Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2024 10:47
Static task
static1
Behavioral task
behavioral1
Sample
bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe
-
Size
79KB
-
MD5
bd0802393b51f7b88fd1caf18cfb9d59
-
SHA1
dfca89f012d85280a32517e8541ce219dbc1cf84
-
SHA256
f42ee437ef9c0ca78a4cead554f84704b79b9092284db57923f5a480c3ac0065
-
SHA512
3c5ac1a277ace1e98052968f02a8e724327146c6b9c9aab73f6a594b43bc5a40f7200e6e15d69abd43a8b2db932c53ee7df44fd8ba42f7ab73685b93f900bb2d
-
SSDEEP
1536:GVodbBqHbWtYEmf7OuP6Bm4PERnDq/r/YFRwEdH8N2Ss/2kNSjAnJgzb:GVGNQrEmf7Rh4yYGSK8/sekNSjAJ
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Modifies firewall policy service 3 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Windows\SysWOW64\wmipsrt.exe = "C:\\Windows\\SysWOW64\\wmipsrt.exe:*:Enabled:Windows Live" wmipsrt.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List wmipsrt.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile wmipsrt.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications wmipsrt.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List\C:\Windows\SysWOW64\wmipsrt.exe = "C:\\Windows\\SysWOW64\\wmipsrt.exe:*:Enabled:Windows Live" wmipsrt.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List wmipsrt.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile wmipsrt.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications wmipsrt.exe -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" wmipsrt.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" wmipsrt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" wmipsrt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" wmipsrt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" wmipsrt.exe -
Disables use of System Restore points 1 TTPs
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts wmipsrt.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe\Debugger = "wmipsrt.exe" bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe wmipsrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe\Debugger = "wmipsrt.exe" wmipsrt.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 5032 wmipsrt.exe 3728 wmipsrt.exe -
Impair Defenses: Safe Mode Boot 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\ctfmon.exe = "ctfmon.exe" bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\ctfmon.exe = "ctfmon.exe" wmipsrt.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" wmipsrt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" wmipsrt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" wmipsrt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" wmipsrt.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ctfmon.exe = "ctfmon.exe" bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ctfmon.exe = "ctfmon.exe" wmipsrt.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmipsrt.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmipsrt.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\wmipsrt.exe wmipsrt.exe File created C:\Windows\SysWOW64\wmipsrt.exe wmipsrt.exe File created C:\Windows\SysWOW64\wmipsrt.exe bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wmipsrt.exe bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2588 set thread context of 3120 2588 bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe 83 PID 5032 set thread context of 3728 5032 wmipsrt.exe 89 -
Launches sc.exe 27 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3600 sc.exe 3120 sc.exe 32 sc.exe 4692 sc.exe 4536 sc.exe 3060 sc.exe 724 sc.exe 1044 sc.exe 2560 sc.exe 3352 sc.exe 2768 sc.exe 3464 sc.exe 4960 sc.exe 544 sc.exe 4976 sc.exe 3536 sc.exe 1504 sc.exe 4480 sc.exe 4828 sc.exe 3208 sc.exe 3280 sc.exe 1192 sc.exe 4112 sc.exe 1804 sc.exe 3372 sc.exe 3912 sc.exe 4320 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmipsrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe -
Gathers network information 2 TTPs 3 IoCs
Uses commandline utility to view network configuration.
