Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 08:32
Static task
static1
Behavioral task
behavioral1
Sample
eaf34a7d9a24baf248e4b5da247a384e_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
eaf34a7d9a24baf248e4b5da247a384e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
SFhelper.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
SFhelper.dll
Resource
win10v2004-20240802-en
General
-
Target
eaf34a7d9a24baf248e4b5da247a384e_JaffaCakes118.exe
-
Size
211KB
-
MD5
eaf34a7d9a24baf248e4b5da247a384e
-
SHA1
ff4ccb35e4311fefdd7f0a7251570c51ab9ab224
-
SHA256
66a05692cf2ff6b0abcd97a5d4b37b61700a21fb93eee4338d87b4ebe79e32b0
-
SHA512
a50b36fff27c74c7049be98e4e2f312c825fae52f9aa9161e830e0703e476e7cb4a2947466fda1ebca0244b2e5d6e3b086fc1e884e22b468416416ebb11637b3
-
SSDEEP
6144:z8dNXSE4z6Jl8TKkPrX81t1YVIgZDWENiEDpwjALIlhT:4fJl8TfPrX81t1RoWZfl
Malware Config
Extracted
C:\Users\Admin\Documents\# DECRYPT MY FILES #.txt
cerber
http://cerberhhyed5frqa.azlto5.win/62CE-3922-0B9C-0063-7B3F
http://cerberhhyed5frqa.xzcfr4.win/62CE-3922-0B9C-0063-7B3F
http://cerberhhyed5frqa.asxce4.win/62CE-3922-0B9C-0063-7B3F
http://cerberhhyed5frqa.45kgok.win/62CE-3922-0B9C-0063-7B3F
http://cerberhhyed5frqa.ad34ft.win/62CE-3922-0B9C-0063-7B3F
http://cerberhhyed5frqa.onion/62CE-3922-0B9C-0063-7B3F
Extracted
C:\Users\Admin\Documents\# DECRYPT MY FILES #.html
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Contacts a large (16401) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{316124DD-AE15-937B-3680-D4B7775873DD}\\shrpubw.exe\"" eaf34a7d9a24baf248e4b5da247a384e_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{316124DD-AE15-937B-3680-D4B7775873DD}\\shrpubw.exe\"" shrpubw.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation shrpubw.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\shrpubw.lnk eaf34a7d9a24baf248e4b5da247a384e_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\shrpubw.lnk shrpubw.exe -
Executes dropped EXE 2 IoCs
pid Process 3728 shrpubw.exe 5108 shrpubw.exe -
Loads dropped DLL 6 IoCs
pid Process 2748 eaf34a7d9a24baf248e4b5da247a384e_JaffaCakes118.exe 2748 eaf34a7d9a24baf248e4b5da247a384e_JaffaCakes118.exe 2748 eaf34a7d9a24baf248e4b5da247a384e_JaffaCakes118.exe 3728 shrpubw.exe 3728 shrpubw.exe 3728 shrpubw.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\shrpubw = "\"C:\\Users\\Admin\\AppData\\Roaming\\{316124DD-AE15-937B-3680-D4B7775873DD}\\shrpubw.exe\"" eaf34a7d9a24baf248e4b5da247a384e_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\shrpubw = "\"C:\\Users\\Admin\\AppData\\Roaming\\{316124DD-AE15-937B-3680-D4B7775873DD}\\shrpubw.exe\"" eaf34a7d9a24baf248e4b5da247a384e_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\shrpubw = "\"C:\\Users\\Admin\\AppData\\Roaming\\{316124DD-AE15-937B-3680-D4B7775873DD}\\shrpubw.exe\"" shrpubw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\shrpubw = "\"C:\\Users\\Admin\\AppData\\Roaming\\{316124DD-AE15-937B-3680-D4B7775873DD}\\shrpubw.exe\"" shrpubw.