Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
97s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 22:43
Static task
static1
Behavioral task
behavioral1
Sample
fb0932b0ee1c241483f0de55c384dfee_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fb0932b0ee1c241483f0de55c384dfee_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fb0932b0ee1c241483f0de55c384dfee_JaffaCakes118.exe
-
Size
496KB
-
MD5
fb0932b0ee1c241483f0de55c384dfee
-
SHA1
4cf463ec09cecd7bd6869693c1cfd7c0d287fa8e
-
SHA256
0e5e78aa194601a67dec4c8645062eee0770e35c94a094f6aabe453037dc6020
-
SHA512
2d7fcbadf59fd0213c918ec0ec7f37c32fac5e7da1e562a00c6ac0cb4296799904447ff75f9aa923009c46b9aae570d090931bb6eda778d153f39551368f0aec
-
SSDEEP
12288:iDCPENnBV5jaHBoFvZstQW012B04Ngjw5qu8jxTQlDrLOM:iEEZBV5jCoFvZsSWG2BdN+w2+O
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" 3men.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" j29oAE.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" gzkor.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Deletes itself 1 IoCs
pid Process 2208 cmd.exe -
Executes dropped EXE 12 IoCs
pid Process 2488 j29oAE.exe 2260 gzkor.exe 2572 2men.exe 2904 2men.exe 2576 2men.exe 2816 2men.exe 1804 2men.exe 2804 2men.exe 2104 3men.exe 2272 3men.exe 2776 3men.exe 2032 43E3.tmp -
Loads dropped DLL 10 IoCs
pid Process 2320 fb0932b0ee1c241483f0de55c384dfee_JaffaCakes118.exe 2320 fb0932b0ee1c241483f0de55c384dfee_JaffaCakes118.exe 2488 j29oAE.exe 2488 j29oAE.exe 2320 fb0932b0ee1c241483f0de55c384dfee_JaffaCakes118.exe 2320 fb0932b0ee1c241483f0de55c384dfee_JaffaCakes118.exe 2320 fb0932b0ee1c241483f0de55c384dfee_JaffaCakes118.exe 2320 fb0932b0ee1c241483f0de55c384dfee_JaffaCakes118.exe 2104 3men.exe 2104 3men.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\gzkor = "C:\\Users\\Admin\\gzkor.exe /o" gzkor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\gzkor = "C:\\Users\\Admin\\gzkor.exe /b" gzkor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\gzkor = "C:\\Users\\Admin\\gzkor.exe /V" gzkor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\gzkor = "C:\\Users\\Admin\\gzkor.exe /U" gzkor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\gzkor = "C:\\Users\\Admin\\gzkor.exe /h" gzkor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\gzkor = "C:\\Users\\Admin\\gzkor.exe /f" gzkor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\gzkor = "C:\\Users\\Admin\\gzkor.exe /J" gzkor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\gzkor = "C:\\Users\\Admin\\gzkor.exe /T" gzkor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\gzkor = "C:\\Users\\Admin\\gzkor.exe /R" gzkor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\gzkor = "C:\\Users\\Admin\\gzkor.exe /D" gzkor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\gzkor = "C:\\Users\\Admin\\gzkor.exe /v" gzkor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\gzkor = "C:\\Users\\Admin\\gzkor.exe /k" gzkor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\gzkor = "C:\\Users\\Admin\\gzkor.exe /G" gzkor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\gzkor = "C:\\Users\\Admin\\gzkor.exe /l" gzkor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\gzkor = "C:\\Users\\Admin\\gzkor.exe /d" gzkor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\gzkor = "C:\\Users\\Admin\\gzkor.exe /z" gzkor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\gzkor = "C:\\Users\\Admin\\gzkor.exe /X" gzkor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\gzkor = "C:\\Users\\Admin\\gzkor.exe /p" gzkor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\gzkor = "C:\\Users\\Admin\\gzkor.exe /M" gzkor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\gzkor = "C:\\Users\\Admin\\gzkor.exe /e" gzkor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\gzkor = "C:\\Users\\Admin\\gzkor.exe /Y" gzkor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\gzkor = "C:\\Users\\Admin\\gzkor.exe /F" gzkor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\gzkor = "C:\\Users\\Admin\\gzkor.exe /W" gzkor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\gzkor = "C:\\Users\\Admin\\gzkor.exe /P" gzkor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\gzkor = "C:\\Users\\Admin\\gzkor.exe /q" gzkor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\gzkor = "C:\\Users\\Admin\\gzkor.exe /i" gzkor.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\DDE.exe = "C:\\Program Files (x86)\\LP\\E916\\DDE.exe" 3men.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\gzkor = "C:\\Users\\Admin\\gzkor.exe /Z" gzkor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\gzkor = "C:\\Users\\Admin\\gzkor.exe /g" gzkor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\gzkor = "C:\\Users\\Admin\\gzkor.exe /O" gzkor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\gzkor = "C:\\Users\\Admin\\gzkor.exe /C" gzkor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\gzkor = "C:\\Users\\Admin\\gzkor.exe /N" gzkor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\gzkor = "C:\\Users\\Admin\\gzkor.exe /E" gzkor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\gzkor = "C:\\Users\\Admin\\gzkor.exe /H" gzkor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\gzkor = "C:\\Users\\Admin\\gzkor.exe /L" gzkor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\gzkor = "C:\\Users\\Admin\\gzkor.exe /V" j29oAE.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\gzkor = "C:\\Users\\Admin\\gzkor.exe /x" gzkor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\gzkor = "C:\\Users\\Admin\\gzkor.exe /r" gzkor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\gzkor = "C:\\Users\\Admin\\gzkor.exe /j" gzkor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\gzkor = "C:\\Users\\Admin\\gzkor.exe /B" gzkor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\gzkor = "C:\\Users\\Admin\\gzkor.exe /c" gzkor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\gzkor = "C:\\Users\\Admin\\gzkor.exe /Q" gzkor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\gzkor = "C:\\Users\\Admin\\gzkor.exe /y" gzkor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\gzkor = "C:\\Users\\Admin\\gzkor.exe /A" gzkor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\gzkor = "C:\\Users\\Admin\\gzkor.exe /K" gzkor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\gzkor = "C:\\Users\\Admin\\gzkor.exe /m" gzkor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\gzkor = "C:\\Users\\Admin\\gzkor.exe /t" gzkor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\gzkor = "C:\\Users\\Admin\\gzkor.exe /I" gzkor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\gzkor = "C:\\Users\\Admin\\gzkor.exe /S" gzkor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\gzkor = "C:\\Users\\Admin\\gzkor.exe /s" gzkor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\gzkor = "C:\\Users\\Admin\\gzkor.exe /u" gzkor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\gzkor = "C:\\Users\\Admin\\gzkor.exe /n" gzkor.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 2men.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 2men.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 2716 tasklist.exe 2004 tasklist.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 2572 set thread context of 2904 2572 2men.exe 36 PID 2572 set thread context of 2576 2572 2men.exe 37 PID 2572 set thread context of 2816 2572 2men.exe 38 PID 2572 set thread context of 1804 2572 2men.exe 39 PID 2572 set thread context of 2804 2572 2men.exe 40 -
