Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
27-11-2024 18:27
Static task
static1
Behavioral task
behavioral1
Sample
a91a9b39b94464b44184730ddf5c9ea2_JaffaCakes118.exe
Resource
win7-20241023-en
General
-
Target
a91a9b39b94464b44184730ddf5c9ea2_JaffaCakes118.exe
-
Size
3.9MB
-
MD5
a91a9b39b94464b44184730ddf5c9ea2
-
SHA1
0a07247bf87258f8205f6380819086f0c22d081d
-
SHA256
a58eb70c9e826fad3872d70134cb945ef72d0865407b066090408cce53a38b23
-
SHA512
3d4bdf2a1745f19d350f0b83d2491d155b3256ca5fe2e74a02bfcc099e906d90f6e1fdcecf13bdeb9689518ddde31584fa85b68c1bfb1b0f40e637440d698e26
-
SSDEEP
98304:eBXC0RWM6bbpdl6Jz1leThe1hJKS3cTcKlEJZL9TAgAI:elCHM6bbLl6JZlKheJKSMcDZL9TAA
Malware Config
Extracted
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
asd3q2da211a
Extracted
xtremerat
412341.sytes.net
Signatures
-
Detect XtremeRAT payload 5 IoCs
resource yara_rule behavioral1/files/0x0008000000015cd1-28.dat family_xtremerat behavioral1/memory/2176-50-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral1/memory/1164-58-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral1/memory/2716-59-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral1/memory/1164-61-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat -
Modifies WinLogon for persistence 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Windows\\InstallDir\\Shell.exe" Update.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Windows\\InstallDir\\Shell.exe" Update.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Windows\\InstallDir\\Shell.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Windows\\InstallDir\\Shell.exe" svchost.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C8DF-B266-909E-HB58-E32B79832EB2} Update.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C8DF-B266-909E-HB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\Shell.exe restart" Update.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C8DF-B266-909E-HB58-E32B79832EB2} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C8DF-B266-909E-HB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\Shell.exe restart" svchost.exe -
A potential corporate email address has been identified in the URL: [email protected]
-
resource yara_rule behavioral1/files/0x0006000000016d54-232.dat aspack_v212_v242 behavioral1/files/0x0006000000016d67-253.dat aspack_v212_v242 -
Executes dropped EXE 6 IoCs
pid Process 3024 Audio.exe 2828 setup.exe 2716 Update.exe 2832 GLB6D53.tmp 1608 Ent.exe 1576 srv64.exe -
Loads dropped DLL 59 IoCs
pid Process 2816 a91a9b39b94464b44184730ddf5c9ea2_JaffaCakes118.exe 3024 Audio.exe 3024 Audio.exe 2816 a91a9b39b94464b44184730ddf5c9ea2_JaffaCakes118.exe 2828 setup.exe 2828 setup.exe 2828 setup.exe 2828 setup.exe 2816 a91a9b39b94464b44184730ddf5c9ea2_JaffaCakes118.exe 2716 Update.exe 2716 Update.exe 2716 Update.exe 2832 GLB6D53.tmp 2832 GLB6D53.tmp 2832 GLB6D53.tmp 2832 GLB6D53.tmp 2832 GLB6D53.tmp 2832 GLB6D53.tmp 2832 GLB6D53.tmp 2832 GLB6D53.tmp 2832 GLB6D53.tmp 2832 GLB6D53.tmp 