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 21 ipinfo.io -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2748 set thread context of 1152 2748 eaf34a7d9a24baf248e4b5da247a384e_JaffaCakes118.exe 91 PID 3728 set thread context of 5108 3728 shrpubw.exe 103 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shrpubw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eaf34a7d9a24baf248e4b5da247a384e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eaf34a7d9a24baf248e4b5da247a384e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shrpubw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4740 cmd.exe 4488 PING.EXE 4492 cmd.exe 4548 PING.EXE -
NSIS installer 2 IoCs
resource yara_rule behavioral2/files/0x00070000000235d9-27.dat nsis_installer_1 behavioral2/files/0x00070000000235d9-27.dat nsis_installer_2 -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 3104 vssadmin.exe -
Kills process with taskkill 2 IoCs
pid Process 1932 taskkill.exe 3736 taskkill.exe -
Modifies Control Panel 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{316124DD-AE15-937B-3680-D4B7775873DD}\\shrpubw.exe\"" eaf34a7d9a24baf248e4b5da247a384e_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\Desktop shrpubw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{316124DD-AE15-937B-3680-D4B7775873DD}\\shrpubw.exe\"" shrpubw.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\Desktop eaf34a7d9a24baf248e4b5da247a384e_JaffaCakes118.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings shrpubw.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 4548 PING.EXE 4488 PING.EXE -
Suspicious behavior: EnumeratesProcesses 60 IoCs
pid Process 5108 shrpubw.exe 5108 shrpubw.exe 5108 shrpubw.exe 5108 shrpubw.exe 5108 shrpubw.exe 5108 shrpubw.exe 5108 shrpubw.exe 5108 shrpubw.exe 5108 shrpubw.exe 5108 shrpubw.exe 5108 shrpubw.exe 5108 shrpubw.exe 5108 shrpubw.exe 5108 shrpubw.exe 5108 shrpubw.exe 5108 shrpubw.exe 5108 shrpubw.exe 5108 shrpubw.exe 5108 shrpubw.exe 5108 shrpubw.exe 5108 shrpubw.exe 5108 shrpubw.exe 5108 shrpubw.exe 5108 shrpubw.exe 5108 shrpubw.exe 5108 shrpubw.exe 5108 shrpubw.exe 5108 shrpubw.exe 5108 shrpubw.exe 5108 shrpubw.exe 5108 shrpubw.exe 5108 shrpubw.exe 5108 shrpubw.exe 5108 shrpubw.exe 5108 shrpubw.exe 5108 shrpubw.exe 5108 shrpubw.exe 5108 shrpubw.exe 5108 shrpubw.exe 5108 shrpubw.exe 5108 shrpubw.exe 5108 shrpubw.exe 5108 shrpubw.exe 5108 shrpubw.exe 5108 shrpubw.exe 5108 shrpubw.exe 5108 shrpubw.exe 5108 shrpubw.exe 5108 shrpubw.exe 5108 shrpubw.exe 5108 shrpubw.exe 5108 shrpubw.exe 5108 shrpubw.exe 5108 shrpubw.exe 5108 shrpubw.exe 5108 shrpubw.exe 5108 shrpubw.exe 5108 shrpubw.exe 5108 shrpubw.exe 5108 shrpubw.exe -
Suspicious use of AdjustPrivilegeToken 51 IoCs
description pid Process Token: SeDebugPrivilege 1152 eaf34a7d9a24baf248e4b5da247a384e_JaffaCakes118.exe Token: SeDebugPrivilege 1932 taskkill.exe Token: SeDebugPrivilege 5108 shrpubw.exe Token: SeBackupPrivilege 4940 vssvc.exe Token: SeRestorePrivilege 4940 vssvc.exe Token: SeAuditPrivilege 4940 vssvc.exe Token: SeIncreaseQuotaPrivilege 4204 wmic.exe Token: SeSecurityPrivilege 4204 wmic.exe Token: SeTakeOwnershipPrivilege 4204 wmic.exe Token: SeLoadDriverPrivilege 4204 wmic.exe Token: SeSystemProfilePrivilege 4204 wmic.exe Token: SeSystemtimePrivilege 4204 wmic.exe Token: SeProfSingleProcessPrivilege 