Analysis
-
max time kernel
93s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2024 03:04
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_14d2cf2e2153db469c91807292c47892c08f9677e4ab15c1e907df8aafc328aa.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_14d2cf2e2153db469c91807292c47892c08f9677e4ab15c1e907df8aafc328aa.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_14d2cf2e2153db469c91807292c47892c08f9677e4ab15c1e907df8aafc328aa.exe
-
Size
4.3MB
-
MD5
a371453043982dc9ce9c4227c139db2c
-
SHA1
01d613690dd68b9d9649891e61772fa2a2b9fc74
-
SHA256
14d2cf2e2153db469c91807292c47892c08f9677e4ab15c1e907df8aafc328aa
-
SHA512
de6807dba0408dff8dd02b787e8cf150e563fbda3c8c6c0b535dbf5c216f289ce93aea3f6766fe435f75edf549c86b40ec66dd38e7bcd3771d7f062bec99f4fe
-
SSDEEP
98304:6/627RFGKuqngjLO4GKXEoBjXY+AKnP7Mxye4:6/66TGKu5jLtX1vznP7o4
Malware Config
Extracted
metasploit
windows/single_exec
Signatures
-
Glupteba family
-
Glupteba payload 9 IoCs
resource yara_rule behavioral2/memory/4016-2-0x0000000002ED0000-0x00000000037EE000-memory.dmp family_glupteba behavioral2/memory/4016-3-0x0000000000400000-0x0000000000D39000-memory.dmp family_glupteba behavioral2/memory/4016-7-0x0000000002ED0000-0x00000000037EE000-memory.dmp family_glupteba behavioral2/memory/4016-6-0x0000000000400000-0x0000000000D39000-memory.dmp family_glupteba behavioral2/memory/4016-5-0x0000000000400000-0x0000000002574000-memory.dmp family_glupteba behavioral2/memory/1192-9-0x0000000000400000-0x0000000002574000-memory.dmp family_glupteba behavioral2/memory/1192-10-0x0000000000400000-0x0000000002574000-memory.dmp family_glupteba behavioral2/memory/1192-14-0x0000000000400000-0x0000000002574000-memory.dmp family_glupteba behavioral2/memory/836-17-0x0000000000400000-0x0000000002574000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 512 netsh.exe -
Executes dropped EXE 1 IoCs
pid Process 836 csrss.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\BillowingShadow = "\"C:\\Windows\\rss\\csrss.exe\"" JaffaCakes118_14d2cf2e2153db469c91807292c47892c08f9677e4ab15c1e907df8aafc328aa.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN JaffaCakes118_14d2cf2e2153db469c91807292c47892c08f9677e4ab15c1e907df8aafc328aa.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\rss\csrss.exe JaffaCakes118_14d2cf2e2153db469c91807292c47892c08f9677e4ab15c1e907df8aafc328aa.exe File opened for modification C:\Windows\rss JaffaCakes118_14d2cf2e2153db469c91807292c47892c08f9677e4ab15c1e907df8aafc328aa.exe -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
Program crash 41 IoCs
pid pid_target Process procid_target 3436 4016 WerFault.exe 81 4244 4016 WerFault.exe 81 1488 4016 WerFault.exe 81 1516 4016 WerFault.exe 81 4756 4016 WerFault.exe 81 3296 4016 WerFault.exe 81 1704 4016 WerFault.exe 81 4504 4016 WerFault.exe 81 2256 4016 WerFault.exe 81 2892 4016 WerFault.exe 81 3596 4016 WerFault.exe 81 3860 4016 WerFault.exe 81 1660 4016 WerFault.exe 81 1624 4016 WerFault.exe 81 4752 4016 WerFault.exe 81 4484 4016 WerFault.exe 81 4008 4016 WerFault.exe 81 4184 4016 WerFault.exe 81 4764 4016 WerFault.exe 81 5000 4016 WerFault.exe 81 3956 4016 WerFault.exe 81 2684 1192 WerFault.exe 128 640 1192 WerFault.exe 128 1840 1192 WerFault.exe 128 3080 1192 WerFault.exe 128 828 1192 WerFault.exe 128 2960 1192 WerFault.exe 128 4624 1192 WerFault.exe 128 3240 1192 WerFault.exe 128 3304 1192 WerFault.exe 128 3636 1192 WerFault.exe 128 1448 1192 WerFault.exe 128 2432 1192 WerFault.exe 128 4696 1192 WerFault.exe 128 2124 1192 WerFault.exe 128 764 1192 WerFault.exe 128 3740 1192 WerFault.exe 128 2352 1192 WerFault.exe 128 2120 1192 WerFault.exe 128 376 1192 WerFault.exe 128 4772 836 WerFault.exe 170 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_14d2cf2e2153db469c91807292c47892c08f9677e4ab15c1e907df8aafc328aa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_14d2cf2e2153db469c91807292c47892c08f9677e4ab15c1e907df8aafc328aa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csrss.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 17 Go-http-client/1.1 -
