Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 19:40
Static task
static1
Behavioral task
behavioral1
Sample
db1798f61901861b25cc245b186cdbb4_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
db1798f61901861b25cc245b186cdbb4_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
db1798f61901861b25cc245b186cdbb4_JaffaCakes118.exe
-
Size
504KB
-
MD5
db1798f61901861b25cc245b186cdbb4
-
SHA1
2696aa22d06cd50cae69f6ef8081fb1311dee467
-
SHA256
584e1f14fd8ce790f4656d6265bd560313cb8e5358572cf65abb7dbcfdc55f43
-
SHA512
89d34195f7277094d005a46e881f377900b2a0d69a2d206a25405cf3e0b78494a7f0ffb13de5dbb7b8e0e3f30bdb594177accc63cfb94de1069f1af5f91d0c49
-
SSDEEP
12288:GOwQmZiqb/i5t+V9iTCSvEMseLPcRnKb:GOdeIe9ih8Ms+PU
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" y26f0s.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" japek.exe -
Deletes itself 1 IoCs
pid Process 2572 cmd.exe -
Executes dropped EXE 6 IoCs
pid Process 2360 y26f0s.exe 2900 japek.exe 2820 apod.exe 2744 apod.exe 2660 dpod.exe 592 epod.exe -
Loads dropped DLL 14 IoCs
pid Process 1992 db1798f61901861b25cc245b186cdbb4_JaffaCakes118.exe 1992 db1798f61901861b25cc245b186cdbb4_JaffaCakes118.exe 2360 y26f0s.exe 2360 y26f0s.exe 1992 db1798f61901861b25cc245b186cdbb4_JaffaCakes118.exe 1992 db1798f61901861b25cc245b186cdbb4_JaffaCakes118.exe 1992 db1798f61901861b25cc245b186cdbb4_JaffaCakes118.exe 1992 db1798f61901861b25cc245b186cdbb4_JaffaCakes118.exe 1992 db1798f61901861b25cc245b186cdbb4_JaffaCakes118.exe 1992 db1798f61901861b25cc245b186cdbb4_JaffaCakes118.exe 2020 WerFault.exe 2020 WerFault.exe 2020 WerFault.exe 2020 WerFault.exe -
resource yara_rule behavioral1/memory/2744-46-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/2744-43-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/2744-41-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/2744-51-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/2744-50-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/2744-49-0x0000000000400000-0x000000000040E000-memory.dmp upx -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\japek = "C:\\Users\\Admin\\japek.exe /K" japek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\japek = "C:\\Users\\Admin\\japek.exe /a" japek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\japek = "C:\\Users\\Admin\\japek.exe /U" japek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\japek = "C:\\Users\\Admin\\japek.exe /s" japek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\japek = "C:\\Users\\Admin\\japek.exe /D" y26f0s.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\japek = "C:\\Users\\Admin\\japek.exe /G" japek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\japek = "C:\\Users\\Admin\\japek.exe /L" japek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\japek = "C:\\Users\\Admin\\japek.exe /x" japek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\japek = "C:\\Users\\Admin\\japek.exe /l" japek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\japek = "C:\\Users\\Admin\\japek.exe /d" japek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\japek = "C:\\Users\\Admin\\japek.exe /w" japek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\japek = "C:\\Users\\Admin\\japek.exe /V" japek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\japek = "C:\\Users\\Admin\\japek.exe /H" japek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\japek = "C:\\Users\\Admin\\japek.exe /m" japek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\japek = "C:\\Users\\Admin\\japek.exe /S" japek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\japek = "C:\\Users\\Admin\\japek.exe /M" japek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\japek = "C:\\Users\\Admin\\japek.exe /R" japek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\japek = "C:\\Users\\Admin\\japek.exe /Y" japek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\japek = "C:\\Users\\Admin\\japek.exe /T" japek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\japek = "C:\\Users\\Admin\\japek.exe /i" japek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\japek = "C:\\Users\\Admin\\japek.exe /I" japek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\japek = "C:\\Users\\Admin\\japek.exe /o" japek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\japek = "C:\\Users\\Admin\\japek.exe /y" japek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\japek = "C:\\Users\\Admin\\japek.exe /X" japek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\japek = "C:\\Users\\Admin\\japek.exe /F" japek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\japek = "C:\\Users\\Admin\\japek.exe /j" japek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\japek = "C:\\Users\\Admin\\japek.exe /c" japek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\japek = "C:\\Users\\Admin\\japek.exe /p" japek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\japek = "C:\\Users\\Admin\\japek.exe /t" japek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\japek = "C:\\Users\\Admin\\japek.exe /q" japek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\japek = "C:\\Users\\Admin\\japek.exe /N" japek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\japek = "C:\\Users\\Admin\\japek.exe /u" japek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\japek = "C:\\Users\\Admin\\japek.exe /r" japek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\japek = "C:\\Users\\Admin\\japek.exe /D" japek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\japek = "C:\\Users\\Admin\\japek.exe /B" japek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\japek = "C:\\Users\\Admin\\japek.exe /h" japek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\japek = "C:\\Users\\Admin\\japek.exe /f" japek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\japek = "C:\\Users\\Admin\\japek.exe /n" japek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\japek = "C:\\Users\\Admin\\japek.exe /g" japek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\japek = "C:\\Users\\Admin\\japek.exe /v" japek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\japek = "C:\\Users\\Admin\\japek.exe /A" japek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\japek = "C:\\Users\\Admin\\japek.exe /b" japek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\japek = "C:\\Users\\Admin\\japek.exe /Z" japek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\japek = "C:\\Users\\Admin\\japek.exe /E" japek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\japek = "C:\\Users\\Admin\\japek.exe /W" japek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\japek = "C:\\Users\\Admin\\japek.exe /Q" japek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\japek = "C:\\Users\\Admin\\japek.exe /P" japek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\japek = "C:\\Users\\Admin\\japek.exe /C" japek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\japek = "C:\\Users\\Admin\\japek.exe /O" japek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\japek = "C:\\Users\\Admin\\japek.exe /J" japek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\japek = "C:\\Users\\Admin\\japek.exe /k" japek.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\japek = "C:\\Users\\Admin\\japek.exe /e" japek.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 2816 tasklist.exe 1772 tasklist.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2820 set thread context of 2744 2820 apod.exe 36 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2020 592 WerFault.exe 40 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language epod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language db1798f61901861b25cc245b186cdbb4_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language japek.