Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
31/08/2024, 23:10
Behavioral task
behavioral1
Sample
cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe
-
Size
360KB
-
MD5
cdc6b8390037fea52d1d56c41d1f088c
-
SHA1
cf0aa31b75f4f174ad07455555a46d12df369b1a
-
SHA256
b68c8708e5cef34726f5114207ae90eb09176d723050725a2541834342b90742
-
SHA512
a53b4c80c1a164930ef9fe075e10944a0f89d109092fe6e5d434587d7e1bd88f954122082ee833b8b4b668796dc23afe3a4e0597c5ec5e071197805ecf21fdce
-
SSDEEP
6144:wB0z1N1FIUm/ZLbDMBvAJIUR8HOy7WqKuIm8yigE1/crn1EcvfSF7i4GpSh:wBg1GZLbDMSJIU4f80il1/I1l69h
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Microsoft\OneNote\16.0\cache\_READ_THI$_FILE_FKJD98O_.txt
http://p27dokhpz2n7nvgr.onion/5068-190B-D9AB-0446-98AB
http://p27dokhpz2n7nvgr.1nhkou.top/5068-190B-D9AB-0446-98AB
http://p27dokhpz2n7nvgr.1a7wnt.top/5068-190B-D9AB-0446-98AB
http://p27dokhpz2n7nvgr.1czh7o.top/5068-190B-D9AB-0446-98AB
http://p27dokhpz2n7nvgr.1hpvzl.top/5068-190B-D9AB-0446-98AB
http://p27dokhpz2n7nvgr.1pglcs.top/5068-190B-D9AB-0446-98AB
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\OneNote\16.0\_READ_THI$_FILE_IS0R_.hta
cerber
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Contacts a large (1104) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 4952 netsh.exe 1524 netsh.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe -
Drops startup file 1 IoCs
description ioc Process File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\word\startup\ cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/2652-0-0x0000000000960000-0x00000000009EB000-memory.dmp upx behavioral2/memory/2652-5-0x0000000000960000-0x00000000009EB000-memory.dmp upx -
Drops file in System32 directory 38 IoCs
description ioc Process File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft sql server cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\onenote cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\thunderbird cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft sql server cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\onenote cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\word cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\excel cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\word cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\office cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\outlook cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\the bat! cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\bitcoin cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\office cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\powerpoint cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\powerpoint cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\steam cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\the bat! cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\thunderbird cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\onenote cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\word cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\powerpoint cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\bitcoin cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\microsoft sql server cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\powerpoint cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\documents cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\excel cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\excel cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\outlook cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\outlook cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\office cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\outlook cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\steam cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\desktop cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\excel cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\microsoft sql server cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\office cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\onenote cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\word cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmpCD81.bmp" cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2652 set thread context of 388 2652 cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe 87 -
Drops file in Program Files directory 20 IoCs
description ioc Process File opened for modification \??\c:\program files (x86)\ cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\microsoft\office cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\microsoft\onenote cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\outlook cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\thunderbird cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\program files\ cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\microsoft\outlook cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\onenote cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\the bat! cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\microsoft\microsoft sql server cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\microsoft\word cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\steam cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\word cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\excel cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\microsoft sql server cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\microsoft\excel cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\microsoft\powerpoint cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\office cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\powerpoint cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\bitcoin cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\powerpoint cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\word cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\onenote cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\powerpoint cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\word cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\bitcoin cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\onenote cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\powerpoint cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\steam cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\the bat! cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\documents cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft sql server cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\word cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\documents cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\thunderbird cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\word cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\outlook cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\word cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\excel cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\excel cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\onenote cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\powerpoint cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\word cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\word cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\microsoft sql server cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\office cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\onenote cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\outlook cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\office cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\powerpoint cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\steam cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\desktop cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft sql server cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\excel cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\office cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\outlook cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\powerpoint cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\bitcoin cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft sql server cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\powerpoint cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\word cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\onenote cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\steam cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\thunderbird cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\microsoft sql server cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\onenote cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\outlook cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\the bat! cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\desktop cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\excel cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\onenote cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\outlook cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\the bat! cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\the bat! cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\excel cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\excel cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\microsoft sql server cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\office cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\powerpoint cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\office cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\office cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\thunderbird cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft sql server cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\excel cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1796 PING.EXE -
Kills process with taskkill 1 IoCs
pid Process 996 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1796 PING.EXE -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeShutdownPrivilege 388 cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 388 cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe Token: SeDebugPrivilege 996 taskkill.exe -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 2652 wrote to memory of 388 2652 cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe 87 PID 2652 wrote to memory of 388 2652 cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe 87 PID 2652 wrote to memory of 388 2652 cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe 87 PID 2652 wrote to memory of 388 2652 cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe 87 PID 2652 wrote to memory of 388 2652 cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe 87 PID 2652 wrote to memory of 388 2652 cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe 87 PID 2652 wrote to memory of 388 2652 cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe 87 PID 2652 wrote to memory of 388 2652 cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe 87 PID 2652 wrote to memory of 388 2652 cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe 87 PID 2652 wrote to memory of 388 2652 cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe 87 PID 388 wrote to memory of 4952 388 cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe 88 PID 388 wrote to memory of 4952 388 cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe 88 PID 388 wrote to memory of 4952 388 cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe 88 PID 388 wrote to memory of 1524 388 cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe 90 PID 388 wrote to memory of 1524 388 cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe 90 PID 388 wrote to memory of 1524 388 cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe 90 PID 388 wrote to memory of 3544 388 cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe 100 PID 388 wrote to memory of 3544 388 cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe 100 PID 388 wrote to memory of 3544 388 cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe 100 PID 388 wrote to memory of 2916 388 cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe 101 PID 388 wrote to memory of 2916 388 cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe 101 PID 388 wrote to memory of 2916 388 cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe 101 PID 388 wrote to memory of 3732 388 cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe 104 PID 388 wrote to memory of 3732 388 cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe 104 PID 388 wrote to memory of 3732 388 cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe 104 PID 3732 wrote to memory of 996 3732 cmd.exe 106 PID 3732 wrote to memory of 996 3732 cmd.exe 106 PID 3732 wrote to memory of 996 3732 cmd.exe 106 PID 3732 wrote to memory of 1796 3732 cmd.exe 107 PID 3732 wrote to memory of 1796 3732 cmd.exe 107 PID 3732 wrote to memory of 1796 3732 cmd.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe2⤵
- Checks computer location settings
- Drops startup file
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Windows\SysWOW64\netsh.exeC:\Windows\system32\netsh.exe advfirewall set allprofiles state on3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4952
-
-
C:\Windows\SysWOW64\netsh.exeC:\Windows\system32\netsh.exe advfirewall reset3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1524
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\_READ_THI$_FILE_9JV0_.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}3⤵
- System Location Discovery: System Language Discovery
PID:3544
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\_READ_THI$_FILE_DL1L_.txt3⤵
- System Location Discovery: System Language Discovery
PID:2916
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe"4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:996
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.14⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1796
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD519b158d8dbab1e01981fbe957de76fd0
SHA19121feeb5d09272ce8889b28946a92a7e7dda939
SHA25650a892b57aa814264656ea37a6fd80cd515ff624c3464d3532a8cd37d18ab9de
SHA5120a57f240de38a32f7b825e7b36fb934099b48c3ba3a298b1145e1b02900f58904d590ee9d9790dd13be570f4f10521a471ec376c6705d9045244e35cc011542e
-
Filesize
151KB
MD55b8af11cdba3ac0d956024b462211cdf
SHA1a6126dfa8e6e3c08693bd9dee384c0bc4d2d6806
SHA25677d2ca5c1be1059cb6a9b0b8878cc0f2bad474520f524ae17253f93bbf32a077
SHA5120ba759f56ca3880c85622a23122868d435e9ee143b68f27326495e932fcb41ad11a6985a0ab5be1b9b24a226aad3d5ca089174a4d551c954c95a56baa5592346
-
Filesize
75KB
MD5cafecb3fda20e923fd6a28bfba7e00a9
SHA13ecc060826e463812fe8ee7d41b24eaa7d2a2c72
SHA256402115d417735769136453acbfb6111dd24c0f26b108f42ead7683ff04b1d4d8
SHA5126c60353efeafd63553c542ac78943f4b2ab092403a72d07e49c7e05e0dbbfd56201c1ee071edf89ff24b0212a3845ad3ccd5435eb1dbf0f9e9fc34ddadf323dd