Analysis
-
max time kernel
140s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-11-2024 17:18
Static task
static1
Behavioral task
behavioral1
Sample
869e516b99f01a39f9ee0aa9e404fcbf_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
869e516b99f01a39f9ee0aa9e404fcbf_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
869e516b99f01a39f9ee0aa9e404fcbf_JaffaCakes118.exe
-
Size
334KB
-
MD5
869e516b99f01a39f9ee0aa9e404fcbf
-
SHA1
c31624e5da2efa21bf15aad89d135c996a72365f
-
SHA256
a9b1cf763a44f0cd8f59ff3178b19544216dc482aa47bbc7b83b5b26eda5e6aa
-
SHA512
78494b86022d9efb9eea3e98daa5d6a88c52fe23a07f0bc9435057f7382b846f82121b6764644f475b77ae4843259ffc7ef5a20660137c51a903dec33b1aac7c
-
SSDEEP
6144:Taa7bHF1Xe4xpNi+w+iEc/HXCO595ZZol+4NuTDid9LRyrlZZ:TfnXe47g+3iEc/SO595ZgUad9LRaZZ
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.html
Extracted
C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.en\# DECRYPT MY FILES #.txt
cerber
http://cerberhhyed5frqa.xmfhr6.win/E4AA-4B05-04DE-0063-71BF
http://cerberhhyed5frqa.cmfhty.win/E4AA-4B05-04DE-0063-71BF
http://cerberhhyed5frqa.6oifgr.win/E4AA-4B05-04DE-0063-71BF
http://cerberhhyed5frqa.xo59ok.win/E4AA-4B05-04DE-0063-71BF
http://cerberhhyed5frqa.zx34jk.win/E4AA-4B05-04DE-0063-71BF
http://cerberhhyed5frqa.onion/E4AA-4B05-04DE-0063-71BF
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Cerber family
-
Contacts a large (16389) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 1668 bcdedit.exe 1600 bcdedit.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{4B515B6F-3A9B-7D24-0D07-0BB700B153B4}\\newdev.exe\"" 869e516b99f01a39f9ee0aa9e404fcbf_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{4B515B6F-3A9B-7D24-0D07-0BB700B153B4}\\newdev.exe\"" newdev.exe -
Deletes itself 1 IoCs
pid Process 764 cmd.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\newdev.lnk 869e516b99f01a39f9ee0aa9e404fcbf_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2140 newdev.exe -
Loads dropped DLL 2 IoCs
pid Process 2852 869e516b99f01a39f9ee0aa9e404fcbf_JaffaCakes118.exe 2140 newdev.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\newdev = "\"C:\\Users\\Admin\\AppData\\Roaming\\{4B515B6F-3A9B-7D24-0D07-0BB700B153B4}\\newdev.exe\"" newdev.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\newdev = "\"C:\\Users\\Admin\\AppData\\Roaming\\{4B515B6F-3A9B-7D24-0D07-0BB700B153B4}\\newdev.exe\"" newdev.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\newdev = "\"C:\\Users\\Admin\\AppData\\Roaming\\{4B515B6F-3A9B-7D24-0D07-0BB700B153B4}\\newdev.exe\"" 869e516b99f01a39f9ee0aa9e404fcbf_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\newdev = "\"C:\\Users\\Admin\\AppData\\Roaming\\{4B515B6F-3A9B-7D24-0D07-0BB700B153B4}\\newdev.exe\"" 869e516b99f01a39f9ee0aa9e404fcbf_JaffaCakes118.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA newdev.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ipinfo.io -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 869e516b99f01a39f9ee0aa9e404fcbf_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language newdev.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 764 cmd.exe 1920 PING.EXE -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2936 vssadmin.exe -
Kills process with taskkill 1 IoCs
