Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/09/2024, 23:43
Behavioral task
behavioral1
Sample
fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe
-
Size
301KB
-
MD5
fd60ad05941f2bee3dfd05c976bc2eff
-
SHA1
eae3af05983d5e47ebb3f228f98517f9a3806376
-
SHA256
2753c8b0d7cc891d9f9665e82cefcdc085064810ec8c0cb1988c36bbc0938bc7
-
SHA512
b16dbd2bb8c169bb5e772469f2bd98947e74dd7c30a1899b3416da6b2c967c6644baf97f138192b725e343233ec10c4b2516c889b7f0e302f0161392052c522b
-
SSDEEP
6144:tmcD66R7M5JGmrpQsK3RD2u270jupCJsCxC:4cD66DZ2zkPaCx
Malware Config
Extracted
cybergate
2.6
vítima
mise1.zapto.org:5210
***MUTEX***
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
server.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
texto da mensagem
-
message_box_title
título da mensagem
-
password
abcd1234
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\install\\server.exe" fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\install\\server.exe" fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5VA86RD0-3W22-6R73-7QS8-ODE408423R68} fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5VA86RD0-3W22-6R73-7QS8-ODE408423R68}\StubPath = "C:\\Windows\\system32\\install\\server.exe Restart" fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 3280 server.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\install\\server.exe" fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\install\\server.exe" fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\install\ fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe File created C:\Windows\SysWOW64\install\server.exe fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\install\server.exe fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\install\server.exe fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/1160-64-0x0000000024010000-0x0000000024072000-memory.dmp upx behavioral2/memory/1160-63-0x0000000024010000-0x0000000024072000-memory.dmp upx behavioral2/memory/4376-59-0x0000000024010000-0x0000000024072000-memory.dmp upx behavioral2/memory/1160-68-0x0000000024010000-0x0000000024072000-memory.dmp upx behavioral2/memory/1160-67-0x0000000024010000-0x0000000024072000-memory.dmp upx behavioral2/memory/1160-442-0x0000000024010000-0x0000000024072000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 444 3280 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4376 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 4376 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 1160 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 1160 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 1160 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 1160 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 1160 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 1160 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 1160 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 1160 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 1160 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 1160 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 1160 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 1160 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 444 WerFault.exe 444 WerFault.exe 1160 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 1160 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 1160 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 1160 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 1160 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 1160 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 1160 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 1160 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 1160 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 1160 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 1160 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 1160 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 1160 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 1160 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 1160 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 1160 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 1160 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 1160 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 1160 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 1160 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 1160 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 1160 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 1160 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 1160 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 1160 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 1160 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 1160 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 1160 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 1160 