Analysis
-
max time kernel
150s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:38
Behavioral task
behavioral1
Sample
eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe
Resource
win10v2004-20240910-en
General
-
Target
eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe
-
Size
231KB
-
MD5
eac650f7a6550a40231f687f69a58ac8
-
SHA1
1bedd4c2538910b97b38f07d12c26bfc74096add
-
SHA256
0db71f9a5a8487250e2d1d86f821c7630c02fd05a91f36d3300c504ad4f5a622
-
SHA512
52c4c07db9e275ad231447f4284861dd9430688a87be42e2988b974fd6b1a4d9fe268d0f3f9ddd8dc822c16e484f228002be8603b62acc00ead1659608a806fb
-
SSDEEP
6144:79jr0DjekDbKig1zL07MpwNiooLFjfsGa+NDS:ZjrrkDbat07yPFjfsGa+ND
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2744 mscorsvw.exe 2920 mscorsvw.exe 1372 OSE.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/3064-0-0x0000000001000000-0x0000000001078000-memory.dmp upx behavioral1/files/0x00010000000050f4-10.dat upx behavioral1/memory/2744-11-0x0000000010000000-0x0000000010070000-memory.dmp upx behavioral1/files/0x000100000000ecb2-21.dat upx behavioral1/memory/2920-22-0x0000000000400000-0x0000000000479000-memory.dmp upx behavioral1/memory/2744-24-0x0000000010000000-0x0000000010070000-memory.dmp upx behavioral1/files/0x000100000001040d-41.dat upx behavioral1/memory/1372-42-0x000000002E000000-0x000000002E086000-memory.dmp upx behavioral1/files/0x0005000000018eba-56.dat upx behavioral1/files/0x00010000000095dd-63.dat upx behavioral1/files/0x00010000000115ca-65.dat upx behavioral1/files/0x000100000000955f-66.dat upx behavioral1/files/0x000900000001032b-80.dat upx behavioral1/memory/3064-81-0x0000000001000000-0x0000000001078000-memory.dmp upx behavioral1/memory/1372-82-0x000000002E000000-0x000000002E086000-memory.dmp upx -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc\S-1-5-21-457978338-2990298471-2379561640-1000\EnableNotifications = "0" OSE.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc\S-1-5-21-457978338-2990298471-2379561640-1000 OSE.EXE -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 42 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened (read-only) \??\K: eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened (read-only) \??\M: eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened (read-only) \??\P: OSE.EXE File opened (read-only) \??\S: OSE.EXE File opened (read-only) \??\W: OSE.EXE File opened (read-only) \??\E: eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened (read-only) \??\L: eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened (read-only) \??\R: eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened (read-only) \??\S: eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened (read-only) \??\Z: eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened (read-only) \??\H: OSE.EXE File opened (read-only) \??\I: OSE.EXE File opened (read-only) \??\Z: OSE.EXE File opened (read-only) \??\J: eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened (read-only) \??\V: eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened (read-only) \??\W: eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened (read-only) \??\E: OSE.EXE File opened (read-only) \??\Q: OSE.EXE File opened (read-only) \??\I: eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened (read-only) \??\X: OSE.EXE File opened (read-only) \??\O: eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened (read-only) \??\X: eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened (read-only) \??\J: OSE.EXE File opened (read-only) \??\U: OSE.EXE File opened (read-only) \??\Y: OSE.EXE File opened (read-only) \??\P: eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened (read-only) \??\T: eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened (read-only) \??\Y: eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened (read-only) \??\L: OSE.EXE File opened (read-only) \??\R: OSE.EXE File opened (read-only) \??\H: eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened (read-only) \??\U: eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened (read-only) \??\G: OSE.EXE File opened (read-only) \??\N: OSE.EXE File opened (read-only) \??\O: OSE.EXE File opened (read-only) \??\T: OSE.EXE File opened (read-only) \??\N: eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened (read-only) \??\K: OSE.EXE File opened (read-only) \??\M: OSE.EXE File opened (read-only) \??\V: OSE.EXE File opened (read-only) \??\Q: eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe -
Drops file in System32 directory 36 IoCs
