Overview
overview
10Static
static
3b7938b29a7...18.exe
windows7-x64
10b7938b29a7...18.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3152605369.html
windows7-x64
3152605369.html
windows10-2004-x64
31916524053.html
windows7-x64
31916524053.html
windows10-2004-x64
33072838935.html
windows7-x64
33072838935.html
windows10-2004-x64
332093631739.html
windows7-x64
332093631739.html
windows10-2004-x64
3910218026.html
windows7-x64
3910218026.html
windows10-2004-x64
3SuggestBox.js
windows7-x64
3SuggestBox.js
windows10-2004-x64
3Uninstaller.exe
windows7-x64
Uninstaller.exe
windows10-2004-x64
ads-the-in...d.html
windows7-x64
3ads-the-in...d.html
windows10-2004-x64
3locales308946821.html
windows7-x64
3locales308946821.html
windows10-2004-x64
3Analysis
-
max time kernel
150s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-12-2024 07:49
Static task
static1
Behavioral task
behavioral1
Sample
b7938b29a73c948e483937740e10f679_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b7938b29a73c948e483937740e10f679_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
152605369.html
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
152605369.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
1916524053.html
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
1916524053.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
3072838935.html
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
3072838935.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
32093631739.html
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
32093631739.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
910218026.html
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
910218026.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
SuggestBox.js
Resource
win7-20241023-en
Behavioral task
behavioral16
Sample
SuggestBox.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Uninstaller.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Uninstaller.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
ads-the-internet-the-icon-revealed.html
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
ads-the-internet-the-icon-revealed.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
locales308946821.html
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
locales308946821.html
Resource
win10v2004-20241007-en
General
-
Target
b7938b29a73c948e483937740e10f679_JaffaCakes118.exe
-
Size
901KB
-
MD5
b7938b29a73c948e483937740e10f679
-
SHA1
2d755deff735ba94063d486f2786c2481610e2f7
-
SHA256
39a9f8c96ce9f7ecf2f2424ce0aea2db15df3f6b75bb543218dab48a8d1fceba
-
SHA512
bf5d9c0dc1d5d1579f103bb7cb2460a1498c78f61ac09b330aaa94da83ace54947b47f7db7455f25cef53b238f7626fab16b96e32162a576be8c59bd77bbb64c
-
SSDEEP
24576:uixqciwUBrVIPO3ZTEJ6ohPPgIGXUmLY9RUkjEvRFTs:XqcDPO3dohwumLQRE3I
Malware Config
Signatures
-
Troldesh family
-
Troldesh, Shade, Encoder.858
Troldesh is a ransomware spread by malspam.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Loads dropped DLL 1 IoCs
pid Process 2128 b7938b29a73c948e483937740e10f679_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" b7938b29a73c948e483937740e10f679_JaffaCakes118.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: b7938b29a73c948e483937740e10f679_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2128 set thread context of 2956 2128 b7938b29a73c948e483937740e10f679_JaffaCakes118.exe 31 -
resource yara_rule behavioral1/memory/2956-20-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2956-23-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2956-21-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2956-24-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2956-26-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2956-27-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2956-31-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2956-32-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2956-33-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2956-34-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2956-35-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2956-36-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2956-37-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2956-38-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2956-41-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2956-42-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2956-63-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2956-64-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2956-65-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2956-66-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2956-67-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2956-68-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2956-70-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2956-69-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2956-71-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2956-73-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2956-72-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2956-74-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2956-75-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2956-76-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2956-77-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2956-79-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2956-78-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2956-80-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2956-81-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2956-82-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2956-83-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2956-85-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2956-84-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2956-86-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2956-87-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2956-89-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2956-88-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2956-91-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2956-90-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2956-95-