Analysis

  • max time kernel
    140s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/10/2024, 00:10

General

  • Target

    1108c434532a4807b93ee6dea3f32efc_JaffaCakes118.exe

  • Size

    299KB

  • MD5

    1108c434532a4807b93ee6dea3f32efc

  • SHA1

    08f3fd04c4c2c8f6c34b3e10339c54c2210ce538

  • SHA256

    a14346cd6f3e05c76e610b41d7a56e9469d2f13627bf66beb49820cb94648b24

  • SHA512

    23a351897c24267b1618dfd9f8e87a9ae2a49d4d544d4e9ac5e2805722e5a1e426c2d2280e28843a2f3031049bfb5a1ad8ed723b81a56f34c8cbbe3dde588c79

  • SSDEEP

    6144:k9KTPaYGrznUZc1rjDoyHaogL9x0DFi8CQ0E:taXf1rPoB7L9uD+Qz

Malware Config

Signatures

  • Detect Neshta payload 5 IoCs
  • Modifies firewall policy service 3 TTPs 4 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 19 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 55 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:612
      • C:\Windows\system32\fontdrvhost.exe
        "fontdrvhost.exe"
        2⤵
          PID:820
        • C:\Windows\system32\dwm.exe
          "dwm.exe"
          2⤵
            PID:388
        • C:\Windows\system32\lsass.exe
          C:\Windows\system32\lsass.exe
          1⤵
            PID:676
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe -k DcomLaunch -p
            1⤵
              PID:792
              • C:\Windows\system32\wbem\unsecapp.exe
                C:\Windows\system32\wbem\unsecapp.exe -Embedding
                2⤵
                  PID:3028
                • C:\Windows\system32\DllHost.exe
                  C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                  2⤵
                    PID:3892
                  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                    2⤵
                      PID:4012
                    • C:\Windows\System32\RuntimeBroker.exe
                      C:\Windows\System32\RuntimeBroker.exe -Embedding
                      2⤵
                        PID:4072
                      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                        2⤵
                          PID:1480
                        • C:\Windows\System32\RuntimeBroker.exe
                          C:\Windows\System32\RuntimeBroker.exe -Embedding
                          2⤵
                            PID:4112
                          • C:\Windows\System32\RuntimeBroker.exe
                            C:\Windows\System32\RuntimeBroker.exe -Embedding
                            2⤵
                              PID:4800
                            • C:\Windows\system32\SppExtComObj.exe
                              C:\Windows\system32\SppExtComObj.exe -Embedding
                              2⤵
                                PID:1960
                              • C:\Windows\system32\DllHost.exe
                                C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                2⤵
                                  PID:4608
                                • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe
                                  "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca
                                  2⤵
                                    PID:2672
                                • C:\Windows\system32\fontdrvhost.exe
                                  "fontdrvhost.exe"
                                  1⤵
                                    PID:812
                                  • C:\Windows\system32\svchost.exe
                                    C:\Windows\system32\svchost.exe -k RPCSS -p
                                    1⤵
                                      PID:912
                                    • C:\Windows\system32\svchost.exe
                                      C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
                                      1⤵
                                        PID:960
                                      • C:\Windows\system32\svchost.exe
                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
                                        1⤵
                                          PID:432
                                        • C:\Windows\System32\svchost.exe
                                          C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
                                          1⤵
                                            PID:64
                                          • C:\Windows\system32\svchost.exe
                                            C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p
                                            1⤵
                                              PID:1044
                                            • C:\Windows\System32\svchost.exe
                                              C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                                              1⤵
                                                PID:1108
                                              • C:\Windows\system32\svchost.exe
                                                C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                                                1⤵
                                                  PID:1124
                                                • C:\Windows\System32\svchost.exe
                                                  C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                                                  1⤵
                                                    PID:1148
                                                  • C:\Windows\system32\svchost.exe
                                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                                                    1⤵
                                                      PID:1192
                                                      • C:\Windows\system32\taskhostw.exe
                                                        taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
                                                        2⤵
                                                          PID:2368
                                                        • C:\Windows\system32\MusNotification.exe
                                                          C:\Windows\system32\MusNotification.exe
                                                          2⤵
                                                            PID:2308
                                                        • C:\Windows\system32\svchost.exe
                                                          C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                                                          1⤵
                                                            PID:1296
                                                          • C:\Windows\system32\svchost.exe
                                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                                                            1⤵
                                                              PID:1304
                                                            • C:\Windows\system32\svchost.exe
                                                              C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                                                              1⤵
                                                                PID:1312
                                                              • C:\Windows\system32\svchost.exe
                                                                C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                                                                1⤵
                                                                  PID:1372
                                                                • C:\Windows\system32\svchost.exe
                                                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                                                                  1⤵
                                                                    PID:1424
                                                                    • C:\Windows\system32\sihost.exe
                                                                      sihost.exe
                                                                      2⤵
                                                                        PID:2604
                                                                    • C:\Windows\system32\svchost.exe
                                                                      C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                                                                      1⤵
                                                                        PID:1512
                                                                      • C:\Windows\System32\svchost.exe
                                                                        C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                                                                        1⤵
                                                                          PID:1532
                                                                        • C:\Windows\system32\svchost.exe
                                                                          C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                                                          1⤵
                                                                            PID:1640
                                                                          • C:\Windows\System32\svchost.exe
                                                                            C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc
                                                                            1⤵
                                                                              PID:1688
                                                                            • C:\Windows\System32\svchost.exe
                                                                              C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                                                              1⤵
                                                                                PID:1720
                                                                              • C:\Windows\System32\svchost.exe
                                                                                C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                                                1⤵
                                                                                  PID:1792
                                                                                  • C:\Windows\system32\AUDIODG.EXE
                                                                                    C:\Windows\system32\AUDIODG.EXE 0x2c8 0x474
                                                                                    2⤵
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    PID:2380
                                                                                • C:\Windows\System32\svchost.exe
                                                                                  C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm
                                                                                  1⤵
                                                                                    PID:1804
                                                                                  • C:\Windows\system32\svchost.exe