pid Process 2660 ipconfig.exe 4068 ipconfig.exe 3968 ipconfig.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 3120 bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe 3120 bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe 3728 wmipsrt.exe 3728 wmipsrt.exe 3728 wmipsrt.exe 3728 wmipsrt.exe 3728 wmipsrt.exe 3728 wmipsrt.exe 3728 wmipsrt.exe 3728 wmipsrt.exe 3728 wmipsrt.exe 3728 wmipsrt.exe 3728 wmipsrt.exe 3728 wmipsrt.exe 3728 wmipsrt.exe 3728 wmipsrt.exe 3728 wmipsrt.exe 3728 wmipsrt.exe 3728 wmipsrt.exe 3728 wmipsrt.exe 3728 wmipsrt.exe 3728 wmipsrt.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3120 bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3728 wmipsrt.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2588 wrote to memory of 3120 2588 bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe 83 PID 2588 wrote to memory of 3120 2588 bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe 83 PID 2588 wrote to memory of 3120 2588 bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe 83 PID 2588 wrote to memory of 3120 2588 bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe 83 PID 2588 wrote to memory of 3120 2588 bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe 83 PID 3120 wrote to memory of 5032 3120 bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe 84 PID 3120 wrote to memory of 5032 3120 bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe 84 PID 3120 wrote to memory of 5032 3120 bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe 84 PID 3120 wrote to memory of 4952 3120 bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe 85 PID 3120 wrote to memory of 4952 3120 bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe 85 PID 3120 wrote to memory of 4952 3120 bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe 85 PID 3120 wrote to memory of 3704 3120 bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe 87 PID 3120 wrote to memory of 3704 3120 bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe 87 PID 3120 wrote to memory of 3704 3120 bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe 87 PID 5032 wrote to memory of 3728 5032 wmipsrt.exe 89 PID 5032 wrote to memory of 3728 5032 wmipsrt.exe 89 PID 5032 wrote to memory of 3728 5032 wmipsrt.exe 89 PID 5032 wrote to memory of 3728 5032 wmipsrt.exe 89 PID 5032 wrote to memory of 3728 5032 wmipsrt.exe 89 PID 3728 wrote to memory of 3484 3728 wmipsrt.exe 56 PID 3728 wrote to memory of 3484 3728 wmipsrt.exe 56 PID 3728 wrote to memory of 3864 3728 wmipsrt.exe 98 PID 3728 wrote to memory of 3864 3728 wmipsrt.exe 98 PID 3728 wrote to memory of 3864 3728 wmipsrt.exe 98 PID 3728 wrote to memory of 2520 3728 wmipsrt.exe 99 PID 3728 wrote to memory of 2520 3728 wmipsrt.exe 99 PID 3728 wrote to memory of 2520 3728 wmipsrt.exe 99 PID 3728 wrote to memory of 3244 3728 wmipsrt.exe 100 PID 3728 wrote to memory of 3244 3728 wmipsrt.exe 100 PID 3728 wrote to memory of 3244 3728 wmipsrt.exe 100 PID 2520 wrote to memory of 3464 2520 CMD.exe 105 PID 2520 wrote to memory of 3464 2520 CMD.exe 105 PID 2520 wrote to memory of 3464 2520 CMD.exe 105 PID 3864 wrote to memory of 2320 3864 CMD.exe 106 PID 3864 wrote to memory of 2320 3864 CMD.exe 106 PID 3864 wrote to memory of 2320 3864 CMD.exe 106 PID 3244 wrote to memory of 724 3244 CMD.exe 107 PID 3244 wrote to memory of 724 3244 CMD.exe 107 PID 3244 wrote to memory of 724 3244 CMD.exe 107 PID 2320 wrote to memory of 4292 2320 net.exe 108 PID 2320 wrote to memory of 4292 2320 net.exe 108 PID 2320 wrote to memory of 4292 2320 net.exe 108 PID 3728 wrote to memory of 2660 3728 wmipsrt.exe 109 PID 3728 wrote to memory of 2660 3728 wmipsrt.exe 109 PID 3728 wrote to memory of 2660 3728 wmipsrt.exe 109 PID 3728 wrote to memory of 4852 3728 wmipsrt.exe 111 PID 3728 wrote to memory of 4852 3728 wmipsrt.exe 111 PID 3728 wrote to memory of 4852 3728 wmipsrt.exe 111 PID 4852 wrote to memory of 544 4852 CMD.exe 113 PID 4852 wrote to memory of 544 4852 CMD.exe 113 PID 4852 wrote to memory of 544 4852 CMD.exe 113 PID 3728 wrote to memory of 3968 3728 wmipsrt.exe 114 PID 3728 wrote to memory of 3968 3728 wmipsrt.exe 114 PID 3728 wrote to memory of 3968 3728 wmipsrt.exe 114 PID 3728 wrote to memory of 4020 3728 wmipsrt.exe 115 PID 3728 wrote to memory of 4020 3728 wmipsrt.exe 115 PID 3728 wrote to memory of 4020 3728 wmipsrt.exe 115 PID 3728 wrote to memory of 4120 3728 wmipsrt.exe 116 PID 3728 wrote to memory of 4120 3728 wmipsrt.exe 116 PID 3728 wrote to memory of 4120 3728 wmipsrt.exe 116 PID 4020 wrote to memory of 4960 4020 CMD.exe 120 PID 4020 wrote to memory of 4960 4020 CMD.exe 120 PID 4020 wrote to memory of 4960 4020 CMD.exe 120 PID 3968 wrote to memory of 4484 3968 CMD.exe 121
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3484
-
C:\Users\Admin\AppData\Local\Temp\bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe"2⤵
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe3⤵
- Event Triggered Execution: Image File Execution Options Injection
- Checks computer location settings
- Impair Defenses: Safe Mode Boot
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Windows\SysWOW64\wmipsrt.exe"C:\Windows\system32\wmipsrt.exe"4⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Windows\SysWOW64\wmipsrt.exeC:\Windows\SysWOW64\wmipsrt.exe5⤵
- Modifies firewall policy service
- Modifies security service
- Windows security bypass
