Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2024, 14:49
Behavioral task
behavioral1
Sample
JaffaCakes118_998997122e364144750a72db4049d50e38e6a879b0c67bd92ff5f6a549c7f2f5.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_998997122e364144750a72db4049d50e38e6a879b0c67bd92ff5f6a549c7f2f5.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
#/[New]3.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
#/[New]3.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
#/[New]crypted.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
#/[New]crypted.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_998997122e364144750a72db4049d50e38e6a879b0c67bd92ff5f6a549c7f2f5.exe
-
Size
680.4MB
-
MD5
b7b4e0558eb6188abc6e17d77abb4f73
-
SHA1
22851c79469486055efc62599a25eb4e1f8cc8b1
-
SHA256
998997122e364144750a72db4049d50e38e6a879b0c67bd92ff5f6a549c7f2f5
-
SHA512
638827eb702d032bf9f045854c1a79cd3bb841c9147ddd66fce98d91072bcd67338ae7214a248f8b0c8e43a68c8af48d2991a5ecae9df4e35666cf0477529cc3
-
SSDEEP
196608:gomVwAoiSs79XEVmNmbGHDoKUrUNQ9SzsIW8YtuNfU/:goqwAoSREVmDjzfIuNfU/
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 10 IoCs
description pid Process procid_target PID 3556 created 3528 3556 [New]3.exe 56 PID 3556 created 3528 3556 [New]3.exe 56 PID 3556 created 3528 3556 [New]3.exe 56 PID 3556 created 3528 3556 [New]3.exe 56 PID 3556 created 3528 3556 [New]3.exe 56 PID 1832 created 3528 1832 uTorrent.exe 56 PID 1832 created 3528 1832 uTorrent.exe 56 PID 1832 created 3528 1832 uTorrent.exe 56 PID 1832 created 3528 1832 uTorrent.exe 56 PID 1832 created 3528 1832 uTorrent.exe 56 -
Xmrig family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ [New]3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ uTorrent.exe -
XMRig Miner payload 10 IoCs
resource yara_rule behavioral2/memory/1832-305-0x00007FF7C2020000-0x00007FF7C2EF9000-memory.dmp xmrig behavioral2/memory/3988-307-0x00007FF7E32B0000-0x00007FF7E3A9F000-memory.dmp xmrig behavioral2/memory/3988-309-0x00007FF7E32B0000-0x00007FF7E3A9F000-memory.dmp xmrig behavioral2/memory/3988-311-0x00007FF7E32B0000-0x00007FF7E3A9F000-memory.dmp xmrig behavioral2/memory/3988-313-0x00007FF7E32B0000-0x00007FF7E3A9F000-memory.dmp xmrig behavioral2/memory/3988-315-0x00007FF7E32B0000-0x00007FF7E3A9F000-memory.dmp xmrig behavioral2/memory/3988-317-0x00007FF7E32B0000-0x00007FF7E3A9F000-memory.dmp xmrig behavioral2/memory/3988-319-0x00007FF7E32B0000-0x00007FF7E3A9F000-memory.dmp xmrig behavioral2/memory/3988-321-0x00007FF7E32B0000-0x00007FF7E3A9F000-memory.dmp xmrig behavioral2/memory/3988-323-0x00007FF7E32B0000-0x00007FF7E3A9F000-memory.dmp xmrig -
pid Process 1888 powershell.exe 4876 powershell.exe 1700 powershell.exe 4004 powershell.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion [New]3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion [New]3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion uTorrent.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion uTorrent.exe -
Executes dropped EXE 3 IoCs
pid Process 3556 [New]3.exe 3356 [New]crypted.exe 1832 uTorrent.exe -
resource yara_rule behavioral2/memory/3556-3-0x00007FF786640000-0x00007FF787519000-memory.dmp themida behavioral2/memory/3556-6-0x00007FF786640000-0x00007FF787519000-memory.dmp themida behavioral2/memory/3556-7-0x00007FF786640000-0x00007FF787519000-memory.dmp themida behavioral2/memory/3556-8-0x00007FF786640000-0x00007FF787519000-memory.dmp themida behavioral2/memory/3556-9-0x00007FF786640000-0x00007FF787519000-memory.dmp themida behavioral2/memory/3556-11-0x00007FF786640000-0x00007FF787519000-memory.dmp themida