Overview
overview
10Static
static
38283c1cc0d...18.exe
windows7-x64
108283c1cc0d...18.exe
windows10-2004-x64
10$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Perl.dll
windows7-x64
3Perl.dll
windows10-2004-x64
3Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
31-10-2024 08:50
Static task
static1
Behavioral task
behavioral1
Sample
8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Perl.dll
Resource
win7-20241023-en
Behavioral task
behavioral8
Sample
Perl.dll
Resource
win10v2004-20241007-en
General
-
Target
8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe
-
Size
258KB
-
MD5
8283c1cc0db9501e05206c0542fe9447
-
SHA1
fa800fdf2fc3bc8c015d7f20e04a54b9f95f39f5
-
SHA256
b592240b55c4c0fcf3733ba808523025ec245302d7ebc897bbc6824596de90a7
-
SHA512
133edc6a33503896adcc86381f1bed32646b734e246b22843a524c489bd6a63c38e696aa14b814c744d817385146ad214a78963a80c6cb3d9a7783099ae6791a
-
SSDEEP
6144:BwHysO+NnMZ2INVorOnii05dapobD/OLJoMyk6zk:qO+NFYRYQyGNTykIk
Malware Config
Extracted
C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\# DECRYPT MY FILES #.txt
http://52uo5k3t73ypjije.5tb8hy.bid/AF42-033B-F98E-0046-154C
http://52uo5k3t73ypjije.y12acl.bid/AF42-033B-F98E-0046-154C
http://52uo5k3t73ypjije.hhc366.top/AF42-033B-F98E-0046-154C
http://52uo5k3t73ypjije.gg4dgp.bid/AF42-033B-F98E-0046-154C
http://52uo5k3t73ypjije.onion.to/AF42-033B-F98E-0046-154C
http://52uo5k3t73ypjije.onion/AF42-033B-F98E-0046-154C
Extracted
C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\# DECRYPT MY FILES #.html
Signatures
-
Cerber 2 IoCs
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
description ioc Process Mutant opened shell.{46ACF05D-0D58-2BE0-F338-E81C4F4AB811} 8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe Mutant created shell.{46ACF05D-0D58-2BE0-F338-E81C4F4AB811} ReAgentc.exe -
Cerber family
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ReAgentc.exe -
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 2532 bcdedit.exe 1536 bcdedit.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{C7CD5A05-A6B9-B06B-3FDB-EB4CCFC45048}\\ReAgentc.exe\"" 8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{C7CD5A05-A6B9-B06B-3FDB-EB4CCFC45048}\\ReAgentc.exe\"" ReAgentc.exe -
Contacts a large (522) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Deletes itself 1 IoCs
pid Process 2824 cmd.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\ReAgentc.lnk 8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\ReAgentc.lnk ReAgentc.exe -
Executes dropped EXE 2 IoCs
pid Process 2716 ReAgentc.exe 2328 ReAgentc.exe -
Loads dropped DLL 5 IoCs
pid Process 2440 8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe 2440 8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe 2540 8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe 2716 ReAgentc.exe 2716 ReAgentc.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\ReAgentc = "\"C:\\Users\\Admin\\AppData\\Roaming\\{C7CD5A05-A6B9-B06B-3FDB-EB4CCFC45048}\\ReAgentc.exe\"" 8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\ReAgentc = "\"C:\\Users\\Admin\\AppData\\Roaming\\{C7CD5A05-A6B9-B06B-3FDB-EB4CCFC45048}\\ReAgentc.exe\"" 8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\ReAgentc = "\"C:\\Users\\Admin\\AppData\\Roaming\\{C7CD5A05-A6B9-B06B-3FDB-EB4CCFC45048}\\ReAgentc.exe\"" ReAgentc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\ReAgentc = "\"C:\\Users\\Admin\\AppData\\Roaming\\{C7CD5A05-A6B9-B06B-3FDB-EB4CCFC45048}\\ReAgentc.exe\"" ReAgentc.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ReAgentc.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmpCCA2.bmp" ReAgentc.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2440 set thread context of 2540 2440 8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe 30 PID 2716 set thread context of 2328 2716 ReAgentc.exe 39 -
