Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-09-2024 14:30
Behavioral task
behavioral1
Sample
efff2fe18024a3094929186dca954315_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
efff2fe18024a3094929186dca954315_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
efff2fe18024a3094929186dca954315_JaffaCakes118.exe
-
Size
1.2MB
-
MD5
efff2fe18024a3094929186dca954315
-
SHA1
2ba5cea58730f11b9b7d3fb582db68dbc8d16ca4
-
SHA256
7dd9bd66025b79a1392b928ff5e2b3a62335465ebeabcf72e426f5490bd207d1
-
SHA512
0d1f99669047d6fa6e6614928ee467708a224bc1dc947982d356d007bb1ba24a65de832b6a0ef1b24b0dbc5c5e02a169bd4e8bd3bc3ee4366979ff0c1fe3f872
-
SSDEEP
24576:LqyeHypU4RJK007QGTojfj7XuHtXJ9pcvyZSQYBWt:nIypK7JTkLa
Malware Config
Extracted
xtremerat
nerozhack.ddns.com.br
p ƒalonedevil.no-ip.org
gameszero.dyndns.org
Signatures
-
Detect XtremeRAT payload 9 IoCs
resource yara_rule behavioral2/memory/744-52-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral2/memory/1440-55-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral2/memory/2788-56-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral2/memory/2788-59-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral2/memory/1440-60-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral2/memory/2788-61-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral2/memory/2984-127-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral2/memory/3972-134-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat behavioral2/memory/4632-135-0x0000000010000000-0x000000001004D000-memory.dmp family_xtremerat -
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" mstwain32.exe -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
ModiLoader Second Stage 18 IoCs
resource yara_rule behavioral2/memory/4236-20-0x0000000000400000-0x0000000000455000-memory.dmp modiloader_stage2 behavioral2/memory/4236-22-0x0000000000400000-0x0000000000455000-memory.dmp modiloader_stage2 behavioral2/memory/4236-23-0x0000000000400000-0x0000000000455000-memory.dmp modiloader_stage2 behavioral2/memory/4236-21-0x0000000000400000-0x0000000000455000-memory.dmp modiloader_stage2 behavioral2/memory/1900-26-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral2/memory/1900-31-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral2/memory/1900-34-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral2/memory/1900-33-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral2/memory/1900-35-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral2/memory/1900-32-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral2/memory/1900-29-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral2/memory/1900-27-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral2/memory/4236-36-0x0000000000400000-0x0000000000455000-memory.dmp modiloader_stage2 behavioral2/memory/1900-71-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral2/memory/4608-97-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral2/memory/2664-98-0x0000000000400000-0x0000000000455000-memory.dmp modiloader_stage2 behavioral2/memory/4608-101-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral2/memory/4608-119-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation efff2fe18024a3094929186dca954315_JaffaCakes118.exe -
Executes dropped EXE 9 IoCs
pid Process 5036 RSOP.exe 4268 RSOP.exe 744 RSOP.exe 4244 mstwain32.exe 3604 RSOP.exe 2664 mstwain32.exe 4608 mstwain32.exe 2016 RSOP.exe 2984 RSOP.exe -
Loads dropped DLL 13 IoCs
pid Process 4608 mstwain32.exe 4608 mstwain32.exe 4608 mstwain32.exe 4608 mstwain32.exe 2016 RSOP.exe 2016 RSOP.exe 2984 RSOP.exe 2984 RSOP.exe 4632 taskmgr.exe 4632 taskmgr.exe 852 WerFault.exe 3660 WerFault.exe 3660 WerFault.exe -
