Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 20:53
Static task
static1
Behavioral task
behavioral1
Sample
a82b32821738b504f4165483d7eeb490_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a82b32821738b504f4165483d7eeb490_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a82b32821738b504f4165483d7eeb490_JaffaCakes118.exe
-
Size
232KB
-
MD5
a82b32821738b504f4165483d7eeb490
-
SHA1
e4dd76f7b45a3a45c7130a4c2fbb54e77cc4ab40
-
SHA256
9fa50d12297d7579185e71979e238308b3dfe9cd698ab6ee7b5fad823aa7e7f1
-
SHA512
39dc875bd0405b313c29963d5bc459a2f404a930ef072bbe3fce4b07d1bfd93a7fd2c540d5ff67eb9be37da20c2bdfbf005a47aa572161dff732af2ec82c2a92
-
SSDEEP
6144:9hbZ5hMTNFf8LAurlEzAX7o5hn8wVSZ2sXx6:vtXMzqrllX7618wN
Malware Config
Signatures
-
Executes dropped EXE 25 IoCs
pid Process 1756 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202.exe 2968 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202a.exe 2716 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202b.exe 2984 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202c.exe 2960 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202d.exe 2608 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202e.exe 2660 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202f.exe 1100 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202g.exe 1952 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202h.exe 1716 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202i.exe 1700 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202j.exe 1076 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202k.exe 2440 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202l.exe 2704 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202m.exe 788 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202n.exe 700 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202o.exe 1788 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202p.exe 812 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202q.exe 1364 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202r.exe 2488 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202s.exe 2416 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202t.exe 2564 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202u.exe 1808 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202v.exe 1268 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202w.exe 3048 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202y.exe -
Loads dropped DLL 50 IoCs
pid Process 2404 a82b32821738b504f4165483d7eeb490_JaffaCakes118.exe 2404 a82b32821738b504f4165483d7eeb490_JaffaCakes118.exe 1756 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202.exe 1756 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202.exe 2968 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202a.exe 2968 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202a.exe 2716 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202b.exe 2716 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202b.exe 2984 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202c.exe 2984 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202c.exe 2960 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202d.exe 2960 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202d.exe 2608 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202e.exe 2608 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202e.exe 2660 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202f.exe 2660 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202f.exe 1100 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202g.exe 1100 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202g.exe 1952 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202h.exe 1952 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202h.exe 1716 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202i.exe 1716 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202i.exe 1700 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202j.exe 1700 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202j.exe 1076 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202k.exe 1076 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202k.exe 2440 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202l.exe 2440 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202l.exe 2704 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202m.exe 2704 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202m.exe 788 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202n.exe 788 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202n.exe 700 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202o.exe 700 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202o.exe 1788 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202p.exe 1788 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202p.exe 812 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202q.exe 812 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202q.exe 1364 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202r.exe 1364 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202r.exe 2488 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202s.exe 2488 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202s.exe 2416 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202t.exe 2416 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202t.exe 2564 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202u.exe 2564 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202u.exe 1808 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202v.exe 1808 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202v.exe 1572 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202x.exe 1572 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202x.exe -
