Analysis
-
max time kernel
96s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/09/2024, 06:45
Behavioral task
behavioral1
Sample
ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe
-
Size
246KB
-
MD5
ed0ac3ec754cb2fa9cb4513394316573
-
SHA1
05564f7f4d5d05511346fd855b7dc7b2e67fb16b
-
SHA256
d3f488cbb6fa9c76667767180c1486e285aa923040a3ec849d85b7be682a161b
-
SHA512
461775058079e11587e5c931906aeff2c080db0e13a721522a09f1adfd7044bf561b744c86fb3c3f2872086b136907a1586e04392a8027d5eaed6766fcccaafc
-
SSDEEP
6144:guMJWY+qaHEQCcYfSBYJbQCjRcqESEgm6Anhc1kG6Evy:g+YcUc6SBLLTSEgBAnhc1kG
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe IEXPLOREi.exe" ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 14 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe -
Disables Task Manager via registry modification
-
resource yara_rule behavioral1/memory/1140-0-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral1/files/0x0008000000018bac-5.dat upx behavioral1/memory/1140-12-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral1/memory/1140-13-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral1/memory/1140-14-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral1/memory/1140-15-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral1/memory/1140-16-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral1/memory/1140-17-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral1/memory/1140-18-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral1/memory/1140-19-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral1/memory/1140-20-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral1/memory/1140-21-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral1/memory/1140-22-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral1/memory/1140-23-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral1/memory/1140-24-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral1/memory/1140-25-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral1/memory/1140-26-0x0000000000400000-0x000000000049C000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\Yahoo Messengger = "C:\\Windows\\system32\\IEXPLOREi.exe" ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\g: ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe File opened (read-only) \??\w: ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe File opened (read-only) \??\b: ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe File opened (read-only) \??\e: ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe File opened (read-only) \??\l: ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe File opened (read-only) \??\m: ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe File opened (read-only) \??\n: ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe File opened (read-only) \??\p: ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe File opened (read-only) \??\u: ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe File opened (read-only) \??\y: ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe File opened (read-only) \??\h: ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe File opened (read-only) \??\k: ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe File opened (read-only) \??\z: ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe File opened (read-only) \??\r: ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe File opened (read-only) \??\s: ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe File opened (read-only) \??\t: ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe File opened (read-only) \??\a: ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe File opened (read-only) \??\q: ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe File opened (read-only) \??\o: ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe File opened (read-only) \??\v: ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe File opened (read-only) \??\x: ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe File opened (read-only) \??\i: ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe File opened (read-only) \??\j: ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe -
AutoIT Executable 15 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1140-12-0x0000000000400000-0x000000000049C000-memory.dmp autoit_exe behavioral1/memory/1140-13-0x0000000000400000-0x000000000049C000-memory.dmp autoit_exe behavioral1/memory/1140-14-0x0000000000400000-0x000000000049C000-memory.dmp autoit_exe behavioral1/memory/1140-15-0x0000000000400000-0x000000000049C000-memory.dmp autoit_exe behavioral1/memory/1140-16-0x0000000000400000-0x000000000049C000-memory.dmp autoit_exe behavioral1/memory/1140-17-0x0000000000400000-0x000000000049C000-memory.dmp autoit_exe behavioral1/memory/1140-18-0x0000000000400000-0x000000000049C000-memory.dmp autoit_exe behavioral1/memory/1140-19-0x0000000000400000-0x000000000049C000-memory.dmp autoit_exe behavioral1/memory/1140-20-0x0000000000400000-0x000000000049C000-memory.dmp autoit_exe behavioral1/memory/1140-21-0x0000000000400000-0x000000000049C000-memory.dmp autoit_exe behavioral1/memory/1140-22-0x0000000000400000-0x000000000049C000-memory.dmp autoit_exe behavioral1/memory/1140-23-0x0000000000400000-0x000000000049C000-memory.dmp autoit_exe behavioral1/memory/1140-24-0x0000000000400000-0x000000000049C000-memory.dmp autoit_exe behavioral1/memory/1140-25-0x0000000000400000-0x000000000049C000-memory.dmp autoit_exe behavioral1/memory/1140-26-0x0000000000400000-0x000000000049C000-memory.dmp autoit_exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\autorun.ini ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe File created C:\Windows\SysWOW64\IEXPLOREi.exe ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\IEXPLOREi.exe ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe File created C:\Windows\SysWOW64\WORD.exe ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\WORD.exe ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\IEXPLOREi.exe ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe File opened for modification C:\Windows\IEXPLOREi.exe ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe -
Suspicious behavior: EnumeratesProcesses 55 IoCs
pid Process 1140 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 1140 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 1140 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 1140 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 1140 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 1140 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 1140 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 1140 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 1140 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 1140 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 1140 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 1140 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 1140 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 1140 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 1140 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 1140 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 1140 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 1140 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 1140 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 1140 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 1140 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 1140 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 1140 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 1140 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 1140 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 1140 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 1140 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 1140 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 1140 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 1140 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 1140 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 1140 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 1140 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 1140 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 1140 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 1140 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 1140 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 1140 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 1140 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 1140 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 1140 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 1140 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 1140 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 1140 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 1140 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 1140 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 1140 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 1140 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 1140 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 1140 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 1140 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 1140 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 1140 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 1140 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 1140 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2876 explorer.exe Token: SeShutdownPrivilege 2876 explorer.exe Token: SeShutdownPrivilege 2876 explorer.exe Token: SeShutdownPrivilege 2876 explorer.exe Token: SeShutdownPrivilege 2876 explorer.exe Token: SeShutdownPrivilege 2876 explorer.exe Token: SeShutdownPrivilege 2876 explorer.exe Token: SeShutdownPrivilege 2876 explorer.exe Token: SeShutdownPrivilege 2876 explorer.exe Token: SeShutdownPrivilege 2876 explorer.exe Token: 33 3028 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3028 AUDIODG.EXE Token: 33 3028 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3028 AUDIODG.EXE Token: SeShutdownPrivilege 2876 explorer.exe Token: SeShutdownPrivilege 2876 explorer.exe Token: SeShutdownPrivilege 1388 explorer.exe Token: SeShutdownPrivilege 1388 explorer.exe Token: SeShutdownPrivilege 1388 explorer.exe Token: SeShutdownPrivilege 1388 explorer.exe Token: SeShutdownPrivilege 1388 explorer.exe Token: SeShutdownPrivilege 1388 explorer.exe Token: SeShutdownPrivilege 1388 explorer.exe Token: SeShutdownPrivilege 1388 explorer.exe Token: SeShutdownPrivilege 1388 explorer.exe Token: SeShutdownPrivilege 1388 explorer.exe Token: SeShutdownPrivilege 1388 explorer.exe Token: SeShutdownPrivilege 1388 explorer.exe Token: SeShutdownPrivilege 1880 explorer.exe Token: SeShutdownPrivilege 1880 explorer.exe Token: SeShutdownPrivilege 1880 explorer.exe Token: SeShutdownPrivilege 1880 explorer.exe Token: SeShutdownPrivilege 1880 explorer.exe Token: SeShutdownPrivilege 1880 explorer.exe Token: SeShutdownPrivilege 1880 explorer.exe Token: SeShutdownPrivilege 1880 explorer.exe Token: SeShutdownPrivilege 1880 explorer.exe Token: SeShutdownPrivilege 1880 explorer.exe Token: SeShutdownPrivilege 1880 explorer.exe Token: SeShutdownPrivilege 1880 explorer.exe Token: SeShutdownPrivilege 2052 explorer.exe Token: SeShutdownPrivilege 2052 explorer.exe Token: SeShutdownPrivilege 2052 explorer.exe Token: SeShutdownPrivilege 2052 explorer.exe Token: SeShutdownPrivilege 2052 explorer.exe Token: SeShutdownPrivilege 2052 explorer.exe Token: SeShutdownPrivilege 2052 explorer.exe Token: SeShutdownPrivilege 2052 explorer.exe Token: SeShutdownPrivilege 2052 explorer.exe Token: SeShutdownPrivilege 2052 explorer.exe Token: SeShutdownPrivilege 2052 explorer.exe Token: SeShutdownPrivilege 2052 explorer.exe Token: SeShutdownPrivilege 2828 explorer.exe Token: SeShutdownPrivilege 2828 explorer.exe Token: SeShutdownPrivilege 2828 explorer.exe Token: SeShutdownPrivilege 2828 explorer.exe Token: SeShutdownPrivilege 2828 explorer.exe Token: SeShutdownPrivilege 2828 explorer.exe Token: SeShutdownPrivilege 2828 explorer.exe Token: SeShutdownPrivilege 2828 explorer.exe Token: SeShutdownPrivilege 2828 explorer.exe Token: SeShutdownPrivilege 2828 explorer.exe Token: SeShutdownPrivilege 2828 explorer.exe Token: SeShutdownPrivilege 2828 explorer.