description ioc Process File opened for modification \??\c:\windows\SysWOW64\svchost.exe OSE.EXE File opened for modification \??\c:\windows\SysWOW64\lsass.exe OSE.EXE File opened for modification \??\c:\windows\SysWOW64\fxssvc.exe OSE.EXE File opened for modification \??\c:\windows\SysWOW64\alg.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\msiexec.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File created \??\c:\windows\SysWOW64\msiexec.vir eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\wbem\wmiApsrv.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\searchindexer.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\ieetwcollector.exe OSE.EXE File opened for modification \??\c:\windows\syswow64\perfhost.exe OSE.EXE File opened for modification \??\c:\windows\SysWOW64\ui0detect.exe OSE.EXE File opened for modification \??\c:\windows\SysWOW64\wbengine.exe OSE.EXE File opened for modification \??\c:\windows\SysWOW64\svchost.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File created \??\c:\windows\SysWOW64\svchost.vir eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\snmptrap.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\vds.exe OSE.EXE File created \??\c:\windows\SysWOW64\dllhost.vir eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\wbengine.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\snmptrap.exe OSE.EXE File opened for modification \??\c:\windows\SysWOW64\vds.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\vssvc.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\vssvc.exe OSE.EXE File opened for modification \??\c:\windows\SysWOW64\dllhost.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\locator.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\wbem\wmiApsrv.exe OSE.EXE File opened for modification \??\c:\windows\SysWOW64\fxssvc.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\ui0detect.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\ieetwcollector.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification \??\c:\windows\syswow64\perfhost.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File created \??\c:\windows\SysWOW64\searchindexer.vir eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\locator.exe OSE.EXE File opened for modification \??\c:\windows\SysWOW64\lsass.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\msdtc.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\alg.exe OSE.EXE File opened for modification \??\c:\windows\SysWOW64\msdtc.exe OSE.EXE File opened for modification \??\c:\windows\SysWOW64\searchindexer.exe OSE.EXE -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\Uninstall.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\InputPersonalization.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javadoc.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmap.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification \??\c:\program files\windows media player\wmpnetwk.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\ktab.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\microsoft office\office14\groove.exe OSE.EXE File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification C:\Program Files\Internet Explorer\ieinstal.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\servertool.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File created C:\Program Files\7-Zip\Uninstall.vir eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ConvertInkStore.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification \??\c:\program files\windows media player\wmpnetwk.exe OSE.EXE File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\orbd.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification C:\Program Files\Internet Explorer\iediagcmd.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\java.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\common files\microsoft shared\source engine\ose.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jhat.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\policytool.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ShapeCollector.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaw.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jps.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstat.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification C:\Program Files\7-Zip\7zG.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\appletviewer.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification C:\Program Files\DVD Maker\DVDMaker.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\servertool.