Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
29-11-2024 14:57
Static task
static1
Behavioral task
behavioral1
Sample
b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe
Resource
win7-20241023-en
General
-
Target
b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe
-
Size
1.2MB
-
MD5
b1fdd5e88db97e06cb1aa34250a2e7aa
-
SHA1
3a5bf3f22918e1e90fb79224aabb70872d4f2a6e
-
SHA256
d9d1115de07bc42d5f04144fdaea4b0e266625f412b3fe40f9894c47bf723355
-
SHA512
e11c9726b6cf25a2ee11622d2f65efd3d95a8935b118bf62b21378fc89d52b60073109830d142244bbbb76083485c05f73c828cf70aea62b477247cd51015169
-
SSDEEP
24576:DXdy9QgPZbB7PtkivzbV25ID2qFycEtq7xLPTASqt/VK21S:DCxfrtkKh9j2SqtNX1S
Malware Config
Extracted
darkcomet
Dyn
rezausa.dyndns.org:3030
DC_MUTEX-FP62LLT
-
InstallPath
taskhost.exe
-
gencode
hUY9zKTsFEQe
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Signatures
-
Darkcomet family
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Local\\Temp\\taskhost.exe" b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe -
Modifies firewall policy service 3 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile taskhost.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" taskhost.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" taskhost.exe -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" taskhost.exe -
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" taskhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" taskhost.exe -
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 2844 attrib.exe 2816 attrib.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion taskhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate taskhost.exe -
Executes dropped EXE 3 IoCs
pid Process 2832 taskhost.exe 1240 taskhost.exe 3028 taskhost.exe -
Loads dropped DLL 4 IoCs
pid Process 3000 b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe 3000 b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe 2832 taskhost.exe 1240 taskhost.exe -
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" taskhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" taskhost.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\taskhost.exe" b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\taskhost.exe" taskhost.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1720 set thread context of 3000 1720 b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe 31 PID 1240 set thread context of 3028 1240 taskhost.exe 41 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe -
Modifies registry class 14 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{41944795-DF99-881E-B484-167B00B2C444}\VersionIndependentProgID\ = "MSGraph.Application" b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{41944795-DF99-881E-B484-167B00B2C444}\LocalServer32\ = "C:\\PROGRA~2\\MICROS~1\\Office14\\GRAPH.EXE /automation" b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{41944795-DF99-881E-B484-167B00B2C444}\LocalServer32\LocalServer32 = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0047005200410050004800460069006c00650073003e0050004e006b004f002900500077006b002500410078003d003300720045007000580049007300330020002f006100750074006f006d006100740069006f006e0000000000 b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{41944795-DF99-881E-B484-167B00B2C444}\ProgID\ = "MSGraph.Application.8" b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{41944795-DF99-881E-B484-167B00B2C444}\Implemented Categories\{000C0118-0000-0000-C000-000000000046} b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{41944795-DF99-881E-B484-167B00B2C444}\Implemented Categories b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{41944795-DF99-881E-B484-167B00B2C444}\InprocHandler32 b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{41944795-DF99-881E-B484-167B00B2C444}\InprocHandler32\ = "ole32.dll" b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{41944795-DF99-881E-B484-167B00B2C444}\ = "Microsoft Graph Application" b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{41944795-DF99-881E-B484-167B00B2C444}\LocalServer32 b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{41944795-DF99-881E-B484-167B00B2C444}\ProgID b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{41944795-DF99-881E-B484-167B00B2C444}\VersionIndependentProgID b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{41944795-DF99-881E-B484-167B00B2C444} taskhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{41944795-DF99-881E-B484-167B00B2C444} b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3028 taskhost.exe -
Suspicious use of AdjustPrivilegeToken 54 IoCs
