Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-10-2024 22:13
Static task
static1
Behavioral task
behavioral1
Sample
76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe
-
Size
857KB
-
MD5
76330c374f7dba1afa9f26a155e2d824
-
SHA1
1f895aa731e8a020174a97b99ea9777eff12b136
-
SHA256
725deffcd4aea66a76a07cdc605d120d57070f0845b74e0a9a1c6849620faa12
-
SHA512
d3bf41771e509154950a5b1cbe6f01b69ae4abc75b9c00b96b5aeacbd9134d9d2ddfd62ced69d2faf896b3bb834862b1ea3c6da3ff9abbf5dc2a7c1c8088d75e
-
SSDEEP
12288:Jp/TC4LesYpZ+XYMXg8uBvw6yu3h8dGvyMsdwqAxKqEGPXRvE/Y+m+De4/uDXwkq:J/tCvMP2Ib7dGywJP5ItbDh/KXwkN
Malware Config
Signatures
-
Luminosity 2 IoCs
Luminosity is a RAT family that was on sale, while claiming to be a system administration utility.
description ioc pid Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 4372 schtasks.exe -
Luminosity family
-
Adds Run key to start application 2 TTPs 23 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Snoopy = "cmd /c \"start \"Snoopy\" \"C:\\Program Files (x86)\\Snoopy\\builder.exe\"" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Snoopy = "cmd /c \"start \"Snoopy\" \"C:\\Program Files (x86)\\Snoopy\\builder.exe\"" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Snoopy = "cmd /c \"start \"Snoopy\" \"C:\\Program Files (x86)\\Snoopy\\builder.exe\"" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Snoopy = "cmd /c \"start \"Snoopy\" \"C:\\Program Files (x86)\\Snoopy\\builder.exe\"" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Snoopy = "cmd /c \"start \"Snoopy\" \"C:\\Program Files (x86)\\Snoopy\\builder.exe\"" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Snoopy = "cmd /c \"start \"Snoopy\" \"C:\\Program Files (x86)\\Snoopy\\builder.exe\"" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Snoopy = "cmd /c \"start \"Snoopy\" \"C:\\Program Files (x86)\\Snoopy\\builder.exe\"" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Snoopy = "cmd /c \"start \"Snoopy\" \"C:\\Program Files (x86)\\Snoopy\\builder.exe\"" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Snoopy = "cmd /c \"start \"Snoopy\" \"C:\\Program Files (x86)\\Snoopy\\builder.exe\"" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Snoopy = "cmd /c \"start \"Snoopy\" \"C:\\Program Files (x86)\\Snoopy\\builder.exe\"" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Snoopy = "cmd /c \"start \"Snoopy\" \"C:\\Program Files (x86)\\Snoopy\\builder.exe\"" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Snoopy = "cmd /c \"start \"Snoopy\" \"C:\\Program Files (x86)\\Snoopy\\builder.exe\"" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Snoopy = "cmd /c \"start \"Snoopy\" \"C:\\Program Files (x86)\\Snoopy\\builder.exe\"" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Snoopy = "cmd /c \"start \"Snoopy\" \"C:\\Program Files (x86)\\Snoopy\\builder.exe\"" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Snoopy = "cmd /c \"start \"Snoopy\" \"C:\\Program Files (x86)\\Snoopy\\builder.exe\"" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Snoopy = "cmd /c \"start \"Snoopy\" \"C:\\Program Files (x86)\\Snoopy\\builder.exe\"" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Snoopy = "cmd /c \"start \"Snoopy\" \"C:\\Program Files (x86)\\Snoopy\\builder.exe\"" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Snoopy = "cmd /c \"start \"Snoopy\" \"C:\\Program Files (x86)\\Snoopy\\builder.exe\"" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Snoopy = "cmd /c \"start \"Snoopy\" \"C:\\Program Files (x86)\\Snoopy\\builder.exe\"" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Snoopy = "cmd /c \"start \"Snoopy\" \"C:\\Program Files (x86)\\Snoopy\\builder.exe\"" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Snoopy = "cmd /c \"start \"Snoopy\" \"C:\\Program Files (x86)\\Snoopy\\builder.exe\"" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Snoopy = "cmd /c \"start \"Snoopy\" \"C:\\Program Files (x86)\\Snoopy\\builder.exe\"" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Snoopy = "cmd /c \"start \"Snoopy\" \"C:\\Program Files (x86)\\Snoopy\\builder.exe\"" REG.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Snoopy\builder.exe 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Snoopy\builder.exe 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 25 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4372 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4412 wrote to memory of 5080 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 93 PID 4412 wrote to memory of 5080 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 93 PID 4412 wrote to memory of 5080 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 93 PID 4412 wrote to memory of 4372 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 100 PID 4412 wrote to memory of 4372 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 100 PID 4412 wrote to memory of 4372 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 100 PID 4412 wrote to memory of 4284 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 102 PID 4412 wrote to memory of 4284 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 102 PID 4412 wrote to memory of 4284 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 102 PID 4412 wrote to memory of 1860 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 