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 1160 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 1160 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 1160 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 1160 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 1160 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 1160 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 1160 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 1160 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 1160 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 1160 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 1160 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 1160 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 1160 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 1160 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 1160 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 1160 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 1160 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 1160 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 1160 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1160 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1160 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe Token: SeDebugPrivilege 1160 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4376 wrote to memory of 1160 4376 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 82 PID 4376 wrote to memory of 1160 4376 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 82 PID 4376 wrote to memory of 1160 4376 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 82 PID 4376 wrote to memory of 1160 4376 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 82 PID 4376 wrote to memory of 1160 4376 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 82 PID 4376 wrote to memory of 1160 4376 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 82 PID 4376 wrote to memory of 1160 4376 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 82 PID 4376 wrote to memory of 1160 4376 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 82 PID 4376 wrote to memory of 1160 4376 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 82 PID 4376 wrote to memory of 1160 4376 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 82 PID 4376 wrote to memory of 1160 4376 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 82 PID 4376 wrote to memory of 1160 4376 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 82 PID 4376 wrote to memory of 1160 4376 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 82 PID 4376 wrote to memory of 1160 4376 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 82 PID 4376 wrote to memory of 1160 4376 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 82 PID 4376 wrote to memory of 1160 4376 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 82 PID 4376 wrote to memory of 1160 4376 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 82 PID 4376 wrote to memory of 1160 4376 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 82 PID 4376 wrote to memory of 1160 4376 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 82 PID 4376 wrote to memory of 1160 4376 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 82 PID 4376 wrote to memory of 1160 4376 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 82 PID 4376 wrote to memory of 1160 4376 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 82 PID 4376 wrote to memory of 1160 4376 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 82 PID 4376 wrote to memory of 1160 4376 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 82 PID 4376 wrote to memory of 1160 4376 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 82 PID 4376 wrote to memory of 1160 4376 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 82 PID 4376 wrote to memory of 1160 4376 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 82 PID 4376 wrote to memory of 1160 4376 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 82 PID 4376 wrote to memory of 1160 4376 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 82 PID 4376 wrote to memory of 1160 4376 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 82 PID 4376 wrote to memory of 1160 4376 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 82 PID 4376 wrote to memory of 1160 4376 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 82 PID 4376 wrote to memory of 1160 4376 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 82 PID 4376 wrote to memory of 1160 4376 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 82 PID 4376 wrote to memory of 1160 4376 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 82 PID 4376 wrote to memory of 1160 4376 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 82 PID 4376 wrote to memory of 1160 4376 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 82 PID 4376 wrote to memory of 1160 4376 