Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2024, 15:00
Static task
static1
Behavioral task
behavioral1
Sample
fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe
-
Size
26KB
-
MD5
fec5b0c4e672551aa885bca7271087dd
-
SHA1
f9c51f495adf12825f7e3dbf5be1e2ad335fe03d
-
SHA256
eb9dc72bfe286fc6577de6f8c16af8265aa504b2268e58fe4affa085de59455d
-
SHA512
e8adb0b722e7d1bb696477130e0409fd56975b819ac5abc5e172db4d3e03b026cfc6c3e93fa9ec22e09560d8c204dedfd58be5e04aec387f18e1787ee0c73335
-
SSDEEP
768:olRtxfnkWt+bIRQPKeVjQ5lcZ6fdUHDfXUY:uQWwbsQP9Qk4dELXJ
Malware Config
Signatures
-
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavTask.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Mmsk.EXE fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WOPTILITIES.EXE fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kwatch.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ScanFrm.EXE fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KRegEx.EXE fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WOPTILITIES.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\VPC32.EXE fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Iparmor.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KRegEx.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RsAgent.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HijackThis.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360safebox.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nod32krn.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kwatch.EXE fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PFW.EXE fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVP.COM fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVSrvXP.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVWSC.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rfwmain.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ArSwp.EXE fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rsnetsvr.EXE fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regedit.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KASARP.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kavstart.EXE fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rfwstub.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TrojDie.KXP\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360rpt.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\safeboxTray.EXE fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rsnetsvr.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rfwmain.EXE fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TrojanDetector.EXE fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVMonxp.KXP\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AutoRunKiller.EXE fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Runiep.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SREngLdr.EXE fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RSTray.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.EXE fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVSrvXP.EXE fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Nod32kui.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rfwProxy.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rfwsrv.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavMonD.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVMonxp.KXP fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Mmsk.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\VPTRAY.EXE fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavMon.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rsaupd.EXE fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rsaupd.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ArSwp.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QQDoctor.EXE fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavMonD.EXE fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RAV.EXE fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RsMain.EXE fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AVP.COM\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RSTray.EXE fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QQDoctor.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360safe.EXE fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavTask.EXE fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nod32krn.EXE fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KPfwSvc.EXE fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KPfwSvc.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RAVTRAY.EXE fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\VPTRAY.EXE\debugger = "C:\\Windows\\system32\\dllcache\\spoolsv.exe" fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\skbvrv\ImagePath = "\\??\\C:\\Windows\\Fonts\\skbvrv.fon" rundll32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation AVav.pif -
Executes dropped EXE 1 IoCs
pid Process 1696 AVav.pif -
Loads dropped DLL 2 IoCs
pid Process 2132 rundll32.exe 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\i: fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe File opened (read-only) \??\k: fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe File opened (read-only) \??\n: fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe File opened (read-only) \??\o: fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe File opened (read-only) \??\t: fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe File opened (read-only) \??\u: fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe File opened (read-only) \??\x: fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe File opened (read-only) \??\e: fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe File opened (read-only) \??\m: fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe File opened (read-only) \??\v: fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe File opened (read-only) \??\h: fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe File opened (read-only) \??\p: fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe File opened (read-only) \??\q: fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe File opened (read-only) \??\r: fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe File opened (read-only) \??\y: fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe File opened (read-only) \??\z: fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe File opened (read-only) \??\l: fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe File opened (read-only) \??\j: fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe File opened (read-only) \??\s: fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe File opened (read-only) \??\w: fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe File opened (read-only) \??\g: fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe -
Drops autorun.inf file 1 TTPs 4 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification \??\c:\AUTORUN.INF fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe File created \??\f:\AUTORUN.INF fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe File opened for modification \??\f:\AUTORUN.INF fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe File created \??\c:\AUTORUN.INF fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\dllcache\linkinfo.dll fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files\AVav.pif fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe File created C:\Program Files\AVav.pif fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Fonts\skbvrv.fon rundll32.exe File created C:\Windows\fonts\alsk.sys fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe File created C:\Windows\fonts\naks.sys fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4076 sc.exe 3640 sc.exe 2156 sc.exe 3996 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AVav.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 1696 AVav.pif 1696 AVav.pif 2132 rundll32.exe 2132 rundll32.exe 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe -
Suspicious behavior: LoadsDriver 3 IoCs
pid Process 2132 rundll32.exe 656 Process not Found 656 Process not Found -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe Token: SeDebugPrivilege 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 552 wrote to memory of 1696 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 82 PID 552 wrote to memory of 1696 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 82 PID 552 wrote to memory of 1696 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 82 PID 1696 wrote to memory of 2132 1696 AVav.pif 83 PID 1696 wrote to memory of 2132 1696 AVav.pif 83 PID 1696 wrote to memory of 2132 1696 AVav.pif 83 PID 552 wrote to memory of 3852 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 91 PID 552 wrote to memory of 3852 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 91 PID 552 wrote to memory of 3852 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 91 PID 552 wrote to memory of 4796 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 93 PID 552 wrote to memory of 4796 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 93 PID 552 wrote to memory of 4796 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 93 PID 552 wrote to memory of 3324 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 94 PID 552 wrote to memory of 3324 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 94 PID 552 wrote to memory of 3324 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 94 PID 552 wrote to memory of 2068 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 95 PID 552 wrote to memory of 2068 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 95 PID 552 wrote to memory of 2068 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 95 PID 552 wrote to memory of 3816 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 96 PID 552 wrote to memory of 3816 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 96 PID 552 wrote to memory of 3816 552 fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe 96 PID 3852 wrote to memory of 4672 3852 cmd.exe 101 PID 3852 wrote to memory of 4672 3852 cmd.exe 101 PID 3852 wrote to memory of 4672 3852 cmd.exe 101 PID 4796 wrote to memory of 4076 4796 cmd.exe 102 PID 4796 wrote to memory of 4076 4796 cmd.exe 102 PID 4796 wrote to memory of 4076 4796 cmd.exe 102 PID 3324 wrote to memory of 3640 3324 cmd.exe 103 PID 3324 wrote to memory of 3640 3324 cmd.exe 103 PID 3324 wrote to memory of 3640 3324 cmd.exe 103 PID 2068 wrote to memory of 2156 2068 cmd.exe 104 PID 2068 wrote to memory of 2156 2068 cmd.exe 104 PID 2068 wrote to memory of 2156 2068 cmd.exe 104 PID 3816 wrote to memory of 3996 3816 cmd.exe 105 PID 3816 wrote to memory of 3996 3816 cmd.exe 105 PID 3816 wrote to memory of 3996 3816 cmd.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fec5b0c4e672551aa885bca7271087dd_JaffaCakes118.exe"1⤵
- Event Triggered Execution: Image File Execution Options Injection
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Program Files\AVav.pif"C:\Program Files\AVav.pif"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" c:\rvts.dll,RundllTest3⤵
- Sets service image path in registry
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
PID:2132
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net1 start server2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3852 -
C:\Windows\SysWOW64\net1.exenet1 start server3⤵
- System Location Discovery: System Language Discovery
PID:4672
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c sc delete RavCCenter2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Windows\SysWOW64\sc.exesc delete RavCCenter3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4076
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c sc delete RsScanSrv2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Windows\SysWOW64\sc.exesc delete RsScanSrv3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3640
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c sc delete RavTask2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\SysWOW64\sc.exesc delete RavTask3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2156
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c sc delete RsRavMon2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3816 -
C:\Windows\SysWOW64\sc.exesc delete RsRavMon3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3996
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Image File Execution Options Injection
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Image File Execution Options Injection
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD5286ce5a0fe1159845c2ae460127b0908
SHA19eefff66604c149c68c9f69fad8f68df2bbaffaf
SHA256a287fbf428821f1d6b007228d4285b4c264e4a7c07e4185e59fe7ddb7a14e67c
SHA5125d6b631726b2f88001fcfb8669d54f8094a8a3adebcd73e7ef9853a1fb58999959243599a9d7d25b7af83a89b145a76fd4ae30c328f766018668a3f362981647
-
Filesize
12KB
MD55830d381bf0e4f36a2ec71bd9bb78b9d
SHA1861996b7b9c53650a42c29762890e760e1deb796
SHA256f686125e8c12844e4f61d0cf18dabbea16988a61e35ea6712b222e2334f2e658
SHA512ec91e98bacee67310ed266ec41d3394ccd6706a08bdb1cd519b587a2507279a671bee5c396b4b5f19a115ff3a1baeaddaa60e7a3ab40ab59162eb561136d2dd3
-
Filesize
7KB
MD5e6e3b91e5461e416b8810234f74f14fd
SHA1ae57654ec74805a0913d253862615baab8891b50
SHA25636de90ec1f48ee666aef44030bf896adc59e5a2be0a9a30cf437a0827a75bfe1
SHA512f71337962f406ce0c63e37f33dfde2501cc3230afaa1e63da17d3f9e409248c6a035af8b524bb04fb606b0a42db263ff936f6f9a361a3610a033fa4efa81db36