Modifies data under HKEY_USERS 40 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs JaffaCakes118_14d2cf2e2153db469c91807292c47892c08f9677e4ab15c1e907df8aafc328aa.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates JaffaCakes118_14d2cf2e2153db469c91807292c47892c08f9677e4ab15c1e907df8aafc328aa.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates JaffaCakes118_14d2cf2e2153db469c91807292c47892c08f9677e4ab15c1e907df8aafc328aa.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates JaffaCakes118_14d2cf2e2153db469c91807292c47892c08f9677e4ab15c1e907df8aafc328aa.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs JaffaCakes118_14d2cf2e2153db469c91807292c47892c08f9677e4ab15c1e907df8aafc328aa.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople JaffaCakes118_14d2cf2e2153db469c91807292c47892c08f9677e4ab15c1e907df8aafc328aa.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust JaffaCakes118_14d2cf2e2153db469c91807292c47892c08f9677e4ab15c1e907df8aafc328aa.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs JaffaCakes118_14d2cf2e2153db469c91807292c47892c08f9677e4ab15c1e907df8aafc328aa.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates JaffaCakes118_14d2cf2e2153db469c91807292c47892c08f9677e4ab15c1e907df8aafc328aa.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs JaffaCakes118_14d2cf2e2153db469c91807292c47892c08f9677e4ab15c1e907df8aafc328aa.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs JaffaCakes118_14d2cf2e2153db469c91807292c47892c08f9677e4ab15c1e907df8aafc328aa.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed JaffaCakes118_14d2cf2e2153db469c91807292c47892c08f9677e4ab15c1e907df8aafc328aa.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root JaffaCakes118_14d2cf2e2153db469c91807292c47892c08f9677e4ab15c1e907df8aafc328aa.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates JaffaCakes118_14d2cf2e2153db469c91807292c47892c08f9677e4ab15c1e907df8aafc328aa.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs JaffaCakes118_14d2cf2e2153db469c91807292c47892c08f9677e4ab15c1e907df8aafc328aa.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates JaffaCakes118_14d2cf2e2153db469c91807292c47892c08f9677e4ab15c1e907df8aafc328aa.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs JaffaCakes118_14d2cf2e2153db469c91807292c47892c08f9677e4ab15c1e907df8aafc328aa.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs JaffaCakes118_14d2cf2e2153db469c91807292c47892c08f9677e4ab15c1e907df8aafc328aa.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs JaffaCakes118_14d2cf2e2153db469c91807292c47892c08f9677e4ab15c1e907df8aafc328aa.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed JaffaCakes118_14d2cf2e2153db469c91807292c47892c08f9677e4ab15c1e907df8aafc328aa.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates JaffaCakes118_14d2cf2e2153db469c91807292c47892c08f9677e4ab15c1e907df8aafc328aa.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates JaffaCakes118_14d2cf2e2153db469c91807292c47892c08f9677e4ab15c1e907df8aafc328aa.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople JaffaCakes118_14d2cf2e2153db469c91807292c47892c08f9677e4ab15c1e907df8aafc328aa.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs JaffaCakes118_14d2cf2e2153db469c91807292c47892c08f9677e4ab15c1e907df8aafc328aa.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA JaffaCakes118_14d2cf2e2153db469c91807292c47892c08f9677e4ab15c1e907df8aafc328aa.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs JaffaCakes118_14d2cf2e2153db469c91807292c47892c08f9677e4ab15c1e907df8aafc328aa.