Drops file in Program Files directory 15 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\ACADEMIC.ONE ReAgentc.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\# DECRYPT MY FILES #.html ReAgentc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\PLANNERS.ONE ReAgentc.exe File created C:\Program Files (x86)\Microsoft Office\Office14\OneNote\# DECRYPT MY FILES #.txt ReAgentc.exe File created C:\Program Files (x86)\Microsoft Office\Office14\OneNote\# DECRYPT MY FILES #.vbs ReAgentc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OneNote\SendToOneNote.ini ReAgentc.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\# DECRYPT MY FILES #.url ReAgentc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\DESIGNER.ONE ReAgentc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OneNote\SendToOneNote-PipelineConfig.xml ReAgentc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\BUSINESS.ONE ReAgentc.exe File created C:\Program Files (x86)\Microsoft Office\Office14\OneNote\# DECRYPT MY FILES #.html ReAgentc.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\# DECRYPT MY FILES #.txt ReAgentc.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\# DECRYPT MY FILES #.vbs ReAgentc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\BLANK.ONE ReAgentc.exe File created C:\Program Files (x86)\Microsoft Office\Office14\OneNote\# DECRYPT MY FILES #.url ReAgentc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\ 8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe File opened for modification C:\Windows\ ReAgentc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ReAgentc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ReAgentc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2824 cmd.exe 2764 PING.EXE 1020 cmd.exe 2304 PING.EXE -
NSIS installer 2 IoCs
resource yara_rule behavioral1/files/0x000500000001a41f-37.dat nsis_installer_1 behavioral1/files/0x000500000001a41f-37.dat nsis_installer_2 -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2596 vssadmin.exe -
Kills process with taskkill 2 IoCs
pid Process 1368 taskkill.exe 1824 taskkill.exe -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\Desktop 8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{C7CD5A05-A6B9-B06B-3FDB-EB4CCFC45048}\\ReAgentc.exe\"" 8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\Desktop ReAgentc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{C7CD5A05-A6B9-B06B-3FDB-EB4CCFC45048}\\ReAgentc.exe\"" ReAgentc.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b05b5119722bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5665A601-9765-11EF-B42B-C23FE47451C3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e78a69453f00554b9c7935775bae7b960000000002000000000010660000000100002000000010ce90f77ad4ca99d4fc186fb48be2d2ce281758eb4b94210dd16814b680abb1000000000e8000000002000020000000195a82c23a26da38d1d9af2889acaaa69585dfdabfd1614e13c5e10dc9000d89200000001e4764974ea152d9b2969250250792e6a3ea0a80d926dbe053975e309d3e2daa40000000f48a328ff2e782b95e65cd5db633f364c005833835f38b18ae20814f4d89a3acee8e321d643a3ee485d6d07b1d8ebdca8c5145f9da985061c2a0bbd69e66703d iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "436526565" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{56575DC1-9765-11EF-B42B-C23FE47451C3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 2764 PING.EXE 2304 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2328 ReAgentc.exe 2328 ReAgentc.exe 2328 ReAgentc.exe 2328 ReAgentc.exe 2328 ReAgentc.exe 2328 ReAgentc.exe 2328 ReAgentc.exe 2328 ReAgentc.exe 2328 ReAgentc.exe 2328 ReAgentc.exe 2328 ReAgentc.exe 2328 ReAgentc.exe 2328 ReAgentc.exe 2328 ReAgentc.exe 2328 ReAgentc.exe 2328 ReAgentc.exe 2328 ReAgentc.exe 2328 ReAgentc.exe 2328 ReAgentc.exe 2328 ReAgentc.exe 2328 ReAgentc.exe 2328 ReAgentc.exe 2328 ReAgentc.exe 2328 ReAgentc.exe 2328 ReAgentc.exe 2328 ReAgentc.exe 2328 ReAgentc.exe 2328 ReAgentc.exe 2328 ReAgentc.exe 2328 ReAgentc.exe 2328 ReAgentc.exe 2328 