Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/10/2024, 00:36
Behavioral task
behavioral1
Sample
5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe
-
Size
52KB
-
MD5
5480948c56f5a64827c5437969f008c1
-
SHA1
2cd05c09ca39825e37b131760ee8a6c76b5a301d
-
SHA256
7c3964f2c473e5a49eef26594040d998dc029ea973fc3e7d4d88606b66b691fc
-
SHA512
af589b7a5d40225b1933ca60f8f3e73e739ba13d03733a9bf6a702ec856831a67d051c839cc964b6702c7975d6818eaeb9ee6ab0a30024892494813f6a8fc78a
-
SSDEEP
1536:iHloQ7e4d0rYq/MC2tF3kXWyDNKf/3nbrSmKxN:iHloLcqE53kXlRMfbOm2N
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" 5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe -
Executes dropped EXE 64 IoCs
pid Process 1928 lsass.exe 2916 lsass.exe 4764 lsass.exe 3456 lsass.exe 3984 lsass.exe 2268 lsass.exe 1748 lsass.exe 3404 lsass.exe 3520 lsass.exe 2828 lsass.exe 3860 lsass.exe 4256 lsass.exe 2920 lsass.exe 4632 lsass.exe 524 lsass.exe 2668 lsass.exe 4352 lsass.exe 2140 lsass.exe 4432 lsass.exe 3020 lsass.exe 2884 lsass.exe 3080 lsass.exe 2032 lsass.exe 1864 lsass.exe 3868 lsass.exe 5116 lsass.exe 1536 lsass.exe 380 lsass.exe 4452 lsass.exe 376 lsass.exe 4480 lsass.exe 2424 lsass.exe 2768 lsass.exe 4764 lsass.exe 4760 lsass.exe 880 lsass.exe 4336 lsass.exe 388 lsass.exe 3592 lsass.exe 4124 lsass.exe 3852 lsass.exe 3012 lsass.exe 4684 lsass.exe 3184 lsass.exe 1000 lsass.exe 2764 lsass.exe 2108 lsass.exe 3744 lsass.exe 3428 lsass.exe 2472 lsass.exe 4700 lsass.exe 3004 lsass.exe 3828 lsass.exe 2088 lsass.exe 4100 lsass.exe 3240 lsass.exe 3772 lsass.exe 4084 lsass.exe 2840 lsass.exe 2856 lsass.exe 3804 lsass.exe 4460 lsass.exe 216 lsass.exe 2664 lsass.exe -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\5617 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\360 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\32065 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\5870 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\28438 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\22907 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\27671 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\4905 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\20948 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\9751 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\28557 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\15059 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\30134 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\24982 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\22845 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\7264 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\17095 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\14573 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\31763 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\12777 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\6044 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\15869 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\22623 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\9758 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\13430 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\24554 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\7628 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\11231 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\18464 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\13972 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\4300 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\26653 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\1556 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\7448 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\16557 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\31506 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\7472 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\32350 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\26993 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\18971 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\8813 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\21410 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\26816 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\20688 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\11175 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\25114 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\30061 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\16679 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\28563 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\32347 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\1938 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\6965 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\3185 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\8834 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\28991 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\32013 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\5749 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\25902 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\28032 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\9473 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\12120 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\4957 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\31232 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\6913 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe" lsass.exe -
resource yara_rule behavioral2/memory/2528-0-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/files/0x000c000000023bc7-3.dat upx behavioral2/memory/1928-5-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/1928-7-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/2916-9-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/4764-13-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/3456-16-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/3984-19-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/2268-21-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/1748-25-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/3404-28-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/2528-32-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/3520-30-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/2828-34-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/3860-37-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/4256-41-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/2920-43-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/4632-46-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/524-48-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/2668-52-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/4352-54-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/2140-57-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/4432-60-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/3020-64-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/2884-67-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/3080-69-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/2032-73-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/1864-76-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/3868-79-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/5116-82-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/1536-85-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/380-87-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/4452-91-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/2528-95-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/376-93-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/4480-97-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