Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 23:43
Static task
static1
Behavioral task
behavioral1
Sample
c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe
-
Size
27KB
-
MD5
c1d60bd69f7401a7b89e68477568890b
-
SHA1
69bb44e4deee308720df5d7875ada0713a77500b
-
SHA256
8acc540558b6b27cb3cb317f518be14c8fa14357c95f9121645b6f05b77ae934
-
SHA512
03497a5c2283442eb8861ba1354d43652f4088793ee56e2113098e6566f65781829a9afb6cf7db9ade3cc7dfee0960d306da14e7e365617534f6636b11b4c636
-
SSDEEP
768:vGt/RmafR6e2pjX9rNxpyxc7JbTi3ckCI:vYRVke2p79RxWc7n8
Malware Config
Signatures
-
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.EXE\Debugger = "C:\\Windows\\system32\\wauc11.exe" c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVSrvXP.EXE c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVP.EXE\Debugger = "C:\\Windows\\system32\\wauc11.exe" c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KRegEx.EXE\Debugger = "C:\\Windows\\system32\\wauc11.exe" c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kwatch.EXE\Debugger = "C:\\Windows\\system32\\wauc11.exe" c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Runiep.EXE c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Runiep.EXE\Debugger = "C:\\Windows\\system32\\wauc11.exe" c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PFW.EXE\Debugger = "C:\\Windows\\system32\\wauc11.exe" c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Iparmor.EXE c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Navapsvc.EXE c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Nod32kui.EXE\Debugger = "C:\\Windows\\system32\\wauc11.exe" c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kwatch.EXE c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rfwproxy.EXE\Debugger = "C:\\Windows\\system32\\wauc11.exe" c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavUpdate.EXE c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavUpdate.EXE\Debugger = "C:\\Windows\\system32\\wauc11.exe" c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVSrvXP.EXE\Debugger = "C:\\Windows\\system32\\wauc11.exe" c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\VPC32.EXE c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KASARP.EXE c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regedit.EXE\Debugger = "C:\\Windows\\system32\\wauc11.exe" c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kmailmon.EXE\Debugger = "C:\\Windows\\system32\\wauc11.exe" c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rfwmain.EXE\Debugger = "C:\\Windows\\system32\\wauc11.exe" c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVWSC.EXE c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regedit.EXE c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AutoRunKiller.EXE c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rfwsrv.EXE c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Ast.EXE c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\VPTRAY.EXE c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\VPTRAY.EXE\Debugger = "C:\\Windows\\system32\\wauc11.exe" c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\GuardField.EXE c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kavstart.EXE c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\CCenter.EXE c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVMonxp.kxp\Debugger = "C:\\Windows\\system32\\wauc11.exe" c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Nod32kui.EXE c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kavstart.EXE\Debugger = "C:\\Windows\\system32\\wauc11.exe" c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360rpt.EXE c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AvMonitor.EXE\Debugger = "C:\\Windows\\system32\\wauc11.exe" c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVWSC.EXE\Debugger = "C:\\Windows\\system32\\wauc11.exe" c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kmailmon.EXE c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Mmsk.EXE c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KASARP.EXE\Debugger = "C:\\Windows\\system32\\wauc11.exe" c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rfwsrv.EXE\Debugger = "C:\\Windows\\system32\\wauc11.exe" c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVStart.EXE c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360safe.EXE\Debugger = "C:\\Windows\\system32\\wauc11.exe" c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Iparmor.EXE\Debugger = "C:\\Windows\\system32\\wauc11.exe" c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Frameworkservice.EXE\Debugger = "C:\\Windows\\system32\\wauc11.exe" c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Mmsk.EXE\Debugger = "C:\\Windows\\system32\\wauc11.exe" c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WOPTILITIES.EXE