Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
12/08/2024, 06:28
Static task
static1
Behavioral task
behavioral1
Sample
8daa8d5d9ee0fbf93fdf60435d60d0d3_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8daa8d5d9ee0fbf93fdf60435d60d0d3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8daa8d5d9ee0fbf93fdf60435d60d0d3_JaffaCakes118.exe
-
Size
460KB
-
MD5
8daa8d5d9ee0fbf93fdf60435d60d0d3
-
SHA1
6bab26b5931fb3127ec12c85c311c1aea248d3f6
-
SHA256
927da89a8d07a6c470479e23f8716a960d66ed84388a5c8ac4c752087074feed
-
SHA512
9ebd580fc68b94cfb6f457601c3323ea249285cc84d91fb52d82b785c27b0c48e64b39d41f00180172a53629f203ae7f12d6d572d98901160c49d3d5d99e85b8
-
SSDEEP
12288:rlSt6oIHNOhU5O5TYo4XqTig5GSR9CClDDL:rlSt69HNx6T/5xT
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" raegik.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" iBdqphzke5.exe -
Deletes itself 1 IoCs
pid Process 1408 cmd.exe -
Executes dropped EXE 7 IoCs
pid Process 2564 iBdqphzke5.exe 2204 raegik.exe 2980 astat.exe 2104 astat.exe 2644 dstat.exe 484 fstat.exe 332 csrss.exe -
Loads dropped DLL 10 IoCs
pid Process 3020 8daa8d5d9ee0fbf93fdf60435d60d0d3_JaffaCakes118.exe 3020 8daa8d5d9ee0fbf93fdf60435d60d0d3_JaffaCakes118.exe 2564 iBdqphzke5.exe 2564 iBdqphzke5.exe 3020 8daa8d5d9ee0fbf93fdf60435d60d0d3_JaffaCakes118.exe 3020 8daa8d5d9ee0fbf93fdf60435d60d0d3_JaffaCakes118.exe 3020 8daa8d5d9ee0fbf93fdf60435d60d0d3_JaffaCakes118.exe 3020 8daa8d5d9ee0fbf93fdf60435d60d0d3_JaffaCakes118.exe 3020 8daa8d5d9ee0fbf93fdf60435d60d0d3_JaffaCakes118.exe 3020 8daa8d5d9ee0fbf93fdf60435d60d0d3_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2104-43-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/2104-41-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/2104-49-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/2104-52-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/2104-51-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/2104-50-0x0000000000400000-0x000000000040E000-memory.dmp upx -
Adds Run key to start application 2 TTPs 53 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\raegik = "C:\\Users\\Admin\\raegik.exe /j" raegik.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\raegik = "C:\\Users\\Admin\\raegik.exe /r" raegik.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\raegik = "C:\\Users\\Admin\\raegik.exe /L" raegik.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\raegik = "C:\\Users\\Admin\\raegik.exe /V" raegik.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\raegik = "C:\\Users\\Admin\\raegik.exe /Q" raegik.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\raegik = "C:\\Users\\Admin\\raegik.exe /p" raegik.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\raegik = "C:\\Users\\Admin\\raegik.exe /F" raegik.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\raegik = "C:\\Users\\Admin\\raegik.exe /J" raegik.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\raegik = "C:\\Users\\Admin\\raegik.exe /S" raegik.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\raegik = "C:\\Users\\Admin\\raegik.exe /l" raegik.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\raegik = "C:\\Users\\Admin\\raegik.exe /y" raegik.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\raegik = "C:\\Users\\Admin\\raegik.exe /G" raegik.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\raegik = "C:\\Users\\Admin\\raegik.exe /M" raegik.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\raegik = "C:\\Users\\Admin\\raegik.exe /Z" raegik.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\raegik = "C:\\Users\\Admin\\raegik.exe /D" raegik.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\raegik = "C:\\Users\\Admin\\raegik.exe /t" raegik.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\raegik = "C:\\Users\\Admin\\raegik.exe /w" raegik.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\raegik = "C:\\Users\\Admin\\raegik.exe /h" raegik.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\raegik = "C:\\Users\\Admin\\raegik.exe /E" raegik.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\raegik = "C:\\Users\\Admin\\raegik.exe /a" raegik.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\raegik = "C:\\Users\\Admin\\raegik.exe /x" raegik.