/2424-101-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/2768-103-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/4764-106-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/4760-109-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/880-111-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/4336-115-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/388-118-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/3592-121-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/4124-123-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/3852-126-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/4684-131-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/3184-135-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/1000-138-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/2764-140-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/2108-143-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/3744-146-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/3428-148-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/4700-153-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/2472-152-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/4700-156-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/3004-159-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/3828-161-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/2088-164-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/4100-167-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/3240-170-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/3772-172-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/4084-175-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral2/memory/2840-177-0x0000000000400000-0x000000000041A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\DHCP = "1733758" 5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\DNS 5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2528 wrote to memory of 1928 2528 5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe 84 PID 2528 wrote to memory of 1928 2528 5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe 84 PID 2528 wrote to memory of 1928 2528 5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe 84 PID 1928 wrote to memory of 2916 1928 lsass.exe 87 PID 1928 wrote to memory of 2916 1928 lsass.exe 87 PID 1928 wrote to memory of 2916 1928 lsass.exe 87 PID 2916 wrote to memory of 4764 2916 lsass.exe 89 PID 2916 wrote to memory of 4764 2916 lsass.exe 89 PID 2916 wrote to memory of 4764 2916 lsass.exe 89 PID 4764 wrote to memory of 3456 4764 lsass.exe 90 PID 4764 wrote to memory of 3456 4764 lsass.exe 90 PID 4764 wrote to memory of 3456 4764 lsass.exe 90 PID 3456 wrote to memory of 3984 3456 lsass.exe 91 PID 3456 wrote to memory of 3984 3456 lsass.exe 91 PID 3456 wrote to memory of 3984 3456 lsass.exe 91 PID 3984 wrote to memory of 2268 3984 lsass.exe 92 PID 3984 wrote to memory of 2268 3984 lsass.exe 92 PID 3984 wrote to memory of 2268 3984 lsass.exe 92 PID 2268 wrote to memory of 1748 2268 lsass.exe 93 PID 2268 wrote to memory of 1748 2268 lsass.exe 93 PID 2268 wrote to memory of 1748 2268 lsass.exe 93 PID 1748 wrote to memory of 3404 1748 lsass.exe 94 PID 1748 wrote to memory of 3404 1748 lsass.exe 94 PID 1748 wrote to memory of 3404 1748 lsass.exe 94 PID 3404 wrote to memory of 3520 3404 lsass.exe 95 PID 3404 wrote to memory of 3520 3404 lsass.exe 95 PID 3404 wrote to memory of 3520 3404 lsass.exe 95 PID 3520 wrote to memory of 2828 3520 lsass.exe 98 PID 3520 wrote to memory of 2828 3520 lsass.exe 98 PID 3520 wrote to memory of 2828 3520 lsass.exe 98 PID 2828 wrote to memory of 3860 2828 lsass.exe 99 PID 2828 wrote to memory of 3860 2828 lsass.exe 99 PID 2828 wrote to memory of 3860 2828 lsass.exe 99 PID 3860 wrote to memory of 4256 3860 lsass.exe 100 PID 3860 wrote to memory of 4256 3860 lsass.exe 100 PID 3860 wrote to memory of 4256 3860 lsass.exe 100 PID 4256 wrote to memory of 2920 4256 lsass.exe 103 PID 4256 wrote to memory of 2920 4256 lsass.exe 103 PID 4256 wrote to memory of 2920 4256 lsass.exe 103 PID 2920 wrote to memory of 4632 2920 lsass.exe 104 PID 2920 wrote to memory of 4632 2920 lsass.exe 104 PID 2920 wrote to memory of 4632 2920 lsass.exe 104 PID 4632 wrote to memory of 524 4632 lsass.exe 106 PID 4632 wrote to memory of 524 4632 lsass.exe 106 PID 4632 wrote to memory of 524 4632 lsass.exe 106 PID 524 wrote to memory of 2668 524 lsass.exe 107 PID 524 wrote to memory of 2668 524 lsass.exe 107 PID 524 wrote to memory of 2668 524 lsass.exe 107 PID 2668 wrote to memory of 4352 2668 lsass.exe 108 PID 2668 wrote to memory of 4352 2668 lsass.exe 108 PID 2668 wrote to memory of 4352 2668 lsass.exe 108 PID 4352 wrote to memory of 2140 4352 lsass.exe 109 PID 4352 wrote to memory of 2140 4352 lsass.exe 109 PID 4352 wrote to memory of 2140 4352 lsass.exe 109 PID 2140 wrote to memory of 4432 2140 lsass.exe 110 PID 2140 wrote to memory of 4432 2140 lsass.exe 110 PID 2140 wrote to memory of 4432 2140 lsass.exe 110 PID 4432 wrote to memory of 3020 4432 lsass.exe 111 PID 4432 wrote to memory of 3020 4432 lsass.exe 111 PID 4432 wrote to memory of 3020 4432 lsass.exe 111 PID 3020 wrote to memory of 2884 3020 lsass.exe 112 PID 3020 wrote to memory of 2884 3020 lsass.exe 112 PID 3020 wrote to memory of 2884 3020 lsass.exe 112 PID 2884 wrote to memory of 3080 2884 lsass.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe"1⤵
- Modifies firewall policy service
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:2528 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1928 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2916 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4764 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3456 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3984 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2268 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1748 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3404 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3520 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2828 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe12⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3860 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4256 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2920 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe15⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4632 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe16⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:524 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2668 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4352 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2140 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4432 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3020 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe22⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2884 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe23⤵
- Executes dropped EXE
PID:3080 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe24⤵
- Executes dropped EXE
PID:2032 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe25⤵
- Executes dropped EXE
PID:1864 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe26⤵
- Executes dropped EXE
PID:3868 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe27⤵
- Executes dropped EXE
PID:5116 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe28⤵
- Executes dropped EXE
PID:1536 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe29⤵
- Executes dropped EXE
- Adds Run key to start application
PID:380 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe30⤵
- Executes dropped EXE
