Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2024, 08:48
Static task
static1
Behavioral task
behavioral1
Sample
0ed664a2d35eaa5269a4b3d260296350_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0ed664a2d35eaa5269a4b3d260296350_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0ed664a2d35eaa5269a4b3d260296350_JaffaCakes118.exe
-
Size
164KB
-
MD5
0ed664a2d35eaa5269a4b3d260296350
-
SHA1
a271696502fa46b9ed8708760bb8daea872d4d1e
-
SHA256
8f193d29d6cf3c90b84f85679722f57d625a1f01cd0af233e8612fb0dc5d79f9
-
SHA512
d8cee1fc886ca51105c773aa763f33a6566ff0af3006f5b8919bb74648674edcaee70ed68145ebff7e3d1d6a1eb4e27010f886a82cb153778f2537e40f39763b
-
SSDEEP
3072:R+qZQOhWL8RYiZ6xUS6n9lBFO1SSAhKGnAlRLUp/fDd2KT9Fk7hKPDFtd2Wi:tQOgLoYiZ6xUSO9lG1SSA63LU72g7o0M
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4896 Recycle.Bin.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Recycle.Bin.exe = "C:\\Recycle.Bin\\Recycle.Bin.exe" Recycle.Bin.exe -
resource yara_rule behavioral2/memory/4076-1-0x0000000000400000-0x000000000047D000-memory.dmp upx behavioral2/memory/4076-2-0x0000000000400000-0x000000000047D000-memory.dmp upx behavioral2/memory/4076-6-0x0000000000400000-0x000000000047D000-memory.dmp upx behavioral2/memory/4896-10-0x0000000000400000-0x000000000047D000-memory.dmp upx behavioral2/memory/4896-11-0x0000000000400000-0x000000000047D000-memory.dmp upx behavioral2/memory/4896-12-0x0000000000400000-0x000000000047D000-memory.dmp upx behavioral2/memory/4896-16-0x0000000000400000-0x000000000047D000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Recycle.Bin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0ed664a2d35eaa5269a4b3d260296350_JaffaCakes118.exe -
Modifies Internet Explorer Phishing Filter 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Microsoft\Internet Explorer\PhishingFilter Recycle.Bin.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\PhishingFilter\EnabledV8 = "0" Recycle.Bin.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\PhishingFilter\ShownServiceDownBalloon = "0" Recycle.Bin.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Microsoft\Internet Explorer\Recovery Recycle.Bin.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\ClearBrowsingHistoryOnExit = "0" Recycle.Bin.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4076 0ed664a2d35eaa5269a4b3d260296350_JaffaCakes118.exe 4076 0ed664a2d35eaa5269a4b3d260296350_JaffaCakes118.exe 4076 0ed664a2d35eaa5269a4b3d260296350_JaffaCakes118.exe 4076 0ed664a2d35eaa5269a4b3d260296350_JaffaCakes118.exe 4896 Recycle.Bin.exe 4896 Recycle.Bin.exe 4896 Recycle.Bin.exe 4896 Recycle.Bin.exe 4896 Recycle.Bin.exe 4896 Recycle.Bin.exe 4896 Recycle.Bin.exe 4896 Recycle.Bin.exe 4896 Recycle.Bin.exe 4896 Recycle.Bin.exe 4896 Recycle.Bin.exe 4896 Recycle.Bin.exe 4896 Recycle.Bin.exe 4896 Recycle.Bin.exe 4896 Recycle.Bin.exe 4896 Recycle.Bin.exe 4896 Recycle.Bin.exe 4896 Recycle.Bin.exe 4896 Recycle.Bin.exe 4896 Recycle.Bin.exe 4896 Recycle.Bin.exe 4896 Recycle.Bin.exe 4896 Recycle.Bin.exe 4896 Recycle.Bin.exe 4896 Recycle.Bin.exe 4896 Recycle.Bin.exe 4896 Recycle.Bin.exe 4896 Recycle.Bin.exe 4896 Recycle.Bin.exe 4896 Recycle.Bin.exe 4896 Recycle.Bin.exe 4896 Recycle.Bin.exe 4896 Recycle.Bin.exe 4896 Recycle.Bin.exe 4896 Recycle.Bin.exe 4896 Recycle.Bin.exe 4896 Recycle.Bin.exe 4896 Recycle.Bin.exe 4896 Recycle.Bin.exe 4896 Recycle.Bin.exe 4896 Recycle.Bin.exe 4896 Recycle.Bin.exe 4896 Recycle.Bin.exe 4896 Recycle.Bin.exe 4896 Recycle.Bin.exe 4896 Recycle.Bin.exe 4896 Recycle.Bin.exe 4896 Recycle.Bin.exe 4896 Recycle.Bin.exe 4896 Recycle.Bin.exe 4896 Recycle.Bin.exe 4896 Recycle.Bin.exe 4896 Recycle.Bin.exe 4896 Recycle.Bin.exe 4896 Recycle.Bin.exe 4896 Recycle.Bin.exe 4896 Recycle.Bin.exe 4896 Recycle.Bin.exe 4896 Recycle.Bin.exe 4896 Recycle.Bin.