Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 15:00
Static task
static1
Behavioral task
behavioral1
Sample
fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe
-
Size
26KB
-
MD5
fec5b0c4e672551aa885bca7271087dd
-
SHA1
f9c51f495adf12825f7e3dbf5be1e2ad335fe03d
-
SHA256
eb9dc72bfe286fc6577de6f8c16af8265aa504b2268e58fe4affa085de59455d
-
SHA512
e8adb0b722e7d1bb696477130e0409fd56975b819ac5abc5e172db4d3e03b026cfc6c3e93fa9ec22e09560d8c204dedfd58be5e04aec387f18e1787ee0c73335
-
SSDEEP
768:olRtxfnkWt+bIRQPKeVjQ5lcZ6fdUHDfXUY:uQWwbsQP9Qk4dELXJ
Malware Config
Signatures
-
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavTask.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Frameworkservice.EXE fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\VPTRAY.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RsAgent.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AvMonitor.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Nod32kui.EXE fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Frameworkservice.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RAV.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rfwmain.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TrojanDetector.EXE fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360rpt.EXE fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TrojDie.KXP fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360safebox.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVP.COM\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RAVTRAY.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AutoRun.EXE fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kav32.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVP.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kmailmon.EXE fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rsaupd.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVSrvXP.EXE fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavMon.EXE fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rfwstub.EXE fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rfwProxy.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360safebox.EXE fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Iparmor.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RAV.EXE fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kwatch.EXE fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\GuardField.EXE fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Ravservice.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KASARP.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rfwstub.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Ravservice.EXE fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rsnetsvr.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\GuardField.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ArSwp.EXE fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVP.COM fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kavstart.EXE fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RsMain.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rfwProxy.EXE fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KPfwSvc.EXE fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KPfwSvc.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kissvc.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Ast.EXE fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rsnetsvr.EXE fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVWSC.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nod32krn.EXE fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVPFW.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QQDoctor.EXE fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Trojanwall.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HijackThis.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavTask.EXE fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rsaupd.EXE fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AutoRunKiller.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rfwsrv.EXE fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HijackThis.EXE fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Navapsvc.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\IceSword.EXE fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.EXE fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVWSC.EXE fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Mmsk.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SREngLdr.EXE fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Trojanwall.EXE fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavMon.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\skbvrv\ImagePath = "\\??\\C:\\Windows\\Fonts\\skbvrv.fon" rundll32.exe -
Executes dropped EXE 1 IoCs
pid Process 1364 AVav.pif -
Loads dropped DLL 3 IoCs
pid Process 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\k: fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe File opened (read-only) \??\q: fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe File opened (read-only) \??\u: fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe File opened (read-only) \??\g: fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe File opened (read-only) \??\t: fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe File opened (read-only) \??\v: fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe File opened (read-only) \??\y: fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe File opened (read-only) \??\e: fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe File opened (read-only) \??\l: fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe File opened (read-only) \??\n: fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe File opened (read-only) \??\o: fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe File opened (read-only) \??\r: fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe File opened (read-only) \??\w: fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe File opened (read-only) \??\x: fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe File opened (read-only) \??\z: fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe File opened (read-only) \??\i: fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe File opened (read-only) \??\j: fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe File opened (read-only) \??\m: fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe File opened (read-only) \??\p: fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe File opened (read-only) \??\s: fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe File opened (read-only) \??\h: fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe -
Drops autorun.inf file 1 TTPs 4 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created \??\f:\AUTORUN.INF fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe File opened for modification \??\f:\AUTORUN.INF fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe File created \??\c:\AUTORUN.INF fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe File opened for modification \??\c:\AUTORUN.INF fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\dllcache\linkinfo.dll fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files\AVav.pif fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe File created C:\Program Files\AVav.pif fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Fonts\skbvrv.fon rundll32.exe File created C:\Windows\fonts\alsk.sys fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe File created C:\Windows\fonts\naks.sys fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2904 sc.exe 2884 sc.exe 3048 sc.exe 1716 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AVav.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 1364 AVav.pif 2768 rundll32.exe 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe -
Suspicious behavior: LoadsDriver 3 IoCs
pid Process 2768 rundll32.exe 476 Process not Found 476 Process not Found -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Token: SeDebugPrivilege 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 51 IoCs
description pid Process procid_target PID 1940 wrote to memory of 1364 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 31 PID 1940 wrote to memory of 1364 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 31 PID 1940 wrote to memory of 1364 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 31 PID 1940 wrote to memory of 1364 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 31 PID 1364 wrote to memory of 2768 1364 AVav.pif 32 PID 1364 wrote to memory of 2768 1364 AVav.pif 32 PID 1364 wrote to memory of 2768 1364 AVav.pif 32 PID 1364 wrote to memory of 2768 1364 AVav.pif 32 PID 1364 wrote to memory of 2768 1364 AVav.pif 32 PID 1364 wrote to memory of 2768 1364 AVav.pif 32 PID 1364 wrote to memory of 2768 1364 AVav.pif 32 PID 1940 wrote to memory of 276 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 33 PID 1940 wrote to memory of 276 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 33 PID 1940 wrote to memory of 276 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 33 PID 1940 wrote to memory of 276 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 33 PID 1940 wrote to memory of 1776 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 35 PID 1940 wrote to memory of 1776 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 35 PID 1940 wrote to memory of 1776 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 35 PID 1940 wrote to memory of 1776 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 35 PID 1940 wrote to memory of 1612 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 36 PID 1940 wrote to memory of 1612 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 36 PID 1940 wrote to memory of 1612 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 36 PID 1940 wrote to memory of 1612 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 36 PID 276 wrote to memory of 2868 276 cmd.exe 39 PID 276 wrote to memory of 2868 276 cmd.exe 39 PID 276 wrote to memory of 2868 276 cmd.exe 39 PID 276 wrote to memory of 2868 276 cmd.exe 39 PID 1940 wrote to memory of 2892 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 40 PID 1940 wrote to memory of 2892 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 40 PID 1940 wrote to memory of 2892 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 40 PID 1940 wrote to memory of 2892 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 40 PID 1612 wrote to memory of 2904 1612 cmd.exe 41 PID 1612 wrote to memory of 2904 1612 cmd.exe 41 PID 1612 wrote to memory of 2904 1612 cmd.exe 41 PID 1612 wrote to memory of 2904 1612 cmd.exe 41 PID 1940 wrote to memory of 2928 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 43 PID 1940 wrote to memory of 2928 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 43 PID 1940 wrote to memory of 2928 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 43 PID 1940 wrote to memory of 2928 1940 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 43 PID 1776 wrote to memory of 2884 1776 cmd.exe 44 PID 1776 wrote to memory of 2884 1776 cmd.exe 44 PID 1776 wrote to memory of 2884 1776 cmd.exe 44 PID 1776 wrote to memory of 2884 1776 cmd.exe 44 PID 2892 wrote to memory of 3048 2892 cmd.exe 45 PID 2892 wrote to memory of 3048 2892 cmd.exe 45 PID 2892 wrote to memory of 3048 2892 cmd.exe 45 PID 2892 wrote to memory of 3048 2892 cmd.exe 45 PID 2928 wrote to memory of 1716 2928 cmd.exe 47 PID 2928 wrote to memory of 1716 2928 cmd.exe 47 PID 2928 wrote to memory of 1716 2928 cmd.exe 47 PID 2928 wrote to memory of 1716 2928 cmd.exe 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe"1⤵
- Event Triggered Execution: Image File Execution Options Injection
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Program Files\AVav.pif"C:\Program Files\AVav.pif"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" c:\rvts.dll,RundllTest3⤵
- Sets service image path in registry
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
PID:2768
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net1 start server2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:276 -
C:\Windows\SysWOW64\net1.exenet1 start server3⤵
- System Location Discovery: System Language Discovery
PID:2868
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c sc delete RavCCenter2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\SysWOW64\sc.exesc delete RavCCenter3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2884
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c sc delete RsScanSrv2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\SysWOW64\sc.exesc delete RsScanSrv3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2904
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c sc delete RavTask2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\SysWOW64\sc.exesc delete RavTask3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3048
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c sc delete RsRavMon2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\sc.exesc delete RsRavMon3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1716
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Image File Execution Options Injection
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Image File Execution Options Injection
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD5286ce5a0fe1159845c2ae460127b0908
SHA19eefff66604c149c68c9f69fad8f68df2bbaffaf
SHA256a287fbf428821f1d6b007228d4285b4c264e4a7c07e4185e59fe7ddb7a14e67c
SHA5125d6b631726b2f88001fcfb8669d54f8094a8a3adebcd73e7ef9853a1fb58999959243599a9d7d25b7af83a89b145a76fd4ae30c328f766018668a3f362981647
-
Filesize
7KB
MD5e6e3b91e5461e416b8810234f74f14fd
SHA1ae57654ec74805a0913d253862615baab8891b50
SHA25636de90ec1f48ee666aef44030bf896adc59e5a2be0a9a30cf437a0827a75bfe1
SHA512f71337962f406ce0c63e37f33dfde2501cc3230afaa1e63da17d3f9e409248c6a035af8b524bb04fb606b0a42db263ff936f6f9a361a3610a033fa4efa81db36
-
Filesize
12KB
MD55830d381bf0e4f36a2ec71bd9bb78b9d
SHA1861996b7b9c53650a42c29762890e760e1deb796
SHA256f686125e8c12844e4f61d0cf18dabbea16988a61e35ea6712b222e2334f2e658
SHA512ec91e98bacee67310ed266ec41d3394ccd6706a08bdb1cd519b587a2507279a671bee5c396b4b5f19a115ff3a1baeaddaa60e7a3ab40ab59162eb561136d2dd3