2832 GLB6D53.tmp 2832 GLB6D53.tmp 2832 GLB6D53.tmp 2832 GLB6D53.tmp 2832 GLB6D53.tmp 2832 GLB6D53.tmp 2832 GLB6D53.tmp 2832 GLB6D53.tmp 2832 GLB6D53.tmp 2832 GLB6D53.tmp 2832 GLB6D53.tmp 1608 Ent.exe 2832 GLB6D53.tmp 1608 Ent.exe 1608 Ent.exe 1608 Ent.exe 1608 Ent.exe 1608 Ent.exe 1608 Ent.exe 1608 Ent.exe 1608 Ent.exe 1608 Ent.exe 1608 Ent.exe 1608 Ent.exe 1608 Ent.exe 1608 Ent.exe 1608 Ent.exe 1608 Ent.exe 1608 Ent.exe 1608 Ent.exe 1608 Ent.exe 1608 Ent.exe 1608 Ent.exe 1608 Ent.exe 1608 Ent.exe 1608 Ent.exe 1608 Ent.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\Shell.exe" Update.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\Shell.exe" Update.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\Google Updater = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SysAudio.exe" Audio.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\Shell.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\Shell.exe" svchost.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: Ent.exe File opened (read-only) \??\J: Ent.exe File opened (read-only) \??\K: Ent.exe File opened (read-only) \??\M: Ent.exe File opened (read-only) \??\N: Ent.exe File opened (read-only) \??\Q: Ent.exe File opened (read-only) \??\R: Ent.exe File opened (read-only) \??\U: Ent.exe File opened (read-only) \??\B: Ent.exe File opened (read-only) \??\Y: Ent.exe File opened (read-only) \??\Z: Ent.exe File opened (read-only) \??\X: Ent.exe File opened (read-only) \??\I: Ent.exe File opened (read-only) \??\L: Ent.exe File opened (read-only) \??\P: Ent.exe File opened (read-only) \??\V: Ent.exe File opened (read-only) \??\A: Ent.exe File opened (read-only) \??\H: Ent.exe File opened (read-only) \??\O: Ent.exe File opened (read-only) \??\S: Ent.exe File opened (read-only) \??\T: Ent.exe File opened (read-only) \??\W: Ent.exe File opened (read-only) \??\E: Ent.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 Ent.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\GLBSINST.%$D GLB6D53.tmp -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1608 Ent.exe -
Drops file in Program Files directory 61 IoCs
description ioc Process File created C:\Program Files (x86)\EssNetTools\~GLH0006.TMP GLB6D53.tmp File opened for modification C:\Program Files (x86)\EssNetTools\license.txt GLB6D53.tmp File created C:\Program Files (x86)\EssNetTools\~GLH0008.TMP GLB6D53.tmp File opened for modification C:\Program Files (x86)\EssNetTools\srv64.exe GLB6D53.tmp File opened for modification C:\Program Files (x86)\EssNetTools\SNMP\system-oids.txt GLB6D53.tmp File created C:\PROGRA~2\ESSNET~1\INSTALL.LOG GLB6D53.tmp File created C:\Program Files (x86)\EssNetTools\~GLH0005.TMP GLB6D53.tmp File opened for modification C:\Program Files (x86)\EssNetTools\prop.exe GLB6D53.tmp File created C:\Program Files (x86)\EssNetTools\~GLH000f.TMP GLB6D53.tmp File opened for modification C:\Program Files (x86)\EssNetTools\SNMP\MIB\RFC1514-HOSTS.MIB GLB6D53.tmp File opened for modification