Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-12-2024 10:47
Static task
static1
Behavioral task
behavioral1
Sample
bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe
-
Size
79KB
-
MD5
bd0802393b51f7b88fd1caf18cfb9d59
-
SHA1
dfca89f012d85280a32517e8541ce219dbc1cf84
-
SHA256
f42ee437ef9c0ca78a4cead554f84704b79b9092284db57923f5a480c3ac0065
-
SHA512
3c5ac1a277ace1e98052968f02a8e724327146c6b9c9aab73f6a594b43bc5a40f7200e6e15d69abd43a8b2db932c53ee7df44fd8ba42f7ab73685b93f900bb2d
-
SSDEEP
1536:GVodbBqHbWtYEmf7OuP6Bm4PERnDq/r/YFRwEdH8N2Ss/2kNSjAnJgzb:GVGNQrEmf7Rh4yYGSK8/sekNSjAJ
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Modifies firewall policy service 3 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List wmipsrt.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Windows\SysWOW64\wmipsrt.exe = "C:\\Windows\\SysWOW64\\wmipsrt.exe:*:Enabled:Windows Live" wmipsrt.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List wmipsrt.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List\C:\Windows\SysWOW64\wmipsrt.exe = "C:\\Windows\\SysWOW64\\wmipsrt.exe:*:Enabled:Windows Live" wmipsrt.exe -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" wmipsrt.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" wmipsrt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" wmipsrt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" wmipsrt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" wmipsrt.exe -
Disables use of System Restore points 1 TTPs
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts wmipsrt.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe\Debugger = "wmipsrt.exe" bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe wmipsrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe\Debugger = "wmipsrt.exe" wmipsrt.exe -
Executes dropped EXE 2 IoCs
pid Process 2128 wmipsrt.exe 2988 wmipsrt.exe -
Impair Defenses: Safe Mode Boot 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\ctfmon.exe = "ctfmon.exe" bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\ctfmon.exe = "ctfmon.exe" wmipsrt.exe -
Loads dropped DLL 2 IoCs
pid Process 2416 bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe 2416 bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" wmipsrt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" wmipsrt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" wmipsrt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" wmipsrt.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ctfmon.exe = "ctfmon.exe" bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ctfmon.exe = "ctfmon.exe" wmipsrt.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsrt.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmipsrt.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\wmipsrt.exe bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wmipsrt.exe wmipsrt.exe File created C:\Windows\SysWOW64\wmipsrt.exe wmipsrt.exe File created C:\Windows\SysWOW64\wmipsrt.exe bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1984 set thread context of 2416 1984 bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe 30 PID 2128 set thread context of 2988 2128 wmipsrt.exe 36 -
Launches sc.exe 27 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3044 sc.exe 1532 sc.exe 2292 sc.exe 2180 sc.exe 2012 sc.exe 2664 sc.exe 1980 sc.exe 1608 sc.exe 1348 sc.exe 2288 sc.exe 1064 sc.exe 916 sc.exe 1700 sc.exe 316 sc.exe 2492 sc.exe 568 sc.exe 3036 sc.exe 2720 sc.exe 2756 sc.exe 1716 sc.exe 2628 sc.exe 2252 sc.exe 1584 sc.exe 1752 sc.exe 848 sc.exe 2396 sc.exe 1284 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe -
Gathers network information 2 TTPs 3 IoCs
Uses commandline utility to view network configuration.