resource yara_rule behavioral2/memory/880-0-0x0000000000400000-0x00000000004B1000-memory.dmp upx behavioral2/files/0x0008000000023454-12.dat upx behavioral2/memory/5036-19-0x0000000000400000-0x00000000004B1000-memory.dmp upx behavioral2/memory/880-25-0x0000000000400000-0x00000000004B1000-memory.dmp upx behavioral2/memory/4268-40-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/4268-37-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/5036-44-0x0000000000400000-0x00000000004B1000-memory.dmp upx behavioral2/memory/4268-42-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/744-47-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/744-50-0x0000000000400000-0x00000000004B1000-memory.dmp upx behavioral2/memory/744-51-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/744-52-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/4268-54-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/1440-55-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/2788-56-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/2788-59-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/1440-60-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/2788-61-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/files/0x000c000000023458-67.dat upx behavioral2/memory/3604-81-0x0000000000400000-0x00000000004B1000-memory.dmp upx behavioral2/memory/4244-86-0x0000000000400000-0x00000000004B1000-memory.dmp upx behavioral2/memory/2016-103-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/2016-109-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/3604-113-0x0000000000400000-0x00000000004B1000-memory.dmp upx behavioral2/memory/2984-126-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/2984-127-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/2016-133-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/3972-134-0x0000000010000000-0x000000001004D000-memory.dmp upx behavioral2/memory/4632-135-0x0000000010000000-0x000000001004D000-memory.dmp upx -
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\Microsoft\\Protect\\System.exe" taskmgr.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mstwain32 = "C:\\Windows\\mstwain32.exe" mstwain32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\Microsoft\\Protect\\System.exe" taskmgr.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft Update = "C:\\Windows\\system32\\Microsoft\\Protect\\System.exe" taskmgr.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\Microsoft\\Protect\\System.exe" taskmgr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\Microsoft\\Protect\\System.exe" taskmgr.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft Update = "C:\\Windows\\system32\\Microsoft\\Protect\\System.exe" taskmgr.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" mstwain32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA efff2fe18024a3094929186dca954315_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mstwain32.exe -
AutoIT Executable 5 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/5036-19-0x0000000000400000-0x00000000004B1000-memory.dmp autoit_exe behavioral2/memory/880-25-0x0000000000400000-0x00000000004B1000-memory.dmp autoit_exe behavioral2/memory/5036-44-0x0000000000400000-0x00000000004B1000-memory.dmp autoit_exe behavioral2/memory/4244-86-0x0000000000400000-0x00000000004B1000-memory.dmp autoit_exe behavioral2/memory/3604-113-0x0000000000400000-0x00000000004B1000-memory.dmp autoit_exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Microsoft\Protect\System.exe taskmgr.exe File created C:\Windows\SysWOW64\Microsoft\Protect\System.exe taskmgr.exe File opened for modification C:\Windows\SysWOW64\Microsoft\Protect\ taskmgr.exe File opened for modification C:\Windows\SysWOW64\Microsoft\Protect\System.exe taskmgr.exe File opened for modification C:\Windows\SysWOW64\Microsoft\Protect\ taskmgr.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 880 set thread context of 4236 880 efff2fe18024a3094929186dca954315_JaffaCakes118.exe 82 PID 5036 set thread context of 4268 5036 RSOP.exe 85 PID 4268 set thread context of 744 4268 RSOP.exe 87 PID 4244 set thread context of 2664 4244 mstwain32.exe 104 PID 3604 set thread context of 2016 3604 RSOP.exe 106 PID 2016 set thread context of 2984 2016 RSOP.exe 108 -
