Analysis
-
max time kernel
148s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2024 22:49
Static task
static1
Behavioral task
behavioral1
Sample
b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exe
-
Size
81KB
-
MD5
b3e63de0ee2812b92c280e2ae78808cd
-
SHA1
0cc3966cd4a307f84b6a69c1aa59998e1fafd66d
-
SHA256
e2fe63ffbe9f45034849ecb306e5399eb70a219758e421b3dc368be9aa4da307
-
SHA512
f9a871880ebaa7c89fd9e6418310bf6876ffee12ec7a9974c0132a27cf55f452a3d4caf4cfc3ee12bb52e204895c256d140ee28d00ed3d2f258af9563b6fb646
-
SSDEEP
1536:r7Xl6xlLXtJbru/+nxylEu4y44aj9QQCVWnfr0525p:r7XlkJXHK/+nxjy4dxCqVn
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Modifies firewall policy service 3 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile wmisrpd.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications wmisrpd.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Windows\SysWOW64\wmisrpd.exe = "C:\\Windows\\SysWOW64\\wmisrpd.exe:*:Enabled:Windows Live" wmisrpd.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List wmisrpd.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile wmisrpd.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications wmisrpd.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List\C:\Windows\SysWOW64\wmisrpd.exe = "C:\\Windows\\SysWOW64\\wmisrpd.exe:*:Enabled:Windows Live" wmisrpd.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List wmisrpd.exe -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" wmisrpd.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" wmisrpd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" wmisrpd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" wmisrpd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" wmisrpd.exe -
Disables use of System Restore points 1 TTPs
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts wmisrpd.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe\Debugger = "wmisrpd.exe" b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe wmisrpd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe\Debugger = "wmisrpd.exe" wmisrpd.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 1848 wmisrpd.exe 4132 wmisrpd.exe -
Impair Defenses: Safe Mode Boot 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\ctfmon.exe = "ctfmon.exe" b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\ctfmon.exe = "ctfmon.exe" wmisrpd.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" wmisrpd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" wmisrpd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" wmisrpd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" wmisrpd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ctfmon.exe = "ctfmon.exe" b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ctfmon.exe = "ctfmon.exe" wmisrpd.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmisrpd.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmisrpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\wmisrpd.exe b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wmisrpd.exe b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wmisrpd.exe wmisrpd.exe File created C:\Windows\SysWOW64\wmisrpd.exe wmisrpd.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 560 set thread context of 2232 560 b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exe 84 PID 1848 set thread context of 4132 1848 wmisrpd.exe 90 -
Launches sc.exe 27 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4884 sc.exe 2952 sc.exe 4764 sc.exe 4704 sc.exe 488 sc.exe 4244 sc.exe 2540 sc.exe 264 sc.exe 1668 sc.exe 812 sc.exe 4388 sc.exe 3612 sc.exe 2072 sc.exe 4492 sc.exe 2412 sc.exe 428 sc.exe 4676 sc.exe 4788 sc.exe 4212 sc.exe 4836 sc.exe 4572 sc.exe 4284 sc.exe 3848 sc.exe 4192 sc.exe 4584 sc.exe 3572 sc.exe 444 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisrpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe -
Gathers network information 2 TTPs 3 IoCs
Uses commandline utility to view network configuration.