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4076 0ed664a2d35eaa5269a4b3d260296350_JaffaCakes118.exe Token: SeDebugPrivilege 4076 0ed664a2d35eaa5269a4b3d260296350_JaffaCakes118.exe Token: SeDebugPrivilege 4076 0ed664a2d35eaa5269a4b3d260296350_JaffaCakes118.exe Token: SeDebugPrivilege 4076 0ed664a2d35eaa5269a4b3d260296350_JaffaCakes118.exe Token: SeDebugPrivilege 4896 Recycle.Bin.exe Token: SeDebugPrivilege 4896 Recycle.Bin.exe Token: SeDebugPrivilege 4896 Recycle.Bin.exe Token: SeDebugPrivilege 4896 Recycle.Bin.exe Token: SeDebugPrivilege 4896 Recycle.Bin.exe Token: SeDebugPrivilege 4896 Recycle.Bin.exe Token: SeDebugPrivilege 4896 Recycle.Bin.exe Token: SeDebugPrivilege 4896 Recycle.Bin.exe Token: SeDebugPrivilege 4896 Recycle.Bin.exe Token: SeDebugPrivilege 4896 Recycle.Bin.exe Token: SeDebugPrivilege 4896 Recycle.Bin.exe Token: SeDebugPrivilege 4896 Recycle.Bin.exe Token: SeDebugPrivilege 4896 Recycle.Bin.exe Token: SeDebugPrivilege 4896 Recycle.Bin.exe Token: SeDebugPrivilege 4896 Recycle.Bin.exe Token: SeDebugPrivilege 4896 Recycle.Bin.exe Token: SeDebugPrivilege 4896 Recycle.Bin.exe Token: SeDebugPrivilege 4896 Recycle.Bin.exe Token: SeDebugPrivilege 4896 Recycle.Bin.exe Token: SeDebugPrivilege 4896 Recycle.Bin.exe Token: SeDebugPrivilege 4896 Recycle.Bin.exe Token: SeDebugPrivilege 4896 Recycle.Bin.exe Token: SeDebugPrivilege 4896 Recycle.Bin.exe Token: SeDebugPrivilege 4896 Recycle.Bin.exe Token: SeDebugPrivilege 4896 Recycle.Bin.exe Token: SeDebugPrivilege 4896 Recycle.Bin.exe Token: SeDebugPrivilege 4896 Recycle.Bin.exe Token: SeDebugPrivilege 4896 Recycle.Bin.exe Token: SeDebugPrivilege 4896 Recycle.Bin.exe Token: SeDebugPrivilege 4896 Recycle.Bin.exe Token: SeDebugPrivilege 4896 Recycle.Bin.exe Token: SeDebugPrivilege 4896 Recycle.Bin.exe Token: SeDebugPrivilege 4896 Recycle.Bin.exe Token: SeDebugPrivilege 4896 Recycle.Bin.exe Token: SeDebugPrivilege 4896 Recycle.Bin.exe Token: SeDebugPrivilege 4896 Recycle.Bin.exe Token: SeDebugPrivilege 4896 Recycle.Bin.exe Token: SeDebugPrivilege 4896 Recycle.Bin.exe Token: SeDebugPrivilege 4896 Recycle.Bin.exe Token: SeDebugPrivilege 4896 Recycle.Bin.exe Token: SeDebugPrivilege 4896 Recycle.Bin.exe Token: SeDebugPrivilege 4896 Recycle.Bin.exe Token: SeDebugPrivilege 4896 Recycle.Bin.exe Token: SeDebugPrivilege 4896 Recycle.Bin.exe Token: SeDebugPrivilege 4896 Recycle.Bin.exe Token: SeDebugPrivilege 4896 Recycle.Bin.exe Token: SeDebugPrivilege 4896 Recycle.Bin.exe Token: SeDebugPrivilege 4896 Recycle.Bin.exe Token: SeDebugPrivilege 4896 Recycle.Bin.exe Token: SeDebugPrivilege 4896 Recycle.Bin.exe Token: SeDebugPrivilege 4896 Recycle.Bin.exe Token: SeDebugPrivilege 4896 Recycle.Bin.exe Token: SeDebugPrivilege 4896 Recycle.Bin.exe Token: SeDebugPrivilege 4896 Recycle.Bin.exe Token: SeDebugPrivilege 4896 Recycle.Bin.exe Token: SeDebugPrivilege 4896 Recycle.Bin.exe Token: SeDebugPrivilege 4896 Recycle.Bin.exe Token: SeDebugPrivilege 4896 Recycle.Bin.exe Token: SeDebugPrivilege 4896 Recycle.Bin.exe Token: SeDebugPrivilege 4896 Recycle.Bin.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4076 wrote to memory of 3524 4076 0ed664a2d35eaa5269a4b3d260296350_JaffaCakes118.exe 56 PID 4076 wrote to memory of 604 4076 0ed664a2d35eaa5269a4b3d260296350_JaffaCakes118.exe 5 PID 4076 wrote to memory of 676 4076 0ed664a2d35eaa5269a4b3d260296350_JaffaCakes118.exe 7 PID 4076 wrote to memory of 804 4076 0ed664a2d35eaa5269a4b3d260296350_JaffaCakes118.exe 8 PID 4076 wrote to memory of 812 4076 0ed664a2d35eaa5269a4b3d260296350_JaffaCakes118.exe 9 PID 4076 wrote to memory of 820 4076 0ed664a2d35eaa5269a4b3d260296350_JaffaCakes118.exe 10 PID 4076 