pid Process 1040 ipconfig.exe 2604 ipconfig.exe 2940 ipconfig.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 2416 bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe 2988 wmipsrt.exe 2988 wmipsrt.exe 2988 wmipsrt.exe 2988 wmipsrt.exe 2988 wmipsrt.exe 2988 wmipsrt.exe 2988 wmipsrt.exe 2988 wmipsrt.exe 2988 wmipsrt.exe 2988 wmipsrt.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2416 bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2988 wmipsrt.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1984 wrote to memory of 2416 1984 bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe 30 PID 1984 wrote to memory of 2416 1984 bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe 30 PID 1984 wrote to memory of 2416 1984 bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe 30 PID 1984 wrote to memory of 2416 1984 bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe 30 PID 1984 wrote to memory of 2416 1984 bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe 30 PID 1984 wrote to memory of 2416 1984 bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe 30 PID 2416 wrote to memory of 2128 2416 bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe 31 PID 2416 wrote to memory of 2128 2416 bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe 31 PID 2416 wrote to memory of 2128 2416 bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe 31 PID 2416 wrote to memory of 2128 2416 bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe 31 PID 2416 wrote to memory of 2328 2416 bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe 32 PID 2416 wrote to memory of 2328 2416 bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe 32 PID 2416 wrote to memory of 2328 2416 bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe 32 PID 2416 wrote to memory of 2328 2416 bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe 32 PID 2416 wrote to memory of 2748 2416 bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe 34 PID 2416 wrote to memory of 2748 2416 bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe 34 PID 2416 wrote to memory of 2748 2416 bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe 34 PID 2416 wrote to memory of 2748 2416 bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe 34 PID 2128 wrote to memory of 2988 2128 wmipsrt.exe 36 PID 2128 wrote to memory of 2988 2128 wmipsrt.exe 36 PID 2128 wrote to memory of 2988 2128 wmipsrt.exe 36 PID 2128 wrote to memory of 2988 2128 wmipsrt.exe 36 PID 2128 wrote to memory of 2988 2128 wmipsrt.exe 36 PID 2128 wrote to memory of 2988 2128 wmipsrt.exe 36 PID 2988 wrote to memory of 1192 2988 wmipsrt.exe 21 PID 2988 wrote to memory of 1192 2988 wmipsrt.exe 21 PID 2988 wrote to memory of 2636 2988 wmipsrt.exe 38 PID 2988 wrote to memory of 2636 2988 wmipsrt.exe 38 PID 2988 wrote to memory of 2636 2988 wmipsrt.exe 38 PID 2988 wrote to memory of 2636 2988 wmipsrt.exe 38 PID 2988 wrote to memory of 2656 2988 wmipsrt.exe 39 PID 2988 wrote to memory of 2656 2988 wmipsrt.exe 39 PID 2988 wrote to memory of 2656 2988 wmipsrt.exe 39 PID 2988 wrote to memory of 2656 2988 wmipsrt.exe 39 PID 2988 wrote to memory of 2680 2988 wmipsrt.exe 40 PID 2988 wrote to memory of 2680 2988 wmipsrt.exe 40 PID 2988 wrote to memory of 2680 2988 wmipsrt.exe 40 PID 2988 wrote to memory of 2680 2988 wmipsrt.exe 40 PID 2636 wrote to memory of 2620 2636 CMD.exe 44 PID 2636 wrote to memory of 2620 2636 CMD.exe 44 PID 2636 wrote to memory of 2620 2636 CMD.exe 44 PID 2636 wrote to memory of 2620 2636 CMD.exe 44 PID 2656 wrote to memory of 2180 2656 CMD.exe 45 PID 2656 wrote to memory of 2180 2656 CMD.exe 45 PID 2656 wrote to memory of 2180 2656 CMD.exe 45 PID 2656 wrote to memory of 2180 2656 CMD.exe 45 PID 2680 wrote to memory of 1608 2680 CMD.exe 46 PID 2680 wrote to memory of 1608 2680 CMD.exe 46 PID 2680 wrote to memory of 1608 2680 CMD.exe 46 PID 2680 wrote to memory of 1608 2680 CMD.exe 46 PID 2620 wrote to memory of 476 2620 net.exe 47 PID 2620 wrote to memory of 476 2620 net.exe 47 PID 2620 wrote to memory of 476 2620 net.exe 47 PID 2620 wrote to memory of 476 2620 net.exe 47 PID 2988 wrote to memory of 1040 2988 wmipsrt.exe 48 PID 2988 wrote to memory of 1040 2988 wmipsrt.exe 48 PID 2988 wrote to memory of 1040 2988 wmipsrt.exe 48 PID 2988 wrote to memory of 1040 2988 wmipsrt.exe 48 PID 2988 wrote to memory of 536 2988 wmipsrt.exe 50 PID 2988 wrote to memory of 536 2988 wmipsrt.exe 50 PID 2988 wrote to memory of 536 2988 wmipsrt.exe 50 PID 2988 wrote to memory of 536 2988 wmipsrt.exe 50 PID 536 wrote to memory of 1716 536 CMD.exe 52 PID 536 wrote to memory of 1716 536 CMD.exe 52
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe"2⤵
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe3⤵
- Event Triggered Execution: Image File Execution Options Injection
- Impair Defenses: Safe Mode Boot
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\SysWOW64\wmipsrt.exe"C:\Windows\system32\wmipsrt.exe"4⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\SysWOW64\wmipsrt.exeC:\Windows\SysWOW64\wmipsrt.exe5⤵
- Modifies firewall policy service
- Modifies security service
- Windows security bypass
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Impair Defenses: Safe Mode Boot
- Windows security modification
