Analysis
-
max time kernel
141s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/09/2024, 08:35
Behavioral task
behavioral1
Sample
ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe
-
Size
33KB
-
MD5
ed374a7b5090cf52c4fde2744351af25
-
SHA1
992c23ed8967383cd11e4112a13d8743e064f0ca
-
SHA256
70bf1dfd84a384ec3e674fe69a23ea0bdad5152fbc265f176f542448a34eaa07
-
SHA512
8cfcbf64eea51129db01dcb8a9e947ef30cb666f0d70234bfed09a87dc42427593c022b4baa73787498d7010a8c8eb572c7c526334056388f71386f028146eab
-
SSDEEP
384:Bpm7IgvOWTJ5DzNMhpj0fS+F+7d9WlvSVrEJtoxRnty9WkHoVnUQcWsM46+gEwVF:7MLnDxMhCfXF+7d9HogFM9XoNUy6JzU
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\progra~1\\WindowsUpdate\\svchost.exe" regedit.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" reg.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\IMJPMIG8.1 = "C:\\Progra~1\\WindowsUpdate\\svchost.exe" reg.exe -
Deletes itself 1 IoCs
pid Process 2968 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2588 svchost.exe -
Loads dropped DLL 3 IoCs
pid Process 2220 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 2220 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 2588 svchost.exe -
resource yara_rule behavioral1/memory/2220-0-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/2220-3-0x0000000000580000-0x0000000000589000-memory.dmp upx behavioral1/files/0x0001000000000027-11.dat upx behavioral1/memory/2220-31-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/2588-36-0x0000000000400000-0x0000000000422000-memory.dmp upx -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\e: ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe File opened (read-only) \??\i: ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe File opened (read-only) \??\p: ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe File opened (read-only) \??\o: svchost.exe File opened (read-only) \??\y: svchost.exe File opened (read-only) \??\n: ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe File opened (read-only) \??\v: ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe File opened (read-only) \??\x: ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe File opened (read-only) \??\b: svchost.exe File opened (read-only) \??\j: svchost.exe File opened (read-only) \??\q: svchost.exe File opened (read-only) \??\s: svchost.exe File opened (read-only) \??\g: ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe File opened (read-only) \??\h: ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe File opened (read-only) \??\z: ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe File opened (read-only) \??\a: svchost.exe File opened (read-only) \??\g: svchost.exe File opened (read-only) \??\k: svchost.exe File opened (read-only) \??\t: svchost.exe File opened (read-only) \??\q: ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe File opened (read-only) \??\s: ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe File opened (read-only) \??\h: svchost.exe File opened (read-only) \??\r: svchost.exe File opened (read-only) \??\x: svchost.exe File opened (read-only) \??\j: ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe File opened (read-only) \??\l: ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe File opened (read-only) \??\o: ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe File opened (read-only) \??\r: ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe File opened (read-only) \??\m: svchost.exe File opened (read-only) \??\p: svchost.exe File opened (read-only) \??\v: svchost.exe File opened (read-only) \??\n: svchost.exe File opened (read-only) \??\z: svchost.exe File opened (read-only) \??\a: ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe File opened (read-only) \??\k: ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe File opened (read-only) \??\m: ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe File opened (read-only) \??\u: ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe File opened (read-only) \??\y: ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe File opened (read-only) \??\u: svchost.exe File opened (read-only) \??\b: ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe File opened (read-only) \??\t: ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe File opened (read-only) \??\w: ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe File opened (read-only) \??\e: svchost.exe File opened (read-only) \??\i: svchost.exe File opened (read-only) \??\l: svchost.exe File opened (read-only) \??\w: svchost.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops autorun.inf file 1 TTPs 4 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created \??\c:\autorun.inf ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe File opened for modification \??\f:\autorun.inf ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe File created \??\f:\autorun.inf ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe File opened for modification \??\c:\autorun.inf ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Progra~1\WindowsUpdate ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe File created C:\Progra~1\WindowsUpdate\svchost.exe ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe File opened for modification C:\Progra~1\WindowsUpdate\svchost.exe ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 30 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2968 cmd.exe 1108 PING.EXE -
Modifies registry key 1 TTPs 7 IoCs
pid Process 944 reg.exe 1176 reg.exe 2056 reg.exe 1128 reg.exe 2080 reg.exe 1304 reg.exe 1628 reg.exe -
Runs .reg file with regedit 1 IoCs
