Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/08/2024, 01:09
Behavioral task
behavioral1
Sample
8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe
-
Size
19KB
-
MD5
8cb821933c226d587e5c2bde41fe79f7
-
SHA1
bf152a58902d7dbd908c49a3954c7f9412b3db71
-
SHA256
d4752ab6192adfaa398fc71e75bafbd4f478619c432593e6804a2f126392f89a
-
SHA512
f9d90a8c5117e8fac1ed7a3ef728c0f6cd60243e069133a432892526735f0d55509c360991add6493c4d4fd18ee2721c1f6c335814b0b9dabe818cb0e16e549f
-
SSDEEP
384:48cOMxhYHDloKmKEYFNBOW3PNsP3JO7vLbUtg2doCwwYxQWfjfA9O:zcOKarTZrVsPZCPUJoDwYxjfj
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" 8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe -
Executes dropped EXE 64 IoCs
pid Process 4320 lsass.exe 3380 lsass.exe 2936 lsass.exe 4340 lsass.exe 2096 lsass.exe 3148 lsass.exe 3184 lsass.exe 3964 lsass.exe 4516 lsass.exe 3972 lsass.exe 4576 lsass.exe 3264 lsass.exe 2148 lsass.exe 1096 lsass.exe 4908 lsass.exe 4020 lsass.exe 392 lsass.exe 3732 lsass.exe 1192 lsass.exe 2348 lsass.exe 532 lsass.exe 4604 lsass.exe 3032 lsass.exe 4480 lsass.exe 4920 lsass.exe 3800 lsass.exe 2612 lsass.exe 4284 lsass.exe 776 lsass.exe 4444 lsass.exe 60 lsass.exe 2168 lsass.exe 4040 lsass.exe 4700 lsass.exe 1676 lsass.exe 2308 lsass.exe 1520 lsass.exe 964 lsass.exe 3880 lsass.exe 828 lsass.exe 3936 lsass.exe 2972 lsass.exe 2824 lsass.exe 3980 lsass.exe 4576 lsass.exe 2196 lsass.exe 3128 lsass.exe 4404 lsass.exe 864 lsass.exe 2968 lsass.exe 5024 lsass.exe 4628 lsass.exe 2224 lsass.exe 1948 lsass.exe 660 lsass.exe 2992 lsass.exe 1456 lsass.exe 4972 lsass.exe 3628 lsass.exe 4272 lsass.exe 4360 lsass.exe 1068 lsass.exe 60 lsass.exe 4544 lsass.exe -
resource yara_rule behavioral2/memory/4172-0-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/files/0x0009000000023424-3.dat upx behavioral2/memory/4320-5-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/4320-8-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/3380-9-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/3380-11-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/2936-12-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/2936-15-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/4340-17-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/2096-20-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/3148-23-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/3184-27-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/3964-30-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/4516-32-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/4172-34-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/3972-37-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/4576-40-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/3264-43-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/2148-44-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/2148-47-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/1096-50-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/4908-53-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/4020-54-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/4020-57-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/392-59-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/3732-60-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/3732-63-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/1192-65-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/2348-69-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/532-71-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/4604-74-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/3032-78-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/4480-80-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/4920-83-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/3800-86-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/2612-89-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/4284-92-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/776-95-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/4444-96-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/4444-97-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/60-100-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/4172-99-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/60-103-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/2168-104-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/2168-107-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/4040-108-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/4040-111-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/4700-112-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/4700-115-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/1676-117-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/2308-119-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/2308-121-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/964-126-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/1520-125-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/964-128-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/3880-131-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/828-133-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/828-136-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/3936-137-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/3936-140-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/2972-142-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/2824-144-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/2824-147-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/3980-148-0x0000000000400000-0x0000000000410000-memory.dmp upx -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\4750 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\7841 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\25323 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\3255 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\5862 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\265 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\2157 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\12249 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\31362 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\15239 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\19998 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\4621 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\2333 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\7831 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\30204 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\25284 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\19949 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\13524 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\24654 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\30074 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\16285 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\13202 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\30473 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\25934 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\25890 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\7536 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\15938 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\13862 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\14052 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\32588 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\19244 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\4053 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\2115 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\11528 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\4089 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\18716 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\25678 