Analysis
-
max time kernel
143s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
13-10-2024 20:14
Static task
static1
Behavioral task
behavioral1
Sample
41dd108ada487cb93a6e099e074f605b_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
41dd108ada487cb93a6e099e074f605b_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
41dd108ada487cb93a6e099e074f605b_JaffaCakes118.exe
-
Size
382KB
-
MD5
41dd108ada487cb93a6e099e074f605b
-
SHA1
354f9fcee3214078d2bc5e3ea55c6b678c2fe2bf
-
SHA256
aebce4939ad8d8df9d1807debb140669e47a24c71b7978249362d3b0900c33f3
-
SHA512
33adb352e06e779871224ce094954756f15e49785fc14f8c8a02476b420b00907961d3489944c2da42fa84e8185f0f6bc7eefde58ebc4ae213fed9bfa1b5932b
-
SSDEEP
6144:n0Ly6qr9+br6u1yvZgQHhEaBTuPwyQ9Hmdy1MsZ:nxF9FZhH+aBaPUGY1M+
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.txt
cerber
http://4kqd3hmqgptupi3p.wins4n.win/5172-FC6C-66A7-0078-1A4F
http://4kqd3hmqgptupi3p.we34re.top/5172-FC6C-66A7-0078-1A4F
http://4kqd3hmqgptupi3p.5kti58.top/5172-FC6C-66A7-0078-1A4F
http://4kqd3hmqgptupi3p.vmckfi.top/5172-FC6C-66A7-0078-1A4F
http://4kqd3hmqgptupi3p.onion.to/5172-FC6C-66A7-0078-1A4F
http://4kqd3hmqgptupi3p.onion/5172-FC6C-66A7-0078-1A4F
Extracted
C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.html
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Contacts a large (16388) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{597428CD-E3C0-EB4B-E446-8C8911820BC1}\\ARP.EXE\"" 41dd108ada487cb93a6e099e074f605b_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{597428CD-E3C0-EB4B-E446-8C8911820BC1}\\ARP.EXE\"" ARP.EXE -
Deletes itself 1 IoCs
pid Process 2496 cmd.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\ARP.lnk 41dd108ada487cb93a6e099e074f605b_JaffaCakes118.exe -
Executes dropped EXE 3 IoCs
pid Process 2156 ARP.EXE 2728 ARP.EXE 2176 ARP.EXE -
Loads dropped DLL 2 IoCs
pid Process 1680 41dd108ada487cb93a6e099e074f605b_JaffaCakes118.exe 2156 ARP.EXE -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\ARP = "\"C:\\Users\\Admin\\AppData\\Roaming\\{597428CD-E3C0-EB4B-E446-8C8911820BC1}\\ARP.EXE\"" 41dd108ada487cb93a6e099e074f605b_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\ARP = "\"C:\\Users\\Admin\\AppData\\Roaming\\{597428CD-E3C0-EB4B-E446-8C8911820BC1}\\ARP.EXE\"" 41dd108ada487cb93a6e099e074f605b_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\ARP = "\"C:\\Users\\Admin\\AppData\\Roaming\\{597428CD-E3C0-EB4B-E446-8C8911820BC1}\\ARP.EXE\"" ARP.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\ARP = "\"C:\\Users\\Admin\\AppData\\Roaming\\{597428CD-E3C0-EB4B-E446-8C8911820BC1}\\ARP.EXE\"" ARP.EXE -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ARP.EXE -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ipinfo.io -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp736B.bmp" ARP.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ARP.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 41dd108ada487cb93a6e099e074f605b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ARP.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ARP.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2496 cmd.exe 2264 PING.EXE -
