Analysis
-
max time kernel
140s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
18-09-2024 22:37
Static task
static1
Behavioral task
behavioral1
Sample
ea1948163146fb253f7c28a1afe77f7b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea1948163146fb253f7c28a1afe77f7b_JaffaCakes118.exe
Resource
win10v2004-20240910-en
General
-
Target
ea1948163146fb253f7c28a1afe77f7b_JaffaCakes118.exe
-
Size
239KB
-
MD5
ea1948163146fb253f7c28a1afe77f7b
-
SHA1
19c07b297aa70d25de8bc83cfd80603f7abb3f58
-
SHA256
b2ca8ddbae694c93eef254de36e749cd506d4d50962c284ee1ec7bf59492fd30
-
SHA512
6e15a2120695831e024ad45cf72a85283b137a445d76ba9e6e7c45606af2f79931864cee481ff398bfa10bd2951c41d09618c842ccf51ececfa36179f8525364
-
SSDEEP
6144:txCppZZ8PySTftmck9eCUaAAmlgGgUE42:txCb/af0cpCU9ArGgUO
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Modifies security service 2 TTPs 22 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" svhost.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" svhost.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" svhost.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" svhost.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" svhost.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" svhost.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" svhost.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" svhost.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" svhost.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" svhost.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" svhost.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" svhost.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" svhost.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" svhost.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" svhost.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" svhost.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" ea1948163146fb253f7c28a1afe77f7b_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" svhost.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" svhost.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" svhost.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" svhost.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" ea1948163146fb253f7c28a1afe77f7b_JaffaCakes118.exe -
Checks computer location settings 2 TTPs 11 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation svhost.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation svhost.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation svhost.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation svhost.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation svhost.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation svhost.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation svhost.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation svhost.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation ea1948163146fb253f7c28a1afe77f7b_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation svhost.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation svhost.exe -
Executes dropped EXE 20 IoCs
pid Process 1764 svhost.exe 4500 svhost.exe 1656 svhost.exe 3228 svhost.exe 4060 svhost.exe 4276 svhost.exe 2636 svhost.exe 1304 svhost.exe 1064 svhost.exe 4464 svhost.exe 4056 svhost.exe 428 svhost.exe 1148 svhost.exe 3456 svhost.exe 4044 svhost.exe 3336 svhost.exe 732 svhost.exe 4120 svhost.exe 3936 svhost.exe 4016 svhost.exe -
Drops file in System32 directory 22 IoCs
description ioc Process File created C:\Windows\SysWOW64\svhost.exe svhost.exe File opened for modification C:\Windows\SysWOW64\svhost.exe svhost.exe File opened for modification C:\Windows\SysWOW64\svhost.exe svhost.exe File created C:\Windows\SysWOW64\svhost.exe svhost.exe File created C:\Windows\SysWOW64\svhost.exe svhost.exe File opened for modification C:\Windows\SysWOW64\svhost.exe svhost.exe File created C:\Windows\SysWOW64\svhost.exe ea1948163146fb253f7c28a1afe77f7b_JaffaCakes118.exe File created C:\Windows\SysWOW64\svhost.exe svhost.exe File opened for modification C:\Windows\SysWOW64\svhost.exe svhost.exe File created C:\Windows\SysWOW64\svhost.exe svhost.exe File created C:\Windows\SysWOW64\svhost.exe svhost.exe File created C:\Windows\SysWOW64\svhost.exe svhost.exe File opened for modification C:\Windows\SysWOW64\svhost.exe svhost.exe File created C:\Windows\SysWOW64\svhost.exe svhost.exe File opened for modification C:\Windows\SysWOW64\svhost.exe ea1948163146fb253f7c28a1afe77f7b_JaffaCakes118.exe File created C:\Windows\SysWOW64\svhost.exe svhost.exe File created C:\Windows\SysWOW64\svhost.exe svhost.exe File opened for modification C:\Windows\SysWOW64\svhost.exe svhost.exe File opened for modification C:\Windows\SysWOW64\svhost.exe svhost.exe File opened for modification C:\Windows\SysWOW64\svhost.exe svhost.exe File opened for modification C:\Windows\SysWOW64\svhost.exe svhost.exe File opened for modification C:\Windows\SysWOW64\svhost.exe svhost.exe -