Drops file in Windows directory 8 IoCs
description ioc Process File created C:\Windows\mstwain32.exe efff2fe18024a3094929186dca954315_JaffaCakes118.exe File opened for modification C:\Windows\mstwain32.exe efff2fe18024a3094929186dca954315_JaffaCakes118.exe File created C:\Windows\ntdtcstp.dll mstwain32.exe File created C:\Windows\cmsetac.dll mstwain32.exe File opened for modification C:\Windows\RSOP.exe RSOP.exe File created C:\Windows\RSOP.exe efff2fe18024a3094929186dca954315_JaffaCakes118.exe File opened for modification C:\Windows\RSOP.exe efff2fe18024a3094929186dca954315_JaffaCakes118.exe File opened for modification C:\Windows\RSOP.exe RSOP.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 5 IoCs
pid pid_target Process procid_target 3364 1440 WerFault.exe 89 4084 1440 WerFault.exe 89 348 2788 WerFault.exe 90 852 3972 WerFault.exe 109 3660 3972 WerFault.exe 109 -
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RSOP.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RSOP.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language efff2fe18024a3094929186dca954315_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language efff2fe18024a3094929186dca954315_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RSOP.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RSOP.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language efff2fe18024a3094929186dca954315_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RSOP.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mstwain32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RSOP.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mstwain32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mstwain32.exe -
Suspicious behavior: SetClipboardViewer 1 IoCs
pid Process 4632 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 1900 efff2fe18024a3094929186dca954315_JaffaCakes118.exe Token: SeBackupPrivilege 640 vssvc.exe Token: SeRestorePrivilege 640 vssvc.exe Token: SeAuditPrivilege 640 vssvc.exe Token: SeDebugPrivilege 4608 mstwain32.exe Token: SeDebugPrivilege 4608 mstwain32.exe Token: SeDebugPrivilege 2016 RSOP.exe Token: SeDebugPrivilege 2984 RSOP.exe Token: SeDebugPrivilege 4632 taskmgr.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4268 RSOP.exe 2788 taskmgr.exe 4608 mstwain32.exe 2016 RSOP.exe 4608 mstwain32.exe 4632 taskmgr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 880 wrote to memory of 4236 880 efff2fe18024a3094929186dca954315_JaffaCakes118.exe 82 PID 880 wrote to memory of 4236 880 efff2fe18024a3094929186dca954315_JaffaCakes118.exe 82 PID 880 wrote to memory of 4236 880 efff2fe18024a3094929186dca954315_JaffaCakes118.exe 82 PID 880 wrote to memory of 5036 880 efff2fe18024a3094929186dca954315_JaffaCakes118.exe 83 PID 880 wrote to memory of 5036 880 efff2fe18024a3094929186dca954315_JaffaCakes118.exe 83 PID 880 wrote to memory of 5036 880 efff2fe18024a3094929186dca954315_JaffaCakes118.exe 83 PID 880 wrote to memory of 4236 880 efff2fe18024a3094929186dca954315_JaffaCakes118.exe 82 PID 880 wrote to memory of 4236 880 efff2fe18024a3094929186dca954315_JaffaCakes118.exe 82 PID 880 wrote to memory of 4236 880 efff2fe18024a3094929186dca954315_JaffaCakes118.exe 82 PID 880 wrote to memory of 4236 880 efff2fe18024a3094929186dca954315_JaffaCakes118.exe 82 PID 880 wrote to memory of 4236 880 efff2fe18024a3094929186dca954315_JaffaCakes118.exe 82 PID 880 wrote to memory of 4236 880 efff2fe18024a3094929186dca954315_JaffaCakes118.exe 82 PID 880 wrote to memory of 4236 880 efff2fe18024a3094929186dca954315_JaffaCakes118.exe 82 PID 4236 wrote to memory of 1900 4236 efff2fe18024a3094929186dca954315_JaffaCakes118.exe 84 PID 4236 wrote to memory of 1900 4236 efff2fe18024a3094929186dca954315_JaffaCakes118.exe 