description pid Process Token: 33 1720 b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 1720 b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe Token: 33 1720 b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 1720 b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 3000 b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe Token: SeSecurityPrivilege 3000 b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 3000 b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe Token: SeLoadDriverPrivilege 3000 b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe Token: SeSystemProfilePrivilege 3000 b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe Token: SeSystemtimePrivilege 3000 b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe Token: SeProfSingleProcessPrivilege 3000 b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 3000 b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 3000 b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe Token: SeBackupPrivilege 3000 b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe Token: SeRestorePrivilege 3000 b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe Token: SeShutdownPrivilege 3000 b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe Token: SeDebugPrivilege 3000 b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 3000 b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 3000 b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe Token: SeRemoteShutdownPrivilege 3000 b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe Token: SeUndockPrivilege 3000 b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe Token: SeManageVolumePrivilege 3000 b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe Token: SeImpersonatePrivilege 3000 b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe Token: SeCreateGlobalPrivilege 3000 b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe Token: 33 3000 b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe Token: 34 3000 b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe Token: 35 3000 b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe Token: 33 1240 taskhost.exe Token: SeIncBasePriorityPrivilege 1240 taskhost.exe Token: 33 1240 taskhost.exe Token: SeIncBasePriorityPrivilege 1240 taskhost.exe Token: SeIncreaseQuotaPrivilege 3028 taskhost.exe Token: SeSecurityPrivilege 3028 taskhost.exe Token: SeTakeOwnershipPrivilege 3028 taskhost.exe Token: SeLoadDriverPrivilege 3028 taskhost.exe Token: SeSystemProfilePrivilege 3028 taskhost.exe Token: SeSystemtimePrivilege 3028 taskhost.exe Token: SeProfSingleProcessPrivilege 3028 taskhost.exe Token: SeIncBasePriorityPrivilege 3028 taskhost.exe Token: SeCreatePagefilePrivilege 3028 taskhost.exe Token: SeBackupPrivilege 3028 taskhost.exe Token: SeRestorePrivilege 3028 taskhost.exe Token: SeShutdownPrivilege 3028 taskhost.exe Token: SeDebugPrivilege 3028 taskhost.exe Token: SeSystemEnvironmentPrivilege 3028 taskhost.exe Token: SeChangeNotifyPrivilege 3028 taskhost.exe Token: SeRemoteShutdownPrivilege 3028 taskhost.exe Token: SeUndockPrivilege 3028 taskhost.exe Token: SeManageVolumePrivilege 3028 taskhost.exe Token: SeImpersonatePrivilege 3028 taskhost.exe Token: SeCreateGlobalPrivilege 3028 taskhost.exe Token: 33 3028 taskhost.exe Token: 34 3028 taskhost.exe Token: 35 3028 taskhost.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2988 DllHost.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1720 b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe 1240 taskhost.exe 3028 taskhost.exe 2988 DllHost.exe 2988 DllHost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2416 wrote to memory of 1720 2416 b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe 30 PID 2416 wrote to memory of 1720 2416 b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe 30 PID 2416 wrote to memory of 1720 2416 b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe 30 PID 2416 wrote to memory of 1720 2416 b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe 30 PID 2416 wrote to memory of 1720 2416 b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe 30 PID 2416 wrote to memory of 1720 2416 b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe 30 PID 1720 wrote to memory of 3000 1720 b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe 31 PID 1720 wrote to memory of 3000 1720 b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe 31 PID 1720 wrote to memory of 3000 1720 b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe 31 PID 1720 wrote to memory of 3000 1720 b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe 31 PID 1720 wrote to memory of 3000 1720 b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe 31 PID 1720 wrote to memory of 3000 1720 b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe 31 PID 1720 wrote to memory of 3000 1720 b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe 31 PID 1720 wrote to memory of 3000 1720 b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe 31 PID 1720 wrote to memory of 3000 1720 b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe 31 PID 1720 wrote to memory of 3000 1720 b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe 31 PID 1720 wrote to memory of 3000 1720 b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe 31 PID 1720 wrote to memory of 3000 1720 b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe 31 PID 1720 wrote to memory of 3000 1720 b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe 31 PID 1720 wrote to memory of 3000 1720 