pid Process 1372 regedit.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1108 PING.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2588 svchost.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2220 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 2220 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 2220 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 2588 svchost.exe 2588 svchost.exe 2588 svchost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2780 2220 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 30 PID 2220 wrote to memory of 2780 2220 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 30 PID 2220 wrote to memory of 2780 2220 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 30 PID 2220 wrote to memory of 2780 2220 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 30 PID 2220 wrote to memory of 2800 2220 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 32 PID 2220 wrote to memory of 2800 2220 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 32 PID 2220 wrote to memory of 2800 2220 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 32 PID 2220 wrote to memory of 2800 2220 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 32 PID 2220 wrote to memory of 2784 2220 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 34 PID 2220 wrote to memory of 2784 2220 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 34 PID 2220 wrote to memory of 2784 2220 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 34 PID 2220 wrote to memory of 2784 2220 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 34 PID 2220 wrote to memory of 2820 2220 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 36 PID 2220 wrote to memory of 2820 2220 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 36 PID 2220 wrote to memory of 2820 2220 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 36 PID 2220 wrote to memory of 2820 2220 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 36 PID 2220 wrote to memory of 2848 2220 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 38 PID 2220 wrote to memory of 2848 2220 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 38 PID 2220 wrote to memory of 2848 2220 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 38 PID 2220 wrote to memory of 2848 2220 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 38 PID 2220 wrote to memory of 2612 2220 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 40 PID 2220 wrote to memory of 2612 2220 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 40 PID 2220 wrote to memory of 2612 2220 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 40 PID 2220 wrote to memory of 2612 2220 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 40 PID 2848 wrote to memory of 1176 2848 cmd.exe 42 PID 2848 wrote to memory of 1176 2848 cmd.exe 42 PID 2848 wrote to memory of 1176 2848 cmd.exe 42 PID 2848 wrote to memory of 1176 2848 cmd.exe 42 PID 2220 wrote to memory of 2588 2220 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 43 PID 2220 wrote to memory of 2588 2220 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 43 PID 2220 wrote to memory of 2588 2220 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 43 PID 2220 wrote to memory of 2588 2220 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 43 PID 2220 wrote to memory of 2660 2220 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 44 PID 2220 wrote to memory of 2660 2220 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 44 PID 2220 wrote to memory of 2660 2220 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 44 PID 2220 wrote to memory of 2660 2220 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 44 PID 2220 wrote to memory of 3052 2220 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 46 PID 2220 wrote to memory of 3052 2220 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 46 PID 2220 wrote to memory of 3052 2220 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 46 PID 2220 wrote to memory of 3052 2220 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 46 PID 2220 wrote to memory of 2172 2220 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 47 PID 2220 wrote to memory of 2172 2220 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 47 PID 2220 wrote to memory of 2172 2220 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 47 PID 2220 wrote to memory of 2172 2220 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 47 PID 2220 wrote to memory of 1356 2220 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 49 PID 2220 wrote to memory of 1356 2220 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 49 PID 2220 wrote to memory of 1356 2220 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 49 PID 2220 wrote to memory of 1356 2220 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 49 PID 2220 wrote to memory of 280 2220 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 50 PID 2220 wrote to memory of 280 2220 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 50 PID 2220 wrote to memory of 280 2220 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 50 PID 2220 wrote to memory of 280 2220 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 50 PID 2220 wrote to memory of 804 2220 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 51 PID 2220 wrote to memory of 804 2220 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 51 PID 2220 wrote to memory of 804 2220 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 51 PID 2220 wrote to memory of 804 2220 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 51 PID 2588 wrote to memory of 2028 2588 svchost.exe 56 PID 2588 wrote to memory of 2028 2588 svchost.exe 56 PID 2588 wrote to memory of 2028 2588 svchost.exe 56 PID 2588 wrote to memory of 2028 2588 svchost.exe 56 PID 2220 wrote to memory of 2904 2220 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 57 PID 2220 wrote to memory of 2904 2220 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 57 PID 2220 wrote to memory of 2904 2220 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 57 PID 2220 wrote to memory of 2904 2220 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 57
