Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
29/11/2024, 22:49
Static task
static1
Behavioral task
behavioral1
Sample
b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exe
-
Size
81KB
-
MD5
b3e63de0ee2812b92c280e2ae78808cd
-
SHA1
0cc3966cd4a307f84b6a69c1aa59998e1fafd66d
-
SHA256
e2fe63ffbe9f45034849ecb306e5399eb70a219758e421b3dc368be9aa4da307
-
SHA512
f9a871880ebaa7c89fd9e6418310bf6876ffee12ec7a9974c0132a27cf55f452a3d4caf4cfc3ee12bb52e204895c256d140ee28d00ed3d2f258af9563b6fb646
-
SSDEEP
1536:r7Xl6xlLXtJbru/+nxylEu4y44aj9QQCVWnfr0525p:r7XlkJXHK/+nxjy4dxCqVn
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Modifies firewall policy service 3 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List\C:\Windows\SysWOW64\wmisrpd.exe = "C:\\Windows\\SysWOW64\\wmisrpd.exe:*:Enabled:Windows Live" wmisrpd.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List wmisrpd.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Windows\SysWOW64\wmisrpd.exe = "C:\\Windows\\SysWOW64\\wmisrpd.exe:*:Enabled:Windows Live" wmisrpd.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List wmisrpd.exe -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" wmisrpd.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" wmisrpd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" wmisrpd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" wmisrpd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" wmisrpd.exe -
Disables use of System Restore points 1 TTPs
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts wmisrpd.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe\Debugger = "wmisrpd.exe" b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe wmisrpd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe\Debugger = "wmisrpd.exe" wmisrpd.exe -
Deletes itself 1 IoCs
pid Process 1308 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2308 wmisrpd.exe 2816 wmisrpd.exe -
Impair Defenses: Safe Mode Boot 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\ctfmon.exe = "ctfmon.exe" wmisrpd.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\ctfmon.exe = "ctfmon.exe" b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exe -
Loads dropped DLL 2 IoCs
pid Process 2332 b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exe 2332 b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" wmisrpd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" wmisrpd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" wmisrpd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" wmisrpd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ctfmon.exe = "ctfmon.exe" b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ctfmon.exe = "ctfmon.exe" wmisrpd.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmisrpd.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmisrpd.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\wmisrpd.exe b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wmisrpd.exe b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wmisrpd.exe wmisrpd.exe File created C:\Windows\SysWOW64\wmisrpd.exe wmisrpd.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2156 set thread context of 2332 2156 b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exe 30 PID 2308 set thread context of 2816 2308 wmisrpd.exe 36 -
Launches sc.exe 27 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1012 sc.exe 708 sc.exe 1768 sc.exe 2072 sc.exe 2264 sc.exe 1704 sc.exe 444 sc.exe 2924 sc.exe 2664 sc.exe 2096 sc.exe 2164 sc.exe 2524 sc.exe 1284 sc.exe 2324 sc.exe 772 sc.exe 2936 sc.exe 2280 sc.exe 1964 sc.exe 2660 sc.exe 2888 sc.exe 2424 sc.exe 1164 sc.exe 848 sc.exe 908 sc.exe 2984 sc.exe 2452 sc.exe 1268 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe -
Gathers network information 2 TTPs 3 IoCs
Uses commandline utility to view network configuration.