ReAgentc.exe 2328 ReAgentc.exe 2328 ReAgentc.exe 2328 ReAgentc.exe 2328 ReAgentc.exe 2328 ReAgentc.exe 2328 ReAgentc.exe 2328 ReAgentc.exe 2328 ReAgentc.exe 2328 ReAgentc.exe 2328 ReAgentc.exe 2328 ReAgentc.exe 2328 ReAgentc.exe 2328 ReAgentc.exe 2328 ReAgentc.exe 2328 ReAgentc.exe 2328 ReAgentc.exe 2328 ReAgentc.exe 2328 ReAgentc.exe 2328 ReAgentc.exe 2328 ReAgentc.exe 2328 ReAgentc.exe 2328 ReAgentc.exe 2328 ReAgentc.exe 2328 ReAgentc.exe 2328 ReAgentc.exe 2328 ReAgentc.exe 2328 ReAgentc.exe 2328 ReAgentc.exe 2328 ReAgentc.exe 2328 ReAgentc.exe 2328 ReAgentc.exe 2328 ReAgentc.exe -
Suspicious use of AdjustPrivilegeToken 51 IoCs
description pid Process Token: SeDebugPrivilege 2540 8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe Token: SeDebugPrivilege 1824 taskkill.exe Token: SeDebugPrivilege 2328 ReAgentc.exe Token: SeBackupPrivilege 2084 vssvc.exe Token: SeRestorePrivilege 2084 vssvc.exe Token: SeAuditPrivilege 2084 vssvc.exe Token: SeIncreaseQuotaPrivilege 1664 wmic.exe Token: SeSecurityPrivilege 1664 wmic.exe Token: SeTakeOwnershipPrivilege 1664 wmic.exe Token: SeLoadDriverPrivilege 1664 wmic.exe Token: SeSystemProfilePrivilege 1664 wmic.exe Token: SeSystemtimePrivilege 1664 wmic.exe Token: SeProfSingleProcessPrivilege 1664 wmic.exe Token: SeIncBasePriorityPrivilege 1664 wmic.exe Token: SeCreatePagefilePrivilege 1664 wmic.exe Token: SeBackupPrivilege 1664 wmic.exe Token: SeRestorePrivilege 1664 wmic.exe Token: SeShutdownPrivilege 1664 wmic.exe Token: SeDebugPrivilege 1664 wmic.exe Token: SeSystemEnvironmentPrivilege 1664 wmic.exe Token: SeRemoteShutdownPrivilege 1664 wmic.exe Token: SeUndockPrivilege 1664 wmic.exe Token: SeManageVolumePrivilege 1664 wmic.exe Token: 33 1664 wmic.exe Token: 34 1664 wmic.exe Token: 35 1664 wmic.exe Token: SeIncreaseQuotaPrivilege 1664 wmic.exe Token: SeSecurityPrivilege 1664 wmic.exe Token: SeTakeOwnershipPrivilege 1664 wmic.exe Token: SeLoadDriverPrivilege 1664 wmic.exe Token: SeSystemProfilePrivilege 1664 wmic.exe Token: SeSystemtimePrivilege 1664 wmic.exe Token: SeProfSingleProcessPrivilege 1664 wmic.exe Token: SeIncBasePriorityPrivilege 1664 wmic.exe Token: SeCreatePagefilePrivilege 1664 wmic.exe Token: SeBackupPrivilege 1664 wmic.exe Token: SeRestorePrivilege 1664 wmic.exe Token: SeShutdownPrivilege 1664 wmic.exe Token: SeDebugPrivilege 1664 wmic.exe Token: SeSystemEnvironmentPrivilege 1664 wmic.exe Token: SeRemoteShutdownPrivilege 1664 wmic.exe Token: SeUndockPrivilege 1664 wmic.exe Token: SeManageVolumePrivilege 1664 wmic.exe Token: 33 1664 wmic.exe Token: 34 1664 wmic.exe Token: 35 1664 wmic.exe Token: SeDebugPrivilege 1368 taskkill.exe Token: 33 1932 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1932 AUDIODG.EXE Token: 33 1932 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1932 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1884 iexplore.exe 796 iexplore.exe 796 iexplore.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 796 iexplore.exe 796 iexplore.exe 1884 iexplore.exe 1884 iexplore.exe 444 IEXPLORE.EXE 444 IEXPLORE.EXE 796 iexplore.exe 796 iexplore.exe 2068 IEXPLORE.EXE 2068 IEXPLORE.EXE 1836 IEXPLORE.EXE 1836 IEXPLORE.EXE 1836 IEXPLORE.EXE 1836 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2440 wrote to memory of 2540 2440 8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe 30 PID 2440 wrote to memory of 2540 2440 8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe 30 PID 2440 wrote to memory of 2540 2440 8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe 30 PID 2440 wrote to memory of 2540 2440 8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe 30 PID 2440 wrote to memory of 2540 2440 8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe 30 PID 2440 wrote to memory of 2540 2440 8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe 30 PID 2440 wrote to memory of 2540 2440 8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe 30 PID 2440 wrote to memory of 2540 2440 8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe 30 PID 2440 wrote to memory of 2540 2440 8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe 30 PID 2440 wrote to memory of 2540 2440 8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe 30 PID 2440 wrote to memory of 2540 2440 8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe 30 PID 2540 wrote to memory of 2716 2540 8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe 33 PID 2540 wrote to memory of 2716 2540 8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe 33 PID 2540 wrote to memory of 2716 2540 8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe 33 PID 2540 wrote to memory of 2716 2540 8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe 33 PID 2540 wrote to memory of 2824 2540 8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe 34 PID 2540 wrote to memory of 2824 2540 8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe 34 PID 2540 wrote to memory of 2824 2540 8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe 34 PID 2540 wrote to memory of 2824 2540 8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe 34 PID 2824 wrote to memory of 1824 2824 cmd.exe 36 PID 2824 wrote to memory of 1824 2824 cmd.exe 36 PID 2824 wrote to memory of 1824 2824 cmd.exe 36 PID 2824 wrote to memory of 1824 2824 cmd.exe 36 PID 2824 wrote to memory of 2764 2824 cmd.exe 38 PID 2824 wrote to memory of 2764 2824 cmd.exe 38 PID 2824 wrote to memory of 2764 2824 cmd.exe 38 PID 2824 wrote to memory of 2764 2824 cmd.exe 38 PID 2716 wrote to memory of 2328 2716 ReAgentc.exe 39 PID 2716 wrote to memory of 2328 2716 ReAgentc.exe 39 PID 2716 wrote to memory of 2328 2716 ReAgentc.exe 39 PID 2716 wrote to memory of 2328 2716 ReAgentc.exe 39 PID 2716 wrote to memory of 2328 2716 ReAgentc.exe 39 PID 2716 wrote to memory of 2328 2716 ReAgentc.exe 39 PID 2716 wrote to memory of 2328 2716 ReAgentc.exe 39 PID 2716 wrote to memory of 2328 2716 ReAgentc.exe 39 PID 2716 wrote to memory of 2328 2716 ReAgentc.exe 39 PID 2716 wrote to memory of 2328 2716 ReAgentc.exe 39 PID 2716 wrote to memory of 2328 2716 ReAgentc.exe 39 PID 2328 wrote to memory of 2596 2328 ReAgentc.exe 40 PID 2328 wrote to memory of 2596 2328 ReAgentc.exe 40 PID 2328 wrote to memory of 2596 2328 ReAgentc.exe 40 PID 2328 wrote to memory of 2596 2328 ReAgentc.exe 40 PID 2328 wrote to memory of 1664 2328 ReAgentc.exe 45 PID 2328 wrote to memory of 1664 2328 ReAgentc.exe 45 PID 2328 wrote to memory of 1664 2328 ReAgentc.exe 45 PID 2328 wrote to memory of 1664 2328 ReAgentc.exe 45 PID 2328 wrote to memory of 2532 2328 ReAgentc.exe 47 PID 2328 wrote to memory of 2532 2328 ReAgentc.exe 47 PID 2328 wrote to memory of 2532 2328 ReAgentc.exe 47 PID 2328 wrote to memory of 2532 2328 ReAgentc.exe 47 PID 2328 wrote to memory of 1536 2328 ReAgentc.exe 49 PID 2328 wrote to memory of 1536 2328 ReAgentc.exe 49 PID 2328 wrote to memory of 1536 2328 ReAgentc.exe 49 PID 2328 wrote to memory of 1536 2328 ReAgentc.exe 49 PID 2328 wrote to memory of 796 2328 ReAgentc.exe 52 PID 2328 wrote to memory of 796 2328 ReAgentc.exe 52 PID 2328 wrote to memory of 796 2328 ReAgentc.exe 52 PID 2328 wrote to memory of 796 2328 ReAgentc.exe 52 PID 2328 wrote to memory of 2932 2328 ReAgentc.exe 53 PID 2328 wrote to memory of 2932 2328 ReAgentc.exe 53 PID 2328 wrote to memory of 2932 2328 ReAgentc.exe 53 PID 2328 wrote to memory of 2932 2328 ReAgentc.exe 53 PID 796 wrote to memory of 444 796 iexplore.exe 55 PID 796 wrote to memory of 444 796 iexplore.exe 55 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe"2⤵
- Cerber
- Modifies visiblity of hidden/system files in Explorer
- Adds policy Run key to start application