pid Process 1728 taskkill.exe -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Control Panel\Desktop 869e516b99f01a39f9ee0aa9e404fcbf_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{4B515B6F-3A9B-7D24-0D07-0BB700B153B4}\\newdev.exe\"" 869e516b99f01a39f9ee0aa9e404fcbf_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Control Panel\Desktop newdev.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{4B515B6F-3A9B-7D24-0D07-0BB700B153B4}\\newdev.exe\"" newdev.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{46F12721-9941-11EF-8BDE-523A95B0E536} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{46D95961-9941-11EF-8BDE-523A95B0E536} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1920 PING.EXE -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 2140 newdev.exe 2140 newdev.exe 2140 newdev.exe 2140 newdev.exe 2140 newdev.exe 2140 newdev.exe 2140 newdev.exe 2140 newdev.exe 2140 newdev.exe 2140 newdev.exe 2140 newdev.exe 2140 newdev.exe 2140 newdev.exe 2140 newdev.exe 2140 newdev.exe 2140 newdev.exe 2140 newdev.exe 2140 newdev.exe 2140 newdev.exe 2140 newdev.exe 2140 newdev.exe 2140 newdev.exe 2140 newdev.exe 2140 newdev.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeDebugPrivilege 2852 869e516b99f01a39f9ee0aa9e404fcbf_JaffaCakes118.exe Token: SeDebugPrivilege 1728 taskkill.exe Token: SeDebugPrivilege 2140 newdev.exe Token: SeBackupPrivilege 1624 vssvc.exe Token: SeRestorePrivilege 1624 vssvc.exe Token: SeAuditPrivilege 1624 vssvc.exe Token: SeIncreaseQuotaPrivilege 2284 wmic.exe Token: SeSecurityPrivilege 2284 wmic.exe Token: SeTakeOwnershipPrivilege 2284 wmic.exe Token: SeLoadDriverPrivilege 2284 wmic.exe Token: SeSystemProfilePrivilege 2284 wmic.exe Token: SeSystemtimePrivilege 2284 wmic.exe Token: SeProfSingleProcessPrivilege 2284 wmic.exe Token: SeIncBasePriorityPrivilege 2284 wmic.exe Token: SeCreatePagefilePrivilege 2284 wmic.exe Token: SeBackupPrivilege 2284 wmic.exe Token: SeRestorePrivilege 2284 wmic.exe Token: SeShutdownPrivilege 2284 wmic.exe Token: SeDebugPrivilege 2284 wmic.exe Token: SeSystemEnvironmentPrivilege 2284 wmic.exe Token: SeRemoteShutdownPrivilege 2284 wmic.exe Token: SeUndockPrivilege 2284 wmic.exe Token: SeManageVolumePrivilege 2284 wmic.exe Token: 33 2284 wmic.exe Token: 34 2284 wmic.exe Token: 35 2284 wmic.exe Token: SeIncreaseQuotaPrivilege 2284 wmic.exe Token: SeSecurityPrivilege 2284 wmic.exe Token: SeTakeOwnershipPrivilege 2284 wmic.exe Token: SeLoadDriverPrivilege 2284 wmic.exe Token: SeSystemProfilePrivilege 2284 wmic.exe Token: SeSystemtimePrivilege 2284 wmic.exe Token: SeProfSingleProcessPrivilege 2284 wmic.exe Token: SeIncBasePriorityPrivilege 2284 wmic.exe Token: SeCreatePagefilePrivilege 2284 wmic.exe Token: SeBackupPrivilege 2284 wmic.exe Token: SeRestorePrivilege 2284 wmic.exe Token: SeShutdownPrivilege 2284 wmic.exe Token: SeDebugPrivilege 2284 wmic.exe Token: SeSystemEnvironmentPrivilege 2284 wmic.exe Token: SeRemoteShutdownPrivilege 2284 wmic.exe Token: SeUndockPrivilege 2284 wmic.exe Token: SeManageVolumePrivilege 2284 wmic.exe Token: 33 2284 wmic.exe Token: 34 2284 wmic.exe Token: 35 2284 wmic.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2752 iexplore.exe 2752 iexplore.exe 1512 iexplore.