resource yara_rule behavioral1/memory/2904-50-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral1/memory/2576-63-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/2576-62-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/2576-65-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/2576-60-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/2576-57-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/2576-55-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/2904-49-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral1/memory/2904-48-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral1/memory/2904-43-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral1/memory/2904-41-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral1/memory/2816-68-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral1/memory/1804-80-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral1/memory/1804-82-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral1/memory/2816-70-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral1/memory/2816-77-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral1/memory/2816-76-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral1/memory/2816-75-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral1/memory/1804-85-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral1/memory/1804-87-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral1/memory/1804-89-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral1/memory/1804-88-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral1/memory/2904-103-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral1/memory/2816-118-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral1/memory/1804-121-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral1/memory/2104-123-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2272-125-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2104-244-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2776-246-0x0000000000400000-0x000000000046A000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\LP\E916\DDE.exe 3men.exe File opened for modification C:\Program Files (x86)\LP\E916\DDE.exe 3men.exe File opened for modification C:\Program Files (x86)\LP\E916\43E3.tmp 3men.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2men.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3men.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3men.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fb0932b0ee1c241483f0de55c384dfee_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2men.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3men.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 43E3.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gzkor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language j29oAE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2men.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2488 j29oAE.exe 2488 j29oAE.exe 2576 2men.exe 2816 2men.exe 2260 gzkor.exe 2260 gzkor.exe 2576 2men.exe 2260 gzkor.exe 2816 2men.exe 2260 gzkor.exe 2260 gzkor.exe 2260 gzkor.exe 2576 2men.exe 2104 3men.exe 2104 3men.exe 2104 3men.exe 2104 3men.exe 2104 3men.exe 2104 3men.exe 2260 gzkor.exe 2576 2men.exe 2576 2men.exe 2260 gzkor.exe 2260 gzkor.exe 2260 gzkor.exe 2576 2men.exe 2576 2men.exe 2260 gzkor.exe 2576 2men.exe 2260 gzkor.exe 2260 gzkor.exe 2576 2men.exe 2260 gzkor.exe 2576 2men.exe 2260 gzkor.exe 2576 2men.exe 2576 2men.exe 2260 gzkor.exe 2576 2men.exe 2260 gzkor.exe 2576 2men.exe 2260 gzkor.exe 2576 2men.exe 2260 gzkor.exe 2576 2men.exe 2260 gzkor.exe 2576 2men.exe 2576 2men.exe 2260 gzkor.exe 2576 2men.exe 2260 gzkor.exe 2576 2men.exe 2576 2men.exe 2260 gzkor.exe 2260 gzkor.exe 2576 2men.exe 2260 gzkor.exe 2576 2men.exe 2576 2men.exe 2576 2men.exe 2576 2men.exe 2260 gzkor.exe 2576 2men.exe 2260 gzkor.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2056 explorer.exe -