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs JaffaCakes118_14d2cf2e2153db469c91807292c47892c08f9677e4ab15c1e907df8aafc328aa.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs JaffaCakes118_14d2cf2e2153db469c91807292c47892c08f9677e4ab15c1e907df8aafc328aa.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs JaffaCakes118_14d2cf2e2153db469c91807292c47892c08f9677e4ab15c1e907df8aafc328aa.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs JaffaCakes118_14d2cf2e2153db469c91807292c47892c08f9677e4ab15c1e907df8aafc328aa.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs JaffaCakes118_14d2cf2e2153db469c91807292c47892c08f9677e4ab15c1e907df8aafc328aa.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA JaffaCakes118_14d2cf2e2153db469c91807292c47892c08f9677e4ab15c1e907df8aafc328aa.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates JaffaCakes118_14d2cf2e2153db469c91807292c47892c08f9677e4ab15c1e907df8aafc328aa.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs JaffaCakes118_14d2cf2e2153db469c91807292c47892c08f9677e4ab15c1e907df8aafc328aa.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust JaffaCakes118_14d2cf2e2153db469c91807292c47892c08f9677e4ab15c1e907df8aafc328aa.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs JaffaCakes118_14d2cf2e2153db469c91807292c47892c08f9677e4ab15c1e907df8aafc328aa.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot JaffaCakes118_14d2cf2e2153db469c91807292c47892c08f9677e4ab15c1e907df8aafc328aa.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates JaffaCakes118_14d2cf2e2153db469c91807292c47892c08f9677e4ab15c1e907df8aafc328aa.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs JaffaCakes118_14d2cf2e2153db469c91807292c47892c08f9677e4ab15c1e907df8aafc328aa.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs JaffaCakes118_14d2cf2e2153db469c91807292c47892c08f9677e4ab15c1e907df8aafc328aa.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 JaffaCakes118_14d2cf2e2153db469c91807292c47892c08f9677e4ab15c1e907df8aafc328aa.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 JaffaCakes118_14d2cf2e2153db469c91807292c47892c08f9677e4ab15c1e907df8aafc328aa.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 5c0000000100000004000000001000001900000001000000100000002fe1f70bb05d7c92335bc5e05b984da60f00000001000000200000003f0411ede9c4477057d57e57883b1f205b20cdc0f3263129b1ee0269a2678f63030000000100000014000000cabd2a79a1076a31f21d253635cb039d4329a5e814000000010000001400000079b459e67bb6e5e40173800888c81a58f6e99b6e0400000001000000100000000cd2f9e0da1773e9ed864da5e370e74e20000000010000006f0500003082056b30820353a0030201020211008210cfb0d240e3594463e0bb63828b00300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3135303630343131303433385a170d3335303630343131303433385a304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f7420583130820222300d06092a864886f70d01010105000382020f003082020a0282020100ade82473f41437f39b9e2b57281c87bedcb7df38908c6e3ce657a078f775c2a2fef56a6ef6004f28dbde68866c4493b6b163fd14126bbf1fd2ea319b217ed1333cba48f5dd79dfb3b8ff12f1219a4bc18a8671694a66666c8f7e3c70bfad292206f3e4c0e680aee24b8fb7997e94039fd347977c99482353e838ae4f0a6f832ed149578c8074b6da2fd0388d7b0370211b75f2303cfa8faeddda63abeb164fc28e114b7ecf0be8ffb5772ef4b27b4ae04c12250c708d0329a0e15324ec13d9ee19bf10b34a8c3f89a36151deac870794f46371ec2ee26f5b9881e1895c34796c76ef3b906279e6dba49a2f26c5d010e10eded9108e16fbb7f7a8f7c7e50207988f360895e7e237960d36759efb0e72b11d9bbc03f94905d881dd05b42ad641e9ac0176950a0fd8dfd5bd121f352f28176cd298c1a80964776e4737baceac595e689d7f72d689c50641293e593edd26f524c911a75aa34c401f46a199b5a73a516e863b9e7d72a712057859ed3e5178150b038f8dd02f05b23e7b4a1c4b730512fcc6eae050137c439374b3ca74e78e1f0108d030d45b7136b407bac130305c48b7823b98a67d608aa2a32982ccbabd83041ba2830341a1d605f11bc2b6f0a87c863b46a8482a88dc769a76bf1f6aa53d198feb38f364dec82b0d0a28fff7dbe21542d422d0275de179fe18e77088ad4ee6d98b3ac