                                                                                    C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
                                                                                    1⤵
                                                                                      PID:1920
                                                                                    • C:\Windows\System32\svchost.exe
                                                                                      C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                                                      1⤵
                                                                                        PID:1936
                                                                                      • C:\Windows\system32\svchost.exe
                                                                                        C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache
                                                                                        1⤵
                                                                                          PID:1948
                                                                                        • C:\Windows\System32\svchost.exe
                                                                                          C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
                                                                                          1⤵
                                                                                            PID:2020
                                                                                          • C:\Windows\System32\spoolsv.exe
                                                                                            C:\Windows\System32\spoolsv.exe
                                                                                            1⤵
                                                                                              PID:2064
                                                                                            • C:\Windows\system32\svchost.exe
                                                                                              C:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p
                                                                                              1⤵
                                                                                                PID:2116
                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
                                                                                                1⤵
                                                                                                  PID:2156
                                                                                                • C:\Windows\System32\svchost.exe
                                                                                                  C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation
                                                                                                  1⤵
                                                                                                    PID:2172
                                                                                                  • C:\Windows\System32\svchost.exe
                                                                                                    C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc
                                                                                                    1⤵
                                                                                                      PID:2280
                                                                                                    • C:\Windows\system32\svchost.exe
                                                                                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT
                                                                                                      1⤵
                                                                                                        PID:2408
                                                                                                      • C:\Windows\system32\svchost.exe
                                                                                                        C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent
                                                                                                        1⤵
                                                                                                          PID:2416
                                                                                                        • C:\Windows\system32\svchost.exe
                                                                                                          C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                                                                                                          1⤵
                                                                                                            PID:2620
                                                                                                          • C:\Windows\system32\svchost.exe
                                                                                                            C:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc
                                                                                                            1⤵
                                                                                                              PID:2628
                                                                                                            • C:\Windows\sysmon.exe
                                                                                                              C:\Windows\sysmon.exe
                                                                                                              1⤵
                                                                                                                PID:2696
                                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer
                                                                                                                1⤵
                                                                                                                  PID:2716
                                                                                                                • C:\Windows\System32\svchost.exe
                                                                                                                  C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks
                                                                                                                  1⤵
                                                                                                                    PID:2740
                                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService
                                                                                                                    1⤵
                                                                                                                      PID:2748
                                                                                                                    • C:\Windows\system32\svchost.exe
                                                                                                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker
                                                                                                                      1⤵
                                                                                                                        PID:3056
                                                                                                                      • C:\Windows\system32\svchost.exe
                                                                                                                        C:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc
                                                                                                                        1⤵
                                                                                                                          PID:3440
                                                                                                                        • C:\Windows\Explorer.EXE
                                                                                                                          C:\Windows\Explorer.EXE
                                                                                                                          1⤵
                                                                                                                            PID:3576
                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\1108c434532a4807b93ee6dea3f32efc_JaffaCakes118.exe
                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\1108c434532a4807b93ee6dea3f32efc_JaffaCakes118.exe"
                                                                                                                              2⤵
                                                                                                                              • Modifies firewall policy service
                                                                                                                              • Checks computer location settings
                                                                                                                              • Modifies system executable filetype association
                                                                                                                              • Drops file in Program Files directory
                                                                                                                              • Drops file in Windows directory
                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                              • Modifies registry class
                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                              • Suspicious use of WriteProcessMemory
                                                                                                                              PID:1244
                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\3582-490\1108c434532a4807b93ee6dea3f32efc_JaffaCakes118.exe
                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\3582-490\1108c434532a4807b93ee6dea3f32efc_JaffaCakes118.exe"
                                                                                                                                3⤵
                                                                                                                                • Executes dropped EXE
                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                                • Suspicious behavior: MapViewOfSection
                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                • Suspicious use of WriteProcessMemory
