Analysis
-
max time kernel
147s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
28/08/2024, 21:48
Static task
static1
Behavioral task
behavioral1
Sample
c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe
-
Size
96KB
-
MD5
c7b407d57fe62574099a38ae40c4dfd0
-
SHA1
e4691b503ed5f4010e2d36720fe5883e9bbf0f12
-
SHA256
028ea4745a0add6ef3cdbff5373c07a1f0d3db2f3ee879bcb61b3ed1feefa658
-
SHA512
5d1e6204cb099178f51f3cbfb138842bbf796530d90a9aa24d8518e9b4e0e781436ebc0208ea3f1f52b802603fa081a0e98e6a60c0c2948117157b73cfedde7c
-
SSDEEP
1536:n3NoR4cNMZuMsU2/5+gGrd2OTaOImokQYQ6YRwr30Fpb+4D5K3TPVXC:O44MZuMsUc9GrNqm7QYoCcpS4gE
Malware Config
Signatures
-
Executes dropped EXE 10 IoCs
pid Process 2800 services.exe 2264 services.exe 2232 services.exe 2220 services.exe 1052 services.exe 2412 services.exe 2844 services.exe 2488 services.exe 1808 services.exe 1856 services.exe -
Loads dropped DLL 64 IoCs
pid Process 2236 c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe 2236 c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe 2800 services.exe 2960 WerFault.exe 2960 WerFault.exe 2960 WerFault.exe 2960 WerFault.exe 2960 WerFault.exe 2728 c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe 2264 services.exe 2180 WerFault.exe 2180 WerFault.exe 2180 WerFault.exe 2180 WerFault.exe 2180 WerFault.exe 2536 c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe 2232 services.exe 1964 WerFault.exe 1964 WerFault.exe 1964 WerFault.exe 1964 WerFault.exe 1964 WerFault.exe 784 c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe 2220 services.exe 972 WerFault.exe 972 WerFault.exe 972 WerFault.exe 972 WerFault.exe 972 WerFault.exe 1956 c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe 1052 services.exe 2420 WerFault.exe 2420 WerFault.exe 2420 WerFault.exe 2420 WerFault.exe 2420 WerFault.exe 1372 c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe 2412 services.exe 1264 WerFault.exe 1264 WerFault.exe 1264 WerFault.exe 1264 WerFault.exe 1264 WerFault.exe 316 c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe 2844 services.exe 1304 WerFault.exe 1304 WerFault.exe 1304 WerFault.exe 1304 WerFault.exe 1304 WerFault.exe 2600 c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe 2488 services.exe 2384 WerFault.exe 2384 WerFault.exe 2384 WerFault.exe 2384 WerFault.exe 2384 WerFault.exe 2796 c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe 1808 services.exe 840 WerFault.exe 840 WerFault.exe 840 WerFault.exe 840 WerFault.exe 840 WerFault.exe -
Drops file in Windows directory 50 IoCs
description ioc Process File opened for modification C:\Windows\system\services.exe c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe File opened for modification C:\Windows\system\services.exe c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe File opened for modification C:\Windows\system\services.ini services.exe File opened for modification C:\Windows\system\services.exe services.exe File opened for modification C:\Windows\system\services.exe c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe File opened for modification C:\Windows\system\services.ini services.exe File opened for modification C:\Windows\system\services.ini services.exe File opened for modification C:\Windows\system\services.exe c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe File opened for modification C:\Windows\system\services.ini c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe File opened for modification C:\Windows\system\services.ini c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe File opened for modification C:\Windows\system\win32p.reg services.exe File opened for modification C:\Windows\system\services.ini c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe File opened for modification C:\Windows\system\services.ini c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe File opened for modification C:\Windows\system\services.exe c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe File opened for modification C:\Windows\system\services.exe services.exe File opened for modification C:\Windows\system\services.ini c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe File opened for modification C:\Windows\system\services.exe c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe File opened for modification C:\Windows\system\services.ini c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe File opened for modification C:\Windows\system\services.exe c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe File opened for modification C:\Windows\system\services.ini services.exe File opened for modification C:\Windows\system\services.ini services.exe File opened for modification C:\Windows\system\win32p.reg services.exe File opened for modification C:\Windows\system\services.ini c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe File opened for modification