6dd27516effbc64f533434f0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e0416041479b459e67bb6e5e40173800888c81a58f6e99b6e300d06092a864886f70d01010b05000382020100551f58a9bcb2a850d00cb1d81a6920272908ac61755c8a6ef882e5692fd5f6564bb9b8731059d321977ee74c71fbb2d260ad39a80bea17215685f1500e59ebcee059e9bac915ef869d8f8480f6e4e99190dc179b621b45f06695d27c6fc2ea3bef1fcfcbd6ae27f1a9b0c8aefd7d7e9afa2204ebffd97fea912b22b1170e8ff28a345b58d8fc01c954b9b826cc8a8833894c2d843c82dfee965705ba2cbbf7c4b7c74e3b82be31c822737392d1c280a43939103323824c3c9f86b255981dbe29868c229b9ee26b3b573a82704ddc09c789cb0a074d6ce85d8ec9efceabc7bbb52b4e45d64ad026cce572ca086aa595e315a1f7a4edc92c5fa5fbffac28022ebed77bbbe3717b9016d3075e46537c3707428cd3c4969cd599b52ae0951a8048ae4c3907cecc47a452952bbab8fbadd233537de51d4d6dd5a1b1c7426fe64027355ca328b7078de78d3390e7239ffb509c796c46d5b415b3966e7e9b0c963ab8522d3fd65be1fb08c284fe24a8a389daac6ae1182ab1a843615bd31fdc3b8d76f22de88d75df17336c3d53fb7bcb415fffdca2d06138e196b8ac5d8b37d775d533c09911ae9d41c1727584be0241425f67244894d19b27be073fb9b84f817451e17ab7ed9d23e2bee0d52804133c31039edd7a6c8fc60718c67fde478e3f289e0406cfa5543477bdec899be91743df5bdb5ffe8e1e57a2cd409d7e6222dade1827 JaffaCakes118_14d2cf2e2153db469c91807292c47892c08f9677e4ab15c1e907df8aafc328aa.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4016 JaffaCakes118_14d2cf2e2153db469c91807292c47892c08f9677e4ab15c1e907df8aafc328aa.exe 4016 JaffaCakes118_14d2cf2e2153db469c91807292c47892c08f9677e4ab15c1e907df8aafc328aa.exe 1192 JaffaCakes118_14d2cf2e2153db469c91807292c47892c08f9677e4ab15c1e907df8aafc328aa.exe 1192 JaffaCakes118_14d2cf2e2153db469c91807292c47892c08f9677e4ab15c1e907df8aafc328aa.exe 1192 JaffaCakes118_14d2cf2e2153db469c91807292c47892c08f9677e4ab15c1e907df8aafc328aa.exe 1192 JaffaCakes118_14d2cf2e2153db469c91807292c47892c08f9677e4ab15c1e907df8aafc328aa.exe 1192 JaffaCakes118_14d2cf2e2153db469c91807292c47892c08f9677e4ab15c1e907df8aafc328aa.exe 1192 JaffaCakes118_14d2cf2e2153db469c91807292c47892c08f9677e4ab15c1e907df8aafc328aa.exe 1192 JaffaCakes118_14d2cf2e2153db469c91807292c47892c08f9677e4ab15c1e907df8aafc328aa.exe 1192 JaffaCakes118_14d2cf2e2153db469c91807292c47892c08f9677e4ab15c1e907df8aafc328aa.exe 1192 JaffaCakes118_14d2cf2e2153db469c91807292c47892c08f9677e4ab15c1e907df8aafc328aa.exe 1192 JaffaCakes118_14d2cf2e2153db469c91807292c47892c08f9677e4ab15c1e907df8aafc328aa.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4016 JaffaCakes118_14d2cf2e2153db469c91807292c47892c08f9677e4ab15c1e907df8aafc328aa.exe Token: SeImpersonatePrivilege 4016 JaffaCakes118_14d2cf2e2153db469c91807292c47892c08f9677e4ab15c1e907df8aafc328aa.exe Token: SeSystemEnvironmentPrivilege 1192 JaffaCakes118_14d2cf2e2153db469c91807292c47892c08f9677e4ab15c1e907df8aafc328aa.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1192 wrote to memory of 1556 1192 JaffaCakes118_14d2cf2e2153db469c91807292c47892c08f9677e4ab15c1e907df8aafc328aa.exe 165 PID 1192 wrote to memory of 1556 1192 JaffaCakes118_14d2cf2e2153db469c91807292c47892c08f9677e4ab15c1e907df8aafc328aa.exe 165 PID 1556 wrote to memory of 512 1556 cmd.exe 169 PID 1556 wrote to memory of 512 1556 cmd.exe 169 PID 1192 wrote to memory of 836 1192 JaffaCakes118_14d2cf2e2153db469c91807292c47892c08f9677e4ab15c1e907df8aafc328aa.exe 170 PID 1192 wrote to memory of 836 1192 JaffaCakes118_14d2cf2e2153db469c91807292c47892c08f9677e4ab15c1e907df8aafc328aa.exe 170 PID 1192 wrote to memory of 836 1192 JaffaCakes118_14d2cf2e2153db469c91807292c47892c08f9677e4ab15c1e907df8aafc328aa.exe 170
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_14d2cf2e2153db469c91807292c47892c08f9677e4ab15c1e907df8aafc328aa.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_14d2cf2e2153db469c91807292c47892c08f9677e4ab15c1e907df8aafc328aa.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4016 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4016 -s 3282⤵
