Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2024, 19:14
Static task
static1
General
-
Target
JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe
-
Size
625KB
-
MD5
3115be8e84a351846f15d7373bbf2b13
-
SHA1
5180894e6f2dd132ca380c437fc4bd3299e492f5
-
SHA256
a6095ba6b9b751f0df1a749d7c6be98d830e736ecb9d22695279ca04611db5ca
-
SHA512
f8cd23fbd11596b00b5152ae9d78183f60a55feb4538a5450649bcd9cf7dc769870d829f4843fda37cd319f7c1b0e945bca76dcc754d832f744eb8480b04bf32
-
SSDEEP
12288:sVt+w8wyv/U66WoJM5fDPqj7VkyIJotJq9X5DL8T9LvxtHa:it+w5ykDJ6fbqj7VkpayXJUtt
Malware Config
Signatures
-
Expiro family
-
Expiro payload 5 IoCs
resource yara_rule behavioral1/memory/3652-0-0x00000000004BC000-0x000000000054F000-memory.dmp family_expiro1 behavioral1/memory/3652-1-0x0000000000400000-0x000000000054F000-memory.dmp family_expiro1 behavioral1/memory/3652-3-0x0000000000400000-0x000000000054F000-memory.dmp family_expiro1 behavioral1/memory/3652-48-0x00000000004BC000-0x000000000054F000-memory.dmp family_expiro1 behavioral1/memory/3652-56-0x0000000000400000-0x000000000054F000-memory.dmp family_expiro1 -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 9 IoCs
pid Process 5060 alg.exe 3608 DiagnosticsHub.StandardCollector.Service.exe 4724 fxssvc.exe 4728 elevation_service.exe 5028 elevation_service.exe 2952 maintenanceservice.exe 4276 msdtc.exe 5100 msiexec.exe 3208 TrustedInstaller.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\S-1-5-21-940901362-3608833189-1915618603-1000 alg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\S-1-5-21-940901362-3608833189-1915618603-1000\EnableNotifications = "0" alg.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 42 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\T: alg.exe File opened (read-only) \??\L: alg.exe File opened (read-only) \??\Z: alg.exe File opened (read-only) \??\G: JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File opened (read-only) \??\O: JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File opened (read-only) \??\Y: alg.exe File opened (read-only) \??\W: alg.exe File opened (read-only) \??\J: JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File opened (read-only) \??\R: JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File opened (read-only) \??\T: JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File opened (read-only) \??\V: JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File opened (read-only) \??\W: JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File opened (read-only) \??\R: alg.exe File opened (read-only) \??\G: alg.exe File opened (read-only) \??\I: alg.exe File opened (read-only) \??\J: alg.exe File opened (read-only) \??\Q: alg.exe File opened (read-only) \??\S: alg.exe File opened (read-only) \??\Q: JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File opened (read-only) \??\U: JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File opened (read-only) \??\E: alg.exe File opened (read-only) \??\Y: JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File opened (read-only) \??\U: alg.exe File opened (read-only) \??\V: alg.exe File opened (read-only) \??\E: JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File opened (read-only) \??\K: JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File opened (read-only) \??\P: JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File opened (read-only) \??\M: alg.exe File opened (read-only) \??\I: JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File opened (read-only) \??\N: JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File opened (read-only) \??\S: JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File opened (read-only) \??\K: alg.exe File opened (read-only) \??\N: alg.exe File opened (read-only) \??\O: alg.exe File opened (read-only) \??\P: alg.exe File opened (read-only) \??\X: alg.exe File opened (read-only) \??\H: JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File opened (read-only) \??\L: JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File opened (read-only) \??\M: JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File opened (read-only) \??\H: alg.exe File opened (read-only) \??\Z: JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File opened (read-only) \??\X: JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification \??\c:\windows\system32\vssvc.exe alg.exe File opened for modification \??\c:\windows\system32\perceptionsimulation\perceptionsimulationservice.exe JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File opened for modification \??\c:\windows\system32\spectrum.exe JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File opened for modification \??\c:\windows\system32\diagsvcs\diagnosticshub.standardcollector.service.exe JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File opened for modification \??\c:\windows\SysWOW64\perfhost.exe JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File opened for modification \??\c:\windows\system32\tieringengineservice.exe JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File opened for modification \??\c:\windows\SysWOW64\wbengine.exe JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File opened for modification \??