Analysis
-
max time kernel
150s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/09/2024, 14:38
Static task
static1
Behavioral task
behavioral1
Sample
f002bf28f8af3bd6ca14f25f002b5b5a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f002bf28f8af3bd6ca14f25f002b5b5a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f002bf28f8af3bd6ca14f25f002b5b5a_JaffaCakes118.exe
-
Size
366KB
-
MD5
f002bf28f8af3bd6ca14f25f002b5b5a
-
SHA1
b626e1e77bc2d474a63e3f1873e0ded2d5f07b24
-
SHA256
9ba560fb26213c307fe1940e9918e0a57d160122c0e4e1531bf4a8f5392bc5ed
-
SHA512
ceaf4816c2a11fad031c83e8c003e6dc7f6cf855d0f94c9940bb9c0f7ed2f55b830a3833f4eaf75830d8cdc70f95f60637c68027cf68014e6320949a5d2670e6
-
SSDEEP
6144:YCZ/3sHw0Ecywu3fY+0APPTybbasvDIepNMSqZxXXeWm60yDOrOY+Hk:YMUHTyHrPPTybb5vDFFq8uLk
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts f002bf28f8af3bd6ca14f25f002b5b5a_JaffaCakes118.exe File opened for modification C:\Windows\system32\drivers\etc\hosts Logo1_.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini Logo1_.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini Logo1_.exe -
Executes dropped EXE 2 IoCs
pid Process 3960 Logo1_.exe 4052 f002bf28f8af3bd6ca14f25f002b5b5a_JaffaCakes118.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\load = "C:\\Windows\\uninstall\\rundl132.exe" f002bf28f8af3bd6ca14f25f002b5b5a_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\load = "C:\\Windows\\uninstall\\rundl132.exe" Logo1_.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\cs-cz\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\sl-si\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Photo Viewer\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account-select\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\ar-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\cs-cz\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\de-de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft Office\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\sl-sl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\es-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\ar-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\nls\es-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Locale\en_US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\cy\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\hr-hr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\hr-hr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Defender\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\ja-jp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\nb-no\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\zh-cn\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jhat.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ach\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\cy\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\en-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\js\nls\en-gb\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\en-gb\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\en-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javaws.exe Logo1_.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\MSEnv\PublicAssemblies\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\images\themes\dark\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\nls\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\it\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\Playstore\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\MSInfo\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pt_PT\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Annotations\Stamps\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\cs-cz\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\da-dk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\tr-tr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\VSTA\Pipeline.v10.0\HostSideAdapters\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\MicrosoftEdgeUpdateOnDemand.exe Logo1_.