Analysis
-
max time kernel
147s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-12-2024 19:27
Static task
static1
Behavioral task
behavioral1
Sample
de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe
-
Size
668KB
-
MD5
de4dbe31920f4f6ee1cc076b9e6e854b
-
SHA1
6ceb15b4031f43fc631fab5ea73f47cd932944e4
-
SHA256
78a8896135b387b751e983d702fade8c51c3bbeebc68a81e6926516ef2b660cf
-
SHA512
eab33ed6df08b322c9e41ae857fd14978bb1841c6f361a7ac92cd441dba8850e4dbd5f7606a53285c3404b9c79edf5312d708ad2e8bbc06065cd0217461c132c
-
SSDEEP
12288:POqBSJNJ/+EkGz1lr3nxGteN4r3t8UOGz624SitfLmygYMm:2CScE7z193Rit8UJ62BmhgRm
Malware Config
Extracted
xtremerat
bilou04.no-ip.org
Signatures
-
Detect XtremeRAT payload 15 IoCs
resource yara_rule behavioral2/memory/1012-5-0x0000000000C80000-0x0000000000CE9000-memory.dmp family_xtremerat behavioral2/memory/1012-7-0x0000000000C80000-0x0000000000CE9000-memory.dmp family_xtremerat behavioral2/memory/1012-9-0x0000000000C80000-0x0000000000CE9000-memory.dmp family_xtremerat behavioral2/memory/1012-6-0x0000000000C80000-0x0000000000CE9000-memory.dmp family_xtremerat behavioral2/memory/1012-10-0x0000000000C80000-0x0000000000CE9000-memory.dmp family_xtremerat behavioral2/memory/1012-3-0x0000000000C80000-0x0000000000CE9000-memory.dmp family_xtremerat behavioral2/memory/1012-11-0x0000000000C80000-0x0000000000CE9000-memory.dmp family_xtremerat behavioral2/memory/1012-1-0x0000000000C80000-0x0000000000CE9000-memory.dmp family_xtremerat behavioral2/memory/1012-0-0x0000000000C80000-0x0000000000CE9000-memory.dmp family_xtremerat behavioral2/memory/1012-21-0x0000000000C80000-0x0000000000CE9000-memory.dmp family_xtremerat behavioral2/memory/1012-27-0x0000000000C80000-0x0000000000CE9000-memory.dmp family_xtremerat behavioral2/memory/1012-61-0x0000000000C80000-0x0000000000CE9000-memory.dmp family_xtremerat behavioral2/memory/3692-73-0x0000000000C80000-0x0000000000CE9000-memory.dmp family_xtremerat behavioral2/memory/4544-77-0x0000000000C80000-0x0000000000CE9000-memory.dmp family_xtremerat behavioral2/memory/1904-108-0x0000000000C80000-0x0000000000CE9000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 12 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{MQ2166SW-OVQW-SESQ-R5V6-21OKTAN514Q7}\StubPath = "C:\\Windows\\InstallDir\\Server.exe restart" Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{MQ2166SW-OVQW-SESQ-R5V6-21OKTAN514Q7}\StubPath = "C:\\Windows\\InstallDir\\Server.exe restart" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{MQ2166SW-OVQW-SESQ-R5V6-21OKTAN514Q7} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{MQ2166SW-OVQW-SESQ-R5V6-21OKTAN514Q7}\StubPath = "C:\\Windows\\InstallDir\\Server.exe restart" svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{MQ2166SW-OVQW-SESQ-R5V6-21OKTAN514Q7} Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{MQ2166SW-OVQW-SESQ-R5V6-21OKTAN514Q7}\StubPath = "C:\\Windows\\InstallDir\\Server.exe restart" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{MQ2166SW-OVQW-SESQ-R5V6-21OKTAN514Q7} Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{MQ2166SW-OVQW-SESQ-R5V6-21OKTAN514Q7}\StubPath = "C:\\Windows\\InstallDir\\Server.exe restart" de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{MQ2166SW-OVQW-SESQ-R5V6-21OKTAN514Q7} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{MQ2166SW-OVQW-SESQ-R5V6-21OKTAN514Q7}\StubPath = "C:\\Windows\\InstallDir\\Server.exe restart" Server.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{MQ2166SW-OVQW-SESQ-R5V6-21OKTAN514Q7} explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{MQ2166SW-OVQW-SESQ-R5V6-21OKTAN514Q7} de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe -
Executes dropped EXE 8 IoCs
pid Process 1504 Server.exe 3692 Server.exe 2712 Server.exe 536 Server.exe 1632 Server.exe 1904 Server.exe 3064 Server.exe 3988 Server.exe -
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\Server.exe" Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\Server.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\Server.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\Server.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\Server.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\Server.exe" Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\Server.exe" de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\Server.exe" Server.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\Server.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\Server.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\Server.exe" de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\Server.exe" Server.exe -