4204 wmic.exe Token: SeIncBasePriorityPrivilege 4204 wmic.exe Token: SeCreatePagefilePrivilege 4204 wmic.exe Token: SeBackupPrivilege 4204 wmic.exe Token: SeRestorePrivilege 4204 wmic.exe Token: SeShutdownPrivilege 4204 wmic.exe Token: SeDebugPrivilege 4204 wmic.exe Token: SeSystemEnvironmentPrivilege 4204 wmic.exe Token: SeRemoteShutdownPrivilege 4204 wmic.exe Token: SeUndockPrivilege 4204 wmic.exe Token: SeManageVolumePrivilege 4204 wmic.exe Token: 33 4204 wmic.exe Token: 34 4204 wmic.exe Token: 35 4204 wmic.exe Token: 36 4204 wmic.exe Token: SeIncreaseQuotaPrivilege 4204 wmic.exe Token: SeSecurityPrivilege 4204 wmic.exe Token: SeTakeOwnershipPrivilege 4204 wmic.exe Token: SeLoadDriverPrivilege 4204 wmic.exe Token: SeSystemProfilePrivilege 4204 wmic.exe Token: SeSystemtimePrivilege 4204 wmic.exe Token: SeProfSingleProcessPrivilege 4204 wmic.exe Token: SeIncBasePriorityPrivilege 4204 wmic.exe Token: SeCreatePagefilePrivilege 4204 wmic.exe Token: SeBackupPrivilege 4204 wmic.exe Token: SeRestorePrivilege 4204 wmic.exe Token: SeShutdownPrivilege 4204 wmic.exe Token: SeDebugPrivilege 4204 wmic.exe Token: SeSystemEnvironmentPrivilege 4204 wmic.exe Token: SeRemoteShutdownPrivilege 4204 wmic.exe Token: SeUndockPrivilege 4204 wmic.exe Token: SeManageVolumePrivilege 4204 wmic.exe Token: 33 4204 wmic.exe Token: 34 4204 wmic.exe Token: 35 4204 wmic.exe Token: 36 4204 wmic.exe Token: 33 1952 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1952 AUDIODG.EXE Token: SeDebugPrivilege 3736 taskkill.exe -
Suspicious use of WriteProcessMemory 50 IoCs
description pid Process procid_target PID 2748 wrote to memory of 1152 2748 eaf34a7d9a24baf248e4b5da247a384e_JaffaCakes118.exe 91 PID 2748 wrote to memory of 1152 2748 eaf34a7d9a24baf248e4b5da247a384e_JaffaCakes118.exe 91 PID 2748 wrote to memory of 1152 2748 eaf34a7d9a24baf248e4b5da247a384e_JaffaCakes118.exe 91 PID 2748 wrote to memory of 1152 2748 eaf34a7d9a24baf248e4b5da247a384e_JaffaCakes118.exe 91 PID 2748 wrote to memory of 1152 2748 eaf34a7d9a24baf248e4b5da247a384e_JaffaCakes118.exe 91 PID 2748 wrote to memory of 1152 2748 eaf34a7d9a24baf248e4b5da247a384e_JaffaCakes118.exe 91 PID 2748 wrote to memory of 1152 2748 eaf34a7d9a24baf248e4b5da247a384e_JaffaCakes118.exe 91 PID 2748 wrote to memory of 1152 2748 eaf34a7d9a24baf248e4b5da247a384e_JaffaCakes118.exe 91 PID 2748 wrote to memory of 1152 2748 eaf34a7d9a24baf248e4b5da247a384e_JaffaCakes118.exe 91 PID 2748 wrote to memory of 1152 2748 eaf34a7d9a24baf248e4b5da247a384e_JaffaCakes118.exe 91 PID 1152 wrote to memory of 3728 1152 eaf34a7d9a24baf248e4b5da247a384e_JaffaCakes118.exe 98 PID 1152 wrote to memory of 3728 1152 eaf34a7d9a24baf248e4b5da247a384e_JaffaCakes118.exe 98 PID 1152 wrote to memory of 3728 1152 eaf34a7d9a24baf248e4b5da247a384e_JaffaCakes118.exe 98 PID 1152 wrote to memory of 4740 1152 eaf34a7d9a24baf248e4b5da247a384e_JaffaCakes118.exe 99 PID 1152 wrote to memory of 4740 1152 eaf34a7d9a24baf248e4b5da247a384e_JaffaCakes118.exe 99 PID 1152 wrote to memory of 4740 1152 eaf34a7d9a24baf248e4b5da247a384e_JaffaCakes118.exe 99 PID 4740 wrote to memory of 1932 4740 cmd.exe 101 PID 4740 wrote to