Analysis
-
max time kernel
141s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/09/2024, 08:35
Behavioral task
behavioral1
Sample
ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe
-
Size
33KB
-
MD5
ed374a7b5090cf52c4fde2744351af25
-
SHA1
992c23ed8967383cd11e4112a13d8743e064f0ca
-
SHA256
70bf1dfd84a384ec3e674fe69a23ea0bdad5152fbc265f176f542448a34eaa07
-
SHA512
8cfcbf64eea51129db01dcb8a9e947ef30cb666f0d70234bfed09a87dc42427593c022b4baa73787498d7010a8c8eb572c7c526334056388f71386f028146eab
-
SSDEEP
384:Bpm7IgvOWTJ5DzNMhpj0fS+F+7d9WlvSVrEJtoxRnty9WkHoVnUQcWsM46+gEwVF:7MLnDxMhCfXF+7d9HogFM9XoNUy6JzU
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\progra~1\\WindowsUpdate\\svchost.exe" regedit.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" reg.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\IMJPMIG8.1 = "C:\\Progra~1\\WindowsUpdate\\svchost.exe" reg.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 3628 svchost.exe -
resource yara_rule behavioral2/memory/2484-0-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/files/0x000100000000002b-10.dat upx behavioral2/memory/2484-25-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/3628-31-0x0000000000400000-0x0000000000422000-memory.dmp upx -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\k: ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe File opened (read-only) \??\m: ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe File opened (read-only) \??\s: ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe File opened (read-only) \??\u: ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe File opened (read-only) \??\y: ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe File opened (read-only) \??\n: svchost.exe File opened (read-only) \??\t: svchost.exe File opened (read-only) \??\i: ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe File opened (read-only) \??\x: svchost.exe File opened (read-only) \??\s: svchost.exe File opened (read-only) \??\y: svchost.exe File opened (read-only) \??\j: ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe File opened (read-only) \??\w: svchost.exe File opened (read-only) \??\p: ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe File opened (read-only) \??\i: svchost.exe File opened (read-only) \??\o: svchost.exe File opened (read-only) \??\u: svchost.exe File opened (read-only) \??\b: svchost.exe File opened (read-only) \??\q: ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe File opened (read-only) \??\r: ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe File opened (read-only) \??\j: svchost.exe File opened (read-only) \??\p: svchost.exe File opened (read-only) \??\b: ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe File opened (read-only) \??\v: ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe File opened (read-only) \??\x: ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe File opened (read-only) \??\z: ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe File opened (read-only) \??\e: svchost.exe File opened (read-only) \??\h: svchost.exe File opened (read-only) \??\l: svchost.exe File opened (read-only) \??\r: svchost.exe File opened (read-only) \??\l: ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe File opened (read-only) \??\t: ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe File opened (read-only) \??\a: svchost.exe File opened (read-only) \??\g: svchost.exe File opened (read-only) \??\k: svchost.exe File opened (read-only) \??\m: svchost.exe File opened (read-only) \??\o: ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe File opened (read-only) \??\e: ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe File opened (read-only) \??\g: ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe File opened (read-only) \??\h: ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe File opened (read-only) \??\n: ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe File opened (read-only) \??\w: ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe File opened (read-only) \??\q: svchost.exe File opened (read-only) \??\v: svchost.exe File opened (read-only) \??\a: ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe File opened (read-only) \??\z: svchost.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops autorun.inf file 1 TTPs 4 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification \??\f:\autorun.inf ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe File created \??\f:\autorun.inf ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe File opened for modification \??\c:\autorun.inf ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe File created \??\c:\autorun.inf ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Progra~1\WindowsUpdate ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe File created C:\Progra~1\WindowsUpdate\svchost.exe ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe File opened for modification C:\Progra~1\WindowsUpdate\svchost.exe ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 30 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1992 cmd.exe 3988 PING.EXE -
Modifies registry key 1 TTPs 7 IoCs
pid Process 1784 reg.exe 2264 reg.exe 4632 reg.exe 5056 reg.exe 4996 reg.exe 2760 reg.exe 4524 reg.exe -
Runs .reg file with regedit 1 IoCs
