Analysis
-
max time kernel
148s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2024, 22:07
Static task
static1
Behavioral task
behavioral1
Sample
c994ac23ee21564133994e6e24b67168_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c994ac23ee21564133994e6e24b67168_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
c994ac23ee21564133994e6e24b67168_JaffaCakes118.exe
-
Size
211KB
-
MD5
c994ac23ee21564133994e6e24b67168
-
SHA1
0e2c55e9d19a881cfe54e25c49724f7df017f4bd
-
SHA256
df6c94557ffa0d77f81d7212bdd4a5f02a58b4f2ab3c86f71776c823a7e2da7b
-
SHA512
b3475dbf224673eb406842503e1c366f642f22be10bb7de86eb58669ee83a8388ab410ad2f316849f8daa44895aef444a5783dfa49ef315e7b4ca2f6716cb1c8
-
SSDEEP
3072:1A+mAWeJiRJDr5u1wvEvUPjP+Hcp5MNJRrtTl5w1yNgMOFESB5rWepnwz40LNdl:1XWNEvUq8p5aFNNnOzB1WYcvnl
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Checks computer location settings 2 TTPs 14 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation tasksv32.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation tasksv32.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation tasksv32.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation c994ac23ee21564133994e6e24b67168_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation tasksv32.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation tasksv32.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation tasksv32.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation tasksv32.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation tasksv32.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation tasksv32.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation tasksv32.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation tasksv32.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation tasksv32.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation tasksv32.exe -
Deletes itself 1 IoCs
pid Process 372 tasksv32.exe -
Executes dropped EXE 27 IoCs
pid Process 3964 tasksv32.exe 372 tasksv32.exe 4036 tasksv32.exe 4340 tasksv32.exe 4604 tasksv32.exe 2340 tasksv32.exe 1304 tasksv32.exe 1724 tasksv32.exe 3948 tasksv32.exe 2996 tasksv32.exe 2536 tasksv32.exe 2468 tasksv32.exe 1608 tasksv32.exe 3908 tasksv32.exe 4584 tasksv32.exe 2356 tasksv32.exe 1496 tasksv32.exe 2756 tasksv32.exe 1828 tasksv32.exe 2608 tasksv32.exe 3116 tasksv32.exe 4060 tasksv32.exe 4260 tasksv32.exe 3640 tasksv32.exe 2748 tasksv32.exe 3040 tasksv32.exe 1484 tasksv32.exe -
Maps connected drives based on registry 3 TTPs 28 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum tasksv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 tasksv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 tasksv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 tasksv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 tasksv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 tasksv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum tasksv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum tasksv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 tasksv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum tasksv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum tasksv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum tasksv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 tasksv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 c994ac23ee21564133994e6e24b67168_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum tasksv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum tasksv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum tasksv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 tasksv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 tasksv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 tasksv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum tasksv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 tasksv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum c994ac23ee21564133994e6e24b67168_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum tasksv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 tasksv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum tasksv32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 tasksv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum tasksv32.exe -