pid Process 488 ipconfig.exe 2920 ipconfig.exe 4284 ipconfig.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 2232 b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exe 2232 b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exe 4132 wmisrpd.exe 4132 wmisrpd.exe 4132 wmisrpd.exe 4132 wmisrpd.exe 4132 wmisrpd.exe 4132 wmisrpd.exe 4132 wmisrpd.exe 4132 wmisrpd.exe 4132 wmisrpd.exe 4132 wmisrpd.exe 4132 wmisrpd.exe 4132 wmisrpd.exe 4132 wmisrpd.exe 4132 wmisrpd.exe 4132 wmisrpd.exe 4132 wmisrpd.exe 4132 wmisrpd.exe 4132 wmisrpd.exe 4132 wmisrpd.exe 4132 wmisrpd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2232 b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4132 wmisrpd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 560 wrote to memory of 2232 560 b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exe 84 PID 560 wrote to memory of 2232 560 b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exe 84 PID 560 wrote to memory of 2232 560 b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exe 84 PID 560 wrote to memory of 2232 560 b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exe 84 PID 560 wrote to memory of 2232 560 b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exe 84 PID 2232 wrote to memory of 1848 2232 b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exe 85 PID 2232 wrote to memory of 1848 2232 b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exe 85 PID 2232 wrote to memory of 1848 2232 b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exe 85 PID 2232 wrote to memory of 4652 2232 b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exe 86 PID 2232 wrote to memory of 4652 2232 b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exe 86 PID 2232 wrote to memory of 4652 2232 b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exe 86 PID 2232 wrote to memory of 1160 2232 b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exe 88 PID 2232 wrote to memory of 1160 2232 b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exe 88 PID 2232 wrote to memory of 1160 2232 b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exe 88 PID 1848 wrote to memory of 4132 1848 wmisrpd.exe 90 PID 1848 wrote to memory of 4132 1848 wmisrpd.exe 90 PID 1848 wrote to memory of 4132 1848 wmisrpd.exe 90 PID 1848 wrote to memory of 4132 1848 wmisrpd.exe 90 PID 1848 wrote to memory of 4132 1848 wmisrpd.exe 90 PID 4132 wrote to memory of 3436 4132 wmisrpd.exe 56 PID 4132 wrote to memory of 3436 4132 wmisrpd.exe 56 PID 4132 wrote to memory of 4212 4132 wmisrpd.exe 98 PID 4132 wrote to memory of 4212 4132 wmisrpd.exe 98 PID 4132 wrote to memory of 4212 4132 wmisrpd.exe 98 PID 4132 wrote to memory of 2356 4132 wmisrpd.exe 99 PID 4132 wrote to memory of 2356 4132 wmisrpd.exe 99 PID 4132 wrote to memory of 2356 4132 wmisrpd.exe 99 PID 4132 wrote to memory of 2888 4132 wmisrpd.exe 100 PID 4132 wrote to memory of 2888 4132 wmisrpd.exe 100 PID 4132 wrote to memory of 2888 4132 wmisrpd.exe 100 PID 2356 wrote to memory of 4492 2356 CMD.exe 104 PID 2356 wrote to memory of 4492 2356 CMD.exe 104 PID 2356 wrote to memory of 4492 2356 CMD.exe 104 PID 2888 wrote to memory of 4764 2888 CMD.exe 105 PID 2888 wrote to memory of 4764 2888 CMD.exe 105 PID 2888 wrote to memory of 4764 2888 CMD.exe 105 PID 4212 wrote to memory of 2120 4212 CMD.exe 106 PID 4212 wrote to memory of 2120 4212 CMD.exe 106 PID 4212 wrote to memory of 2120 4212 CMD.exe 106 PID 2120 wrote to memory of 4656 2120 net.exe 107 PID 2120 wrote to memory of 4656 2120 net.exe 107 PID 2120 wrote to memory of 4656 2120 net.exe 107 PID 4132 wrote to memory of 488 4132 wmisrpd.exe 108 PID 4132 wrote to memory of 488 4132 wmisrpd.exe 108 PID 4132 wrote to memory of 488 4132 wmisrpd.exe 108 PID 4132 wrote to memory of 1148 4132 wmisrpd.exe 110 PID 4132 wrote to memory of 1148 4132 wmisrpd.exe 110 PID 4132 wrote to memory of 1148 4132 wmisrpd.exe 110 PID 1148 wrote to memory of 4704 1148 CMD.exe 112 PID 1148 wrote to memory of 4704 1148 CMD.exe 112 PID 1148 wrote to memory of 4704 1148 CMD.exe 112 PID 4132 wrote to memory of 4836 4132 wmisrpd.exe 113 PID 4132 wrote to memory of 4836 4132 wmisrpd.exe 113 PID 4132 wrote to memory of 4836 4132 wmisrpd.exe 113 PID 4132 wrote to memory of 2912 4132 wmisrpd.exe 114 PID 4132 wrote to memory of 2912 4132 wmisrpd.exe 114 PID 4132 wrote to memory of 2912 4132 wmisrpd.exe 114 PID 4132 wrote to memory of 4284 4132 wmisrpd.exe 115 PID 4132 wrote to memory of 4284 4132 wmisrpd.exe 115 PID 4132 wrote to memory of 4284 4132 wmisrpd.exe 115 PID 4284 wrote to memory of 3572 4284 CMD.exe 119 PID 4284 wrote to memory of 3572 4284 CMD.exe 119 PID 4284 wrote to memory of 3572 4284 CMD.exe 119 PID 2912 wrote to memory of 428 2912 CMD.exe 120
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3436
-
C:\Users\Admin\AppData\Local\Temp\b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exe"2⤵
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Users\Admin\AppData\Local\Temp\b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\b3e63de0ee2812b92c280e2ae78808cd_JaffaCakes118.exe3⤵
- Event Triggered Execution: Image File Execution Options Injection
- Checks computer location settings
- Impair Defenses: Safe Mode Boot
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\wmisrpd.exe"C:\Windows\system32\wmisrpd.exe"4⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\SysWOW64\wmisrpd.exeC:\Windows\SysWOW64\wmisrpd.exe5⤵
- Modifies firewall policy service