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2876 explorer.exe 2876 explorer.exe 2876 explorer.exe 2876 explorer.exe 2876 explorer.exe 2876 explorer.exe 2876 explorer.exe 2876 explorer.exe 2876 explorer.exe 2876 explorer.exe 2876 explorer.exe 2876 explorer.exe 2876 explorer.exe 2876 explorer.exe 2876 explorer.exe 2876 explorer.exe 1388 explorer.exe 1388 explorer.exe 1388 explorer.exe 1388 explorer.exe 1388 explorer.exe 1388 explorer.exe 1388 explorer.exe 1388 explorer.exe 1388 explorer.exe 1388 explorer.exe 1388 explorer.exe 1388 explorer.exe 1388 explorer.exe 1388 explorer.exe 1388 explorer.exe 1388 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 2052 explorer.exe 2052 explorer.exe 2052 explorer.exe 2052 explorer.exe 2052 explorer.exe 2052 explorer.exe 2052 explorer.exe 2052 explorer.exe 2052 explorer.exe 2052 explorer.exe 2052 explorer.exe 2052 explorer.exe 2052 explorer.exe 2052 explorer.exe 2052 explorer.exe 2052 explorer.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2876 explorer.exe 2876 explorer.exe 2876 explorer.exe 2876 explorer.exe 2876 explorer.exe 2876 explorer.exe 2876 explorer.exe 2876 explorer.exe 2876 explorer.exe 2876 explorer.exe 2876 explorer.exe 2876 explorer.exe 2876 explorer.exe 2876 explorer.exe 1388 explorer.exe 1388 explorer.exe 1388 explorer.exe 1388 explorer.exe 1388 explorer.exe 1388 explorer.exe 1388 explorer.exe 1388 explorer.exe 1388 explorer.exe 1388 explorer.exe 1388 explorer.exe 1388 explorer.exe 1388 explorer.exe 1388 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 1880 explorer.exe 2052 explorer.exe 2052 explorer.exe 2052 explorer.exe 2052 explorer.exe 2052 explorer.exe 2052 explorer.exe 2052 explorer.exe 2052 explorer.exe 2052 explorer.exe 2052 explorer.exe 2052 explorer.exe 2052 explorer.exe 2052 explorer.exe 2052 explorer.exe 2828 explorer.exe 2828 explorer.exe 2828 explorer.exe 2828 explorer.exe 2828 explorer.exe 2828 explorer.exe 2828 explorer.exe 2828 explorer.exe 2828 explorer.exe 2828 explorer.exe 2828 explorer.exe 2828 explorer.exe 2828 explorer.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1140 wrote to memory of 1820 1140 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 29 PID 1140 wrote to memory of 1820 1140 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 29 PID 1140 wrote to memory of 1820 1140 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 29 PID 1140 wrote to memory of 1820 1140 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 29 PID 1820 wrote to memory of 2208 1820 cmd.exe 31 PID 1820 wrote to memory of 2208 1820 cmd.exe 31 PID 1820 wrote to memory of 2208 1820 cmd.exe 31 PID 1820 wrote to memory of 2208 1820 cmd.exe 31 PID 1140 wrote to memory of 2116 1140 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 32 PID 1140 wrote to memory of 2116 1140 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 32 PID 1140 wrote to memory of 2116 1140 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 32 PID 1140 wrote to memory of 2116 1140 ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe 32 PID 2116 wrote to memory of 2684 2116 cmd.exe 34 PID 2116 wrote to memory of 2684 2116 cmd.exe 34 PID 2116 wrote to memory of 2684 2116 cmd.exe 34 PID 2116 wrote to memory of 2684 2116 cmd.exe 34 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ed0ac3ec754cb2fa9cb4513394316573_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Disables RegEdit via registry modification
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C AT /delete /yes2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\SysWOW64\at.exeAT /delete /yes3⤵
- System Location Discovery: System Language Discovery
PID:2208
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C AT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\WORD.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\SysWOW64\at.exeAT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\WORD.exe3⤵
- System Location Discovery: System Language Discovery
PID:2684
-
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2876
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5b01⤵
- Suspicious use of AdjustPrivilegeToken
PID:3028
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1388
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1880
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2052
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SendNotifyMessage
PID:2828
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
PID:1092
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
PID:2480
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
PID:2308
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
PID:680
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
PID:2836
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
PID:2128
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
PID:1764
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
PID:752
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
PID:1836
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:1524
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:2444
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:3020
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:2972
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:2392
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:2924
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:2476
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:2400
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
246KB
MD5ed0ac3ec754cb2fa9cb4513394316573
SHA105564f7f4d5d05511346fd855b7dc7b2e67fb16b
SHA256d3f488cbb6fa9c76667767180c1486e285aa923040a3ec849d85b7be682a161b
SHA512461775058079e11587e5c931906aeff2c080db0e13a721522a09f1adfd7044bf561b744c86fb3c3f2872086b136907a1586e04392a8027d5eaed6766fcccaafc