Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2024 08:38
Static task
static1
Behavioral task
behavioral1
Sample
bc94aaa11cb54dcf3c211af470b7ba4c_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
bc94aaa11cb54dcf3c211af470b7ba4c_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
bc94aaa11cb54dcf3c211af470b7ba4c_JaffaCakes118.exe
-
Size
154KB
-
MD5
bc94aaa11cb54dcf3c211af470b7ba4c
-
SHA1
8c3dbc8108ba0d2e36339286feea7d484550e48d
-
SHA256
ef354f62f14cc9a691116807f73fab18a1ec3033c7dc415e701066b03d82e9fd
-
SHA512
6b00faca670f989345da92ddd00580c2d637ffdb35258b799bbe43fd56fc74368ab9852d649823f73fd0809068a99ab8e9fc2f8a42e01f38026bedb52795865e
-
SSDEEP
3072:UjvopcI+YF+S+18Mwd/aujCuaa+HTNZob5y4KUxuX7FYvk5MN:UjYF+W7a3uHU6y4KBX7S85G
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Checks computer location settings 2 TTPs 17 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation winupd01.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation winupd01.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation winupd01.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation winupd01.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation bc94aaa11cb54dcf3c211af470b7ba4c_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation winupd01.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation winupd01.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation winupd01.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation winupd01.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation winupd01.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation winupd01.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation winupd01.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation winupd01.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation winupd01.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation winupd01.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation winupd01.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation winupd01.exe -
Deletes itself 1 IoCs
pid Process 1036 winupd01.exe -
Executes dropped EXE 33 IoCs
pid Process 2320 winupd01.exe 1036 winupd01.exe 1956 winupd01.exe 3076 winupd01.exe 764 winupd01.exe 2132 winupd01.exe 3432 winupd01.exe 3528 winupd01.exe 1556 winupd01.exe 3600 winupd01.exe 4104 winupd01.exe 1344 winupd01.exe 4500 winupd01.exe 3676 winupd01.exe 2220 winupd01.exe 3172 winupd01.exe 1252 winupd01.exe 3048 winupd01.exe 2264 winupd01.exe 2180 winupd01.exe 1144 winupd01.exe 3176 winupd01.exe 1620 winupd01.exe 4436 winupd01.exe 4000 winupd01.exe 560 winupd01.exe 3480 winupd01.exe 1068 winupd01.exe 5020 winupd01.exe 5040 winupd01.exe 3040 winupd01.exe 5068 winupd01.exe 4228 winupd01.exe -
Drops file in System32 directory 34 IoCs
description ioc Process File created C:\Windows\SysWOW64\winupd01.exe winupd01.exe File opened for modification C:\Windows\SysWOW64\winupd01.exe winupd01.exe File opened for modification C:\Windows\SysWOW64\winupd01.exe winupd01.exe File created C:\Windows\SysWOW64\winupd01.exe winupd01.exe File opened for modification C:\Windows\SysWOW64\winupd01.exe winupd01.exe File created C:\Windows\SysWOW64\winupd01.exe winupd01.exe File opened for modification C:\Windows\SysWOW64\winupd01.exe winupd01.exe File opened for modification C:\Windows\SysWOW64\winupd01.exe bc94aaa11cb54dcf3c211af470b7ba4c_JaffaCakes118.exe File created C:\Windows\SysWOW64\winupd01.exe bc94aaa11cb54dcf3c211af470b7ba4c_JaffaCakes118.exe File created C:\Windows\SysWOW64\winupd01.exe winupd01.exe File created C:\Windows\SysWOW64\winupd01.exe winupd01.exe File opened for modification C:\Windows\SysWOW64\winupd01.exe winupd01.exe File opened for modification C:\Windows\SysWOW64\winupd01.exe winupd01.exe File created C:\Windows\SysWOW64\winupd01.exe winupd01.exe File created C:\Windows\SysWOW64\winupd01.exe winupd01.exe File created C:\Windows\SysWOW64\winupd01.exe winupd01.exe File opened for modification C:\Windows\SysWOW64\winupd01.exe winupd01.exe File opened for modification C:\Windows\SysWOW64\winupd01.exe winupd01.exe File opened for modification C:\Windows\SysWOW64\winupd01.exe winupd01.exe File opened for modification C:\Windows\SysWOW64\winupd01.exe winupd01.exe File created C:\Windows\SysWOW64\winupd01.exe winupd01.exe File opened for modification C:\Windows\SysWOW64\winupd01.exe winupd01.exe File created C:\Windows\SysWOW64\winupd01.exe winupd01.exe File opened for modification C:\Windows\SysWOW64\winupd01.exe winupd01.exe File created C:\Windows\SysWOW64\winupd01.exe winupd01.exe File opened for modification C:\Windows\SysWOW64\winupd01.exe winupd01.exe File created C:\Windows\SysWOW64\winupd01.exe winupd01.exe File created C:\Windows\SysWOW64\winupd01.exe winupd01.exe File created C:\Windows\SysWOW64\winupd01.exe winupd01.exe File opened for modification C:\Windows\SysWOW64\winupd01.exe winupd01.exe File opened for modification C:\Windows\SysWOW64\winupd01.exe winupd01.exe File created C:\Windows\SysWOW64\winupd01.exe winupd01.exe File opened for modification C:\Windows\SysWOW64\winupd01.exe winupd01.exe File created C:\Windows\SysWOW64\winupd01.exe winupd01.exe -