- Modifies security service
- Windows security bypass
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Impair Defenses: Safe Mode Boot
- Windows security modification
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Windows\SysWOW64\CMD.exeCMD /C net stop "avast! Antivirus"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Windows\SysWOW64\net.exenet stop "avast! Antivirus"7⤵
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "avast! Antivirus"8⤵PID:4656
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc stop "avast! Antivirus"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\sc.exesc stop "avast! Antivirus"7⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4492
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc config "avast! Antivirus" start= disabled6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\SysWOW64\sc.exesc config "avast! Antivirus" start= disabled7⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4764
-
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns6⤵
- Gathers network information
PID:488
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc delete "avast! Antivirus"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\SysWOW64\sc.exesc delete "avast! Antivirus"7⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4704
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C net stop AntiVirService6⤵
- System Location Discovery: System Language Discovery
PID:4836 -
C:\Windows\SysWOW64\net.exenet stop AntiVirService7⤵PID:3916
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop AntiVirService8⤵PID:836
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc stop AntiVirService6⤵
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\SysWOW64\sc.exesc stop AntiVirService7⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:428
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc config AntiVirService start= disabled6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Windows\SysWOW64\sc.exesc config AntiVirService start= disabled7⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3572
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc delete AntiVirService6⤵PID:1696
-
C:\Windows\SysWOW64\sc.exesc delete AntiVirService7⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4884
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C net stop PASRV6⤵
- System Location Discovery: System Language Discovery
PID:2072 -
C:\Windows\SysWOW64\net.exenet stop PASRV7⤵
- System Location Discovery: System Language Discovery
PID:3856 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop PASRV8⤵PID:4796
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc stop PASRV6⤵
- System Location Discovery: System Language Discovery
PID:2880 -
C:\Windows\SysWOW64\sc.exesc stop PASRV7⤵
- Launches sc.exe
PID:2412
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc config PASRV start= disabled6⤵PID:3140
-
C:\Windows\SysWOW64\sc.exesc config PASRV start= disabled7⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4192
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc delete PASRV6⤵
- System Location Discovery: System Language Discovery
PID:3488 -
C:\Windows\SysWOW64\sc.exesc delete PASRV7⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4388
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C net stop VSSERV6⤵PID:4408
-
C:\Windows\SysWOW64\net.exenet stop VSSERV7⤵
- System Location Discovery: System Language Discovery
PID:3544 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VSSERV8⤵PID:1920
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc stop VSSERV6⤵PID:4324
-
C:\Windows\SysWOW64\sc.exesc stop VSSERV7⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1668
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc config VSSERV start= disabled6⤵
- System Location Discovery: System Language Discovery
PID:4920 -
C:\Windows\SysWOW64\sc.exesc config VSSERV start= disabled7⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4676
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc delete VSSERV6⤵
- System Location Discovery: System Language Discovery
PID:2804 -
C:\Windows\SysWOW64\sc.exesc delete VSSERV7⤵
- Launches sc.exe
PID:2952
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C net stop avg8wd6⤵
- System Location Discovery: System Language Discovery
PID:1784 -
C:\Windows\SysWOW64\net.exenet stop avg8wd7⤵
- System Location Discovery: System Language Discovery
PID:3952 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop avg8wd8⤵
- System Location Discovery: System Language Discovery
PID:1016
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc stop avg8wd6⤵
- System Location Discovery: System Language Discovery
PID:740 -
C:\Windows\SysWOW64\sc.exesc stop avg8wd7⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4584
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc config avg8wd start= disabled6⤵PID:2728
-
C:\Windows\SysWOW64\sc.exesc config avg8wd start= disabled7⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:812
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc delete avg8wd6⤵
- System Location Discovery: System Language Discovery
PID:972 -
C:\Windows\SysWOW64\sc.exesc delete avg8wd7⤵
- Launches sc.exe
PID:4788
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C net stop NOD32krn6⤵
- System Location Discovery: System Language Discovery
PID:4820 -
C:\Windows\SysWOW64\net.exenet stop NOD32krn7⤵
- System Location Discovery: System Language Discovery