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\fr\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\Web Server Extensions\16\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\brx\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\hu-hu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\zh-cn\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\STRTEDGE\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\packetizer\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\themes\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\uninstall\rundl132.exe f002bf28f8af3bd6ca14f25f002b5b5a_JaffaCakes118.exe File created C:\Windows\Logo1_.exe f002bf28f8af3bd6ca14f25f002b5b5a_JaffaCakes118.exe File opened for modification C:\Windows\uninstall\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f002bf28f8af3bd6ca14f25f002b5b5a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Logo1_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f002bf28f8af3bd6ca14f25f002b5b5a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3020 f002bf28f8af3bd6ca14f25f002b5b5a_JaffaCakes118.exe 3020 f002bf28f8af3bd6ca14f25f002b5b5a_JaffaCakes118.exe 3020 f002bf28f8af3bd6ca14f25f002b5b5a_JaffaCakes118.exe 3020 f002bf28f8af3bd6ca14f25f002b5b5a_JaffaCakes118.exe 3020 f002bf28f8af3bd6ca14f25f002b5b5a_JaffaCakes118.exe 3020 f002bf28f8af3bd6ca14f25f002b5b5a_JaffaCakes118.exe 3020 f002bf28f8af3bd6ca14f25f002b5b5a_JaffaCakes118.exe 3020 f002bf28f8af3bd6ca14f25f002b5b5a_JaffaCakes118.exe 3020 f002bf28f8af3bd6ca14f25f002b5b5a_JaffaCakes118.exe 3020 f002bf28f8af3bd6ca14f25f002b5b5a_JaffaCakes118.exe 3020 f002bf28f8af3bd6ca14f25f002b5b5a_JaffaCakes118.exe 3020 f002bf28f8af3bd6ca14f25f002b5b5a_JaffaCakes118.exe 3020 f002bf28f8af3bd6ca14f25f002b5b5a_JaffaCakes118.exe 3020 f002bf28f8af3bd6ca14f25f002b5b5a_JaffaCakes118.exe 3020 f002bf28f8af3bd6ca14f25f002b5b5a_JaffaCakes118.exe 3020 f002bf28f8af3bd6ca14f25f002b5b5a_JaffaCakes118.exe 3020 f002bf28f8af3bd6ca14f25f002b5b5a_JaffaCakes118.exe 3020 f002bf28f8af3bd6ca14f25f002b5b5a_JaffaCakes118.exe 3020 f002bf28f8af3bd6ca14f25f002b5b5a_JaffaCakes118.exe 3020 f002bf28f8af3bd6ca14f25f002b5b5a_JaffaCakes118.exe 3020 f002bf28f8af3bd6ca14f25f002b5b5a_JaffaCakes118.exe 3020 f002bf28f8af3bd6ca14f25f002b5b5a_JaffaCakes118.exe 3020 f002bf28f8af3bd6ca14f25f002b5b5a_JaffaCakes118.exe 3020 f002bf28f8af3bd6ca14f25f002b5b5a_JaffaCakes118.exe 3020 f002bf28f8af3bd6ca14f25f002b5b5a_JaffaCakes118.exe 3020 f002bf28f8af3bd6ca14f25f002b5b5a_JaffaCakes118.exe 3960 Logo1_.exe 3960 Logo1_.exe 3960 Logo1_.exe 3960 Logo1_.exe 3960 Logo1_.exe 3960 Logo1_.exe 3960 Logo1_.exe 3960 Logo1_.exe 3960 Logo1_.exe 3960 Logo1_.exe 3960 Logo1_.exe 3960 Logo1_.exe 3960 Logo1_.exe 3960 Logo1_.exe 3960 Logo1_.exe 3960 Logo1_.exe 3960 Logo1_.exe 3960 Logo1_.exe 3960 Logo1_.exe 3960 Logo1_.exe 3960 Logo1_.exe 3960 Logo1_.exe 3960 Logo1_.exe 3960 Logo1_.exe 3960 Logo1_.exe 3960 Logo1_.exe 3960 Logo1_.exe 3960 Logo1_.exe 3960 Logo1_.exe 3960 Logo1_.exe 3960 Logo1_.exe 3960 Logo1_.exe 3960 Logo1_.exe 3960 Logo1_.exe 3960 Logo1_.exe 3960 Logo1_.exe 3960 Logo1_.exe 3960 Logo1_.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 3020 wrote to memory of 1572 3020 f002bf28f8af3bd6ca14f25f002b5b5a_JaffaCakes118.exe 82 PID 3020 wrote to memory of 1572 3020 f002bf28f8af3bd6ca14f25f002b5b5a_JaffaCakes118.exe 82 PID 3020 wrote to memory of 1572 3020 f002bf28f8af3bd6ca14f25f002b5b5a_JaffaCakes118.exe 82 PID 1572 wrote to memory of 2180 1572 net.exe 84 PID 1572 wrote to memory of 2180 1572 net.exe 84 PID 1572 wrote to memory of 2180 1572 net.exe 84 PID 3020 wrote to memory of 4284 3020 f002bf28f8af3bd6ca14f25f002b5b5a_JaffaCakes118.exe 85 PID 3020 wrote to memory of 4284 3020 f002bf28f8af3bd6ca14f25f002b5b5a_JaffaCakes118.exe 85 PID 3020 