Kills process with taskkill 1 IoCs
pid Process 2912 taskkill.exe -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Control Panel\Desktop 41dd108ada487cb93a6e099e074f605b_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{597428CD-E3C0-EB4B-E446-8C8911820BC1}\\ARP.EXE\"" 41dd108ada487cb93a6e099e074f605b_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Control Panel\Desktop ARP.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{597428CD-E3C0-EB4B-E446-8C8911820BC1}\\ARP.EXE\"" ARP.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecf3e4259aa05419b9c0951a15b131900000000020000000000106600000001000020000000d84bc558099a4f8cdaba401898ce43fa88b05cfbbf75d7000c021c908a81c9df000000000e800000000200002000000099d5d8813d027434af9a147123095a69df2a23b3fa63898d79da3a87ead583cb200000002677835e89ea6bda51461cd015e7497fd1b0905588f7d20efe3417f709387aea400000002904eebecf9f17b80478265c9083392c5dee430093a3c7816f4607176e80d324c88dceb319239cec501bf8c249c19a1d9e84a36386d3a09dadd70c0a72572878 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{25E574B1-89A0-11EF-93C8-7227CCB080AF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10e277e9ac1ddb01 iexplore.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2264 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2156 ARP.EXE 2156 ARP.EXE 2156 ARP.EXE 2156 ARP.EXE 2156 ARP.EXE 2156 ARP.EXE 2156 ARP.EXE 2156 ARP.EXE 2156 ARP.EXE 2156 ARP.EXE 2156 ARP.EXE 2156 ARP.EXE 2156 ARP.EXE 2156 ARP.EXE 2156 ARP.EXE 2156 ARP.EXE 2156 ARP.EXE 2156 ARP.EXE 2156 ARP.EXE 2156 ARP.EXE 2156 ARP.EXE 2156 ARP.EXE 2156 ARP.EXE 2156 ARP.EXE 2156 ARP.EXE 2156 ARP.EXE 2156 ARP.EXE 2156 ARP.EXE 2156 ARP.EXE 2156 ARP.EXE 2156 ARP.EXE 2156 ARP.EXE 2156 ARP.EXE 2156 ARP.EXE 2156 ARP.EXE 2156 ARP.EXE 2156 ARP.EXE 2156 ARP.EXE 2156 ARP.EXE 2156 ARP.EXE 2156 ARP.EXE 2156 ARP.EXE 2156 ARP.EXE 2156 ARP.EXE 2156 ARP.EXE 2156 ARP.EXE 2156 ARP.EXE 2156 ARP.EXE 2156 ARP.EXE 2156 ARP.EXE 2156 ARP.EXE 2156 ARP.EXE 2156 ARP.EXE 2156 ARP.EXE 2156 ARP.EXE 2156 ARP.EXE 2156 ARP.EXE 2156 ARP.EXE 2156 ARP.EXE 2156 ARP.EXE 2156 ARP.EXE 2156 ARP.EXE 2156 ARP.EXE 2156 ARP.EXE -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 1680 41dd108ada487cb93a6e099e074f605b_JaffaCakes118.exe Token: SeDebugPrivilege 2156 ARP.EXE Token: SeDebugPrivilege 2912 taskkill.exe Token: SeDebugPrivilege 2728 ARP.EXE Token: SeDebugPrivilege 2176 ARP.EXE Token: 33 616 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 616 AUDIODG.EXE Token: 33 616 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 616 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1788 iexplore.exe 1788 iexplore.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1788 iexplore.exe 1788 iexplore.exe 2216 IEXPLORE.EXE 2216 IEXPLORE.EXE 1788 iexplore.exe 1788 iexplore.exe 784 IEXPLORE.EXE 784 IEXPLORE.EXE -
Suspicious use of UnmapMainImage 4 IoCs
