Analysis
-
max time kernel
150s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08/10/2024, 20:32
Behavioral task
behavioral1
Sample
250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe
-
Size
365KB
-
MD5
250d6e20b66e94d649e384e9c6009b46
-
SHA1
ad41b87953a585129807dd6faaa3b9dc99a7b6f0
-
SHA256
18b37e46ffe259c9331feae700d61f3a04f23c2302a61ece63d5e2edda6340fd
-
SHA512
ebc38753fb8362d5edfb814e2e9bd6d4d916c1bc6ce2c88e0de8b6b605591cdb050265fc0b8dbdeec606da6c7054859af472ae1af0953e66bda950b6e7f8bc29
-
SSDEEP
6144:/VKWYkma3gcDLHb5CoPzs69KhWQl7FHG5AaBgXR1VHlZLC9CKc0IKxXbH8BKRJmG:/HYX8HbdP4gKhWQl05A0gXn9sCiTrcA1
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{3G4L2686-J4L1-X5MV-12RE-JFH5V38F5030} 250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3G4L2686-J4L1-X5MV-12RE-JFH5V38F5030}\StubPath = "C:\\Windows\\system32\\tro00ok\\Coffin Of Evil.exe Restart" 250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\xdocx = "C:\\Windows\\system32\\tro00ok\\Coffin Of Evil.exe" 250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xcrx = "C:\\Windows\\system32\\tro00ok\\Coffin Of Evil.exe" 250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\tro00ok\Coffin Of Evil.exe 250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\tro00ok\Coffin Of Evil.exe 250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/1672-0-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral2/memory/1672-2-0x0000000010410000-0x0000000010481000-memory.dmp upx behavioral2/memory/1672-1-0x0000000010410000-0x0000000010481000-memory.dmp upx behavioral2/memory/1672-5-0x0000000000590000-0x000000000059D000-memory.dmp upx behavioral2/memory/1672-10-0x00000000008E0000-0x00000000008ED000-memory.dmp upx behavioral2/memory/1672-13-0x00000000008F0000-0x00000000008FD000-memory.dmp upx behavioral2/memory/1672-18-0x0000000000900000-0x000000000090D000-memory.dmp upx behavioral2/memory/1672-17-0x0000000000900000-0x000000000090D000-memory.dmp upx behavioral2/memory/1672-21-0x0000000000910000-0x000000000091D000-memory.dmp upx behavioral2/memory/1672-22-0x0000000000910000-0x000000000091D000-memory.dmp upx behavioral2/memory/1672-26-0x0000000000920000-0x000000000092D000-memory.dmp upx behavioral2/memory/1672-25-0x0000000000920000-0x000000000092D000-memory.dmp upx behavioral2/memory/1672-29-0x0000000000930000-0x000000000093D000-memory.dmp upx behavioral2/memory/1672-33-0x0000000010490000-0x000000001049D000-memory.dmp upx behavioral2/memory/1672-34-0x0000000010490000-0x000000001049D000-memory.dmp upx behavioral2/memory/1672-39-0x0000000000940000-0x000000000094D000-memory.dmp upx behavioral2/memory/1672-41-0x00000000104A0000-0x00000000104AD000-memory.dmp upx behavioral2/memory/1672-42-0x00000000104A0000-0x00000000104AD000-memory.dmp upx behavioral2/memory/1672-46-0x00000000104B0000-0x00000000104BD000-memory.dmp upx behavioral2/memory/1672-49-0x00000000104C0000-0x00000000104CD000-memory.dmp upx behavioral2/memory/1672-50-0x00000000104C0000-0x00000000104CD000-memory.dmp upx behavioral2/memory/1672-54-0x00000000104D0000-0x00000000104DD000-memory.dmp upx behavioral2/memory/1672-57-0x00000000104E0000-0x00000000104ED000-memory.dmp upx behavioral2/memory/1672-59-0x00000000104E0000-0x00000000104ED000-memory.dmp upx behavioral2/memory/1672-62-0x00000000104F0000-0x00000000104FD000-memory.dmp upx behavioral2/memory/1672-61-0x00000000104F0000-0x00000000104FD000-memory.dmp upx behavioral2/memory/1672-65-0x0000000010500000-0x000000001050D000-memory.dmp upx behavioral2/memory/1672-66-0x0000000010500000-0x000000001050D000-memory.dmp upx behavioral2/memory/1672-338-0x0000000000400000-0x0000000000469000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1672 250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe 1672 250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe 1672 250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe 1672 250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1672 250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe Token: SeDebugPrivilege 1672 250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe Token: SeDebugPrivilege 1672 250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe Token: SeDebugPrivilege 1672 250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1672 wrote to memory of 3504 1672 250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe 86 PID 1672 wrote to memory of 3504 1672 250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe 86 PID 1672 wrote to memory of 3504 1672 250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe 86 PID 1672 wrote to memory of 3504 1672 250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe 86 PID 1672 wrote to memory of 3504 1672 250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe 86 PID 1672 wrote to memory of 3504 1672 250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe 86 PID 1672 wrote to memory of 3504 1672 250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe 86 PID 1672 wrote to memory of 3504 1672 250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe 86 PID 1672 wrote to memory of 3504 1672 250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe 86 PID 1672 wrote to memory of 3504 1672 250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe 86 PID 1672 wrote to memory of 3504 1672 250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe 86 PID 1672 wrote to memory of 3504 1672 250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe 86 PID 1672 wrote to memory of 3504 1672 250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe 86 PID 1672 wrote to memory of 3504 1672 250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe 86 PID 1672 wrote to memory of 3504 1672 250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe 86 PID 1672 wrote to memory of 3504 1672 250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe 86 PID 1672 wrote to memory of 3504 1672 250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe 86 PID 1672 wrote to memory of 3504 1672 250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe 86 PID 1672 wrote to memory of 3504 1672 250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe 86 PID 1672 wrote to memory of 3504 1672 250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe 86 PID 1672 wrote to memory of 3504 1672 250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe 86 PID 1672 wrote to memory of 3504 1672 250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe 86 PID 1672 wrote to memory of 3504 1672 250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe 86 PID 1672 wrote to memory of 3504 1672 250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe 86 PID 1672 wrote to memory of 3504 1672 250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe 86 PID 1672 wrote to memory of 3504 1672 250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe 86 PID 1672 wrote to memory of 3504 1672 250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe 86 PID 1672 wrote to memory of 3504 1672 250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe 86 PID 1672 wrote to memory of 3504 1672 250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe 86 PID 1672 wrote to memory of 3504 1672 250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe 86 PID 1672 wrote to memory of 3504 1672 250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe 86 PID 1672 wrote to memory of 3504 1672 250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe 86 PID 1672 wrote to memory of 3504 1672 250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe 86 PID 1672 wrote to memory of 3504 1672 250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe 86 PID 1672 wrote to memory of 3504 1672 250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe 86 PID 1672 wrote to memory of 3504 1672 250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe 86 PID 1672 wrote to memory of 3504 1672 250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe 86 PID 1672 wrote to memory of 3504 1672 250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe 86 PID 1672 wrote to memory of 3504 1672 250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe 86 PID 1672 wrote to memory of 3504 1672 250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe 86 PID 1672 wrote to memory of 3504 1672 250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe 86 PID 1672 wrote to memory of 3504 1672 250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe 86 PID 1672 wrote to memory of 3504 1672 250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe 86 PID 1672 wrote to memory of 3504 1672 250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe 86 PID 1672 wrote to memory of 3504 1672 250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe 86 PID 1672 wrote to memory of 3504 1672 250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe 86 PID 1672 wrote to memory of 3504 1672 250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe 86 PID 1672 wrote to memory of 3504 1672 250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe 86 PID 1672 wrote to memory of 3504 1672 250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe 86 PID 1672 wrote to memory of 3504 1672 250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe 86 PID 1672 wrote to memory of 3504 1672 250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe 86 PID 1672 wrote to memory of 3504 1672 250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe 86 PID 1672 wrote to memory of 3504 1672 250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe 86 PID 1672 wrote to memory of 3504 1672 250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe 86 PID 1672 wrote to memory of 3504 1672 250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe 86 PID 1672 wrote to memory of 3504 1672 250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe 86 PID 1672 wrote to memory of 3504 1672 250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe 86 PID 1672 wrote to memory of 3504 1672 250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe 86 PID 1672 wrote to memory of 3504 1672 250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe 86 PID 1672 wrote to memory of 3504 1672 250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe 86 PID 1672 wrote to memory of 3504 1672 250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe 86 PID 1672 wrote to memory of 3504 1672 250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe 86 PID 1672 wrote to memory of 3504 1672 250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe 86 PID 1672 wrote to memory of 3504 1672 250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe 86
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:612
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"2⤵PID:784
-
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:316
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:676
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:780
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵PID:796
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding2⤵PID:2996
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:3772
-
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca2⤵PID:3860
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:3972
-
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca2⤵PID:4056
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:3608
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:4176
-
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding2⤵PID:4212
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:4136
-
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca2⤵PID:3332
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca2⤵PID:1148
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:1036
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:456
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS -p1⤵PID:904
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:960
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:408
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:920
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1064
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1072
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p1⤵PID:1084
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1204
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵PID:740
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1240
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:1288
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1400
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:3012
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1412
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1424
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1440
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1448
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1536
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1648
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1700
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1740
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1816
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1832
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1996
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:2004
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:1304
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:1016
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2088
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:2132
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p1⤵PID:2192
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2236
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2296
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2492
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2500
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵PID:2672
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2732
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2748
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2768
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2784
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:3060
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵PID:3240
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:3380
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3456
-
C:\Users\Admin\AppData\Local\Temp\250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\250d6e20b66e94d649e384e9c6009b46_JaffaCakes118.exe"2⤵
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:3504
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3588
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:5092
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:3500
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:1104
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵PID:2528
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:4188
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:2028
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc1⤵PID:4404