c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ANTIARP.EXE\Debugger = "C:\\Windows\\system32\\wauc11.exe" c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\GuardField.EXE\Debugger = "C:\\Windows\\system32\\wauc11.exe" c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\GFUpd.EXE c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360rpt.EXE\Debugger = "C:\\Windows\\system32\\wauc11.exe" c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\IceSword.EXE\Debugger = "C:\\Windows\\system32\\wauc11.exe" c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Navapsvc.EXE\Debugger = "C:\\Windows\\system32\\wauc11.exe" c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Wuauclt.EXE\Debugger = "C:\\Windows\\system32\\wauc11.exe" c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Ast.EXE\Debugger = "C:\\Windows\\system32\\wauc11.exe" c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WOPTILITIES.EXE\Debugger = "C:\\Windows\\system32\\wauc11.exe" c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AutoRunKiller.EXE\Debugger = "C:\\Windows\\system32\\wauc11.exe" c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\~.EXE c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\CCenter.EXE\Debugger = "C:\\Windows\\system32\\wauc11.exe" c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\IceSword.EXE c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVMonxp.kxp c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RAS.EXE\Debugger = "C:\\Windows\\system32\\wauc11.exe" c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\GFUpd.EXE\Debugger = "C:\\Windows\\system32\\wauc11.exe" c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rfwmain.EXE c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2860 c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 3008 c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Q: c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe File opened (read-only) \??\T: c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe File opened (read-only) \??\V: c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe File opened (read-only) \??\X: c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe File opened (read-only) \??\I: c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe File opened (read-only) \??\K: c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe File opened (read-only) \??\O: c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe File opened (read-only) \??\U: c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe File opened (read-only) \??\M: c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe File opened (read-only) \??\N: c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe File opened (read-only) \??\L: c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe File opened (read-only) \??\S: c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe File opened (read-only) \??\Y: c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe File opened (read-only) \??\Z: c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe File opened (read-only) \??\H: c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe File opened (read-only) \??\J: c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe File opened (read-only) \??\P: c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe File opened (read-only) \??\R: c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe File opened (read-only) \??\W: c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe File opened (read-only) \??\E: c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe File opened (read-only) \??\G: c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe -
Drops autorun.inf file 1 TTPs 4 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\AUTORUN.INF c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe File created C:\AUTORUN.INF c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe File opened for modification F:\AUTORUN.INF c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe File created F:\AUTORUN.INF c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\MFCN4213d.DLL c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\MFCN4213d.DLL c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe File created C:\Windows\SysWOW64\wauc11.exe c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe File created C:\Windows\SysWOW64\explorer.exe c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wauc11.exe c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3008 set thread context of 2860 3008 c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe 74 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 43 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "1869919220" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B0615921-B884-11D6-BDB7-FE3EAF6E2A14} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 36 IoCs