                                                                                                                                PID:2856
                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\3582-490\1108c434532a4807b93ee6dea3f32efc_JaffaCakes118Srv.exe
                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\3582-490\1108c434532a4807b93ee6dea3f32efc_JaffaCakes118Srv.exe
                                                                                                                                  4⤵
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                  PID:1560
                                                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 1560 -s 268
                                                                                                                                    5⤵
                                                                                                                                    • Program crash
                                                                                                                                    PID:4260
                                                                                                                          • C:\Windows\system32\svchost.exe
                                                                                                                            C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                                                                                                                            1⤵
                                                                                                                              PID:3688
                                                                                                                            • C:\Windows\system32\svchost.exe
                                                                                                                              C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                                                                                                                              1⤵
                                                                                                                                PID:4484
                                                                                                                              • C:\Windows\System32\svchost.exe
                                                                                                                                C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                                                                                                                                1⤵
                                                                                                                                  PID:408
                                                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                                                  C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV
                                                                                                                                  1⤵
                                                                                                                                    PID:2820
                                                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                                                    C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc
                                                                                                                                    1⤵
                                                                                                                                      PID:4512
                                                                                                                                    • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
                                                                                                                                      "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
                                                                                                                                      1⤵
                                                                                                                                        PID:880
                                                                                                                                      • C:\Windows\System32\svchost.exe
                                                                                                                                        C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                                                                                                                                        1⤵
                                                                                                                                          PID:1176
                                                                                                                                        • C:\Windows\system32\svchost.exe
                                                                                                                                          C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc
                                                                                                                                          1⤵
                                                                                                                                            PID:1368
                                                                                                                                          • C:\Windows\system32\svchost.exe
                                                                                                                                            C:\Windows\system32\svchost.exe -k appmodel -p -s camsvc
                                                                                                                                            1⤵
                                                                                                                                              PID:2044
                                                                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window
                                                                                                                                              1⤵
                                                                                                                                                PID:3320
                                                                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=127.0.6533.89 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=127.0.2651.86 --initial-client-data=0x238,0x23c,0x240,0x234,0x248,0x7ff88babd198,0x7ff88babd1a4,0x7ff88babd1b0
                                                                                                                                                  2⤵
                                                                                                                                                    PID:4768
                                                                                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2308,i,15336851255456239337,16379811035920490645,262144 --variations-seed-version --mojo-platform-channel-handle=2304 /prefetch:2
                                                                                                                                                    2⤵
                                                                                                                                                      PID:4596
                                                                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --field-trial-handle=1868,i,15336851255456239337,16379811035920490645,262144 --variations-seed-version --mojo-platform-channel-handle=2788 /prefetch:3
                                                                                                                                                      2⤵
                                                                                                                                                        PID:4140
                                                                                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --field-trial-handle=1728,i,15336851255456239337,16379811035920490645,262144 --variations-seed-version --mojo-platform-channel-handle=2892 /prefetch:8
                                                                                                                                                        2⤵
                                                                                                                                                          PID:3720
                                                                                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4616,i,15336851255456239337,16379811035920490645,262144 --variations-seed-version --mojo-platform-channel-handle=4216 /prefetch:8
                                                                                                                                                          2⤵
                                                                                                                                                            PID:3076
                                                                                                                                                        • C:\Windows\system32\svchost.exe
                                                                                                                                                          C:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo
                                                                                                                                                          1⤵
                                                                                                                                                            PID:2848
                                                                                                                                                          • C:\Windows\System32\svchost.exe
                                                                                                                                                            C:\Windows\System32\svchost.exe -k WerSvcGroup
                                                                                                                                                            1⤵
                                                                                                                                                              PID:2132
                                                                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1560 -ip 1560
                                                                                                                                                                2⤵
                                                                                                                                                                  PID:2164