PID:3548 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop NOD32krn8⤵
- System Location Discovery: System Language Discovery
PID:4180
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc stop NOD32krn6⤵
- System Location Discovery: System Language Discovery
PID:1692 -
C:\Windows\SysWOW64\sc.exesc stop NOD32krn7⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:488
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc config NOD32krn start= disabled6⤵PID:2908
-
C:\Windows\SysWOW64\sc.exesc config NOD32krn start= disabled7⤵
- Launches sc.exe
PID:4212
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc delete NOD32krn6⤵PID:1152
-
C:\Windows\SysWOW64\sc.exesc delete NOD32krn7⤵
- Launches sc.exe
PID:4572
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C net stop SbPF.Launcher6⤵
- System Location Discovery: System Language Discovery
PID:2244 -
C:\Windows\SysWOW64\net.exenet stop SbPF.Launcher7⤵
- System Location Discovery: System Language Discovery
PID:2460 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SbPF.Launcher8⤵
- System Location Discovery: System Language Discovery
PID:2912
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc stop SbPF.Launcher6⤵
- System Location Discovery: System Language Discovery
PID:3524 -
C:\Windows\SysWOW64\sc.exesc stop SbPF.Launcher7⤵
- Launches sc.exe
PID:4244
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc config SbPF.Launcher start= disabled6⤵
- System Location Discovery: System Language Discovery
PID:5020 -
C:\Windows\SysWOW64\sc.exesc config SbPF.Launcher start= disabled7⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4284
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc delete SbPF.Launcher6⤵
- System Location Discovery: System Language Discovery
PID:3460 -
C:\Windows\SysWOW64\sc.exesc delete SbPF.Launcher7⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4836
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C net stop SPF46⤵
- System Location Discovery: System Language Discovery
PID:5068 -
C:\Windows\SysWOW64\net.exenet stop SPF47⤵PID:1616
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SPF48⤵
- System Location Discovery: System Language Discovery
PID:1196
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc stop SPF46⤵
- System Location Discovery: System Language Discovery
PID:1380 -
C:\Windows\SysWOW64\sc.exesc stop SPF47⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2540
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc config SPF4 start= disabled6⤵
- System Location Discovery: System Language Discovery
PID:2124 -
C:\Windows\SysWOW64\sc.exesc config SPF4 start= disabled7⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3612
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc delete SPF46⤵
- System Location Discovery: System Language Discovery
PID:1164 -
C:\Windows\SysWOW64\sc.exesc delete SPF47⤵
- Launches sc.exe
PID:2072
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C net stop acssrv6⤵
- System Location Discovery: System Language Discovery
PID:2360 -
C:\Windows\SysWOW64\net.exenet stop acssrv7⤵
- System Location Discovery: System Language Discovery
PID:1668 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop acssrv8⤵
- System Location Discovery: System Language Discovery
PID:1468
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc stop acssrv6⤵
- System Location Discovery: System Language Discovery
PID:64 -
C:\Windows\SysWOW64\sc.exesc stop acssrv7⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:444
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc config acssrv start= disabled6⤵
- System Location Discovery: System Language Discovery
PID:1604 -
C:\Windows\SysWOW64\sc.exesc config acssrv start= disabled7⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:264
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc delete acssrv6⤵
- System Location Discovery: System Language Discovery
PID:2148 -
C:\Windows\SysWOW64\sc.exesc delete acssrv7⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3848
-
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns6⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:2920
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns6⤵
- Gathers network information
PID:4284
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip4⤵
- System Location Discovery: System Language Discovery
PID:4652
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\B3E63D~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:1160
-
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Event Triggered Execution
1Image File Execution Options Injection
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Event Triggered Execution
1Image File Execution Options Injection
1Defense Evasion
Impair Defenses
5Disable or Modify System Firewall
1Disable or Modify Tools
2Safe Mode Boot
1Indicator Removal
1File Deletion
1Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
81KB
MD5b3e63de0ee2812b92c280e2ae78808cd
SHA10cc3966cd4a307f84b6a69c1aa59998e1fafd66d
SHA256e2fe63ffbe9f45034849ecb306e5399eb70a219758e421b3dc368be9aa4da307
SHA512f9a871880ebaa7c89fd9e6418310bf6876ffee12ec7a9974c0132a27cf55f452a3d4caf4cfc3ee12bb52e204895c256d140ee28d00ed3d2f258af9563b6fb646
-
Filesize
15KB
MD596d179abc939ae4cc8f6d61cb8b6fe6d
SHA1004f2c2f14a8d1bf66a0bf3d3e71e23b68dd5b7a
SHA256aa2d65cfa18eac8f7f1a22ddc6b06eed4b5b6acf4de8313a3847d4c036295194
SHA512434c54224c43710e44f700f76fcb4935216daac882cdab72d1e078e5b86f1f99342ad6d2b6aefa645277aa2fb7b06ee9c1c2f1d82b833b8517c1d5427dc78719