memory of 1932 4740 cmd.exe 101 PID 4740 wrote to memory of 1932 4740 cmd.exe 101 PID 4740 wrote to memory of 4488 4740 cmd.exe 102 PID 4740 wrote to memory of 4488 4740 cmd.exe 102 PID 4740 wrote to memory of 4488 4740 cmd.exe 102 PID 3728 wrote to memory of 5108 3728 shrpubw.exe 103 PID 3728 wrote to memory of 5108 3728 shrpubw.exe 103 PID 3728 wrote to memory of 5108 3728 shrpubw.exe 103 PID 3728 wrote to memory of 5108 3728 shrpubw.exe 103 PID 3728 wrote to memory of 5108 3728 shrpubw.exe 103 PID 3728 wrote to memory of 5108 3728 shrpubw.exe 103 PID 3728 wrote to memory of 5108 3728 shrpubw.exe 103 PID 3728 wrote to memory of 5108 3728 shrpubw.exe 103 PID 3728 wrote to memory of 5108 3728 shrpubw.exe 103 PID 3728 wrote to memory of 5108 3728 shrpubw.exe 103 PID 5108 wrote to memory of 3104 5108 shrpubw.exe 104 PID 5108 wrote to memory of 3104 5108 shrpubw.exe 104 PID 5108 wrote to memory of 4204 5108 shrpubw.exe 108 PID 5108 wrote to memory of 4204 5108 shrpubw.exe 108 PID 5108 wrote to memory of 1744 5108 shrpubw.exe 112 PID 5108 wrote to memory of 1744 5108 shrpubw.exe 112 PID 5108 wrote to memory of 1552 5108 shrpubw.exe 115 PID 5108 wrote to memory of 1552 5108 shrpubw.exe 115 PID 5108 wrote to memory of 2732 5108 shrpubw.exe 118 PID 5108 wrote to memory of 2732 5108 shrpubw.exe 118 PID 5108 wrote to memory of 4812 5108 shrpubw.exe 120 PID 5108 wrote to memory of 4812 5108 shrpubw.exe 120 PID 5108 wrote to memory of 4492 5108 shrpubw.exe 126 PID 5108 wrote to memory of 4492 5108 shrpubw.exe 126 PID 4492 wrote to memory of 3736 4492 cmd.exe 128 PID 4492 wrote to memory of 3736 4492 cmd.exe 128 PID 4492 wrote to memory of 4548 4492 cmd.exe 130 PID 4492 wrote to memory of 4548 4492 cmd.exe 130 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\eaf34a7d9a24baf248e4b5da247a384e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eaf34a7d9a24baf248e4b5da247a384e_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\eaf34a7d9a24baf248e4b5da247a384e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eaf34a7d9a24baf248e4b5da247a384e_JaffaCakes118.exe"2⤵
- Adds policy Run key to start application
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Users\Admin\AppData\Roaming\{316124DD-AE15-937B-3680-D4B7775873DD}\shrpubw.exe"C:\Users\Admin\AppData\Roaming\{316124DD-AE15-937B-3680-D4B7775873DD}\shrpubw.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Users\Admin\AppData\Roaming\{316124DD-AE15-937B-3680-D4B7775873DD}\shrpubw.exe"C:\Users\Admin\AppData\Roaming\{316124DD-AE15-937B-3680-D4B7775873DD}\shrpubw.exe"4⤵
- Adds policy Run key to start application
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Windows\system32\vssadmin.exe"C:\Windows\system32\vssadmin.exe" delete shadows /all /quiet5⤵
- Interacts with shadow copies
PID:3104
-
-
C:\Windows\system32\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" shadowcopy delete5⤵
- Suspicious use of AdjustPrivilegeToken
PID:4204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html5⤵PID:1744
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt5⤵PID:1552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://cerberhhyed5frqa.azlto5.win/62CE-3922-0B9C-0063-7B3F5⤵PID:2732