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c rd /s /q c:\autorun.inf2⤵
- System Location Discovery: System Language Discovery
PID:2780
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c del /f /q /a c:\*.vbs2⤵
- System Location Discovery: System Language Discovery
PID:2800
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c rd /s /q f:\autorun.inf2⤵
- System Location Discovery: System Language Discovery
PID:2784
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c del /f /q /a f:\*.vbs2⤵
- System Location Discovery: System Language Discovery
PID:2820
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer /v NoDriveTypeAutoRun /t REG_DWORD /d 181 /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer /v NoDriveTypeAutoRun /t REG_DWORD /d 181 /f3⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1176
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c mkdir C:\Progra~1\WindowsUpdate2⤵
- System Location Discovery: System Language Discovery
PID:2612
-
-
C:\Progra~1\WindowsUpdate\svchost.exe"C:\Progra~1\WindowsUpdate\svchost.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c rd /s /q c:\autorun.inf3⤵
- System Location Discovery: System Language Discovery
PID:2028
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c del /f /q /a c:\*.vbs3⤵
- System Location Discovery: System Language Discovery
PID:2900
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c rd /s /q f:\autorun.inf3⤵
- System Location Discovery: System Language Discovery
PID:576
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c del /f /q /a f:\*.vbs3⤵
- System Location Discovery: System Language Discovery
PID:1612
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c del /f /a c:\updateme.exe3⤵
- System Location Discovery: System Language Discovery
PID:2452
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /v ShowSuperHidden /t REG_DWORD /d 0 /f2⤵
- System Location Discovery: System Language Discovery
PID:2660 -
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /v ShowSuperHidden /t REG_DWORD /d 0 /f3⤵
- Modifies visiblity of hidden/system files in Explorer
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1128
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\SuperHidden /v Type /t REG_SZ /d checkbox2 /f2⤵
- System Location Discovery: System Language Discovery
PID:3052 -
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\SuperHidden /v Type /t REG_SZ /d checkbox2 /f3⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2080
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /v HideFileExt /t REG_DWORD /d 1 /f2⤵
- System Location Discovery: System Language Discovery
PID:2172 -
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /v HideFileExt /t REG_DWORD /d 1 /f3⤵
- Modifies visibility of file extensions in Explorer
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1628
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\HideFileExt /v Type /t REG_SZ /d checkbox2 /f2⤵
- System Location Discovery: System Language Discovery
PID:1356 -
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\HideFileExt /v Type /t REG_SZ /d checkbox2 /f3⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2056
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add HKLM\SOFTWARE\360Safe\scan /v sscantype /t REG_DWORD /d 3 /f2⤵
- System Location Discovery: System Language Discovery
PID:280 -
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\360Safe\scan /v sscantype /t REG_DWORD /d 3 /f3⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:944
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run /v IMJPMIG8.1 /t REG_SZ /d C:\Progra~1\WindowsUpdate\svchost.exe /f2⤵
- System Location Discovery: System Language Discovery
PID:804 -
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run /v IMJPMIG8.1 /t REG_SZ /d C:\Progra~1\WindowsUpdate\svchost.exe /f3⤵
- Adds policy Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1304
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c @echo Windows Registry Editor Version 5.00>C:\Systom.reg&@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] >>C:\Systom.reg&@echo "Shell"="Explorer.exe C:\\progra~1\\WindowsUpdate\\svchost.exe" >>C:\Systom.reg®edit /s C:\Systom.reg&del C:\Systom.reg&exit2⤵
- System Location Discovery: System Language Discovery
PID:2904 -
C:\Windows\SysWOW64\regedit.exeregedit /s C:\Systom.reg3⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:1372
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping -n 10 127.1&del ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:2968 -
C:\Windows\SysWOW64\PING.EXEping -n 10 127.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1108
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Indicator Removal
1File Deletion
1Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
181B
MD5d2f4a513898297d0f0561104a2159b16
SHA12588e260fbf81513383e2aa3b7e0370cb03893b0
SHA256cee3738620cc092ff32f0de257c17035948ac26d54e60997d266116bdc8a080c
SHA512dabe9634c606da1b94687931c95b7fe44c7f045a2e58f2f2682491c783f917efcefbfc9fd6d57aa81f35953f60554699b5388db0cd865ee7f232646f49de51fd
-
Filesize
33KB
MD5ed374a7b5090cf52c4fde2744351af25
SHA1992c23ed8967383cd11e4112a13d8743e064f0ca
SHA25670bf1dfd84a384ec3e674fe69a23ea0bdad5152fbc265f176f542448a34eaa07
SHA5128cfcbf64eea51129db01dcb8a9e947ef30cb666f0d70234bfed09a87dc42427593c022b4baa73787498d7010a8c8eb572c7c526334056388f71386f028146eab
-
Filesize
146B
MD5a17f39f07dc501f6c85688d4ba6ca925
SHA12619e79e8cf1bf596c7238379fff3bb1a9380bb2
SHA256dd90591071388267c511a2beae4150bca00bdfd92937bf7c91f1db200121601a
SHA5129862bf798a7afef3563610764feb2966c0bcc15af6a8551518da1f9fef3939cc3a93678aec39483898afc8ef6085ea35947a1dc185d92dff6a2c123d7fef434d