PID:4452 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe31⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:376 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe32⤵
- Executes dropped EXE
PID:4480 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe33⤵
- Executes dropped EXE
PID:2424 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe34⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2768 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe35⤵
- Executes dropped EXE
PID:4764 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe36⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4760 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe37⤵
- Executes dropped EXE
PID:880 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe38⤵
- Executes dropped EXE
PID:4336 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe39⤵
- Executes dropped EXE
PID:388 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe40⤵
- Executes dropped EXE
PID:3592 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe41⤵
- Executes dropped EXE
PID:4124 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe42⤵
- Executes dropped EXE
PID:3852 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe43⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3012 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe44⤵
- Executes dropped EXE
PID:4684 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe45⤵
- Executes dropped EXE
PID:3184 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe46⤵
- Executes dropped EXE
PID:1000 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe47⤵
- Executes dropped EXE
PID:2764 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe48⤵
- Executes dropped EXE
PID:2108 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe49⤵
- Executes dropped EXE
PID:3744 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe50⤵
- Executes dropped EXE
PID:3428 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe51⤵
- Executes dropped EXE
PID:2472 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe52⤵
- Executes dropped EXE
PID:4700 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe53⤵
- Executes dropped EXE
PID:3004 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe54⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3828 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe55⤵
- Executes dropped EXE
PID:2088 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe56⤵
- Executes dropped EXE
PID:4100 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe57⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3240 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe58⤵
- Executes dropped EXE
PID:3772 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe59⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4084 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe60⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2840 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe61⤵
- Executes dropped EXE
PID:2856 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe62⤵
- Executes dropped EXE
PID:3804 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe63⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4460 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe64⤵
- Executes dropped EXE
PID:216 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe65⤵
- Executes dropped EXE
PID:2664 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe66⤵
- Adds Run key to start application
PID:2708 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe67⤵PID:4480
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe68⤵PID:540
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe69⤵PID:1984
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe70⤵
- Adds Run key to start application
PID:2040 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe71⤵PID:2916
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe72⤵PID:3984
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe73⤵
- Adds Run key to start application
PID:3224 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe74⤵PID:400
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe75⤵PID:3584
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe76⤵PID:4952
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe77⤵PID:2392
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe78⤵PID:4116
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe79⤵PID:2704
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe80⤵PID:3852
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe81⤵PID:3572
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe82⤵PID:3168
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe83⤵PID:4592
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe84⤵PID:3348
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe85⤵PID:3288
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe86⤵
- System Location Discovery: System Language Discovery
PID:3184 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe87⤵PID:1000
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe88⤵
- Adds Run key to start application
PID:2764 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe89⤵PID:4976
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe90⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1612 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe91⤵PID:3744
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe92⤵PID:2472
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe93⤵PID:1572
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe94⤵PID:4980
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe95⤵PID:1420
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe96⤵PID:2348
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe97⤵PID:2344
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe98⤵PID:4140
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe99⤵PID:896
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe100⤵PID:4120
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe101⤵PID:2604
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe102⤵PID:3144
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe103⤵
- Adds Run key to start application
PID:2100 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe104⤵PID:4968
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe105⤵PID:2440
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe106⤵PID:3340
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe107⤵PID:3752
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe108⤵
- Adds Run key to start application
PID:4952 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe109⤵
- Adds Run key to start application
PID:4124 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe110⤵
- Adds Run key to start application
PID:4004 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe111⤵PID:2932
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe112⤵PID:3200
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe113⤵PID:396
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe114⤵PID:4488
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe115⤵PID:4888
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe116⤵
- System Location Discovery: System Language Discovery
PID:3812 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe117⤵PID:2360
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe118⤵PID:916
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe119⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1608 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe120⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2036 -
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe121⤵PID:4388
-
\??\c:\lsass.exec:\lsass.exe exe C:\Users\Admin\AppData\Local\Temp\5480948c56f5a64827c5437969f008c1_JaffaCakes118.exe122⤵PID:2212
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-