Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17/10/2024, 17:29
Static task
static1
Behavioral task
behavioral1
Sample
52db8262b6fdfc265caa70b7aa6abd14_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
52db8262b6fdfc265caa70b7aa6abd14_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
52db8262b6fdfc265caa70b7aa6abd14_JaffaCakes118.exe
-
Size
452KB
-
MD5
52db8262b6fdfc265caa70b7aa6abd14
-
SHA1
561ede3362c63dfe224dfe9f98544673bf9f293b
-
SHA256
51904d5c59460a8d90236bee6cf28176de7c4ceb0b2e7abae2e5ad3ed4ce3bf2
-
SHA512
c20e122280a5ded19e7c2f839c008f958852cbeedd939eace37dbc5fa3ac0c58a6a86f140ec065b80bf3cd17aba30d6f326daab71e77274f3d6b2453b4448782
-
SSDEEP
12288:GLO+MJClrwmPuuqcor/1/4UkNpxWBulXZDCzAI:GLO+MAUmHbo1tkV4+CD
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" suuwe.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 52db8262b6fdfc265caa70b7aa6abd14_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation atlop.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation bwsap.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation cwsap.exe -
Executes dropped EXE 5 IoCs
pid Process 3272 atlop.exe 4536 suuwe.exe 4180 bwsap.exe 4500 cwsap.exe 1944 dwsap.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\suuwe = "C:\\Users\\Admin\\suuwe.exe /d" suuwe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\suuwe = "C:\\Users\\Admin\\suuwe.exe /j" suuwe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\suuwe = "C:\\Users\\Admin\\suuwe.exe /O" suuwe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\suuwe = "C:\\Users\\Admin\\suuwe.exe /N" suuwe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\suuwe = "C:\\Users\\Admin\\suuwe.exe /h" suuwe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\suuwe = "C:\\Users\\Admin\\suuwe.exe /A" suuwe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\suuwe = "C:\\Users\\Admin\\suuwe.exe /H" suuwe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\suuwe = "C:\\Users\\Admin\\suuwe.exe /u" suuwe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\suuwe = "C:\\Users\\Admin\\suuwe.exe /E" suuwe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\suuwe = "C:\\Users\\Admin\\suuwe.exe /f" suuwe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\suuwe = "C:\\Users\\Admin\\suuwe.exe /a" suuwe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\suuwe = "C:\\Users\\Admin\\suuwe.exe /W" suuwe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\suuwe = "C:\\Users\\Admin\\suuwe.exe /U" suuwe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\suuwe = "C:\\Users\\Admin\\suuwe.exe /q" suuwe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\suuwe = "C:\\Users\\Admin\\suuwe.exe /C" suuwe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\suuwe = "C:\\Users\\Admin\\suuwe.exe /c" suuwe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\suuwe = "C:\\Users\\Admin\\suuwe.exe /z" suuwe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\suuwe = "C:\\Users\\Admin\\suuwe.exe /G" suuwe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\suuwe = "C:\\Users\\Admin\\suuwe.exe /F" suuwe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\suuwe = "C:\\Users\\Admin\\suuwe.exe /B" suuwe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\suuwe = "C:\\Users\\Admin\\suuwe.exe /n" suuwe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\suuwe = "C:\\Users\\Admin\\suuwe.exe /g" suuwe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\suuwe = "C:\\Users\\Admin\\suuwe.exe /L" suuwe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\suuwe = "C:\\Users\\Admin\\suuwe.exe /X" suuwe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\suuwe = "C:\\Users\\Admin\\suuwe.exe /P" suuwe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\suuwe = "C:\\Users\\Admin\\suuwe.exe /T" suuwe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\suuwe = "C:\\Users\\Admin\\suuwe.exe /i" suuwe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\suuwe = "C:\\Users\\Admin\\suuwe.exe /w" suuwe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\suuwe = "C:\\Users\\Admin\\suuwe.exe /k" suuwe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\suuwe = "C:\\Users\\Admin\\suuwe.exe /p" suuwe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\suuwe = "C:\\Users\\Admin\\suuwe.exe /m" suuwe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\suuwe = "C:\\Users\\Admin\\suuwe.exe /D" suuwe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\suuwe = "C:\\Users\\Admin\\suuwe.exe /y" suuwe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\suuwe = "C:\\Users\\Admin\\suuwe.exe /V" suuwe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\suuwe = "C:\\Users\\Admin\\suuwe.exe /t" suuwe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\suuwe = "C:\\Users\\Admin\\suuwe.exe /l" suuwe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\suuwe = "C:\\Users\\Admin\\suuwe.exe /J" suuwe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\suuwe = "C:\\Users\\Admin\\suuwe.exe /Z" suuwe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\suuwe = "C:\\Users\\Admin\\suuwe.exe /b" suuwe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\suuwe = "C:\\Users\\Admin\\suuwe.exe /x" suuwe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\suuwe = "C:\\Users\\Admin\\suuwe.exe /r" suuwe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\suuwe = "C:\\Users\\Admin\\suuwe.exe /R" suuwe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\suuwe = "C:\\Users\\Admin\\suuwe.exe /S" suuwe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\suuwe = "C:\\Users\\Admin\\suuwe.exe /s" suuwe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\suuwe = "C:\\Users\\Admin\\suuwe.exe /e" suuwe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\suuwe = "C:\\Users\\Admin\\suuwe.exe /v" suuwe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\suuwe = "C:\\Users\\Admin\\suuwe.exe /o" suuwe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\suuwe = "C:\\Users\\Admin\\suuwe.exe /K" suuwe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\suuwe = "C:\\Users\\Admin\\suuwe.exe /I" suuwe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\suuwe = "C:\\Users\\Admin\\suuwe.exe /Q" suuwe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\suuwe = "C:\\Users\\Admin\\suuwe.exe /M" suuwe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\suuwe = "C:\\Users\\Admin\\suuwe.exe /Y" suuwe.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1628 tasklist.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4180 set thread context of 3048 4180 bwsap.exe 101 -
resource yara_rule behavioral2/memory/3048-101-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/memory/3048-104-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/memory/3048-103-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/memory/3048-171-0x0000000000400000-0x000000000040F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1072 1944 WerFault.exe 109 -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwsap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 52db8262b6fdfc265caa70b7aa6abd14_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language atlop.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language suuwe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cwsap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bwsap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3272 atlop.exe 3272 atlop.exe 4536 suuwe.exe 4536 suuwe.exe 4536 suuwe.exe 4536 suuwe.exe 4536 suuwe.exe 4536 suuwe.exe 4536 suuwe.exe 4536 suuwe.exe 4536 suuwe.exe 4536 suuwe.exe 4536 suuwe.exe 4536 suuwe.exe 4536 suuwe.exe 4536 suuwe.exe 4536 suuwe.exe 4536 suuwe.exe 4536 suuwe.exe 4536 suuwe.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1628 tasklist.