pid Process 3008 c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe 3008 c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe 3008 c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe 3008 c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe 3008 c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe 3008 c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe 3008 c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe 3008 c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe 3008 c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe 3008 c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe 3008 c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe 3008 c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe 3008 c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe 3008 c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe 3008 c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe 3008 c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe 3008 c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe 3008 c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe 3008 c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe 3008 c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe 3008 c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe 3008 c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe 3008 c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe 3008 c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe 3008 c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe 3008 c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe 3008 c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe 3008 c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe 3008 c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe 3008 c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe 3008 c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe 3008 c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe 3008 c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe 3008 c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe 3008 c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe 3008 c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeDebugPrivilege 3008 c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe Token: SeSystemtimePrivilege 3008 c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe Token: SeBackupPrivilege 3008 c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe Token: SeRestorePrivilege 3008 c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe Token: SeRestorePrivilege 3008 c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe Token: SeRestorePrivilege 3008 c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe Token: SeRestorePrivilege 3008 c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe Token: SeRestorePrivilege 3008 c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe Token: SeBackupPrivilege 3008 c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe Token: SeRestorePrivilege 3008 c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe Token: SeRestorePrivilege 3008 c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe Token: SeRestorePrivilege 3008 c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe Token: SeRestorePrivilege 3008 c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe Token: SeRestorePrivilege 3008 c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3068 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE 1796 IEXPLORE.EXE 1796 IEXPLORE.EXE 1796 IEXPLORE.EXE 1796 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3008 wrote to memory of 1084 3008 c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe 30 PID 3008 wrote to memory of 1084 3008 c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe 30 PID 3008 wrote to memory of 1084 3008 c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe 30 PID 3008 wrote to memory of 1084 3008 c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe 30 PID 1084 wrote to memory of 1744 1084 cmd.exe 32 PID 1084 wrote to memory of 1744 1084 cmd.exe 32 PID 1084 wrote to memory of 1744 1084 cmd.exe 32 PID 1084 wrote to memory of 1744 1084 cmd.exe 32 PID 1744 wrote to memory of 2368 1744 net.exe 33 PID 1744 wrote to memory of 2368 1744 net.exe 33 PID 1744 wrote to memory of 2368 1744 net.exe 33 PID 1744 wrote to memory of 2368 1744 net.exe 33 PID 3008 wrote to memory of 2596 3008 c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe 34 PID 3008 wrote to memory of 2596 3008 c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe 34 PID 3008 wrote to memory of 2596 3008 c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe 34 PID 3008 wrote