84 PID 4236 wrote to memory of 1900 4236 efff2fe18024a3094929186dca954315_JaffaCakes118.exe 84 PID 4236 wrote to memory of 1900 4236 efff2fe18024a3094929186dca954315_JaffaCakes118.exe 84 PID 4236 wrote to memory of 1900 4236 efff2fe18024a3094929186dca954315_JaffaCakes118.exe 84 PID 4236 wrote to memory of 1900 4236 efff2fe18024a3094929186dca954315_JaffaCakes118.exe 84 PID 4236 wrote to memory of 1900 4236 efff2fe18024a3094929186dca954315_JaffaCakes118.exe 84 PID 4236 wrote to memory of 1900 4236 efff2fe18024a3094929186dca954315_JaffaCakes118.exe 84 PID 4236 wrote to memory of 1900 4236 efff2fe18024a3094929186dca954315_JaffaCakes118.exe 84 PID 4236 wrote to memory of 1900 4236 efff2fe18024a3094929186dca954315_JaffaCakes118.exe 84 PID 4236 wrote to memory of 1900 4236 efff2fe18024a3094929186dca954315_JaffaCakes118.exe 84 PID 4236 wrote to memory of 1900 4236 efff2fe18024a3094929186dca954315_JaffaCakes118.exe 84 PID 4236 wrote to memory of 1900 4236 efff2fe18024a3094929186dca954315_JaffaCakes118.exe 84 PID 5036 wrote to memory of 4268 5036 RSOP.exe 85 PID 5036 wrote to memory of 4268 5036 RSOP.exe 85 PID 5036 wrote to memory of 4268 5036 RSOP.exe 85 PID 5036 wrote to memory of 4268 5036 RSOP.exe 85 PID 5036 wrote to memory of 4268 5036 RSOP.exe 85 PID 5036 wrote to memory of 4268 5036 RSOP.exe 85 PID 4268 wrote to memory of 744 4268 RSOP.exe 87 PID 4268 wrote to memory of 744 4268 RSOP.exe 87 PID 4268 wrote to memory of 744 4268 RSOP.exe 87 PID 4268 wrote to memory of 744 4268 RSOP.exe 87 PID 4268 wrote to memory of 744 4268 RSOP.exe 87 PID 4268 wrote to memory of 744 4268 RSOP.exe 87 PID 4268 wrote to memory of 744 4268 RSOP.exe 87 PID 4268 wrote to memory of 744 4268 RSOP.exe 87 PID 744 wrote to memory of 1440 744 RSOP.exe 89 PID 744 wrote to memory of 1440 744 RSOP.exe 89 PID 744 wrote to memory of 1440 744 RSOP.exe 89 PID 744 wrote to memory of 1440 744 RSOP.exe 89 PID 744 wrote to memory of 2788 744 RSOP.exe 90 PID 744 wrote to memory of 2788 744 RSOP.exe 90 PID 744 wrote to memory of 2788 744 RSOP.exe 90 PID 744 wrote to memory of 2788 744 RSOP.exe 90 PID 1900 wrote to memory of 4244 1900 efff2fe18024a3094929186dca954315_JaffaCakes118.exe 103 PID 1900 wrote to memory of 4244 1900 efff2fe18024a3094929186dca954315_JaffaCakes118.exe 103 PID 1900 wrote to memory of 4244 1900 efff2fe18024a3094929186dca954315_JaffaCakes118.exe 103 PID 4244 wrote to memory of 2664 4244 mstwain32.exe 104 PID 4244 wrote to memory of 2664 4244 mstwain32.exe 104 PID 4244 wrote to memory of 2664 4244 mstwain32.exe 104 PID 4244 wrote to memory of 3604 4244 mstwain32.exe 105 PID 4244 wrote to memory of 3604 4244 mstwain32.exe 105 PID 4244 wrote to memory of 3604 4244 mstwain32.exe 105 PID 4244 wrote to memory of 2664 4244 mstwain32.exe 104 PID 4244 wrote to memory of 2664 4244 mstwain32.exe 104 PID 4244 wrote to memory of 2664 4244 mstwain32.exe 104 PID 4244 wrote to memory of 2664 4244 mstwain32.exe 104 PID 4244 wrote to memory of 2664 4244 mstwain32.exe 104 PID 4244 wrote to memory of 2664 4244 mstwain32.exe 104 PID 4244 wrote to memory of 2664 4244 mstwain32.exe 104 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" mstwain32.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\efff2fe18024a3094929186dca954315_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\efff2fe18024a3094929186dca954315_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Users\Admin\AppData\Local\Temp\efff2fe18024a3094929186dca954315_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\efff2fe18024a3094929186dca954315_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Users\Admin\AppData\Local\Temp\efff2fe18024a3094929186dca954315_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\efff2fe18024a3094929186dca954315_JaffaCakes118.exe"3⤵
- Checks computer location settings
- Checks whether UAC is enabled