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Users\Admin\AppData\Roaming\{C7CD5A05-A6B9-B06B-3FDB-EB4CCFC45048}\ReAgentc.exe"C:\Users\Admin\AppData\Roaming\{C7CD5A05-A6B9-B06B-3FDB-EB4CCFC45048}\ReAgentc.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Roaming\{C7CD5A05-A6B9-B06B-3FDB-EB4CCFC45048}\ReAgentc.exe"C:\Users\Admin\AppData\Roaming\{C7CD5A05-A6B9-B06B-3FDB-EB4CCFC45048}\ReAgentc.exe"4⤵
- Cerber
- Modifies visiblity of hidden/system files in Explorer
- Adds policy Run key to start application
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\system32\vssadmin.exe"C:\Windows\system32\vssadmin.exe" delete shadows /all /quiet5⤵
- Interacts with shadow copies
PID:2596
-
-
C:\Windows\system32\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" shadowcopy delete5⤵
- Suspicious use of AdjustPrivilegeToken
PID:1664
-
-
C:\Windows\System32\bcdedit.exe"C:\Windows\System32\bcdedit.exe" /set {default} recoveryenabled no5⤵
- Modifies boot configuration data using bcdedit
PID:2532
-
-
C:\Windows\System32\bcdedit.exe"C:\Windows\System32\bcdedit.exe" /set {default} bootstatuspolicy ignoreallfailures5⤵
- Modifies boot configuration data using bcdedit
PID:1536
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:796 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:796 CREDAT:275457 /prefetch:26⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:444
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:796 CREDAT:472065 /prefetch:26⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1836
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt5⤵PID:2932
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"5⤵PID:1764
-
-
C:\Windows\system32\cmd.exe/d /c taskkill /f /im "ReAgentc.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{C7CD5A05-A6B9-B06B-3FDB-EB4CCFC45048}\ReAgentc.exe" > NUL5⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:1020 -
C:\Windows\system32\taskkill.exetaskkill /f /im "ReAgentc.exe"6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1368
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.16⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2304
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /f /im "8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe" > NUL3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "8283c1cc0db9501e05206c0542fe9447_JaffaCakes118.exe"4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1824
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.14⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2764
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2084
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:1884 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1884 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2068
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵
- System Location Discovery: System Language Discovery
PID:1076
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4cc1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1932
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Defense Evasion
Direct Volume Access
1Hide Artifacts
1Hidden Files and Directories
1Indicator Removal
2File Deletion
2Modify Registry
5Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\# DECRYPT MY FILES #.html
Filesize19KB
MD5dc30d27d489c851bfe7366b7d8dd25b9
SHA1d892794c6a1f0422190ef29817290e26a3f458cc
SHA256a8caa7ee9601b09cf3753a7cbe781b019b2565f60cdbb5cdb7e76b111426dfea
SHA512543a6fc221448a77000ea53f83c4f29406f6e2b46ba28c0e153d270b0040494b6d496bb3bbffb054b0a9ae521fc2beed6fff023d554948b6fcc99698016814f3
-
C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\# DECRYPT MY FILES #.txt
Filesize10KB
MD56d29679e6b4d8bd35b86350bcefc57fe
SHA11204c9e0bc7741d9d20d4abe2b1dc2a6203411d8
SHA256dcd6ba61ff8dcc9950bde5d1f485b2ce28e021b360d869317f929b8f0484f06d
SHA51263bf52c5d6ceb126cd41a0c7d533f7b139eb28af3631ee3cefada779dda438911752a0c265cabe64e4784ecd67e1fcd828186b1b0861210a14f34729778610f8
-
C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\# DECRYPT MY FILES #.url
Filesize90B
