Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12-08-2024 01:09
Behavioral task
behavioral1
Sample
8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe
-
Size
19KB
-
MD5
8cb821933c226d587e5c2bde41fe79f7
-
SHA1
bf152a58902d7dbd908c49a3954c7f9412b3db71
-
SHA256
d4752ab6192adfaa398fc71e75bafbd4f478619c432593e6804a2f126392f89a
-
SHA512
f9d90a8c5117e8fac1ed7a3ef728c0f6cd60243e069133a432892526735f0d55509c360991add6493c4d4fd18ee2721c1f6c335814b0b9dabe818cb0e16e549f
-
SSDEEP
384:48cOMxhYHDloKmKEYFNBOW3PNsP3JO7vLbUtg2doCwwYxQWfjfA9O:zcOKarTZrVsPZCPUJoDwYxjfj
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" 8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe -
Executes dropped EXE 64 IoCs
pid Process 1320 lsass.exe 2932 lsass.exe 2980 lsass.exe 2220 lsass.exe 3052 lsass.exe 1212 lsass.exe 3032 lsass.exe 788 lsass.exe 3064 lsass.exe 2740 lsass.exe 2796 lsass.exe 2696 lsass.exe 2880 lsass.exe 2164 lsass.exe 2772 lsass.exe 2852 lsass.exe 2708 lsass.exe 2036 lsass.exe 2544 lsass.exe 2608 lsass.exe 2952 lsass.exe 676 lsass.exe 1468 lsass.exe 2832 lsass.exe 856 lsass.exe 2864 lsass.exe 2224 lsass.exe 2392 lsass.exe 3048 lsass.exe 2140 lsass.exe 1480 lsass.exe 1532 lsass.exe 1092 lsass.exe 2380 lsass.exe 636 lsass.exe 1288 lsass.exe 372 lsass.exe 1540 lsass.exe 2412 lsass.exe 2396 lsass.exe 1720 lsass.exe 968 lsass.exe 1648 lsass.exe 2248 lsass.exe 1536 lsass.exe 1340 lsass.exe 2876 lsass.exe 656 lsass.exe 888 lsass.exe 2844 lsass.exe 896 lsass.exe 2092 lsass.exe 3004 lsass.exe 2308 lsass.exe 1668 lsass.exe 2060 lsass.exe 2948 lsass.exe 2328 lsass.exe 3024 lsass.exe 3056 lsass.exe 2012 lsass.exe 2016 lsass.exe 3032 lsass.exe 484 lsass.exe -
resource yara_rule behavioral1/memory/2372-0-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/1320-9-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/files/0x000a00000001202c-8.dat upx behavioral1/memory/1320-11-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/2980-16-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/2932-15-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/2980-18-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/2220-21-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/3052-22-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/3052-25-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/1212-26-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/1212-29-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/3032-30-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/3032-32-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/788-36-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/3064-38-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/2372-37-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/3064-40-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/2740-46-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/2796-47-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/2796-50-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/2696-53-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/2880-54-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/2880-57-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/2164-60-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/2772-61-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/2772-64-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/2852-67-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/2708-70-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/2036-73-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/2544-74-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/2544-76-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/2608-78-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/2608-80-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/2952-81-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/2952-83-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/676-85-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/676-87-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/1468-91-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/2832-92-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/2832-95-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/856-98-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/2864-100-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/2224-102-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/2224-105-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/2392-107-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/3048-109-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/3048-112-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/2140-114-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/1480-117-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/2372-118-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/1532-120-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/1092-122-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/1092-125-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/2380-126-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/2380-128-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/636-131-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/1288-134-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/1540-138-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/372-137-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/1540-141-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/2412-144-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/2396-146-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/1720-150-0x0000000000400000-0x0000000000410000-memory.dmp upx -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\32103 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\27258 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\22146 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\21840 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\24923 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\14047 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\10523 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\24618 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\25232 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\5590 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\21711 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\29372 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\9725 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\17835 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\24307 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\8183 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\13694 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\11792 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\20428 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\5851 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\24789 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\23162 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\16067 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\5014 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\25581 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\10391 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\22765 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\21579 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\12018 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\15630 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\28007 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\18581 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\30908 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\31484 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\18405 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\27429 