pid Process 1680 41dd108ada487cb93a6e099e074f605b_JaffaCakes118.exe 2156 ARP.EXE 2728 ARP.EXE 2176 ARP.EXE -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 1680 wrote to memory of 2156 1680 41dd108ada487cb93a6e099e074f605b_JaffaCakes118.exe 30 PID 1680 wrote to memory of 2156 1680 41dd108ada487cb93a6e099e074f605b_JaffaCakes118.exe 30 PID 1680 wrote to memory of 2156 1680 41dd108ada487cb93a6e099e074f605b_JaffaCakes118.exe 30 PID 1680 wrote to memory of 2156 1680 41dd108ada487cb93a6e099e074f605b_JaffaCakes118.exe 30 PID 1680 wrote to memory of 2496 1680 41dd108ada487cb93a6e099e074f605b_JaffaCakes118.exe 31 PID 1680 wrote to memory of 2496 1680 41dd108ada487cb93a6e099e074f605b_JaffaCakes118.exe 31 PID 1680 wrote to memory of 2496 1680 41dd108ada487cb93a6e099e074f605b_JaffaCakes118.exe 31 PID 1680 wrote to memory of 2496 1680 41dd108ada487cb93a6e099e074f605b_JaffaCakes118.exe 31 PID 2496 wrote to memory of 2912 2496 cmd.exe 33 PID 2496 wrote to memory of 2912 2496 cmd.exe 33 PID 2496 wrote to memory of 2912 2496 cmd.exe 33 PID 2496 wrote to memory of 2912 2496 cmd.exe 33 PID 2496 wrote to memory of 2264 2496 cmd.exe 35 PID 2496 wrote to memory of 2264 2496 cmd.exe 35 PID 2496 wrote to memory of 2264 2496 cmd.exe 35 PID 2496 wrote to memory of 2264 2496 cmd.exe 35 PID 2984 wrote to memory of 2728 2984 taskeng.exe 38 PID 2984 wrote to memory of 2728 2984 taskeng.exe 38 PID 2984 wrote to memory of 2728 2984 taskeng.exe 38 PID 2984 wrote to memory of 2728 2984 taskeng.exe 38 PID 2984 wrote to memory of 2176 2984 taskeng.exe 39 PID 2984 wrote to memory of 2176 2984 taskeng.exe 39 PID 2984 wrote to memory of 2176 2984 taskeng.exe 39 PID 2984 wrote to memory of 2176 2984 taskeng.exe 39 PID 2156 wrote to memory of 1788 2156 ARP.EXE 41 PID 2156 wrote to memory of 1788 2156 ARP.EXE 41 PID 2156 wrote to memory of 1788 2156 ARP.EXE 41 PID 2156 wrote to memory of 1788 2156 ARP.EXE 41 PID 2156 wrote to memory of 1712 2156 ARP.EXE 42 PID 2156 wrote to memory of 1712 2156 ARP.EXE 42 PID 2156 wrote to memory of 1712 2156 ARP.EXE 42 PID 2156 wrote to memory of 1712 2156 ARP.EXE 42 PID 1788 wrote to memory of 2216 1788 iexplore.exe 43 PID 1788 wrote to memory of 2216 1788 iexplore.exe 43 PID 1788 wrote to memory of 2216 1788 iexplore.exe 43 PID 1788 wrote to memory of 2216 1788 iexplore.exe 43 PID 1788 wrote to memory of 784 1788 iexplore.exe 44 PID 1788 wrote to memory of 784 1788 iexplore.exe 44 PID 1788 wrote to memory of 784 1788 iexplore.exe 44 PID 1788 wrote to memory of 784 1788 iexplore.exe 44 PID 2156 wrote to memory of 2728 2156 ARP.EXE 45 PID 2156 wrote to memory of 2728 2156 ARP.EXE 45 PID 2156 wrote to memory of 2728 2156 ARP.EXE 45 PID 2156 wrote to memory of 2728 2156 ARP.EXE 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\41dd108ada487cb93a6e099e074f605b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\41dd108ada487cb93a6e099e074f605b_JaffaCakes118.exe"1⤵
- Adds policy Run key to start application
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\AppData\Roaming\{597428CD-E3C0-EB4B-E446-8C8911820BC1}\ARP.EXE"C:\Users\Admin\AppData\Roaming\{597428CD-E3C0-EB4B-E446-8C8911820BC1}\ARP.EXE"2⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1788 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2216
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1788 CREDAT:406530 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:784
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt3⤵PID:1712