to memory of 2596 3008 c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe 34 PID 2596 wrote to memory of 2672 2596 cmd.exe 36 PID 2596 wrote to memory of 2672 2596 cmd.exe 36 PID 2596 wrote to memory of 2672 2596 cmd.exe 36 PID 2596 wrote to memory of 2672 2596 cmd.exe 36 PID 2672 wrote to memory of 2676 2672 net.exe 37 PID 2672 wrote to memory of 2676 2672 net.exe 37 PID 2672 wrote to memory of 2676 2672 net.exe 37 PID 2672 wrote to memory of 2676 2672 net.exe 37 PID 3008 wrote to memory of 2684 3008 c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe 38 PID 3008 wrote to memory of 2684 3008 c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe 38 PID 3008 wrote to memory of 2684 3008 c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe 38 PID 3008 wrote to memory of 2684 3008 c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe 38 PID 2684 wrote to memory of 2600 2684 cmd.exe 40 PID 2684 wrote to memory of 2600 2684 cmd.exe 40 PID 2684 wrote to memory of 2600 2684 cmd.exe 40 PID 2684 wrote to memory of 2600 2684 cmd.exe 40 PID 2600 wrote to memory of 2744 2600 net.exe 41 PID 2600 wrote to memory of 2744 2600 net.exe 41 PID 2600 wrote to memory of 2744 2600 net.exe 41 PID 2600 wrote to memory of 2744 2600 net.exe 41 PID 3008 wrote to memory of 2700 3008 c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe 42 PID 3008 wrote to memory of 2700 3008 c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe 42 PID 3008 wrote to memory of 2700 3008 c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe 42 PID 3008 wrote to memory of 2700 3008 c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe 42 PID 2700 wrote to memory of 2336 2700 cmd.exe 44 PID 2700 wrote to memory of 2336 2700 cmd.exe 44 PID 2700 wrote to memory of 2336 2700 cmd.exe 44 PID 2700 wrote to memory of 2336 2700 cmd.exe 44 PID 2336 wrote to memory of 2896 2336 net.exe 45 PID 2336 wrote to memory of 2896 2336 net.exe 45 PID 2336 wrote to memory of 2896 2336 net.exe 45 PID 2336 wrote to memory of 2896 2336 net.exe 45 PID 3008 wrote to memory of 2688 3008 c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe 46 PID 3008 wrote to memory of 2688 3008 c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe 46 PID 3008 wrote to memory of 2688 3008 c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe 46 PID 3008 wrote to memory of 2688 3008 c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe 46 PID 2688 wrote to memory of 2460 2688 cmd.exe 48 PID 2688 wrote to memory of 2460 2688 cmd.exe 48 PID 2688 wrote to memory of 2460 2688 cmd.exe 48 PID 2688 wrote to memory of 2460 2688 cmd.exe 48 PID 2460 wrote to memory of 2456 2460 net.exe 49 PID 2460 wrote to memory of 2456 2460 net.exe 49 PID 2460 wrote to memory of 2456 2460 net.exe 49 PID 2460 wrote to memory of 2456 2460 net.exe 49 PID 3008 wrote to memory of 2476 3008 c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe 50 PID 3008 wrote to memory of 2476 3008 c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe 50 PID 3008 wrote to memory of 2476 3008 c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe 50 PID 3008 wrote to memory of 2476 3008 c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe 50
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe"1⤵
- Event Triggered Execution: Image File Execution Options Injection
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\cmd.execmd /c net stop McShield2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Windows\SysWOW64\net.exenet stop McShield3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop McShield4⤵
- System Location Discovery: System Language Discovery
PID:2368
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop KWhatchsvc2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\net.exenet stop KWhatchsvc3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop KWhatchsvc4⤵
- System Location Discovery: System Language Discovery
PID:2676
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop KPfwSvc2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\net.exenet stop KPfwSvc3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop KPfwSvc4⤵
- System Location Discovery: System Language Discovery
PID:2744
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop "Symantec AntiVirus"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\net.exenet stop "Symantec AntiVirus"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Symantec AntiVirus"4⤵
- System Location Discovery: System Language Discovery
PID:2896
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop "Symantec AntiVirus Drivers Services"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\net.exenet stop "Symantec AntiVirus Drivers Services"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Symantec AntiVirus Drivers Services"4⤵