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3272 atlop.exe 4536 suuwe.exe 4180 bwsap.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4944 wrote to memory of 3272 4944 52db8262b6fdfc265caa70b7aa6abd14_JaffaCakes118.exe 84 PID 4944 wrote to memory of 3272 4944 52db8262b6fdfc265caa70b7aa6abd14_JaffaCakes118.exe 84 PID 4944 wrote to memory of 3272 4944 52db8262b6fdfc265caa70b7aa6abd14_JaffaCakes118.exe 84 PID 3272 wrote to memory of 4536 3272 atlop.exe 91 PID 3272 wrote to memory of 4536 3272 atlop.exe 91 PID 3272 wrote to memory of 4536 3272 atlop.exe 91 PID 3272 wrote to memory of 1812 3272 atlop.exe 92 PID 3272 wrote to memory of 1812 3272 atlop.exe 92 PID 3272 wrote to memory of 1812 3272 atlop.exe 92 PID 4944 wrote to memory of 4180 4944 52db8262b6fdfc265caa70b7aa6abd14_JaffaCakes118.exe 95 PID 4944 wrote to memory of 4180 4944 52db8262b6fdfc265caa70b7aa6abd14_JaffaCakes118.exe 95 PID 4944 wrote to memory of 4180 4944 52db8262b6fdfc265caa70b7aa6abd14_JaffaCakes118.exe 95 PID 1812 wrote to memory of 1628 1812 cmd.exe 96 PID 1812 wrote to memory of 1628 1812 cmd.exe 96 PID 1812 wrote to memory of 1628 1812 cmd.exe 96 PID 4536 wrote to memory of 4944 4536 suuwe.exe 83 PID 4536 wrote to memory of 4944 4536 suuwe.exe 83 PID 4536 wrote to memory of 4180 4536 suuwe.exe 95 PID 4536 wrote to memory of 4180 4536 suuwe.exe 95 PID 4536 wrote to memory of 4944 4536 suuwe.exe 83 PID 4536 wrote to memory of 4944 4536 suuwe.exe 83 PID 4536 wrote to memory of 4180 4536 suuwe.exe 95 PID 4536 wrote to memory of 4180 4536 suuwe.exe 95 PID 4536 wrote to memory of 4944 4536 suuwe.exe 83 PID 4536 wrote to memory of 4944 4536 suuwe.exe 83 PID 4536 wrote to memory of 4180 4536 suuwe.exe 95 PID 4536 wrote to memory of 4180 4536 suuwe.exe 95 PID 4536 wrote to memory of 4944 4536 suuwe.exe 83 PID 4536 wrote to memory of 4944 4536 suuwe.exe 83 PID 4536 wrote to memory of 4180 4536 suuwe.exe 95 PID 4536 wrote to memory of 4180 4536 suuwe.exe 95 PID 4536 wrote to memory of 4944 4536 suuwe.exe 83 PID 4536 wrote to memory of 4944 4536 suuwe.exe 83 PID 4536 wrote to memory of 4180 4536 suuwe.exe 95 PID 4536 wrote to memory of 4180 4536 suuwe.exe 95 PID 4180 wrote to memory of 3048 4180 bwsap.exe 101 PID 4180 wrote to memory of 3048 4180 bwsap.exe 101 PID 4180 wrote to memory of 3048 4180 bwsap.exe 101 PID 4180 wrote to memory of 3048 4180 bwsap.exe 101 PID 4180 wrote to memory of 3048 4180 bwsap.exe 101 PID 4180 wrote to memory of 3048 4180 bwsap.exe 101 PID 4180 wrote to memory of 3048 4180 bwsap.exe 101 PID 4180 wrote to memory of 3048 4180 bwsap.exe 101 PID 4180 wrote to memory of 2668 4180 bwsap.exe 102 PID 4180 wrote to memory of 2668 4180 bwsap.exe 102 PID 4180 wrote to memory of 2668 4180 bwsap.exe 102 PID 4944 wrote to memory of 4500 4944 52db8262b6fdfc265caa70b7aa6abd14_JaffaCakes118.exe 104 PID 4944 wrote to memory of 4500 4944 52db8262b6fdfc265caa70b7aa6abd14_JaffaCakes118.exe 104 PID 4944 wrote to memory of 4500 4944 52db8262b6fdfc265caa70b7aa6abd14_JaffaCakes118.exe 104 PID 4536 wrote to memory of 4944 4536 suuwe.exe 83 PID 4536 wrote to memory of 4944 4536 suuwe.exe 83 PID 4536 wrote to memory of 4500 4536 suuwe.exe 104 PID 4536 wrote to memory of 4500 4536 suuwe.exe 104 PID 4500 wrote to memory of 728 4500 cwsap.exe 107 PID 4500 wrote to memory of 728 4500 cwsap.exe 107 PID 4500 wrote to memory of 728 4500 cwsap.exe 107 PID 4944 wrote to memory of 1944 4944 52db8262b6fdfc265caa70b7aa6abd14_JaffaCakes118.exe 109 PID 4944 wrote to memory of 1944 4944 52db8262b6fdfc265caa70b7aa6abd14_JaffaCakes118.exe 109 PID 4944 wrote to memory of 1944 4944 52db8262b6fdfc265caa70b7aa6abd14_JaffaCakes118.exe 109 PID 4536 wrote to memory of 4944 4536 suuwe.exe 83 PID 4536 wrote to memory of 4944 4536 suuwe.exe 83 PID 4536 wrote to memory of 1944 4536 suuwe.exe 109 PID 4536 wrote to memory of 1944 4536 suuwe.exe 109 PID 4536 wrote to memory of 1072 4536 suuwe.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\52db8262b6fdfc265caa70b7aa6abd14_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\52db8262b6fdfc265caa70b7aa6abd14_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Users\Admin\atlop.exe"C:\Users\Admin\atlop.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Users\Admin\suuwe.exe"C:\Users\Admin\suuwe.exe"3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4536