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\CMD.exeCMD /C net stop "avast! Antivirus"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\net.exenet stop "avast! Antivirus"7⤵
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "avast! Antivirus"8⤵
- System Location Discovery: System Language Discovery
PID:476
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc stop "avast! Antivirus"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\sc.exesc stop "avast! Antivirus"7⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2180
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc config "avast! Antivirus" start= disabled6⤵
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\sc.exesc config "avast! Antivirus" start= disabled7⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1608
-
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns6⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:1040
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc delete "avast! Antivirus"6⤵
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Windows\SysWOW64\sc.exesc delete "avast! Antivirus"7⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1716
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C net stop AntiVirService6⤵
- System Location Discovery: System Language Discovery
PID:1152 -
C:\Windows\SysWOW64\net.exenet stop AntiVirService7⤵
- System Location Discovery: System Language Discovery
PID:2592 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop AntiVirService8⤵
- System Location Discovery: System Language Discovery
PID:1312
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc stop AntiVirService6⤵PID:1164
-
C:\Windows\SysWOW64\sc.exesc stop AntiVirService7⤵
- Launches sc.exe
PID:2012
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc config AntiVirService start= disabled6⤵
- System Location Discovery: System Language Discovery
PID:1512 -
C:\Windows\SysWOW64\sc.exesc config AntiVirService start= disabled7⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2664
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc delete AntiVirService6⤵
- System Location Discovery: System Language Discovery
PID:2572 -
C:\Windows\SysWOW64\sc.exesc delete AntiVirService7⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:316
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C net stop PASRV6⤵
- System Location Discovery: System Language Discovery
PID:1748 -
C:\Windows\SysWOW64\net.exenet stop PASRV7⤵PID:2932
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop PASRV8⤵
- System Location Discovery: System Language Discovery
PID:2060
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc stop PASRV6⤵
- System Location Discovery: System Language Discovery
PID:1668 -
C:\Windows\SysWOW64\sc.exesc stop PASRV7⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2492
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc config PASRV start= disabled6⤵
- System Location Discovery: System Language Discovery
PID:1688 -
C:\Windows\SysWOW64\sc.exesc config PASRV start= disabled7⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:568
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc delete PASRV6⤵PID:2024
-
C:\Windows\SysWOW64\sc.exesc delete PASRV7⤵
- Launches sc.exe
PID:2396
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C net stop VSSERV6⤵
- System Location Discovery: System Language Discovery
PID:2356 -
C:\Windows\SysWOW64\net.exenet stop VSSERV7⤵
- System Location Discovery: System Language Discovery
PID:1020 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VSSERV8⤵
- System Location Discovery: System Language Discovery
PID:448
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc stop VSSERV6⤵
- System Location Discovery: System Language Discovery
PID:1800 -
C:\Windows\SysWOW64\sc.exesc stop VSSERV7⤵
- Launches sc.exe
PID:3044
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc config VSSERV start= disabled6⤵
- System Location Discovery: System Language Discovery
PID:2264 -
C:\Windows\SysWOW64\sc.exesc config VSSERV start= disabled7⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1348
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc delete VSSERV6⤵PID:2588
-
C:\Windows\SysWOW64\sc.exesc delete VSSERV7⤵
- Launches sc.exe
PID:1532
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C net stop avg8wd6⤵
- System Location Discovery: System Language Discovery
PID:2008 -
C:\Windows\SysWOW64\net.exenet stop avg8wd7⤵
- System Location Discovery: System Language Discovery
PID:1828 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop avg8wd8⤵PID:2576
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc stop avg8wd6⤵
- System Location Discovery: System Language Discovery
PID:1360 -
C:\Windows\SysWOW64\sc.exesc stop avg8wd7⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1064
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc config avg8wd start= disabled6⤵
- System Location Discovery: System Language Discovery
PID:1596 -
C:\Windows\SysWOW64\sc.exesc config avg8wd start= disabled7⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:916
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc delete avg8wd6⤵
- System Location Discovery: System Language Discovery
PID:2800 -
C:\Windows\SysWOW64\sc.exesc delete avg8wd7⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2288
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C net stop NOD32krn6⤵