behavioral2/memory/3556-136-0x00007FF786640000-0x00007FF787519000-memory.dmp themida behavioral2/memory/3556-166-0x00007FF786640000-0x00007FF787519000-memory.dmp themida behavioral2/memory/1832-239-0x00007FF7C2020000-0x00007FF7C2EF9000-memory.dmp themida behavioral2/memory/1832-243-0x00007FF7C2020000-0x00007FF7C2EF9000-memory.dmp themida behavioral2/memory/1832-245-0x00007FF7C2020000-0x00007FF7C2EF9000-memory.dmp themida behavioral2/memory/1832-244-0x00007FF7C2020000-0x00007FF7C2EF9000-memory.dmp themida behavioral2/memory/1832-246-0x00007FF7C2020000-0x00007FF7C2EF9000-memory.dmp themida behavioral2/memory/1832-248-0x00007FF7C2020000-0x00007FF7C2EF9000-memory.dmp themida behavioral2/memory/1832-269-0x00007FF7C2020000-0x00007FF7C2EF9000-memory.dmp themida behavioral2/memory/1832-305-0x00007FF7C2020000-0x00007FF7C2EF9000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA [New]3.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA uTorrent.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 17 ip-api.com -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3556 [New]3.exe 1832 uTorrent.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3356 set thread context of 1780 3356 [New]crypted.exe 96 PID 1832 set thread context of 5096 1832 uTorrent.exe 141 PID 1832 set thread context of 3988 1832 uTorrent.exe 142 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\WindowsAps\MicrosoftXboxGamingOverlay\uTorrent.exe [New]3.exe File created C:\Program Files\Google\Libs\WR64.sys uTorrent.exe -
Launches sc.exe 10 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5012 sc.exe 4192 sc.exe 4016 sc.exe 4952 sc.exe 4108 sc.exe 4204 sc.exe 4456 sc.exe 2740 sc.exe 2304 sc.exe 4896 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4312 1780 WerFault.exe 96 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language [New]crypted.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_998997122e364144750a72db4049d50e38e6a879b0c67bd92ff5f6a549c7f2f5.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 AppLaunch.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier AppLaunch.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe -
Suspicious behavior: EnumeratesProcesses 56 IoCs
pid Process 1780 AppLaunch.exe 1780 AppLaunch.exe 1780 AppLaunch.exe 1780 AppLaunch.exe 1780 AppLaunch.exe 1780 AppLaunch.exe 1780 AppLaunch.exe 1780 AppLaunch.exe 1780 AppLaunch.exe 1780 AppLaunch.exe 1780 AppLaunch.exe 1780 AppLaunch.exe 1780 AppLaunch.exe 3556 [New]3.exe 3556 [New]3.exe 1700 powershell.exe 1700 powershell.exe 1780 AppLaunch.exe 1780 AppLaunch.exe 3556 [New]3.exe 3556 [New]3.exe 3556 [New]3.exe 3556 [New]3.exe 1888 powershell.exe 1888 powershell.exe 1780 AppLaunch.exe 1780 AppLaunch.exe 1780 AppLaunch.exe 1780 AppLaunch.exe 1780 AppLaunch.exe 1780 AppLaunch.exe 1780 AppLaunch.exe 1780 AppLaunch.exe 1780 AppLaunch.exe 1780 AppLaunch.exe 1780 AppLaunch.exe 1780 AppLaunch.exe 1780 AppLaunch.exe 3556 [New]3.exe 3556 [New]3.exe 3556 [New]3.exe 3556 [New]3.exe 1832 uTorrent.exe 1832 uTorrent.exe 4004 powershell.exe 4004 powershell.exe 1832 uTorrent.exe 1832 uTorrent.exe 1832 uTorrent.exe 1832 uTorrent.exe 4876 powershell.exe 4876 powershell.exe 1832 uTorrent.exe 1832 uTorrent.exe 1832 uTorrent.exe 1832 uTorrent.