C:\Windows\system\services.ini services.exe File opened for modification C:\Windows\system\win32p.reg services.exe File opened for modification C:\Windows\system\services.exe services.exe File opened for modification C:\Windows\system\services.ini services.exe File opened for modification C:\Windows\system\win32p.reg services.exe File opened for modification C:\Windows\system\win32p.reg services.exe File opened for modification C:\Windows\system\services.ini services.exe File opened for modification C:\Windows\system\services.ini c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe File opened for modification C:\Windows\system\services.exe services.exe File opened for modification C:\Windows\system\services.ini c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe File opened for modification C:\Windows\system\services.exe c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe File opened for modification C:\Windows\system\services.exe c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe File opened for modification C:\Windows\system\services.exe services.exe File opened for modification C:\Windows\system\services.exe services.exe File opened for modification C:\Windows\system\services.exe services.exe File opened for modification C:\Windows\system\services.exe services.exe File opened for modification C:\Windows\system\win32p.reg services.exe File opened for modification C:\Windows\system\services.ini c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe File opened for modification C:\Windows\system\win32p.reg services.exe File opened for modification C:\Windows\system\services.exe services.exe File opened for modification C:\Windows\system\services.exe c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe File opened for modification C:\Windows\system\services.ini services.exe File opened for modification C:\Windows\system\win32p.reg services.exe File opened for modification C:\Windows\system\win32p.reg services.exe File opened for modification C:\Windows\system\services.ini services.exe File opened for modification C:\Windows\system\win32p.reg services.exe File opened for modification C:\Windows\system\services.exe services.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 20 IoCs
pid pid_target Process procid_target 2824 2236 WerFault.exe 29 2960 2800 WerFault.exe 30 2256 2728 WerFault.exe 32 2180 2264 WerFault.exe 34 2320 2536 WerFault.exe 36 1964 2232 WerFault.exe 38 2152 784 WerFault.exe 40 972 2220 WerFault.exe 42 696 1956 WerFault.exe 44 2420 1052 WerFault.exe 46 2004 1372 WerFault.exe 48 1264 2412 WerFault.exe 50 2096 316 WerFault.exe 52 1304 2844 WerFault.exe 54 2896 2600 WerFault.exe 56 2384 2488 WerFault.exe 58 2172 2796 WerFault.exe 60 840 1808 WerFault.exe 62 1756 2428 WerFault.exe 64 844 1856 WerFault.exe 66 -
System Location Discovery: System Language Discovery 1 TTPs 21 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe -
Suspicious behavior: GetForegroundWindowSpam 11 IoCs
pid Process 2236 c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe 2728 c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe 2536 c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe 784 c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe 1956 c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe 1372 c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe 316 c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe 2600 c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe 2796 c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe 2428 c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe 1016 c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 21 IoCs
pid Process 2236 c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe 2800 services.exe 2728 c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe 2264 services.exe 2536 c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe 2232 services.exe 784 c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe 2220 services.exe 1956 c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe 1052 services.exe 1372 c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe 2412 services.exe 316 c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe 2844 services.exe 2600 c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe 2488 services.exe 2796 c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe 1808 services.exe 2428 c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe 1856 services.exe 1016 c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2800 2236 c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe 30 PID 2236 wrote to memory of 2800 2236 c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe 30 PID 2236 wrote to memory of 2800 2236 c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe 30 PID 2236 wrote to memory of 2800 2236 c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe 30 PID 2236 wrote to memory of 2824 2236 c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe 31 PID 2236 wrote to memory of 2824 2236 c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe 31 PID 2236 wrote to memory of 2824 2236 c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe 31 PID 2236 wrote to memory of 2824 2236 c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe 31 PID 2800 wrote to memory of 2728 2800 services.exe 32 PID 2800 wrote to memory of 2728 2800 services.exe 32 PID 2800 wrote to memory of 2728 2800 services.exe 32 PID 2800 wrote to memory of 2728 2800 services.exe 32 PID 2800 wrote to memory of 2960 2800 services.exe 33 PID 2800 wrote to memory of 2960 2800 services.exe 33 PID 2800 wrote to memory of 2960 2800 services.exe 33 PID 2800 wrote to memory of 2960 2800 services.exe 33 PID 2728 wrote to memory of 2264 2728 c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe 34 PID 2728 wrote to memory of 2264 2728 c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe 34 PID 2728 wrote to memory of 2264 2728 c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe 34 PID 2728 wrote to memory of 2264 2728 c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe 34 PID 2728 wrote to memory of 2256 2728 c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe 35 PID 2728 wrote to memory of 2256 2728 c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe 35 PID 2728 wrote to memory of 2256 2728 c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe 35 PID 2728 wrote to memory of 2256 2728 c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe 35 PID 2264 wrote to memory of 2536 2264 services.exe 36 PID 2264 wrote to memory of 2536 2264 services.exe 36 PID 2264 wrote to memory of 2536 2264 services.exe 36 PID 2264 wrote to memory of 2536 2264 services.exe 36 PID 2264 wrote to memory of 2180 2264 services.exe 37 PID 2264 wrote to memory of 2180 2264 services.exe 37 PID 2264 wrote to memory of 2180 2264 services.exe 37 PID 2264 wrote to memory of 2180 2264 services.exe 37 PID 2536 wrote to memory of 2232 2536 c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe 38 PID 2536 wrote to memory of 2232 2536 c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe 38 PID 2536 wrote to memory of 2232 2536 c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe 38 PID 2536 wrote to memory of 2232 2536 c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe 38 PID 2536 wrote to memory of 2320 2536 c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe 39 PID 2536 wrote to memory of 2320 2536 c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe 39 PID 2536 wrote to memory of 2320 2536 c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe 39 PID 2536 wrote to memory of 2320 2536 c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe 39 PID 2232 wrote to memory of 784 2232 services.exe 40 PID 2232 wrote to memory of 784 2232 services.exe 40 PID 2232 wrote to memory of 784 2232 services.exe 40 PID 2232 wrote to memory of 784 2232 services.exe 40 PID 2232 wrote to memory of 1964 2232 services.exe 41 PID 2232 wrote to memory of 1964 2232 services.exe 41 PID 2232 wrote to memory of 1964 2232 services.exe 41 PID 2232 wrote to memory of 1964 2232 services.exe 41 PID 784 wrote to memory of 2220 784 c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe 42 PID 784 wrote to memory of 2220 784 c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe 42 PID 784 wrote to memory of 2220 784 c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe 42 PID 784 wrote to memory of 2220 784 c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe 42 PID 784 wrote to memory of 2152 784 c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe 43 PID 784 wrote to memory of 2152 784 c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe 43 PID 784 wrote to memory of 2152 784 c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe 43 PID 784 wrote to memory of 2152 784 c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe 43 PID 2220 wrote to memory of 1956 2220 services.exe 44 PID 2220 wrote to memory of 1956 2220 services.exe 44 PID 2220 wrote to memory of 1956 2220 services.exe 44 PID 2220 wrote to memory of 1956 2220 services.exe 44 PID 2220 wrote to memory of 972 2220 services.exe 45 PID 2220 wrote to memory of 972 2220 services.exe 45 PID 2220 wrote to memory of 972 2220 services.exe 45 PID 2220 wrote to memory of 972 2220 services.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\system\services.exe"C:\Windows\system\services.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe"3⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\system\services.exe"C:\Windows\system\services.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe"5⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\system\services.exe"C:\Windows\system\services.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe"7⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Windows\system\services.exe"C:\Windows\system\services.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe"9⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1956 -