Suspicious use of SetThreadContext 7 IoCs
description pid Process procid_target PID 4672 set thread context of 1012 4672 de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe 84 PID 1504 set thread context of 3692 1504 Server.exe 124 PID 3692 set thread context of 4416 3692 Server.exe 129 PID 2712 set thread context of 1904 2712 Server.exe 141 PID 1904 set thread context of 2880 1904 Server.exe 143 PID 536 set thread context of 3064 536 Server.exe 145 PID 1632 set thread context of 3988 1632 Server.exe 146 -
resource yara_rule behavioral2/memory/4416-79-0x0000000001610000-0x0000000001712000-memory.dmp upx behavioral2/memory/4416-81-0x0000000001610000-0x0000000001712000-memory.dmp upx behavioral2/memory/4416-80-0x0000000001610000-0x0000000001712000-memory.dmp upx behavioral2/memory/4416-83-0x0000000001610000-0x0000000001712000-memory.dmp upx behavioral2/memory/4416-84-0x0000000001610000-0x0000000001712000-memory.dmp upx behavioral2/memory/4416-85-0x0000000001610000-0x0000000001712000-memory.dmp upx behavioral2/memory/4416-86-0x0000000001610000-0x0000000001712000-memory.dmp upx behavioral2/memory/4416-89-0x0000000001610000-0x0000000001712000-memory.dmp upx behavioral2/memory/4416-88-0x0000000001610000-0x0000000001712000-memory.dmp upx behavioral2/memory/4416-90-0x0000000001610000-0x0000000001712000-memory.dmp upx behavioral2/memory/4416-93-0x0000000001610000-0x0000000001712000-memory.dmp upx behavioral2/memory/4416-94-0x0000000001610000-0x0000000001712000-memory.dmp upx behavioral2/memory/2880-118-0x0000000001610000-0x0000000001712000-memory.dmp upx behavioral2/memory/2880-117-0x0000000001610000-0x0000000001712000-memory.dmp upx behavioral2/memory/2880-116-0x0000000001610000-0x0000000001712000-memory.dmp upx behavioral2/memory/2880-121-0x0000000001610000-0x0000000001712000-memory.dmp upx behavioral2/memory/2880-123-0x0000000001610000-0x0000000001712000-memory.dmp upx behavioral2/memory/2880-122-0x0000000001610000-0x0000000001712000-memory.dmp upx behavioral2/memory/2880-119-0x0000000001610000-0x0000000001712000-memory.dmp upx behavioral2/memory/2880-124-0x0000000001610000-0x0000000001712000-memory.dmp upx -
Drops file in Windows directory 7 IoCs
description ioc Process File opened for modification C:\Windows\InstallDir\Server.exe Server.exe File opened for modification C:\Windows\InstallDir\ Server.exe File opened for modification C:\Windows\InstallDir\Server.exe Server.exe File opened for modification C:\Windows\InstallDir\ Server.exe File opened for modification C:\Windows\InstallDir\Server.exe de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe File created C:\Windows\InstallDir\Server.exe de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe File opened for modification C:\Windows\InstallDir\ de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe -
Checks SCSI registry key(s) 3 TTPs 16 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 explorer.exe -
Modifies registry class 31 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 14002e803accbfb42cdb4c42b0297fe99a87c6410000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ svchost.exe Set value (data) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" explorer.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4416 explorer.exe 4416 explorer.exe 2880 explorer.exe 2880 explorer.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1012 de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe 4416 explorer.exe 4416 explorer.exe 2880 explorer.exe 2880 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4672 wrote to memory of 1012 4672 de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe 84 PID 4672 wrote to memory of 1012 4672 de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe 84 PID 4672 wrote to memory of 1012 4672 de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe 84 PID 4672 wrote to memory of 1012 4672 de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe 84 PID 4672 wrote to memory of 1012 4672 de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe 84 PID 4672 wrote to memory of 1012 4672 de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe 84 PID 4672 wrote to memory of 1012 4672 de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe 84 PID 4672 wrote to memory of 1012 4672 de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe 84 PID 4672 wrote to memory of 1012 4672 de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe 84 PID 4672 wrote to memory of 1012 4672 de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe 84 PID 4672 wrote to memory of 1012 4672 de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe 84 PID 4672 wrote to memory of 1012 