Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/08/2024, 13:45
Static task
static1
Behavioral task
behavioral1
Sample
8ef47618f93b9b30d35cadcafbf1914b_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8ef47618f93b9b30d35cadcafbf1914b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8ef47618f93b9b30d35cadcafbf1914b_JaffaCakes118.exe
-
Size
160KB
-
MD5
8ef47618f93b9b30d35cadcafbf1914b
-
SHA1
aa69e11347df63ba8cdf94752531cd66edf98ca6
-
SHA256
c0a226e832a5dee87e9672d1960d6e2efcaa7d0abbd4da7c4ebf28f2c0e712bd
-
SHA512
15154f7b76acb257d13cdfab5e230edebecff654fc92bd93ca7a3c4b5ea2edfa974e803e647a804ef6d99285533e4e34d98e8ae53a09bd48878e60d0598da46e
-
SSDEEP
3072:rr78XUEX26AEh24pxZFWs5DBjh0LK+mELAbSJ56F6jACObA6o:rxsjQ4pDFtDBjhkfAo8F6R
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4204 trivax1.Bin.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/228-2-0x0000000000400000-0x000000000047F000-memory.dmp upx behavioral2/memory/4204-12-0x0000000000400000-0x000000000047F000-memory.dmp upx behavioral2/memory/4204-11-0x0000000000400000-0x000000000047F000-memory.dmp upx behavioral2/memory/4204-24-0x0000000000400000-0x000000000047F000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\trivax1.Bin.exe = "C:\\trivax1.Bin\\trivax1.Bin.exe" trivax1.Bin.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language trivax1.Bin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8ef47618f93b9b30d35cadcafbf1914b_JaffaCakes118.exe -
Modifies Internet Explorer Phishing Filter 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Software\Microsoft\Internet Explorer\PhishingFilter trivax1.Bin.exe Set value (int) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Internet Explorer\PhishingFilter\EnabledV8 = "0" trivax1.Bin.exe Set value (int) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Internet Explorer\PhishingFilter\ShownServiceDownBalloon = "0" trivax1.Bin.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Software\Microsoft\Internet Explorer\Recovery trivax1.Bin.exe Set value (int) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\ClearBrowsingHistoryOnExit = "0" trivax1.Bin.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 228 8ef47618f93b9b30d35cadcafbf1914b_JaffaCakes118.exe 228 8ef47618f93b9b30d35cadcafbf1914b_JaffaCakes118.exe 228 8ef47618f93b9b30d35cadcafbf1914b_JaffaCakes118.exe 228 8ef47618f93b9b30d35cadcafbf1914b_JaffaCakes118.exe 4204 trivax1.Bin.exe 4204 trivax1.Bin.exe 4204 trivax1.Bin.exe 4204 trivax1.Bin.exe 4204 trivax1.Bin.exe 4204 trivax1.Bin.exe 4204 trivax1.Bin.exe 4204 trivax1.Bin.exe 4204 trivax1.Bin.exe 4204 trivax1.Bin.exe 4204 trivax1.Bin.exe 4204 trivax1.Bin.exe 4204 trivax1.Bin.exe 4204 trivax1.Bin.exe 4204 trivax1.Bin.exe 4204 trivax1.Bin.exe 4204 trivax1.Bin.exe 4204 trivax1.Bin.exe 4204 trivax1.Bin.exe 4204 trivax1.Bin.exe 4204 trivax1.Bin.exe 4204 trivax1.Bin.exe 4204 trivax1.Bin.exe 4204 trivax1.Bin.exe 4204 trivax1.Bin.exe 4204 trivax1.Bin.exe 4204 trivax1.Bin.exe 4204 trivax1.Bin.exe 4204 trivax1.Bin.exe 4204 trivax1.Bin.exe 4204 trivax1.Bin.exe 4204 trivax1.Bin.exe 4204 trivax1.Bin.exe 4204 trivax1.Bin.exe 4204 trivax1.Bin.exe 4204 trivax1.Bin.exe 4204 trivax1.Bin.exe 4204 trivax1.Bin.exe 4204 trivax1.Bin.exe 4204 trivax1.Bin.exe 4204 trivax1.Bin.exe 4204 trivax1.Bin.exe 4204 trivax1.Bin.exe 4204 trivax1.Bin.exe 4204 trivax1.Bin.exe 4204 trivax1.Bin.exe 4204 trivax1.Bin.exe 4204 trivax1.Bin.exe 4204 trivax1.Bin.exe 4204 trivax1.Bin.exe 4204 trivax1.Bin.exe 4204 trivax1.Bin.exe 4204 trivax1.Bin.exe 4204 trivax1.Bin.exe 4204 trivax1.Bin.exe 4204 trivax1.Bin.exe 4204 trivax1.Bin.exe 4204 trivax1.Bin.exe 4204 trivax1.Bin.exe 4204 trivax1.Bin.