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 82 PID 4376 wrote to memory of 1160 4376 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 82 PID 4376 wrote to memory of 1160 4376 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 82 PID 4376 wrote to memory of 1160 4376 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 82 PID 4376 wrote to memory of 1160 4376 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 82 PID 4376 wrote to memory of 1160 4376 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 82 PID 4376 wrote to memory of 1160 4376 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 82 PID 4376 wrote to memory of 1160 4376 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 82 PID 4376 wrote to memory of 1160 4376 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 82 PID 4376 wrote to memory of 1160 4376 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 82 PID 4376 wrote to memory of 1160 4376 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 82 PID 4376 wrote to memory of 1160 4376 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 82 PID 4376 wrote to memory of 1160 4376 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 82 PID 4376 wrote to memory of 1160 4376 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 82 PID 4376 wrote to memory of 1160 4376 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 82 PID 4376 wrote to memory of 1160 4376 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 82 PID 4376 wrote to memory of 1160 4376 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 82 PID 4376 wrote to memory of 1160 4376 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 82 PID 4376 wrote to memory of 1160 4376 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 82 PID 4376 wrote to memory of 1160 4376 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 82 PID 4376 wrote to memory of 1160 4376 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 82 PID 4376 wrote to memory of 1160 4376 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 82 PID 4376 wrote to memory of 1160 4376 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 82 PID 4376 wrote to memory of 1160 4376 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 82 PID 4376 wrote to memory of 1160 4376 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 82 PID 4376 wrote to memory of 1160 4376 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 82 PID 4376 wrote to memory of 1160 4376 fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe 82
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:608
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"2⤵PID:780
-
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:60
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:668
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:772
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵PID:788
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding2⤵PID:3124
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:3800
-
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca2⤵PID:3896
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:3960
-
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca2⤵PID:4048
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:3488
-
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding2⤵PID:1700
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:2112
-
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca2⤵PID:2128
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:1960
-
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding2⤵PID:1352
-
-
C:\Windows\System32\mousocoreworker.exeC:\Windows\System32\mousocoreworker.exe -Embedding2⤵PID:1200
-
-
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exeC:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding2⤵PID:2412
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS -p1⤵PID:908
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:952
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:388
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p1⤵PID:1028
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:1036
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1104
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1120
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1152
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵PID:2792
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:1188
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1240
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1332
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1340
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1368
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:2536
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1496
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1528
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1544