C:\PROGRA~2\ESSNET~1\INSTALL.LOG GLB6D53.tmp File created C:\Program Files (x86)\EssNetTools\~GLH0009.TMP GLB6D53.tmp File created C:\Program Files (x86)\EssNetTools\~GLH000d.TMP GLB6D53.tmp File created C:\Program Files (x86)\EssNetTools\~GLH0011.TMP GLB6D53.tmp File created C:\Program Files (x86)\EssNetTools\SNMP\MIB\~GLH001c.TMP GLB6D53.tmp File opened for modification C:\Program Files (x86)\EssNetTools\UNWISE.EXE GLB6D53.tmp File created C:\Program Files (x86)\EssNetTools\~GLH000a.TMP GLB6D53.tmp File opened for modification C:\Program Files (x86)\EssNetTools\passlist.txt GLB6D53.tmp File created C:\Program Files (x86)\EssNetTools\~GLH000e.TMP GLB6D53.tmp File created C:\Program Files (x86)\EssNetTools\~GLH0012.TMP GLB6D53.tmp File opened for modification C:\Program Files (x86)\EssNetTools\SNMP\MIB\RFC1213-MIB.MIB GLB6D53.tmp File opened for modification C:\Program Files (x86)\EssNetTools\client32.dll GLB6D53.tmp File created C:\Program Files (x86)\EssNetTools\~GLH0014.TMP GLB6D53.tmp File opened for modification C:\Program Files (x86)\EssNetTools\swlaunch.dll GLB6D53.tmp File created C:\Program Files (x86)\EssNetTools\~GLH0002.TMP GLB6D53.tmp File created C:\Program Files (x86)\EssNetTools\~GLH0007.TMP GLB6D53.tmp File opened for modification C:\Program Files (x86)\EssNetTools\readme.txt GLB6D53.tmp File opened for modification C:\Program Files (x86)\EssNetTools\ss.dll GLB6D53.tmp File opened for modification C:\Program Files (x86)\EssNetTools\ntools.dll GLB6D53.tmp File opened for modification C:\Program Files (x86)\EssNetTools\s1.wav GLB6D53.tmp File opened for modification C:\Program Files (x86)\EssNetTools\1049.tlf GLB6D53.tmp File created C:\Program Files (x86)\EssNetTools\SNMP\~GLH0017.TMP GLB6D53.tmp File opened for modification C:\Program Files (x86)\EssNetTools\SNMP\MIB\MSFT.MIB GLB6D53.tmp File opened for modification C:\Program Files (x86)\EssNetTools\userlist.txt GLB6D53.tmp File created C:\Program Files (x86)\EssNetTools\SNMP\MIB\~GLH001b.TMP GLB6D53.tmp File opened for modification C:\Program Files (x86)\EssNetTools\SNMP\MIB\LMMIB2.MIB GLB6D53.tmp File created C:\Program Files (x86)\EssNetTools\~GLH0004.TMP GLB6D53.tmp File opened for modification C:\Program Files (x86)\EssNetTools\s2.wav GLB6D53.tmp File created C:\Program Files (x86)\EssNetTools\~GLH0015.TMP GLB6D53.tmp File created C:\Program Files (x86)\EssNetTools\SNMP\MIB\~GLH001a.TMP GLB6D53.tmp File created C:\Program Files (x86)\EssNetTools\~GLH0003.TMP GLB6D53.tmp File opened for modification C:\Program Files (x86)\EssNetTools\1031.tlf GLB6D53.tmp File created C:\Program Files (x86)\EssNetTools\SNMP\MIB\~GLH001e.TMP GLB6D53.tmp File opened for modification C:\Program Files (x86)\EssNetTools\LANG.INI GLB6D53.tmp File opened for modification C:\Program Files (x86)\EssNetTools\Ent.exe GLB6D53.tmp File created C:\Program Files (x86)\EssNetTools\~GLH0010.TMP GLB6D53.tmp File opened for modification C:\Program Files (x86)\EssNetTools\SNMP\MIB\INETSRV.MIB