Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15/09/2024, 01:18
Static task
static1
Behavioral task
behavioral1
Sample
e16b08738be492e6c3229c9e61863eac_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e16b08738be492e6c3229c9e61863eac_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e16b08738be492e6c3229c9e61863eac_JaffaCakes118.exe
-
Size
330KB
-
MD5
e16b08738be492e6c3229c9e61863eac
-
SHA1
84d2c9513518d3a66401689a247796f91cc04e2c
-
SHA256
fa5100b151ad9b4b12ae1fed0061b371d973de153186a30a59283cccebab8fa4
-
SHA512
486a07685294f163544535b03dcea0e43c2eff206300aed78302ed27326da63ea8b50daeb2733e2f666f391cae1ba7520d0580b23014a37c9b7d4165cbbc2fb3
-
SSDEEP
6144:Mak9hyxEXYGc7q7vqO0HIe/uKuEy4odsEZGPbAFeEtaIwUeOnqfWjsOy9HKuBddP:MkxEXT73e/784odshzAFeEtadXERjQhR
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" deodo.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation uvagv.exe Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation tgHb8Ps4s67hU1.exe -
Executes dropped EXE 5 IoCs
pid Process 3480 tgHb8Ps4s67hU1.exe 396 uvagu.exe 3524 uvagv.exe 992 vuenat.exe 376 deodo.exe -
resource yara_rule behavioral2/memory/3524-25-0x0000000000420000-0x000000000042A000-memory.dmp upx behavioral2/memory/3524-26-0x0000000000420000-0x000000000043B000-memory.dmp upx -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deodo = "C:\\Users\\Admin\\deodo.exe /O" deodo.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deodo = "C:\\Users\\Admin\\deodo.exe /a" deodo.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deodo = "C:\\Users\\Admin\\deodo.exe /k" deodo.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deodo = "C:\\Users\\Admin\\deodo.exe /S" deodo.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deodo = "C:\\Users\\Admin\\deodo.exe /N" deodo.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deodo = "C:\\Users\\Admin\\deodo.exe /v" deodo.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deodo = "C:\\Users\\Admin\\deodo.exe /l" deodo.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deodo = "C:\\Users\\Admin\\deodo.exe /j" deodo.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deodo = "C:\\Users\\Admin\\deodo.exe /P" deodo.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deodo = "C:\\Users\\Admin\\deodo.exe /T" deodo.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deodo = "C:\\Users\\Admin\\deodo.exe /Q" deodo.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deodo = "C:\\Users\\Admin\\deodo.exe /c" deodo.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deodo = "C:\\Users\\Admin\\deodo.exe /L" deodo.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deodo = "C:\\Users\\Admin\\deodo.exe /n" deodo.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deodo = "C:\\Users\\Admin\\deodo.exe /o" deodo.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deodo = "C:\\Users\\Admin\\deodo.exe /G" deodo.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deodo = "C:\\Users\\Admin\\deodo.exe /m" deodo.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deodo = "C:\\Users\\Admin\\deodo.exe /F" deodo.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deodo = "C:\\Users\\Admin\\deodo.exe /f" deodo.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deodo = "C:\\Users\\Admin\\deodo.exe /y" deodo.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deodo = "C:\\Users\\Admin\\deodo.exe /r" deodo.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deodo = "C:\\Users\\Admin\\deodo.exe /C" deodo.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deodo = "C:\\Users\\Admin\\deodo.exe /p" deodo.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deodo = "C:\\Users\\Admin\\deodo.exe /i" deodo.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deodo = "C:\\Users\\Admin\\deodo.exe /w" deodo.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deodo = "C:\\Users\\Admin\\deodo.exe /B" deodo.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deodo = "C:\\Users\\Admin\\deodo.exe /A" deodo.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deodo = "C:\\Users\\Admin\\deodo.exe /V" deodo.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deodo = "C:\\Users\\Admin\\deodo.exe /Z" deodo.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deodo = "C:\\Users\\Admin\\deodo.exe /e" deodo.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deodo = "C:\\Users\\Admin\\deodo.exe /z" deodo.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deodo = "C:\\Users\\Admin\\deodo.exe /J" deodo.