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\1180 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\12235 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\2154 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\23693 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\2074 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\20563 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\10699 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\8106 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\16067 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\15404 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\3131 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\8365 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\15151 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\26418 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\16557 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\23685 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\16563 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\14837 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\19065 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\27839 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\13166 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\8015 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\28453 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\8048 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\9031 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\21716 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\4937 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe" lsass.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Internet Explorer\Main\DHCP = "1631340" 8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Internet Explorer\Main\DNS 8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4172 wrote to memory of 4320 4172 8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe 85 PID 4172 wrote to memory of 4320 4172 8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe 85 PID 4172 wrote to memory of 4320 4172 8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe 85 PID 4320 wrote to memory of 3380 4320 lsass.exe 88 PID 4320 wrote to memory of 3380 4320 lsass.exe 88 PID 4320 wrote to memory of 3380 4320 lsass.exe 88 PID 3380 wrote to memory of 2936 3380 lsass.exe 89 PID 3380 wrote to memory of 2936 3380 lsass.exe 89 PID 3380 wrote to memory of 2936 3380 lsass.exe 89 PID 2936 wrote to memory of 4340 2936 lsass.exe 90 PID 2936 wrote to memory of 4340 2936 lsass.exe 90 PID 2936 wrote to memory of 4340 2936 lsass.exe 90 PID 4340 wrote to memory of 2096 4340 lsass.exe 91 PID 4340 wrote to memory of 2096 4340 lsass.exe 91 PID 4340 wrote to memory of 2096 4340 lsass.exe 91 PID 2096 wrote to memory of 3148 2096 lsass.exe 92 PID 2096 wrote to memory of 3148 2096 lsass.exe 92 PID 2096 wrote to memory of 3148 2096 lsass.exe 92 PID 3148 wrote to memory of 3184 3148 lsass.exe 93 PID 3148 wrote to memory of 3184 3148 lsass.exe 93 PID 3148 wrote to memory of 3184 3148 lsass.exe 93 PID 3184 wrote to memory of 3964 3184 lsass.exe 94 PID 3184 wrote to memory of 3964 3184 lsass.exe 94 PID 3184 wrote to memory of 3964 3184 lsass.exe 94 PID 3964 wrote to memory of 4516 3964 lsass.exe 95 PID 3964 wrote to memory of 4516 3964 lsass.exe 95 PID 3964 wrote to memory of 4516 3964 lsass.exe 95 PID 4516 wrote to memory of 3972 4516 lsass.exe 98 PID 4516 wrote to memory of 3972 4516 lsass.exe 98 PID 4516 wrote to memory of 3972 4516 lsass.exe 98 PID 3972 wrote to memory of 4576 3972 lsass.exe 99 PID 3972 wrote to memory of 4576 3972 lsass.exe 99 PID 3972 wrote to memory of 4576 3972 lsass.exe 99 PID 4576 wrote to memory of 3264 4576 lsass.exe 100 PID 4576 wrote to memory of 3264 4576 lsass.exe 100 PID 4576 wrote to memory of 3264 4576 lsass.exe 100 PID 3264 wrote to memory of 2148 3264 lsass.exe 102 PID 3264 wrote to memory of 2148 3264 lsass.exe 102 PID 3264 wrote to memory of 2148 3264 lsass.exe 102 PID 2148 wrote to memory of 1096 2148 lsass.exe 104 PID 2148 wrote to memory of 1096 2148 lsass.exe 104 PID 2148 wrote to memory of 1096 2148 lsass.exe 104 PID 1096 wrote to memory of 4908 1096 lsass.exe 105 PID 1096 wrote to memory of 4908 1096 lsass.exe 105 PID 1096 wrote to memory of 4908 1096 lsass.exe 105 PID 4908 wrote to memory of 4020 4908 lsass.exe 106 PID 4908 wrote to memory of 4020 4908 lsass.exe 106 PID 4908 wrote to memory of 4020 4908 lsass.exe 106 PID 4020 wrote to memory of 392 4020 lsass.exe 107 PID 4020 wrote to memory of 392 4020 lsass.exe 107 PID 4020 wrote to memory of 392 4020 lsass.exe 107 PID 392 wrote to memory of 3732 392 lsass.exe 108 PID 392 wrote to memory of 3732 392 lsass.exe 108 PID 392 wrote to memory of 3732 392 lsass.exe 108 PID 3732 wrote to memory of 1192 3732 lsass.exe 109 PID 3732 wrote to memory of 1192 3732 lsass.exe 109 PID 3732 wrote to memory of 1192 3732 lsass.exe 109 PID 1192 wrote to memory of 2348 1192 lsass.exe 110 PID 1192 wrote to memory of 2348 1192 lsass.exe 110 PID 1192 wrote to memory of 2348 1192 lsass.exe 110 PID 2348 wrote to memory of 532 2348 lsass.exe 111 PID 2348 wrote to memory of 532 2348 lsass.exe 111 PID 2348 wrote to memory of 532 2348 lsass.exe 111 PID 532 wrote to memory of 4604 532 lsass.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe"1⤵
- Modifies firewall policy service
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:4172 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4320 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3380 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2936 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4340 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2096 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3148 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe8⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3184 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3964 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4516 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe11⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3972 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4576 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3264 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2148 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1096 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4908 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4020 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe18⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:392 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe19⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3732 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1192 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2348 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:532 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe23⤵
- Executes dropped EXE
PID:4604 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe24⤵
- Executes dropped EXE
PID:3032 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe25⤵
- Executes dropped EXE
PID:4480 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe26⤵
- Executes dropped EXE
PID:4920 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe27⤵
- Executes dropped EXE
PID:3800 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe28⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2612 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe29⤵
- Executes dropped EXE
PID:4284 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe30⤵
- Executes dropped EXE
PID:776 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe31⤵
- Executes dropped EXE
PID:4444 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe32⤵
- Executes dropped EXE