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2752 iexplore.exe 2752 iexplore.exe 2752 iexplore.exe 2752 iexplore.exe 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 1512 iexplore.exe 1512 iexplore.exe 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 2852 wrote to memory of 2140 2852 869e516b99f01a39f9ee0aa9e404fcbf_JaffaCakes118.exe 31 PID 2852 wrote to memory of 2140 2852 869e516b99f01a39f9ee0aa9e404fcbf_JaffaCakes118.exe 31 PID 2852 wrote to memory of 2140 2852 869e516b99f01a39f9ee0aa9e404fcbf_JaffaCakes118.exe 31 PID 2852 wrote to memory of 2140 2852 869e516b99f01a39f9ee0aa9e404fcbf_JaffaCakes118.exe 31 PID 2852 wrote to memory of 764 2852 869e516b99f01a39f9ee0aa9e404fcbf_JaffaCakes118.exe 32 PID 2852 wrote to memory of 764 2852 869e516b99f01a39f9ee0aa9e404fcbf_JaffaCakes118.exe 32 PID 2852 wrote to memory of 764 2852 869e516b99f01a39f9ee0aa9e404fcbf_JaffaCakes118.exe 32 PID 2852 wrote to memory of 764 2852 869e516b99f01a39f9ee0aa9e404fcbf_JaffaCakes118.exe 32 PID 764 wrote to memory of 1728 764 cmd.exe 34 PID 764 wrote to memory of 1728 764 cmd.exe 34 PID 764 wrote to memory of 1728 764 cmd.exe 34 PID 764 wrote to memory of 1728 764 cmd.exe 34 PID 764 wrote to memory of 1920 764 cmd.exe 36 PID 764 wrote to memory of 1920 764 cmd.exe 36 PID 764 wrote to memory of 1920 764 cmd.exe 36 PID 764 wrote to memory of 1920 764 cmd.exe 36 PID 2140 wrote to memory of 2936 2140 newdev.exe 37 PID 2140 wrote to memory of 2936 2140 newdev.exe 37 PID 2140 wrote to memory of 2936 2140 newdev.exe 37 PID 2140 wrote to memory of 2936 2140 newdev.exe 37 PID 2140 wrote to memory of 2284 2140 newdev.exe 41 PID 2140 wrote to memory of 2284 2140 newdev.exe 41 PID 2140 wrote to memory of 2284 2140 newdev.exe 41 PID 2140 wrote to memory of 2284 2140 newdev.exe 41 PID 2140 wrote to memory of 1668 2140 newdev.exe 43 PID 2140 wrote to memory of 1668 2140 newdev.exe 43 PID 2140 wrote to memory of 1668 2140 newdev.exe 43 PID 2140 wrote to memory of 1668 2140 newdev.exe 43 PID 2140 wrote to memory of 1600 2140 newdev.exe 45 PID 2140 wrote to memory of 1600 2140 newdev.exe 45 PID 2140 wrote to memory of 1600 2140 newdev.exe 45 PID 2140 wrote to memory of 1600 2140 newdev.exe 45 PID 2140 wrote to memory of 2752 2140 newdev.exe 48 PID 2140 wrote to memory of 2752 2140 newdev.exe 48 PID 2140 wrote to memory of 2752 2140 newdev.exe 48 PID 2140 wrote to memory of 2752 2140 newdev.exe 48 PID 2140 wrote to memory of 2920 2140 newdev.exe 49 PID 2140 wrote to memory of 2920 2140 newdev.exe 49 PID 2140 wrote to memory of 2920 2140 newdev.exe 49 PID 2140 wrote to memory of 2920 2140 newdev.exe 49 PID 2752 wrote to memory of 2272 2752 iexplore.exe 50 PID 2752 wrote to memory of 2272 2752 iexplore.exe 50 PID 2752 wrote to memory of 2272 2752 iexplore.exe 50 PID 2752 wrote to memory of 2272 2752 iexplore.exe 50 PID 2752 wrote to memory of 2052 2752 iexplore.exe 52 PID 2752 wrote to memory of 2052 2752 iexplore.exe 52 PID 2752 wrote to memory of 2052 2752 iexplore.exe 52 PID 2752 wrote to memory of 2052 2752 iexplore.exe 52 PID 1512 wrote to memory of 2556 1512 iexplore.exe 53 PID 1512 wrote to memory of 2556 1512 iexplore.exe 53 PID 1512 wrote to memory of 2556 1512 iexplore.exe 53 PID 1512 wrote to memory of 2556 1512 iexplore.exe 53 PID 2140 wrote to memory of 3068 2140 newdev.exe 54 PID 2140 wrote to memory of 3068 2140 newdev.exe 54 PID 2140 wrote to memory of 3068 2140 newdev.exe 54 PID 2140 wrote to memory of 3068 2140 newdev.exe 54 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\869e516b99f01a39f9ee0aa9e404fcbf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\869e516b99f01a39f9ee0aa9e404fcbf_JaffaCakes118.exe"1⤵