pid Process 4488 regedit.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3988 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3628 svchost.exe 3628 svchost.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2484 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 2484 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 2484 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 3628 svchost.exe 3628 svchost.exe 3628 svchost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2484 wrote to memory of 2856 2484 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 82 PID 2484 wrote to memory of 2856 2484 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 82 PID 2484 wrote to memory of 2856 2484 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 82 PID 2484 wrote to memory of 2344 2484 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 83 PID 2484 wrote to memory of 2344 2484 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 83 PID 2484 wrote to memory of 2344 2484 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 83 PID 2484 wrote to memory of 3872 2484 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 86 PID 2484 wrote to memory of 3872 2484 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 86 PID 2484 wrote to memory of 3872 2484 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 86 PID 2484 wrote to memory of 2572 2484 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 88 PID 2484 wrote to memory of 2572 2484 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 88 PID 2484 wrote to memory of 2572 2484 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 88 PID 2484 wrote to memory of 1776 2484 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 90 PID 2484 wrote to memory of 1776 2484 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 90 PID 2484 wrote to memory of 1776 2484 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 90 PID 2484 wrote to memory of 4808 2484 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 91 PID 2484 wrote to memory of 4808 2484 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 91 PID 2484 wrote to memory of 4808 2484 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 91 PID 1776 wrote to memory of 2264 1776 cmd.exe 94 PID 1776 wrote to memory of 2264 1776 cmd.exe 94 PID 1776 wrote to memory of 2264 1776 cmd.exe 94 PID 2484 wrote to memory of 3628 2484 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 95 PID 2484 wrote to memory of 3628 2484 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 95 PID 2484 wrote to memory of 3628 2484 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 95 PID 2484 wrote to memory of 3144 2484 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 96 PID 2484 wrote to memory of 3144 2484 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 96 PID 2484 wrote to memory of 3144 2484 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 96 PID 2484 wrote to memory of 3632 2484 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 98 PID 2484 wrote to memory of 3632 2484 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 98 PID 2484 wrote to memory of 3632 2484 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 98 PID 2484 wrote to memory of 3604 2484 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 99 PID 2484 wrote to memory of 3604 2484 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 99 PID 2484 wrote to memory of 3604 2484 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 99 PID 2484 wrote to memory of 3020 2484 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 101 PID 2484 wrote to memory of 3020 2484 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 101 PID 2484 wrote to memory of 3020 2484 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 101 PID 2484 wrote to memory of 2332 2484 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 104 PID 2484 wrote to memory of 2332 2484 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 104 PID 2484 wrote to memory of 2332 2484 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 104 PID 2484 wrote to memory of 1684 2484 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 105 PID 2484 wrote to memory of 1684 2484 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 105 PID 2484 wrote to memory of 1684 2484 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 105 PID 2484 wrote to memory of 4612 2484 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 106 PID 2484 wrote to memory of 4612 2484 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 106 PID 2484 wrote to memory of 4612 2484 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 106 PID 2484 wrote to memory of 1992 2484 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 110 PID 2484 wrote to memory of 1992 2484 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 110 PID 2484 wrote to memory of 1992 2484 ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe 110 PID 3628 wrote to memory of 3232 3628 svchost.exe 112 PID 3628 wrote to memory of 3232 3628 svchost.exe 112 PID 3628 wrote to memory of 3232 3628 svchost.exe 112 PID 3628 wrote to memory of 3220 3628 svchost.exe 113 PID 3628 wrote to memory of 3220 3628 svchost.exe 113 PID 3628 wrote to memory of 3220 3628 svchost.exe 113 PID 3628 wrote to memory of 3860 3628 svchost.exe 115 PID 3628 wrote to memory of 3860 3628 svchost.exe 115 PID 3628 wrote to memory of 3860 3628 svchost.exe 115 PID 3144 wrote to memory of 4632 3144 cmd.exe 114 PID 3144 wrote to memory of 4632 3144 cmd.exe 114 PID 3144 wrote to memory of 4632 3144 cmd.exe 114 PID 3632 wrote to memory of 5056 3632 cmd.exe 119 PID 3632 wrote to memory of 5056 3632 cmd.exe 119 PID 3632 wrote to memory of 5056 3632 cmd.exe 119 PID 3628 wrote to memory of 824 3628 svchost.exe 120
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c rd /s /q c:\autorun.inf2⤵