pid Process 2204 ipconfig.exe 1780 ipconfig.exe 2460 ipconfig.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 2332 b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exe 2816 wmisrpd.exe 2816 wmisrpd.exe 2816 wmisrpd.exe 2816 wmisrpd.exe 2816 wmisrpd.exe 2816 wmisrpd.exe 2816 wmisrpd.exe 2816 wmisrpd.exe 2816 wmisrpd.exe 2816 wmisrpd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2332 b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2816 wmisrpd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2156 wrote to memory of 2332 2156 b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exe 30 PID 2156 wrote to memory of 2332 2156 b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exe 30 PID 2156 wrote to memory of 2332 2156 b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exe 30 PID 2156 wrote to memory of 2332 2156 b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exe 30 PID 2156 wrote to memory of 2332 2156 b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exe 30 PID 2156 wrote to memory of 2332 2156 b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exe 30 PID 2332 wrote to memory of 2308 2332 b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exe 31 PID 2332 wrote to memory of 2308 2332 b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exe 31 PID 2332 wrote to memory of 2308 2332 b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exe 31 PID 2332 wrote to memory of 2308 2332 b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exe 31 PID 2332 wrote to memory of 2484 2332 b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exe 32 PID 2332 wrote to memory of 2484 2332 b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exe 32 PID 2332 wrote to memory of 2484 2332 b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exe 32 PID 2332 wrote to memory of 2484 2332 b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exe 32 PID 2332 wrote to memory of 1308 2332 b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exe 34 PID 2332 wrote to memory of 1308 2332 b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exe 34 PID 2332 wrote to memory of 1308 2332 b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exe 34 PID 2332 wrote to memory of 1308 2332 b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exe 34 PID 2308 wrote to memory of 2816 2308 wmisrpd.exe 36 PID 2308 wrote to memory of 2816 2308 wmisrpd.exe 36 PID 2308 wrote to memory of 2816 2308 wmisrpd.exe 36 PID 2308 wrote to memory of 2816 2308 wmisrpd.exe 36 PID 2308 wrote to memory of 2816 2308 wmisrpd.exe 36 PID 2308 wrote to memory of 2816 2308 wmisrpd.exe 36 PID 2816 wrote to memory of 1216 2816 wmisrpd.exe 21 PID 2816 wrote to memory of 1216 2816 wmisrpd.exe 21 PID 2816 wrote to memory of 2692 2816 wmisrpd.exe 37 PID 2816 wrote to memory of 2692 2816 wmisrpd.exe 37 PID 2816 wrote to memory of 2692 2816 wmisrpd.exe 37 PID 2816 wrote to memory of 2692 2816 wmisrpd.exe 37 PID 2816 wrote to memory of 2688 2816 wmisrpd.exe 38 PID 2816 wrote to memory of 2688 2816 wmisrpd.exe 38 PID 2816 wrote to memory of 2688 2816 wmisrpd.exe 38 PID 2816 wrote to memory of 2688 2816 wmisrpd.exe 38 PID 2816 wrote to memory of 2880 2816 wmisrpd.exe 39 PID 2816 wrote to memory of 2880 2816 wmisrpd.exe 39 PID 2816 wrote to memory of 2880 2816 wmisrpd.exe 39 PID 2816 wrote to memory of 2880 2816 wmisrpd.exe 39 PID 2692 wrote to memory of 2728 2692 CMD.exe 43 PID 2692 wrote to memory of 2728 2692 CMD.exe 43 PID 2692 wrote to memory of 2728 2692 CMD.exe 43 PID 2692 wrote to memory of 2728 2692 CMD.exe 43 PID 2880 wrote to memory of 2664 2880 CMD.exe 44 PID 2880 wrote to memory of 2664 2880 CMD.exe 44 PID 2880 wrote to memory of 2664 2880 CMD.exe 44 PID 2880 wrote to memory of 2664 2880 CMD.exe 44 PID 2688 wrote to memory of 2660 2688 CMD.exe 45 PID 2688 wrote to memory of 2660 2688 CMD.exe 45 PID 2688 wrote to memory of 2660 2688 CMD.exe 45 PID 2688 wrote to memory of 2660 2688 CMD.exe 45 PID 2728 wrote to memory of 2696 2728 net.exe 46 PID 2728 wrote to memory of 2696 2728 net.exe 46 PID 2728 wrote to memory of 2696 2728 net.exe 46 PID 2728 wrote to memory of 2696 2728 net.exe 46 PID 2816 wrote to memory of 2460 2816 wmisrpd.exe 47 PID 2816 wrote to memory of 2460 2816 wmisrpd.exe 47 PID 2816 wrote to memory of 2460 2816 wmisrpd.exe 47 PID 2816 wrote to memory of 2460 2816 wmisrpd.exe 47 PID 2816 wrote to memory of 2328 2816 wmisrpd.exe 49 PID 2816 wrote to memory of 2328 2816 wmisrpd.exe 49 PID 2816 wrote to memory of 2328 2816 wmisrpd.exe 49 PID 2816 wrote to memory of 2328 2816 wmisrpd.exe 49 PID 2328 wrote to memory of 2072 2328 CMD.exe 51 PID 2328 wrote to memory of 2072 2328 CMD.exe 51
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exe"2⤵
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exe3⤵
- Event Triggered Execution: Image File Execution Options Injection
- Impair Defenses: Safe Mode Boot
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\SysWOW64\wmisrpd.exe"C:\Windows\system32\wmisrpd.exe"4⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\SysWOW64\wmisrpd.exeC:\Windows\SysWOW64\wmisrpd.exe5⤵
- Modifies firewall policy service
- Modifies security service
- Windows security bypass
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Impair Defenses: Safe Mode Boot
- Windows security modification