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deodo = "C:\\Users\\Admin\\deodo.exe /d" deodo.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deodo = "C:\\Users\\Admin\\deodo.exe /u" deodo.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deodo = "C:\\Users\\Admin\\deodo.exe /x" deodo.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deodo = "C:\\Users\\Admin\\deodo.exe /M" deodo.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deodo = "C:\\Users\\Admin\\deodo.exe /h" deodo.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deodo = "C:\\Users\\Admin\\deodo.exe /H" deodo.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deodo = "C:\\Users\\Admin\\deodo.exe /b" deodo.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deodo = "C:\\Users\\Admin\\deodo.exe /R" deodo.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deodo = "C:\\Users\\Admin\\deodo.exe /X" deodo.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deodo = "C:\\Users\\Admin\\deodo.exe /g" deodo.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deodo = "C:\\Users\\Admin\\deodo.exe /s" deodo.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deodo = "C:\\Users\\Admin\\deodo.exe /q" deodo.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deodo = "C:\\Users\\Admin\\deodo.exe /U" deodo.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deodo = "C:\\Users\\Admin\\deodo.exe /D" deodo.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deodo = "C:\\Users\\Admin\\deodo.exe /E" deodo.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deodo = "C:\\Users\\Admin\\deodo.exe /Y" deodo.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deodo = "C:\\Users\\Admin\\deodo.exe /K" deodo.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deodo = "C:\\Users\\Admin\\deodo.exe /W" deodo.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deodo = "C:\\Users\\Admin\\deodo.exe /t" deodo.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deodo = "C:\\Users\\Admin\\deodo.exe /I" deodo.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 4372 tasklist.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4044 396 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tgHb8Ps4s67hU1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language deodo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e16b08738be492e6c3229c9e61863eac_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uvagu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uvagv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vuenat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Script User-Agent 3 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 5 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 8 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 13 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3524 uvagv.exe 3524 uvagv.exe 3524 uvagv.exe 3524 uvagv.exe 3480 tgHb8Ps4s67hU1.exe 3480 tgHb8Ps4s67hU1.exe 376 deodo.exe 376 deodo.exe 376 deodo.exe 376 deodo.exe 376 deodo.exe 376 deodo.exe 376 deodo.exe 376 deodo.exe 376 deodo.exe 376 deodo.exe 376 deodo.exe 376 deodo.exe 376 deodo.exe 376 deodo.exe 376 deodo.exe 376 deodo.exe 376 deodo.exe 376 deodo.exe 376 deodo.exe 376 deodo.exe 376 deodo.exe 376 deodo.exe 376 deodo.exe 376 deodo.exe 376 deodo.exe 376 deodo.exe 376 deodo.exe 376 deodo.exe 376 deodo.exe 376 deodo.exe 376 deodo.exe 376 deodo.exe 376 deodo.exe 376 deodo.exe 376 deodo.exe 376 deodo.exe 376 deodo.exe 376 deodo.exe 376 deodo.exe 376 deodo.exe 376 deodo.exe 376 deodo.exe 376 deodo.exe 376 deodo.exe 376 deodo.exe 376 deodo.exe 376 deodo.exe 376 deodo.exe 376 deodo.exe 376 deodo.exe 376 deodo.exe 376 deodo.exe 376 deodo.exe 376 deodo.exe 376 deodo.exe 376 deodo.exe 376 deodo.exe 376 deodo.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3524 uvagv.exe Token: SeDebugPrivilege 4372 tasklist.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 3480 tgHb8Ps4s67hU1.exe 992 vuenat.exe 992 vuenat.exe 992 vuenat.exe 376 deodo.