Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 13:57
Static task
static1
Behavioral task
behavioral1
Sample
13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe
-
Size
172KB
-
MD5
13a1bbd889568a82d0bfb40250cbf405
-
SHA1
495cbe65cba2daa7af0a6a4d10ceb21d214a9c81
-
SHA256
dfcc7eeda56b87ae97090535417612ec16ec43541f8112118ecc3afeb6895984
-
SHA512
eb2f28497c7e81f14db284d610d9be9b737acfdbcd4cd20e8175e232ecec112ff8bdf4da1000e5aef9ae54b4c2d0f1253143424d7f0b8c954e43e35b7db7bc32
-
SSDEEP
3072:ORd6mFnOOQeSWPlKg7ZSBYfkVoFdRrqo0aRaA/HF673+UWHIfr:P4nOpZSBNkVsuaRaU6mHG
Malware Config
Signatures
-
Modifies security service 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" reg.exe -
Loads dropped DLL 4 IoCs
pid Process 1808 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe 1808 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe 1808 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe 1808 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\MSWINSCK.OCX 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\HELPDIR 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\ProgID\ = "MSWinsock.Winsock.1" 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD897-BB45-11CF-9ABC-0080C7E7B78D}\InprocServer32 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD897-BB45-11CF-9ABC-0080C7E7B78D} 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\FLAGS 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\ProxyStubClsid32 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\InprocServer32\ThreadingModel = "Apartment" 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock.1 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Control 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D} 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\ = "IMSWinsockControl" 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\ = "{248DD890-BB45-11CF-9ABC-0080C7E7B78D}" 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock.1\CLSID 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Implemented Categories 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\HELPDIR\ 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD897-BB45-11CF-9ABC-0080C7E7B78D}\InprocServer32\ = "C:\\Windows\\SysWow64\\MSWINSCK.OCX" 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\Version = "1.0" 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D} 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\InprocServer32\ = "C:\\Windows\\SysWow64\\MSWINSCK.OCX" 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock\ = "Microsoft WinSock Control, version 6.0" 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\VersionIndependentProgID\ = "MSWinsock.Winsock" 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock\CurVer\ = "MSWinsock.Winsock.1" 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock.1\CLSID\ = "{248DD896-BB45-11CF-9ABC-0080C7E7B78D}" 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D} 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\VersionIndependentProgID 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D} 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\ = "IMSWinsockControl" 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\ = "{248DD890-BB45-11CF-9ABC-0080C7E7B78D}" 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\ = "{248DD890-BB45-11CF-9ABC-0080C7E7B78D}" 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock\CLSID 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Implemented Categories\{40FC6ED5-2438-11CF-A3DB-080036F12502} 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\ToolboxBitmap32 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\ProxyStubClsid32 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D} 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Implemented Categories\{0DE86A57-2BAA-11CF-A229-00AA003D7352} 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Programmable 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D} 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\InprocServer32 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock\CLSID\ = "{248DD896-BB45-11CF-9ABC-0080C7E7B78D}" 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\ = "{248DD890-BB45-11CF-9ABC-0080C7E7B78D}" 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\Version = "1.0" 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\Version = "1.0" 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\ = "DMSWinsockControlEvents" 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\MiscStatus\1\ = "132497" 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Implemented Categories\{40FC6ED4-2438-11CF-A3DB-080036F12502} 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\ProgID 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\FLAGS\ = "2" 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\ProxyStubClsid32 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\0\win32\ = "C:\\Windows\\SysWow64\\MSWINSCK.OCX" 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D} 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\MiscStatus\1 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Implemented Categories\{0DE86A52-2BAA-11CF-A229-00AA003D7352} 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\0\win32 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD897-BB45-11CF-9ABC-0080C7E7B78D} 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\ = "{248DD890-BB45-11CF-9ABC-0080C7E7B78D}" 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe -
Runs net.exe
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1808 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 1808 wrote to memory of 2328 1808 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe 28 PID 1808 wrote to memory of 2328 1808 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe 28 PID 1808 wrote to memory of 2328 1808 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe 28 PID 1808 wrote to memory of 2328 1808 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe 28 PID 1808 wrote to memory of 2844 1808 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe 29 PID 1808 wrote to memory of 2844 1808 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe 29 PID 1808 wrote to memory of 2844 1808 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe 29 PID 1808 wrote to memory of 2844 1808 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe 29 PID 1808 wrote to memory of 2952 1808 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe 31 PID 1808 wrote to memory of 2952 1808 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe 31 PID 1808 wrote to memory of 2952 1808 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe 31 PID 1808 wrote to memory of 2952 1808 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe 31 PID 1808 wrote to memory of 3028 1808 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe 33 PID 1808 wrote to memory of 3028 1808 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe 33 PID 1808 wrote to memory of 3028 1808 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe 33 PID 1808 wrote to memory of 3028 1808 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe 33 PID 1808 wrote to memory of 2552 1808 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe 35 PID 1808 wrote to memory of 2552 1808 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe 35 PID 1808 wrote to memory of 2552 1808 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe 35 PID 1808 wrote to memory of 2552 1808 13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe 35 PID 2328 wrote to memory of 2596 2328 cmd.exe 38 PID 2328 wrote to memory of 2596 2328 cmd.exe 38 PID 2328 wrote to memory of 2596 2328 cmd.exe 38 PID 2328 wrote to memory of 2596 2328 cmd.exe 38 PID 2844 wrote to memory of 2864 2844 cmd.exe 39 PID 2844 wrote to memory of 2864 2844 cmd.exe 39 PID 2844 wrote to memory of 2864 2844 cmd.exe 39 PID 2844 wrote to memory of 2864 2844 cmd.exe 39 PID 3028 wrote to memory of 2644 3028 cmd.exe 41 PID 3028 wrote to memory of 2644 3028 cmd.exe 41 PID 3028 wrote to memory of 2644 3028 cmd.exe 41 PID 3028 wrote to memory of 2644 3028 cmd.exe 41 PID 2552 wrote to memory of 2856 2552 cmd.exe 40 PID 2552 wrote to memory of 2856 2552 cmd.exe 40 PID 2552 wrote to memory of 2856 2552 cmd.exe 40 PID 2552 wrote to memory of 2856 2552 cmd.exe 40 PID 2596 wrote to memory of 2648 2596 net.exe 42 PID 2596 wrote to memory of 2648 2596 net.exe 42 PID 2596 wrote to memory of 2648 2596 net.exe 42 PID 2596 wrote to memory of 2648 2596 net.exe 42 PID 2864 wrote to memory of 2452 2864 net.exe 43 PID 2864 wrote to memory of 2452 2864 net.exe 43 PID 2864 wrote to memory of 2452 2864 net.exe 43 PID 2864 wrote to memory of 2452 2864 net.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\13a1bbd889568a82d0bfb40250cbf405_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop "Security Center"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\SysWOW64\net.exenet stop "Security Center"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Security Center"4⤵
- System Location Discovery: System Language Discovery
PID:2648
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop SharedAccess2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵
- System Location Discovery: System Language Discovery
PID:2452
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess" /v Start /t REG_DWORD /d 0x4 /f2⤵
- System Location Discovery: System Language Discovery
PID:2952
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c reg add "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /v Start /t REG_DWORD /d 0x4 /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /v Start /t REG_DWORD /d 0x4 /f3⤵
- Modifies security service
- System Location Discovery: System Language Discovery
PID:2644
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c reg add "HKLM\SYSTEM\CurrentControlSet\Services\wscsvc" /v Start /t REG_DWORD /d 0x4 /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Services\wscsvc" /v Start /t REG_DWORD /d 0x4 /f3⤵
- Modifies security service
- System Location Discovery: System Language Discovery
PID:2856
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105KB
MD59484c04258830aa3c2f2a70eb041414c
SHA1b242a4fb0e9dcf14cb51dc36027baff9a79cb823
SHA256bf7e47c16d7e1c0e88534f4ef95e09d0fd821ed1a06b0d95a389b35364b63ff5
SHA5129d0e9f0d88594746ba41ea4a61a53498619eda596e12d8ec37d01cfe8ceb08be13e3727c83d630a6d9e6d03066f62444bb94ea5a0d2ed9d21a270e612db532a0