Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-10-2024 00:57
Behavioral task
behavioral1
Sample
158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe
-
Size
913KB
-
MD5
158d07c37f56412ce5f16891448e7b65
-
SHA1
87df1f1b527f28875ca1590543ca51ae12797b3a
-
SHA256
385f5ca91b0a230a14f5d32c79d061a3af0f5533923ad62e1982d1327ed086a4
-
SHA512
1929152e647609b9eb5cbba588163cf48388e7c3e3493d2c16038eed4b35465bd9842afa166cf73d4d6bfefe3590be622c81f55e164ca08d4f1a3d6e618e5de5
-
SSDEEP
24576:kPp9AR95SkXpgex+Bp+MN7N2y90rgF1oeQo:kPpKRSk7xup+kN21gFR
Malware Config
Extracted
xloader
2.3
b6cu
votreconseilfinancier.com
wholesaleplay.com
komfy.store
hsyunfan.com
tournamenttips.com
yourbusine.xyz
wrg-referrals.com
harmless-oily.com
whizdomtowealth.com
xusmods.com
cleanerstoday.com
finopscert.com
paerexpress.com
kankb.com
res-o.info
balonpantolon.com
freedownloadbiz.info
jeffegriffin.com
gobahis119.com
ourcalvinsarm.com
jvbgroups.com
umsio.com
byritcn.com
darunfanzhi.com
hwshen.com
lifelooker.bid
1xbetmart8.online
aleitzeventdecor.com
realxxxx.com
jellenllc.com
attalaschools.com
thestripcitydeli.com
dynamite-tacos.com
styleandsoulshift.com
mamafacil.com
de-handyman.com
amazon-accountserviceapp.com
funfactshub.com
luminancevivant.com
magemutfak.com
alwaysbuyused.com
autentiskommunikation.one
marrakechdesignartisanal.com
blun33.com
ericalife.com
escuelaiztapalapavd.com
lockalock.com
dollaroneshop.com
xn--pckxbp6bzgv915dgbf.website
treasureecomllc.com
tiantianhanju.com
gotothishygienist.com
peamon.net
9westholdings.com
casinovulkan.bid
dmdrafttech.com
brixtonpattycompany.com
stop-masquerade.com
webuyepa.com
influencersden.com
mgm2348543.com
subusastry.com
bharathub.net
africanmusiccharts.com
xn--marketingrevolucin-61b.com
Signatures
-
Detect Neshta payload 6 IoCs
Processes:
resource yara_rule C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE family_neshta behavioral2/memory/3196-105-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3196-108-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3196-110-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta C:\Windows\svchost.com family_neshta behavioral2/memory/4508-125-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
Processes:
158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Oracle\VirtualBox Guest Additions 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe -
Xloader payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4688-127-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
Processes:
158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\VMware, Inc.\VMware Tools 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe -
Executes dropped EXE 3 IoCs
Processes:
158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exesvchost.com158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exepid process 232 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe 4508 svchost.com 4688 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exedescription pid process target process PID 232 set thread context of 4688 232 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe -
Drops file in Program Files directory 64 IoCs
Processes:
158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exedescription ioc process File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13195~1.15\MI9C33~1.EXE 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~4.EXE 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOBD5D~1.EXE 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOF5E2~1.EXE 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13195~1.15\MICROS~4.EXE 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13195~1.15\MI391D~1.EXE 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\Download\{F3C4F~1\13195~1.15\MICROS~1.EXE 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GO664E~1.EXE 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13195~1.15\MICROS~3.EXE 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe -
Drops file in Windows directory 3 IoCs
Processes:
158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exesvchost.comdescription ioc process File opened for modification C:\Windows\svchost.com 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exesvchost.comschtasks.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Modifies registry class 2 IoCs
Processes:
158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exepid process 232 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe 4688 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe 4688 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exedescription pid process Token: SeDebugPrivilege 232 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exesvchost.comdescription pid process target process PID 3196 wrote to memory of 232 3196 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe PID 3196 wrote to memory of 232 3196 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe PID 3196 wrote to memory of 232 3196 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe PID 232 wrote to memory of 4508 232 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe svchost.com PID 232 wrote to memory of 4508 232 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe svchost.com PID 232 wrote to memory of 4508 232 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe svchost.com PID 4508 wrote to memory of 1760 4508 svchost.com schtasks.exe PID 4508 wrote to memory of 1760 4508 svchost.com schtasks.exe PID 4508 wrote to memory of 1760 4508 svchost.com schtasks.exe PID 232 wrote to memory of 4688 232 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe PID 232 wrote to memory of 4688 232 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe PID 232 wrote to memory of 4688 232 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe PID 232 wrote to memory of 4688 232 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe PID 232 wrote to memory of 4688 232 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe PID 232 wrote to memory of 4688 232 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe 158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Users\Admin\AppData\Local\Temp\3582-490\158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe"2⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\xHBDpNzPl" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5AEC.tmp"3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Windows\SysWOW64\schtasks.exeC:\Windows\System32\schtasks.exe /Create /TN Updates\xHBDpNzPl /XML C:\Users\Admin\AppData\Local\Temp\tmp5AEC.tmp4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1760
-
-
-
C:\Users\Admin\AppData\Local\Temp\3582-490\158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\158d07c37f56412ce5f16891448e7b65_JaffaCakes118.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4688
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
1Change Default File Association
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Event Triggered Execution
1Change Default File Association
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
86KB
MD53b73078a714bf61d1c19ebc3afc0e454
SHA19abeabd74613a2f533e2244c9ee6f967188e4e7e
SHA256ded54d1fcca07b6bff2bc3b9a1131eac29ff1f836e5d7a7c5c325ec5abe96e29
SHA51275959d4e8a7649c3268b551a2a378e6d27c0bfb03d2422ebeeb67b0a3f78c079473214057518930f2d72773ce79b106fd2d78405e8e3d8883459dcbb49c163c4
-
Filesize
873KB
MD5e87195f4daff005015ee540693c1a373
SHA164502c119e9d4807f2ed8fde8d528f840c0e471f
SHA256509dec0d81afd4184e215b8e979e6e3e32dd41f04a6bdcfb3ff800991157066c
SHA512a42c17141cd8964dae192fbd5eb403fe71023289ef3414a90e82389df7e0e2498945fa656e03dd5ee4614e4718928aa227dab6a915bb8a4c19ab3b250ea6ea7d
-
Filesize
8B
MD5cc172d0754cd0a94365b7991ce81043a
SHA1151f31f8abd04098ba61964a719245fe98a3e206
SHA25683b458825916a7f5f807cd7e3562063d3d323f4114e1fb5a9e9d94132b70d1b4
SHA512c3604db10bb0b8e9b45be19c3f619ca937c5fa8a936af7f35c9e6fa3e85229af59b6f03ebb27e7d1a2e0f5c8e793ace547b5ce682a32f3680cdb4cfd51199967
-
Filesize
40KB
MD536fd5e09c417c767a952b4609d73a54b
SHA1299399c5a2403080a5bf67fb46faec210025b36d
SHA256980bac6c9afe8efc9c6fe459a5f77213b0d8524eb00de82437288eb96138b9a2
SHA5121813a6a5b47a9b2cd3958cf4556714ae240f2aa19d0a241b596830f0f2b89a33ec864d00ce6a791d323a58dfbff42a0fded65eefbf980c92685e25c0ec415d92