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 228 8ef47618f93b9b30d35cadcafbf1914b_JaffaCakes118.exe Token: SeDebugPrivilege 228 8ef47618f93b9b30d35cadcafbf1914b_JaffaCakes118.exe Token: SeDebugPrivilege 228 8ef47618f93b9b30d35cadcafbf1914b_JaffaCakes118.exe Token: SeDebugPrivilege 228 8ef47618f93b9b30d35cadcafbf1914b_JaffaCakes118.exe Token: SeDebugPrivilege 4204 trivax1.Bin.exe Token: SeDebugPrivilege 4204 trivax1.Bin.exe Token: SeDebugPrivilege 4204 trivax1.Bin.exe Token: SeDebugPrivilege 4204 trivax1.Bin.exe Token: SeDebugPrivilege 4204 trivax1.Bin.exe Token: SeDebugPrivilege 4204 trivax1.Bin.exe Token: SeDebugPrivilege 4204 trivax1.Bin.exe Token: SeDebugPrivilege 4204 trivax1.Bin.exe Token: SeDebugPrivilege 4204 trivax1.Bin.exe Token: SeDebugPrivilege 4204 trivax1.Bin.exe Token: SeDebugPrivilege 4204 trivax1.Bin.exe Token: SeDebugPrivilege 4204 trivax1.Bin.exe Token: SeDebugPrivilege 4204 trivax1.Bin.exe Token: SeDebugPrivilege 4204 trivax1.Bin.exe Token: SeDebugPrivilege 4204 trivax1.Bin.exe Token: SeDebugPrivilege 4204 trivax1.Bin.exe Token: SeDebugPrivilege 4204 trivax1.Bin.exe Token: SeDebugPrivilege 4204 trivax1.Bin.exe Token: SeDebugPrivilege 4204 trivax1.Bin.exe Token: SeDebugPrivilege 4204 trivax1.Bin.exe Token: SeDebugPrivilege 4204 trivax1.Bin.exe Token: SeDebugPrivilege 4204 trivax1.Bin.exe Token: SeDebugPrivilege 4204 trivax1.Bin.exe Token: SeDebugPrivilege 4204 trivax1.Bin.exe Token: SeDebugPrivilege 4204 trivax1.Bin.exe Token: SeDebugPrivilege 4204 trivax1.Bin.exe Token: SeDebugPrivilege 4204 trivax1.Bin.exe Token: SeDebugPrivilege 4204 trivax1.Bin.exe Token: SeDebugPrivilege 4204 trivax1.Bin.exe Token: SeDebugPrivilege 4204 trivax1.Bin.exe Token: SeDebugPrivilege 4204 trivax1.Bin.exe Token: SeDebugPrivilege 4204 trivax1.Bin.exe Token: SeDebugPrivilege 4204 trivax1.Bin.exe Token: SeDebugPrivilege 4204 trivax1.Bin.exe Token: SeDebugPrivilege 4204 trivax1.Bin.exe Token: SeDebugPrivilege 4204 trivax1.Bin.exe Token: SeDebugPrivilege 4204 trivax1.Bin.exe Token: SeDebugPrivilege 4204 trivax1.Bin.exe Token: SeDebugPrivilege 4204 trivax1.Bin.exe Token: SeDebugPrivilege 4204 trivax1.Bin.exe Token: SeDebugPrivilege 4204 trivax1.Bin.exe Token: SeDebugPrivilege 4204 trivax1.Bin.exe Token: SeDebugPrivilege 4204 trivax1.Bin.exe Token: SeDebugPrivilege 4204 trivax1.Bin.exe Token: SeDebugPrivilege 4204 trivax1.Bin.exe Token: SeDebugPrivilege 4204 trivax1.Bin.exe Token: SeDebugPrivilege 4204 trivax1.Bin.exe Token: SeDebugPrivilege 4204 trivax1.Bin.exe Token: SeDebugPrivilege 4204 trivax1.Bin.exe Token: SeDebugPrivilege 4204 trivax1.Bin.exe Token: SeDebugPrivilege 4204 trivax1.Bin.exe Token: SeDebugPrivilege 4204 trivax1.Bin.exe Token: SeDebugPrivilege 4204 trivax1.Bin.exe Token: SeDebugPrivilege 4204 trivax1.Bin.exe Token: SeDebugPrivilege 4204 trivax1.Bin.exe Token: SeDebugPrivilege 4204 trivax1.Bin.exe Token: SeDebugPrivilege 4204 trivax1.Bin.exe Token: SeDebugPrivilege 4204 trivax1.Bin.exe Token: SeDebugPrivilege 4204 trivax1.Bin.exe Token: SeDebugPrivilege 4204 trivax1.Bin.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 228 wrote to memory of 3472 228 8ef47618f93b9b30d35cadcafbf1914b_JaffaCakes118.exe 56 PID 228 wrote to memory of 616 228 8ef47618f93b9b30d35cadcafbf1914b_JaffaCakes118.exe 5 PID 228 wrote to memory of 688 228 8ef47618f93b9b30d35cadcafbf1914b_JaffaCakes118.exe 7 PID 228 wrote to memory of 788 228 8ef47618f93b9b30d35cadcafbf1914b_JaffaCakes118.exe 8 PID 228 wrote to memory of 796 228 8ef47618f93b9b30d35cadcafbf1914b_JaffaCakes118.exe 9 PID 228 wrote to memory of 804 228 8ef47618f93b9b30d35cadcafbf1914b_JaffaCakes118.exe 10 PID 228 wrote to memory of 912 228 8ef47618f93b9b30d35cadcafbf1914b_JaffaCakes118.exe 11 PID 228 wrote to memory of 964 228 8ef47618f93b9b30d35cadcafbf1914b_JaffaCakes118.exe 12 PID 228 wrote to memory of 376 228 8ef47618f93b9b30d35cadcafbf1914b_JaffaCakes118.exe 13 PID 228 wrote to memory of 