Suspicious use of SetThreadContext 16 IoCs
description pid Process procid_target PID 1004 set thread context of 2760 1004 bc94aaa11cb54dcf3c211af470b7ba4c_JaffaCakes118.exe 87 PID 2320 set thread context of 1036 2320 winupd01.exe 92 PID 1956 set thread context of 3076 1956 winupd01.exe 94 PID 764 set thread context of 2132 764 winupd01.exe 98 PID 3432 set thread context of 3528 3432 winupd01.exe 100 PID 4104 set thread context of 1344 4104 winupd01.exe 104 PID 4500 set thread context of 3676 4500 winupd01.exe 106 PID 2220 set thread context of 3172 2220 winupd01.exe 108 PID 1252 set thread context of 3048 1252 winupd01.exe 110 PID 2264 set thread context of 2180 2264 winupd01.exe 112 PID 1144 set thread context of 3176 1144 winupd01.exe 114 PID 1620 set thread context of 4436 1620 winupd01.exe 116 PID 4000 set thread context of 560 4000 winupd01.exe 118 PID 3480 set thread context of 1068 3480 winupd01.exe 120 PID 5020 set thread context of 5040 5020 winupd01.exe 122 PID 3040 set thread context of 5068 3040 winupd01.exe 124 -
resource yara_rule behavioral2/memory/2760-0-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral2/memory/2760-2-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral2/memory/2760-5-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral2/memory/2760-8-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral2/memory/2760-9-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral2/memory/2760-7-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral2/memory/2760-1-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral2/memory/2760-45-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral2/memory/1036-56-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral2/memory/1036-55-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral2/memory/1036-54-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral2/memory/1036-53-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral2/memory/1036-52-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral2/memory/1036-58-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral2/memory/3076-68-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral2/memory/3076-70-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral2/memory/3076-69-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral2/memory/3076-67-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral2/memory/3076-73-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral2/memory/2132-81-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral2/memory/2132-84-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral2/memory/2132-83-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral2/memory/2132-87-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral2/memory/3528-95-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral2/memory/3528-97-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral2/memory/3528-98-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral2/memory/3528-100-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral2/memory/3600-107-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral2/memory/3600-106-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral2/memory/3600-105-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral2/memory/3600-110-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral2/memory/1344-121-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral2/memory/1344-126-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral2/memory/3676-140-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral2/memory/3172-148-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral2/memory/3172-155-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral2/memory/3048-165-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral2/memory/3048-170-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral2/memory/2180-180-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral2/memory/2180-185-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral2/memory/3176-195-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral2/memory/3176-200-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral2/memory/4436-214-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral2/memory/560-229-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral2/memory/1068-243-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral2/memory/5040-257-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral2/memory/5068-271-0x0000000000400000-0x0000000000463000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 35 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bc94aaa11cb54dcf3c211af470b7ba4c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupd01.