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"5⤵PID:4812
-
-
C:\Windows\system32\cmd.exe/d /c taskkill /t /f /im "shrpubw.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{316124DD-AE15-937B-3680-D4B7775873DD}\shrpubw.exe" > NUL5⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Windows\system32\taskkill.exetaskkill /t /f /im "shrpubw.exe"6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3736
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.16⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4548
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "eaf34a7d9a24baf248e4b5da247a384e_JaffaCakes118.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\eaf34a7d9a24baf248e4b5da247a384e_JaffaCakes118.exe" > NUL3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "eaf34a7d9a24baf248e4b5da247a384e_JaffaCakes118.exe"4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1932
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.14⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4488
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=1040,i,3210801877307184477,8078594481454001567,262144 --variations-seed-version --mojo-platform-channel-handle=4384 /prefetch:81⤵PID:656
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4940
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --field-trial-handle=4136,i,3210801877307184477,8078594481454001567,262144 --variations-seed-version --mojo-platform-channel-handle=4036 /prefetch:11⤵PID:2784
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --field-trial-handle=4760,i,3210801877307184477,8078594481454001567,262144 --variations-seed-version --mojo-platform-channel-handle=5124 /prefetch:11⤵PID:2828
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=5392,i,3210801877307184477,8078594481454001567,262144 --variations-seed-version --mojo-platform-channel-handle=5408 /prefetch:81⤵PID:3068
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --field-trial-handle=5400,i,3210801877307184477,8078594481454001567,262144 --variations-seed-version --mojo-platform-channel-handle=5464 /prefetch:81⤵PID:4956
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --field-trial-handle=5812,i,3210801877307184477,8078594481454001567,262144 --variations-seed-version --mojo-platform-channel-handle=3764 /prefetch:11⤵PID:2712
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=21 --field-trial-handle=5852,i,3210801877307184477,8078594481454001567,262144 --variations-seed-version --mojo-platform-channel-handle=6032 /prefetch:11⤵PID:692
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3f4 0x2f41⤵
- Suspicious use of AdjustPrivilegeToken
PID:1952
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=22 --field-trial-handle=5964,i,3210801877307184477,8078594481454001567,262144 --variations-seed-version --mojo-platform-channel-handle=4032 /prefetch:11⤵PID:4016
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=23 --field-trial-handle=6324,i,3210801877307184477,8078594481454001567,262144 --variations-seed-version --mojo-platform-channel-handle=6412 /prefetch:11⤵PID:308
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Defense Evasion