\c:\windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File created \??\c:\windows\system32\mpakdofj.tmp JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File created \??\c:\windows\system32\ngehgkbh.tmp JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File created \??\c:\windows\system32\pfmplolm.tmp JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File created \??\c:\windows\system32\qigfmhhp.tmp JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File opened for modification \??\c:\windows\SysWOW64\snmptrap.exe JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File opened for modification \??\c:\windows\SysWOW64\openssh\ssh-agent.exe JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File created \??\c:\windows\system32\lapclanf.tmp JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File created \??\c:\windows\system32\maklhicf.tmp JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File opened for modification \??\c:\windows\SysWOW64\lsass.exe JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File opened for modification \??\c:\windows\system32\svchost.exe alg.exe File opened for modification \??\c:\windows\SysWOW64\perceptionsimulation\perceptionsimulationservice.exe JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File created \??\c:\windows\system32\gmbqmlmh.tmp JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File opened for modification \??\c:\windows\SysWOW64\msiexec.exe JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File created \??\c:\windows\SysWOW64\illfojej.tmp JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File created \??\c:\windows\system32\ikomnenf.tmp JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File opened for modification \??\c:\windows\system32\locator.exe alg.exe File opened for modification \??\c:\windows\SysWOW64\locator.exe JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File created \??\c:\windows\system32\pcdmighk.tmp JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File opened for modification \??\c:\windows\SysWOW64\sgrmbroker.exe JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File created \??\c:\windows\system32\nhgdiamd.tmp JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File created \??\c:\windows\system32\mogaefoe.tmp JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File created \??\c:\windows\system32\hlogfcal.tmp JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File created \??\c:\windows\system32\cifgqjek.tmp JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File opened for modification \??\c:\windows\system32\lsass.exe alg.exe File opened for modification \??\c:\windows\system32\wbengine.exe JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File opened for modification \??\c:\windows\system32\Agentservice.exe alg.exe File opened for modification \??\c:\windows\system32\vds.exe alg.exe File opened for modification \??\c:\windows\system32\searchindexer.exe alg.exe File opened for modification \??\c:\windows\SysWOW64\sensordataservice.exe JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File opened for modification \??\c:\windows\SysWOW64\Agentservice.exe JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File opened for modification \??\c:\windows\system32\vssvc.exe JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File opened for modification \??\c:\windows\system32\svchost.exe JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File created \??\c:\windows\system32\qomlmqan.tmp JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File opened for modification \??\c:\windows\system32\dllhost.exe alg.exe File opened for modification \??\c:\windows\system32\snmptrap.exe JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File opened for modification \??\c:\windows\SysWOW64\diagsvcs\diagnosticshub.standardcollector.service.exe JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File opened for modification \??\c:\windows\system32\sensordataservice.exe alg.exe File opened for modification \??\c:\windows\system32\sgrmbroker.exe alg.exe File opened for modification \??\c:\windows\system32\msiexec.exe JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File opened for modification \??\c:\windows\system32\openssh\ssh-agent.exe JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File opened for modification \??\c:\windows\system32\Appvclient.exe alg.exe File opened for modification \??\c:\windows\system32\lsass.exe JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File opened for modification \??\c:\windows\SysWOW64\msdtc.exe JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File opened for modification \??\c:\windows\system32\msdtc.exe JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File opened for modification \??\c:\windows\syswow64\perfhost.exe alg.exe File opened for modification \??\c:\windows\system32\spectrum.exe alg.exe File opened for modification \??\c:\windows\SysWOW64\vds.exe JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File opened for modification \??\c:\windows\system32\vds.exe JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File created \??\c:\windows\SysWOW64\gjinblme.tmp JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File created \??