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupd01.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupd01.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupd01.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupd01.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupd01.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupd01.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupd01.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupd01.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupd01.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupd01.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupd01.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupd01.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupd01.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupd01.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bc94aaa11cb54dcf3c211af470b7ba4c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupd01.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupd01.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupd01.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupd01.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupd01.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupd01.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupd01.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupd01.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupd01.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupd01.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupd01.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupd01.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupd01.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupd01.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupd01.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupd01.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupd01.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupd01.exe -
Modifies registry class 17 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winupd01.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winupd01.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winupd01.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winupd01.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winupd01.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winupd01.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ bc94aaa11cb54dcf3c211af470b7ba4c_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winupd01.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winupd01.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winupd01.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winupd01.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winupd01.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winupd01.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winupd01.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winupd01.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winupd01.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winupd01.exe -
Suspicious behavior: EnumeratesProcesses 34 IoCs
pid Process 2760 bc94aaa11cb54dcf3c211af470b7ba4c_JaffaCakes118.exe 2760 bc94aaa11cb54dcf3c211af470b7ba4c_JaffaCakes118.exe 1036 winupd01.exe 1036 winupd01.exe 3076 winupd01.exe 3076 winupd01.exe 2132 winupd01.exe 2132 winupd01.exe 3528 winupd01.exe 3528 winupd01.exe 3600 winupd01.exe 3600 winupd01.exe 1344 winupd01.exe 1344 winupd01.exe 3676 winupd01.exe 3676 winupd01.exe 3172 winupd01.exe 3172 winupd01.exe 3048 winupd01.exe 3048 winupd01.exe 2180 winupd01.exe 2180 winupd01.exe 3176 winupd01.exe 3176 winupd01.exe 4436 winupd01.exe 4436 winupd01.exe 560 winupd01.exe 560 winupd01.exe 1068 winupd01.exe 1068 winupd01.exe 5040 winupd01.exe 5040 winupd01.exe 5068 winupd01.exe 5068 winupd01.exe -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 1004 bc94aaa11cb54dcf3c211af470b7ba4c_JaffaCakes118.exe 2320 winupd01.exe 1956 winupd01.exe 764 winupd01.exe 3432 winupd01.exe 4104 winupd01.exe 4500 winupd01.exe 2220 winupd01.exe 1252 winupd01.exe 2264 winupd01.exe 1144 winupd01.exe 1620 winupd01.exe 4000 winupd01.exe 3480 winupd01.exe 5020 winupd01.exe 3040 winupd01.