- Adds policy Run key to start application
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Users\Admin\AppData\Roaming\{4B515B6F-3A9B-7D24-0D07-0BB700B153B4}\newdev.exe"C:\Users\Admin\AppData\Roaming\{4B515B6F-3A9B-7D24-0D07-0BB700B153B4}\newdev.exe"2⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\system32\vssadmin.exe"C:\Windows\system32\vssadmin.exe" delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2936
-
-
C:\Windows\system32\wbem\wmic.exe"C:\Windows\system32\wbem\wmic.exe" shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2284
-
-
C:\Windows\System32\bcdedit.exe"C:\Windows\System32\bcdedit.exe" /set {default} recoveryenabled no3⤵
- Modifies boot configuration data using bcdedit
PID:1668
-
-
C:\Windows\System32\bcdedit.exe"C:\Windows\System32\bcdedit.exe" /set {default} bootstatuspolicy ignoreallfailures3⤵
- Modifies boot configuration data using bcdedit
PID:1600
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2752 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2272
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2752 CREDAT:537601 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2052
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt3⤵PID:2920
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"3⤵PID:3068
-
-
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "869e516b99f01a39f9ee0aa9e404fcbf_JaffaCakes118.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\869e516b99f01a39f9ee0aa9e404fcbf_JaffaCakes118.exe" > NUL2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "869e516b99f01a39f9ee0aa9e404fcbf_JaffaCakes118.exe"3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1728
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1920
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1624
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1512 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2556
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵PID:1768
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x59c1⤵PID:2484
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Defense Evasion
Direct Volume Access
1Indicator Removal
2File Deletion
2Modify Registry
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD5635b9e024b159e04ea71894efa774fc5
SHA12f8f66846fbe25bced7a1ec20d3a6e6409b6bae0
SHA256d6f5b406cb209b4ac884b5b028a11b7cd52d25618c609c05b2607230ac011baf
SHA512c9d30ff4e5ec7814ced29106b35347ce8282ae751041c2c2b2553f14236de10eca4b5ceca17babc6a3ea594adb1323fdc7eba472496a243747a48acdd872c070
-
Filesize
85B
MD59163492336727bc7ba640bf5a1ce558d
SHA145fb73edd58a1da26690e6e1ac476743f1321d7e
SHA256191308168b44a6ada1fca6c353dc0d8433b88edcd47f20f3bf50f7ee58818ae1
SHA5124fda8e830b818f8ac1b25c6ca34bbb8d762aca7e786867057304f96f16f249ca2920bc41301b4a99f0e705de8dc9ef348ee91e22487aea6d00e2203bd0304aa7
-
Filesize
219B
MD535a3e3b45dcfc1e6c4fd4a160873a0d1