Drops file in System32 directory 42 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ tasksv32.exe File created C:\Windows\SysWOW64\tasksv32.exe tasksv32.exe File opened for modification C:\Windows\SysWOW64\tasksv32.exe tasksv32.exe File opened for modification C:\Windows\SysWOW64\tasksv32.exe tasksv32.exe File opened for modification C:\Windows\SysWOW64\ tasksv32.exe File opened for modification C:\Windows\SysWOW64\ c994ac23ee21564133994e6e24b67168_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ tasksv32.exe File opened for modification C:\Windows\SysWOW64\tasksv32.exe tasksv32.exe File opened for modification C:\Windows\SysWOW64\tasksv32.exe tasksv32.exe File opened for modification C:\Windows\SysWOW64\tasksv32.exe tasksv32.exe File created C:\Windows\SysWOW64\tasksv32.exe tasksv32.exe File opened for modification C:\Windows\SysWOW64\ tasksv32.exe File created C:\Windows\SysWOW64\tasksv32.exe tasksv32.exe File created C:\Windows\SysWOW64\tasksv32.exe c994ac23ee21564133994e6e24b67168_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\tasksv32.exe tasksv32.exe File opened for modification C:\Windows\SysWOW64\ tasksv32.exe File created C:\Windows\SysWOW64\tasksv32.exe tasksv32.exe File created C:\Windows\SysWOW64\tasksv32.exe tasksv32.exe File opened for modification C:\Windows\SysWOW64\ tasksv32.exe File opened for modification C:\Windows\SysWOW64\tasksv32.exe tasksv32.exe File opened for modification C:\Windows\SysWOW64\ tasksv32.exe File created C:\Windows\SysWOW64\tasksv32.exe tasksv32.exe File opened for modification C:\Windows\SysWOW64\ tasksv32.exe File created C:\Windows\SysWOW64\tasksv32.exe tasksv32.exe File opened for modification C:\Windows\SysWOW64\ tasksv32.exe File opened for modification C:\Windows\SysWOW64\tasksv32.exe tasksv32.exe File opened for modification C:\Windows\SysWOW64\ tasksv32.exe File opened for modification C:\Windows\SysWOW64\tasksv32.exe tasksv32.exe File created C:\Windows\SysWOW64\tasksv32.exe tasksv32.exe File created C:\Windows\SysWOW64\tasksv32.exe tasksv32.exe File opened for modification C:\Windows\SysWOW64\tasksv32.exe tasksv32.exe File opened for modification C:\Windows\SysWOW64\tasksv32.exe tasksv32.exe File opened for modification C:\Windows\SysWOW64\tasksv32.exe c994ac23ee21564133994e6e24b67168_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\tasksv32.exe tasksv32.exe File created C:\Windows\SysWOW64\tasksv32.exe tasksv32.exe File created C:\Windows\SysWOW64\tasksv32.exe tasksv32.exe File opened for modification C:\Windows\SysWOW64\tasksv32.exe tasksv32.exe File opened for modification C:\Windows\SysWOW64\ tasksv32.exe File created C:\Windows\SysWOW64\tasksv32.exe tasksv32.exe File created C:\Windows\SysWOW64\tasksv32.exe tasksv32.exe File opened for modification C:\Windows\SysWOW64\ tasksv32.exe File opened for modification C:\Windows\SysWOW64\ tasksv32.exe -
Suspicious use of SetThreadContext 14 IoCs
description pid Process procid_target PID 1344 set thread context of 1048 1344 c994ac23ee21564133994e6e24b67168_JaffaCakes118.exe 90 PID 3964 set thread context of 372 3964 tasksv32.exe 98 PID 4036 set thread context of 4340 4036 tasksv32.exe 102 PID 4604 set thread context of 2340 4604 tasksv32.exe 105 PID 1304 set thread context of 1724 1304 tasksv32.exe 107 PID 3948 set thread context of 2996 3948 tasksv32.exe 109 PID 2536 set thread context of 2468 2536 tasksv32.exe 111 PID 1608 set thread context of 3908 1608 tasksv32.exe 113 PID 4584 set thread context of 2356 4584 tasksv32.exe 115 PID 1496 set thread context of 2756 1496 tasksv32.exe 117 PID 1828 set thread context of 2608 1828 tasksv32.exe 119 PID 3116 set thread context of 4060 3116 tasksv32.exe 121 PID 4260 set thread context of 3640 4260 tasksv32.exe 123 PID 2748 set thread context of 3040 2748 tasksv32.exe 125 -
resource yara_rule behavioral2/memory/1048-1-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1048-4-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1048-5-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1048-6-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1048-40-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/372-46-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/372-47-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/372-48-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/372-50-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4340-59-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2340-69-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1724-78-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2996-87-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2468-95-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3908-104-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2356-113-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2756-122-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2608-131-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4060-140-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3640-152-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3040-161-0x0000000000400000-0x0000000000466000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 