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1004 wrote to memory of 2760 1004 bc94aaa11cb54dcf3c211af470b7ba4c_JaffaCakes118.exe 87 PID 1004 wrote to memory of 2760 1004 bc94aaa11cb54dcf3c211af470b7ba4c_JaffaCakes118.exe 87 PID 1004 wrote to memory of 2760 1004 bc94aaa11cb54dcf3c211af470b7ba4c_JaffaCakes118.exe 87 PID 1004 wrote to memory of 2760 1004 bc94aaa11cb54dcf3c211af470b7ba4c_JaffaCakes118.exe 87 PID 1004 wrote to memory of 2760 1004 bc94aaa11cb54dcf3c211af470b7ba4c_JaffaCakes118.exe 87 PID 1004 wrote to memory of 2760 1004 bc94aaa11cb54dcf3c211af470b7ba4c_JaffaCakes118.exe 87 PID 1004 wrote to memory of 2760 1004 bc94aaa11cb54dcf3c211af470b7ba4c_JaffaCakes118.exe 87 PID 1004 wrote to memory of 2760 1004 bc94aaa11cb54dcf3c211af470b7ba4c_JaffaCakes118.exe 87 PID 2760 wrote to memory of 2320 2760 bc94aaa11cb54dcf3c211af470b7ba4c_JaffaCakes118.exe 89 PID 2760 wrote to memory of 2320 2760 bc94aaa11cb54dcf3c211af470b7ba4c_JaffaCakes118.exe 89 PID 2760 wrote to memory of 2320 2760 bc94aaa11cb54dcf3c211af470b7ba4c_JaffaCakes118.exe 89 PID 2320 wrote to memory of 1036 2320 winupd01.exe 92 PID 2320 wrote to memory of 1036 2320 winupd01.exe 92 PID 2320 wrote to memory of 1036 2320 winupd01.exe 92 PID 2320 wrote to memory of 1036 2320 winupd01.exe 92 PID 2320 wrote to memory of 1036 2320 winupd01.exe 92 PID 2320 wrote to memory of 1036 2320 winupd01.exe 92 PID 2320 wrote to memory of 1036 2320 winupd01.exe 92 PID 2320 wrote to memory of 1036 2320 winupd01.exe 92 PID 1036 wrote to memory of 1956 1036 winupd01.exe 93 PID 1036 wrote to memory of 1956 1036 winupd01.exe 93 PID 1036 wrote to memory of 1956 1036 winupd01.exe 93 PID 1956 wrote to memory of 3076 1956 winupd01.exe 94 PID 1956 wrote to memory of 3076 1956 winupd01.exe 94 PID 1956 wrote to memory of 3076 1956 winupd01.exe 94 PID 1956 wrote to memory of 3076 1956 winupd01.exe 94 PID 1956 wrote to memory of 3076 1956 winupd01.exe 94 PID 1956 wrote to memory of 3076 1956 winupd01.exe 94 PID 1956 wrote to memory of 3076 1956 winupd01.exe 94 PID 1956 wrote to memory of 3076 1956 winupd01.exe 94 PID 3076 wrote to memory of 764 3076 winupd01.exe 95 PID 3076 wrote to memory of 764 3076 winupd01.exe 95 PID 3076 wrote to memory of 764 3076 winupd01.exe 95 PID 764 wrote to memory of 2132 764 winupd01.exe 98 PID 764 wrote to memory of 2132 764 winupd01.exe 98 PID 764 wrote to memory of 2132 764 winupd01.exe 98 PID 764 wrote to memory of 2132 764 winupd01.exe 98 PID 764 wrote to memory of 2132 764 winupd01.exe 98 PID 764 wrote to memory of 2132 764 winupd01.exe 98 PID 764 wrote to memory of 2132 764 winupd01.exe 98 PID 764 wrote to memory of 2132 764 winupd01.exe 98 PID 2132 wrote to memory of 3432 2132 winupd01.exe 99 PID 2132 wrote to memory of 3432 2132 winupd01.exe 99 PID 2132 wrote to memory of 3432 2132 winupd01.exe 99 PID 3432 wrote to memory of 3528 3432 winupd01.exe 100 PID 3432 wrote to memory of 3528 3432 winupd01.exe 100 PID 3432 wrote to memory of 3528 3432 winupd01.exe 100 PID 3432 wrote to memory of 3528 3432 winupd01.exe 100 PID 3432 wrote to memory of 3528 3432 winupd01.exe 100 PID 3432 wrote to memory of 3528 3432 winupd01.exe 100 PID 3432 wrote to memory of 3528 3432 winupd01.exe 100 PID 3432 wrote to memory of 3528 3432 winupd01.exe 100 PID 3528 wrote to memory of 1556 3528 winupd01.exe 101 PID 3528 wrote to memory of 1556 3528 winupd01.exe 101 PID 3528 wrote to memory of 1556 3528 winupd01.exe 101 PID 3600 wrote to memory of 4104 3600 winupd01.exe 103 PID 3600 wrote to memory of 4104 3600 winupd01.exe 103 PID 3600 wrote to memory of 4104 3600 winupd01.exe 103 PID 4104 wrote to memory of 1344 4104 winupd01.exe 104 PID 4104 wrote to memory of 1344 4104 winupd01.exe 104 PID 4104 wrote to memory of 1344 4104 winupd01.exe 104 PID 4104 wrote to memory of 1344 4104 winupd01.exe 104 PID 4104 wrote to memory of 1344 4104 winupd01.exe 104 PID 4104 wrote to memory of 1344 4104 winupd01.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc94aaa11cb54dcf3c211af470b7ba4c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bc94aaa11cb54dcf3c211af470b7ba4c_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Users\Admin\AppData\Local\Temp\bc94aaa11cb54dcf3c211af470b7ba4c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bc94aaa11cb54dcf3c211af470b7ba4c_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\winupd01.exe"C:\Windows\system32\winupd01.exe" C:\Users\Admin\AppData\Local\Temp\BC94AA~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\SysWOW64\winupd01.exe"C:\Windows\system32\winupd01.exe" C:\Users\Admin\AppData\Local\Temp\BC94AA~1.EXE4⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Windows\SysWOW64\winupd01.exe"C:\Windows\system32\winupd01.exe" C:\Windows\SysWOW64\winupd01.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\winupd01.exe"C:\Windows\system32\winupd01.exe" C:\Windows\SysWOW64\winupd01.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Windows\SysWOW64\winupd01.exe"C:\Windows\system32\winupd01.exe" C:\Windows\SysWOW64\winupd01.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Windows\SysWOW64\winupd01.exe"C:\Windows\system32\winupd01.exe" C:\Windows\SysWOW64\winupd01.exe8⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\SysWOW64\winupd01.exe"C:\Windows\system32\winupd01.exe" C:\Windows\SysWOW64\winupd01.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Windows\SysWOW64\winupd01.exe"C:\Windows\system32\winupd01.exe" C:\Windows\SysWOW64\winupd01.exe10⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Windows\SysWOW64\winupd01.exe"C:\Windows\system32\winupd01.exe" C:\Windows\SysWOW64\winupd01.exe11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1556 -