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Impair Defenses: Safe Mode Boot
- Windows security modification
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Windows\SysWOW64\CMD.exeCMD /C net stop "avast! Antivirus"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3864 -
C:\Windows\SysWOW64\net.exenet stop "avast! Antivirus"7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "avast! Antivirus"8⤵
- System Location Discovery: System Language Discovery
PID:4292
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc stop "avast! Antivirus"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\sc.exesc stop "avast! Antivirus"7⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3464
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc config "avast! Antivirus" start= disabled6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Windows\SysWOW64\sc.exesc config "avast! Antivirus" start= disabled7⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:724
-
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns6⤵
- Gathers network information
PID:2660
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc delete "avast! Antivirus"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Windows\SysWOW64\sc.exesc delete "avast! Antivirus"7⤵
- Launches sc.exe
PID:544
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C net stop AntiVirService6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Windows\SysWOW64\net.exenet stop AntiVirService7⤵PID:4484
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop AntiVirService8⤵
- System Location Discovery: System Language Discovery
PID:2012
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc stop AntiVirService6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Windows\SysWOW64\sc.exesc stop AntiVirService7⤵
- Launches sc.exe
PID:4960
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc config AntiVirService start= disabled6⤵
- System Location Discovery: System Language Discovery
PID:4120 -
C:\Windows\SysWOW64\sc.exesc config AntiVirService start= disabled7⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1804
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc delete AntiVirService6⤵
- System Location Discovery: System Language Discovery
PID:4116 -
C:\Windows\SysWOW64\sc.exesc delete AntiVirService7⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3600
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C net stop PASRV6⤵
- System Location Discovery: System Language Discovery
PID:3288 -
C:\Windows\SysWOW64\net.exenet stop PASRV7⤵
- System Location Discovery: System Language Discovery
PID:5052 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop PASRV8⤵PID:3704
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc stop PASRV6⤵PID:1372
-
C:\Windows\SysWOW64\sc.exesc stop PASRV7⤵
- Launches sc.exe
PID:3120
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc config PASRV start= disabled6⤵
- System Location Discovery: System Language Discovery
PID:3532 -
C:\Windows\SysWOW64\sc.exesc config PASRV start= disabled7⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3536
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc delete PASRV6⤵
- System Location Discovery: System Language Discovery
PID:4860 -
C:\Windows\SysWOW64\sc.exesc delete PASRV7⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1504
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C net stop VSSERV6⤵
- System Location Discovery: System Language Discovery
PID:5100 -
C:\Windows\SysWOW64\net.exenet stop VSSERV7⤵
- System Location Discovery: System Language Discovery
PID:1128 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VSSERV8⤵PID:4904
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc stop VSSERV6⤵PID:3172
-
C:\Windows\SysWOW64\sc.exesc stop VSSERV7⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:32
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc config VSSERV start= disabled6⤵PID:1604
-
C:\Windows\SysWOW64\sc.exesc config VSSERV start= disabled7⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4692
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc delete VSSERV6⤵
- System Location Discovery: System Language Discovery
PID:4060 -
C:\Windows\SysWOW64\sc.exesc delete VSSERV7⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2768
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C net stop avg8wd6⤵
- System Location Discovery: System Language Discovery
PID:2984 -
C:\Windows\SysWOW64\net.exenet stop avg8wd7⤵
- System Location Discovery: System Language Discovery
PID:4024 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop avg8wd8⤵
- System Location Discovery: System Language Discovery
PID:1140
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc stop avg8wd6⤵
- System Location Discovery: System Language Discovery
PID:3624 -
C:\Windows\SysWOW64\sc.exesc stop avg8wd7⤵
- Launches sc.exe
PID:3280
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc config avg8wd start= disabled6⤵PID:3468
-
C:\Windows\SysWOW64\sc.exesc config avg8wd start= disabled7⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4536
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc delete avg8wd6⤵
- System Location Discovery: System Language Discovery
PID:3008 -
C:\Windows\SysWOW64\sc.exesc delete avg8wd7⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1192
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C net stop NOD32krn6⤵