SHA1a0bcc855f2b75d82cbaae3a8710f816956e94b37
SHA2568ad5e0f423ce1ff13f45a79746813f0f1d56993d7f125ab96f3d93fb54bdc934
SHA5126d8e68b969ef67903aff526e983b0fb496678e4c819139e560a11f754a36c4b5770ac2ecf3fc1d9cb5aaa84f80363b4f55553255569503893192911b80d9d853
-
Filesize
12KB
MD54293034678cbc81c82547e67e91acd91
SHA169428c019f6ea2734263eb32d42705b727fcfe06
SHA256ef6fe665b777d289d54bb79fc63f2a7fe14a7a147e8a946a6a05a25af2b2a977
SHA512f42ad3ad24fe8f00a385769a8d0e2c3b6dff73d4a26333fbb09689a6d32704ce7756ec3246f32a35c74c63955a67b6ef3fa77c86dc9df9d6115f57cc5753c42f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e6c9f7bbcee8d96610579a775d27d44
SHA154ce58533ca24187d4b5824bd22074b7b92aa8f0
SHA2567d51d2d8105cec3a22911ba3d8f66ceb927b258869291bfdb55cf8a1ec6a1f34
SHA512674c54ddacdd74a72b49162767b33dc598d3c945c6c2557e5d945bc72090ff6d5b0783b44c9dac91b9d061e81fcddaaac119a55497c157f7c12cd85733846458
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a89315bcb6941bba66e6f88bd5e88125
SHA1154a8581e8b272b59234734ce7598664d7d06045
SHA25668584973b0c00ae13f487cb7cc4e132f559dd50933d34a5b03bf43b50ea1dc3c
SHA51248840a468b44e913f041890ff72fefc573dadd639e1f3d3c8e876bddbbd99fb01e0aaa8e59f832dfd79c2bb382c45a66f1a5914f5c688e500a320c2636a427f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5977b1319749514bcc4fec27d77e6a2a3
SHA1ed924ccbf0ac45356c32be356fcd4c8f4859a7c8
SHA256cf144ffe465b001fe2ddfb44b93f7d5b439f1f06b38d88b29ff44abe95cd72ce
SHA5123b37480e0e025c2371b9a410a2f619dc9fb8cf38528bf13e7967d0abbdde45221902a154463ef2a72093275d265baf6edd05fff564bd5c17b6bb3c5cd9682f3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a63c3eb071924c4ac9933a5a1f5dabff
SHA10d5978dc86c7ac0e1fa7946bebc78080abe72a0e
SHA2560d85546871d8c3bf7ab6239b09571c8c563b58f7fb2fb139686c0872a07515dc
SHA5121fdf62d4e739982c59c185bb82cde8c62853e0cfea1298d26b6343804b466966d0a3078a09b6466d2313b432fb91f2a1b9ffdfb8d92519acdc01ff2d01768df2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a2dbc741d3c7d673f681e126b74e167
SHA196b6e6af3b21e0ba9f96c3f03a284aea4f58c955
SHA256c637fb9b07775cebd172ab9d9b336e69dcb4d8483d49b62dfaa85f240e707e0f
SHA5126a4695c6b1f7c0d61796454cd60b7dfaba38fd0daac9c1fe9b9621cec0ce73a1811abb9ef65efc151fcb9b81269b957921a9b45a08555b5bceb1c91f54595707
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{46D95961-9941-11EF-8BDE-523A95B0E536}.dat
Filesize5KB
MD5e974321243b0e5e7d89c6b6432e9c9f3
SHA13573a4ab5db87f2bbb71ba460769d3943b3a8a9b
SHA256890fc5227bea31d071a12d81f35bee96cf95ca1f90262eddbe235108ebd63a9b
SHA5121ae88010ec667f750e0968970fa33d10ae0cacd18ea4970cffdc020a3476925ef737a4e2ca2fb4f3585f8a505639dd715988bdd75c345109829aff71ea591ac8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
1KB
MD54b87e5f8a8707f0e99ec0900a3d4ccc8
SHA1cdc5654e18fe53e734326490dd824637327a6ef1
SHA256806a89b86d86174b18e0387ca9e928b3ae74845ef07b2f93f3c25f33e6992585
SHA512de7f0e87eb9799cda5138eea1ce9e41c2b0309431b7e8d4728791b014fc06f5e315830c7325159b6f547662695139b558043bb5ae47810c4bdd92e7615d5bd81
-
Filesize
334KB
MD5869e516b99f01a39f9ee0aa9e404fcbf
SHA1c31624e5da2efa21bf15aad89d135c996a72365f
SHA256a9b1cf763a44f0cd8f59ff3178b19544216dc482aa47bbc7b83b5b26eda5e6aa
SHA51278494b86022d9efb9eea3e98daa5d6a88c52fe23a07f0bc9435057f7382b846f82121b6764644f475b77ae4843259ffc7ef5a20660137c51a903dec33b1aac7c