- System Location Discovery: System Language Discovery
PID:1784 -
C:\Windows\SysWOW64\net.exenet stop NOD32krn7⤵
- System Location Discovery: System Language Discovery
PID:2548 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop NOD32krn8⤵PID:2184
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc stop NOD32krn6⤵
- System Location Discovery: System Language Discovery
PID:908 -
C:\Windows\SysWOW64\sc.exesc stop NOD32krn7⤵
- Launches sc.exe
PID:2252
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc config NOD32krn start= disabled6⤵PID:924
-
C:\Windows\SysWOW64\sc.exesc config NOD32krn start= disabled7⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2292
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc delete NOD32krn6⤵
- System Location Discovery: System Language Discovery
PID:1936 -
C:\Windows\SysWOW64\sc.exesc delete NOD32krn7⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1700
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C net stop SbPF.Launcher6⤵
- System Location Discovery: System Language Discovery
PID:1832 -
C:\Windows\SysWOW64\net.exenet stop SbPF.Launcher7⤵
- System Location Discovery: System Language Discovery
PID:1068 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SbPF.Launcher8⤵PID:2340
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc stop SbPF.Launcher6⤵
- System Location Discovery: System Language Discovery
PID:2440 -
C:\Windows\SysWOW64\sc.exesc stop SbPF.Launcher7⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1980
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc config SbPF.Launcher start= disabled6⤵
- System Location Discovery: System Language Discovery
PID:1792 -
C:\Windows\SysWOW64\sc.exesc config SbPF.Launcher start= disabled7⤵
- Launches sc.exe
PID:1752
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc delete SbPF.Launcher6⤵
- System Location Discovery: System Language Discovery
PID:2404 -
C:\Windows\SysWOW64\sc.exesc delete SbPF.Launcher7⤵
- Launches sc.exe
PID:1584
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C net stop SPF46⤵
- System Location Discovery: System Language Discovery
PID:1692 -
C:\Windows\SysWOW64\net.exenet stop SPF47⤵
- System Location Discovery: System Language Discovery
PID:2120 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SPF48⤵
- System Location Discovery: System Language Discovery
PID:2696
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc stop SPF46⤵
- System Location Discovery: System Language Discovery
PID:2160 -
C:\Windows\SysWOW64\sc.exesc stop SPF47⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:848
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc config SPF4 start= disabled6⤵PID:2388
-
C:\Windows\SysWOW64\sc.exesc config SPF4 start= disabled7⤵
- Launches sc.exe
PID:1284
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc delete SPF46⤵
- System Location Discovery: System Language Discovery
PID:1648 -
C:\Windows\SysWOW64\sc.exesc delete SPF47⤵
- Launches sc.exe
PID:3036
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C net stop acssrv6⤵
- System Location Discovery: System Language Discovery
PID:2256 -
C:\Windows\SysWOW64\net.exenet stop acssrv7⤵PID:2260
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop acssrv8⤵PID:888
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc stop acssrv6⤵PID:2748
-
C:\Windows\SysWOW64\sc.exesc stop acssrv7⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2720
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc config acssrv start= disabled6⤵
- System Location Discovery: System Language Discovery
PID:2832 -
C:\Windows\SysWOW64\sc.exesc config acssrv start= disabled7⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2756
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc delete acssrv6⤵
- System Location Discovery: System Language Discovery
PID:2768 -
C:\Windows\SysWOW64\sc.exesc delete acssrv7⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2628
-
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns6⤵
- Gathers network information
PID:2604
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns6⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:2940
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip4⤵PID:2328
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\BD0802~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:2748
-
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Event Triggered Execution
1Image File Execution Options Injection
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Event Triggered Execution
1Image File Execution Options Injection
1Defense Evasion
Impair Defenses
5Disable or Modify System Firewall
1Disable or Modify Tools
2Safe Mode Boot
1Indicator Removal
1File Deletion
1Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD596d179abc939ae4cc8f6d61cb8b6fe6d
SHA1004f2c2f14a8d1bf66a0bf3d3e71e23b68dd5b7a
SHA256aa2d65cfa18eac8f7f1a22ddc6b06eed4b5b6acf4de8313a3847d4c036295194
SHA512434c54224c43710e44f700f76fcb4935216daac882cdab72d1e078e5b86f1f99342ad6d2b6aefa645277aa2fb7b06ee9c1c2f1d82b833b8517c1d5427dc78719
-
Filesize
79KB
MD5bd0802393b51f7b88fd1caf18cfb9d59
SHA1dfca89f012d85280a32517e8541ce219dbc1cf84
SHA256f42ee437ef9c0ca78a4cead554f84704b79b9092284db57923f5a480c3ac0065
SHA5123c5ac1a277ace1e98052968f02a8e724327146c6b9c9aab73f6a594b43bc5a40f7200e6e15d69abd43a8b2db932c53ee7df44fd8ba42f7ab73685b93f900bb2d