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1652
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1672
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1716
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1760
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1796
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:1904
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1912
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:1940
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:1972
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:2088
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2096
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p1⤵PID:2212
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2236
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2260
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2560
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2580
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2596
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵PID:2752
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2804
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2812
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2820
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2832
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵PID:3016
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3424
-
C:\Users\Admin\AppData\Local\Temp\fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe"2⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Users\Admin\AppData\Local\Temp\fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fd60ad05941f2bee3dfd05c976bc2eff_JaffaCakes118.exe"3⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1160 -
C:\Windows\SysWOW64\install\server.exe"C:\Windows\system32\install\server.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3280 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3280 -s 5645⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:444
-
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:3460
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3616
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:4964
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:820
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵PID:1364
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:1612
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:2880
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:4360
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc1⤵PID:4680
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k WerSvcGroup1⤵PID:3064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3280 -ip 32802⤵PID:3028
-
-
C:\Windows\System32\WaaSMedicAgent.exeC:\Windows\System32\WaaSMedicAgent.exe 1bd8b8ef5936d4f6b792f2e6499a42bc FGbrKXePYEiF9he6JnZ5DA.0.1.0.0.01⤵PID:2960
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:1572
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵PID:2012
-
C:\Windows\servicing\TrustedInstaller.exeC:\Windows\servicing\TrustedInstaller.exe1⤵PID:664
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc1⤵PID:4028
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD540bf045a90c5af86f363d052477f951e
SHA1ff32c907dca090c8e3cba347708964cf213bc4a9
SHA256bf3afb0a67cadfa0f7cd76d91da74b80bfee530c5a5ac266c41a7ccde4a77104
SHA5122518a062a9141a6cd9e7216217f89f496cecb81688939664dda7067dfb52ee92fa8e0bc6f956f32c2542a10cbb2a2a374999d4ac551cffe8e7f3a43cb2291c58
-
Filesize
8B
MD531ace7304e92727f086efd2f03088a9a
SHA12d6784450f5ca253ee2ce0cd6ba26397ac7418b1
SHA2564b7e50237b2438d642126ec63ceb48afa8fa57d8a2c3125eeb9a218a13228f42
SHA512bc829f25ccffe46741f30c25d6d2707f12d8c388268c724ba34057847782c78faf9a60a451e3f1f5472a5b1420dba14932a98dafe7f6d719e0bb4e6f50fe5c3e
-
Filesize
8B
MD5fafb96b4d3bf3fd9f6c8f79594e8faca
SHA11ca8567108e24478a934b6258fea405a0b9a1e6f
SHA2563ca8a1175ff3f1e8741605e8b6bb524305d5d3d0325fb3f3a3f3f95fecb3968f
SHA5128c535ab17a4ea1e4c3479f2701d2080304d1c8ec5fd3d340bc9c6c7b9c8b123ac65ad076098afe85f708828a88bea0f06f1d56dd6c1cf7e8afb57f80f9670f97
-
Filesize
8B
MD5685fda2dd4f5998fffbe30c38631eeee
SHA118b408d836fff1f41276232b2d7b360f02ec7a10
SHA256561fd162ba2cd94737f3bd51d32155a9614f310ca20ee067d5f566c8de4c4b8f
SHA512f3067211a77a5085e3c62687f57f23dc15f440674e3a91df6e72ec2f3c0fffd7ef4a503443983517fee81694d92f2108d1ba971d88485793b1b036749ac67e6a
-
Filesize
8B
MD5f5e0a40ddd42bdf731acbe7fb8ac8299
SHA1c0d902ad84916acba7f5cb4b92940eb9dc19b3cd
SHA2565a71891effd53b2ddb270218fe6ff941e0ced66fcf3bcfa6d59fa3a33ec3f733
SHA512a67875dda735e19ed6bfb47ec9eeea2ce713090e181df4e2171da8c17b7d2e30db8cc5ecffe375508121ff00494e351bca27f7282b6c89d52d3db77eceba5f92
-
Filesize
8B
MD592aa1338f1cd2b1ed58e46583e958433
SHA1f597ce89bd6bed82ec593cdc5943eee0edf9d9a4
SHA256f54cdb32bccfdffed795e8c0b87169465450b843afcdb6f21a7aa45fa5fa3873