532 228 8ef47618f93b9b30d35cadcafbf1914b_JaffaCakes118.exe 14 PID 228 wrote to memory of 908 228 8ef47618f93b9b30d35cadcafbf1914b_JaffaCakes118.exe 15 PID 228 wrote to memory of 1084 228 8ef47618f93b9b30d35cadcafbf1914b_JaffaCakes118.exe 16 PID 228 wrote to memory of 1116 228 8ef47618f93b9b30d35cadcafbf1914b_JaffaCakes118.exe 17 PID 228 wrote to memory of 1124 228 8ef47618f93b9b30d35cadcafbf1914b_JaffaCakes118.exe 18 PID 228 wrote to memory of 1136 228 8ef47618f93b9b30d35cadcafbf1914b_JaffaCakes118.exe 19 PID 228 wrote to memory of 1144 228 8ef47618f93b9b30d35cadcafbf1914b_JaffaCakes118.exe 20 PID 228 wrote to memory of 1280 228 8ef47618f93b9b30d35cadcafbf1914b_JaffaCakes118.exe 21 PID 228 wrote to memory of 1304 228 8ef47618f93b9b30d35cadcafbf1914b_JaffaCakes118.exe 22 PID 228 wrote to memory of 1356 228 8ef47618f93b9b30d35cadcafbf1914b_JaffaCakes118.exe 23 PID 228 wrote to memory of 1424 228 8ef47618f93b9b30d35cadcafbf1914b_JaffaCakes118.exe 24 PID 228 wrote to memory of 1440 228 8ef47618f93b9b30d35cadcafbf1914b_JaffaCakes118.exe 25 PID 228 wrote to memory of 1532 228 8ef47618f93b9b30d35cadcafbf1914b_JaffaCakes118.exe 26 PID 228 wrote to memory of 1552 228 8ef47618f93b9b30d35cadcafbf1914b_JaffaCakes118.exe 27 PID 228 wrote to memory of 1632 228 8ef47618f93b9b30d35cadcafbf1914b_JaffaCakes118.exe 28 PID 228 wrote to memory of 1700 228 8ef47618f93b9b30d35cadcafbf1914b_JaffaCakes118.exe 29 PID 228 wrote to memory of 1732 228 8ef47618f93b9b30d35cadcafbf1914b_JaffaCakes118.exe 30 PID 228 wrote to memory of 1768 228 8ef47618f93b9b30d35cadcafbf1914b_JaffaCakes118.exe 31 PID 228 wrote to memory of 1856 228 8ef47618f93b9b30d35cadcafbf1914b_JaffaCakes118.exe 32 PID 228 wrote to memory of 1960 228 8ef47618f93b9b30d35cadcafbf1914b_JaffaCakes118.exe 33 PID 228 wrote to memory of 1968 228 8ef47618f93b9b30d35cadcafbf1914b_JaffaCakes118.exe 34 PID 228 wrote to memory of 1460 228 8ef47618f93b9b30d35cadcafbf1914b_JaffaCakes118.exe 35 PID 228 wrote to memory of 1456 228 8ef47618f93b9b30d35cadcafbf1914b_JaffaCakes118.exe 36 PID 228 wrote to memory of 1804 228 8ef47618f93b9b30d35cadcafbf1914b_JaffaCakes118.exe 37 PID 228 wrote to memory of 2140 228 8ef47618f93b9b30d35cadcafbf1914b_JaffaCakes118.exe 38 PID 228 wrote to memory of 2208 228 8ef47618f93b9b30d35cadcafbf1914b_JaffaCakes118.exe 39 PID 228 wrote to memory of 2232 228 8ef47618f93b9b30d35cadcafbf1914b_JaffaCakes118.exe 40 PID 228 wrote to memory of 2284 228 8ef47618f93b9b30d35cadcafbf1914b_JaffaCakes118.exe 41 PID 228 wrote to memory of 2536 228 8ef47618f93b9b30d35cadcafbf1914b_JaffaCakes118.exe 42 PID 228 wrote to memory of 2568 228 8ef47618f93b9b30d35cadcafbf1914b_JaffaCakes118.exe 43 PID 228 wrote to memory of 2576 228 8ef47618f93b9b30d35cadcafbf1914b_JaffaCakes118.exe 44 PID 228 wrote to memory of 2584 228 8ef47618f93b9b30d35cadcafbf1914b_JaffaCakes118.exe 45 PID 228 wrote to memory of 2740 228 8ef47618f93b9b30d35cadcafbf1914b_JaffaCakes118.exe 46 PID 228 wrote to memory of 2772 228 8ef47618f93b9b30d35cadcafbf1914b_JaffaCakes118.exe 47 PID 228 wrote to memory of 2804 228 8ef47618f93b9b30d35cadcafbf1914b_JaffaCakes118.exe 48 PID 228 wrote to memory of 2816 228 8ef47618f93b9b30d35cadcafbf1914b_JaffaCakes118.exe 49 PID 228 wrote to memory of 2844 228 8ef47618f93b9b30d35cadcafbf1914b_JaffaCakes118.exe 50 PID 228 wrote to memory of 2852 228 8ef47618f93b9b30d35cadcafbf1914b_JaffaCakes118.exe 51 PID 228 wrote to memory of 2940 228 8ef47618f93b9b30d35cadcafbf1914b_JaffaCakes118.exe 52 PID 228 wrote to memory of 2108 228 8ef47618f93b9b30d35cadcafbf1914b_JaffaCakes118.exe 53 PID 228 wrote to memory of 3444 228 8ef47618f93b9b30d35cadcafbf1914b_JaffaCakes118.exe 55 PID 228 wrote to memory of 3472 228 8ef47618f93b9b30d35cadcafbf1914b_JaffaCakes118.exe 56 PID 228 wrote to memory of 3624 