GLB6D53.tmp File opened for modification C:\Program Files (x86)\EssNetTools\entutil.dll GLB6D53.tmp File created C:\Program Files (x86)\EssNetTools\SNMP\~GLH0016.TMP GLB6D53.tmp File opened for modification C:\Program Files (x86)\EssNetTools\SNMP\enterprise-numbers.txt GLB6D53.tmp File created C:\Program Files (x86)\EssNetTools\SNMP\MIB\~GLH0018.TMP GLB6D53.tmp File opened for modification C:\Program Files (x86)\EssNetTools\SNMP\MIB\RFC1155-SMI.MIB GLB6D53.tmp File created C:\Program Files (x86)\EssNetTools\~GLH000c.TMP GLB6D53.tmp File opened for modification C:\Program Files (x86)\EssNetTools\prop64.exe GLB6D53.tmp File created C:\Program Files (x86)\EssNetTools\~GLH0013.TMP GLB6D53.tmp File opened for modification C:\Program Files (x86)\EssNetTools\1034.tlf GLB6D53.tmp File created C:\Program Files (x86)\EssNetTools\~GLH000b.TMP GLB6D53.tmp File opened for modification C:\Program Files (x86)\EssNetTools\Ent.chm GLB6D53.tmp File created C:\Program Files (x86)\EssNetTools\SNMP\MIB\~GLH0019.TMP GLB6D53.tmp File created C:\Program Files (x86)\EssNetTools\SNMP\MIB\~GLH001d.TMP GLB6D53.tmp File opened for modification C:\Program Files (x86)\EssNetTools\SNMP\MIB\LMALRT2.MIB GLB6D53.tmp -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\InstallDir\Shell.exe Update.exe File opened for modification C:\Windows\InstallDir\ Update.exe File opened for modification C:\Windows\InstallDir\Shell.exe Update.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GLB6D53.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a91a9b39b94464b44184730ddf5c9ea2_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Audio.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ent.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Modifies registry class 11 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.E4L\ = "EssNetTools.License" GLB6D53.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\EssNetTools.License GLB6D53.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\EssNetTools.License\shell\open\command GLB6D53.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\EssNetTools.License\shell GLB6D53.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\EssNetTools.License\shell\open\command\ = "C:\\PROGRA~2\\ESSNET~1\\Ent.exe \"%1\"" GLB6D53.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ Ent.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" Ent.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.E4L GLB6D53.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\EssNetTools.License\ = "Essential NetTools License" GLB6D53.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\EssNetTools.License\shell\open GLB6D53.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key Ent.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 296 reg.exe -
Suspicious behavior: EnumeratesProcesses 40 IoCs