C:\Windows\system\services.exe"C:\Windows\system\services.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1052 -
C:\Users\Admin\AppData\Local\Temp\c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe"11⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1372 -
C:\Windows\system\services.exe"C:\Windows\system\services.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe"13⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:316 -
C:\Windows\system\services.exe"C:\Windows\system\services.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe"15⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2600 -
C:\Windows\system\services.exe"C:\Windows\system\services.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe"17⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2796 -
C:\Windows\system\services.exe"C:\Windows\system\services.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe"19⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2428 -
C:\Windows\system\services.exe"C:\Windows\system\services.exe"20⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1856 -
C:\Users\Admin\AppData\Local\Temp\c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c7b407d57fe62574099a38ae40c4dfd0_JaffaCakes118.exe"21⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1016
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1856 -s 49621⤵
- Program crash
PID:844
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2428 -s 38820⤵
- Program crash
PID:1756
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1808 -s 44019⤵
- Loads dropped DLL
- Program crash
PID:840
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2796 -s 38818⤵
- Program crash
PID:2172
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2488 -s 49217⤵
- Loads dropped DLL
- Program crash
PID:2384
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2600 -s 38816⤵
- Program crash
PID:2896
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2844 -s 46415⤵
- Loads dropped DLL
- Program crash
PID:1304
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 316 -s 50414⤵
- Program crash
PID:2096
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2412 -s 46413⤵
- Loads dropped DLL
- Program crash
PID:1264
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1372 -s 38812⤵
- Program crash
PID:2004
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1052 -s 44011⤵
- Loads dropped DLL
- Program crash
PID:2420
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1956 -s 38810⤵
- Program crash
PID:696
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2220 -s 5049⤵
- Loads dropped DLL
- Program crash
PID:972
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 784 -s 3888⤵
- Program crash
PID:2152
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2232 -s 4647⤵
- Loads dropped DLL
- Program crash
PID:1964
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2536 -s 3886⤵
- Program crash
PID:2320
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2264 -s 5005⤵
- Loads dropped DLL
- Program crash
PID:2180
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2728 -s 3884⤵
- Program crash
PID:2256
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2800 -s 4803⤵
- Loads dropped DLL
- Program crash
PID:2960
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2236 -s 3882⤵
- Program crash
PID:2824
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84B
MD52dc22b48c3573ae4fbe08bc8e9993252
SHA12f7a162af95edbd8d60259398a214d6cc7616304
SHA25636b0ad60bc3b319023e55cf52da4a01675fb272edf2f73e5e40d742ab60f1928
SHA5120e028684ca9a52950966e64c00524da61dab56db4e04128d4d9addb223bfd9820c651fefa7335aed14ba01699408fa1cab9e30e781dea609d6f25d967befde00
-
Filesize
166B
MD5dab814a1a5d56a751398f37970cbb4b6
SHA135a2adfb7566e048e3d5a0f8b3d0e24cffb50778
SHA256dfc8ab18898ec12c7901976de0e60be0b955588116ed64505456aa303ed64673
SHA5128d98e36fd5a2931944b4f12d98aa5f40036254eb149ede15c02bb2166ad09b75b79d68812ddaa4fe22abf4169804c12f83203cf8c45273d24e112044a66ea384
-
Filesize
88B
MD592bb45e44e75f94c8b586d8149eb41fc
SHA1158c6ec92ab009ef40febcefd0e602f89cf722db
SHA2564c7364a9111b7fc49e1a5a93b0e7022f9c6cc783c59063136d0d921571285f44
SHA5120510ee2f301e3cd3155e024e4c5684b80d40fe055bb8be21638fc3ad8dfb37d4af7803fdafdef11de3c20ca758a634847a19a5cb7dcdcef09e29737dbe8ee59c
-
Filesize
96KB
MD56249fd7a90df7d330ee971d249f61a28
SHA166a962df14bcbf70a5673af12ae566aee1ede7c4
SHA256f7ff8a71437535d9b23c0e9a28466fa8e4e4333643a4fa474cdfefd1ef2a52d6
SHA512c8b8ca43c44a977005f313e6469c15d7ac85f2554df7b5ab253577cba7b5995359baaf5fd8098bd2f0bf6293704463d60685c19a0f784937b7d041cae3470789