C:\Windows\SysWOW64\winupd01.exe"C:\Windows\system32\winupd01.exe" C:\Windows\SysWOW64\winupd01.exe12⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Windows\SysWOW64\winupd01.exe"C:\Windows\system32\winupd01.exe" C:\Windows\SysWOW64\winupd01.exe13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Windows\SysWOW64\winupd01.exe"C:\Windows\system32\winupd01.exe" C:\Windows\SysWOW64\winupd01.exe14⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1344 -
C:\Windows\SysWOW64\winupd01.exe"C:\Windows\system32\winupd01.exe" C:\Windows\SysWOW64\winupd01.exe15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4500 -
C:\Windows\SysWOW64\winupd01.exe"C:\Windows\system32\winupd01.exe" C:\Windows\SysWOW64\winupd01.exe16⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3676 -
C:\Windows\SysWOW64\winupd01.exe"C:\Windows\system32\winupd01.exe" C:\Windows\SysWOW64\winupd01.exe17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2220 -
C:\Windows\SysWOW64\winupd01.exe"C:\Windows\system32\winupd01.exe" C:\Windows\SysWOW64\winupd01.exe18⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3172 -
C:\Windows\SysWOW64\winupd01.exe"C:\Windows\system32\winupd01.exe" C:\Windows\SysWOW64\winupd01.exe19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1252 -
C:\Windows\SysWOW64\winupd01.exe"C:\Windows\system32\winupd01.exe" C:\Windows\SysWOW64\winupd01.exe20⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3048 -
C:\Windows\SysWOW64\winupd01.exe"C:\Windows\system32\winupd01.exe" C:\Windows\SysWOW64\winupd01.exe21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2264 -
C:\Windows\SysWOW64\winupd01.exe"C:\Windows\system32\winupd01.exe" C:\Windows\SysWOW64\winupd01.exe22⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2180 -
C:\Windows\SysWOW64\winupd01.exe"C:\Windows\system32\winupd01.exe" C:\Windows\SysWOW64\winupd01.exe23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1144 -
C:\Windows\SysWOW64\winupd01.exe"C:\Windows\system32\winupd01.exe" C:\Windows\SysWOW64\winupd01.exe24⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3176 -
C:\Windows\SysWOW64\winupd01.exe"C:\Windows\system32\winupd01.exe" C:\Windows\SysWOW64\winupd01.exe25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1620 -
C:\Windows\SysWOW64\winupd01.exe"C:\Windows\system32\winupd01.exe" C:\Windows\SysWOW64\winupd01.exe26⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4436 -
C:\Windows\SysWOW64\winupd01.exe"C:\Windows\system32\winupd01.exe" C:\Windows\SysWOW64\winupd01.exe27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4000 -
C:\Windows\SysWOW64\winupd01.exe"C:\Windows\system32\winupd01.exe" C:\Windows\SysWOW64\winupd01.exe28⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:560 -
C:\Windows\SysWOW64\winupd01.exe"C:\Windows\system32\winupd01.exe" C:\Windows\SysWOW64\winupd01.exe29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3480 -
C:\Windows\SysWOW64\winupd01.exe"C:\Windows\system32\winupd01.exe" C:\Windows\SysWOW64\winupd01.exe30⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1068 -
C:\Windows\SysWOW64\winupd01.exe"C:\Windows\system32\winupd01.exe" C:\Windows\SysWOW64\winupd01.exe31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5020 -
C:\Windows\SysWOW64\winupd01.exe"C:\Windows\system32\winupd01.exe" C:\Windows\SysWOW64\winupd01.exe32⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:5040 -
C:\Windows\SysWOW64\winupd01.exe"C:\Windows\system32\winupd01.exe" C:\Windows\SysWOW64\winupd01.exe33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3040 -
C:\Windows\SysWOW64\winupd01.exe"C:\Windows\system32\winupd01.exe" C:\Windows\SysWOW64\winupd01.exe34⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:5068 -
C:\Windows\SysWOW64\winupd01.exe"C:\Windows\system32\winupd01.exe" C:\Windows\SysWOW64\winupd01.exe35⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4228
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
154KB
MD5bc94aaa11cb54dcf3c211af470b7ba4c
SHA18c3dbc8108ba0d2e36339286feea7d484550e48d
SHA256ef354f62f14cc9a691116807f73fab18a1ec3033c7dc415e701066b03d82e9fd
SHA5126b00faca670f989345da92ddd00580c2d637ffdb35258b799bbe43fd56fc74368ab9852d649823f73fd0809068a99ab8e9fc2f8a42e01f38026bedb52795865e