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y26f0s.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language apod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2360 y26f0s.exe 2360 y26f0s.exe 2744 apod.exe 2900 japek.exe 2900 japek.exe 2744 apod.exe 2900 japek.exe 2900 japek.exe 2900 japek.exe 2744 apod.exe 2900 japek.exe 2744 apod.exe 2744 apod.exe 2900 japek.exe 2900 japek.exe 2900 japek.exe 2744 apod.exe 2900 japek.exe 2744 apod.exe 2900 japek.exe 2744 apod.exe 2900 japek.exe 2900 japek.exe 2744 apod.exe 2900 japek.exe 2744 apod.exe 2744 apod.exe 2900 japek.exe 2744 apod.exe 2744 apod.exe 2900 japek.exe 2900 japek.exe 2744 apod.exe 2744 apod.exe 2900 japek.exe 2744 apod.exe 2900 japek.exe 2900 japek.exe 2744 apod.exe 2744 apod.exe 2744 apod.exe 2900 japek.exe 2744 apod.exe 2900 japek.exe 2744 apod.exe 2900 japek.exe 2900 japek.exe 2744 apod.exe 2744 apod.exe 2744 apod.exe 2900 japek.exe 2744 apod.exe 2744 apod.exe 2744 apod.exe 2900 japek.exe 2900 japek.exe 2900 japek.exe 2744 apod.exe 2744 apod.exe 2744 apod.exe 2900 japek.exe 2744 apod.exe 2744 apod.exe 2744 apod.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2816 tasklist.exe Token: SeDebugPrivilege 1772 tasklist.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1992 db1798f61901861b25cc245b186cdbb4_JaffaCakes118.exe 2360 y26f0s.exe 2900 japek.exe 2820 apod.exe 2660 dpod.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 1992 wrote to memory of 2360 1992 db1798f61901861b25cc245b186cdbb4_JaffaCakes118.exe 30 PID 1992 wrote to memory of 2360 1992 db1798f61901861b25cc245b186cdbb4_JaffaCakes118.exe 30 PID 1992 wrote to memory of 2360 1992 db1798f61901861b25cc245b186cdbb4_JaffaCakes118.exe 30 PID 1992 wrote to memory of 2360 1992 db1798f61901861b25cc245b186cdbb4_JaffaCakes118.exe 30 PID 2360 wrote to memory of 2900 2360 y26f0s.exe 31 PID 2360 wrote to memory of 2900 2360 y26f0s.exe 31 PID 2360 wrote to memory of 2900 2360 y26f0s.exe 31 PID 2360 wrote to memory of 2900 2360 y26f0s.exe 31 PID 2360 wrote to memory of 2748 2360 y26f0s.exe 32 PID 2360 wrote to memory of 2748 2360 y26f0s.exe 32 PID 2360 wrote to memory of 2748 2360 y26f0s.exe 32 PID 2360 wrote to memory of 2748 2360 y26f0s.exe 32 PID 2748 wrote to memory of 2816 2748 cmd.exe 34 PID 2748 wrote to memory of 2816 2748 cmd.exe 34 PID 2748 wrote to memory of 2816 2748 cmd.exe 34 PID 2748 wrote to memory of 2816 2748 cmd.exe 34 PID 1992 wrote to memory of 2820 1992 db1798f61901861b25cc245b186cdbb4_JaffaCakes118.exe 35 PID 1992 wrote to memory of 2820 1992 db1798f61901861b25cc245b186cdbb4_JaffaCakes118.exe 35 PID 1992 wrote to memory of 2820 1992 db1798f61901861b25cc245b186cdbb4_JaffaCakes118.exe 35 PID 1992 wrote to memory of 2820 1992 db1798f61901861b25cc245b186cdbb4_JaffaCakes118.exe 35 PID 2820 wrote to memory of 2744 2820 apod.exe 36 PID 2820 wrote to memory of 2744 2820 apod.exe 36 PID 2820 wrote to memory of 2744 2820 apod.exe 36 PID 2820 wrote to memory of 2744 2820 apod.exe 36 PID 2820 wrote to memory of 2744 2820 apod.exe 36 PID 2820 wrote to memory of 2744 2820 apod.exe 36 PID 2820 wrote to memory of 2744 2820 apod.exe 36 PID 2820 wrote to memory of 2744 2820 apod.exe 36 PID 1992 wrote to memory of 2660 1992 db1798f61901861b25cc245b186cdbb4_JaffaCakes118.exe 38 PID 1992 wrote to memory of 2660 1992 db1798f61901861b25cc245b186cdbb4_JaffaCakes118.exe 38 PID 1992 wrote to memory of 2660 1992 db1798f61901861b25cc245b186cdbb4_JaffaCakes118.exe 38 PID 1992 wrote to memory of 2660 1992 db1798f61901861b25cc245b186cdbb4_JaffaCakes118.exe 38 PID 1992 wrote to memory of 592 1992 db1798f61901861b25cc245b186cdbb4_JaffaCakes118.exe 40 PID 1992 