- System Location Discovery: System Language Discovery
PID:2776 -
C:\Windows\SysWOW64\net.exenet stop NOD32krn7⤵PID:1936
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop NOD32krn8⤵
- System Location Discovery: System Language Discovery
PID:2096
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc stop NOD32krn6⤵
- System Location Discovery: System Language Discovery
PID:388 -
C:\Windows\SysWOW64\sc.exesc stop NOD32krn7⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4320
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc config NOD32krn start= disabled6⤵
- System Location Discovery: System Language Discovery
PID:2628 -
C:\Windows\SysWOW64\sc.exesc config NOD32krn start= disabled7⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3352
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc delete NOD32krn6⤵PID:2860
-
C:\Windows\SysWOW64\sc.exesc delete NOD32krn7⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4480
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C net stop SbPF.Launcher6⤵
- System Location Discovery: System Language Discovery
PID:3348 -
C:\Windows\SysWOW64\net.exenet stop SbPF.Launcher7⤵PID:2668
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SbPF.Launcher8⤵
- System Location Discovery: System Language Discovery
PID:836
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc stop SbPF.Launcher6⤵
- System Location Discovery: System Language Discovery
PID:3320 -
C:\Windows\SysWOW64\sc.exesc stop SbPF.Launcher7⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1044
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc config SbPF.Launcher start= disabled6⤵
- System Location Discovery: System Language Discovery
PID:2256 -
C:\Windows\SysWOW64\sc.exesc config SbPF.Launcher start= disabled7⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3060
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc delete SbPF.Launcher6⤵
- System Location Discovery: System Language Discovery
PID:4284 -
C:\Windows\SysWOW64\sc.exesc delete SbPF.Launcher7⤵
- Launches sc.exe
PID:4828
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C net stop SPF46⤵
- System Location Discovery: System Language Discovery
PID:4036 -
C:\Windows\SysWOW64\net.exenet stop SPF47⤵
- System Location Discovery: System Language Discovery
PID:4048 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SPF48⤵PID:3380
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc stop SPF46⤵
- System Location Discovery: System Language Discovery
PID:4208 -
C:\Windows\SysWOW64\sc.exesc stop SPF47⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4112
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc config SPF4 start= disabled6⤵PID:3652
-
C:\Windows\SysWOW64\sc.exesc config SPF4 start= disabled7⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3208
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc delete SPF46⤵
- System Location Discovery: System Language Discovery
PID:4424 -
C:\Windows\SysWOW64\sc.exesc delete SPF47⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2560
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C net stop acssrv6⤵PID:1836
-
C:\Windows\SysWOW64\net.exenet stop acssrv7⤵
- System Location Discovery: System Language Discovery
PID:1548 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop acssrv8⤵PID:3552
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc stop acssrv6⤵
- System Location Discovery: System Language Discovery
PID:3172 -
C:\Windows\SysWOW64\sc.exesc stop acssrv7⤵
- Launches sc.exe
PID:4976
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc config acssrv start= disabled6⤵
- System Location Discovery: System Language Discovery
PID:2896 -
C:\Windows\SysWOW64\sc.exesc config acssrv start= disabled7⤵
- Launches sc.exe
PID:3372
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C sc delete acssrv6⤵PID:4400
-
C:\Windows\SysWOW64\sc.exesc delete acssrv7⤵
- Launches sc.exe
PID:3912
-
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns6⤵
- Gathers network information
PID:4068
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns6⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:3968
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip4⤵PID:4952
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\BD0802~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:3704
-
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Event Triggered Execution
1Image File Execution Options Injection
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Event Triggered Execution
1Image File Execution Options Injection
1Defense Evasion
Impair Defenses
5Disable or Modify System Firewall
1Disable or Modify Tools
2Safe Mode Boot
1Indicator Removal
1File Deletion
1Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
79KB
MD5bd0802393b51f7b88fd1caf18cfb9d59
SHA1dfca89f012d85280a32517e8541ce219dbc1cf84
SHA256f42ee437ef9c0ca78a4cead554f84704b79b9092284db57923f5a480c3ac0065
SHA5123c5ac1a277ace1e98052968f02a8e724327146c6b9c9aab73f6a594b43bc5a40f7200e6e15d69abd43a8b2db932c53ee7df44fd8ba42f7ab73685b93f900bb2d
-
Filesize
15KB
MD596d179abc939ae4cc8f6d61cb8b6fe6d
SHA1004f2c2f14a8d1bf66a0bf3d3e71e23b68dd5b7a
SHA256aa2d65cfa18eac8f7f1a22ddc6b06eed4b5b6acf4de8313a3847d4c036295194
SHA512434c54224c43710e44f700f76fcb4935216daac882cdab72d1e078e5b86f1f99342ad6d2b6aefa645277aa2fb7b06ee9c1c2f1d82b833b8517c1d5427dc78719