wrote to memory of 916 4076 0ed664a2d35eaa5269a4b3d260296350_JaffaCakes118.exe 11 PID 4076 wrote to memory of 964 4076 0ed664a2d35eaa5269a4b3d260296350_JaffaCakes118.exe 12 PID 4076 wrote to memory of 332 4076 0ed664a2d35eaa5269a4b3d260296350_JaffaCakes118.exe 13 PID 4076 wrote to memory of 884 4076 0ed664a2d35eaa5269a4b3d260296350_JaffaCakes118.exe 14 PID 4076 wrote to memory of 752 4076 0ed664a2d35eaa5269a4b3d260296350_JaffaCakes118.exe 15 PID 4076 wrote to memory of 1064 4076 0ed664a2d35eaa5269a4b3d260296350_JaffaCakes118.exe 16 PID 4076 wrote to memory of 1108 4076 0ed664a2d35eaa5269a4b3d260296350_JaffaCakes118.exe 17 PID 4076 wrote to memory of 1128 4076 0ed664a2d35eaa5269a4b3d260296350_JaffaCakes118.exe 18 PID 4076 wrote to memory of 1232 4076 0ed664a2d35eaa5269a4b3d260296350_JaffaCakes118.exe 19 PID 4076 wrote to memory of 1244 4076 0ed664a2d35eaa5269a4b3d260296350_JaffaCakes118.exe 20 PID 4076 wrote to memory of 1276 4076 0ed664a2d35eaa5269a4b3d260296350_JaffaCakes118.exe 21 PID 4076 wrote to memory of 1308 4076 0ed664a2d35eaa5269a4b3d260296350_JaffaCakes118.exe 22 PID 4076 wrote to memory of 1404 4076 0ed664a2d35eaa5269a4b3d260296350_JaffaCakes118.exe 23 PID 4076 wrote to memory of 1420 4076 0ed664a2d35eaa5269a4b3d260296350_JaffaCakes118.exe 24 PID 4076 wrote to memory of 1516 4076 0ed664a2d35eaa5269a4b3d260296350_JaffaCakes118.exe 25 PID 4076 wrote to memory of 1540 4076 0ed664a2d35eaa5269a4b3d260296350_JaffaCakes118.exe 26 PID 4076 wrote to memory of 1548 4076 0ed664a2d35eaa5269a4b3d260296350_JaffaCakes118.exe 27 PID 4076 wrote to memory of 1640 4076 0ed664a2d35eaa5269a4b3d260296350_JaffaCakes118.exe 28 PID 4076 wrote to memory of 1692 4076 0ed664a2d35eaa5269a4b3d260296350_JaffaCakes118.exe 29 PID 4076 wrote to memory of 1724 4076 0ed664a2d35eaa5269a4b3d260296350_JaffaCakes118.exe 30 PID 4076 wrote to memory of 1800 4076 0ed664a2d35eaa5269a4b3d260296350_JaffaCakes118.exe 31 PID 4076 wrote to memory of 1828 4076 0ed664a2d35eaa5269a4b3d260296350_JaffaCakes118.exe 32 PID 4076 wrote to memory of 1916 4076 0ed664a2d35eaa5269a4b3d260296350_JaffaCakes118.exe 33 PID 4076 wrote to memory of 1924 4076 0ed664a2d35eaa5269a4b3d260296350_JaffaCakes118.exe 34 PID 4076 wrote to memory of 1976 4076 0ed664a2d35eaa5269a4b3d260296350_JaffaCakes118.exe 35 PID 4076 wrote to memory of 2044 4076 0ed664a2d35eaa5269a4b3d260296350_JaffaCakes118.exe 36 PID 4076 wrote to memory of 2052 4076 0ed664a2d35eaa5269a4b3d260296350_JaffaCakes118.exe 37 PID 4076 wrote to memory of 2144 4076 0ed664a2d35eaa5269a4b3d260296350_JaffaCakes118.exe 38 PID 4076 wrote to memory of 2152 4076 0ed664a2d35eaa5269a4b3d260296350_JaffaCakes118.exe 39 PID 4076 wrote to memory of 2212 4076 0ed664a2d35eaa5269a4b3d260296350_JaffaCakes118.exe 40 PID 4076 wrote to memory of 2356 4076 0ed664a2d35eaa5269a4b3d260296350_JaffaCakes118.exe 41 PID 4076 wrote to memory of 2476 4076 0ed664a2d35eaa5269a4b3d260296350_JaffaCakes118.exe 42 PID 4076 wrote to memory of 2484 4076 0ed664a2d35eaa5269a4b3d260296350_JaffaCakes118.exe 43 PID 4076 wrote to memory of 2552 4076 0ed664a2d35eaa5269a4b3d260296350_JaffaCakes118.exe 44 PID 4076 wrote to memory of 2560 4076 0ed664a2d35eaa5269a4b3d260296350_JaffaCakes118.exe 45 PID 4076 wrote to memory of 2572 4076 0ed664a2d35eaa5269a4b3d260296350_JaffaCakes118.exe 46 PID 4076 wrote to memory of 2752 4076 0ed664a2d35eaa5269a4b3d260296350_JaffaCakes118.exe 47 PID 4076 wrote to memory of 2840 4076 0ed664a2d35eaa5269a4b3d260296350_JaffaCakes118.exe 48 PID 4076 wrote to memory of 2860 4076 0ed664a2d35eaa5269a4b3d260296350_JaffaCakes118.exe 49 PID 4076 wrote to memory of 2868 4076 0ed664a2d35eaa5269a4b3d260296350_JaffaCakes118.exe 50 PID 4076 wrote to memory of 2876 4076 