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\raegik = "C:\\Users\\Admin\\raegik.exe /q" raegik.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\raegik = "C:\\Users\\Admin\\raegik.exe /v" raegik.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\raegik = "C:\\Users\\Admin\\raegik.exe /O" raegik.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\raegik = "C:\\Users\\Admin\\raegik.exe /u" raegik.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\raegik = "C:\\Users\\Admin\\raegik.exe /K" raegik.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\raegik = "C:\\Users\\Admin\\raegik.exe /B" raegik.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\raegik = "C:\\Users\\Admin\\raegik.exe /Y" raegik.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\raegik = "C:\\Users\\Admin\\raegik.exe /H" raegik.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\raegik = "C:\\Users\\Admin\\raegik.exe /o" raegik.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\raegik = "C:\\Users\\Admin\\raegik.exe /s" raegik.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\raegik = "C:\\Users\\Admin\\raegik.exe /I" raegik.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\raegik = "C:\\Users\\Admin\\raegik.exe /n" raegik.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\raegik = "C:\\Users\\Admin\\raegik.exe /T" raegik.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\raegik = "C:\\Users\\Admin\\raegik.exe /C" raegik.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\raegik = "C:\\Users\\Admin\\raegik.exe /e" raegik.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\raegik = "C:\\Users\\Admin\\raegik.exe /A" raegik.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\raegik = "C:\\Users\\Admin\\raegik.exe /X" iBdqphzke5.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\raegik = "C:\\Users\\Admin\\raegik.exe /z" raegik.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\raegik = "C:\\Users\\Admin\\raegik.exe /k" raegik.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\raegik = "C:\\Users\\Admin\\raegik.exe /g" raegik.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\raegik = "C:\\Users\\Admin\\raegik.exe /W" raegik.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\raegik = "C:\\Users\\Admin\\raegik.exe /R" raegik.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\raegik = "C:\\Users\\Admin\\raegik.exe /c" raegik.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\raegik = "C:\\Users\\Admin\\raegik.exe /b" raegik.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\raegik = "C:\\Users\\Admin\\raegik.exe /m" raegik.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\raegik = "C:\\Users\\Admin\\raegik.exe /P" raegik.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\raegik = "C:\\Users\\Admin\\raegik.exe /U" raegik.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\raegik = "C:\\Users\\Admin\\raegik.exe /i" raegik.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\raegik = "C:\\Users\\Admin\\raegik.exe /d" raegik.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\raegik = "C:\\Users\\Admin\\raegik.exe /N" raegik.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\raegik = "C:\\Users\\Admin\\raegik.exe /f" raegik.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\raegik = "C:\\Users\\Admin\\raegik.exe /X" raegik.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created \systemroot\assembly\GAC_64\Desktop.ini csrss.exe File created \systemroot\assembly\GAC_32\Desktop.ini csrss.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 2876 tasklist.exe 2920 tasklist.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2980 set thread context of 2104 2980 astat.exe 36 PID 484 set thread context of 2228 484 fstat.exe 41 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iBdqphzke5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language astat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dstat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8daa8d5d9ee0fbf93fdf60435d60d0d3_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language raegik.