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1780 AppLaunch.exe Token: SeDebugPrivilege 1700 powershell.exe Token: SeDebugPrivilege 1888 powershell.exe Token: SeIncreaseQuotaPrivilege 1888 powershell.exe Token: SeSecurityPrivilege 1888 powershell.exe Token: SeTakeOwnershipPrivilege 1888 powershell.exe Token: SeLoadDriverPrivilege 1888 powershell.exe Token: SeSystemProfilePrivilege 1888 powershell.exe Token: SeSystemtimePrivilege 1888 powershell.exe Token: SeProfSingleProcessPrivilege 1888 powershell.exe Token: SeIncBasePriorityPrivilege 1888 powershell.exe Token: SeCreatePagefilePrivilege 1888 powershell.exe Token: SeBackupPrivilege 1888 powershell.exe Token: SeRestorePrivilege 1888 powershell.exe Token: SeShutdownPrivilege 1888 powershell.exe Token: SeDebugPrivilege 1888 powershell.exe Token: SeSystemEnvironmentPrivilege 1888 powershell.exe Token: SeRemoteShutdownPrivilege 1888 powershell.exe Token: SeUndockPrivilege 1888 powershell.exe Token: SeManageVolumePrivilege 1888 powershell.exe Token: 33 1888 powershell.exe Token: 34 1888 powershell.exe Token: 35 1888 powershell.exe Token: 36 1888 powershell.exe Token: SeIncreaseQuotaPrivilege 1888 powershell.exe Token: SeSecurityPrivilege 1888 powershell.exe Token: SeTakeOwnershipPrivilege 1888 powershell.exe Token: SeLoadDriverPrivilege 1888 powershell.exe Token: SeSystemProfilePrivilege 1888 powershell.exe Token: SeSystemtimePrivilege 1888 powershell.exe Token: SeProfSingleProcessPrivilege 1888 powershell.exe Token: SeIncBasePriorityPrivilege 1888 powershell.exe Token: SeCreatePagefilePrivilege 1888 powershell.exe Token: SeBackupPrivilege 1888 powershell.exe Token: SeRestorePrivilege 1888 powershell.exe Token: SeShutdownPrivilege 1888 powershell.exe Token: SeDebugPrivilege 1888 powershell.exe Token: SeSystemEnvironmentPrivilege 1888 powershell.exe Token: SeRemoteShutdownPrivilege 1888 powershell.exe Token: SeUndockPrivilege 1888 powershell.exe Token: SeManageVolumePrivilege 1888 powershell.exe Token: 33 1888 powershell.exe Token: 34 1888 powershell.exe Token: 35 1888 powershell.exe Token: 36 1888 powershell.exe Token: SeIncreaseQuotaPrivilege 1888 powershell.exe Token: SeSecurityPrivilege 1888 powershell.exe Token: SeTakeOwnershipPrivilege 1888 powershell.exe Token: SeLoadDriverPrivilege 1888 powershell.exe Token: SeSystemProfilePrivilege 1888 powershell.exe Token: SeSystemtimePrivilege 1888 powershell.exe Token: SeProfSingleProcessPrivilege 1888 powershell.exe Token: SeIncBasePriorityPrivilege 1888 powershell.exe Token: SeCreatePagefilePrivilege 1888 powershell.exe Token: SeBackupPrivilege 1888 powershell.exe Token: SeRestorePrivilege 1888 powershell.exe Token: SeShutdownPrivilege 1888 powershell.exe Token: SeDebugPrivilege 1888 powershell.exe Token: SeSystemEnvironmentPrivilege 1888 powershell.exe Token: SeRemoteShutdownPrivilege 1888 powershell.exe Token: SeUndockPrivilege 1888 powershell.exe Token: SeManageVolumePrivilege 1888 powershell.exe Token: 33 1888 powershell.exe Token: 34 1888 powershell.exe -
Suspicious use of WriteProcessMemory 46 IoCs
description pid Process procid_target PID 3240 wrote to memory of 3556 3240 JaffaCakes118_998997122e364144750a72db4049d50e38e6a879b0c67bd92ff5f6a549c7f2f5.exe 85 PID 3240 wrote to memory of 3556 3240 JaffaCakes118_998997122e364144750a72db4049d50e38e6a879b0c67bd92ff5f6a549c7f2f5.exe 85 PID 3240 wrote to memory of 3356 3240 JaffaCakes118_998997122e364144750a72db4049d50e38e6a879b0c67bd92ff5f6a549c7f2f5.exe 86 PID 3240 wrote to memory of 3356 3240 JaffaCakes118_998997122e364144750a72db4049d50e38e6a879b0c67bd92ff5f6a549c7f2f5.exe 86 PID 3240 wrote to memory of 3356 3240 JaffaCakes118_998997122e364144750a72db4049d50e38e6a879b0c67bd92ff5f6a549c7f2f5.exe 86 PID 3356 wrote to memory of 640 3356 [New]crypted.exe 93 PID 3356 wrote to memory of 640 3356 [New]crypted.exe 93 PID 3356 wrote to memory of 640 3356 [New]crypted.exe 93 PID 3356 wrote to memory of 796 3356 [New]crypted.exe 94 PID 3356 wrote to memory of 796 3356 [New]crypted.exe 94 PID 