666ba59507af2ec6e1fb164b606f94ebdb06de1f00e0e5865247fac8a933d79e0169d37e5f12c6f34246b49149caa176da8894977864417e4fea6
-
Filesize
15B
MD5e21bd9604efe8ee9b59dc7605b927a2a
SHA13240ecc5ee459214344a1baac5c2a74046491104
SHA25651a3fe220229aa3fdddc909e20a4b107e7497320a00792a280a03389f2eacb46
SHA51242052ad5744ad76494bfa71d78578e545a3b39bfed4c4232592987bd28064b6366a423084f1193d137493c9b13d9ae1faac4cf9cc75eb715542fa56e13ca1493