28 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasksv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasksv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasksv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasksv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c994ac23ee21564133994e6e24b67168_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasksv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasksv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasksv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasksv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasksv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasksv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasksv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasksv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasksv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasksv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasksv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasksv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasksv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasksv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasksv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasksv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasksv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasksv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasksv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasksv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasksv32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c994ac23ee21564133994e6e24b67168_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasksv32.exe -
Modifies registry class 14 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ tasksv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ tasksv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ tasksv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ tasksv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ c994ac23ee21564133994e6e24b67168_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ tasksv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ tasksv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ tasksv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ tasksv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ tasksv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ tasksv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ tasksv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ tasksv32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ tasksv32.exe -
Suspicious behavior: EnumeratesProcesses 56 IoCs
pid Process 1048 c994ac23ee21564133994e6e24b67168_JaffaCakes118.exe 1048 c994ac23ee21564133994e6e24b67168_JaffaCakes118.exe 1048 c994ac23ee21564133994e6e24b67168_JaffaCakes118.exe 1048 c994ac23ee21564133994e6e24b67168_JaffaCakes118.exe 372 tasksv32.exe 372 tasksv32.exe 372 tasksv32.exe 372 tasksv32.exe 4340 tasksv32.exe 4340 tasksv32.exe 4340 tasksv32.exe 4340 tasksv32.exe 2340 tasksv32.exe 2340 tasksv32.exe 2340 tasksv32.exe 2340 tasksv32.exe 1724 tasksv32.exe 1724 tasksv32.exe 1724 tasksv32.exe 1724 tasksv32.exe 2996 tasksv32.exe 2996 tasksv32.exe 2996 tasksv32.exe 2996 tasksv32.exe 2468 tasksv32.exe 2468 tasksv32.exe 2468 tasksv32.exe 2468 tasksv32.exe 3908 tasksv32.exe 3908 tasksv32.exe 3908 tasksv32.exe 3908 tasksv32.exe 2356 tasksv32.exe 2356 tasksv32.exe 2356 tasksv32.exe 2356 tasksv32.exe 2756 tasksv32.exe 2756 tasksv32.exe 2756 tasksv32.exe 2756 tasksv32.exe 2608 tasksv32.exe 2608 tasksv32.exe 2608 tasksv32.exe 2608 tasksv32.exe 4060 tasksv32.exe 4060 tasksv32.exe 4060 tasksv32.exe 4060 tasksv32.exe 3640 tasksv32.exe 3640 tasksv32.exe 3640 tasksv32.exe 3640 tasksv32.exe 3040 tasksv32.exe 3040 tasksv32.exe 3040 tasksv32.exe 3040 