4672 de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe 84 PID 4672 wrote to memory of 1012 4672 de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe 84 PID 1012 wrote to memory of 4976 1012 de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe 85 PID 1012 wrote to memory of 4976 1012 de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe 85 PID 1012 wrote to memory of 4976 1012 de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe 85 PID 1012 wrote to memory of 4664 1012 de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe 86 PID 1012 wrote to memory of 4664 1012 de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe 86 PID 1012 wrote to memory of 5012 1012 de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe 87 PID 1012 wrote to memory of 5012 1012 de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe 87 PID 1012 wrote to memory of 5012 1012 de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe 87 PID 1012 wrote to memory of 5024 1012 de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe 88 PID 1012 wrote to memory of 5024 1012 de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe 88 PID 1012 wrote to memory of 5024 1012 de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe 88 PID 1012 wrote to memory of 1444 1012 de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe 89 PID 1012 wrote to memory of 1444 1012 de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe 89 PID 1012 wrote to memory of 1476 1012 de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe 90 PID 1012 wrote to memory of 1476 1012 de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe 90 PID 1012 wrote to memory of 1476 1012 de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe 90 PID 1012 wrote to memory of 2332 1012 de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe 91 PID 1012 wrote to memory of 2332 1012 de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe 91 PID 1012 wrote to memory of 2196 1012 de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe 92 PID 1012 wrote to memory of 2196 1012 de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe 92 PID 1012 wrote to memory of 2196 1012 de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe 92 PID 1012 wrote to memory of 1916 1012 de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe 93 PID 1012 wrote to memory of 1916 1012 de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe 93 PID 1012 wrote to memory of 4596 1012 de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe 94 PID 1012 wrote to memory of 4596 1012 de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe 94 PID 1012 wrote to memory of 4596 1012 de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe 94 PID 1012 wrote to memory of 3256 1012 de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe 95 PID 1012 wrote to memory of 3256 1012 de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe 95 PID 1012 wrote to memory of 4740 1012 de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe 96 PID 1012 wrote to memory of 4740 1012 de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe 96 PID 1012 wrote to memory of 4740 1012 de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe 96 PID 1012 wrote to memory of 4492 1012 de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe 97 PID 1012 wrote to memory of 4492 1012 de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe 97 PID 1012 wrote to memory of 1764 1012 de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe 98 PID 1012 wrote to memory of 1764 1012 de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe 98 PID 1012 wrote to memory of 1764 1012 de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe 98 PID 1012 wrote to memory of 1036 1012 de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe 99 PID 1012 wrote to memory of 1036 1012 de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe 99 PID 1012 wrote to memory of 4764 1012 de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe 100 PID 1012 wrote to memory of 4764 1012 de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe 100 PID 1012 wrote to memory of 4764 1012 de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe 100 PID 1012 wrote to memory of 836 1012 de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe 101 PID 1012 wrote to memory of 836 1012 de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe 101 PID 1012 wrote to memory of 2324 1012 de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe 102 PID 1012 wrote to memory of 2324 1012 de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe 102 PID 1012 wrote to memory of 2324 1012 de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe 102 PID 1012 wrote to memory of 3716 1012 de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe 103 PID 1012 wrote to memory of 3716 1012 de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe 103 PID 1012 wrote to memory of 2388 1012 de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe 104 PID 1012 wrote to memory of 2388 1012 de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe 104 PID 1012 wrote to memory of 2388 1012 de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Users\Admin\AppData\Local\Temp\de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\de4dbe31920f4f6ee1cc076b9e6e854b_JaffaCakes118.