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\mozilla maintenance service\maintenanceservice.exe OSE.EXE File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\native2ascii.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\kinit.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmiregistry.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\rmiregistry.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification C:\Program Files\7-Zip\7z.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javah.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jsadebugd.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\kinit.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\keytool.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\xjc.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jp2launcher.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\pack200.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification C:\Program Files\Internet Explorer\iexplore.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VSTO\10.0\VSTOInstaller.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jcmd.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\orbd.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\notification_helper.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\java-rmi.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\keytool.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\InkWatson.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\pack200.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\idlj.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jdb.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\serialver.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\rmid.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification \??\c:\program files\google\chrome\Application\106.0.5249.119\elevation_service.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File created \??\c:\program files (x86)\common files\microsoft shared\source engine\ose.vir eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javafxpackager.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File created \??\c:\program files (x86)\microsoft office\office14\groove.vir eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\mozilla maintenance service\maintenanceservice.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe -
Drops file in Windows directory 27 IoCs
description ioc Process File opened for modification \??\c:\windows\ehome\ehsched.exe OSE.EXE File opened for modification \??\c:\windows\microsoft.net\framework\v2.0.50727\mscorsvw.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.log mscorsvw.exe File opened for modification \??\c:\windows\ehome\ehrecvr.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification \??\c:\windows\ehome\ehsched.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\windows communication foundation\infocard.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification \??\c:\windows\microsoft.net\framework\v2.0.50727\mscorsvw.exe OSE.EXE File opened for modification \??\c:\windows\microsoft.net\framework\v4.0.30319\mscorsvw.exe OSE.EXE File opened for modification \??\c:\windows\microsoft.net\framework64\v4.0.30319\aspnet_state.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.lock mscorsvw.exe File opened for modification \??\c:\windows\servicing\trustedinstaller.exe OSE.EXE File created \??\c:\windows\microsoft.net\framework\v2.0.50727\mscorsvw.vir eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v4.0.30319\mscorsvw.exe OSE.EXE File opened for modification \??\c:\windows\ehome\ehrecvr.exe OSE.EXE File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\wpf\presentationfontcache.exe OSE.EXE File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngenservicelock.dat mscorsvw.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v2.0.50727\mscorsvw.exe OSE.EXE File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\windows communication foundation\infocard.exe OSE.EXE File opened for modification \??\c:\windows\microsoft.net\framework64\v2.0.50727\mscorsvw.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v4.0.30319\mscorsvw.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\wpf\presentationfontcache.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File created C:\Windows\Registration\{02D4B3F1-FD88-11D1-960D-00805FC79235}.{2BD40F80-8797-474D-9E9D-5AE474385515}.crmlog dllhost.exe File opened for modification \??\c:\windows\servicing\trustedinstaller.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v4.0.30319\aspnet_state.exe OSE.EXE File opened for modification \??