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del atlop.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1628
-
-
-
-
C:\Users\Admin\bwsap.exe"C:\Users\Admin\bwsap.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:3048
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\a.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:2668
-
-
-
C:\Users\Admin\cwsap.exe"C:\Users\Admin\cwsap.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Lbv..bat" > nul 2> nul3⤵
- System Location Discovery: System Language Discovery
PID:728
-
-
-
C:\Users\Admin\dwsap.exe"C:\Users\Admin\dwsap.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1944 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1944 -s 2803⤵
- Program crash
PID:1072
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7ZSfx000.cmd" "2⤵
- System Location Discovery: System Language Discovery
PID:4112
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1944 -ip 19441⤵PID:5104
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264B
MD5930a1968118596d8ce8339ce83ad6c01
SHA104cdfd1b110726630450f4145f65cbc4ae63315c
SHA2562c0c20c124541515a9822d3bcc299b0ee1a8e3d78becb9cacbc7710329445e63
SHA512fea6ce671bcf786289d8c615a6f6b4f950f5fd075b938dfd96165a9add63538f5d713019cbd840083a488693ce6f958cc0083736acc3857d90427ef7be4a4bc5
-
Filesize
118B
MD581813fa4c78795237b6535d14a271ea9
SHA1e5ad5a60cd264c5823a0546a4aaa3f037004b18f
SHA256f6de6ecdc4833afd16c7526b9782b30da925fa532da05ef0033986d3869008e1
SHA5125f6fa39e2c6cb42618f88319c640b9598046609c35d622196d3d225b8d4adfb7613b1fae672cad9de780f1e56b9610aac01cd1d3761a277c59ddd212e6b6ac39
-
Filesize
113B
MD549d6b96ecf3f7f4a0b2d683ebb21c852
SHA1ddb1e7eb58e991538c7af65fb807b30b7aa34c9e
SHA25617529ddc40da41a75333366b84b1a001fa4b57bc9e8a9ef78277ae0780ccd45d
SHA512e4e500699ec50e969edc796e1eb334f2f3f40269a71a42c11cef6709c61b1b789770c76535f15b598e416e081279ea14cc2511c20087fcb3829b1fde42d24243
-
Filesize
268KB
MD508cce3f3b08395b0188f6581d3f67cee
SHA1f3db5f2fbbf5e3e06e50920eea8665cd6840e7ef
SHA25697531a3cd8aff7520e4cad53927bc2abdc046a4f1e052bcbe0aecc574d2c6e63
SHA512231b82a579f20831a025035d2e0c094eb1c93206bee5bef95dba53c0d017a1ac4069631c08cadd4d5335b8c507b27b2c64468d1cf577d85c290b7ecdddbda682
-
Filesize
60KB
MD5a1ec0e0b7ba6382f4a7ab696cd97be1e
SHA16dc5f7346be363c097a16b6306cfc8c91e859e60
SHA2561749c9fb78d215dc3d49d9e850e3a18f734e7cfc331dad8aa805c96ab2240b52
SHA512a92ee5a4e087a234669860e1707abac99484988f137210270d109e43a9895c503abde3f3a49f314f7472f81a7ca6d23eb63df2ebc687e0e0b119fa7cf5a63bc5
-
Filesize
214KB
MD5357bce01eddac462ffd80a0032901667
SHA1fc9d8843b3db02570332558c72e4fe8530f4c76e
SHA256b3b5b3894f59b2c85e00f25cbd55cf290cb31908479dcfc8008258b3d3e03680
SHA5120738a133f0cd3b3a355e0a630ff29c19fe794588ea8361cd8b3ec4f440d417a0d71bf935a02b1a2c7bf2f072ff1d9fcf9f0ebe99666d5395aa77c9440fdd6d43
-
Filesize
121KB
MD52acc5ceb47acb798ae535daad48a6150
SHA1f31dbe4e53c2c4683fc5074e59752c1ce0031a00
SHA256697aa03bfe6922e88d96bb72b5a1d90d8206a9c8e050e5ca4e41676f6d72d5e4
SHA512dda965b604fdbb5e629f18c0f8c3a0822ef3d07fd1ec1fc051412bace9c93c61885f824149ac3009adad73016cf16bd97dda5a67dd72ecfb056ae9642c00576c
-
Filesize
268KB
MD5760b9cef166373c87a24eabe01e27ddf
SHA1e9727c8e0f9557df84508a41d8e876a50edb7492
SHA2569310f1f91be9fd53db5b5879678d23a1993487a42203fe7b3c4c67260f44d73d
SHA512e03242728c49ef7ec361b5b6e9283c2e65b9b39554e9baf854ae6a1dfc7ccca74202ab8b684dd222441be3cbf96612b850710345caa7f41789bfc58af0fa8eb0