wrote to memory of 4284 3020 f002bf28f8af3bd6ca14f25f002b5b5a_JaffaCakes118.exe 85 PID 3020 wrote to memory of 3960 3020 f002bf28f8af3bd6ca14f25f002b5b5a_JaffaCakes118.exe 86 PID 3020 wrote to memory of 3960 3020 f002bf28f8af3bd6ca14f25f002b5b5a_JaffaCakes118.exe 86 PID 3020 wrote to memory of 3960 3020 f002bf28f8af3bd6ca14f25f002b5b5a_JaffaCakes118.exe 86 PID 3960 wrote to memory of 384 3960 Logo1_.exe 88 PID 3960 wrote to memory of 384 3960 Logo1_.exe 88 PID 3960 wrote to memory of 384 3960 Logo1_.exe 88 PID 4284 wrote to memory of 4052 4284 cmd.exe 90 PID 4284 wrote to memory of 4052 4284 cmd.exe 90 PID 4284 wrote to memory of 4052 4284 cmd.exe 90 PID 384 wrote to memory of 2776 384 net.exe 91 PID 384 wrote to memory of 2776 384 net.exe 91 PID 384 wrote to memory of 2776 384 net.exe 91 PID 3960 wrote to memory of 2064 3960 Logo1_.exe 92 PID 3960 wrote to memory of 2064 3960 Logo1_.exe 92 PID 3960 wrote to memory of 2064 3960 Logo1_.exe 92 PID 2064 wrote to memory of 1980 2064 net.exe 94 PID 2064 wrote to memory of 1980 2064 net.exe 94 PID 2064 wrote to memory of 1980 2064 net.exe 94 PID 3960 wrote to memory of 3432 3960 Logo1_.exe 56 PID 3960 wrote to memory of 3432 3960 Logo1_.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3432
-
C:\Users\Admin\AppData\Local\Temp\f002bf28f8af3bd6ca14f25f002b5b5a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f002bf28f8af3bd6ca14f25f002b5b5a_JaffaCakes118.exe"2⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
PID:2180
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aBFF4.bat3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Users\Admin\AppData\Local\Temp\f002bf28f8af3bd6ca14f25f002b5b5a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f002bf28f8af3bd6ca14f25f002b5b5a_JaffaCakes118.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4052
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Drops file in Drivers directory
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:2776
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:1980
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
388KB
MD5dd1a18d62c563217a902469aaafac199
SHA1073d02cadb7b9eb5217dbb203bdf887cd0b2d438
SHA256d2d1af3baa7a0120020562692cd9644dcc0b3515b5ebe5b11d5aaf2dd2e4ad9d
SHA5120327f982539e72f5c03b32f454e8a8230fb6cc0faeeedbbfc9e22032583d0881c17656806afba83a4cb82a48900e8c9f66ab2dc500eaa4f299e2e3573aeb4856
-
Filesize
614B
MD512b14345d6744fd289781199103ab290
SHA13e1478a925a4b379c3111c5d9fca3223b93bec6a
SHA256d8b75fb12e69104c5e0e33fe46c70833ec5da2a506ec9b74e74728b8c6adb4d5
SHA512c4376b030d4e46eebb826ada30f24d4554f122d0b34fc2d9d809b3d6fe53ba161f5020e94f357f733ee4b473d8a3b6c5fce0769e6b453bc9988f064624d74b6f
-
Filesize
278KB
MD57b883fbf12d8febcaa3e94c7c421d7ae
SHA1321eaa1df78ba1ad4ede806d5d8b170938aa5155
SHA256c85520acd0cec077b187a3622ce5e6dc873eb00aacd915ef059970320a3967b3
SHA512e488ef52a654a6bf84d7639e9c51f64bb932cca99ca3f62c2080ddb20d9e65d6e4d1895123590a175a8880f615a42051ae705f97963e75d405614eeda049694a
-
Filesize
88KB
MD5d9e5d5d18508aa5c50bb62a9b235ab0b
SHA1865e38d294a107fa5171b75354863989e19c5671
SHA256c44e647431b9e3cb95532be8865d873850821664daa8500e1458ebf013bf3d05
SHA512ae40f879d2dbb86af612f6df6cb14321091078edbed61aeaeef0067915fcee40dd33eb8b4836a3948823c6b7a7a04aa890605f147853ea7730d4af1625ae7e3d
-
Filesize
842B
MD56f4adf207ef402d9ef40c6aa52ffd245
SHA14b05b495619c643f02e278dede8f5b1392555a57
SHA256d9704dab05e988be3e5e7b7c020bb9814906d11bb9c31ad80d4ed1316f6bc94e
SHA512a6306bd200a26ea78192ae5b00cc49cfab3fba025fe7233709a4e62db0f9ed60030dce22b34afe57aad86a098c9a8c44e080cedc43227cb87ef4690baec35b47
-
Filesize
9B
MD55412111268dd2c1fb1cf8697bfab9b6c
SHA116d0b289e83c74cb50a004edd7c5750ac706f321
SHA256f3aa35be7048ddbf11fc581e5f9476745d75bcf097e121ba2915614e360a0cdc
SHA51213fc5bf11faaf5471fde8a1bafdcc6d27521bad796e5e532c94d9c8232dd70088e70b6d5ac60c4c15d13e59926ac38e9a9e01b4dd4694a77d70bdd1ae7005ccf