wrote to memory of 592 1992 db1798f61901861b25cc245b186cdbb4_JaffaCakes118.exe 40 PID 1992 wrote to memory of 592 1992 db1798f61901861b25cc245b186cdbb4_JaffaCakes118.exe 40 PID 1992 wrote to memory of 592 1992 db1798f61901861b25cc245b186cdbb4_JaffaCakes118.exe 40 PID 592 wrote to memory of 2020 592 epod.exe 41 PID 592 wrote to memory of 2020 592 epod.exe 41 PID 592 wrote to memory of 2020 592 epod.exe 41 PID 592 wrote to memory of 2020 592 epod.exe 41 PID 1992 wrote to memory of 2572 1992 db1798f61901861b25cc245b186cdbb4_JaffaCakes118.exe 42 PID 1992 wrote to memory of 2572 1992 db1798f61901861b25cc245b186cdbb4_JaffaCakes118.exe 42 PID 1992 wrote to memory of 2572 1992 db1798f61901861b25cc245b186cdbb4_JaffaCakes118.exe 42 PID 1992 wrote to memory of 2572 1992 db1798f61901861b25cc245b186cdbb4_JaffaCakes118.exe 42 PID 2572 wrote to memory of 1772 2572 cmd.exe 44 PID 2572 wrote to memory of 1772 2572 cmd.exe 44 PID 2572 wrote to memory of 1772 2572 cmd.exe 44 PID 2572 wrote to memory of 1772 2572 cmd.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\db1798f61901861b25cc245b186cdbb4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\db1798f61901861b25cc245b186cdbb4_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\y26f0s.exeC:\Users\Admin\y26f0s.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\japek.exe"C:\Users\Admin\japek.exe"3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2900
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del y26f0s.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2816
-
-
-
-
C:\Users\Admin\apod.exeC:\Users\Admin\apod.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Users\Admin\apod.exe"C:\Users\Admin\apod.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2744
-
-
-
C:\Users\Admin\dpod.exeC:\Users\Admin\dpod.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2660
-
-
C:\Users\Admin\epod.exeC:\Users\Admin\epod.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:592 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 592 -s 363⤵
- Loads dropped DLL
- Program crash
PID:2020
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del db1798f61901861b25cc245b186cdbb4_JaffaCakes118.exe2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1772
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD5423c4a08989b956f40a58ac76d4b06ef
SHA1e5f926bda675c1682a12df0033eacbcea1ed8b8c
SHA256b2c621f8ca9704489c90a2fe87c7e5eb9ef247cef06a9b18708c8cd7a1b4e6c7
SHA512b089470923a03f773749047688c9c315401da8590485f76d41589fcb3fbf045732e5f54e1297bdd6545575bb72c4cc4ba2d2ac2d7e64c4baab6a064f30a92b43
-
Filesize
36KB
MD53f33e061a2ed4b19f8b837cc9798ba4b
SHA15e3a078de37dc896a657cb0a09f13394f5bd2715
SHA25682b7ebb533cebb3bb671625ba65e41755ecad1c8e7b6ec7f9a8f4a549aac1a79
SHA5122ef0c88aa69b8015db4773eaf5332a16464d6c502376c3edb88fa2c3b81aa135e42581f5384ecadd5964cf12abbc263af5841ba2322f8cb9d5f10e92fd0f52e5
-
Filesize
38.2MB
MD58cfe12dd15348f83ebb0dda02d58c62b
SHA1f1b48f88d9c914194db33c6ea981d19065995b77
SHA2567804c3ee7c1b9715b8fc2e968f0be985a4803a4b3c6c30d823c28f9454809527
SHA512af1aec5eab02daa7836304e264b73ae4df1859de92c4e26045a9095e1578e0d7dcf65aaf92072ea399e4e7f47154ee8b3b0945e8fe9385731af9eea14feca8ba
-
Filesize
340KB
MD50f25e6b1a8b4bac518ba119befac7dbe
SHA1dce30251eb3b2e6d18403fc02e13bb64739411a3
SHA256987602a3fb5432ebdb26a8b37c4a970f93abc07ad8c8105f29475ac443d36f30
SHA512764815fa05e582a969ebe43c95bbdc523b9d05342360c7a096b1d9a5063ae4c99a4af204febbfaeda0c81fbdd640966de82b228aa61a07c8d9f40b4ab1cf3537
-
Filesize
340KB
MD5cd821a611d07ae0237546cd00fa6752f
SHA19cf66009462749c884320a43261af67e44688380
SHA256977facc689d0653837ba70a93147f6fb512031d25c4e8991b93672d57289c01a
SHA512f0a2328b2bd3f61593cbfc76cea146bcf7fa9eb69e192dd5cfbaaa40bab2632c3222af0ebf410567020c4a05748192a766d78f460ec90db96d04ac4a43bae719