Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14/08/2024, 15:24
Static task
static1
Behavioral task
behavioral1
Sample
96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe
-
Size
38KB
-
MD5
96a67e2fd1af377b172328bebfd82d45
-
SHA1
bd1edc67ede4cd573082c78a96c67c1ee1e8ef51
-
SHA256
5ed4a6c8ac91d146bd9e18489b226a7a3d84781b83a315a13564a6bf917d210c
-
SHA512
67618c58cdabc860f05d61fb568fcc129829f44bd535ff51c3ec6113d59412a8036f4bbd36cc0834752a2efc52190b050533326d3caf50d13b70e502b457ce23
-
SSDEEP
768:eU93Dl3zjeFXKGCqTiAvUj+SROSM4Xgbtk9K1fEJbI+DSHY2SusYk2R17sN:hDVzjeFjCqVvyOt8pYak+DLRi1QN
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\XMouie = "C:\\Windows\\system32StopAor.exe" 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AutoRun.exe 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ccSvcHst.exe 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\IceSword.exe\Debugger = "C:\\Windows\\system32StopAor.exe" 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KASTask.exe\Debugger = "C:\\Windows\\system32StopAor.exe" 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mcconsol.exe\Debugger = "C:\\Windows\\system32StopAor.exe" 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PFW.exe\Debugger = "C:\\Windows\\system32StopAor.exe" 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavMonD.exe 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RsAgent.exe 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KASMain.exe 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\IceSword.exe 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KISLnchr.exe 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KWatch.exe\Debugger = "C:\\Windows\\system32StopAor.exe" 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TrojanDetector.exe\Debugger = "C:\\Windows\\system32StopAor.exe" 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cross.exe 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVStub.kxp\Debugger = "C:\\Windows\\system32StopAor.exe" 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SysSafe.exe 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TxoMoU.Exe 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MagicSet.exe\Debugger = "C:\\Windows\\system32StopAor.exe" 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TNT.Exe\Debugger = "C:\\Windows\\system32StopAor.exe" 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KvReport.kxp 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rfwProxy.exe 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rfwsrv.exe 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\XP.exe 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\adffgh785v.exe\Debugger = "C:\\Windows\\system32StopAor.exe" 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KPFW32.exe 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rav.exe 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rav.exe\Debugger = "C:\\Windows\\system32StopAor.exe" 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit32.Exe 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pagefile.pif\Debugger = "C:\\Windows\\system32StopAor.exe" 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAV32.exe\Debugger = "C:\\Windows\\system32StopAor.exe" 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kvwsc.exe 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UmxPol.exe 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AppSvc32.exe\Debugger = "C:\\Windows\\system32StopAor.exe" 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\CCenter.exe\Debugger = "C:\\Windows\\system32StopAor.exe" 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KMailMon.exe 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mcconsol.exe 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\shcfg32.exe 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TrojanDetector.exe 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UmxFwHlp.exe\Debugger = "C:\\Windows\\system32StopAor.exe" 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\FileDsty.exe 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVStub.kxp 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KvXP.kxp 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\shcfg32.exe\Debugger = "C:\\Windows\\system32StopAor.exe" 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SDGames.exe 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\adam.exe 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\FTCleanerShell.exe 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\safelive.exe\Debugger = "C:\\Windows\\system32StopAor.exe" 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SysSafe.exe\Debugger = "C:\\Windows\\system32StopAor.exe" 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\appdllman.exe 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\~.exe 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Wsyscheck.exe\Debugger = "C:\\Windows\\system32StopAor.exe" 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ccSvcHst.exe\Debugger = "C:\\Windows\\system32StopAor.exe" 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVSetup.exe\Debugger = "C:\\Windows\\system32StopAor.exe" 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KvfwMcl.exe\Debugger = "C:\\Windows\\system32StopAor.exe" 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KWatch.exe 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\niu.exe 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KMFilter.exe\Debugger = "C:\\Windows\\system32StopAor.exe" 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavStub.exe 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rfwProxy.exe\Debugger = "C:\\Windows\\system32StopAor.exe" 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360Safe.exe 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HijackThis.exe 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KMailMon.exe\Debugger = "C:\\Windows\\system32StopAor.exe" 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KMFilter.exe 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rsaupd.exe 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\system32StopAor.exe 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe File opened for modification C:\Windows\system32StopAor.exe 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1672 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe 1672 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe 1672 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe 1672 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe 1672 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe 1672 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe 1672 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe 1672 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe 1672 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe 1672 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe 1672 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe 1672 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe 1672 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe 1672 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe 1672 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe 1672 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe 1672 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe 1672 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe 1672 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe 1672 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe 1672 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe 1672 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe 1672 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe 1672 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe 1672 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe 1672 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe 1672 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe 1672 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe 1672 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe 1672 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe 1672 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe 1672 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe 1672 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe 1672 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe 1672 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe 1672 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe 1672 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe 1672 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe 1672 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe 1672 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe 1672 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe 1672 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe 1672 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe 1672 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe 1672 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe 1672 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe 1672 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe 1672 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe 1672 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe 1672 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe 1672 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe 1672 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe 1672 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe 1672 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe 1672 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe 1672 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe 1672 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe 1672 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe 1672 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe 1672 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe 1672 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe 1672 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe 1672 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe 1672 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1672 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe -
System policy modification 1 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\explorer 96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\96a67e2fd1af377b172328bebfd82d45_JaffaCakes118.exe"1⤵
- Adds policy Run key to start application
- Event Triggered Execution: Image File Execution Options Injection
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:1672
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Image File Execution Options Injection
1