Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-09-2024 02:50
Static task
static1
Behavioral task
behavioral1
Sample
eeefe3b9656746910979793242de3d78_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
eeefe3b9656746910979793242de3d78_JaffaCakes118.exe
-
Size
564KB
-
MD5
eeefe3b9656746910979793242de3d78
-
SHA1
cfa7f86f0040673390d22f6cdc472b0e68cdacb3
-
SHA256
294eddc5f6c3221e033a74b33877a95d1365e7fb2fb02f42dcd5916f96e4d835
-
SHA512
1c17f9feca015db32a369849df76c9ba3c6e5590393d5c9e055bd5585fa80568b26ab0f27ff48aa574bc7e915a665d85c6a99c9ce30ba4095b5728279285454d
-
SSDEEP
12288:6iEPVIq0TcwMi7tBNMLpJVeVvsZWILqY02JwwA1x33GwTuIj+w:6iRq0TcwvypSVvsfLNzJwwAkX
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" Za0Fr02eH4.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" puinaow.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation eeefe3b9656746910979793242de3d78_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation Za0Fr02eH4.exe -
Executes dropped EXE 10 IoCs
pid Process 3540 Za0Fr02eH4.exe 4532 puinaow.exe 1964 2eaz.exe 5016 2eaz.exe 1448 2eaz.exe 3556 2eaz.exe 3460 2eaz.exe 2996 2eaz.exe 2008 3eaz.exe 4944 X -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/1448-48-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3556-53-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/3556-56-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/3460-62-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral2/memory/3460-61-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral2/memory/2996-68-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral2/memory/2996-65-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral2/memory/3460-57-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral2/memory/3556-60-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/3556-55-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/1448-52-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1448-51-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2996-69-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral2/memory/2996-72-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral2/memory/1448-85-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3556-86-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/3460-87-0x0000000000400000-0x0000000000407000-memory.dmp upx -
Unexpected DNS network traffic destination 2 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 31.193.3.240 Destination IP 31.193.3.240 -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puinaow = "C:\\Users\\Admin\\puinaow.exe /s" puinaow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puinaow = "C:\\Users\\Admin\\puinaow.exe /B" puinaow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puinaow = "C:\\Users\\Admin\\puinaow.exe /m" puinaow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puinaow = "C:\\Users\\Admin\\puinaow.exe /d" puinaow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puinaow = "C:\\Users\\Admin\\puinaow.exe /f" puinaow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puinaow = "C:\\Users\\Admin\\puinaow.exe /z" puinaow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puinaow = "C:\\Users\\Admin\\puinaow.exe /g" puinaow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puinaow = "C:\\Users\\Admin\\puinaow.exe /O" Za0Fr02eH4.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puinaow = "C:\\Users\\Admin\\puinaow.exe /Y" puinaow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puinaow = "C:\\Users\\Admin\\puinaow.exe /V" puinaow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puinaow = "C:\\Users\\Admin\\puinaow.exe /N" puinaow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puinaow = "C:\\Users\\Admin\\puinaow.exe /X" puinaow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puinaow = "C:\\Users\\Admin\\puinaow.exe /I" puinaow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puinaow = "C:\\Users\\Admin\\puinaow.exe /Q" puinaow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puinaow = "C:\\Users\\Admin\\puinaow.exe /c" puinaow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puinaow = "C:\\Users\\Admin\\puinaow.exe /v" puinaow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puinaow = "C:\\Users\\Admin\\puinaow.exe /K" puinaow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puinaow = "C:\\Users\\Admin\\puinaow.exe /S" puinaow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puinaow = "C:\\Users\\Admin\\puinaow.exe /h" puinaow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puinaow = "C:\\Users\\Admin\\puinaow.exe /H" puinaow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puinaow = "C:\\Users\\Admin\\puinaow.exe /F" puinaow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puinaow = "C:\\Users\\Admin\\puinaow.exe /C" puinaow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puinaow = "C:\\Users\\Admin\\puinaow.exe /p" puinaow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puinaow = "C:\\Users\\Admin\\puinaow.exe /o" puinaow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puinaow = "C:\\Users\\Admin\\puinaow.exe /w" puinaow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puinaow = "C:\\Users\\Admin\\puinaow.exe /L" puinaow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puinaow = "C:\\Users\\Admin\\puinaow.exe /x" puinaow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puinaow = "C:\\Users\\Admin\\puinaow.exe /J" puinaow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puinaow = "C:\\Users\\Admin\\puinaow.exe /A" puinaow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puinaow = "C:\\Users\\Admin\\puinaow.exe /U" puinaow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puinaow = "C:\\Users\\Admin\\puinaow.exe /q" puinaow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puinaow = "C:\\Users\\Admin\\puinaow.exe /O" puinaow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puinaow = "C:\\Users\\Admin\\puinaow.exe /a" puinaow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puinaow = "C:\\Users\\Admin\\puinaow.exe /W" puinaow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puinaow = "C:\\Users\\Admin\\puinaow.exe /i" puinaow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puinaow = "C:\\Users\\Admin\\puinaow.exe /G" puinaow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puinaow = "C:\\Users\\Admin\\puinaow.exe /t" puinaow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puinaow = "C:\\Users\\Admin\\puinaow.exe /r" puinaow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puinaow = "C:\\Users\\Admin\\puinaow.exe /n" puinaow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puinaow = "C:\\Users\\Admin\\puinaow.exe /E" puinaow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puinaow = "C:\\Users\\Admin\\puinaow.exe /j" puinaow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puinaow = "C:\\Users\\Admin\\puinaow.exe /P" puinaow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puinaow = "C:\\Users\\Admin\\puinaow.exe /e" puinaow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puinaow = "C:\\Users\\Admin\\puinaow.exe /Z" puinaow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puinaow = "C:\\Users\\Admin\\puinaow.exe /M" puinaow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puinaow = "C:\\Users\\Admin\\puinaow.exe /T" puinaow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puinaow = "C:\\Users\\Admin\\puinaow.exe /u" puinaow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puinaow = "C:\\Users\\Admin\\puinaow.exe /R" puinaow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puinaow = "C:\\Users\\Admin\\puinaow.exe /b" puinaow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puinaow = "C:\\Users\\Admin\\puinaow.exe /l" puinaow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puinaow = "C:\\Users\\Admin\\puinaow.exe /k" puinaow.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\puinaow = "C:\\Users\\Admin\\puinaow.exe /D" puinaow.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 2eaz.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 2eaz.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 3136 tasklist.exe 3992 tasklist.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 1964 set thread context of 5016 1964 2eaz.exe 91 PID 1964 set thread context of 1448 1964 2eaz.exe 94 PID 1964 set thread context of 3556 1964 2eaz.exe 96 PID 1964 set thread context of 3460 1964 2eaz.exe 97 PID 1964 set thread context of 2996 1964 2eaz.exe 98 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4600 5016 WerFault.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eeefe3b9656746910979793242de3d78_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language puinaow.