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2956-94-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2956-93-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2956-92-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2956-96-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2956-97-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2956-98-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2956-101-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2956-99-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2956-100-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2956-102-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2956-103-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2956-107-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2956-108-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2956-106-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2956-105-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2956-104-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2956-109-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral1/memory/2956-110-0x0000000000400000-0x00000000005DE000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\daisies.png b7938b29a73c948e483937740e10f679_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\css\calendar.css b7938b29a73c948e483937740e10f679_JaffaCakes118.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Vignette\vignettemask25.png b7938b29a73c948e483937740e10f679_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\timer_down.png b7938b29a73c948e483937740e10f679_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\images\base-undocked-3.png b7938b29a73c948e483937740e10f679_JaffaCakes118.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\whitevignette1047.png b7938b29a73c948e483937740e10f679_JaffaCakes118.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\720x480blacksquare.png b7938b29a73c948e483937740e10f679_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\1px.gif b7938b29a73c948e483937740e10f679_JaffaCakes118.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\highlight.png b7938b29a73c948e483937740e10f679_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\settings.html b7938b29a73c948e483937740e10f679_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\js\main.js b7938b29a73c948e483937740e10f679_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\it-IT\gadget.xml b7938b29a73c948e483937740e10f679_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\images\bPrev-hot.png b7938b29a73c948e483937740e10f679_JaffaCakes118.exe File opened for modification C:\Program Files\Windows NT\TableTextService\TableTextServiceYi.txt b7938b29a73c948e483937740e10f679_JaffaCakes118.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\NavigationLeft_SelectionSubpicture.png b7938b29a73c948e483937740e10f679_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\js\weather.js b7938b29a73c948e483937740e10f679_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\js\highDpiImageSwap.js b7938b29a73c948e483937740e10f679_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\background.png b7938b29a73c948e483937740e10f679_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\images\button_right_mouseover.png b7938b29a73c948e483937740e10f679_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\images\button_left_mousedown.png b7938b29a73c948e483937740e10f679_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\js\localizedStrings.js b7938b29a73c948e483937740e10f679_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\icon.png b7938b29a73c948e483937740e10f679_JaffaCakes118.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\title_trans_notes.wmv b7938b29a73c948e483937740e10f679_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\14.png b7938b29a73c948e483937740e10f679_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\slideShow.html b7938b29a73c948e483937740e10f679_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\js\init.js b7938b29a73c948e483937740e10f679_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\js\settings.js b7938b29a73c948e483937740e10f679_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\gadget.xml b7938b29a73c948e483937740e10f679_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\drag.png b7938b29a73c948e483937740e10f679_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\gadget.xml b7938b29a73c948e483937740e10f679_JaffaCakes118.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\requests\vlm_cmd.xml b7938b29a73c948e483937740e10f679_JaffaCakes118.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\requests\vlm.xml b7938b29a73c948e483937740e10f679_JaffaCakes118.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\SportsNotesBackground_PAL.wmv b7938b29a73c948e483937740e10f679_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\gadget.xml b7938b29a73c948e483937740e10f679_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\images\main_background.png b7938b29a73c948e483937740e10f679_JaffaCakes118.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\performance.png b7938b29a73c948e483937740e10f679_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\images\Gadget_Star_Full.png b7938b29a73c948e483937740e10f679_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Media Player\Network Sharing\wmpnss_bw32.jpg b7938b29a73c948e483937740e10f679_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\system_settings.png b7938b29a73c948e483937740e10f679_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\en-US\js\settings.js b7938b29a73c948e483937740e10f679_JaffaCakes118.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\PassportMask_PAL.wmv b7938b29a73c948e483937740e10f679_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\gadget.xml b7938b29a73c948e483937740e10f679_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\trad_m.png b7938b29a73c948e483937740e10f679_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\next_down.png b7938b29a73c948e483937740e10f679_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\js\calendar.js b7938b29a73c948e483937740e10f679_JaffaCakes118.