Adds Run key to start application 2 TTPs 26 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\a82b32821738b504f4165483d7eeb490_jaffacakes118_3202j.exe\"" a82b32821738b504f4165483d7eeb490_jaffacakes118_3202i.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\a82b32821738b504f4165483d7eeb490_jaffacakes118_3202l.exe\"" a82b32821738b504f4165483d7eeb490_jaffacakes118_3202k.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\a82b32821738b504f4165483d7eeb490_jaffacakes118_3202m.exe\"" a82b32821738b504f4165483d7eeb490_jaffacakes118_3202l.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\a82b32821738b504f4165483d7eeb490_jaffacakes118_3202g.exe\"" a82b32821738b504f4165483d7eeb490_jaffacakes118_3202f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\a82b32821738b504f4165483d7eeb490_jaffacakes118_3202.exe\"" a82b32821738b504f4165483d7eeb490_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\a82b32821738b504f4165483d7eeb490_jaffacakes118_3202r.exe\"" a82b32821738b504f4165483d7eeb490_jaffacakes118_3202q.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\a82b32821738b504f4165483d7eeb490_jaffacakes118_3202t.exe\"" a82b32821738b504f4165483d7eeb490_jaffacakes118_3202s.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\a82b32821738b504f4165483d7eeb490_jaffacakes118_3202w.exe\"" a82b32821738b504f4165483d7eeb490_jaffacakes118_3202v.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\a82b32821738b504f4165483d7eeb490_jaffacakes118_3202x.exe\"" a82b32821738b504f4165483d7eeb490_jaffacakes118_3202w.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\a82b32821738b504f4165483d7eeb490_jaffacakes118_3202a.exe\"" a82b32821738b504f4165483d7eeb490_jaffacakes118_3202.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\a82b32821738b504f4165483d7eeb490_jaffacakes118_3202v.exe\"" a82b32821738b504f4165483d7eeb490_jaffacakes118_3202u.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\a82b32821738b504f4165483d7eeb490_jaffacakes118_3202c.exe\"" a82b32821738b504f4165483d7eeb490_jaffacakes118_3202b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\a82b32821738b504f4165483d7eeb490_jaffacakes118_3202e.exe\"" a82b32821738b504f4165483d7eeb490_jaffacakes118_3202d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\a82b32821738b504f4165483d7eeb490_jaffacakes118_3202n.exe\"" a82b32821738b504f4165483d7eeb490_jaffacakes118_3202m.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\a82b32821738b504f4165483d7eeb490_jaffacakes118_3202p.exe\"" a82b32821738b504f4165483d7eeb490_jaffacakes118_3202o.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\a82b32821738b504f4165483d7eeb490_jaffacakes118_3202u.exe\"" a82b32821738b504f4165483d7eeb490_jaffacakes118_3202t.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\a82b32821738b504f4165483d7eeb490_jaffacakes118_3202d.exe\"" a82b32821738b504f4165483d7eeb490_jaffacakes118_3202c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\a82b32821738b504f4165483d7eeb490_jaffacakes118_3202h.exe\"" a82b32821738b504f4165483d7eeb490_jaffacakes118_3202g.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\a82b32821738b504f4165483d7eeb490_jaffacakes118_3202k.exe\"" a82b32821738b504f4165483d7eeb490_jaffacakes118_3202j.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\a82b32821738b504f4165483d7eeb490_jaffacakes118_3202s.exe\"" a82b32821738b504f4165483d7eeb490_jaffacakes118_3202r.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\a82b32821738b504f4165483d7eeb490_jaffacakes118_3202y.exe\"" a82b32821738b504f4165483d7eeb490_jaffacakes118_3202x.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\a82b32821738b504f4165483d7eeb490_jaffacakes118_3202f.exe\"" a82b32821738b504f4165483d7eeb490_jaffacakes118_3202e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\a82b32821738b504f4165483d7eeb490_jaffacakes118_3202o.exe\"" a82b32821738b504f4165483d7eeb490_jaffacakes118_3202n.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\a82b32821738b504f4165483d7eeb490_jaffacakes118_3202q.exe\"" a82b32821738b504f4165483d7eeb490_jaffacakes118_3202p.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\a82b32821738b504f4165483d7eeb490_jaffacakes118_3202b.exe\"" a82b32821738b504f4165483d7eeb490_jaffacakes118_3202a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\a82b32821738b504f4165483d7eeb490_jaffacakes118_3202i.exe\"" a82b32821738b504f4165483d7eeb490_jaffacakes118_3202h.exe -
System Location Discovery: System Language Discovery 1 TTPs 27 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a82b32821738b504f4165483d7eeb490_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a82b32821738b504f4165483d7eeb490_jaffacakes118_3202.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a82b32821738b504f4165483d7eeb490_jaffacakes118_3202c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a82b32821738b504f4165483d7eeb490_jaffacakes118_3202g.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a82b32821738b504f4165483d7eeb490_jaffacakes118_3202t.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a82b32821738b504f4165483d7eeb490_jaffacakes118_3202w.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a82b32821738b504f4165483d7eeb490_jaffacakes118_3202u.