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\mstwain32.exe"C:\Windows\mstwain32.exe" \melt "C:\Users\Admin\AppData\Local\Temp\efff2fe18024a3094929186dca954315_JaffaCakes118.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Windows\mstwain32.exe"C:\Windows\mstwain32.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2664 -
C:\Windows\mstwain32.exe"C:\Windows\mstwain32.exe"6⤵
- UAC bypass
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4608
-
-
-
C:\Windows\RSOP.exeC:\Windows\RSOP.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3604 -
C:\Windows\RSOP.exe"C:\Windows\RSOP.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2016 -
C:\Windows\RSOP.exe"C:\Windows\RSOP.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2984 -
C:\Windows\SysWOW64\svchost.exesvchost.exe8⤵
- System Location Discovery: System Language Discovery
PID:3972 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3972 -s 4809⤵
- Loads dropped DLL
- Program crash
PID:852
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3972 -s 4889⤵
- Loads dropped DLL
- Program crash
PID:3660
-
-
-
C:\WINDOWS\SysWOW64\taskmgr.exeC:\WINDOWS\system32\taskmgr.exe8⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: SetClipboardViewer
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4632
-
-
-
-
-
-
-
-
C:\Windows\RSOP.exeC:\Windows\RSOP.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Windows\RSOP.exe"C:\Windows\RSOP.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Windows\RSOP.exe"C:\Windows\RSOP.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
PID:1440 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1440 -s 4886⤵
- Program crash
PID:3364
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1440 -s 4966⤵
- Program crash
PID:4084
-
-
-
C:\WINDOWS\SysWOW64\taskmgr.exeC:\WINDOWS\system32\taskmgr.exe5⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2788 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2788 -s 10766⤵
- Program crash
PID:348
-
-
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1440 -ip 14401⤵PID:5060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1440 -ip 14401⤵PID:2144
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2788 -ip 27881⤵PID:1088
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 3972 -ip 39721⤵PID:3028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 3972 -ip 39721⤵PID:3488
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
300KB
MD5a87e455284d5aaf624c6c419fa7f9bed
SHA1dd7335f04ef50375b124106cc599d4def55f40ac
SHA2563cdc6602fee91dc53c16573cf2f53dbcec491d53a0795312290a804a247a81a3
SHA512000fbf010fdcc5d47be1500372d8ca4d2fe399a4c0e1a9299da5e42fa0fae77711f38be13bab1264e8dd78f321ac79fefdcea52953749756f8d33c225842ae32
-
Filesize
9KB
MD51cae2b547a78ece24949e7abc5ce0832
SHA154c4b7d4973c22818f87f8a5c5c145e408c65095
SHA256b4efccf8457046aaf4c5b272addd3299003f41ef19bad993ee2be0554a2922ce
SHA512786a678a513f09528335b48fc9e87c0c0e12f795090bb76f27a74fed522bcb0bf842c2b649e1bc19d2b22dbbf76a83a5d0df8e70db242e258de97758ebdc56d8
-
Filesize
33KB
MD5a1efb85344da33edeceb6e7db669f289
SHA1c1af0dc6dd034017a7687674d1162645789809ac
SHA2564c78a6a35e38fbd6f0f7252fb6caef183174ce77e79bfe98b6f15aadde073c89
SHA5125887488bdcca58cfefacf315e8f70c77ca3f34eeaf5308a55c069c7d71cfc7e1e88700733f83db90d9f204ff6be45a84e24e813cb9f7bf6566b926a783df31d9
-
Filesize
1.2MB
MD5efff2fe18024a3094929186dca954315
SHA12ba5cea58730f11b9b7d3fb582db68dbc8d16ca4
SHA2567dd9bd66025b79a1392b928ff5e2b3a62335465ebeabcf72e426f5490bd207d1
SHA5120d1f99669047d6fa6e6614928ee467708a224bc1dc947982d356d007bb1ba24a65de832b6a0ef1b24b0dbc5c5e02a169bd4e8bd3bc3ee4366979ff0c1fe3f872
-
Filesize
7KB
MD567587e25a971a141628d7f07bd40ffa0
SHA176fcd014539a3bb247cc0b761225f68bd6055f6b
SHA256e6829866322d68d5c5b78e3d48dcec70a41cdc42c6f357a44fd329f74a8b4378
SHA5126e6de7aa02c48f8b96b06e5f1160fbc5c95312320636e138cc997ef3362a61bc50ec03db1f06292eb964cd71915ddb2ec2eb741432c7da44215a4acbb576a350