3356 wrote to memory of 796 3356 [New]crypted.exe 94 PID 3356 wrote to memory of 5088 3356 [New]crypted.exe 95 PID 3356 wrote to memory of 5088 3356 [New]crypted.exe 95 PID 3356 wrote to memory of 5088 3356 [New]crypted.exe 95 PID 3356 wrote to memory of 1780 3356 [New]crypted.exe 96 PID 3356 wrote to memory of 1780 3356 [New]crypted.exe 96 PID 3356 wrote to memory of 1780 3356 [New]crypted.exe 96 PID 3356 wrote to memory of 1780 3356 [New]crypted.exe 96 PID 3356 wrote to memory of 1780 3356 [New]crypted.exe 96 PID 3356 wrote to memory of 1780 3356 [New]crypted.exe 96 PID 3356 wrote to memory of 1780 3356 [New]crypted.exe 96 PID 3356 wrote to memory of 1780 3356 [New]crypted.exe 96 PID 4764 wrote to memory of 4108 4764 cmd.exe 108 PID 4764 wrote to memory of 4108 4764 cmd.exe 108 PID 4764 wrote to memory of 4204 4764 cmd.exe 109 PID 4764 wrote to memory of 4204 4764 cmd.exe 109 PID 4764 wrote to memory of 4456 4764 cmd.exe 110 PID 4764 wrote to memory of 4456 4764 cmd.exe 110 PID 4764 wrote to memory of 2740 4764 cmd.exe 111 PID 4764 wrote to memory of 2740 4764 cmd.exe 111 PID 4764 wrote to memory of 2304 4764 cmd.exe 112 PID 4764 wrote to memory of 2304 4764 cmd.exe 112 PID 3264 wrote to memory of 4176 3264 cmd.exe 121 PID 3264 wrote to memory of 4176 3264 cmd.exe 121 PID 3000 wrote to memory of 5012 3000 cmd.exe 134 PID 3000 wrote to memory of 5012 3000 cmd.exe 134 PID 3000 wrote to memory of 4896 3000 cmd.exe 135 PID 3000 wrote to memory of 4896 3000 cmd.exe 135 PID 3000 wrote to memory of 4192 3000 cmd.exe 136 PID 3000 wrote to memory of 4192 3000 cmd.exe 136 PID 3000 wrote to memory of 4016 3000 cmd.exe 137 PID 3000 wrote to memory of 4016 3000 cmd.exe 137 PID 3000 wrote to memory of 4952 3000 cmd.exe 138 PID 3000 wrote to memory of 4952 3000 cmd.exe 138 PID 1832 wrote to memory of 5096 1832 uTorrent.exe 141 PID 1832 wrote to memory of 3988 1832 uTorrent.exe 142 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3528
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_998997122e364144750a72db4049d50e38e6a879b0c67bd92ff5f6a549c7f2f5.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_998997122e364144750a72db4049d50e38e6a879b0c67bd92ff5f6a549c7f2f5.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Users\Admin\AppData\Roaming\[New]3.exeC:\Users\Admin\AppData\Roaming\[New]3.exe3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:3556
-
-
C:\Users\Admin\AppData\Roaming\[New]crypted.exeC:\Users\Admin\AppData\Roaming\[New]crypted.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:640
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:796
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:5088
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1780 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1780 -s 20965⤵
- Program crash
PID:4312
-
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1700
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:4108
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:4204
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:4456
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:2740
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:2304
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#kssonkvq#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'AppData' /tr '''C:\Program Files\WindowsAps\MicrosoftXboxGamingOverlay\uTorrent.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\WindowsAps\MicrosoftXboxGamingOverlay\uTorrent.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'AppData' -User 'System' -RunLevel 'Highest' -Force; }2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1888