MD537cb30c69c997d6709bd912c65c071bc
SHA12ef5eb1e415ec49a9baa44c6d9f04238047d1fde
SHA2568d6f0b5ef79130a4299923c4ccb09df0fd975cd7eae84dc95386b852a19dca93
SHA512f32fa079bdff591e0600f22a4bef69e8851a257dcf8704809f7f936274949b4db701cc8d7546a106065416beddaf1e5a30603f53eda6f29c5d973db4ad77825a
-
C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\# DECRYPT MY FILES #.vbs
Filesize252B
MD518d46f5d8ebd3c7d6df0c7a8fd1bd64d
SHA1aeb8407457434aabce2a4c2f95fe305c5303f929
SHA256ceb35b75d397b07c84dfab3a28189e9431bdf80ec99ab65f9ccf01986bd4a8e9
SHA51235fc759be0dee77eb9e39350873c24d9693cf6f370f171814e2ce6250ea814fea8a0887442ebae9077d6e9ff81ae7034faa0afcb080401a7d4ac384d2ba42d65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b54da91a38454f07da1e2f1067676ab3
SHA167f93e416b07cadc3e2d73b81f4b87b7c3141983
SHA25616898f490f6e8f7fd696e3cc546ae81e84758115a605ee6f4395fe539daf8c18
SHA512030f0687d0e3ecc96186faf4832b0153ccedd4079c0af47eb4a863aec32b04dd6ee85fd3dccf01e8f2bcae81360cfe16f1dadaf6ffdbd14b9e7c7f267f53d860
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2c36a8f2c1add37744d0666451f046c
SHA12a0c0415ed0a1dfe50d25d8d65fbe1913ea00f58
SHA2561a96ddc6007dc1601507eab1967a97d338e67e963e963001579f96c632bb29de
SHA512accb89eb0ebc44957e154357e0075acf24f98d452fc6dee85f0a545e0434768e3c2d00a50fcec598fd56e6e025a5dd75986a48e98d0c9d3149cb2f4804c954d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ff2a2e987f55c8725fd49a09b665ec1
SHA18cbed01f2aed96b579e2da7755de4dece875752c
SHA25668c1f4bac60e21e59524ad633e3b4cfad95948b63b225e606a934b101514b415
SHA512bc84710b44e387b2d6be68cf110d01be59643ddc366f70d35c86782fdb6724cd74222f9e06337cf83c38f7b9bf607d322a727c210ccd9ae3d527582fc2e04596
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51240c54a8f46e89574b57ff84d68560a
SHA1c51dad8a9c84192d57689c2b7d61e31b6d4145a1
SHA25696f66540f8b65be1d9170db6cd55b4a1296f2cdd161db9fe5bb62bae2feb01e7
SHA5124e0c64eea9a497a4bbaee208a6c9ca8f2daa85af01eaadc6023831c38c2b41e94c68dc856e0005005bb5d1b3c2f9672ca15a863b1f853082c4d9dc9552414667
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de09b2eef8830fc1d79e03a984f90556
SHA114b5bfc2d0a7e9a75a81ac39822f5a06f37cee09
SHA256e15073a764f7a11d5f6a43a248b9534339e2f0d0d8415d4e55dcd7d08c94747d
SHA512982ec57c5df805ae9ede3bbb627806b451a3173ed310402325e24e944af835736ad077d49fdea3e06a44f575d906cd0357c6c4ce0a612eac3ba2c915590a7f39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b575c98afe60103beb8a52a1ebe5ba37
SHA188ce11f261cc18d0a30413a8b2e3929181343c86
SHA25692fc214e592559c3347d8bdb0b5265c6b28e1f9b24de016c26fd079d055c37e1
SHA512838eafbd02eb31c157a41c2393a5e4565d43cc8ca73e8faecb9e3e061831bd5df3d73f6e6ca42f7f508eabcf68f512da359ed0865641d5730e70cacd8e46ecbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c07ed043090190f2554ae3d338ef599
SHA14b45528ff7beafd01fcbfe57a88f32fed986d1a5
SHA256797319661759a29111c1bcbabfd384a809d11425adeb9d5e1ab2c6d7de059143
SHA512c4c7c952eaad3eaf6ee1f5955e1c2ceb406e33165a22d827e0dc05c892693dea980c07c3f48dec0f01bfde861b463fb88ad87e5d2cd7adf755765c76e556bfd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f068458446186746b1436c78eeca9345
SHA15c090f07e5795b66e885f5c9e3e485509586083b
SHA256af7c4107443b923add50aeb54c05cd098a92b17721a1effb75a2aae1516e603a
SHA512fca721d2c5b797f70b237daa4c83c0b6fddf47e250bf59f1c17f497a22578fcdcc9fdb3beadb5854902af3d2b7467e6492ecab7923938718880f4024ca9219e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d94a2291f51f18aa735c648ea9c8512c
SHA122ea1612394449bc5330f9b92d21c9c55e770300
SHA256a852943bd2a26fdb8724de44a8764c0597c3b96632772bcd36cc2d51d8e286d7
SHA51254ea61aa77049926c1312ceb86c6a652619aa6c755db99eedff4725b29c248b60f3e4e036e158f5ec41a955442011c14596f5cec4130ce1e1f52107991eec143
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517d85047e15a3d23d0233a994c847c65
SHA1b6063d328f4fc3cc9fa4edd86117a3fd2579832a
SHA256512ca0ed3f4e9ae3fc4b7590aaf4e20a3e119c4f65c6d41195eaa77b3a1ce651