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 1036 wrote to memory of 3480 1036 e16b08738be492e6c3229c9e61863eac_JaffaCakes118.exe 84 PID 1036 wrote to memory of 3480 1036 e16b08738be492e6c3229c9e61863eac_JaffaCakes118.exe 84 PID 1036 wrote to memory of 3480 1036 e16b08738be492e6c3229c9e61863eac_JaffaCakes118.exe 84 PID 1036 wrote to memory of 396 1036 e16b08738be492e6c3229c9e61863eac_JaffaCakes118.exe 85 PID 1036 wrote to memory of 396 1036 e16b08738be492e6c3229c9e61863eac_JaffaCakes118.exe 85 PID 1036 wrote to memory of 396 1036 e16b08738be492e6c3229c9e61863eac_JaffaCakes118.exe 85 PID 1036 wrote to memory of 3524 1036 e16b08738be492e6c3229c9e61863eac_JaffaCakes118.exe 86 PID 1036 wrote to memory of 3524 1036 e16b08738be492e6c3229c9e61863eac_JaffaCakes118.exe 86 PID 1036 wrote to memory of 3524 1036 e16b08738be492e6c3229c9e61863eac_JaffaCakes118.exe 86 PID 1036 wrote to memory of 992 1036 e16b08738be492e6c3229c9e61863eac_JaffaCakes118.exe 87 PID 1036 wrote to memory of 992 1036 e16b08738be492e6c3229c9e61863eac_JaffaCakes118.exe 87 PID 1036 wrote to memory of 992 1036 e16b08738be492e6c3229c9e61863eac_JaffaCakes118.exe 87 PID 1036 wrote to memory of 1864 1036 e16b08738be492e6c3229c9e61863eac_JaffaCakes118.exe 88 PID 1036 wrote to memory of 1864 1036 e16b08738be492e6c3229c9e61863eac_JaffaCakes118.exe 88 PID 1036 wrote to memory of 1864 1036 e16b08738be492e6c3229c9e61863eac_JaffaCakes118.exe 88 PID 3524 wrote to memory of 4944 3524 uvagv.exe 94 PID 3524 wrote to memory of 4944 3524 uvagv.exe 94 PID 3524 wrote to memory of 4944 3524 uvagv.exe 94 PID 3480 wrote to memory of 376 3480 tgHb8Ps4s67hU1.exe 98 PID 3480 wrote to memory of 376 3480 tgHb8Ps4s67hU1.exe 98 PID 3480 wrote to memory of 376 3480 tgHb8Ps4s67hU1.exe 98 PID 3480 wrote to memory of 4940 3480 tgHb8Ps4s67hU1.exe 99 PID 3480 wrote to memory of 4940 3480 tgHb8Ps4s67hU1.exe 99 PID 3480 wrote to memory of 4940 3480 tgHb8Ps4s67hU1.exe 99 PID 4940 wrote to memory of 4372 4940 cmd.exe 101 PID 4940 wrote to memory of 4372 4940 cmd.exe 101 PID 4940 wrote to memory of 4372 4940 cmd.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\e16b08738be492e6c3229c9e61863eac_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e16b08738be492e6c3229c9e61863eac_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Users\Admin\tgHb8Ps4s67hU1.exetgHb8Ps4s67hU1.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Users\Admin\deodo.exe"C:\Users\Admin\deodo.exe"3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:376
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del tgHb8Ps4s67hU1.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4372
-
-
-
-
C:\Users\Admin\uvagu.exeuvagu.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:396 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 396 -s 4763⤵
- Program crash
PID:4044
-
-
-
C:\Users\Admin\uvagv.exeuvagv.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\uvagv.exe > nul3⤵
- System Location Discovery: System Language Discovery
PID:4944
-
-
-
C:\Users\Admin\vuenat.exevuenat.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:992
-
-
C:\Windows\SysWOW64\cmd.execmd /c del e16b08738be492e6c3229c9e61863eac_JaffaCakes118.exe2⤵
- System Location Discovery: System Language Discovery
PID:1864
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 396 -ip 3961⤵PID:3688
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Indicator Removal
1File Deletion
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD5d32fa8f09d33dc67a954f2ad8cabbb0c
SHA125f4bf09cdb8a18df77d61c5445581227492de1a
SHA2562aa43ff620d7a83501f526829359194695644427297c95c87a086a59190a8413
SHA512dbe1ed70a9154f4ca9c2e66053deaea9b673a6d887a35ee8a0a573041083f872475e06b19ef19bfcd8ecf8ba7ade13dcb9eb8f76d2768a3cfc599ca9bcddc4b0
-
Filesize
136KB
MD56bdd49bd16ed7d274a506a4623a7324c
SHA1adb1dbfec1ab4cf5d295583aceae854e018c4cd5
SHA2567ecc55ba0798b3e82040db98b2d829d8e2b711cc65afc8631a77b34286df4504
SHA5129cad4c183d11c8b99f24d4dd4dfdf448e8b56a812d33f187b9d0c5d4ab877d7f8db97ba383c7b6d8f7f2c7a6cc1a8f8b7e61b382c515ebec3225e93edf63e101
-
Filesize
169KB
MD53d7ac3d1e203119cf457c54c31fe6409
SHA1076780968b04ae9e32bc083792a0a41cdb8b610b
SHA2567790a6c1455c0ad261241dae96219aa2d4938c982265c535d8982b125c29500b
SHA5128850d265ba97e94b20871b847a794803e77c83bfe08bf0ad129b904c820e24509af39c3defd2044c91774fb96fba7a0cbf0241fea4c264c32514ed13ce48afb4
-
Filesize
29KB
MD5632038ebc994f8988d0d87111dd24291
SHA1677bad0be66dc8a022cdefc799ada5eb71c2019a
SHA25674582cd0b16d9f8bcebaf7007a1815d1cccbdca8ec4145928fd2b66330f449f4
SHA512b26464a173fb1c4fedfd396416c3301e00f2f3a03d8358dd3d4b89ffac9e9b41aee859ed1ae0b8ce69d88959a635e34e107f3fa0a5dc83f7809ac77294a72f18
-
Filesize
268KB
MD5ea19fc0324fdf40ffbd464c64da58238
SHA15bc22065b775053c5dd2f4a914562b976ee07909
SHA2565068c64698059ca3bd5a3300620638007eb729909bb83ce49a20437f25b401c4
SHA512fa5cdaa4d3e57929abea7eb2966ff5cf057774dca7823e04731d044873856e0c6ffc737fd4e6104cfde5a7fbdd3eaedc96ef78e56eab125bfc03ef871f8c87a6