Suspicious use of AdjustPrivilegeToken 21 IoCs
description pid Process Token: SeDebugPrivilege 2716 tasklist.exe Token: SeRestorePrivilege 3044 msiexec.exe Token: SeTakeOwnershipPrivilege 3044 msiexec.exe Token: SeSecurityPrivilege 3044 msiexec.exe Token: SeDebugPrivilege 2004 tasklist.exe Token: SeShutdownPrivilege 2056 explorer.exe Token: SeShutdownPrivilege 2056 explorer.exe Token: SeShutdownPrivilege 2056 explorer.exe Token: SeShutdownPrivilege 2056 explorer.exe Token: SeShutdownPrivilege 2056 explorer.exe Token: SeShutdownPrivilege 2056 explorer.exe Token: SeShutdownPrivilege 2056 explorer.exe Token: SeShutdownPrivilege 2056 explorer.exe Token: SeShutdownPrivilege 2056 explorer.exe Token: SeShutdownPrivilege 2056 explorer.exe Token: 33 2136 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2136 AUDIODG.EXE Token: 33 2136 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2136 AUDIODG.EXE Token: SeShutdownPrivilege 2056 explorer.exe Token: SeShutdownPrivilege 2056 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 2056 explorer.exe 2056 explorer.exe 2056 explorer.exe 2056 explorer.exe 2056 explorer.exe 2056 explorer.exe 2056 explorer.exe 2056 explorer.exe 2056 explorer.exe 2056 explorer.exe 2056 explorer.exe 2056 explorer.exe 2056 explorer.exe 2056 explorer.exe 2056 explorer.exe 2056 explorer.exe 2056 explorer.exe 2056 explorer.exe 2056 explorer.exe 2056 explorer.exe 2056 explorer.exe 2056 explorer.exe 2056 explorer.exe 2056 explorer.exe 2056 explorer.exe 2056 explorer.exe 2056 explorer.exe 2056 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 2056 explorer.exe 2056 explorer.exe 2056 explorer.exe 2056 explorer.exe 2056 explorer.exe 2056 explorer.exe 2056 explorer.exe 2056 explorer.exe 2056 explorer.exe 2056 explorer.exe 2056 explorer.exe 2056 explorer.exe 2056 explorer.exe 2056 explorer.exe 2056 explorer.exe 2056 explorer.exe 2056 explorer.exe 2056 explorer.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2320 fb0932b0ee1c241483f0de55c384dfee_JaffaCakes118.exe 2488 j29oAE.exe 2260 gzkor.exe 2572 2men.exe 2904 2men.exe 1804 2men.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2320 wrote to memory of 2488 2320 fb0932b0ee1c241483f0de55c384dfee_JaffaCakes118.exe 29 PID 2320 wrote to memory of 2488 2320 fb0932b0ee1c241483f0de55c384dfee_JaffaCakes118.exe 29 PID 2320 wrote to memory of 2488 2320 fb0932b0ee1c241483f0de55c384dfee_JaffaCakes118.exe 29 PID 2320 wrote to memory of 2488 2320 fb0932b0ee1c241483f0de55c384dfee_JaffaCakes118.exe 29 PID 2488 wrote to memory of 2260 2488 j29oAE.exe 30 PID 2488 wrote to memory of 2260 2488 j29oAE.exe 30 PID 2488 wrote to memory of 2260 2488 j29oAE.exe 30 PID 2488 wrote to memory of 2260 2488 j29oAE.exe 30 PID 2488 wrote to memory of 2776 2488 j29oAE.exe 31 PID 2488 wrote to memory of 2776 2488 j29oAE.exe 31 PID 2488 wrote to memory of 2776 2488 j29oAE.exe 31 PID 2488 wrote to memory of 2776 2488 j29oAE.exe 31 PID 2776 wrote to memory of 2716 2776 cmd.exe 33 PID 2776 wrote to memory of 2716 2776 cmd.exe 33 PID 2776 wrote to memory of 2716 2776 cmd.exe 33 PID 2776 wrote to memory of 2716 2776 cmd.exe 33 PID 2320 wrote to memory of 2572 2320 fb0932b0ee1c241483f0de55c384dfee_JaffaCakes118.exe 34 PID 2320 wrote to memory of 2572 2320 fb0932b0ee1c241483f0de55c384dfee_JaffaCakes118.exe 34 PID 2320 wrote to memory of 2572 2320 fb0932b0ee1c241483f0de55c384dfee_JaffaCakes118.exe 34 PID 2320 wrote to memory of 2572 2320 fb0932b0ee1c241483f0de55c384dfee_JaffaCakes118.exe 34 PID 2572 