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a82b32821738b504f4165483d7eeb490_jaffacakes118_3202b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a82b32821738b504f4165483d7eeb490_jaffacakes118_3202d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a82b32821738b504f4165483d7eeb490_jaffacakes118_3202v.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a82b32821738b504f4165483d7eeb490_jaffacakes118_3202f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a82b32821738b504f4165483d7eeb490_jaffacakes118_3202y.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a82b32821738b504f4165483d7eeb490_jaffacakes118_3202j.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a82b32821738b504f4165483d7eeb490_jaffacakes118_3202n.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a82b32821738b504f4165483d7eeb490_jaffacakes118_3202p.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a82b32821738b504f4165483d7eeb490_jaffacakes118_3202q.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a82b32821738b504f4165483d7eeb490_jaffacakes118_3202r.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a82b32821738b504f4165483d7eeb490_jaffacakes118_3202x.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a82b32821738b504f4165483d7eeb490_jaffacakes118_3202e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a82b32821738b504f4165483d7eeb490_jaffacakes118_3202i.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a82b32821738b504f4165483d7eeb490_jaffacakes118_3202k.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a82b32821738b504f4165483d7eeb490_jaffacakes118_3202l.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a82b32821738b504f4165483d7eeb490_jaffacakes118_3202m.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a82b32821738b504f4165483d7eeb490_jaffacakes118_3202a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a82b32821738b504f4165483d7eeb490_jaffacakes118_3202o.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a82b32821738b504f4165483d7eeb490_jaffacakes118_3202s.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a82b32821738b504f4165483d7eeb490_jaffacakes118_3202h.exe -
Modifies registry class 54 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} a82b32821738b504f4165483d7eeb490_jaffacakes118_3202j.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = e01e69c758354f51 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202m.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} a82b32821738b504f4165483d7eeb490_jaffacakes118_3202p.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} a82b32821738b504f4165483d7eeb490_jaffacakes118_3202r.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = e01e69c758354f51 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202u.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} a82b32821738b504f4165483d7eeb490_jaffacakes118_3202y.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} a82b32821738b504f4165483d7eeb490_JaffaCakes118.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} a82b32821738b504f4165483d7eeb490_jaffacakes118_3202d.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = e01e69c758354f51 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202f.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} a82b32821738b504f4165483d7eeb490_jaffacakes118_3202q.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = e01e69c758354f51 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202b.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = e01e69c758354f51 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202i.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = e01e69c758354f51 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202r.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} a82b32821738b504f4165483d7eeb490_jaffacakes118_3202s.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = e01e69c758354f51 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202x.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} a82b32821738b504f4165483d7eeb490_jaffacakes118_3202o.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = e01e69c758354f51 a82b32821738b504f4165483d7eeb490_JaffaCakes118.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} a82b32821738b504f4165483d7eeb490_jaffacakes118_3202i.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = e01e69c758354f51 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202q.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = e01e69c758354f51 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202v.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} a82b32821738b504f4165483d7eeb490_jaffacakes118_3202a.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = e01e69c758354f51 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202d.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} a82b32821738b504f4165483d7eeb490_jaffacakes118_3202k.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} a82b32821738b504f4165483d7eeb490_jaffacakes118_3202l.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} a82b32821738b504f4165483d7eeb490_jaffacakes118_3202t.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} a82b32821738b504f4165483d7eeb490_jaffacakes118_3202v.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} a82b32821738b504f4165483d7eeb490_jaffacakes118_3202c.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} a82b32821738b504f4165483d7eeb490_jaffacakes118_3202.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = e01e69c758354f51 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202j.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = e01e69c758354f51 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202l.