pid Process 1608 Ent.exe 1608 Ent.exe 1608 Ent.exe 1608 Ent.exe 1608 Ent.exe 1608 Ent.exe 1608 Ent.exe 1608 Ent.exe 1608 Ent.exe 1608 Ent.exe 1608 Ent.exe 1608 Ent.exe 1608 Ent.exe 1608 Ent.exe 1608 Ent.exe 1608 Ent.exe 1608 Ent.exe 1608 Ent.exe 1608 Ent.exe 1608 Ent.exe 1608 Ent.exe 1608 Ent.exe 1608 Ent.exe 1608 Ent.exe 1608 Ent.exe 1608 Ent.exe 1608 Ent.exe 1608 Ent.exe 1608 Ent.exe 1608 Ent.exe 1608 Ent.exe 1608 Ent.exe 1608 Ent.exe 1608 Ent.exe 1608 Ent.exe 1608 Ent.exe 1608 Ent.exe 1608 Ent.exe 1608 Ent.exe 1608 Ent.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1608 Ent.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeRestorePrivilege 2716 Update.exe Token: SeBackupPrivilege 2716 Update.exe Token: SeDebugPrivilege 3024 Audio.exe Token: SeDebugPrivilege 1608 Ent.exe Token: SeDebugPrivilege 1608 Ent.exe Token: SeDebugPrivilege 1608 Ent.exe Token: SeDebugPrivilege 1608 Ent.exe Token: SeDebugPrivilege 1608 Ent.exe Token: SeDebugPrivilege 1608 Ent.exe Token: SeDebugPrivilege 1608 Ent.exe Token: SeDebugPrivilege 1608 Ent.exe Token: SeDebugPrivilege 1608 Ent.exe Token: SeDebugPrivilege 1608 Ent.exe Token: SeDebugPrivilege 1608 Ent.exe Token: SeDebugPrivilege 1608 Ent.exe Token: SeDebugPrivilege 1608 Ent.exe Token: SeDebugPrivilege 1608 Ent.exe Token: SeDebugPrivilege 1608 Ent.exe Token: SeDebugPrivilege 1608 Ent.exe Token: SeDebugPrivilege 1608 Ent.exe Token: SeDebugPrivilege 1608 Ent.exe Token: SeDebugPrivilege 1608 Ent.exe Token: SeDebugPrivilege 1608 Ent.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1608 Ent.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1608 Ent.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1164 explorer.exe 3024 Audio.exe 1608 Ent.exe 1608 Ent.exe 1608 Ent.exe 1608 Ent.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2816 wrote to memory of 3024 2816 a91a9b39b94464b44184730ddf5c9ea2_JaffaCakes118.exe 30 PID 2816 wrote to memory of 3024 2816 a91a9b39b94464b44184730ddf5c9ea2_JaffaCakes118.exe 30 PID 2816 wrote to memory of 3024 2816 a91a9b39b94464b44184730ddf5c9ea2_JaffaCakes118.exe 30 PID 2816 wrote to memory of 3024 2816 a91a9b39b94464b44184730ddf5c9ea2_JaffaCakes118.exe 30 PID 2816 wrote to memory of 3024 2816 a91a9b39b94464b44184730ddf5c9ea2_JaffaCakes118.exe 30 PID 2816 wrote to memory of 3024 2816 a91a9b39b94464b44184730ddf5c9ea2_JaffaCakes118.exe 30 PID 2816 wrote to memory of 3024 2816 a91a9b39b94464b44184730ddf5c9ea2_JaffaCakes118.exe 30 PID 2816 wrote to memory of 2828 2816 a91a9b39b94464b44184730ddf5c9ea2_JaffaCakes118.exe 31 PID 2816 wrote to memory of 2828 2816 a91a9b39b94464b44184730ddf5c9ea2_JaffaCakes118.exe 31 PID 2816 wrote to memory of 2828 2816 a91a9b39b94464b44184730ddf5c9ea2_JaffaCakes118.exe 31 PID 2816 wrote to memory of 2828 2816 a91a9b39b94464b44184730ddf5c9ea2_JaffaCakes118.exe 31 PID 2816 wrote to memory of 2828 2816 a91a9b39b94464b44184730ddf5c9ea2_JaffaCakes118.exe 31 PID 2816 wrote to memory of 2828 2816 a91a9b39b94464b44184730ddf5c9ea2_JaffaCakes118.exe 31 PID 2816 wrote to memory of 2828 2816 a91a9b39b94464b44184730ddf5c9ea2_JaffaCakes118.exe 31 PID 2816 wrote to memory of 2716 2816 