Suspicious use of SetThreadContext 11 IoCs
description pid Process procid_target PID 1132 set thread context of 1576 1132 ea1948163146fb253f7c28a1afe77f7b_JaffaCakes118.exe 91 PID 1764 set thread context of 4500 1764 svhost.exe 99 PID 1656 set thread context of 3228 1656 svhost.exe 114 PID 4060 set thread context of 4276 4060 svhost.exe 123 PID 2636 set thread context of 1304 2636 svhost.exe 134 PID 1064 set thread context of 4464 1064 svhost.exe 142 PID 4056 set thread context of 428 4056 svhost.exe 151 PID 1148 set thread context of 3456 1148 svhost.exe 159 PID 4044 set thread context of 3336 4044 svhost.exe 176 PID 732 set thread context of 4120 732 svhost.exe 183 PID 3936 set thread context of 4016 3936 svhost.exe 191 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea1948163146fb253f7c28a1afe77f7b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea1948163146fb253f7c28a1afe77f7b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe -
Runs net.exe
-
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1132 wrote to memory of 3088 1132 ea1948163146fb253f7c28a1afe77f7b_JaffaCakes118.exe 86 PID 1132 wrote to memory of 3088 1132 ea1948163146fb253f7c28a1afe77f7b_JaffaCakes118.exe 86 PID 1132 wrote to memory of 3088 1132 ea1948163146fb253f7c28a1afe77f7b_JaffaCakes118.exe 86 PID 1132 wrote to memory of 3612 1132 ea1948163146fb253f7c28a1afe77f7b_JaffaCakes118.exe 88 PID 1132 wrote to memory of 3612 1132 ea1948163146fb253f7c28a1afe77f7b_JaffaCakes118.exe 88 PID 1132 wrote to memory of 3612 1132 ea1948163146fb253f7c28a1afe77f7b_JaffaCakes118.exe 88 PID 3088 wrote to memory of 404 3088 net.exe 90 PID 3088 wrote to memory of 404 3088 net.exe 90 PID 3088 wrote to memory of 404 3088 net.exe 90 PID 1132 wrote to memory of 1576 1132 ea1948163146fb253f7c28a1afe77f7b_JaffaCakes118.exe 91 PID 1132 wrote to memory of 1576 1132 ea1948163146fb253f7c28a1afe77f7b_JaffaCakes118.exe 91 PID 1132 wrote to memory of 1576 1132 ea1948163146fb253f7c28a1afe77f7b_JaffaCakes118.exe 91 PID 1132 wrote to memory of 1576 1132 ea1948163146fb253f7c28a1afe77f7b_JaffaCakes118.exe 91 PID 1132 wrote to memory of 1576 1132 ea1948163146fb253f7c28a1afe77f7b_JaffaCakes118.exe 91 PID 1132 wrote to memory of 1576 1132 ea1948163146fb253f7c28a1afe77f7b_JaffaCakes118.exe 91 PID 1132 wrote to memory of 1576 1132 ea1948163146fb253f7c28a1afe77f7b_JaffaCakes118.exe 91 PID 1132 wrote to memory of 1576 1132 ea1948163146fb253f7c28a1afe77f7b_JaffaCakes118.exe 91 PID 1132 wrote to memory of 1576 1132 ea1948163146fb253f7c28a1afe77f7b_JaffaCakes118.exe 91 PID 1132 wrote to memory of 1576 1132 ea1948163146fb253f7c28a1afe77f7b_JaffaCakes118.exe 91 PID 1132 wrote to memory of 1576 1132 ea1948163146fb253f7c28a1afe77f7b_JaffaCakes118.exe 91 PID 3612 wrote to memory of 1908 3612 net.exe 92 PID 3612 wrote to memory of 1908 3612 net.exe 92 PID 3612 wrote to memory of 1908 3612 net.exe 92 PID 1576 wrote to memory of 1764 1576 ea1948163146fb253f7c28a1afe77f7b_JaffaCakes118.exe 94 PID 1576 wrote to memory of 1764 1576 ea1948163146fb253f7c28a1afe77f7b_JaffaCakes118.exe 94 PID 1576 wrote to memory of 1764 1576 ea1948163146fb253f7c28a1afe77f7b_JaffaCakes118.exe 94 PID 1764 wrote to memory of 1324 1764 svhost.exe 95 PID 1764 wrote to memory of 1324 1764 svhost.exe 95 PID 1764 wrote to memory of 1324 1764 svhost.exe 95 PID 1764 wrote to memory of 4120 1764 svhost.exe 97 PID 1764 wrote to memory of 4120 1764 svhost.exe 97 PID 1764 wrote to memory of 4120 1764 svhost.exe 97 PID 1764 wrote to memory of 4500 1764 svhost.exe 99 PID 1764 wrote to memory of 4500 1764 svhost.exe 99 PID 1764 wrote to memory of 4500 1764 svhost.exe 99 PID 1764 wrote to memory of 4500 1764 svhost.exe 99 PID 1764 wrote to memory of 4500 1764 svhost.exe 99 PID 1764 wrote to memory of 4500 1764 svhost.exe 99 PID 1764 wrote to memory of 4500 1764 svhost.exe 99 PID 1764 wrote to memory of 4500 1764 svhost.exe 99 PID 1764 wrote to memory of 4500 1764 svhost.exe 99 PID 1764 wrote to memory of 4500 1764 svhost.exe 99 PID 1764 wrote to memory of 4500 1764 svhost.exe 99 PID 1324 wrote to memory of 852 1324 net.exe 100 PID 1324 wrote to memory of 852 1324 net.exe 100 PID 1324 wrote to memory of 852 1324 net.exe 100 PID 4120 wrote to memory of 3200 4120 net.exe 101 PID 4120 wrote to memory of 3200 4120 net.exe 101 PID 4120 wrote to memory of 3200 4120 net.exe 101 PID 4500 wrote to memory of 1656 4500 svhost.exe 109 PID 4500 wrote to memory of 1656 4500 svhost.exe 109 PID 4500 wrote to memory of 1656 4500 svhost.exe 109 PID 1656 wrote to memory of 4448 1656 svhost.exe 110 PID 1656 wrote to memory of 4448 1656 svhost.exe 110 PID 1656 wrote to memory of 4448 1656 svhost.exe 110 PID 1656 wrote to memory of 4220 1656 svhost.exe 112 PID 1656 wrote to memory of 4220 1656 svhost.exe 112 PID 1656 wrote to memory of 4220 1656 svhost.exe 112 PID 1656 wrote to memory of 3228 1656 svhost.exe 114 PID 1656 wrote to memory of 3228 1656 svhost.exe 114 PID 1656 wrote to memory of 3228 1656 svhost.exe 114 PID 1656 wrote to memory of 3228 1656 svhost.exe 114 PID 1656 wrote to memory of 3228 1656 svhost.exe 114 PID 1656 wrote to memory of 3228 1656 svhost.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea1948163146fb253f7c28a1afe77f7b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ea1948163146fb253f7c28a1afe77f7b_JaffaCakes118.exe"1⤵