wrote to memory of 2904 2572 2men.exe 36 PID 2572 wrote to memory of 2904 2572 2men.exe 36 PID 2572 wrote to memory of 2904 2572 2men.exe 36 PID 2572 wrote to memory of 2904 2572 2men.exe 36 PID 2572 wrote to memory of 2904 2572 2men.exe 36 PID 2572 wrote to memory of 2904 2572 2men.exe 36 PID 2572 wrote to memory of 2904 2572 2men.exe 36 PID 2572 wrote to memory of 2904 2572 2men.exe 36 PID 2572 wrote to memory of 2576 2572 2men.exe 37 PID 2572 wrote to memory of 2576 2572 2men.exe 37 PID 2572 wrote to memory of 2576 2572 2men.exe 37 PID 2572 wrote to memory of 2576 2572 2men.exe 37 PID 2572 wrote to memory of 2576 2572 2men.exe 37 PID 2572 wrote to memory of 2576 2572 2men.exe 37 PID 2572 wrote to memory of 2576 2572 2men.exe 37 PID 2572 wrote to memory of 2576 2572 2men.exe 37 PID 2572 wrote to memory of 2816 2572 2men.exe 38 PID 2572 wrote to memory of 2816 2572 2men.exe 38 PID 2572 wrote to memory of 2816 2572 2men.exe 38 PID 2572 wrote to memory of 2816 2572 2men.exe 38 PID 2572 wrote to memory of 2816 2572 2men.exe 38 PID 2572 wrote to memory of 2816 2572 2men.exe 38 PID 2572 wrote to memory of 2816 2572 2men.exe 38 PID 2572 wrote to memory of 2816 2572 2men.exe 38 PID 2572 wrote to memory of 1804 2572 2men.exe 39 PID 2572 wrote to memory of 1804 2572 2men.exe 39 PID 2572 wrote to memory of 1804 2572 2men.exe 39 PID 2572 wrote to memory of 1804 2572 2men.exe 39 PID 2572 wrote to memory of 1804 2572 2men.exe 39 PID 2572 wrote to memory of 1804 2572 2men.exe 39 PID 2572 wrote to memory of 1804 2572 2men.exe 39 PID 2572 wrote to memory of 1804 2572 2men.exe 39 PID 2572 wrote to memory of 2804 2572 2men.exe 40 PID 2572 wrote to memory of 2804 2572 2men.exe 40 PID 2572 wrote to memory of 2804 2572 2men.exe 40 PID 2572 wrote to memory of 2804 2572 2men.exe 40 PID 2572 wrote to memory of 2804 2572 2men.exe 40 PID 2320 wrote to memory of 2104 2320 fb0932b0ee1c241483f0de55c384dfee_JaffaCakes118.exe 41 PID 2320 wrote to memory of 2104 2320 fb0932b0ee1c241483f0de55c384dfee_JaffaCakes118.exe 41 PID 2320 wrote to memory of 2104 2320 fb0932b0ee1c241483f0de55c384dfee_JaffaCakes118.exe 41 PID 2320 wrote to memory of 2104 2320 fb0932b0ee1c241483f0de55c384dfee_JaffaCakes118.exe 41 PID 2320 wrote to memory of 2208 2320 fb0932b0ee1c241483f0de55c384dfee_JaffaCakes118.exe 44 PID 2320 wrote to memory of 2208 2320 fb0932b0ee1c241483f0de55c384dfee_JaffaCakes118.exe 44 PID 2320 wrote to memory of 2208 2320 fb0932b0ee1c241483f0de55c384dfee_JaffaCakes118.exe 44 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" 3men.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 3men.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb0932b0ee1c241483f0de55c384dfee_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fb0932b0ee1c241483f0de55c384dfee_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Users\Admin\j29oAE.exeC:\Users\Admin\j29oAE.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Users\Admin\gzkor.exe"C:\Users\Admin\gzkor.exe"3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2260
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del j29oAE.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2716
-
-
-
-
C:\Users\Admin\2men.exeC:\Users\Admin\2men.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Users\Admin\2men.exe"C:\Users\Admin\2men.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2904
-
-
C:\Users\Admin\2men.exe"C:\Users\Admin\2men.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2576
-
-
C:\Users\Admin\2men.exe"C:\Users\Admin\2men.exe"3⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
PID:2816
-
-
C:\Users\Admin\2men.exe"C:\Users\Admin\2men.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1804
-
-
C:\Users\Admin\2men.exe"C:\Users\Admin\2men.exe"3⤵