b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe 31 PID 1720 wrote to memory of 3000 1720 b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe 31 PID 3000 wrote to memory of 2960 3000 b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe 32 PID 3000 wrote to memory of 2960 3000 b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe 32 PID 3000 wrote to memory of 2960 3000 b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe 32 PID 3000 wrote to memory of 2960 3000 b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe 32 PID 3000 wrote to memory of 2940 3000 b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe 33 PID 3000 wrote to memory of 2940 3000 b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe 33 PID 3000 wrote to memory of 2940 3000 b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe 33 PID 3000 wrote to memory of 2940 3000 b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe 33 PID 2940 wrote to memory of 2816 2940 cmd.exe 36 PID 2940 wrote to memory of 2816 2940 cmd.exe 36 PID 2940 wrote to memory of 2816 2940 cmd.exe 36 PID 2940 wrote to memory of 2816 2940 cmd.exe 36 PID 2960 wrote to memory of 2844 2960 cmd.exe 37 PID 2960 wrote to memory of 2844 2960 cmd.exe 37 PID 2960 wrote to memory of 2844 2960 cmd.exe 37 PID 2960 wrote to memory of 2844 2960 cmd.exe 37 PID 3000 wrote to memory of 2832 3000 b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe 39 PID 3000 wrote to memory of 2832 3000 b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe 39 PID 3000 wrote to memory of 2832 3000 b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe 39 PID 3000 wrote to memory of 2832 3000 b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe 39 PID 2832 wrote to memory of 1240 2832 taskhost.exe 40 PID 2832 wrote to memory of 1240 2832 taskhost.exe 40 PID 2832 wrote to memory of 1240 2832 taskhost.exe 40 PID 2832 wrote to memory of 1240 2832 taskhost.exe 40 PID 2832 wrote to memory of 1240 2832 taskhost.exe 40 PID 2832 wrote to memory of 1240 2832 taskhost.exe 40 PID 1240 wrote to memory of 3028 1240 taskhost.exe 41 PID 1240 wrote to memory of 3028 1240 taskhost.exe 41 PID 1240 wrote to memory of 3028 1240 taskhost.exe 41 PID 1240 wrote to memory of 3028 1240 taskhost.exe 41 PID 1240 wrote to memory of 3028 1240 taskhost.exe 41 PID 1240 wrote to memory of 3028 1240 taskhost.exe 41 PID 1240 wrote to memory of 3028 1240 taskhost.exe 41 PID 1240 wrote to memory of 3028 1240 taskhost.exe 41 PID 1240 wrote to memory of 3028 1240 taskhost.exe 41 PID 1240 wrote to memory of 3028 1240 taskhost.exe 41 PID 1240 wrote to memory of 3028 1240 taskhost.exe 41 PID 1240 wrote to memory of 3028 1240 taskhost.exe 41 PID 1240 wrote to memory of 3028 1240 taskhost.exe 41 PID 1240 wrote to memory of 3028 1240 taskhost.exe 41 PID 1240 wrote to memory of 3028 1240 taskhost.exe 41 PID 3028 wrote to memory of 1500 3028 taskhost.exe 42 PID 3028 wrote to memory of 1500 3028 taskhost.exe 42 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 2844 attrib.exe 2816 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe"2⤵
- Checks BIOS information in registry
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe3⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe" +s +h4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp\b1fdd5e88db97e06cb1aa34250a2e7aa_JaffaCakes118.exe" +s +h5⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2844
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp" +s +h5⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2816
-
-
-
C:\Users\Admin\AppData\Local\Temp\taskhost.exe"C:\Users\Admin\AppData\Local\Temp\taskhost.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\taskhost.exe"C:\Users\Admin\AppData\Local\Temp\taskhost.exe"5⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Users\Admin\AppData\Local\Temp\taskhost.exeC:\Users\Admin\AppData\Local\Temp\taskhost.exe6⤵
- Modifies firewall policy service
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\notepad.exenotepad7⤵
- System Location Discovery: System Language Discovery
PID:1500
-
-
-
-
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2988
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78B
MD5734d74263ae9b50588b757ba60bfef4d
SHA1cb145a0c94da4824e97e57e7818c5efdc824f9e3
SHA2567f47866da26d9b5ba7a8470f65d660a1bdea7e12afb1fa0f3c8503a2f4926080
SHA5122b7934cc328f6db4a0527c7414662166e50ade5ccdfaedd2b8c8d1e8eddb0f8edd151fd96e88fe8a2666056d59b0f595a95fa31ff37d9d046ddef580506b6b58
-
Filesize
77KB
MD59cef21bd7a1f92991ec1a99d0290abbc
SHA18fc79d0e144742c63ee662ff51aab3c98c727331
SHA25608a636d5bb9537b0977e6617fb4ca1b58d4ade3112dc5b06e281ee7084e4094d
SHA51254034c854d36007033c363f4e79a7120bfac64c875d50ab43d5c8bd9f8d8ec47575ef0cd547b076a20ac0a505d470f19385be58e57403f6bf7a020e8ca0a0e4e
-
Filesize
1.2MB
MD5b1fdd5e88db97e06cb1aa34250a2e7aa
SHA13a5bf3f22918e1e90fb79224aabb70872d4f2a6e
SHA256d9d1115de07bc42d5f04144fdaea4b0e266625f412b3fe40f9894c47bf723355
SHA512e11c9726b6cf25a2ee11622d2f65efd3d95a8935b118bf62b21378fc89d52b60073109830d142244bbbb76083485c05f73c828cf70aea62b477247cd51015169