a91a9b39b94464b44184730ddf5c9ea2_JaffaCakes118.exe 33 PID 2816 wrote to memory of 2716 2816 a91a9b39b94464b44184730ddf5c9ea2_JaffaCakes118.exe 33 PID 2816 wrote to memory of 2716 2816 a91a9b39b94464b44184730ddf5c9ea2_JaffaCakes118.exe 33 PID 2816 wrote to memory of 2716 2816 a91a9b39b94464b44184730ddf5c9ea2_JaffaCakes118.exe 33 PID 2816 wrote to memory of 2716 2816 a91a9b39b94464b44184730ddf5c9ea2_JaffaCakes118.exe 33 PID 2816 wrote to memory of 2716 2816 a91a9b39b94464b44184730ddf5c9ea2_JaffaCakes118.exe 33 PID 2816 wrote to memory of 2716 2816 a91a9b39b94464b44184730ddf5c9ea2_JaffaCakes118.exe 33 PID 2828 wrote to memory of 2832 2828 setup.exe 32 PID 2828 wrote to memory of 2832 2828 setup.exe 32 PID 2828 wrote to memory of 2832 2828 setup.exe 32 PID 2828 wrote to memory of 2832 2828 setup.exe 32 PID 2828 wrote to memory of 2832 2828 setup.exe 32 PID 2828 wrote to memory of 2832 2828 setup.exe 32 PID 2828 wrote to memory of 2832 2828 setup.exe 32 PID 2716 wrote to memory of 2176 2716 Update.exe 34 PID 2716 wrote to memory of 2176 2716 Update.exe 34 PID 2716 wrote to memory of 2176 2716 Update.exe 34 PID 2716 wrote to memory of 2176 2716 Update.exe 34 PID 2716 wrote to memory of 2176 2716 Update.exe 34 PID 2716 wrote to memory of 2176 2716 Update.exe 34 PID 2716 wrote to memory of 2176 2716 Update.exe 34 PID 2716 wrote to memory of 2176 2716 Update.exe 34 PID 2716 wrote to memory of 1164 2716 Update.exe 35 PID 2716 wrote to memory of 1164 2716 Update.exe 35 PID 2716 wrote to memory of 1164 2716 Update.exe 35 PID 2716 wrote to memory of 1164 2716 Update.exe 35 PID 2716 wrote to memory of 1164 2716 Update.exe 35 PID 2716 wrote to memory of 1164 2716 Update.exe 35 PID 2716 wrote to memory of 1164 2716 Update.exe 35 PID 2716 wrote to memory of 1164 2716 Update.exe 35 PID 3024 wrote to memory of 2092 3024 Audio.exe 36 PID 3024 wrote to memory of 2092 3024 Audio.exe 36 PID 3024 wrote to memory of 2092 3024 Audio.exe 36 PID 3024 wrote to memory of 2092 3024 Audio.exe 36 PID 3024 wrote to memory of 2092 3024 Audio.exe 36 PID 3024 wrote to memory of 2092 3024 Audio.exe 36 PID 3024 wrote to memory of 2092 3024 Audio.exe 36 PID 2092 wrote to memory of 296 2092 cmd.exe 38 PID 2092 wrote to memory of 296 2092 cmd.exe 38 PID 2092 wrote to memory of 296 2092 cmd.exe 38 PID 2092 wrote to memory of 296 2092 cmd.exe 38 PID 2092 wrote to memory of 296 2092 cmd.exe 38 PID 2092 wrote to memory of 296 2092 cmd.exe 38 PID 2092 wrote to memory of 296 2092 cmd.exe 38 PID 2832 wrote to memory of 1608 2832 GLB6D53.tmp 44 PID 2832 wrote to memory of 1608 2832 GLB6D53.tmp 44 PID 2832 wrote to memory of 1608 2832 GLB6D53.tmp 44 PID 2832 wrote to memory of 1608 2832 GLB6D53.tmp 44 PID 2832 wrote to memory of 1608 2832 GLB6D53.tmp 44 PID 2832 wrote to memory of 1608 2832 GLB6D53.tmp 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\a91a9b39b94464b44184730ddf5c9ea2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a91a9b39b94464b44184730ddf5c9ea2_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\Audio.exe"C:\Users\Admin\AppData\Local\Temp\Audio.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\System32\cmd.exe /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:296