- System Location Discovery: System Language Discovery
PID:2856
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c del /f /q /a c:\*.vbs2⤵
- System Location Discovery: System Language Discovery
PID:2344
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c rd /s /q f:\autorun.inf2⤵
- System Location Discovery: System Language Discovery
PID:3872
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c del /f /q /a f:\*.vbs2⤵
- System Location Discovery: System Language Discovery
PID:2572
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer /v NoDriveTypeAutoRun /t REG_DWORD /d 181 /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer /v NoDriveTypeAutoRun /t REG_DWORD /d 181 /f3⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2264
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c mkdir C:\Progra~1\WindowsUpdate2⤵
- System Location Discovery: System Language Discovery
PID:4808
-
-
C:\Progra~1\WindowsUpdate\svchost.exe"C:\Progra~1\WindowsUpdate\svchost.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c rd /s /q c:\autorun.inf3⤵
- System Location Discovery: System Language Discovery
PID:3232
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c del /f /q /a c:\*.vbs3⤵
- System Location Discovery: System Language Discovery
PID:3220
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c rd /s /q f:\autorun.inf3⤵
- System Location Discovery: System Language Discovery
PID:3860
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c del /f /q /a f:\*.vbs3⤵
- System Location Discovery: System Language Discovery
PID:824
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c del /f /a c:\updateme.exe3⤵
- System Location Discovery: System Language Discovery
PID:5100
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /v ShowSuperHidden /t REG_DWORD /d 0 /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /v ShowSuperHidden /t REG_DWORD /d 0 /f3⤵
- Modifies visiblity of hidden/system files in Explorer
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4632
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\SuperHidden /v Type /t REG_SZ /d checkbox2 /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\SuperHidden /v Type /t REG_SZ /d checkbox2 /f3⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:5056
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /v HideFileExt /t REG_DWORD /d 1 /f2⤵
- System Location Discovery: System Language Discovery
PID:3604 -
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /v HideFileExt /t REG_DWORD /d 1 /f3⤵
- Modifies visibility of file extensions in Explorer
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4996
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\HideFileExt /v Type /t REG_SZ /d checkbox2 /f2⤵
- System Location Discovery: System Language Discovery
PID:3020 -
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\HideFileExt /v Type /t REG_SZ /d checkbox2 /f3⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2760
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add HKLM\SOFTWARE\360Safe\scan /v sscantype /t REG_DWORD /d 3 /f2⤵
- System Location Discovery: System Language Discovery
PID:2332 -
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\360Safe\scan /v sscantype /t REG_DWORD /d 3 /f3⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1784
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run /v IMJPMIG8.1 /t REG_SZ /d C:\Progra~1\WindowsUpdate\svchost.exe /f2⤵
- System Location Discovery: System Language Discovery
PID:1684 -
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run /v IMJPMIG8.1 /t REG_SZ /d C:\Progra~1\WindowsUpdate\svchost.exe /f3⤵
- Adds policy Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4524
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c @echo Windows Registry Editor Version 5.00>C:\Systom.reg&@echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] >>C:\Systom.reg&@echo "Shell"="Explorer.exe C:\\progra~1\\WindowsUpdate\\svchost.exe" >>C:\Systom.reg®edit /s C:\Systom.reg&del C:\Systom.reg&exit2⤵
- System Location Discovery: System Language Discovery
PID:4612 -
C:\Windows\SysWOW64\regedit.exeregedit /s C:\Systom.reg3⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:4488
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping -n 10 127.1&del ed374a7b5090cf52c4fde2744351af25_JaffaCakes118.exe2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:1992 -
C:\Windows\SysWOW64\PING.EXEping -n 10 127.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3988
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Indicator Removal
1File Deletion
1Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
181B
MD5d2f4a513898297d0f0561104a2159b16
SHA12588e260fbf81513383e2aa3b7e0370cb03893b0
SHA256cee3738620cc092ff32f0de257c17035948ac26d54e60997d266116bdc8a080c
SHA512dabe9634c606da1b94687931c95b7fe44c7f045a2e58f2f2682491c783f917efcefbfc9fd6d57aa81f35953f60554699b5388db0cd865ee7f232646f49de51fd
-
Filesize
33KB
MD5ed374a7b5090cf52c4fde2744351af25
SHA1992c23ed8967383cd11e4112a13d8743e064f0ca
SHA25670bf1dfd84a384ec3e674fe69a23ea0bdad5152fbc265f176f542448a34eaa07
SHA5128cfcbf64eea51129db01dcb8a9e947ef30cb666f0d70234bfed09a87dc42427593c022b4baa73787498d7010a8c8eb572c7c526334056388f71386f028146eab
-
Filesize
146B
MD55261066a6e3897bae3a0758ede494643
SHA121da5a6c72cb35c360bc9aa327c2b2c06f870eba
SHA256680c0f300e538c4cd520cdedb9890f0d700039d86fb83efb58b75725a2a4af5f
SHA51281c7c3d338b057c7b9612a08c3b33293fdccdbed3c09c0dce19e28190bafbda0f6e98ec31bb9bfd2577dac8bb7c5c25ef1d82afb7cb556b2993d7a89b8e36b25