PID:60 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe33⤵
- Executes dropped EXE
PID:2168 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe34⤵
- Executes dropped EXE
PID:4040 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe35⤵
- Executes dropped EXE
PID:4700 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe36⤵
- Executes dropped EXE
PID:1676 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe37⤵
- Executes dropped EXE
PID:2308 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe38⤵
- Executes dropped EXE
PID:1520 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe39⤵
- Executes dropped EXE
PID:964 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe40⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3880 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe41⤵
- Executes dropped EXE
PID:828 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe42⤵
- Executes dropped EXE
PID:3936 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe43⤵
- Executes dropped EXE
PID:2972 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe44⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2824 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe45⤵
- Executes dropped EXE
PID:3980 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe46⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4576 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe47⤵
- Executes dropped EXE
PID:2196 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe48⤵
- Executes dropped EXE
PID:3128 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe49⤵
- Executes dropped EXE
PID:4404 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe50⤵
- Executes dropped EXE
PID:864 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe51⤵
- Executes dropped EXE
PID:2968 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe52⤵
- Executes dropped EXE
PID:5024 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe53⤵
- Executes dropped EXE
PID:4628 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe54⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2224 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe55⤵
- Executes dropped EXE
PID:1948 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe56⤵
- Executes dropped EXE
- Adds Run key to start application
PID:660 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe57⤵
- Executes dropped EXE
PID:2992 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe58⤵
- Executes dropped EXE
PID:1456 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe59⤵
- Executes dropped EXE
PID:4972 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe60⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3628 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe61⤵
- Executes dropped EXE
PID:4272 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe62⤵
- Executes dropped EXE
PID:4360 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe63⤵
- Executes dropped EXE
PID:1068 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe64⤵
- Executes dropped EXE
PID:60 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe65⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4544 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe66⤵PID:1212
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe67⤵PID:3700
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe68⤵PID:3632
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe69⤵
- System Location Discovery: System Language Discovery
PID:872 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe70⤵PID:3584
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe71⤵
- Adds Run key to start application
PID:2924 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe72⤵PID:4036
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe73⤵
- Adds Run key to start application
PID:5028 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe74⤵PID:2200
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe75⤵PID:2272
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe76⤵PID:4708
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe77⤵PID:4456
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe78⤵
- Adds Run key to start application
PID:3076 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe79⤵
- Adds Run key to start application
PID:2312 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe80⤵PID:3568
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe81⤵PID:2320
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe82⤵
- System Location Discovery: System Language Discovery
PID:2520 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe83⤵PID:3264
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe84⤵PID:2316
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe85⤵
- System Location Discovery: System Language Discovery
PID:2336 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe86⤵PID:4908
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe87⤵PID:4764
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe88⤵PID:1932
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe89⤵
- Adds Run key to start application
PID:4600 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe90⤵PID:2968
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe91⤵PID:2748
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe92⤵PID:3508
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe93⤵PID:4580
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe94⤵PID:1772
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe95⤵
- Adds Run key to start application
PID:4920 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe96⤵
- System Location Discovery: System Language Discovery
PID:3852 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe97⤵PID:2772
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe98⤵PID:620
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe99⤵PID:4968
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe100⤵PID:3796
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe101⤵PID:1212
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe102⤵
- Adds Run key to start application
PID:4980 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe103⤵PID:424
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe104⤵PID:2128
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe105⤵PID:2716
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe106⤵
- System Location Discovery: System Language Discovery
PID:3880 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe107⤵PID:4508
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe108⤵PID:608
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe109⤵PID:4432
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe110⤵
- System Location Discovery: System Language Discovery
PID:4936 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe111⤵
- System Location Discovery: System Language Discovery
PID:3340 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe112⤵PID:1136
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe113⤵PID:688
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe114⤵
- System Location Discovery: System Language Discovery
PID:2320 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe115⤵PID:3980
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe116⤵PID:4984
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe117⤵PID:4060
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe118⤵
- Adds Run key to start application
PID:4276 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe119⤵PID:2712
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe120⤵PID:1196
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe121⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4888 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\8cb821933c226d587e5c2bde41fe79f7_JaffaCakes118.exe122⤵
- System Location Discovery: System Language Discovery
PID:1896
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-