104 PID 4412 wrote to memory of 1860 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 104 PID 4412 wrote to memory of 1860 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 104 PID 4412 wrote to memory of 3792 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 106 PID 4412 wrote to memory of 3792 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 106 PID 4412 wrote to memory of 3792 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 106 PID 4412 wrote to memory of 4472 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 108 PID 4412 wrote to memory of 4472 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 108 PID 4412 wrote to memory of 4472 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 108 PID 4412 wrote to memory of 3208 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 110 PID 4412 wrote to memory of 3208 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 110 PID 4412 wrote to memory of 3208 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 110 PID 4412 wrote to memory of 2384 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 112 PID 4412 wrote to memory of 2384 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 112 PID 4412 wrote to memory of 2384 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 112 PID 4412 wrote to memory of 4896 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 116 PID 4412 wrote to memory of 4896 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 116 PID 4412 wrote to memory of 4896 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 116 PID 4412 wrote to memory of 2904 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 118 PID 4412 wrote to memory of 2904 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 118 PID 4412 wrote to memory of 2904 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 118 PID 4412 wrote to memory of 4764 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 120 PID 4412 wrote to memory of 4764 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 120 PID 4412 wrote to memory of 4764 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 120 PID 4412 wrote to memory of 2916 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 122 PID 4412 wrote to memory of 2916 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 122 PID 4412 wrote to memory of 2916 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 122 PID 4412 wrote to memory of 4244 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 124 PID 4412 wrote to memory of 4244 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 124 PID 4412 wrote to memory of 4244 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 124 PID 4412 wrote to memory of 4640 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 126 PID 4412 wrote to memory of 4640 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 126 PID 4412 wrote to memory of 4640 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 126 PID 4412 wrote to memory of 4800 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 130 PID 4412 wrote to memory of 4800 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 130 PID 4412 wrote to memory of 4800 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 130 PID 4412 wrote to memory of 2912 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 138 PID 4412 wrote to memory of 2912 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 138 PID 4412 wrote to memory of 2912 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 138 PID 4412 wrote to memory of 4500 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 140 PID 4412 wrote to memory of 4500 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 140 PID 4412 wrote to memory of 4500 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 140 PID 4412 wrote to memory of 3656 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 142 PID 4412 wrote to memory of 3656 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 142 PID 4412 wrote to memory of 3656 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 142 PID 4412 wrote to memory of 4740 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 144 PID 4412 wrote to memory of 4740 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 144 PID 4412 wrote to memory of 4740 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 144 PID 4412 wrote to memory of 812 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 146 PID 4412 wrote to memory of 812 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 146 PID 4412 wrote to memory of 812 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 146 PID 4412 wrote to memory of 856 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 148 PID 4412 wrote to memory of 856 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 148 PID 4412 wrote to memory of 856 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 148 PID 4412 wrote to memory of 704 4412 76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe 153
Processes
-
C:\Users\Admin\AppData\Local\Temp\76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\76330c374f7dba1afa9f26a155e2d824_JaffaCakes118.exe"1⤵
- Luminosity
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Snoopy" /d "cmd /c """start """Snoopy""" """C:\Program Files (x86)\Snoopy\builder.exe"""" /f /reg:642⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:5080