228 8ef47618f93b9b30d35cadcafbf1914b_JaffaCakes118.exe 57 PID 228 wrote to memory of 3824 228 8ef47618f93b9b30d35cadcafbf1914b_JaffaCakes118.exe 58 PID 228 wrote to memory of 3912 228 8ef47618f93b9b30d35cadcafbf1914b_JaffaCakes118.exe 59 PID 228 wrote to memory of 3972 228 8ef47618f93b9b30d35cadcafbf1914b_JaffaCakes118.exe 60 PID 228 wrote to memory of 4060 228 8ef47618f93b9b30d35cadcafbf1914b_JaffaCakes118.exe 61 PID 228 wrote to memory of 3500 228 8ef47618f93b9b30d35cadcafbf1914b_JaffaCakes118.exe 62 PID 228 wrote to memory of 464 228 8ef47618f93b9b30d35cadcafbf1914b_JaffaCakes118.exe 65 PID 228 wrote to memory of 4540 228 8ef47618f93b9b30d35cadcafbf1914b_JaffaCakes118.exe 67 PID 228 wrote to memory of 552 228 8ef47618f93b9b30d35cadcafbf1914b_JaffaCakes118.exe 68 PID 228 wrote to memory of 2004 228 8ef47618f93b9b30d35cadcafbf1914b_JaffaCakes118.exe 69 PID 228 wrote to memory of 2112 228 8ef47618f93b9b30d35cadcafbf1914b_JaffaCakes118.exe 70 PID 228 wrote to memory of 4296 228 8ef47618f93b9b30d35cadcafbf1914b_JaffaCakes118.exe 71 PID 228 wrote to memory of 4008 228 8ef47618f93b9b30d35cadcafbf1914b_JaffaCakes118.exe 72
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:616
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"2⤵PID:796
-
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:376
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:688
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:788
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵PID:804
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding2⤵PID:2108
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:3824
-
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca2⤵PID:3912
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:3972
-
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca2⤵PID:4060
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:3500
-
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding2⤵PID:2112
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:2884
-
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca2⤵PID:2276
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:2716
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca2⤵PID:2828
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca2⤵PID:4312
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:4960
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:2792
-
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding2⤵PID:3060
-
-
C:\Windows\System32\mousocoreworker.exeC:\Windows\System32\mousocoreworker.exe -Embedding2⤵PID:5064
-
-
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exeC:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding2⤵PID:4504
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca2⤵PID:4592
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca2⤵PID:408
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca2⤵PID:2196
-
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.12⤵PID:4936
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca2⤵PID:4368
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}2⤵PID:4756
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:4244
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS -p1⤵PID:912
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:964
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:532
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:908
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p1⤵PID:1084
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1116
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1124
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:1136
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1144
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵PID:2772
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1280