- System Location Discovery: System Language Discovery
PID:2456
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop "Symantec AntiVirus Definition Watcher"2⤵
- System Location Discovery: System Language Discovery
PID:2476 -
C:\Windows\SysWOW64\net.exenet stop "Symantec AntiVirus Definition Watcher"3⤵
- System Location Discovery: System Language Discovery
PID:2536 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Symantec AntiVirus Definition Watcher"4⤵
- System Location Discovery: System Language Discovery
PID:1708
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop "McAfee Framework ·þÎñ"2⤵
- System Location Discovery: System Language Discovery
PID:2984 -
C:\Windows\SysWOW64\net.exenet stop "McAfee Framework ·þÎñ"3⤵
- System Location Discovery: System Language Discovery
PID:1956 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "McAfee Framework ·þÎñ"4⤵
- System Location Discovery: System Language Discovery
PID:2988
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop "McAfee Framework Service"2⤵
- System Location Discovery: System Language Discovery
PID:1684 -
C:\Windows\SysWOW64\net.exenet stop "McAfee Framework Service"3⤵
- System Location Discovery: System Language Discovery
PID:1384 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "McAfee Framework Service"4⤵
- System Location Discovery: System Language Discovery
PID:1576
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop "Network Associates McShield"2⤵
- System Location Discovery: System Language Discovery
PID:2144 -
C:\Windows\SysWOW64\net.exenet stop "Network Associates McShield"3⤵
- System Location Discovery: System Language Discovery
PID:1216 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Network Associates McShield"4⤵
- System Location Discovery: System Language Discovery
PID:2432
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop "Network Associates Task Manager"2⤵
- System Location Discovery: System Language Discovery
PID:2808 -
C:\Windows\SysWOW64\net.exenet stop "Network Associates Task Manager"3⤵
- System Location Discovery: System Language Discovery
PID:536 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Network Associates Task Manager"4⤵
- System Location Discovery: System Language Discovery
PID:2924
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop "Norton AntiVirus Server"2⤵
- System Location Discovery: System Language Discovery
PID:1964 -
C:\Windows\SysWOW64\net.exenet stop "Norton AntiVirus Server"3⤵
- System Location Discovery: System Language Discovery
PID:2716 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Norton AntiVirus Server"4⤵
- System Location Discovery: System Language Discovery
PID:2792
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c1d60bd69f7401a7b89e68477568890b_JaffaCakes118.exe2⤵
- Executes dropped EXE
PID:2860
-
-
C:\Windows\SysWOW64\cacls.exe"C:\Windows\System32\cacls.exe" C:\Windows\system32\packet.dll /e /p everyone:f2⤵
- System Location Discovery: System Language Discovery
PID:2916
-
-
C:\Windows\SysWOW64\cacls.exe"C:\Windows\System32\cacls.exe" C:\Windows\system32\pthreadVC.dll /e /p everyone:f2⤵
- System Location Discovery: System Language Discovery
PID:1972
-
-
C:\Windows\SysWOW64\cacls.exe"C:\Windows\System32\cacls.exe" C:\Windows\system32\wpcap.dll /e /p everyone:f2⤵
- System Location Discovery: System Language Discovery
PID:2400
-
-
C:\Windows\SysWOW64\cacls.exe"C:\Windows\System32\cacls.exe" C:\Windows\system32\drivers\npf.sys /e /p everyone:f2⤵
- System Location Discovery: System Language Discovery
PID:1676
-
-
C:\Windows\SysWOW64\cacls.exe"C:\Windows\System32\cacls.exe" C:\Windows\system32\npptools.dll /e /p everyone:f2⤵
- System Location Discovery: System Language Discovery
PID:1900
-
-
C:\Windows\SysWOW64\cacls.exe"C:\Windows\System32\cacls.exe" C:\Windows\system32\drivers\acpidisk.sys /e /p everyone:f2⤵
- System Location Discovery: System Language Discovery
PID:1932
-
-
C:\Windows\SysWOW64\cacls.exe"C:\Windows\System32\cacls.exe" C:\Windows\system32\wanpacket.dll /e /p everyone:f2⤵
- System Location Discovery: System Language Discovery
PID:892
-
-
C:\Windows\SysWOW64\cacls.exe"C:\Windows\System32\cacls.exe" C:\Documents and Settings\All Users\¡¸¿ªÊ¼¡¹²Ëµ¥\³ÌÐò\Æô¶¯ /e /p everyone:f2⤵
- System Location Discovery: System Language Discovery
PID:2168
-
-
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:3068 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3068 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1796
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
143B
MD577959cc588db738d0b8fe7e0e71551e2
SHA16c87e5994a72ebc9e0a012eecb9572e05820d2f4
SHA256d1b07ae3ba2f9a1b5522cee988c0c67b3451bec2a61f7ad19bc1c9831c447a9b