                                                                                                                                                              Network

                                                                                                                                                              MITRE ATT&CK Enterprise v15

                                                                                                                                                              Replay Monitor

                                                                                                                                                              Loading Replay Monitor...

                                                                                                                                                              Downloads

                                                                                                                                                              • C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE

                                                                                                                                                                Filesize

                                                                                                                                                                86KB

                                                                                                                                                                MD5

                                                                                                                                                                3b73078a714bf61d1c19ebc3afc0e454

                                                                                                                                                                SHA1

                                                                                                                                                                9abeabd74613a2f533e2244c9ee6f967188e4e7e

                                                                                                                                                                SHA256

                                                                                                                                                                ded54d1fcca07b6bff2bc3b9a1131eac29ff1f836e5d7a7c5c325ec5abe96e29

                                                                                                                                                                SHA512

                                                                                                                                                                75959d4e8a7649c3268b551a2a378e6d27c0bfb03d2422ebeeb67b0a3f78c079473214057518930f2d72773ce79b106fd2d78405e8e3d8883459dcbb49c163c4

                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\3582-490\1108c434532a4807b93ee6dea3f32efc_JaffaCakes118.exe

                                                                                                                                                                Filesize

                                                                                                                                                                259KB

                                                                                                                                                                MD5

                                                                                                                                                                864f9419859c1a2d58904d338c47a178

                                                                                                                                                                SHA1

                                                                                                                                                                944cbe1291e804242077a9300caf021ffa503bb9

                                                                                                                                                                SHA256

                                                                                                                                                                955599891677d7f91d0a44266f4af3b88d86f780b122dc6455fe5a419d1094a7

                                                                                                                                                                SHA512

                                                                                                                                                                53959fb7e67691cb667f308465af3a3951d0ec422070f7357bed1e6b86a14c9e2b59a24c89110387593b7be8db91bb7993a5d81e068bc943bfa95b2f65527f6d