0ed664a2d35eaa5269a4b3d260296350_JaffaCakes118.exe 51 PID 4076 wrote to memory of 2896 4076 0ed664a2d35eaa5269a4b3d260296350_JaffaCakes118.exe 52 PID 4076 wrote to memory of 3132 4076 0ed664a2d35eaa5269a4b3d260296350_JaffaCakes118.exe 53 PID 4076 wrote to memory of 3440 4076 0ed664a2d35eaa5269a4b3d260296350_JaffaCakes118.exe 55 PID 4076 wrote to memory of 3524 4076 0ed664a2d35eaa5269a4b3d260296350_JaffaCakes118.exe 56 PID 4076 wrote to memory of 3664 4076 0ed664a2d35eaa5269a4b3d260296350_JaffaCakes118.exe 57 PID 4076 wrote to memory of 3860 4076 0ed664a2d35eaa5269a4b3d260296350_JaffaCakes118.exe 58 PID 4076 wrote to memory of 3952 4076 0ed664a2d35eaa5269a4b3d260296350_JaffaCakes118.exe 59 PID 4076 wrote to memory of 4020 4076 0ed664a2d35eaa5269a4b3d260296350_JaffaCakes118.exe 60 PID 4076 wrote to memory of 700 4076 0ed664a2d35eaa5269a4b3d260296350_JaffaCakes118.exe 61 PID 4076 wrote to memory of 3724 4076 0ed664a2d35eaa5269a4b3d260296350_JaffaCakes118.exe 62 PID 4076 wrote to memory of 4816 4076 0ed664a2d35eaa5269a4b3d260296350_JaffaCakes118.exe 65 PID 4076 wrote to memory of 1104 4076 0ed664a2d35eaa5269a4b3d260296350_JaffaCakes118.exe 67 PID 4076 wrote to memory of 5104 4076 0ed664a2d35eaa5269a4b3d260296350_JaffaCakes118.exe 68 PID 4076 wrote to memory of 2412 4076 0ed664a2d35eaa5269a4b3d260296350_JaffaCakes118.exe 69 PID 4076 wrote to memory of 5108 4076 0ed664a2d35eaa5269a4b3d260296350_JaffaCakes118.exe 70 PID 4076 wrote to memory of 8 4076 0ed664a2d35eaa5269a4b3d260296350_JaffaCakes118.exe 71 PID 4076 wrote to memory of 4064 4076 0ed664a2d35eaa5269a4b3d260296350_JaffaCakes118.exe 72
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:604
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"2⤵PID:804
-
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:332
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:676
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:812
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵PID:820
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding2⤵PID:3132
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:3860
-
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca2⤵PID:3952
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:4020
-
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca2⤵PID:700
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:3724
-
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding2⤵PID:5108
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:900
-
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca2⤵PID:1940
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:2584
-
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding2⤵PID:2780
-
-
C:\Windows\System32\mousocoreworker.exeC:\Windows\System32\mousocoreworker.exe -Embedding2⤵PID:4584
-
-
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exeC:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding2⤵PID:2060
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS -p1⤵PID:916
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:964
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:884
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p1⤵PID:752
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:1064
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1108
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1128
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1232
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵PID:2572
-
-
C:\Windows\system32\MusNotification.exeC:\Windows\system32\MusNotification.exe2⤵PID:3212
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1244
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:1276
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1308