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2eaz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2eaz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3eaz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Za0Fr02eH4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2eaz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2eaz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\Local Settings explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3540 Za0Fr02eH4.exe 3540 Za0Fr02eH4.exe 3540 Za0Fr02eH4.exe 3540 Za0Fr02eH4.exe 1448 2eaz.exe 1448 2eaz.exe 2008 3eaz.exe 2008 3eaz.exe 4944 X 4944 X 4532 puinaow.exe 4532 puinaow.exe 4532 puinaow.exe 4532 puinaow.exe 4532 puinaow.exe 4532 puinaow.exe 4532 puinaow.exe 4532 puinaow.exe 1448 2eaz.exe 1448 2eaz.exe 4532 puinaow.exe 4532 puinaow.exe 4532 puinaow.exe 4532 puinaow.exe 4532 puinaow.exe 4532 puinaow.exe 4532 puinaow.exe 4532 puinaow.exe 4532 puinaow.exe 4532 puinaow.exe 4532 puinaow.exe 4532 puinaow.exe 4532 puinaow.exe 4532 puinaow.exe 4532 puinaow.exe 4532 puinaow.exe 4532 puinaow.exe 4532 puinaow.exe 4532 puinaow.exe 4532 puinaow.exe 4532 puinaow.exe 4532 puinaow.exe 4532 puinaow.exe 4532 puinaow.exe 4532 puinaow.exe 4532 puinaow.exe 4532 puinaow.exe 4532 puinaow.exe 4532 puinaow.exe 4532 puinaow.exe 4532 puinaow.exe 4532 puinaow.exe 4532 puinaow.exe 4532 puinaow.exe 4532 puinaow.exe 4532 puinaow.exe 4532 puinaow.exe 4532 puinaow.exe 4532 puinaow.exe 4532 puinaow.exe 4532 puinaow.exe 4532 puinaow.exe 4532 puinaow.exe 4532 puinaow.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3136 tasklist.exe Token: SeDebugPrivilege 2008 3eaz.exe Token: SeDebugPrivilege 2008 3eaz.exe Token: SeDebugPrivilege 3992 tasklist.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4224 eeefe3b9656746910979793242de3d78_JaffaCakes118.exe 3540 Za0Fr02eH4.exe 4532 puinaow.exe 1964 2eaz.exe 3460 2eaz.exe 2996 2eaz.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4224 wrote to memory of 3540 4224 eeefe3b9656746910979793242de3d78_JaffaCakes118.exe 82 PID 4224 wrote to memory of 3540 4224 eeefe3b9656746910979793242de3d78_JaffaCakes118.exe 82 PID 4224 wrote to memory of 3540 4224 eeefe3b9656746910979793242de3d78_JaffaCakes118.exe 82 PID 3540 wrote to memory of 4532 3540 Za0Fr02eH4.exe 87 PID 3540 wrote to memory of 4532 3540 Za0Fr02eH4.exe 87 PID 3540 wrote to memory of 4532 3540 Za0Fr02eH4.exe 87 PID 3540 wrote to memory of 4976 3540 Za0Fr02eH4.exe 88 PID 3540 wrote to memory of 4976 3540 Za0Fr02eH4.exe 88 PID 3540 wrote to memory of 4976 3540 Za0Fr02eH4.exe 88 PID 4224 wrote to memory of 1964 4224 eeefe3b9656746910979793242de3d78_JaffaCakes118.exe 89 PID 4224 wrote to memory of 1964 4224 eeefe3b9656746910979793242de3d78_JaffaCakes118.exe 89 PID 4224 wrote to memory of 1964 4224 eeefe3b9656746910979793242de3d78_JaffaCakes118.exe 89 PID 1964 wrote to memory of 5016 1964 2eaz.exe 91 PID 1964 wrote to memory of 5016 1964 2eaz.exe 91 PID 1964 wrote to memory of 5016 1964 2eaz.exe 91 PID 1964 wrote to memory of 5016 1964 2eaz.exe 91 PID 4976 wrote to memory of 3136 4976 cmd.exe 93 PID 4976 wrote to memory of 3136 4976 cmd.exe 93 PID 4976 wrote to memory of 3136 4976 cmd.exe 93 PID 1964 wrote to memory of 1448 1964 2eaz.exe 94 PID 1964 wrote to memory of 1448 1964 2eaz.exe 94 PID 1964 wrote to memory of 1448 1964 2eaz.exe 94 PID 1964 wrote to memory of 1448 1964 2eaz.exe 94 PID 1964 wrote to memory of 1448 1964 2eaz.exe 94 PID 1964 wrote to memory of 1448 1964 2eaz.exe 94 PID 1964 wrote to memory of 1448 1964 2eaz.exe 94 PID 1964 wrote to memory of 1448 1964 2eaz.exe 94 PID 1964 wrote to memory of 3556 1964 2eaz.exe 96 PID 1964 wrote to memory of 3556 1964 2eaz.exe 96 PID 1964 wrote to memory of 3556 1964 2eaz.exe 96 PID 1964 wrote to memory of 3556 1964 2eaz.exe 96 PID 1964 wrote to memory of 3556 1964 2eaz.exe 96 PID 1964 wrote to memory of 3556 1964 2eaz.exe 96 PID 1964 wrote to memory of 3556 1964 2eaz.exe 96 PID 1964 wrote to memory of 3556 1964 2eaz.exe 96 PID 1964 wrote to memory of 3460 1964 2eaz.exe 97 PID 1964 wrote to memory of 3460 1964 2eaz.exe 97 PID 1964 wrote to memory of 3460 1964 2eaz.exe 97 PID 1964 wrote to memory of 3460 1964 2eaz.exe 97 PID 1964 wrote to memory of 3460 1964 2eaz.exe 97 PID 1964 wrote to memory of 3460 1964 2eaz.exe 97 PID 1964 wrote to memory of 3460 1964 2eaz.exe 97 PID 1964 wrote to memory of 3460 1964 2eaz.exe 97 PID 1964 wrote to memory of 2996 1964 2eaz.exe 98 PID 1964 wrote to memory of 2996 1964 2eaz.exe 98 PID 1964 wrote to memory of 2996 1964 2eaz.exe 98 PID 1964 wrote to memory of 2996 1964 2eaz.exe 98 PID 1964 wrote to