tasksv32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1344 wrote to memory of 1048 1344 c994ac23ee21564133994e6e24b67168_JaffaCakes118.exe 90 PID 1344 wrote to memory of 1048 1344 c994ac23ee21564133994e6e24b67168_JaffaCakes118.exe 90 PID 1344 wrote to memory of 1048 1344 c994ac23ee21564133994e6e24b67168_JaffaCakes118.exe 90 PID 1344 wrote to memory of 1048 1344 c994ac23ee21564133994e6e24b67168_JaffaCakes118.exe 90 PID 1344 wrote to memory of 1048 1344 c994ac23ee21564133994e6e24b67168_JaffaCakes118.exe 90 PID 1344 wrote to memory of 1048 1344 c994ac23ee21564133994e6e24b67168_JaffaCakes118.exe 90 PID 1344 wrote to memory of 1048 1344 c994ac23ee21564133994e6e24b67168_JaffaCakes118.exe 90 PID 1048 wrote to memory of 3964 1048 c994ac23ee21564133994e6e24b67168_JaffaCakes118.exe 93 PID 1048 wrote to memory of 3964 1048 c994ac23ee21564133994e6e24b67168_JaffaCakes118.exe 93 PID 1048 wrote to memory of 3964 1048 c994ac23ee21564133994e6e24b67168_JaffaCakes118.exe 93 PID 3964 wrote to memory of 372 3964 tasksv32.exe 98 PID 3964 wrote to memory of 372 3964 tasksv32.exe 98 PID 3964 wrote to memory of 372 3964 tasksv32.exe 98 PID 3964 wrote to memory of 372 3964 tasksv32.exe 98 PID 3964 wrote to memory of 372 3964 tasksv32.exe 98 PID 3964 wrote to memory of 372 3964 tasksv32.exe 98 PID 3964 wrote to memory of 372 3964 tasksv32.exe 98 PID 372 wrote to memory of 4036 372 tasksv32.exe 99 PID 372 wrote to memory of 4036 372 tasksv32.exe 99 PID 372 wrote to memory of 4036 372 tasksv32.exe 99 PID 4036 wrote to memory of 4340 4036 tasksv32.exe 102 PID 4036 wrote to memory of 4340 4036 tasksv32.exe 102 PID 4036 wrote to memory of 4340 4036 tasksv32.exe 102 PID 4036 wrote to memory of 4340 4036 tasksv32.exe 102 PID 4036 wrote to memory of 4340 4036 tasksv32.exe 102 PID 4036 wrote to memory of 4340 4036 tasksv32.exe 102 PID 4036 wrote to memory of 4340 4036 tasksv32.exe 102 PID 4340 wrote to memory of 4604 4340 tasksv32.exe 103 PID 4340 wrote to memory of 4604 4340 tasksv32.exe 103 PID 4340 wrote to memory of 4604 4340 tasksv32.exe 103 PID 4604 wrote to memory of 2340 4604 tasksv32.exe 105 PID 4604 wrote to memory of 2340 4604 tasksv32.exe 105 PID 4604 wrote to memory of 2340 4604 tasksv32.exe 105 PID 4604 wrote to memory of 2340 4604 tasksv32.exe 105 PID 4604 wrote to memory of 2340 4604 tasksv32.exe 105 PID 4604 wrote to memory of 2340 4604 tasksv32.exe 105 PID 4604 wrote to memory of 2340 4604 tasksv32.exe 105 PID 2340 wrote to memory of 1304 2340 tasksv32.exe 106 PID 2340 wrote to memory of 1304 2340 tasksv32.exe 106 PID 2340 wrote to memory of 1304 2340 tasksv32.exe 106 PID 1304 wrote to memory of 1724 1304 tasksv32.exe 107 PID 1304 wrote to memory of 1724 1304 tasksv32.exe 107 PID 1304 wrote to memory of 1724 1304 tasksv32.exe 107 PID 1304 wrote to memory of 1724 1304 tasksv32.exe 107 PID 1304 wrote to memory of 1724 1304 tasksv32.exe 107 PID 1304 wrote to memory of 1724 1304 tasksv32.exe 107 PID 1304 wrote to memory of 1724 1304 tasksv32.exe 107 PID 1724 wrote to memory of 3948 1724 tasksv32.exe 108 PID 1724 wrote to memory of 3948 1724 tasksv32.exe 108 PID 1724 wrote to memory of 3948 1724 tasksv32.exe 108 PID 3948 wrote to memory of 2996 3948 tasksv32.exe 109 PID 3948 wrote to memory of 2996 3948 tasksv32.exe 109 PID 3948 wrote to memory of 2996 3948 tasksv32.exe 109 PID 3948 wrote to memory of 2996 3948 tasksv32.exe 109 PID 3948 wrote to memory of 2996 3948 tasksv32.exe 109 PID 3948 wrote to memory of 2996 3948 tasksv32.exe 109 PID 3948 wrote to memory of 2996 3948 tasksv32.exe 109 PID 2996 wrote to memory of 2536 2996 tasksv32.exe 110 PID 2996 wrote to memory of 2536 2996 tasksv32.exe 110 PID 2996 wrote to memory of 2536 2996 tasksv32.exe 110 PID 2536 wrote to memory of 2468 2536 tasksv32.exe 111 PID 2536 wrote to memory of 2468 2536 tasksv32.exe 111 PID 2536 wrote to memory of 2468 2536 tasksv32.exe 111 PID 2536 wrote to memory of 2468 2536 tasksv32.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\c994ac23ee21564133994e6e24b67168_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c994ac23ee21564133994e6e24b67168_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Users\Admin\AppData\Local\Temp\c994ac23ee21564133994e6e24b67168_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c994ac23ee21564133994e6e24b67168_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\SysWOW64\tasksv32.exe"C:\Windows\system32\tasksv32.exe" C:\Users\Admin\AppData\Local\Temp\C994AC~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Windows\SysWOW64\tasksv32.exe"C:\Windows\system32\tasksv32.exe" C:\Users\Admin\AppData\Local\Temp\C994AC~1.EXE4⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Windows\SysWOW64\tasksv32.exe"C:\Windows\system32\tasksv32.exe" C:\Windows\SysWOW64\tasksv32.