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\31833 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\16381 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\5898 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\6779 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\23247 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\7082 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\23250 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\17524 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\11352 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\9334 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\17438 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\30113 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\522 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\22407 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\31349 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\5061 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\31530 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\21879 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\15233 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\211 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\1758 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\9813 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\26245 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\16505 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\4224 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\3475 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\14041 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\7440 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\DNS 8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\DHCP = "1883876" 8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2372 wrote to memory of 1320 2372 8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe 30 PID 2372 wrote to memory of 1320 2372 8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe 30 PID 2372 wrote to memory of 1320 2372 8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe 30 PID 2372 wrote to memory of 1320 2372 8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe 30 PID 1320 wrote to memory of 2932 1320 lsass.exe 31 PID 1320 wrote to memory of 2932 1320 lsass.exe 31 PID 1320 wrote to memory of 2932 1320 lsass.exe 31 PID 1320 wrote to memory of 2932 1320 lsass.exe 31 PID 2932 wrote to memory of 2980 2932 lsass.exe 32 PID 2932 wrote to memory of 2980 2932 lsass.exe 32 PID 2932 wrote to memory of 2980 2932 lsass.exe 32 PID 2932 wrote to memory of 2980 2932 lsass.exe 32 PID 2980 wrote to memory of 2220 2980 lsass.exe 33 PID 2980 wrote to memory of 2220 2980 lsass.exe 33 PID 2980 wrote to memory of 2220 2980 lsass.exe 33 PID 2980 wrote to memory of 2220 2980 lsass.exe 33 PID 2220 wrote to memory of 3052 2220 lsass.exe 34 PID 2220 wrote to memory of 3052 2220 lsass.exe 34 PID 2220 wrote to memory of 3052 2220 lsass.exe 34 PID 2220 wrote to memory of 3052 2220 lsass.exe 34 PID 3052 wrote to memory of 1212 3052 lsass.exe 35 PID 3052 wrote to memory of 1212 3052 lsass.exe 35 PID 3052 wrote to memory of 1212 3052 lsass.exe 35 PID 3052 wrote to memory of 1212 3052 lsass.exe 35 PID 1212 wrote to memory of 3032 1212 lsass.exe 36 PID 1212 wrote to memory of 3032 1212 lsass.exe 36 PID 1212 wrote to memory of 3032 1212 lsass.exe 36 PID 1212 wrote to memory of 3032 1212 lsass.exe 36 PID 3032 wrote to memory of 788 3032 lsass.exe 37 PID 3032 wrote to memory of 788 3032 lsass.exe 37 PID 3032 wrote to memory of 788 3032 lsass.exe 37 PID 3032 wrote to memory of 788 3032 lsass.exe 37 PID 788 wrote to memory of 3064 788 lsass.exe 38 PID 788 wrote to memory of 3064 788 lsass.exe 38 PID 788 wrote to memory of 3064 788 lsass.exe 38 PID 788 wrote to memory of 3064 788 lsass.exe 38 PID 3064 wrote to memory of 2740 3064 lsass.exe 39 PID 3064 wrote to memory of 2740 3064 lsass.exe 39 PID 3064 wrote to memory of 2740 3064 lsass.exe 39 PID 3064 wrote to memory of 2740 3064 lsass.exe 39 PID 2740 wrote to memory of 2796 2740 lsass.exe 40 PID 2740 wrote to memory of 2796 2740 lsass.exe 40 PID 2740 wrote to memory of 2796 2740 lsass.exe 40 PID 2740 wrote to memory of 2796 2740 lsass.exe 40 PID 2796 wrote to memory of 2696 2796 lsass.exe 41 PID 2796 wrote to memory of 2696 2796 lsass.exe 41 PID 2796 wrote to memory of 2696 2796 lsass.exe 41 PID 2796 wrote to memory of 2696 2796 lsass.exe 41 PID 2696 wrote to memory of 2880 2696 lsass.exe 42 PID 2696 wrote to memory of 2880 2696 lsass.exe 42 PID 2696 wrote to memory of 2880 2696 lsass.exe 42 PID 2696 wrote to memory of 2880 2696 lsass.exe 42 PID 2880 wrote to memory of 2164 2880 lsass.exe 43 PID 2880 wrote to memory of 2164 2880 lsass.exe 43 PID 2880 wrote to memory of 2164 2880 lsass.exe 43 PID 2880 wrote to memory of 2164 2880 lsass.exe 43 PID 2164 wrote to memory of 2772 2164 lsass.exe 44 PID 2164 wrote to memory of 2772 2164 lsass.exe 44 PID 2164 wrote to memory of 2772 2164 lsass.exe 44 PID 2164 wrote to memory of 2772 2164 lsass.exe 44 PID 2772 wrote to memory of 2852 2772 lsass.exe 45 PID 2772 wrote to memory of 2852 2772 lsass.exe 45 PID 2772 wrote to memory of 2852 2772 lsass.exe 45 PID 2772 wrote to memory of 2852 2772 lsass.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe"1⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:2372 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1320 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2932 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2980 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2220 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3052 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1212 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3032 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe9⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:788 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3064 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe11⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2740 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2796 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2696 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe14⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2880 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2164 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2772 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe17⤵
- Executes dropped EXE
PID:2852 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe18⤵
- Executes dropped EXE
PID:2708 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe19⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2036 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe20⤵
- Executes dropped EXE
PID:2544 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe21⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2608 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe22⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2952 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe23⤵
- Executes dropped EXE
- Adds Run key to start application
PID:676 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe24⤵
- Executes dropped EXE
PID:1468 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe25⤵
- Executes dropped EXE
PID:2832 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe26⤵
- Executes dropped EXE
PID:856 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe27⤵
- Executes dropped EXE
PID:2864 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe28⤵
- Executes dropped EXE
PID:2224 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe29⤵
- Executes dropped EXE
PID:2392 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe30⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3048 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe31⤵