- Program crash
PID:3436
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4016 -s 3322⤵
- Program crash
PID:4244
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4016 -s 3562⤵
- Program crash
PID:1488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4016 -s 5962⤵
- Program crash
PID:1516
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4016 -s 7042⤵
- Program crash
PID:4756
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4016 -s 6962⤵
- Program crash
PID:3296
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4016 -s 7322⤵
- Program crash
PID:1704
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4016 -s 7242⤵
- Program crash
PID:4504
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4016 -s 7322⤵
- Program crash
PID:2256
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4016 -s 8562⤵
- Program crash
PID:2892
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4016 -s 8642⤵
- Program crash
PID:3596
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4016 -s 8482⤵
- Program crash
PID:3860
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4016 -s 6282⤵
- Program crash
PID:1660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4016 -s 7922⤵
- Program crash
PID:1624
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4016 -s 6402⤵
- Program crash
PID:4752
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4016 -s 7362⤵
- Program crash
PID:4484
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4016 -s 7962⤵
- Program crash
PID:4008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4016 -s 8442⤵
- Program crash
PID:4184
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4016 -s 8762⤵
- Program crash
PID:4764
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4016 -s 9042⤵
- Program crash
PID:5000
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4016 -s 7762⤵
- Program crash
PID:3956
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_14d2cf2e2153db469c91807292c47892c08f9677e4ab15c1e907df8aafc328aa.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_14d2cf2e2153db469c91807292c47892c08f9677e4ab15c1e907df8aafc328aa.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1192 -s 2963⤵
- Program crash
PID:2684
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1192 -s 3003⤵
- Program crash
PID:640
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1192 -s 3003⤵
- Program crash
PID:1840
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1192 -s 6363⤵
- Program crash
PID:3080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1192 -s 6363⤵
- Program crash
PID:828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1192 -s 6363⤵
- Program crash
PID:2960
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1192 -s 7043⤵
- Program crash
PID:4624
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1192 -s 7123⤵
- Program crash
PID:3240
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1192 -s 6923⤵
- Program crash
PID:3304
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1192 -s 5803⤵
- Program crash
PID:3636
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1192 -s 7203⤵
- Program crash
PID:1448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1192 -s 7763⤵
- Program crash
PID:2432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1192 -s 7403⤵
- Program crash
PID:4696
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1192 -s 7203⤵
- Program crash
PID:2124
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1192 -s 7683⤵
- Program crash
PID:764
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1192 -s 7203⤵
- Program crash
PID:3740
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1192 -s 14323⤵
- Program crash
PID:2352
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1192 -s 14563⤵
- Program crash
PID:2120
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:512