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1304
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1356
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1424
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1440
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:2536
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1532
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1552
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1632
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1700
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1732
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1768
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1856
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:1960
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1968
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:1460
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:1456
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:1804
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2140
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p1⤵PID:2208
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2232
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2284
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2568
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2576
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2584
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵PID:2740
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2804
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2816
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2844
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2852
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵PID:2940
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:3444
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3472
-
C:\Users\Admin\AppData\Local\Temp\8ef47618f93b9b30d35cadcafbf1914b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8ef47618f93b9b30d35cadcafbf1914b_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:228 -
C:\trivax1.Bin\trivax1.Bin.exe"C:\trivax1.Bin\trivax1.Bin.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4204
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3624
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:464
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:4540
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵PID:552
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:2004
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:4296
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:4008
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc1⤵PID:3368
-
C:\Windows\System32\WaaSMedicAgent.exeC:\Windows\System32\WaaSMedicAgent.exe 3f10ee9f38a4c4e77a2355ce0124b9d5 xnZbMlU3gEW70LuFTd63iw.0.1.0.0.01⤵PID:5060
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:3744
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵PID:3028
-
C:\Windows\servicing\TrustedInstaller.exeC:\Windows\servicing\TrustedInstaller.exe1⤵PID:2928
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc1⤵PID:3900
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD596f4ed1e6523ea5fd57e457fe8e12977
SHA19c48d689c0d46dd4b30f3441715a384014993be2
SHA2563e017d7f2bcc0fa41a28f1403d006ab19e46c209b276151c0e53ebda7fe50f64
SHA51251f9c662f29090a940a6d231e8bf607f43368f73e415edc3138b2ae5f47ab7fb8c96f460e0c822549923c33077c2794aa01586941cecf0f2be739f096a351a08
-
Filesize
160KB
MD58ef47618f93b9b30d35cadcafbf1914b
SHA1aa69e11347df63ba8cdf94752531cd66edf98ca6
SHA256c0a226e832a5dee87e9672d1960d6e2efcaa7d0abbd4da7c4ebf28f2c0e712bd
SHA51215154f7b76acb257d13cdfab5e230edebecff654fc92bd93ca7a3c4b5ea2edfa974e803e647a804ef6d99285533e4e34d98e8ae53a09bd48878e60d0598da46e