\c:\windows\microsoft.net\framework\v4.0.30319\mscorsvw.exe eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe File opened for modification C:\Windows\Registration\{02D4B3F1-FD88-11D1-960D-00805FC79235}.{2BD40F80-8797-474D-9E9D-5AE474385515}.crmlog dllhost.exe File created \??\c:\windows\microsoft.net\framework\v4.0.30319\mscorsvw.vir eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OSE.EXE -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 1372 OSE.EXE 1372 OSE.EXE 1372 OSE.EXE 1372 OSE.EXE 1372 OSE.EXE 1372 OSE.EXE 1372 OSE.EXE 1372 OSE.EXE 1372 OSE.EXE 1372 OSE.EXE 1372 OSE.EXE 1372 OSE.EXE 1372 OSE.EXE 1372 OSE.EXE 1372 OSE.EXE 1372 OSE.EXE 1372 OSE.EXE 1372 OSE.EXE 1372 OSE.EXE 1372 OSE.EXE 1372 OSE.EXE 1372 OSE.EXE 1372 OSE.EXE 1372 OSE.EXE 1372 OSE.EXE 1372 OSE.EXE -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 3064 eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe Token: SeRestorePrivilege 1564 msiexec.exe Token: SeTakeOwnershipPrivilege 1564 msiexec.exe Token: SeSecurityPrivilege 1564 msiexec.exe Token: SeTakeOwnershipPrivilege 1372 OSE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3064 eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 3064 eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eac650f7a6550a40231f687f69a58ac8_JaffaCakes118.exe"1⤵
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3064
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2744
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe1⤵
- Executes dropped EXE
PID:2920
-
C:\Windows\system32\dllhost.exeC:\Windows\system32\dllhost.exe /Processid:{02D4B3F1-FD88-11D1-960D-00805FC79235}1⤵
- Drops file in Windows directory
PID:2604
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1564
-
C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1372
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
284KB
MD57ffeb68eb174c10b3f48898548a2f2a0
SHA16a02857cd6c936fe1566969450996e8d2d6af707
SHA2569f120500f86cd50bcfefd660dd2ddd192b7ec6909ec6d910978ed0b7c2d53269
SHA5123a7ee1ab3addb35746241579ab3713520900c8cc3d852532ae26c252b0821351158a0f2b97c8b37197351935c1e284b627912f675fffd0c8c8e5eee30a41627c
-
Filesize
1.2MB
MD581c19480abd4ea36763852ec1ee742d4
SHA15b9469f27c40c96d6a74de59ed6c4eafcaa1a08a
SHA256bdfe435ad5d00e55ea05332e2de62bd2aafc8bab6ec8925dbc0036226db700cd
SHA5123b71d6dc9d0f8c5d652b75db80078fee37c5e6b71cf1ad744b1b38c4ed553681ad50e6e6aaee8570cfef7c0b831e85b5156b44cb6c3f6d0a79c2ed1a7d1cbe58
-
Filesize
284KB
MD535e792238c2c59d9b8e6b575e3a9b516
SHA18b73d5c73792380475d304e07be2f6ac55706bc5
SHA256f9b087c8bb78d0287892f05336dabde198242dd2b8e32f1c3ad2db1a71c3c68b
SHA512b4c113a3528df4f1cf4c0bdb721f0b5e794617a292ad1f8488255b8dc83a755580f5a3f9de5195f7f8513f2dad0bfbea5ca5734a709b055048848be59e0dcfa0
-
Filesize
203KB
MD5087dbe7da27fcf53037652c6101ce70a
SHA1d29a3af2632e69f4a4f6471df8c659680bf83852
SHA25667b73c5957f711b18bf519f98bead0e608cf52eb51c616aafbbb109cd3277fed
SHA5128674dd325d2ef51659e6c0f017a4517b32ab006d93c8fbafeca43b4c3b79834185d1766e6911e957b37137dda30a73c2d6062d4ba9a8700821f67217650e48b9
-
Filesize
1003KB
MD56db89762066734b4b5fa441026eb1df8
SHA1ed07a63d1b7f68facabaf716bcfb018c252d92ec
SHA25689b1f1f08ac99511e501b3ab36d67e239838c575356d47be8ee67a820c185877
SHA5125429a64e04d0041ededce822686c9f81501817422ec92ea0904165cf9328db6f1e8f39a36e09c350316a8f29ac4286fecc964665a931e0e08ca033d37e522771
-
Filesize
234KB
MD559166344d56307b7b450f3eaa21ebbba
SHA17e89de5f40230976bbc99de45591d99242546902
SHA256f3bf680450747a60a9d64723d0708e8f3c9c86c2ad512f3d2b1d3310dd4351b8
SHA512a9b408e420cb832f5ecfa740eb2d2125d724d6bbd8787f28cc788bcb4cb8912cc8005aee4b4071bb6536bf2ae450caa0d1019bfc3e825a1cc4307f85b39a2731
-
Filesize
29.7MB
MD5db88e47e4b1b8d4bd116129e56ca5b5f
SHA1a9ffcb41a127e890084447308798794a21b3a0cb
SHA25681313705da03d0dc4fa196d5445d8947f7fc3277783a8a9c6c2479b17a89062f
SHA51257e5a3523fe7c116cef391bf23ee9e835b672a0211d846251fae04bd247b1b2471567cbe3657d1f678d6060d3f5247557100194e2be1b6b9989233bc088bf2fd
-
Filesize
562KB
MD500667ad63982a000a85127d935608420
SHA19bbce5573ccecec25a092b66571aca4c92b9fa8d
SHA256ed09f494fa5d7297b00579d38a1f4a58adca06312c1896f9cb311ccc9f57a74e
SHA5127e706031b2f0c34b2b90a096c88dc6a0bb485b9f4509599abe152a70f47bca0f19bed98884186b2cf54eccf1c60e1c43f869d850aa167b1fc12f42e4bc02eb33
-
Filesize
164KB
MD51381db3ff80c093155c262a86d436005
SHA1ea50170b7343fd7c5fa76d350ffd042c8308d05a
SHA25623e003acea3e1a8afc042a2a2c62e0b298022d983721aee3c08bc85431698378
SHA5129072ec2923a870c6df616d253670969ec6ce5665e942ced2b4f2cc874c4dfcd06a5aae236ed3e01d85c2fef174dd46eeab83e2ff3be6e680561f146d2cd5a039