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /NP /sc onlogon /tn "Snoopy" /rl highest /tr "'C:\Program Files (x86)\Snoopy\builder.exe' /startup" /f2⤵
- Luminosity
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4372
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Snoopy" /d "cmd /c """start """Snoopy""" """C:\Program Files (x86)\Snoopy\builder.exe"""" /f /reg:642⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4284
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Snoopy" /d "cmd /c """start """Snoopy""" """C:\Program Files (x86)\Snoopy\builder.exe"""" /f /reg:642⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1860
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Snoopy" /d "cmd /c """start """Snoopy""" """C:\Program Files (x86)\Snoopy\builder.exe"""" /f /reg:642⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3792
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Snoopy" /d "cmd /c """start """Snoopy""" """C:\Program Files (x86)\Snoopy\builder.exe"""" /f /reg:642⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4472
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Snoopy" /d "cmd /c """start """Snoopy""" """C:\Program Files (x86)\Snoopy\builder.exe"""" /f /reg:642⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3208
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Snoopy" /d "cmd /c """start """Snoopy""" """C:\Program Files (x86)\Snoopy\builder.exe"""" /f /reg:642⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2384
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Snoopy" /d "cmd /c """start """Snoopy""" """C:\Program Files (x86)\Snoopy\builder.exe"""" /f /reg:642⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4896
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Snoopy" /d "cmd /c """start """Snoopy""" """C:\Program Files (x86)\Snoopy\builder.exe"""" /f /reg:642⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2904
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Snoopy" /d "cmd /c """start """Snoopy""" """C:\Program Files (x86)\Snoopy\builder.exe"""" /f /reg:642⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4764
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Snoopy" /d "cmd /c """start """Snoopy""" """C:\Program Files (x86)\Snoopy\builder.exe"""" /f /reg:642⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2916
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Snoopy" /d "cmd /c """start """Snoopy""" """C:\Program Files (x86)\Snoopy\builder.exe"""" /f /reg:642⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4244
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Snoopy" /d "cmd /c """start """Snoopy""" """C:\Program Files (x86)\Snoopy\builder.exe"""" /f /reg:642⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4640
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Snoopy" /d "cmd /c """start """Snoopy""" """C:\Program Files (x86)\Snoopy\builder.exe"""" /f /reg:642⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4800
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Snoopy" /d "cmd /c """start """Snoopy""" """C:\Program Files (x86)\Snoopy\builder.exe"""" /f /reg:642⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2912
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Snoopy" /d "cmd /c """start """Snoopy""" """C:\Program Files (x86)\Snoopy\builder.exe"""" /f /reg:642⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4500
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Snoopy" /d "cmd /c """start """Snoopy""" """C:\Program Files (x86)\Snoopy\builder.exe"""" /f /reg:642⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3656
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Snoopy" /d "cmd /c """start """Snoopy""" """C:\Program Files (x86)\Snoopy\builder.exe"""" /f /reg:642⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4740
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Snoopy" /d "cmd /c """start """Snoopy""" """C:\Program Files (x86)\Snoopy\builder.exe"""" /f /reg:642⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:812
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Snoopy" /d "cmd /c """start """Snoopy""" """C:\Program Files (x86)\Snoopy\builder.exe"""" /f /reg:642⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:856
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Snoopy" /d "cmd /c """start """Snoopy""" """C:\Program Files (x86)\Snoopy\builder.exe"""" /f /reg:642⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:704
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Snoopy" /d "cmd /c """start """Snoopy""" """C:\Program Files (x86)\Snoopy\builder.exe"""" /f /reg:642⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2136
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Snoopy" /d "cmd /c """start """Snoopy""" """C:\Program Files (x86)\Snoopy\builder.exe"""" /f /reg:642⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4480
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
857KB
MD576330c374f7dba1afa9f26a155e2d824
SHA11f895aa731e8a020174a97b99ea9777eff12b136
SHA256725deffcd4aea66a76a07cdc605d120d57070f0845b74e0a9a1c6849620faa12
SHA512d3bf41771e509154950a5b1cbe6f01b69ae4abc75b9c00b96b5aeacbd9134d9d2ddfd62ced69d2faf896b3bb834862b1ea3c6da3ff9abbf5dc2a7c1c8088d75e