                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\3582-490\1108c434532a4807b93ee6dea3f32efc_JaffaCakes118Srv.exe

                                                                                                                                                                Filesize

                                                                                                                                                                94KB

                                                                                                                                                                MD5

                                                                                                                                                                f6736faa3126f64ed4a7109e40c47806

                                                                                                                                                                SHA1

                                                                                                                                                                0d50917f44d6e173bac24916c95343616dcbf18c

                                                                                                                                                                SHA256

                                                                                                                                                                bc0cb854888c155cbfed860a6546bea3c82db643df30437fe14d91194939a874

                                                                                                                                                                SHA512

                                                                                                                                                                29cc26cd4df360252917a5d913e5e4776b6d05061b464f09dbb33918491affdc15cac9e142a9227a48f27d26db1f8ee85bd3d417365d6fef9b2fd380e090efe5

                                                                                                                                                              • memory/1244-17-0x0000000077452000-0x0000000077453000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                4KB

                                                                                                                                                              • memory/1244-16-0x000000007FE40000-0x000000007FE4C000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                48KB

                                                                                                                                                              • memory/1244-19-0x0000000077453000-0x0000000077454000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                4KB

                                                                                                                                                              • memory/1244-18-0x000000007FE40000-0x000000007FE4C000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                48KB

                                                                                                                                                              • memory/1244-20-0x000000007FE40000-0x000000007FE4C000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                48KB

                                                                                                                                                              • memory/1244-788-0x000000007FE40000-0x000000007FE4C000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                48KB

                                                                                                                                                              • memory/1244-790-0x0000000000400000-0x000000000041B000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                108KB

                                                                                                                                                              • memory/1244-374-0x000000007FE40000-0x000000007FE4C000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                48KB

                                                                                                                                                              • memory/1244-781-0x0000000000400000-0x000000000041B000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                108KB

                                                                                                                                                              • memory/1244-785-0x0000000000400000-0x000000000041B000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                108KB

                                                                                                                                                              • memory/1244-783-0x0000000000400000-0x000000000041B000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                108KB

                                                                                                                                                              • memory/1560-15-0x0000000002250000-0x0000000002251000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                4KB

                                                                                                                                                              • memory/1560-14-0x0000000000400000-0x0000000000441000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                260KB

                                                                                                                                                              • memory/2856-784-0x0000000000400000-0x000000000046E000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                440KB

                                                                                                                                                              • memory/2856-782-0x0000000000400000-0x000000000046E000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                440KB

                                                                                                                                                              • memory/2856-786-0x0000000000400000-0x000000000046E000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                440KB

                                                                                                                                                              • memory/2856-22-0x0000000000400000-0x000000000046E000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                440KB

                                                                                                                                                              • memory/2856-8-0x0000000000400000-0x000000000046E000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                440KB

                                                                                                                                                              • memory/2856-791-0x0000000000400000-0x000000000046E000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                440KB

                                                                                                                                                              • memory/2856-792-0x0000000000400000-0x000000000046E000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                440KB

                                                                                                                                                              • memory/2856-793-0x0000000000400000-0x000000000046E000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                440KB

                                                                                                                                                              • memory/2856-794-0x0000000000400000-0x000000000046E000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                440KB

                                                                                                                                                              • memory/2856-795-0x0000000000400000-0x000000000046E000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                440KB

                                                                                                                                                              • memory/2856-796-0x0000000000400000-0x000000000046E000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                440KB

                                                                                                                                                              • memory/2856-797-0x0000000000400000-0x000000000046E000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                440KB

                                                                                                                                                              • memory/2856-798-0x0000000000400000-0x000000000046E000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                440KB

                                                                                                                                                              • memory/2856-799-0x0000000000400000-0x000000000046E000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                440KB

                                                                                                                                                              • memory/2856-800-0x0000000000400000-0x000000000046E000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                440KB

                                                                                                                                                              • memory/2856-801-0x0000000000400000-0x000000000046E000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                440KB