- Modifies security service
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop wscsvc2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc3⤵
- System Location Discovery: System Language Discovery
PID:404
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop SharedAccess2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess3⤵
- System Location Discovery: System Language Discovery
PID:1908
-
-
-
C:\Users\Admin\AppData\Local\Temp\ea1948163146fb253f7c28a1afe77f7b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ea1948163146fb253f7c28a1afe77f7b_JaffaCakes118.exe"2⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Windows\SysWOW64\svhost.exeC:\Windows\system32\svhost.exe 988 "C:\Users\Admin\AppData\Local\Temp\ea1948163146fb253f7c28a1afe77f7b_JaffaCakes118.exe"3⤵
- Modifies security service
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop wscsvc4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc5⤵
- System Location Discovery: System Language Discovery
PID:852
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop SharedAccess4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess5⤵
- System Location Discovery: System Language Discovery
PID:3200
-
-
-
C:\Windows\SysWOW64\svhost.exe"C:\Windows\SysWOW64\svhost.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Windows\SysWOW64\svhost.exeC:\Windows\system32\svhost.exe 1140 "C:\Windows\SysWOW64\svhost.exe"5⤵
- Modifies security service
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop wscsvc6⤵
- System Location Discovery: System Language Discovery
PID:4448 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc7⤵
- System Location Discovery: System Language Discovery
PID:2796
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop SharedAccess6⤵
- System Location Discovery: System Language Discovery
PID:4220 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess7⤵
- System Location Discovery: System Language Discovery
PID:5012
-
-
-
C:\Windows\SysWOW64\svhost.exe"C:\Windows\SysWOW64\svhost.exe"6⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3228 -
C:\Windows\SysWOW64\svhost.exeC:\Windows\system32\svhost.exe 1108 "C:\Windows\SysWOW64\svhost.exe"7⤵
- Modifies security service
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4060 -
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop wscsvc8⤵
- System Location Discovery: System Language Discovery
PID:4368 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc9⤵
- System Location Discovery: System Language Discovery
PID:3512
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop SharedAccess8⤵
- System Location Discovery: System Language Discovery
PID:4444 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess9⤵
- System Location Discovery: System Language Discovery
PID:2964
-
-
-
C:\Windows\SysWOW64\svhost.exe"C:\Windows\SysWOW64\svhost.exe"8⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4276 -
C:\Windows\SysWOW64\svhost.exeC:\Windows\system32\svhost.exe 1108 "C:\Windows\SysWOW64\svhost.exe"9⤵
- Modifies security service
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2636 -
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop wscsvc10⤵
- System Location Discovery: System Language Discovery
PID:4012 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc11⤵
- System Location Discovery: System Language Discovery
PID:1060
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop SharedAccess10⤵
- System Location Discovery: System Language Discovery
PID:1672 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess11⤵
- System Location Discovery: System Language Discovery
PID:4308
-
-
-
C:\Windows\SysWOW64\svhost.exe"C:\Windows\SysWOW64\svhost.exe"10⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1304 -
C:\Windows\SysWOW64\svhost.exeC:\Windows\system32\svhost.exe 1108 "C:\Windows\SysWOW64\svhost.exe"11⤵
- Modifies security service
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1064 -
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop wscsvc12⤵
- System Location Discovery: System Language Discovery
PID:2192 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc13⤵
- System Location Discovery: System Language Discovery
PID:4956