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Windows\SysWOW64\tasksv32.exe"C:\Windows\system32\tasksv32.exe" C:\Windows\SysWOW64\tasksv32.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Windows\SysWOW64\tasksv32.exe"C:\Windows\system32\tasksv32.exe" C:\Windows\SysWOW64\tasksv32.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\SysWOW64\tasksv32.exe"C:\Windows\system32\tasksv32.exe" C:\Windows\SysWOW64\tasksv32.exe8⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\SysWOW64\tasksv32.exe"C:\Windows\system32\tasksv32.exe" C:\Windows\SysWOW64\tasksv32.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Windows\SysWOW64\tasksv32.exe"C:\Windows\system32\tasksv32.exe" C:\Windows\SysWOW64\tasksv32.exe10⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\tasksv32.exe"C:\Windows\system32\tasksv32.exe" C:\Windows\SysWOW64\tasksv32.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Windows\SysWOW64\tasksv32.exe"C:\Windows\system32\tasksv32.exe" C:\Windows\SysWOW64\tasksv32.exe12⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SysWOW64\tasksv32.exe"C:\Windows\system32\tasksv32.exe" C:\Windows\SysWOW64\tasksv32.exe13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\tasksv32.exe"C:\Windows\system32\tasksv32.exe" C:\Windows\SysWOW64\tasksv32.exe14⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2468 -
C:\Windows\SysWOW64\tasksv32.exe"C:\Windows\system32\tasksv32.exe" C:\Windows\SysWOW64\tasksv32.exe15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1608 -
C:\Windows\SysWOW64\tasksv32.exe"C:\Windows\system32\tasksv32.exe" C:\Windows\SysWOW64\tasksv32.exe16⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3908 -
C:\Windows\SysWOW64\tasksv32.exe"C:\Windows\system32\tasksv32.exe" C:\Windows\SysWOW64\tasksv32.exe17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4584 -
C:\Windows\SysWOW64\tasksv32.exe"C:\Windows\system32\tasksv32.exe" C:\Windows\SysWOW64\tasksv32.exe18⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2356 -
C:\Windows\SysWOW64\tasksv32.exe"C:\Windows\system32\tasksv32.exe" C:\Windows\SysWOW64\tasksv32.exe19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1496 -
C:\Windows\SysWOW64\tasksv32.exe"C:\Windows\system32\tasksv32.exe" C:\Windows\SysWOW64\tasksv32.exe20⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2756 -
C:\Windows\SysWOW64\tasksv32.exe"C:\Windows\system32\tasksv32.exe" C:\Windows\SysWOW64\tasksv32.exe21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1828 -
C:\Windows\SysWOW64\tasksv32.exe"C:\Windows\system32\tasksv32.exe" C:\Windows\SysWOW64\tasksv32.exe22⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2608 -
C:\Windows\SysWOW64\tasksv32.exe"C:\Windows\system32\tasksv32.exe" C:\Windows\SysWOW64\tasksv32.exe23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3116 -
C:\Windows\SysWOW64\tasksv32.exe"C:\Windows\system32\tasksv32.exe" C:\Windows\SysWOW64\tasksv32.exe24⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4060 -
C:\Windows\SysWOW64\tasksv32.exe"C:\Windows\system32\tasksv32.exe" C:\Windows\SysWOW64\tasksv32.exe25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4260 -
C:\Windows\SysWOW64\tasksv32.exe"C:\Windows\system32\tasksv32.exe" C:\Windows\SysWOW64\tasksv32.exe26⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3640 -
C:\Windows\SysWOW64\tasksv32.exe"C:\Windows\system32\tasksv32.exe" C:\Windows\SysWOW64\tasksv32.exe27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2748 -
C:\Windows\SysWOW64\tasksv32.exe"C:\Windows\system32\tasksv32.exe" C:\Windows\SysWOW64\tasksv32.exe28⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3040 -
C:\Windows\SysWOW64\tasksv32.exe"C:\Windows\system32\tasksv32.exe" C:\Windows\SysWOW64\tasksv32.exe29⤵
- Executes dropped EXE
PID:1484
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
211KB
MD5c994ac23ee21564133994e6e24b67168
SHA10e2c55e9d19a881cfe54e25c49724f7df017f4bd
SHA256df6c94557ffa0d77f81d7212bdd4a5f02a58b4f2ab3c86f71776c823a7e2da7b
SHA512b3475dbf224673eb406842503e1c366f642f22be10bb7de86eb58669ee83a8388ab410ad2f316849f8daa44895aef444a5783dfa49ef315e7b4ca2f6716cb1c8