SHA51285fd9145a8b59c3bf3d9ebc1c33381d499421419fa707c9eebc103cbab58e41db876f0c7db3cfb0f77d5d516c685fa76d5b0554aeb1cdd5218bfd1c7333fd0d1
-
Filesize
8B
MD55639c638ccea4eb6e47a8d0acb0ca608
SHA114d5bc6fa27548e2f106aa32dfe4871aa9cb6356
SHA256cf068768a91b3a593f87f937c88887514f4568d783b4fb59d32c87fbe7f80747
SHA512200fce5ae8f19f68d345ae3d4c9719f4eb6c503810bbea77836bf6fba7dd67bf4dc5af8f0a5b09b4cd8389c32c9d2d1a62a49ecdfc9c2f1d4e9f1f0695a7890e
-
Filesize
8B
MD5082d15fc030dd259da044522353b8ca6
SHA19c7f23879c264daa0f10198531b4c87c48d533a6
SHA2562bc75fbe7b1850eedb5140b50b0c1cd1bb3a9af8227bf3863f95f3d9d966e468
SHA512150febdd75f4157457b9086eea95d5879bd239935f8119fb7b7a36628b71f6afacdd40775319b3a3cf1fc4d3381dd3a706cff12a16291267ee33eaefb29515af
-
Filesize
8B
MD5ce4a333868283d2827fb4377ba5cc146
SHA1d69fcd8da19615106cec2149236589f371bf3df4
SHA25676aa9f1b704dad9bbf659354b885728f751b7bad70f9ef572055143b37dd4457
SHA51229403624addc0932a1c104d7048603ae837734545c1e22b41368b544f5c63d0728fe3fde1e688fb17df0ec38a83119241687adc448917da0e2b502753fe1a2a3
-
Filesize
8B
MD5b7e64d5879d95e422d78bd7d75ca61d5
SHA1665e23f23f4d3d0c8f3689bff3f293e6f5fa2b3f
SHA2567f81a59422fcb8db97e80411bf43852333c1debdd4ad0ba9153e045cb2e38965
SHA512a9c890a260ff9af8a29de2d9c281123239cc5a11bad5e4180c508b3799bfd0d5bc84d450acd2104a3e8124c4a2833f8fffaa9d4e912a79862275bceddd382adf
-
Filesize
8B
MD5c51667adc57f694167892f825b97c364
SHA1c3a306ef6cda9c32addb802a5e1fccfe097ddcd6
SHA256570636ee2c047648178c9c825d37851b00f8aa570e8c2c8d6584cede8cd192e7
SHA5125d7c26f1fed5b39e75099ac54fc7f5cc615f9fc17563b15a57c77ced1bc6c323b9554ed0d1ef04c8ec35e9a917fb4288dbe4a2af21b3b9b0fae8a1b6b86b6db7
-
Filesize
8B
MD512196073dbb4e31ba50208fc4eb638f0
SHA107d931e256e8affbda32e4980e5711491409b24b
SHA25618cf2241eef5ab17e6addf817343a693d36240e31ce97d9136aab71ffdf83763
SHA5126b78d282bb5a3792bc270a54e3efde7e9f42853feaf86e81b1225138818d4edb8d45daf52fce1d893084a3d14004beb12a42fc5b6ae6287da20b225bdcf31c3c
-
Filesize
8B
MD52cf8cabbc56f05a3f4a9f6d60666806a
SHA1defd98697e86d57cdb333f7431f929bf962f7898
SHA2560c04c2a1ff448da2cd298cc9656a2d552ab60f887e41ab7cc6f2d93ba0352ba1
SHA5122546c3e5e238a6d1924b2956d4613ac9d0cd7d60e8959ffd613ba1c8e82f9bf6aa8aad651796c4970b0ef4556580a3fd5f9cdee1c1e7ff6d86225689468cd384
-
Filesize
8B
MD51238d20c25f4f8574676952ce9e9737b
SHA1d3865e08060a839f10fa7b802ec45743cc24363e
SHA2560ecffae58298eaaab7dca8fd7b43ddad415103e74c6322bc50c8a7f36e0362b0
SHA512db34af7734016ffa076d9a678d76f108cb33deba09e9c7987e9467ad7d3b8d217f4a7a82ebcf802934e1cba2e601c32ba9c921b83fcbb0cab4e57d03a8cc931f
-
Filesize
8B
MD5432d90c56b5e9914d48d7312790eb012
SHA14c05b88f34ec5c820fd790ec5c7dbeaed0d8458c
SHA2567c02bb88c5ef8cb6387a5d40ada7e2a8d9aff80154a23d33b1f67f83f827aa02
SHA512b9b91e318092ddddb9f6efdac1bb584e7b78cb7473bd42dc3576bd48aae61f3c29f84f654894a81fa347e0bd03ee27dd3a7ed2b1e962e97db8fd02a64ed8756f
-
Filesize
8B
MD548a93c37f7be55bbce2800beb3da80d8
SHA1d7913bf452c20e8ce90efe0242aab02dde1c74bc
SHA2567e0f0dc62371c3072c08db890f0ee65b7a9f90a87e6079f96a960cb6d4eb30df
SHA512ffee7641cb974c6212d5befaa8e4963da45a43cba616a32c6e7c4d51d84c4bec3b07187abe3b490e819abfd391f702dda9aaaffc7b28fc93a53ba0144929db9c
-
Filesize
8B
MD57dbe8d7419380afd17917188b52d429c
SHA17d9d2844d9a39c0745bc8132ea3bf461262af23e
SHA2566aa119f64bf66da234474da553d60bbfef29b81f07bd703c0979e20707a828fd
SHA5127bcff8273a244f2dbe11c7615b63d1cb9f33089dc4527f15ff3a85ec47385ef7706101d2087a3b4efbb5bba941430e1dddaca042c1f36337ed1c2c3e754aaddd
-
Filesize
8B
MD582c4b965ee14eccc776853ab3d12decf
SHA1a5d9e0926113ad93e8a9866765ad7482b456fcd6
SHA2563dcc13598ee3711bec3a7bf0bb8f5c0ec91c3c1ec127fdcc14bd8b4483de48bb
SHA512ea8ceea11f82ea88f8e3d5228374c20bf1d5873af74879574081ced4eb7ebeb94048cb6a7fac77585fa881959a764fbf811b2cc5146fa78b1ae72074980de46b
-
Filesize
8B
MD5ca8f1d5e3e95945d4334538e5f427d09
SHA163cd367e6b36457ddf0546480e24e885c4868b5d
SHA256cc48e2c1a07204fb7382d33ae21be44d3698e2b298088a573992e35cd71610b3
SHA5123c35f7cd48d67477684270151c7b3eb6e94e9c69d5c87364116fa6b5ab3b76cb33edcb546aac7c355deb81ba098f633faa499ccdfd74a8c23cf00e25961c67e3
-
Filesize
8B
MD5829590ed21caffb35ac7670cd1f5a346
SHA1e1b2418edb0fbf8dce0b857c877fe7e6f905159f
SHA256ae9ba2b463acbc1d912eba37dc94540780421a91ccf35ff418564b72fb0b5c8e
SHA512a1e3b36804f64ddc6a11cd8c952ff8db0a06a459a2d282ee3b6f9d64cf7f2ddd11df63fd19a72ecdb92297553a38e7fc8315b9f8cdf276cf0ae7b3ddba316f9d
-
Filesize
15B
MD5e21bd9604efe8ee9b59dc7605b927a2a
SHA13240ecc5ee459214344a1baac5c2a74046491104
SHA25651a3fe220229aa3fdddc909e20a4b107e7497320a00792a280a03389f2eacb46
SHA51242052ad5744ad76494bfa71d78578e545a3b39bfed4c4232592987bd28064b6366a423084f1193d137493c9b13d9ae1faac4cf9cc75eb715542fa56e13ca1493
-
Filesize
301KB
MD5fd60ad05941f2bee3dfd05c976bc2eff
SHA1eae3af05983d5e47ebb3f228f98517f9a3806376
SHA2562753c8b0d7cc891d9f9665e82cefcdc085064810ec8c0cb1988c36bbc0938bc7
SHA512b16dbd2bb8c169bb5e772469f2bd98947e74dd7c30a1899b3416da6b2c967c6644baf97f138192b725e343233ec10c4b2516c889b7f0e302f0161392052c522b