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Checks computer location settings
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:4664
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:5012
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:1444
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:1476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:2332
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:2196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:1916
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:4596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:3256
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:4740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:4492
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:1764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:1036
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:836
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:2324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:3716
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:2388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:4872
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:1016
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:1568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:5108
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:3988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:3056
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:2464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:540
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:1580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:3248
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:1644
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1504 -
C:\Windows\InstallDir\Server.exeC:\Windows\InstallDir\Server.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3692 -
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4544 -
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2712 -
C:\Windows\InstallDir\Server.exeC:\Windows\InstallDir\Server.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1904 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:1312
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2880
-
-
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:536 -
C:\Windows\InstallDir\Server.exeC:\Windows\InstallDir\Server.exe7⤵
- Executes dropped EXE
PID:3064
-
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1632 -
C:\Windows\InstallDir\Server.exeC:\Windows\InstallDir\Server.exe7⤵
- Executes dropped EXE
PID:3988
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"5⤵PID:1748
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4416
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD523134df96547b361c8591e8cf4a590a6
SHA1abd3bd6064ffefd50f99f29a3777c227b4a1f200
SHA256c3cd3b7a3c9ca317ba155247e1d59753ffaa0e4e0ee594a816655dd9550e158e
SHA512326745ea4afb2fcb1248a857e08314f9d60e555bc6dfa5ddc077974fb9995456f422cd338d3d31865175e02e14910fac5d52602a63856882c345a30b34d4722d
-
Filesize
2B
MD584cad01fdb44ae58dbe6c3973dcd87f5
SHA14700b42849fb35be323774820bf1bc8019d26c80
SHA2568b1f194be530240c18bf0b1ee0d038e750fab8b24c6bd25c864297e5ebb41fa6
SHA5126e10d3ec4724c1aca9ff3f6a26292ba80065d18e8e9395f1474c0a298008f25e312e2f7024e7d10aab3264764e69a25553cc20afd23090f83921d20e42b989ab
-
Filesize
343KB
MD56426d400c96fb9ffef4eaa54f6647f4c
SHA170a37871aff432790b6adf7d3fc4eb929476e082
SHA25698bba0cf4c57ecd35b227f45e4aa6dd50ef7cfb1160235cc14687c96eb09fa3c
SHA5122c8b4d3ab066cbfca6cf0c8d89d5044152b5e3d7100249cbedd1c816e3a4a94efc8bc6b79c1dab4bdf96e3ce476d6caccf625cfbe0aff3bf5e7a29dfcfa948c5
-
Filesize
668KB
MD5de4dbe31920f4f6ee1cc076b9e6e854b
SHA16ceb15b4031f43fc631fab5ea73f47cd932944e4
SHA25678a8896135b387b751e983d702fade8c51c3bbeebc68a81e6926516ef2b660cf
SHA512eab33ed6df08b322c9e41ae857fd14978bb1841c6f361a7ac92cd441dba8850e4dbd5f7606a53285c3404b9c79edf5312d708ad2e8bbc06065cd0217461c132c