SHA512e27a6e367183dd3952fd8ab9ef138531b613971486821eef86e98b7929b1698dade0553747285e9f3674f385a32459fbe350c4a00334a2c76a29cf3f99dd6dc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f464186bc4e09c41f0591fbdf41605d
SHA1a15320703f18d9fb3a82b123024949b7ba9087ff
SHA256afe6c54c62108f97398ab95322bb5fc5e8b7c226befe144f42529737a3a6a0f2
SHA512d8a94ba52842e548fe4f761cb55c223c3f36e0ff4312515ac2c0eb8da84fc68cb45daaca19aa96c8875fd7b8408553fc036be0d04b32610d6830c813cfb7c568
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514b9fc91cf04a61563987abe071cedf0
SHA126df1da1421bf0306bd6a0b906e9272765e6403e
SHA256bb594b73581f15d2a54f377fac1ab30751a27eef3a3e373ce8e745367476513e
SHA512e2bcd0f987ffd7293833f3cace5cd7b403dd5e9092aa1a67274d8906f1faf5a872ea295d7aa45f672ec9fa3f2995a4b9b67e6e3e13d478aab0a83e0f47a08a42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e536d83244def90107a0bf39b0942bf
SHA18332a286bd6208f80f457f3dece91bf812affe20
SHA2565cbc4394c88110ead140c6d802695bd8085bf920d01aa3667e71c197444f833a
SHA51215c3a8b8b58a22cc6f09537b0b5c5beeba74fd69da23d4e972c84a22444645e1deafb56cc9599dc7daf74c61a8c98599f392a3831c7a434c6fc3029302e7170c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5115a1857f659246165a9bb18593cbeff
SHA102fb3e3a059166ba06326993d61c121467b3d59b
SHA256c4738244ba564319c9d65ec0e84a3cc0e85f19120f14937b6f9294e8acfd49be
SHA512dca84c5c742d6a154c8701b88026f41f0d08b64f7cf962570d8faf09434034f0ee71474abbb3e3e187b6d5e4597ed11adaa4b093c26d7524b2791d1f9d0c761f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579f9b7de53707ca536e55d8c4c893faa
SHA133be8bb4eddf92624d2eb3b9a54a330236a9718b
SHA256c9f5359d544c6aa77626cba243610a92be53862a44ff8d3534d889cde1fea082
SHA5126e4dd4eeed995190214e79ecbd680a023e4122225bd3b3829e3b5fec7a55c0101115a3abff9bb4b91e09eacf36c7a83f8a757aeca2da219b1cf34a97e08c949f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559769683ef11edfdf9d547032c60e9d7
SHA1a50bba26357bc56a99354dd0fe6caecbae271328
SHA2565b0ad22a67000badf08ea36494d48032ec849e1b38977f6af39e33066b51e0eb
SHA512844f7817a7835eeb9e05eb37d22f1006d0379a78fa241124d4d5940f2ef1b8411d94c5803c73517f947c9307de6bd353903f5a198b3119ed9b454aa38b7904dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5649fce74770e77fc89e1b6c4ff71408e
SHA11744f48c9edb0a1209756c4fe13546e67bf1e81e
SHA256d88dfa0f8e83c175595f8870e08b0ab75dff4bfb18e701e1f67f45a1bfadc2f8
SHA51246e4ac48987fb8b095157e32fca798f9f7740bcf326a32b06ba65639755354472ea2c634e2e80496b0cd9fb2b2b449b981cc65b5976633f8ec1a538f72c95b7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ee633e706dc6204670e89247390b6ea
SHA10da2d01ac5cc873a5f8ecee2679ec91c6b6f71f7
SHA2569e21b58fa94806a81c0e106de2e7cd8592a3ee271119b6e779b3eb34a1248eb6
SHA512dfaec909d0d881985bcf7008c10aaca5737b01cb246570a35185bc4ef806b5a9995193ebbf7857b45674cb04752e1bd89b732d250af87b1806e3802894d309d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580a1b86713a34feda0a7f1aac5734451
SHA1fb3120bc0eaa138b67f8993670ffe4d6dd4f3f52
SHA256a3878b657461f9f6f075b104d57febaf2bf992eb5ec69c2744780bd5482fc5cb
SHA512b9fbdb101ab3daa181405baf4cf2723197e5207a6cdd1a628390ca9c9f27bf084a64938c231301f42397367389e8f6037fee3e02e439836af36e3d81dbbd6482
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512f179870d13261362b92d1487dd2360
SHA14a476a2d8451fa2742b671de63b8fc91fd5f0df3
SHA2569cc4702bf86168466d2acb92998905fedf8f9495b6f97c0895ee2fc701618389
SHA5128e139c2437272213812528d023dd1e33b5f9adeb7714203f282d98f2b11b53a0d2fe2d182d57fed2380437f525c0ff19b176fb85e5dca0eee2172501c7023b07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e34e73eaa99076bb67f42a80b49715c
SHA16b807c8177fe599bee16f0f1692a11c533d44ed7
SHA25680308673f5f5e9190ecab5855a4c322837f9843964b6d35b60f67dc1388cc94c
SHA512eb64c7781f69f958e451b52bb5d4a9aa251a0eda25eaacb80ddf91a1ae93989cff99ab1b3216bded142ea9447e11067f33a96d1a60e3fb0a315c3450a6bc3b47