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop SharedAccess12⤵
- System Location Discovery: System Language Discovery
PID:2148 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess13⤵
- System Location Discovery: System Language Discovery
PID:5116
-
-
-
C:\Windows\SysWOW64\svhost.exe"C:\Windows\SysWOW64\svhost.exe"12⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4464 -
C:\Windows\SysWOW64\svhost.exeC:\Windows\system32\svhost.exe 1112 "C:\Windows\SysWOW64\svhost.exe"13⤵
- Modifies security service
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4056 -
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop wscsvc14⤵
- System Location Discovery: System Language Discovery
PID:3488 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc15⤵
- System Location Discovery: System Language Discovery
PID:5100
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop SharedAccess14⤵
- System Location Discovery: System Language Discovery
PID:3208 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess15⤵
- System Location Discovery: System Language Discovery
PID:4812
-
-
-
C:\Windows\SysWOW64\svhost.exe"C:\Windows\SysWOW64\svhost.exe"14⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:428 -
C:\Windows\SysWOW64\svhost.exeC:\Windows\system32\svhost.exe 1108 "C:\Windows\SysWOW64\svhost.exe"15⤵
- Modifies security service
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1148 -
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop wscsvc16⤵
- System Location Discovery: System Language Discovery
PID:1836 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc17⤵
- System Location Discovery: System Language Discovery
PID:4392
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop SharedAccess16⤵
- System Location Discovery: System Language Discovery
PID:2596 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess17⤵
- System Location Discovery: System Language Discovery
PID:4800
-
-
-
C:\Windows\SysWOW64\svhost.exe"C:\Windows\SysWOW64\svhost.exe"16⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3456 -
C:\Windows\SysWOW64\svhost.exeC:\Windows\system32\svhost.exe 1108 "C:\Windows\SysWOW64\svhost.exe"17⤵
- Modifies security service
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4044 -
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop wscsvc18⤵
- System Location Discovery: System Language Discovery
PID:3728 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc19⤵
- System Location Discovery: System Language Discovery
PID:4428
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop SharedAccess18⤵
- System Location Discovery: System Language Discovery
PID:3504 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess19⤵
- System Location Discovery: System Language Discovery
PID:3088
-
-
-
C:\Windows\SysWOW64\svhost.exe"C:\Windows\SysWOW64\svhost.exe"18⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3336 -
C:\Windows\SysWOW64\svhost.exeC:\Windows\system32\svhost.exe 1108 "C:\Windows\SysWOW64\svhost.exe"19⤵
- Modifies security service
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:732 -
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop wscsvc20⤵
- System Location Discovery: System Language Discovery
PID:3648 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc21⤵PID:1584
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop SharedAccess20⤵
- System Location Discovery: System Language Discovery
PID:852 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess21⤵
- System Location Discovery: System Language Discovery
PID:2336
-
-
-
C:\Windows\SysWOW64\svhost.exe"C:\Windows\SysWOW64\svhost.exe"20⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4120 -
C:\Windows\SysWOW64\svhost.exeC:\Windows\system32\svhost.exe 1096 "C:\Windows\SysWOW64\svhost.exe"21⤵
- Modifies security service
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3936 -
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop wscsvc22⤵
- System Location Discovery: System Language Discovery
PID:3412 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc23⤵
- System Location Discovery: System Language Discovery
PID:4960
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop SharedAccess22⤵
- System Location Discovery: System Language Discovery
PID:4692 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess23⤵
- System Location Discovery: System Language Discovery
PID:4344
-
-
-
C:\Windows\SysWOW64\svhost.exe"C:\Windows\SysWOW64\svhost.exe"22⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4016
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
239KB
MD5ea1948163146fb253f7c28a1afe77f7b
SHA119c07b297aa70d25de8bc83cfd80603f7abb3f58
SHA256b2ca8ddbae694c93eef254de36e749cd506d4d50962c284ee1ec7bf59492fd30
SHA5126e15a2120695831e024ad45cf72a85283b137a445d76ba9e6e7c45606af2f79931864cee481ff398bfa10bd2951c41d09618c842ccf51ececfa36179f8525364