memory of 2996 1964 2eaz.exe 98 PID 1964 wrote to memory of 2996 1964 2eaz.exe 98 PID 1964 wrote to memory of 2996 1964 2eaz.exe 98 PID 1964 wrote to memory of 2996 1964 2eaz.exe 98 PID 4224 wrote to memory of 2008 4224 eeefe3b9656746910979793242de3d78_JaffaCakes118.exe 100 PID 4224 wrote to memory of 2008 4224 eeefe3b9656746910979793242de3d78_JaffaCakes118.exe 100 PID 4224 wrote to memory of 2008 4224 eeefe3b9656746910979793242de3d78_JaffaCakes118.exe 100 PID 2008 wrote to memory of 4944 2008 3eaz.exe 101 PID 2008 wrote to memory of 4944 2008 3eaz.exe 101 PID 4944 wrote to memory of 4848 4944 X 102 PID 4944 wrote to memory of 4848 4944 X 102 PID 4944 wrote to memory of 4848 4944 X 102 PID 4224 wrote to memory of 4024 4224 eeefe3b9656746910979793242de3d78_JaffaCakes118.exe 105 PID 4224 wrote to memory of 4024 4224 eeefe3b9656746910979793242de3d78_JaffaCakes118.exe 105 PID 4224 wrote to memory of 4024 4224 eeefe3b9656746910979793242de3d78_JaffaCakes118.exe 105 PID 4024 wrote to memory of 3992 4024 cmd.exe 107 PID 4024 wrote to memory of 3992 4024 cmd.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\eeefe3b9656746910979793242de3d78_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eeefe3b9656746910979793242de3d78_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Users\Admin\Za0Fr02eH4.exeC:\Users\Admin\Za0Fr02eH4.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Users\Admin\puinaow.exe"C:\Users\Admin\puinaow.exe"3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4532
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del Za0Fr02eH4.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3136
-
-
-
-
C:\Users\Admin\2eaz.exeC:\Users\Admin\2eaz.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\2eaz.exe"C:\Users\Admin\2eaz.exe"3⤵
- Executes dropped EXE
PID:5016 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5016 -s 804⤵
- Program crash
PID:4600
-
-
-
C:\Users\Admin\2eaz.exe"C:\Users\Admin\2eaz.exe"3⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
PID:1448
-
-
C:\Users\Admin\2eaz.exe"C:\Users\Admin\2eaz.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3556
-
-
C:\Users\Admin\2eaz.exe"C:\Users\Admin\2eaz.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3460
-
-
C:\Users\Admin\2eaz.exe"C:\Users\Admin\2eaz.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2996
-
-
-
C:\Users\Admin\3eaz.exeC:\Users\Admin\3eaz.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Users\Admin\AppData\Local\5f231aed\X*0*bc*6b23386d*31.193.3.240:533⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Windows\explorer.exe"C:\Windows\explorer.exe"4⤵
- Modifies registry class
PID:4848
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del eeefe3b9656746910979793242de3d78_JaffaCakes118.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3992
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 5016 -ip 50161⤵PID:3856
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD5b5e4ef8f155546bb96b2725ec36f8dd9
SHA17e1301b8759c39f37993c7145d233f9fd45fa1c9
SHA256c5ce89c5116fe9796e3324b2045fc53369e099bf92d22d7303a55ae67d0a5755
SHA512b6ba29f78fd3ad4895a9aa6d30f46ecabee67d5ff38a3c0dfc5f5dd5bb170ec2bbf47dd963285fcc90097804523ba12fd41418005f7abf3367875ac21f23e904
-
Filesize
254KB
MD50c0be014832905bc4bb981a03f279d6e
SHA116e8d3cf157ed3afb5041df2bbe97f4422c5a1dc
SHA25613b0b4e5adf34babefd24eb5886a2b9a5d0d2e6cce61a77c2cbd501e22d36f48
SHA5121be55754d1ab77f9ef9c588599428f5754a6cc349471e5f63ca98a5a5d54e40210616937e9f53abe4912b5aa637620b85cb0665e3b60661fd1ca046f7da65060
-
Filesize
38KB
MD572de2dadaf875e2fd7614e100419033c
SHA15f17c5330e91a42daa9ff24c4aa602bd1a72bf6e
SHA256c44993768a4dc5a58ddbfc9cb05ce2a7d3a0a56be45643d70a72bcf811b6c381
SHA512e2520a53326a7d3b056e65d0cf60e9d823ffb34ca026cdddc7ea3a714f8396c53c37e13a887fc86a7dd7076c97fdfad53c3f5a68342ebc1bdec948c76bda8df3
-
Filesize
212KB
MD5c613e1456c877e1487154fbafe1a298e
SHA1af8c9d76cfb43659ced915b12bba47d0bba11ba0
SHA256b21afd7848d64eadace47bc6f278f4ec2f89b8a42d9be9f55123b0e2de7320f9
SHA512a675e9cd0f4ad741ddaacc15b4a119ab862009b1c62a97ac43a760c6ca5c2ea10e8f00928cd89489759aeea3f91a505b842536a5c221bb6a7b2ecf9a33fc3663
-
Filesize
212KB
MD5e1659e37ad4496dac60a13996d81dff4
SHA1fb95477af8ddfd39ce088e8bd908e0936b48dd71
SHA25684fcde2bb6c4a48a856cdbf8fdb2c2245c616bd492595e558962dff7fc5cc628
SHA512b278674eecc7242a2a8c1661c210d8979c3d7734d39924fe0019db10563ff5f9ad2b57839282601efcfca3583b77db5fdde4bc89ead15f6f1e358118adcbb3a4