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fstat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2564 iBdqphzke5.exe 2564 iBdqphzke5.exe 2104 astat.exe 2204 raegik.exe 2204 raegik.exe 2104 astat.exe 2204 raegik.exe 2204 raegik.exe 2204 raegik.exe 2104 astat.exe 2204 raegik.exe 2104 astat.exe 2104 astat.exe 2204 raegik.exe 2204 raegik.exe 2204 raegik.exe 2104 astat.exe 2204 raegik.exe 2104 astat.exe 2104 astat.exe 2204 raegik.exe 2204 raegik.exe 2204 raegik.exe 2104 astat.exe 2104 astat.exe 2204 raegik.exe 2104 astat.exe 2204 raegik.exe 2104 astat.exe 2104 astat.exe 2204 raegik.exe 2104 astat.exe 2204 raegik.exe 2104 astat.exe 2204 raegik.exe 2104 astat.exe 2204 raegik.exe 2104 astat.exe 2204 raegik.exe 2104 astat.exe 2104 astat.exe 2204 raegik.exe 2104 astat.exe 2204 raegik.exe 2104 astat.exe 2204 raegik.exe 2204 raegik.exe 2104 astat.exe 2104 astat.exe 2104 astat.exe 2204 raegik.exe 2104 astat.exe 2104 astat.exe 2104 astat.exe 2204 raegik.exe 2204 raegik.exe 2204 raegik.exe 2104 astat.exe 2104 astat.exe 2104 astat.exe 2204 raegik.exe 2104 astat.exe 2104 astat.exe 2104 astat.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2876 tasklist.exe Token: SeDebugPrivilege 484 fstat.exe Token: SeDebugPrivilege 484 fstat.exe Token: SeDebugPrivilege 2920 tasklist.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 3020 8daa8d5d9ee0fbf93fdf60435d60d0d3_JaffaCakes118.exe 2564 iBdqphzke5.exe 2204 raegik.exe 2980 astat.exe 2644 dstat.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 332 csrss.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 3020 wrote to memory of 2564 3020 8daa8d5d9ee0fbf93fdf60435d60d0d3_JaffaCakes118.exe 30 PID 3020 wrote to memory of 2564 3020 8daa8d5d9ee0fbf93fdf60435d60d0d3_JaffaCakes118.exe 30 PID 3020 wrote to memory of 2564 3020 8daa8d5d9ee0fbf93fdf60435d60d0d3_JaffaCakes118.exe 30 PID 3020 wrote to memory of 2564 3020 8daa8d5d9ee0fbf93fdf60435d60d0d3_JaffaCakes118.exe 30 PID 2564 wrote to memory of 2204 2564 iBdqphzke5.exe 31 PID 2564 wrote to memory of 2204 2564 iBdqphzke5.exe 31 PID 2564 wrote to memory of 2204 2564 iBdqphzke5.exe 31 PID 2564 wrote to memory of 2204 2564 iBdqphzke5.exe 31 PID 2564 wrote to memory of 2832 2564 iBdqphzke5.exe 32 PID 2564 wrote to memory of 2832 2564 iBdqphzke5.exe 32 PID 2564 wrote to memory of 2832 2564 iBdqphzke5.exe 32 PID 2564 wrote to memory of 2832 2564 iBdqphzke5.exe 32 PID 2832 wrote to memory of 2876 2832 cmd.exe 34 PID 2832 wrote to memory of 2876 2832 cmd.exe 34 PID 2832 wrote to memory of 2876 2832 cmd.exe 34 PID 2832 wrote to memory of 2876 2832 cmd.exe 34 PID 3020 wrote to memory of 2980 3020 8daa8d5d9ee0fbf93fdf60435d60d0d3_JaffaCakes118.exe 35 PID 3020 wrote to memory of 2980 3020 8daa8d5d9ee0fbf93fdf60435d60d0d3_JaffaCakes118.exe 35 PID 3020 wrote to memory of 2980 3020 8daa8d5d9ee0fbf93fdf60435d60d0d3_JaffaCakes118.exe 35 PID 3020 wrote to memory of 2980 3020 8daa8d5d9ee0fbf93fdf60435d60d0d3_JaffaCakes118.exe 35 PID 2980 wrote to memory of 2104 2980 astat.exe 36 PID 2980 wrote to memory of 2104 2980 astat.exe 36 PID 2980 wrote to memory of 2104 2980 astat.exe 36 PID 2980 wrote to memory of 2104 2980 astat.exe 36 PID 2980 wrote to memory of 2104 2980 astat.exe 36 PID 2980 wrote to memory of 2104 2980 astat.exe 36 PID 2980 wrote to memory of 2104 2980 astat.exe 36 PID 2980 wrote to memory of 2104 2980 astat.exe 36 PID 3020 wrote to memory of 2644 3020 8daa8d5d9ee0fbf93fdf60435d60d0d3_JaffaCakes118.exe 38 PID 3020 wrote to memory of 2644 3020 8daa8d5d9ee0fbf93fdf60435d60d0d3_JaffaCakes118.exe 38 PID 3020 wrote to memory of 2644 3020 8daa8d5d9ee0fbf93fdf60435d60d0d3_JaffaCakes118.exe 38 PID 3020 wrote to memory of 2644 3020 8daa8d5d9ee0fbf93fdf60435d60d0d3_JaffaCakes118.exe 38 PID 3020 wrote to memory of 484 3020 8daa8d5d9ee0fbf93fdf60435d60d0d3_JaffaCakes118.exe 40 PID 3020 wrote to memory of 484 3020 8daa8d5d9ee0fbf93fdf60435d60d0d3_JaffaCakes118.exe 40 PID 3020 wrote to memory of 484 3020 8daa8d5d9ee0fbf93fdf60435d60d0d3_JaffaCakes118.exe 40 PID 3020 wrote to memory of 484 3020 8daa8d5d9ee0fbf93fdf60435d60d0d3_JaffaCakes118.exe 40 PID 484 wrote to memory of 1216 484 fstat.exe 21 PID 484 wrote to memory of 332 484 fstat.exe 2 PID 484 wrote to memory of 2228 484 fstat.exe 41 PID 484 wrote to memory of 2228 484 fstat.exe 41 PID 484 wrote to memory of 2228 484 fstat.exe 41 PID 484 wrote to memory of 2228 484 