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "AppData"2⤵PID:3568
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Roaming\[New]3.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3264 -
C:\Windows\System32\choice.exechoice /C Y /N /D Y /T 33⤵PID:4176
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:4004
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:5012
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:4896
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:4192
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:4016
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:4952
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#kssonkvq#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'AppData' /tr '''C:\Program Files\WindowsAps\MicrosoftXboxGamingOverlay\uTorrent.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\WindowsAps\MicrosoftXboxGamingOverlay\uTorrent.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'AppData' -User 'System' -RunLevel 'Highest' -Force; }2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:4876
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe2⤵PID:5096
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe2⤵PID:3988
-
-
C:\Program Files\WindowsAps\MicrosoftXboxGamingOverlay\uTorrent.exe"C:\Program Files\WindowsAps\MicrosoftXboxGamingOverlay\uTorrent.exe"1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1832
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1780 -ip 17801⤵PID:1980
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1System Services
1Service Execution
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\4e9ba9c12f31401ab7361fbdbd6fef31\Admin@[email protected]\Processes.txt
Filesize4KB
MD58fb547dfa5db8e76563f2b963e20cb47
SHA19c92fe35c22a97dae36a2e9337f001d6f4ddbcdf
SHA256c4864cc03a6e58123300aaae90063c4d146cb078f2ab15a9abeae1d4ef009f4f
SHA5127fcdcb627ec1d73d807266d527b5109227eeaeda46a069f9d226dc948b341a288177ca9b1e7718b64e53cda8afa6e93c313b5490573249383f70b12d6bc14d47
-
C:\Users\Admin\AppData\Local\4e9ba9c12f31401ab7361fbdbd6fef31\Admin@[email protected]\Software.txt
Filesize5KB
MD51ac3ccf84624711b4b315f590857ecbe
SHA17c194dbea1eff17a22f90b2d7576f9d0044fe533
SHA256fe989fc5208116838824e6469980cf9487284e3e5e7af1daaf54970816dd8445
SHA5126718eeb2173fa6af1c8c37fe87a1752566f2da148e771657843e019457350cf22adb85ad8b2b28496debb0576575851d9de4a087e95eb6f40288138dc1cb5031
-
Filesize
13B
MD564a1339085eda776b01251c5994ea18e
SHA1db191a5da47c8a6f5d90c82ec3ab7cd9b110d5a2
SHA25698931cd12d774f86fac2b7d1281c3f95f955d1f708aabaae324baed325f3530e
SHA5124bb1c794ced2056b4b54198c565534395ff5fadc3e4b8c68d47af78ab568c0bb926e35becd31f5c439d8cdb688130d8660dd05cbc38a54aa6cae388c5b8fd38c
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD577d622bb1a5b250869a3238b9bc1402b
SHA1d47f4003c2554b9dfc4c16f22460b331886b191b
SHA256f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb
SHA512d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
Filesize4KB
MD5bdb25c22d14ec917e30faf353826c5de
SHA16c2feb9cea9237bc28842ebf2fea68b3bd7ad190
SHA256e3274ce8296f2cd20e3189576fbadbfa0f1817cdf313487945c80e968589a495
SHA512b5eddbfd4748298a302e2963cfd12d849130b6dcb8f0f85a2a623caed0ff9bd88f4ec726f646dbebfca4964adc35f882ec205113920cb546cc08193739d6728c
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize1KB
MD5b42c70c1dbf0d1d477ec86902db9e986
SHA11d1c0a670748b3d10bee8272e5d67a4fabefd31f
SHA2568ed3b348989cdc967d1fc0e887b2a2f5a656680d8d14ebd3cb71a10c2f55867a
SHA51257fb278a8b2e83d01fac2a031c90e0e2bd5e4c1a360cfa4308490eb07e1b9d265b1f28399d0f10b141a6438ba92dd5f9ce4f18530ec277fece0eb7678041cbc5