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\SysWOW64\CMD.exeCMD /C net stop "avast! Antivirus"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\net.exenet stop "avast! Antivirus"7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "avast! Antivirus"8⤵PID:2696
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc stop "avast! Antivirus"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\sc.exesc stop "avast! Antivirus"7⤵
- Launches sc.exe
PID:2660
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc config "avast! Antivirus" start= disabled6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\SysWOW64\sc.exesc config "avast! Antivirus" start= disabled7⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2664
-
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns6⤵
- Gathers network information
PID:2460
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc delete "avast! Antivirus"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\SysWOW64\sc.exesc delete "avast! Antivirus"7⤵
- Launches sc.exe
PID:2072
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C net stop AntiVirService6⤵PID:1816
-
C:\Windows\SysWOW64\net.exenet stop AntiVirService7⤵
- System Location Discovery: System Language Discovery
PID:2104 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop AntiVirService8⤵
- System Location Discovery: System Language Discovery
PID:2192
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc stop AntiVirService6⤵
- System Location Discovery: System Language Discovery
PID:1052 -
C:\Windows\SysWOW64\sc.exesc stop AntiVirService7⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2280
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc config AntiVirService start= disabled6⤵
- System Location Discovery: System Language Discovery
PID:2204 -
C:\Windows\SysWOW64\sc.exesc config AntiVirService start= disabled7⤵
- Launches sc.exe
PID:2264
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc delete AntiVirService6⤵PID:2376
-
C:\Windows\SysWOW64\sc.exesc delete AntiVirService7⤵
- Launches sc.exe
PID:2424
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C net stop PASRV6⤵
- System Location Discovery: System Language Discovery
PID:2236 -
C:\Windows\SysWOW64\net.exenet stop PASRV7⤵
- System Location Discovery: System Language Discovery
PID:2052 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop PASRV8⤵
- System Location Discovery: System Language Discovery
PID:2284
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc stop PASRV6⤵
- System Location Discovery: System Language Discovery
PID:2232 -
C:\Windows\SysWOW64\sc.exesc stop PASRV7⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:708
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc config PASRV start= disabled6⤵
- System Location Discovery: System Language Discovery
PID:1880 -
C:\Windows\SysWOW64\sc.exesc config PASRV start= disabled7⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2452
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc delete PASRV6⤵
- System Location Discovery: System Language Discovery
PID:1544 -
C:\Windows\SysWOW64\sc.exesc delete PASRV7⤵
- Launches sc.exe
PID:1704
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C net stop VSSERV6⤵
- System Location Discovery: System Language Discovery
PID:1456 -
C:\Windows\SysWOW64\net.exenet stop VSSERV7⤵
- System Location Discovery: System Language Discovery
PID:1920 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VSSERV8⤵PID:2016
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc stop VSSERV6⤵
- System Location Discovery: System Language Discovery
PID:1984 -
C:\Windows\SysWOW64\sc.exesc stop VSSERV7⤵
- Launches sc.exe
PID:1964
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc config VSSERV start= disabled6⤵PID:1736
-
C:\Windows\SysWOW64\sc.exesc config VSSERV start= disabled7⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1268
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc delete VSSERV6⤵PID:2068
-
C:\Windows\SysWOW64\sc.exesc delete VSSERV7⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1284
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C net stop avg8wd6⤵
- System Location Discovery: System Language Discovery
PID:2564 -
C:\Windows\SysWOW64\net.exenet stop avg8wd7⤵
- System Location Discovery: System Language Discovery
PID:1820 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop avg8wd8⤵
- System Location Discovery: System Language Discovery
PID:1696
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc stop avg8wd6⤵PID:1564
-
C:\Windows\SysWOW64\sc.exesc stop avg8wd7⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1012
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc config avg8wd start= disabled6⤵
- System Location Discovery: System Language Discovery
PID:628 -
C:\Windows\SysWOW64\sc.exesc config avg8wd start= disabled7⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1164
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc delete avg8wd6⤵
- System Location Discovery: System Language Discovery
PID:568 -
C:\Windows\SysWOW64\sc.exesc delete avg8wd7⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:772
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C net stop NOD32krn6⤵
- System Location Discovery: System Language Discovery
PID:1760 -
C:\Windows\SysWOW64\net.exenet stop NOD32krn7⤵