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Users\Admin\AppData\Local\Temp\GLB6D53.tmpC:\Users\Admin\AppData\Local\Temp\GLB6D53.tmp 4736 C:\Users\Admin\AppData\Local\Temp\setup.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\PROGRA~2\ESSNET~1\Ent.exe"C:\PROGRA~2\ESSNET~1\Ent.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1608 -
C:\PROGRA~2\ESSNET~1\srv64.exe"C:\PROGRA~2\ESSNET~1\srv64.exe"5⤵
- Executes dropped EXE
PID:1576
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"2⤵
- Modifies WinLogon for persistence
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- Modifies WinLogon for persistence
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2176
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1164
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
5Pre-OS Boot
1Bootkit
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD5d56b88426dfcf5b7f7dcb91f2c815d26
SHA133584bc890ea1210c632e433d0996984ac83a27e
SHA256659204ea1640fb2241cae1cca227788c600780627b949bd70798af5e83bf1ff3
SHA512fa45db376f29e4d3460b5cc7fc7c66ad10154709f675dc5f2cb16bdc968dceffa0bec277495aa9842f462dce4d53d9657833afe7c7d8a018ba15ea50cd53675d
-
Filesize
11KB
MD5bda8787a4a296f5178c4e2fbe4c09770
SHA13873c48d6c9360cfe46645685949139a68011348
SHA25637433da15a318cb8d6e46f6f14c013a7ff4b90a41eca9ea1d5c950501631c506
SHA5124f7813de55289ce57b242bc27943ad4a29fa20495eccc7090aa197ba15be16e2fd34bb6ff1d3c1bf5fc53e8f81304adc25f6da43bc2b9d3a44b3c4290c5717fe
-
Filesize
466KB
MD51a1078ff177fc65fe8ff8dde49ffb697
SHA1eef25860a9376f6b45c80c50e8906600a901c1ec
SHA2568b070dc40d1f3869fe8d0d86ac82dcad8b6b8988bd46f96beb4b35ea7499a60a
SHA512a63f2d8a4f3122dcde0d58a9fbe29411431dc6b07722a974dda17f7050df68bb5251e6aa50f4dd473fe64b418081913ccfa9b132a5c30149dfb9f53dd424ad5d
-
Filesize
23B
MD51ffa7c3866e90bd9bdae07241ac73afd
SHA18a5219053a0fec8ed1cc625b51c5367671720d6f
SHA256945cb27070511c81b25394ba66b336ed01ff6f7545bd41d6bffbfb761c33bbd5
SHA51291e4dd9039b9de7ec9d69dcb6d510e1239b27cba14c07fa2c6abc3f5a0ed48993a35421f61aca8f336a8d68a23becb3f2bd9a8155df4f3f4a9c8a743efa04b24
-
Filesize
2KB
MD5e497a7368b157f0a67979be2b2a4237d
SHA1574e3e9b26a1c3f7b995ab7b5adfd9d1e0277573
SHA256ad57c29b63626dcdedf9f26735f402cb0e310013684910ce1d5bc11cf89dc89f
SHA512d5de4033c6ed4aa27a2689e69347ba0fb603761ce3a785af13ab8053a3d1037be034d55aacd86f797e9bc54347876fb9425910088773e0f00cf19cf690504a33
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
26KB
MD599c62c1b2288747369121598667698ca
SHA1b79c6f40c4994c0f0417f66282d9c1777785228c
SHA25631728d3bb4cb38d91815bed65bc20f7362e28a1cb5f6667af20777bd69f8ca4b
SHA5125968c1e2dcd05079c3d3c6e54ae0af05368ec8c7974752b99aa546519fda253ec761ee6a040cc7a297f408a6981eb557756a4820602c163f5890c041960e91a7
-
Filesize
83KB
MD5e029d26a0cc2ca3a527742cccdd1aa79