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"3⤵PID:2728
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "41dd108ada487cb93a6e099e074f605b_JaffaCakes118.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\41dd108ada487cb93a6e099e074f605b_JaffaCakes118.exe" > NUL2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "41dd108ada487cb93a6e099e074f605b_JaffaCakes118.exe"3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2912
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2264
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {6667BD84-89AA-488C-90C6-09CC14478DC0} S-1-5-21-3692679935-4019334568-335155002-1000:BCXRJFKE\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Users\Admin\AppData\Roaming\{597428CD-E3C0-EB4B-E446-8C8911820BC1}\ARP.EXEC:\Users\Admin\AppData\Roaming\{597428CD-E3C0-EB4B-E446-8C8911820BC1}\ARP.EXE2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
PID:2728
-
-
C:\Users\Admin\AppData\Roaming\{597428CD-E3C0-EB4B-E446-8C8911820BC1}\ARP.EXEC:\Users\Admin\AppData\Roaming\{597428CD-E3C0-EB4B-E446-8C8911820BC1}\ARP.EXE2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
PID:2176
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵
- System Location Discovery: System Language Discovery
PID:2072
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0xd01⤵
- Suspicious use of AdjustPrivilegeToken
PID:616
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD503787648da874bdd94a73d5e888a6338
SHA16636e51f13ec39a3fbde51342249ec047923d8fa
SHA256b1ef9f8e2bcae5357e5d70a8705d81b426e07e869ef4d9205cb64efec70b59aa
SHA5122fbdd8ada988ae0c0f79173e4e56cd285923f9460b1e5596397af3ebfc407424ebf1ac14068b04f85428764dcbf167f62cee481ef2ce13c3e41f663ca3819399
-
Filesize
10KB
MD567033c93baca651869b234fcc36e36c4
SHA1a2c7c5401a6f8f808eb8e7eeda10e0dad1498b32
SHA2566c112b0c49b6bd0c57d890a37efa859c406240efc628fbe54a06e4b0c351bdd6
SHA512ec3aa3d40e9f90ca29442cc25dd8f46a153b31eae89dff990ffc256382a448eb8c078f82f938dbd641ad6292476c41507d74debd650ac252dd96b13fe3041781
-
Filesize
85B
MD58221850eb3808a80296b793a340cda76
SHA1cb0ed48747cabc87b4c545f18bae15c8fbe325ce
SHA256f9616b245550b48faaf08c3999a6609c907d6f923ba9f8f1be244fc7786748c1
SHA5122eb5dc0fd566c53462753f23c1cf29b0220daafd824f502ed9e7171f8c5e51f4b4789a13a4209be26d1bcc433f485cdfd8fe175a37c5899f0c44305f97308fda
-
Filesize
231B
MD59d8c4bfbd009c4d6001e2125abaa8b02
SHA1cd040558172b5fca5b200447a281843956243741
SHA256a652297987f14317100f8c5f7eb26d1bc67eb8a64f0b39b72b5fd5046a9f29b0
SHA512c4c84f43642b805a105acce9ebc9f01aa0e6ef553ea32be3f8b890fc7440f0b7d3ddf99b9336bce20ce7a3d9b9f6434a704651a8af425ffc8407ba39d5de735f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1d0c9e897d2796abbef5bcb3adfcaa5
SHA143e63f36fe284f4eba5d6ae866990f9f42dd6180
SHA256727eb7b3d8c47fe20baaa7e9b4fe07953c41a892637a228546d5b59eda3f8231
SHA51286cf56fd9d0b9df8e6f6d8c9ddcb05e12e37d3b72c0704dda3d120476500d022afd95c53aa07bcee427fe708dde74dd95dfe0e743869aa029dd1594c02e47fb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2ae1b5448088601be3ba8207c14d2f0
SHA1ff63aa34416e49fafa1349f04d88a2381c3e4c32
SHA2566395c626627ac1c0cfa4625c8a2ee7550aa19107807f0a7f795db3cc4cf8b92b