- Executes dropped EXE
PID:2804
-
-
-
C:\Users\Admin\3men.exeC:\Users\Admin\3men.exe2⤵
- Modifies security service
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- System policy modification
PID:2104 -
C:\Users\Admin\3men.exeC:\Users\Admin\3men.exe startC:\Users\Admin\AppData\Roaming\60630\128E9.exe%C:\Users\Admin\AppData\Roaming\606303⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2272
-
-
C:\Users\Admin\3men.exeC:\Users\Admin\3men.exe startC:\Program Files (x86)\30EB1\lvvm.exe%C:\Program Files (x86)\30EB13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2776
-
-
C:\Program Files (x86)\LP\E916\43E3.tmp"C:\Program Files (x86)\LP\E916\43E3.tmp"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2032
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del fb0932b0ee1c241483f0de55c384dfee_JaffaCakes118.exe2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2208 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2004
-
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3044
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2056
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4a01⤵
- Suspicious use of AdjustPrivilegeToken
PID:2136
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
5Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
600B
MD5ee8eebb59e4d821821a94b727a05db09
SHA19560109b24743bfe448d75239bcbbeb6a4093bd5
SHA25618dcabdcb4f08ee8507184bf5e4ddccfde7c4f412665330c28d9a33ed71f9607
SHA5124441d2c78c62a2f0ea4cbf9406583bbf12c0540c055316d5d8395caa3584fd2ff224c7c8ca6bfc6bd41477334fc3d6c4841d18ddf0a984a9d52776664ebabe4b
-
Filesize
996B
MD59ec0c14b810298ee63893e5b30273887
SHA1f701e10e4b54a51b62505595ceeceff6d382e158
SHA25641756578ac40c17253fc6abd9d54f2a2fd7f1dc988f424eb5eded4dfa2072ae0
SHA512397627f3b06037ba208ba4817ffb5b7f01fa3aac314838ac1b3af0a512289fff74f74a3c3ba5f20a718b4087ee1652300394f05b18a5d52c450a5b6ada0c3795
-
Filesize
1KB
MD5fea02d0036816b2cc663a1b91827c604
SHA1025b49dc66f4dc7e99bb937603c337e78ff7c223
SHA256acb2a813ce42d87eebea758a5740c6410c4a5444a42ca64f0f91d3c98fa7e9ef
SHA51255e8436dca536f4ae310e536d216fb2687c1aab9f945aae94d8b420dc34849c19788afbcb53215e509271185749cb6a84356fa8d55b6943ea284ae9286760175
-
Filesize
96KB
MD56b9ed8570a1857126c8bf99e0663926c
SHA194e08d8a0be09be35f37a9b17ec2130febfa2074
SHA256888e4e571a6f78ee81d94ab56bd033d413f9160f1089073176b03c91878aae2d
SHA51223211a1b71f1d05ad7f003231da826220ac4940e48071135cc3fba14708123fa0292e2e71c294a8086d8dc5f90dd32c4da3b41e6857c56f38cb325d78cb14880
-
Filesize
132KB
MD5945a713b037b50442ec5d18d3dc0d55e
SHA12c8881b327a79fafcce27479b78f05487d93c802
SHA2562da470571a64bcdeb56f62c916ee2bffa87ccc6c028b7c8cb0132d09bceedd2f
SHA5120eab4bb5d04725cc20e463ae6959f71064674602f8ee7b3c9b2db75e928b9a0b1bdc94233dc261f6277d02e54a443b42a59b12aaebb8bbf243f0940344fbf385
-
Filesize
271KB
MD50d668203e24463de2bf228f00443b7bc
SHA1eacff981d71f6648f6315e508bfd75e11683dba8
SHA256509d530e99839d7dbc8fccac163420d9dc455fb478fa57fdec1b7a2ef629d7bc
SHA5123251bb1341bd466e71468d72723bd5cf545dbd232327f343b44c51daae8755ed3caa02f74adbb0304912769346fa90dfa4c7036c211836e5650bdb06993ba803
-
Filesize
176KB
MD5a9136720b21a2aab1a09bd3dafc4755c
SHA12ce3da57b014374f64d4ecfcd1f29bd4309043a8
SHA2560609841cdb36cfea9cdf8d1bf629de99657cd2cca2862b475bb31b8a0810e20d
SHA51216ddeb666e431a8ca2b9e77c8a4a3bb816559d8a04b4947643104ff950dc7ee4531a7b31432202a6d4cfa27314c86d511aad7f49401c9bbe8fa25dfefeb45645
-
Filesize
176KB
MD5c4a634088e095eab98183984bb7252d8
SHA1c205f2c1f8040c9205c6c06accd75c0396c59781
SHA256db345985313397a39cc2817134315c8db71ab4c48680e62c0358db406b0eff6a
SHA512b6a30f6d5cc30bee9b9d483629f16c80c5338360cec629f9ee2a3307b73b9743fd71396e408ac72008b84f4b8fded26002c910421853253b52b8b4d530df7a8e