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1404
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1420
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:2484
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1516
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1540
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1548
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1640
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1692
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1724
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1800
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1828
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:1916
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1924
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:1976
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:2044
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2052
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p1⤵PID:2144
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2152
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2212
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:2356
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2476
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2552
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2560
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵PID:2752
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2840
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2860
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2868
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2876
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵PID:2896
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:3440
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3524
-
C:\Users\Admin\AppData\Local\Temp\0ed664a2d35eaa5269a4b3d260296350_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0ed664a2d35eaa5269a4b3d260296350_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Recycle.Bin\Recycle.Bin.exe"C:\Recycle.Bin\Recycle.Bin.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4896
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3664
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:4816
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:1104
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵PID:5104
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:2412
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:8
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:4064
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc1⤵PID:4088
-
C:\Windows\System32\WaaSMedicAgent.exeC:\Windows\System32\WaaSMedicAgent.exe 7f8173d649255cdbcf2d0ddadfc42716 09XD1MGolUqH8PaQrD+oBA.0.1.0.0.01⤵PID:2888
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:1736
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵PID:4700
-
C:\Windows\servicing\TrustedInstaller.exeC:\Windows\servicing\TrustedInstaller.exe1⤵PID:3424
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc1⤵PID:3792
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
164KB
MD50ed664a2d35eaa5269a4b3d260296350
SHA1a271696502fa46b9ed8708760bb8daea872d4d1e
SHA2568f193d29d6cf3c90b84f85679722f57d625a1f01cd0af233e8612fb0dc5d79f9
SHA512d8cee1fc886ca51105c773aa763f33a6566ff0af3006f5b8919bb74648674edcaee70ed68145ebff7e3d1d6a1eb4e27010f886a82cb153778f2537e40f39763b
-
Filesize
23KB
MD59998353b733f7a934ccb95fe818978a4
SHA1bdd6a09a696a9acb34c4a7b211eddd1da1c345f3
SHA256a7745c920168ff244c2b3bb0dc6f9d51d287e81c7c8caac0622245e0cccd17bd
SHA5120523a90695cb0772efac7edf5025b244c08a6b425369fb0ec35ab9f3f93fe79115837a6884176159893190bf97db2af7781b1b286f049796d98b053ef261a7e9