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = e01e69c758354f51 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202s.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = e01e69c758354f51 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202k.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = e01e69c758354f51 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202o.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} a82b32821738b504f4165483d7eeb490_jaffacakes118_3202w.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = e01e69c758354f51 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202e.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = e01e69c758354f51 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202a.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = e01e69c758354f51 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202h.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = e01e69c758354f51 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202t.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = e01e69c758354f51 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202p.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} a82b32821738b504f4165483d7eeb490_jaffacakes118_3202u.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} a82b32821738b504f4165483d7eeb490_jaffacakes118_3202x.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} a82b32821738b504f4165483d7eeb490_jaffacakes118_3202e.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} a82b32821738b504f4165483d7eeb490_jaffacakes118_3202f.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} a82b32821738b504f4165483d7eeb490_jaffacakes118_3202m.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} a82b32821738b504f4165483d7eeb490_jaffacakes118_3202n.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = e01e69c758354f51 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = e01e69c758354f51 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202g.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} a82b32821738b504f4165483d7eeb490_jaffacakes118_3202h.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = e01e69c758354f51 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202n.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = e01e69c758354f51 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202y.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} a82b32821738b504f4165483d7eeb490_jaffacakes118_3202b.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = e01e69c758354f51 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202c.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} a82b32821738b504f4165483d7eeb490_jaffacakes118_3202g.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 6b5542522ae49479 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202w.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2404 wrote to memory of 1756 2404 a82b32821738b504f4165483d7eeb490_JaffaCakes118.exe 30 PID 2404 wrote to memory of 1756 2404 a82b32821738b504f4165483d7eeb490_JaffaCakes118.exe 30 PID 2404 wrote to memory of 1756 2404 a82b32821738b504f4165483d7eeb490_JaffaCakes118.exe 30 PID 2404 wrote to memory of 1756 2404 a82b32821738b504f4165483d7eeb490_JaffaCakes118.exe 30 PID 1756 wrote to memory of 2968 1756 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202.exe 31 PID 1756 wrote to memory of 2968 1756 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202.exe 31 PID 1756 wrote to memory of 2968 1756 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202.exe 31 PID 1756 wrote to memory of 2968 1756 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202.exe 31 PID 2968 wrote to memory of 2716 2968 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202a.exe 33 PID 2968 wrote to memory of 2716 2968 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202a.exe 33 PID 2968 wrote to memory of 2716 2968 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202a.exe 33 PID 2968 wrote to memory of 2716 2968 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202a.exe 33 PID 2716 wrote to memory of 2984 2716 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202b.exe 34 PID 2716 wrote to memory of 2984 2716 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202b.exe 34 PID 2716 wrote to memory of 2984 2716 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202b.exe 34 PID 2716 wrote to memory of 2984 2716 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202b.exe 34 PID 2984 wrote to memory of 2960 2984 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202c.exe 35 PID 2984 wrote to memory of 2960 2984 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202c.exe 35 PID 2984 wrote to memory of 2960 2984 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202c.exe 35 PID 2984 wrote to memory of 2960 2984 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202c.exe 35 PID 2960 wrote to memory of 2608 2960 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202d.exe 36 PID 2960 wrote to memory of 2608 2960 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202d.exe 36 PID 2960 wrote to memory of 2608 2960 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202d.exe 36 PID 2960 wrote to memory of 2608 2960 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202d.exe 36 PID 2608 wrote to memory of 2660 2608 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202e.exe 37 PID 2608 wrote to memory of 2660 2608 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202e.exe 