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{56575DC1-9765-11EF-B42B-C23FE47451C3}.dat
Filesize3KB
MD51b97cc7f61c551f4d952fe363f273162
SHA1ad4c10400fb5a01c8bda2c1baf48bb35b6b01714
SHA256f82895c3265eedab26be9e001e070d23065a893f1ac9d461ccbb5ba510097cf0
SHA512134cdf058703d5b994a6dedffd30841a55cfe8a0e93a7a56c2001fbc6a6262bd66301cc64e7efe6d59fd2ccd07d7ecf81e4863abbaaf0a3770e856bb77e141f7
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{5665A601-9765-11EF-B42B-C23FE47451C3}.dat
Filesize5KB
MD5b4725c4b7f2aec43fd69f1f72f726e9b
SHA14e1d0d49326f0ec08cb56fa294d4e1d986a33799
SHA25601ba7db9c21814b791fd2d1e66d2fdf58d23cdbe5569a1b3ec4e35c9c7d6265f
SHA512f3c3c958c610fe9d3ae228dea85fba371b767e17398fc154b3e38cc199f89ccc1e6d1480974623d4b5dfcccd2dde73c33347958b536939fe65349fb4a639b869
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5GWW47WY\json[1].json
Filesize289B
MD559386c53f2570f0e370e2ece30ccce7a
SHA1b2fe2bc41bc2c07a33ebbc2e3ec6e30229215d69
SHA2563b845724fd74dd2034ec56d4a2ecacc2dd49e0b388bf68f2e9546b9f8fa8065f
SHA5123dd155da349193d5b1c185c52b2bd5b66edcff318d4fb051799523c490f6a95c9da85ab8dc203334b4630c978b0cb6fa70fcc54497e33ea1b9c91f4497541569
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
3KB
MD56b6888981cf28ad6060bf74a6310d40c
SHA15eab9777cfcf3be44dd621eb3a7abf482df3e7f3
SHA256d429f4b6cda0bc7014c10f05cb4d9a520cbabc6b297c4e8cd792b2b5e854d987
SHA51264c6d6ea608e1c5d0c3a952caf5816a16d31212e1bb9e62b76710b4e9dd751023f3d8c58333c73cf79c7aff0fafb1143290b0666a7e20b798c3e52a563a61655
-
Filesize
3KB
MD5efbc169b88295e057788c9c1014063b9
SHA10de91b944381992ed591813211882486813a0f9c
SHA2568ab689b3789c7310d96855311e9af3c59ea7a0c40318c2ab5ea262f13f4be084
SHA51249e1dacb0b67d4d9257b9be6a48fabd15b8c91394a02fe9abedff76e9e794ae6db95a2b6ef222d028bd0dbaf4ac32c56511380d26a5ccd78dbec58ae7f3fd4df
-
Filesize
2KB
MD51b5c9ac81d0db16bdef65bb8ed4401a1
SHA1b45a09049cdabcdaa104e284bb457aabf9e02909
SHA25679f8f465d0ad808a0c2bc0bd79cad80d1f2ec0e92df2a7b9d79d764bb0308535
SHA512c2d6146fad4289a9f6b502872f102dbe7678bab74f744810845ed80d137620b3ea45b8141f2600cc557df27f3e79523df6ce8bc9fc2947798f2171034149076c
-
Filesize
3KB
MD5c22dce2c95e3fbc8ac2f569b7fb8474a
SHA19e5b1c407424004fa5c0c1d96af96a9b0e10353e
SHA256423cad4eca8206b5b3ef851278a749e5246042e32759abe6b2026d14ed2ba6d6
SHA512f516531af2f75cb949ef6fbd2bd18e12aa07f94e2b7cb1398d0b13033f84c91f32ca28dc76c6e8caa8191c7b115a3cf59fddc241bfb3e244ae50247c6eee69f1
-
Filesize
207KB
MD52fcb0be151595ca64a870aa356c0db8c
SHA1e9ecdf81188a5fc3800fbe4b2856c04cbb838def
SHA25658c63bb36f82c489fee50f4f460fb0467abf158200d512c0b007b8111a53b00d
SHA512bbaa13b73a94c1c4c421e99e148aaadc2f01e2b2e5fe49f1bd8c36ddca7592b31660a3e6daac045dc6d92a93028b4b21ea87f7290ee353adb28d43188ad01690
-
Filesize
1KB
MD5f41ad6881c29ac0ac84c3021799efae4
SHA170c3ad1f6ed6052b5711d3f1e434f44175ea8943
SHA256da3eca46f51755a095fd975b153081239be3c0a8b7df39170c5505d30bf4cc48
SHA512e5ab82556c737fa9a84bbd8fb1d4d95386b611b8702b7f8003a8912b6573501048eaa2c542141002229b8f3d6e2905af2fc0b6d92cc3b4fd8aca5baed30e1b39
-
Filesize
11KB
MD56f5257c0b8c0ef4d440f4f4fce85fb1b
SHA1b6ac111dfb0d1fc75ad09c56bde7830232395785
SHA256b7ccb923387cc346731471b20fc3df1ead13ec8c2e3147353c71bb0bd59bc8b1
SHA512a3cc27f1efb52fb8ecda54a7c36ada39cefeabb7b16f2112303ea463b0e1a4d745198d413eebb3551e012c84a20dcdf4359e511e51bc3f1a60b13f1e3bad1aa8
-
Filesize
72KB
MD59b35870798ea01e8e943091ec7a0bb80
SHA166650be447dceabd4ba938ccf1a9663f2eb99a91
SHA256663aa24d2ef5cc3a0f0b8e8e575643c59a37b4c0fd7d7b2cf5217f14c9eb7309
SHA512b9f297a2cc255a7aac51ff2b1e45f6985359968bfe88b8e7201f7ecb5b16bfd97323042a29ad87e149c7994d9e16b034ebe1b044bffc6e2a98ebef2997656279
-
Filesize
258KB
MD58283c1cc0db9501e05206c0542fe9447
SHA1fa800fdf2fc3bc8c015d7f20e04a54b9f95f39f5
SHA256b592240b55c4c0fcf3733ba808523025ec245302d7ebc897bbc6824596de90a7
SHA512133edc6a33503896adcc86381f1bed32646b734e246b22843a524c489bd6a63c38e696aa14b814c744d817385146ad214a78963a80c6cb3d9a7783099ae6791a