- System Location Discovery: System Language Discovery
PID:2588 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop NOD32krn8⤵
- System Location Discovery: System Language Discovery
PID:2736
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc stop NOD32krn6⤵
- System Location Discovery: System Language Discovery
PID:1972 -
C:\Windows\SysWOW64\sc.exesc stop NOD32krn7⤵
- Launches sc.exe
PID:848
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc config NOD32krn start= disabled6⤵
- System Location Discovery: System Language Discovery
PID:1716 -
C:\Windows\SysWOW64\sc.exesc config NOD32krn start= disabled7⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1768
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc delete NOD32krn6⤵
- System Location Discovery: System Language Discovery
PID:1756 -
C:\Windows\SysWOW64\sc.exesc delete NOD32krn7⤵
- Launches sc.exe
PID:2096
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C net stop SbPF.Launcher6⤵PID:2560
-
C:\Windows\SysWOW64\net.exenet stop SbPF.Launcher7⤵
- System Location Discovery: System Language Discovery
PID:712 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SbPF.Launcher8⤵
- System Location Discovery: System Language Discovery
PID:1016
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc stop SbPF.Launcher6⤵
- System Location Discovery: System Language Discovery
PID:2400 -
C:\Windows\SysWOW64\sc.exesc stop SbPF.Launcher7⤵
- Launches sc.exe
PID:908
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc config SbPF.Launcher start= disabled6⤵PID:596
-
C:\Windows\SysWOW64\sc.exesc config SbPF.Launcher start= disabled7⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2164
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc delete SbPF.Launcher6⤵
- System Location Discovery: System Language Discovery
PID:580 -
C:\Windows\SysWOW64\sc.exesc delete SbPF.Launcher7⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2984
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C net stop SPF46⤵
- System Location Discovery: System Language Discovery
PID:1144 -
C:\Windows\SysWOW64\net.exenet stop SPF47⤵PID:2500
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SPF48⤵PID:2320
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc stop SPF46⤵
- System Location Discovery: System Language Discovery
PID:2968 -
C:\Windows\SysWOW64\sc.exesc stop SPF47⤵
- Launches sc.exe
PID:2524
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc config SPF4 start= disabled6⤵
- System Location Discovery: System Language Discovery
PID:1592 -
C:\Windows\SysWOW64\sc.exesc config SPF4 start= disabled7⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2324
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc delete SPF46⤵
- System Location Discovery: System Language Discovery
PID:2484 -
C:\Windows\SysWOW64\sc.exesc delete SPF47⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:444
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C net stop acssrv6⤵
- System Location Discovery: System Language Discovery
PID:2988 -
C:\Windows\SysWOW64\net.exenet stop acssrv7⤵PID:2920
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop acssrv8⤵
- System Location Discovery: System Language Discovery
PID:2812
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc stop acssrv6⤵
- System Location Discovery: System Language Discovery
PID:2332 -
C:\Windows\SysWOW64\sc.exesc stop acssrv7⤵
- Launches sc.exe
PID:2924
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc config acssrv start= disabled6⤵
- System Location Discovery: System Language Discovery
PID:2752 -
C:\Windows\SysWOW64\sc.exesc config acssrv start= disabled7⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2936
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc delete acssrv6⤵
- System Location Discovery: System Language Discovery
PID:3004 -
C:\Windows\SysWOW64\sc.exesc delete acssrv7⤵
- Launches sc.exe
PID:2888
-
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns6⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:2204
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns6⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:1780
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip4⤵PID:2484
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\B3E63D~1.EXE > nul4⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1308
-
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Event Triggered Execution
1Image File Execution Options Injection
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Event Triggered Execution
1Image File Execution Options Injection
1Defense Evasion
Impair Defenses
5Disable or Modify System Firewall
1Disable or Modify Tools
2Safe Mode Boot
1Indicator Removal
1File Deletion
1Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD596d179abc939ae4cc8f6d61cb8b6fe6d
SHA1004f2c2f14a8d1bf66a0bf3d3e71e23b68dd5b7a
SHA256aa2d65cfa18eac8f7f1a22ddc6b06eed4b5b6acf4de8313a3847d4c036295194
SHA512434c54224c43710e44f700f76fcb4935216daac882cdab72d1e078e5b86f1f99342ad6d2b6aefa645277aa2fb7b06ee9c1c2f1d82b833b8517c1d5427dc78719
-
Filesize
81KB
MD5b3e63de0ee2812b92c280e2ae78808cd
SHA10cc3966cd4a307f84b6a69c1aa59998e1fafd66d
SHA256e2fe63ffbe9f45034849ecb306e5399eb70a219758e421b3dc368be9aa4da307
SHA512f9a871880ebaa7c89fd9e6418310bf6876ffee12ec7a9974c0132a27cf55f452a3d4caf4cfc3ee12bb52e204895c256d140ee28d00ed3d2f258af9563b6fb646