37 PID 2608 wrote to memory of 2660 2608 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202e.exe 37 PID 2608 wrote to memory of 2660 2608 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202e.exe 37 PID 2660 wrote to memory of 1100 2660 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202f.exe 38 PID 2660 wrote to memory of 1100 2660 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202f.exe 38 PID 2660 wrote to memory of 1100 2660 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202f.exe 38 PID 2660 wrote to memory of 1100 2660 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202f.exe 38 PID 1100 wrote to memory of 1952 1100 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202g.exe 39 PID 1100 wrote to memory of 1952 1100 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202g.exe 39 PID 1100 wrote to memory of 1952 1100 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202g.exe 39 PID 1100 wrote to memory of 1952 1100 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202g.exe 39 PID 1952 wrote to memory of 1716 1952 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202h.exe 40 PID 1952 wrote to memory of 1716 1952 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202h.exe 40 PID 1952 wrote to memory of 1716 1952 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202h.exe 40 PID 1952 wrote to memory of 1716 1952 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202h.exe 40 PID 1716 wrote to memory of 1700 1716 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202i.exe 41 PID 1716 wrote to memory of 1700 1716 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202i.exe 41 PID 1716 wrote to memory of 1700 1716 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202i.exe 41 PID 1716 wrote to memory of 1700 1716 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202i.exe 41 PID 1700 wrote to memory of 1076 1700 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202j.exe 42 PID 1700 wrote to memory of 1076 1700 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202j.exe 42 PID 1700 wrote to memory of 1076 1700 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202j.exe 42 PID 1700 wrote to memory of 1076 1700 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202j.exe 42 PID 1076 wrote to memory of 2440 1076 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202k.exe 43 PID 1076 wrote to memory of 2440 1076 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202k.exe 43 PID 1076 wrote to memory of 2440 1076 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202k.exe 43 PID 1076 wrote to memory of 2440 1076 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202k.exe 43 PID 2440 wrote to memory of 2704 2440 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202l.exe 44 PID 2440 wrote to memory of 2704 2440 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202l.exe 44 PID 2440 wrote to memory of 2704 2440 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202l.exe 44 PID 2440 wrote to memory of 2704 2440 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202l.exe 44 PID 2704 wrote to memory of 788 2704 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202m.exe 45 PID 2704 wrote to memory of 788 2704 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202m.exe 45 PID 2704 wrote to memory of 788 2704 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202m.exe 45 PID 2704 wrote to memory of 788 2704 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202m.exe 45 PID 788 wrote to memory of 700 788 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202n.exe 46 PID 788 wrote to memory of 700 788 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202n.exe 46 PID 788 wrote to memory of 700 788 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202n.exe 46 PID 788 wrote to memory of 700 788 a82b32821738b504f4165483d7eeb490_jaffacakes118_3202n.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\a82b32821738b504f4165483d7eeb490_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a82b32821738b504f4165483d7eeb490_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2404 -
\??\c:\users\admin\appdata\local\temp\a82b32821738b504f4165483d7eeb490_jaffacakes118_3202.exec:\users\admin\appdata\local\temp\a82b32821738b504f4165483d7eeb490_jaffacakes118_3202.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1756 -
\??\c:\users\admin\appdata\local\temp\a82b32821738b504f4165483d7eeb490_jaffacakes118_3202a.exec:\users\admin\appdata\local\temp\a82b32821738b504f4165483d7eeb490_jaffacakes118_3202a.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2968 -
\??\c:\users\admin\appdata\local\temp\a82b32821738b504f4165483d7eeb490_jaffacakes118_3202b.exec:\users\admin\appdata\local\temp\a82b32821738b504f4165483d7eeb490_jaffacakes118_3202b.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2716 -
\??\c:\users\admin\appdata\local\temp\a82b32821738b504f4165483d7eeb490_jaffacakes118_3202c.exec:\users\admin\appdata\local\temp\a82b32821738b504f4165483d7eeb490_jaffacakes118_3202c.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2984 -
\??\c:\users\admin\appdata\local\temp\a82b32821738b504f4165483d7eeb490_jaffacakes118_3202d.exec:\users\admin\appdata\local\temp\a82b32821738b504f4165483d7eeb490_jaffacakes118_3202d.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2960 -
\??\c:\users\admin\appdata\local\temp\a82b32821738b504f4165483d7eeb490_jaffacakes118_3202e.exec:\users\admin\appdata\local\temp\a82b32821738b504f4165483d7eeb490_jaffacakes118_3202e.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2608 -