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\15x15dot.png b7938b29a73c948e483937740e10f679_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\drag.png b7938b29a73c948e483937740e10f679_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\settings.html b7938b29a73c948e483937740e10f679_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\en-US\js\cpu.js b7938b29a73c948e483937740e10f679_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Media Player\Network Sharing\wmpnss_color48.png b7938b29a73c948e483937740e10f679_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\gadget.xml b7938b29a73c948e483937740e10f679_JaffaCakes118.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\dialogs\error_window.html b7938b29a73c948e483937740e10f679_JaffaCakes118.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\720_480shadow.png b7938b29a73c948e483937740e10f679_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\rss_headline_glow_docked.png b7938b29a73c948e483937740e10f679_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\settings_left_rest.png b7938b29a73c948e483937740e10f679_JaffaCakes118.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\WinFXList.xml b7938b29a73c948e483937740e10f679_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\31.png b7938b29a73c948e483937740e10f679_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\settings_box_right.png b7938b29a73c948e483937740e10f679_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\redStateIcon.png b7938b29a73c948e483937740e10f679_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_black_moon-full_partly-cloudy.png b7938b29a73c948e483937740e10f679_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\square_h.png b7938b29a73c948e483937740e10f679_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\en-US\settings.html b7938b29a73c948e483937740e10f679_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Media Player\Network Sharing\wmpnss_color48.bmp b7938b29a73c948e483937740e10f679_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\js\slideShow.js b7938b29a73c948e483937740e10f679_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2700 2128 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b7938b29a73c948e483937740e10f679_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b7938b29a73c948e483937740e10f679_JaffaCakes118.exe -
Interacts with shadow copies 3 TTPs 3 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1512 vssadmin.exe 1820 vssadmin.exe 2316 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2956 b7938b29a73c948e483937740e10f679_JaffaCakes118.exe 2956 b7938b29a73c948e483937740e10f679_JaffaCakes118.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2128 b7938b29a73c948e483937740e10f679_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 840 vssvc.exe Token: SeRestorePrivilege 840 vssvc.exe Token: SeAuditPrivilege 840 vssvc.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2128 wrote to memory of 2956 2128 b7938b29a73c948e483937740e10f679_JaffaCakes118.exe 31 PID 2128 wrote to memory of 2956 2128 b7938b29a73c948e483937740e10f679_JaffaCakes118.exe 31 PID 2128 wrote to memory of 2956 2128 b7938b29a73c948e483937740e10f679_JaffaCakes118.exe 31 PID 2128 wrote to memory of 2956 2128 b7938b29a73c948e483937740e10f679_JaffaCakes118.exe 31 PID 2128 wrote to memory of 2956 2128 b7938b29a73c948e483937740e10f679_JaffaCakes118.exe 31 PID 2128 wrote to memory of 2700 2128 b7938b29a73c948e483937740e10f679_JaffaCakes118.exe 32 PID 2128 wrote to memory of 2700 2128 b7938b29a73c948e483937740e10f679_JaffaCakes118.exe 32 PID 2128 wrote to memory of 2700 2128 b7938b29a73c948e483937740e10f679_JaffaCakes118.exe 32 PID 2128 wrote to memory of 2700 2128 b7938b29a73c948e483937740e10f679_JaffaCakes118.exe 32 PID 2956 wrote to memory of 1512 2956 b7938b29a73c948e483937740e10f679_JaffaCakes118.exe 33 PID 2956 wrote to memory of 1512 2956 b7938b29a73c948e483937740e10f679_JaffaCakes118.exe 33 PID 2956 wrote to memory of 1512 2956 b7938b29a73c948e483937740e10f679_JaffaCakes118.exe 33 PID 2956 wrote to memory of 1512 2956 b7938b29a73c948e483937740e10f679_JaffaCakes118.exe 33 PID 2956 wrote to memory of 1820 2956 b7938b29a73c948e483937740e10f679_JaffaCakes118.exe 37 PID 2956 wrote to memory of 1820 2956 b7938b29a73c948e483937740e10f679_JaffaCakes118.exe 37 PID 2956 wrote to memory of 1820 2956 b7938b29a73c948e483937740e10f679_JaffaCakes118.exe 37 PID 2956 wrote to memory of 1820 2956 b7938b29a73c948e483937740e10f679_JaffaCakes118.exe 37 PID 2956 wrote to memory of 2316 2956 b7938b29a73c948e483937740e10f679_JaffaCakes118.exe 39 PID 2956 wrote to memory of 2316 2956 b7938b29a73c948e483937740e10f679_JaffaCakes118.exe 39 PID 2956 wrote to memory of 2316 2956 b7938b29a73c948e483937740e10f679_JaffaCakes118.exe 39 PID 2956 wrote to memory of 2316 2956 b7938b29a73c948e483937740e10f679_JaffaCakes118.exe 39 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\b7938b29a73c948e483937740e10f679_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b7938b29a73c948e483937740e10f679_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\b7938b29a73c948e483937740e10f679_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b7938b29a73c948e483937740e10f679_JaffaCakes118.exe"2⤵
- Adds Run key to start application
- Enumerates connected drives
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe List Shadows3⤵
- Interacts with shadow copies
PID:1512
-
-
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe Delete Shadows /All /Quiet3⤵
- Interacts with shadow copies
PID:1820
-
-
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe List Shadows3⤵
- Interacts with shadow copies
PID:2316
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2128 -s 4322⤵
- Program crash
PID:2700
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:840
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Direct Volume Access
1Indicator Removal
2File Deletion
2Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD53e6bf00b3ac976122f982ae2aadb1c51
SHA1caab188f7fdc84d3fdcb2922edeeb5ed576bd31d
SHA2564ff9b2678d698677c5d9732678f9cf53f17290e09d053691aac4cc6e6f595cbe
SHA5121286f05e6a7e6b691f6e479638e7179897598e171b52eb3a3dc0e830415251069d29416b6d1ffc6d7dce8da5625e1479be06db9b7179e7776659c5c1ad6aa706