SHA512407931710444de7b0335d30833bae567c06bdb6ce8b77f2140de67902ef12c7ce850bf01cdc16d37fdeb791258a1c7226b440d682e64db9b783b5a1e227a1fdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca01cd0d1a08d8298fff4213359d95a9
SHA180a0eb4d8255431f44f5fc3c3e7f820772deee48
SHA256ce3641ba75233ca7fc5580d449dd072ac701e9cba69a5b13fd44ad594e7ce79d
SHA51214ac638db4dda04fe854a24c32ed3bf10ee70c99786be72fbb173be1bbaa72677c42f918d175bcda293adac81ba97c7bbf504a31281f57855b587af8c6408a40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9a384bdd53b6aaf1ce60c2773f1b74b
SHA11b7ea63394d1173b6b547eb800dcf5abb3d2bf55
SHA2566f74c89468c50b558fd25c1456df8736a677f7211b9be50617e9264f35c68884
SHA51226170dc3c14d54133587e3ec450b421b9df2f16334f1815332d88792ee2d82e175c9d5709de03d37e5ff7a23777dbe89049ff49537fb364137f5c0d2b1195ef7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c5667c342122ee561908adb3332180c
SHA1b05d796bd50cf1fa6baefc5e6d224f2bdb16d820
SHA256d07f3adfc2a833462f7d1e7a8b19ed74282bca5b96c40f1b11dd9303336c8e60
SHA51270d32a4aa276024ae8234f3ac3cdac785fa3fa72ddb4876fadcfd7b3ab595c9cf75876ae2b69ee849887fceb96c5866840d1044a1e6907430e04a8c17d3e268e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcfd19f398b0fff14358a4b79f9b9b53
SHA1ca2529abb2081311e45479030b72ca35a830c983
SHA25610a0206c0a1b982e0972311fb72ec1071fd34016581c38ee060be87ec50d2a43
SHA512d6e0b14635ec8fc65f7ffd2555c06fa56dc63a2e80b86dc605d24554b52a21e00713164586ef6402951860cab888af4848eb3bc2abfb60135ad43c2d0af4fa75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3c25e0b7464cf39c92c5c1f16c9c09e
SHA10e88e3324d86e5fc24215e5803ffd80815084346
SHA2565123006d419f1ad11aad1ae4ae918c24a00f0f6cf4cb5ceb2a394272fa778b1f
SHA5126d4fd77b21d87e7e65d65e3569ec6fd2367d471d3968f3351a360f91830388b30f202ea65a9dd1842f1c0aec3353695b8a31f7ef8720f10688cf659e5e4668e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51130b3274a59850d6d3b782affc18e68
SHA14a9c73a3b6cb417332f49b0c892ab7089f4a6822
SHA256d441de78c1c76e46153639b974bd4a54c396828681d9966e408a121ded3fe5ba
SHA51292f33b562366f94bd079888b814dcd7ba03e4aa00d68c3152914ed74208e318ce1893f5c0bac18fa258fe2dc34fa2f7f174368b64050ba0aa275bd605d9b088d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0cb57e7b42ad0dcfb40178082ecad8f
SHA1b6c9abba3e5957c5f819175b8c1163a8f23925bb
SHA256240ac51610d4c41fbcb55c14c3be3b38163b56ef3db31c04bc85bd9e003ea1a4
SHA5120ac2503a3e8ef24d4d65884b711fd537db62db4f6778c8d22feb529611ec7c0bba8fa2d6882564a722439d542ef0562ccc5eba2bb0a2c6a815fdea3c561bb1f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e93b416f12e94d0f1cf0e0abdc7624fd
SHA14c6811868d54024fb2720644bd7217ee5f3e92a8
SHA256f8f1809e7bc13c2ed1a750cd4ec494a0855a89b75888841b479af9cfe4cfc7ff
SHA512ead449014f8e1950e60a5343bb9997601304b644a81ec1e850f61ed94428870b717f99015eef2c319550d4524fc585a58bbe2ced403fbb245200de5a87dc71d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50eebf60a1c71d17d62b240c1688c4828
SHA15dcb98351c3c3b0c1aac2cc28c96d3079596e741
SHA2569f85cb8d83230e688573f95a5cc5bef213f7d886e78a02e7b33ffdbf47cfff9b
SHA512d273edf9458b145d8b1ecce924198d5aea6107b26f246e8672bd49996af501209d921318dc61f5515b7d223bf8fbd0f061f841f9bb5d2cf74f73af96578b4abb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5360440eb325ee03c069f336d1b1a824d
SHA136224cfe2e92511f47c88f09138fbe96f7d2163e
SHA2566f31455c7a19def5ee9b7acb9a31083a327b2fb60cb1dcab4f28f889b03d9c27
SHA5121f98c548139ab786d4de6b364121908882380e08354c2534ce2918ffc6fbebb894fc6c58fff6257c5960b7bd4bc77bb4941601bc4c19cee0e14b58d2751abf75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d61d6b94d6a5160fb082ed1a816bd07
SHA1a092564259ea88a207a75b603d81eba35ef8a70f
SHA2569b040a56611a0ed3a1f5c9ab9e1d30e9face6bcddff8d1f9f67fed0dad39239d
SHA512e8f6013f03f941534b56903b90946b6f90be656e5f5e2dc52501aa76aba39a136946a7a6793c275753406b101595673dfdb8d836cd7cbb8426a0aca644e906dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5944a9c90b8494a16bb224a8ba09daa87
SHA16b729fa939e6ba400216f946b6136190793d30c4
SHA256a3cc27f982ea5895fe61076aa6979e4d9a4ec009ccbab721db37d37d1109b8eb
SHA51209c9b903e6c433becf0d7408b58017b49a85c2175ff370a28798ae3c2636249411706966330c5990b3ac95021dea7d52b02f940be68f54d3d280f4b8cbf4c217
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528c6270948e257e69183e206267b2122
SHA1d8750d231a1e443f51c2ba71f56a4bbdf99bef74
SHA256466510d7a4f4e4023a836a0f58d29c623fb51ed46a0ebda42b233db840d719b7
SHA512bc3d980c2cf0afb3cfa8168a6fae17d4936d44e6a738594773068aa1012306c8d4821e47fd4a968d6bd5e2a3ae2984d930ee273ad5cf59db32056693f3ebc5eb
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
27KB
MD5c1d60bd69f7401a7b89e68477568890b
SHA169bb44e4deee308720df5d7875ada0713a77500b
SHA2568acc540558b6b27cb3cb317f518be14c8fa14357c95f9121645b6f05b77ae934
SHA51203497a5c2283442eb8861ba1354d43652f4088793ee56e2113098e6566f65781829a9afb6cf7db9ade3cc7dfee0960d306da14e7e365617534f6636b11b4c636