SHA5122e7c6af70f805af03495253c0211c717485bab52b60c69a087cd14ac687eb2721ead6a9368f1fbf974f241e504b62407cba95298fa810f25247709284ea6e004
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513b0b54288e609f7a986cbbc8ad76bc9
SHA1f43640b42f8becc5de333cad5066df43e4b870e1
SHA2569cec47f6e7018a51b92d76185da7ea42c1b73883f6db18fc7f24f885d3af9f5d
SHA5121622d34d8044078c33790c9186b975befc867954e024fed3e710b67f1b6a4214b557c7d48faee61f5b1c1b2d07d190a6b172e6dc4337144d361cb17cc832dba7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c00b33ddb9f3e429cb3f1b7ba7f37b7
SHA13372e282f2c9ffda5103c7c6b0cb91845aa0e57e
SHA2567b0b0a1e2c22171ea9179ac90314e254d497cc0c3aaca6342e09bab245faebf6
SHA512de91100942d1a4b4922ffd5b026fec00dc55a3db84f57d36a387202998660b510632e55d45b4fef50589c85ab71e5b6092a99d7b413d55f2a8bb32b27a74a3c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5902c672975d9001f87fe98ef6e7d1814
SHA159469017a67b018656aea1925a3d25ecb6dd90b5
SHA256db680abd9158a185ddc4c9ca339c45269f83c03ec2162cb60b5f156967ce7501
SHA512cbbd51172b1b63988b6da44fba66e247dbb124adf124c156778f621089cb57778795685a3679a6390eee2549a4a182b79e558f6f904cd2ce926142310654edeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517fc087ec57206106afbd44ff246cd2f
SHA14333b77061ddb7ab73ec3a48633bc29654398133
SHA256b19913fff61ab13a93d1b9518c24a3fda45c9d9e41ff13d3cf83043a4fdda23a
SHA51257c4ad103fa962d41266d8a60431ccafe5db43c2083f3d79544dee397046d256d6bcf5c99ca4552ba38c36d68c9f395ad7d342d5469f18ab9fd2197635355dba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2879b1cbcd8916cf2b7ad3228576340
SHA185cb3091ab2812d205a27387d5fca119048c9acf
SHA2562cb06e8a830fec35c49c6ff34e51f022299b56cd6e728842bb270d8374277da2
SHA512e0d2f4401f66d336b3e5ad22d69c8d34097d484be6265f4ca904b856116556e9224a9f1d91e2ccdeb83338f78b80327a3318db1a89910b2798c18fe840784db5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52770d83d64e23f0817c469847d361bd0
SHA1ffa7cafef426195759085efe43b96ea6322481ea
SHA256351fae0c778aab7b78cbb601474fd7c329b93a4ca72f1589e5555b30a0f86bfd
SHA5127414d28799f04850e204a22fe0b032ffc983c347c163833b981c23b33708558a10136553ca1bd4c9a7701d141433aea099eebabb2570c6dc767196c64adf34ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59791d142d262270bfbfffe4f2c7bf2de
SHA18e0448b7c1527b97eb3532468d31deeb9dd90e9d
SHA2565acf96367ca81c58a4c35d0495f9580974a08faf5f1d57e5316d1995950d0261
SHA5122f67497d8622d10de672bef0530dbb9a037a4aaba44c721b26b1bff6d1ddb8e452b8221874dcd4a89991d5d5f6cdf79c0ac2f1f66dff44385168e51e7c2ff722
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
1KB
MD5997e19195911830c3bd41992e5421c95
SHA17eaa3d41d329f6bd4cf884cc39fe104aa693e694
SHA256237c5eb2cfe35ded142b44b7760d44a2ecfead2a18f2da7df3a970ff8186adaf
SHA5128d5578f121e3ec934a6105f63fea0897a1b3fb1dfb91922ba0321ee43a6b2a5ce2b7600b9787aa1d1442ada746163e8fc8b4ec8925e5e3cdd6845fa7c8cbc926
-
Filesize
382KB
MD541dd108ada487cb93a6e099e074f605b
SHA1354f9fcee3214078d2bc5e3ea55c6b678c2fe2bf
SHA256aebce4939ad8d8df9d1807debb140669e47a24c71b7978249362d3b0900c33f3
SHA51233adb352e06e779871224ce094954756f15e49785fc14f8c8a02476b420b00907961d3489944c2da42fa84e8185f0f6bc7eefde58ebc4ae213fed9bfa1b5932b