SHA12809c750725bc254750af847cf91e7eae7157f9b
SHA256dadf2b2d00e26635ae9b58235fd4ce9849d543a9e1bfd57a2b156241d8290625
SHA5120aafc95cfe3a1e1ecafb43a380efcccc13eee0d5c2200254708b5d2fceb0144e0a8ed1cf4dfb78ab78efba4c3480ce89732040e80ab9051119f1526b1d9473be
-
Filesize
16KB
MD5eaceabaa685a464309359b26811bef05
SHA105545e6f8ceb0ecef4196d08e6b332cd739d1d2b
SHA256bdbc4501bd1b0f0bdb0b8d01df11d3a9aa59a3d3f77ec269d6e909073c845459
SHA512ed1a0868aa562c688eaa2bb071fd8997c47771c9006b9dae141c8a68244d49f1ecaae82e1db097fe46c271a158372c2d3250e3ee2ec962337711660f9578da1c
-
Filesize
1.2MB
MD5ce259027520abb925afd1452f60e1a54
SHA113b3008bc72f4999353c2d46a5de9ae502ce2df6
SHA25661128469387bee5b868c52e6227936aaf5917eb4182fabc48068d68fac0518ab
SHA512bce48fc0784f12dc180a2b3fe2543a0a0644dbbb925166b5d4f7578a1e4947cc09cf6e007dbae7a3ccd9a5f4caaf5b96dbbe11b811a0f33c4b2365029429a1ef
-
Filesize
162KB
MD5ba76f31eda329484767df598a4d1129c
SHA165522c778544244db3170b1a28d00fb2399dc0f6
SHA256df311b636812c919d6c842deba6bc9bac5f08afe0fc0de759e35ef9989cee000
SHA5120c58ff1c57f5fe2a95fe1625a0948833dc5818a8c86da5a5a27c98002f8f4af38761fb66b94cc6213beea30ad1fd0545a3e21c49368feb1e1335caeabba1dd1e
-
Filesize
179KB
MD51da15a41d35b860551f79024d786f519
SHA1860bc51df0029cff0532659943d696009b894771
SHA25630812fdfa5b8becc827a632c55f61876ab6b8cd86b9046631a4083bb7290e399
SHA5121d292f1d6566afde75a367e63f64ee7e9fc6a7bf7137e6c7c2dfa3cd11e7271455926bcd8d98653454e9af0695ac4afa765b70e2f6e6b7d8c12b420a8606cb32
-
Filesize
70KB
MD59c4e4277bf7f56318301bcf62452c8e6
SHA12092162aada654516ae70b1cf75d0b36964f8716
SHA2562aba4c054e4145d684c4814b9311a1fdcf42485a268c945a589afddbec006246
SHA512480576de39cd31529546e6f06eea6fea415d55ec54c1b835493ea23ed220ebf43cff2ab6301d39aed275a4664a7bb47bb9bce3bc37256d31dc1bb7e724e19b3d
-
Filesize
161KB
MD5263e81631fb67194dc968dc3f4bdb4e7
SHA12998697c503a542d5cf1e25a0d0df18fcd38d66c
SHA2569200949ab6f777df957fc524d4733e2cb47b89a209c07d2be57b4c63cecbf766
SHA5122eb6fd28ba87f193a35f1c4bd4c6ff29495a3c10fea8bfa0506df97fcae5ca16f2617703137ecb32cf6b7dbd3048507dd4d0c7418845cfdce5c43896aec45dbb
-
Filesize
10KB
MD53b2e23d259394c701050486e642d14fa
SHA14e9661c4ba84400146b80b905f46a0f7ef4d62eb
SHA256166d7156142f3ee09fa69eb617dd22e4fd248aa80a1ac08767db6ad99a2705c1
SHA5122b792296dffa4e43bc85295dc7691bd29762ce5d9d5eafaa74e199e6a8e5b24aa85d0a1b27776d4719a49b0d29abcf6f240746a209528e608b596b560e5a3b88
-
Filesize
45KB
MD576ba75a7ce68516f5e2a76031e5ec185
SHA1399bed8aef82a85702c48ef3f15c46005fc15979
SHA2568070c926913db533326ef061dffca76550bfe9139a60365be604ca2fcef766eb
SHA512e7caf3284e2668cc52b976b063ac87ffb09b46ec7b2900dfee87a9d0ea95110b3cc11751de942f254f8962b320be49a5866a120dbc971600a60f3f55ecbc4f54
-
Filesize
3.8MB
MD5185c5f195d51214fdb80d1672e59d57a
SHA109a02913e68065a37e0f87148702f9a8cccb4088
SHA2567b0123cf0b310370eaaea949a9d788ce9c624a10756376abef82ee897a66d7cc
SHA512e9c8a68e038ee9a86d31562daf117adeb43b36d50f18c9dbcb17c0001774b0e54579c4557c09e1175d019b50d58d986376ffe116ee224c5099d8e912ae766eaa