Direct Volume Access
1Indicator Removal
2File Deletion
2Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5883eff06ac96966270731e4e22817e11
SHA1523c87c98236cbc04430e87ec19b977595092ac8
SHA25644e5dfd551b38e886214bd6b9c8ee913c4c4d1f085a6575d97c3e892b925da82
SHA51260333253342476911c84bbc1d9bf8a29f811207787fdd6107dce8d2b6e031669303f28133ffc811971ed7792087fe90fb1faabc0af4e91c298ba51e28109a390
-
Filesize
117KB
MD56d962207c8cfef83984d04e2ed21dc12
SHA1e508777e7464d533d893fa10e1f89b315fa1ad15
SHA25635a3edb201e5a9cf4e16d24d616df8986e875bfd541cdaf8f7be4e8dcf8bd572
SHA512508fbf82ec69d866224ae8082711156d10c2edde31a3c20aac571e07310598835810edf03434ded14173297d642271cf0e39f7488c6cf78813bc090c045b22ce
-
Filesize
1KB
MD5ca661a4a3758fb9b2a86bb22b1aac8c5
SHA1cba0007e0d86ce5353415170191d55b7faf24308
SHA256ea60eb2cdbd27151c3855ef9c8a1ad3f87ba70082d4a4c346af75b814e7a9128
SHA512128526f5b365f78db47cd4209c3dfa64bce436b8913d8fc4dffcc26d5547b5084098534c20d58d4c396777d3c193d55f799581ccaf41dd7d01c77d38605b23f8
-
Filesize
90KB
MD505fc8bccccdabed0243488f3d7a30a75
SHA1dfafc4da35a1182e7e1f5d4f32e6d600482b8a13
SHA256ff553449b2d4b769a25b8b6c639d8b5d962ddce24b4601a1bff41b8fc7697376
SHA512e326ef5f312c9a3c2ff7e09fc276e4b14aebfe17563ae44e47f7184b8c0dc9ac89f78d56e785b099e897945871a7dcd04747c0cd457128bca539baeca388f968
-
Filesize
1KB
MD5c0649992735a17d25a5694d2690c1bb1
SHA1c377ab275535358b7f4ff77042bb09d5d40dd533
SHA25655cf5873554fb2852e1bf3cc0632a6ca682098d8c764b496b590a6cdb70c29ea
SHA5128f427f0087e25d80c296c61f6cf847cc660060fd90a790c129cddf8b8d07b84b4c7d06dde2b195ec299801e54c4eff4c1f1d4a11ce205c97b0748c8e6e605721
-
Filesize
211KB
MD5eaf34a7d9a24baf248e4b5da247a384e
SHA1ff4ccb35e4311fefdd7f0a7251570c51ab9ab224
SHA25666a05692cf2ff6b0abcd97a5d4b37b61700a21fb93eee4338d87b4ebe79e32b0
SHA512a50b36fff27c74c7049be98e4e2f312c825fae52f9aa9161e830e0703e476e7cb4a2947466fda1ebca0244b2e5d6e3b086fc1e884e22b468416416ebb11637b3
-
Filesize
12KB
MD528cb0e8b3cc23912e4f6d357f8ce6bd2
SHA176068c11405d50005838dd36a2fee1c973b802f8
SHA2565fe301a183489c80b8b7898c7b8d0eb76f311ef424e2a51470c76686228745aa
SHA512a32b2b49db55b63516ba2bd99849778b685dd4cd0071ddac30e0e84bd248644be6f00f25b2aec3ca4bb3062829f8483c33a8d6dc5b1cbf2de951b918d3f21490
-
Filesize
10KB
MD5a73dc4356f717974edde4b5974f7993a
SHA1affb6b9ed27b687d20b181be109d08f36c226f05
SHA256a239794e1be70d91c546eb9d832e54efef352a52fcb1b9af557dad88ad1ed78d
SHA5121701bb6bec5c008f0908e5e901bc918709891cae5a07b5a8436ec7993e2b0611657e11093edce3b8b7e5fd894d418c1f12f93f61173d5fdc981ed85b0ae67352
-
Filesize
85B
MD58c7fb4d0230dc69521601275910cc0b9
SHA1a6b7cd837d66ef01419dc3d00a8c5703f22ae4bf
SHA256f038c4607432a501bfb35ba9bff7b816908586974096dc85b8450bf81fd7437d
SHA512c0a4fe1bbbfb06b52a53fe8ad7b95587c1261d5cb74a7e61b2704a0c82a4507820144cde8dc4e4898760dea102e5e13126c15c9a0911cc601774b5da1a0f1cdc
-
Filesize
216B
MD548ac29422570636cae371b68c858b988
SHA1ff86dea198c93a8ae49ee52c6eb919fcbd259aab
SHA2563926b08f205999c2f1a24121117ecfeed31557bf6f0529416f3432321292c6b0
SHA51275019e6fd4b53528aab1af668149540e1bc372e58e4786eda1da75e7c9718dbc274cbf3f37cd38fbe7e618ea9c1b24c2534d18aecfcc3264ec55f83f206faaa3