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1192 -s 14603⤵
- Program crash
PID:376
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe /124-1243⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:836 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 836 -s 3284⤵
- Program crash
PID:4772
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4016 -ip 40161⤵PID:3828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4016 -ip 40161⤵PID:3932
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4016 -ip 40161⤵PID:2236
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4016 -ip 40161⤵PID:4216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4016 -ip 40161⤵PID:3608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4016 -ip 40161⤵PID:3812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4016 -ip 40161⤵PID:552
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4016 -ip 40161⤵PID:1960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4016 -ip 40161⤵PID:1064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 4016 -ip 40161⤵PID:1628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4016 -ip 40161⤵PID:3896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 4016 -ip 40161⤵PID:1468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4016 -ip 40161⤵PID:5108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 4016 -ip 40161⤵PID:2868
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4016 -ip 40161⤵PID:4688
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 4016 -ip 40161⤵PID:2224
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 4016 -ip 40161⤵PID:4300
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4016 -ip 40161⤵PID:4948
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4016 -ip 40161⤵PID:5096
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 4016 -ip 40161⤵PID:3516
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4016 -ip 40161⤵PID:2080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 1192 -ip 11921⤵PID:1004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 1192 -ip 11921⤵PID:636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 1192 -ip 11921⤵PID:4132
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 1192 -ip 11921⤵PID:4056
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 1192 -ip 11921⤵PID:4568
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 1192 -ip 11921⤵PID:1424
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 1192 -ip 11921⤵PID:2428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1192 -ip 11921⤵PID:2320
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1192 -ip 11921⤵PID:2812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 1192 -ip 11921⤵PID:3984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 1192 -ip 11921⤵PID:4996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 1192 -ip 11921⤵PID:1376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 1192 -ip 11921⤵PID:3048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 1192 -ip 11921⤵PID:2984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1192 -ip 11921⤵PID:3532
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 1192 -ip 11921⤵PID:4804
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 1192 -ip 11921⤵PID:4324
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1192 -ip 11921⤵PID:3492
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 1192 -ip 11921⤵PID:748
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 836 -ip 8361⤵PID:1084
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.3MB
MD5a371453043982dc9ce9c4227c139db2c
SHA101d613690dd68b9d9649891e61772fa2a2b9fc74
SHA25614d2cf2e2153db469c91807292c47892c08f9677e4ab15c1e907df8aafc328aa
SHA512de6807dba0408dff8dd02b787e8cf150e563fbda3c8c6c0b535dbf5c216f289ce93aea3f6766fe435f75edf549c86b40ec66dd38e7bcd3771d7f062bec99f4fe