fstat.exe 41 PID 484 wrote to memory of 2228 484 fstat.exe 41 PID 3020 wrote to memory of 1408 3020 8daa8d5d9ee0fbf93fdf60435d60d0d3_JaffaCakes118.exe 43 PID 3020 wrote to memory of 1408 3020 8daa8d5d9ee0fbf93fdf60435d60d0d3_JaffaCakes118.exe 43 PID 3020 wrote to memory of 1408 3020 8daa8d5d9ee0fbf93fdf60435d60d0d3_JaffaCakes118.exe 43 PID 3020 wrote to memory of 1408 3020 8daa8d5d9ee0fbf93fdf60435d60d0d3_JaffaCakes118.exe 43 PID 1408 wrote to memory of 2920 1408 cmd.exe 45 PID 1408 wrote to memory of 2920 1408 cmd.exe 45 PID 1408 wrote to memory of 2920 1408 cmd.exe 45 PID 1408 wrote to memory of 2920 1408 cmd.exe 45 PID 332 wrote to memory of 856 332 csrss.exe 13
Processes
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:332
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs1⤵PID:856
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\8daa8d5d9ee0fbf93fdf60435d60d0d3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8daa8d5d9ee0fbf93fdf60435d60d0d3_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Admin\iBdqphzke5.exeC:\Users\Admin\iBdqphzke5.exe3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Users\Admin\raegik.exe"C:\Users\Admin\raegik.exe"4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2204
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del iBdqphzke5.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2876
-
-
-
-
C:\Users\Admin\astat.exeC:\Users\Admin\astat.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Users\Admin\astat.exe"C:\Users\Admin\astat.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2104
-
-
-
C:\Users\Admin\dstat.exeC:\Users\Admin\dstat.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2644
-
-
C:\Users\Admin\fstat.exeC:\Users\Admin\fstat.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:484 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"4⤵
- System Location Discovery: System Language Discovery
PID:2228
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 8daa8d5d9ee0fbf93fdf60435d60d0d3_JaffaCakes118.exe3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2920
-
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD587c6498966e3f85fac743c89050aa312
SHA105c165c34cbfa14e4925c33ace81992b0f50a2b5
SHA25630c8328585e41968aff773da16cedbe590dcefd293c7fa74a69c557ecbf2c3c5
SHA512740f7159ee78f73e57c92e583b8c4f97c5dd49b68b9c321da976d7e318819daa28e8dfc76e95e1e3ccee643dc464324c40b481d1849863e287d826adb577b420
-
Filesize
36KB
MD5b6da847084e39e0cecf175c32c91b4bb
SHA1fbfd9494fabed5220cdf01866ff088fe7adc535b
SHA256065781e8a55cf59cb926d5950e0039e19b50b1e081023404fbff4d7a32fc9cbe
SHA51259d372ea36904cd48c99f2f34740c22004b35c5e5dada2417813b0463292af19e4aa5ba4552cc443da373e40ba03a1f7906019a567806806f5972c202a31d9d2
-
Filesize
53KB
MD54d7cde615a0f534bd5e359951829554b
SHA1c885d00d9000f2a5dbc78f6193a052b36f4fe968
SHA256414fdf9bdcae5136c1295d6d24740c50a484acd81f1f7d0fb5d5c138607cb80a
SHA51233d632f9fbb694440a1ca568c90518784278efd1dc9ee2b57028149d56ebe1f7346d5b59dcfafee2eeaa10091dda05f48958e909d6bfc891e037ae1cfbd048d4
-
Filesize
2KB
MD54c7ba3b0cd39116197e27064c6be2f43
SHA10d282605329b5ca257ee6385b7099d7da6797571
SHA256e2f10148b6f7a81fc386c44c97fba9afcf69bcd290f4767045979eea3f05abff
SHA5129ea2ccf083d44041c6afbdb6d8f76443b07fbf88a62468914200506a224ff8663368611c916b5442725dfb20a4a0949bd43efef650f95c64a06e438142550371
-
Filesize
271KB
MD534353cf7e1d1b10bcbbcae0745110535
SHA12fb471681daac6f6d66477b7772025da4f58c508
SHA256b2d7a66e2d10d8943e48d6f3ad75237ff379e82ab0101a620406c4569be1d959
SHA5127404f82abfabd21d6f2a88b55f6f0ff886bb0a1f16a9d45c6883d74daa26451f862a10a78646c549c3a3264ba4bd9fb44949d470493af895973dd05a0ec311e6
-
Filesize
244KB
MD5a4cdb62cf4866a17e742e7e9cc73d237
SHA130d94f8e872455ac569949ac4c768d0a0cdfbba7
SHA256c741d649bf5b72fbe97470820ce994ce29b153baae14af10c3a2a9adc3098b32
SHA512c4447f95565d3e5dc0ef7712382325280bedf127ac682f85f4043b586afb4188633f2c73277595eb31fe45d992107492f42c82a71f448286a9cb8fac4bfb3671
-
Filesize
244KB
MD585dd5a0a0cb20e82443b1ddd1acfafcb
SHA1db7da279a14c021213b4c3abb06a1e23180d7e9e
SHA256256d4782f837b6d9842f465ee31aff087b263abf0c5a3d612d76c69721c13692
SHA512409e8c887d61163b1ac98f20856ca6d494bd75bdab04f08676a40f86b1b990008ac8aebb995cb98c9584933bc950861f14eb34d4ad8d43da3c0a863445572027