- Executes dropped EXE
PID:2140 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe32⤵
- Executes dropped EXE
PID:1480 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe33⤵
- Executes dropped EXE
PID:1532 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe34⤵
- Executes dropped EXE
PID:1092 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe35⤵
- Executes dropped EXE
PID:2380 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe36⤵
- Executes dropped EXE
PID:636 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe37⤵
- Executes dropped EXE
PID:1288 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe38⤵
- Executes dropped EXE
PID:372 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe39⤵
- Executes dropped EXE
PID:1540 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe40⤵
- Executes dropped EXE
PID:2412 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe41⤵
- Executes dropped EXE
PID:2396 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe42⤵
- Executes dropped EXE
PID:1720 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe43⤵
- Executes dropped EXE
PID:968 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe44⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1648 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe45⤵
- Executes dropped EXE
PID:2248 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe46⤵
- Executes dropped EXE
PID:1536 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe47⤵
- Executes dropped EXE
PID:1340 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe48⤵
- Executes dropped EXE
PID:2876 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe49⤵
- Executes dropped EXE
PID:656 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe50⤵
- Executes dropped EXE
PID:888 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe51⤵
- Executes dropped EXE
PID:2844 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe52⤵
- Executes dropped EXE
- Adds Run key to start application
PID:896 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe53⤵
- Executes dropped EXE
PID:2092 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe54⤵
- Executes dropped EXE
PID:3004 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe55⤵
- Executes dropped EXE
PID:2308 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe56⤵
- Executes dropped EXE
PID:1668 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe57⤵
- Executes dropped EXE
PID:2060 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe58⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2948 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe59⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2328 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe60⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3024 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe61⤵
- Executes dropped EXE
PID:3056 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe62⤵
- Executes dropped EXE
PID:2012 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe63⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2016 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe64⤵
- Executes dropped EXE
PID:3032 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe65⤵
- Executes dropped EXE
PID:484 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe66⤵PID:3064
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe67⤵PID:2776
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe68⤵PID:2744
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe69⤵
- Adds Run key to start application
PID:2548 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe70⤵
- Adds Run key to start application
PID:2704 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe71⤵PID:2880
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe72⤵PID:2164
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe73⤵PID:2732
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe74⤵PID:2680
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe75⤵PID:2588
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe76⤵PID:2540
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe77⤵PID:2552
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe78⤵PID:2620
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe79⤵PID:2608
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe80⤵PID:2952
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe81⤵PID:1400
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe82⤵PID:2848
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe83⤵PID:2612
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe84⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2860 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe85⤵PID:1800
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe86⤵PID:2864
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe87⤵PID:2400
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe88⤵PID:2232
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe89⤵PID:2320
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe90⤵
- System Location Discovery: System Language Discovery
PID:1808 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe91⤵PID:2140
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe92⤵PID:1480
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe93⤵PID:772
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe94⤵PID:1152
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe95⤵PID:2428
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe96⤵PID:616
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe97⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1592 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe98⤵PID:1880
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe99⤵PID:2452
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe100⤵PID:2436
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe101⤵PID:2412
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe102⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1708 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe103⤵PID:1716
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe104⤵
- System Location Discovery: System Language Discovery
PID:1524 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe105⤵PID:2024
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe106⤵PID:328
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe107⤵
- System Location Discovery: System Language Discovery
PID:1776 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe108⤵PID:2916
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe109⤵PID:2856
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe110⤵
- Adds Run key to start application
PID:2420 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe111⤵PID:2244
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe112⤵
- Adds Run key to start application
PID:320 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe113⤵
- Adds Run key to start application
PID:888 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe114⤵PID:2100
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe115⤵PID:896
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe116⤵
- System Location Discovery: System Language Discovery
PID:1496 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe117⤵PID:1580
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe118⤵
- Adds Run key to start application
PID:1308 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe119⤵PID:1668
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe120⤵
- Adds Run key to start application
PID:1100 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe121⤵PID:2324
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe122⤵
- Adds Run key to start application
PID:2980
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-