\??\c:\users\admin\appdata\local\temp\a82b32821738b504f4165483d7eeb490_jaffacakes118_3202f.exec:\users\admin\appdata\local\temp\a82b32821738b504f4165483d7eeb490_jaffacakes118_3202f.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2660 -
\??\c:\users\admin\appdata\local\temp\a82b32821738b504f4165483d7eeb490_jaffacakes118_3202g.exec:\users\admin\appdata\local\temp\a82b32821738b504f4165483d7eeb490_jaffacakes118_3202g.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1100 -
\??\c:\users\admin\appdata\local\temp\a82b32821738b504f4165483d7eeb490_jaffacakes118_3202h.exec:\users\admin\appdata\local\temp\a82b32821738b504f4165483d7eeb490_jaffacakes118_3202h.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1952 -
\??\c:\users\admin\appdata\local\temp\a82b32821738b504f4165483d7eeb490_jaffacakes118_3202i.exec:\users\admin\appdata\local\temp\a82b32821738b504f4165483d7eeb490_jaffacakes118_3202i.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1716 -
\??\c:\users\admin\appdata\local\temp\a82b32821738b504f4165483d7eeb490_jaffacakes118_3202j.exec:\users\admin\appdata\local\temp\a82b32821738b504f4165483d7eeb490_jaffacakes118_3202j.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1700 -
\??\c:\users\admin\appdata\local\temp\a82b32821738b504f4165483d7eeb490_jaffacakes118_3202k.exec:\users\admin\appdata\local\temp\a82b32821738b504f4165483d7eeb490_jaffacakes118_3202k.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1076 -
\??\c:\users\admin\appdata\local\temp\a82b32821738b504f4165483d7eeb490_jaffacakes118_3202l.exec:\users\admin\appdata\local\temp\a82b32821738b504f4165483d7eeb490_jaffacakes118_3202l.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2440 -
\??\c:\users\admin\appdata\local\temp\a82b32821738b504f4165483d7eeb490_jaffacakes118_3202m.exec:\users\admin\appdata\local\temp\a82b32821738b504f4165483d7eeb490_jaffacakes118_3202m.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2704 -
\??\c:\users\admin\appdata\local\temp\a82b32821738b504f4165483d7eeb490_jaffacakes118_3202n.exec:\users\admin\appdata\local\temp\a82b32821738b504f4165483d7eeb490_jaffacakes118_3202n.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:788 -
\??\c:\users\admin\appdata\local\temp\a82b32821738b504f4165483d7eeb490_jaffacakes118_3202o.exec:\users\admin\appdata\local\temp\a82b32821738b504f4165483d7eeb490_jaffacakes118_3202o.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:700 -
\??\c:\users\admin\appdata\local\temp\a82b32821738b504f4165483d7eeb490_jaffacakes118_3202p.exec:\users\admin\appdata\local\temp\a82b32821738b504f4165483d7eeb490_jaffacakes118_3202p.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1788 -
\??\c:\users\admin\appdata\local\temp\a82b32821738b504f4165483d7eeb490_jaffacakes118_3202q.exec:\users\admin\appdata\local\temp\a82b32821738b504f4165483d7eeb490_jaffacakes118_3202q.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:812 -
\??\c:\users\admin\appdata\local\temp\a82b32821738b504f4165483d7eeb490_jaffacakes118_3202r.exec:\users\admin\appdata\local\temp\a82b32821738b504f4165483d7eeb490_jaffacakes118_3202r.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1364 -
\??\c:\users\admin\appdata\local\temp\a82b32821738b504f4165483d7eeb490_jaffacakes118_3202s.exec:\users\admin\appdata\local\temp\a82b32821738b504f4165483d7eeb490_jaffacakes118_3202s.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2488 -
\??\c:\users\admin\appdata\local\temp\a82b32821738b504f4165483d7eeb490_jaffacakes118_3202t.exec:\users\admin\appdata\local\temp\a82b32821738b504f4165483d7eeb490_jaffacakes118_3202t.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2416 -
\??\c:\users\admin\appdata\local\temp\a82b32821738b504f4165483d7eeb490_jaffacakes118_3202u.exec:\users\admin\appdata\local\temp\a82b32821738b504f4165483d7eeb490_jaffacakes118_3202u.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2564 -
\??\c:\users\admin\appdata\local\temp\a82b32821738b504f4165483d7eeb490_jaffacakes118_3202v.exec:\users\admin\appdata\local\temp\a82b32821738b504f4165483d7eeb490_jaffacakes118_3202v.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1808 -
\??\c:\users\admin\appdata\local\temp\a82b32821738b504f4165483d7eeb490_jaffacakes118_3202w.exec:\users\admin\appdata\local\temp\a82b32821738b504f4165483d7eeb490_jaffacakes118_3202w.exe25⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1268 -
\??\c:\users\admin\appdata\local\temp\a82b32821738b504f4165483d7eeb490_jaffacakes118_3202x.exec:\users\admin\appdata\local\temp\a82b32821738b504f4165483d7eeb490_jaffacakes118_3202x.exe26⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1572 -
\??\c:\users\admin\appdata\local\temp\a82b32821738b504f4165483d7eeb490_jaffacakes118_3202y.exec:\users\admin\appdata\local\temp\a82b32821738b504f4165483d7eeb490_jaffacakes118_3202y.exe27⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3048
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
232KB
MD58c81e37c1e857863d3df1e4968c21219
SHA1ac64aa9839de139a6b1e21ab52bfcef3dbce0c88
SHA256052820a44eb43b37043f44f76926b534f8e9912bd19ecea2477fad05a46382b7
SHA512edb49725255cf448f415f476b70f0fb36bc2f289028891cf48aeb728eb59ec9cfe49ab7b5859039aec6a34b66f3ac82694485d7bbd7e00762add3fd96c442cfa
-
Filesize
232KB
MD594201504cbb1403135879326404927c0
SHA19ca91d57f7c6326bebddd3260402cae77d8b56f8
SHA2560f0704f2e63e8b800b8f8aed17fef5249b7a3532f98f04c11972f8d5442bacda
SHA5120e49256075d6656e663d356fd826847ae96f89e5727755b1a6baeb6b91e0979a6cee9fdbb838aa3afc46c50aca464583b1dce1e1e7df47bcdf7f189c87a18983