\c:\windows\system32\WindowsPowerShell\v1.0\ofajajjp.tmp JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File opened for modification \??\c:\windows\system32\perceptionsimulation\perceptionsimulationservice.exe alg.exe File opened for modification \??\c:\windows\system32\openssh\ssh-agent.exe alg.exe File opened for modification \??\c:\windows\system32\wbengine.exe alg.exe File created \??\c:\windows\SysWOW64\apkdphfd.tmp JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File opened for modification \??\c:\windows\system32\wbem\wmiApsrv.exe JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File opened for modification \??\c:\windows\system32\WindowsPowerShell\v1.0\powershell.exe JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Java\jdk-1.8\bin\mngianin.tmp JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File opened for modification \??\c:\program files\common files\microsoft shared\source engine\ose.exe JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\hlepeenn.tmp JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\mgecidfd.tmp JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File created C:\Program Files\Common Files\microsoft shared\ink\hhfjjgab.tmp JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File created C:\Program Files\Internet Explorer\hfoijjjp.tmp JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File created C:\Program Files\Java\jdk-1.8\bin\ekchdkjb.tmp JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File created C:\Program Files\Common Files\microsoft shared\ink\nnbpngba.tmp JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe alg.exe File opened for modification C:\Program Files\Internet Explorer\ieinstal.exe JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java.exe JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File created C:\Program Files\Java\jdk-1.8\bin\ifpcoece.tmp JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File created \??\c:\program files (x86)\mozilla maintenance service\ciplffbg.tmp JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\mip.exe JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\pijgofaf.tmp JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File created C:\Program Files\Java\jdk-1.8\bin\pppjqpbi.tmp JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javapackager.exe JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe alg.exe File created C:\Program Files\Common Files\microsoft shared\OFFICE16\pgildlkb.tmp JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File opened for modification C:\Program Files\dotnet\dotnet.exe JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\createdump.exe JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jarsigner.exe JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File created C:\Program Files\Java\jdk-1.8\bin\knkmmeba.tmp JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javah.exe JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File created C:\Program Files\Java\jdk-1.8\bin\lbhckibj.tmp JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File opened for modification \??\c:\program files\google\chrome\Application\123.0.6312.123\elevation_service.exe JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File created C:\Program Files\7-Zip\nccafaqk.tmp JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\createdump.exe JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File opened for modification \??\c:\program files\windows media player\wmpnetwk.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File created C:\Program Files\Common Files\microsoft shared\MSInfo\jfjkgccl.tmp JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File created C:\Program Files\Internet Explorer\kjkookie.tmp JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\clmaedbq.tmp JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File created \??\c:\program files\google\chrome\Application\123.0.6312.123\hnmjnfke.tmp JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File created C:\Program Files\Java\jdk-1.8\bin\imamgieo.tmp JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\obkakffi.tmp JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javac.exe JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File opened for modification \??\c:\program files (x86)\google\update\googleupdate.exe alg.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File created C:\Program Files\Java\jdk-1.8\bin\dddilmae.tmp JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javadoc.exe JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\mnmjadqg.tmp JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\miqfjfol.tmp JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File created C:\Program Files\Java\jdk-1.8\bin\ibkjjmkl.tmp JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe alg.exe File opened for modification \??\c:\program files\common files\microsoft shared\source engine\ose.exe alg.exe File created \??\c:\program files\common files\microsoft shared\source engine\jaidfald.tmp alg.exe File opened for modification C:\Program Files\7-Zip\7z.exe alg.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\createdump.exe JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File opened for modification \??\c:\program files\google\chrome\Application\123.0.6312.123\elevation_service.exe alg.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\cedpmnkl.tmp JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jabswitch.exe JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File created C:\Program Files\Java\jdk-1.8\bin\cobmhpje.tmp JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\jmofaklb.tmp JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe -
Drops file in Windows directory 8 IoCs
description ioc Process File opened for modification \??\c:\windows\servicing\trustedinstaller.exe JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File created \??\c:\windows\servicing\dhgohbke.tmp JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File created C:\Windows\Logs\CBS\CBS.log TrustedInstaller.exe File opened for modification C:\Windows\Logs\CBS\CBS.log TrustedInstaller.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\wpf\presentationfontcache.exe JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\wpf\presentationfontcache.exe alg.exe File opened for modification \??\c:\windows\servicing\trustedinstaller.exe alg.exe File opened for modification C:\Windows\DtcInstall.log msdtc.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1130 = "Microsoft Modem Device Provider" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1134 = "Microsoft Routing Extension" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1131 = "Route through e-mail" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1132 = "Store in a folder" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1133 = "Print" fxssvc.exe -
Suspicious behavior: EnumeratesProcesses 44 IoCs
pid Process 5060 alg.exe 5060 alg.exe 5060 alg.exe 5060 alg.exe 5060 alg.exe 5060 alg.exe 5060 alg.exe 5060 alg.exe 5060 alg.exe 5060 alg.exe 5060 alg.exe 5060 alg.exe 5060 alg.exe 5060 alg.exe 5060 alg.exe 5060 alg.exe 5060 alg.exe 5060 alg.exe 5060 alg.exe 5060 alg.exe 5060 alg.exe 5060 alg.exe 5060 alg.exe 5060 alg.exe 5060 alg.exe 5060 alg.exe 5060 alg.exe 5060 alg.exe 5060 alg.exe 5060 alg.exe 5060 alg.exe 5060 alg.exe 5060 alg.exe 5060 alg.exe 5060 alg.exe 5060 alg.exe 5060 alg.exe 5060 alg.exe 5060 alg.exe 5060 alg.exe 5060 alg.exe 5060 alg.exe 5060 alg.exe 5060 alg.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 656 Process not Found 656 Process not Found -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 3652 JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe Token: SeAuditPrivilege 4724 fxssvc.exe Token: SeTakeOwnershipPrivilege 5060 alg.exe Token: SeSecurityPrivilege 5100 msiexec.exe -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer alg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" alg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3115be8e84a351846f15d7373bbf2b13.exe"1⤵
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3652
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:5060
-
C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeC:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe1⤵
- Executes dropped EXE
PID:3608
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:1896
-
C:\Windows\system32\fxssvc.exeC:\Windows\system32\fxssvc.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4724
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵
- Executes dropped EXE
PID:4728
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"1⤵
- Executes dropped EXE
PID:5028
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
PID:2952
-
C:\Windows\System32\msdtc.exeC:\Windows\System32\msdtc.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4276
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5100
-
C:\Windows\servicing\TrustedInstaller.exeC:\Windows\servicing\TrustedInstaller.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3208
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5551926dceb72a86278fad7e4deaf0b1a
SHA165296a9d04fa58ea7e0522173f3e6b3f60346aa3
SHA2563c4c81f261ce2425ed959579a851b6ad500923127fa69e2d9db6c9ec034f2fa8
SHA512612f2d0bbc02e2a54d3ebde4b4d8aae5b1a25972ef2d27057261a007376b5b8b44cf56a71b5e0a0ab0b69b29537313fd281a24d65d3cf3a7a10c0b9ea44975df
-
Filesize
621KB
MD5b122767489a8be1f953fd15423b42be7
SHA1a53a62d94a62f463f9b1697a4908fb084a9f1161
SHA2566eee754fe82e130c626d8b6e9aaf9d57d11d9f944cf27d1fcca9ca96776b18ba
SHA5123a553b89ae45f8c8b151a09dd77bf662b9f6dceb3da489ffe4b0c768c7406672a2e40387da56519a65ebc4821873ea1b17a3029cad801200144c87b5903b8bbe
-
Filesize
940KB
MD5c0ed28c57f0a458b559eb12b831f9225
SHA1f58929e25f2749523d3d30dbda1d946f7da96175
SHA256164d7ff14e4228fa82abd1c251f8a923c7564332e5a6c84e5660e1d86ef04d15
SHA5127d599e8cf92bd4029a5dbf68d54f2814b46a96ee74c56f0f3cddd18e1fed98fd007112ea0646ec694fbbadc3e0c48189c26cbc39a48eb3be721d84aa3d41555e
-
Filesize
1.3MB
MD5b7a7ce7547fa6a112592c1d6c88f55c3
SHA19f7baca3a13893ecd14417b39fcb9c5c28ccb171
SHA256f03b492d5efbe2cfefd2dacca41b343ca5c3bc50bc002702668c8965243a4c22
SHA512978f482d84438bea1baf0a4cd5c302af2e9150e3576b66dd4f43df4f98a0666b4197188fcbdd23ed5369b2db912cfc703fb5ea57e1b881575ac1972025532920
-
Filesize
1.1MB
MD5e7197082903dedb2651bdd103f6865ee
SHA14de435071cdf3de0a480020c72b850af226a46fc
SHA256b037d8a068e2543280063273a42c5f1895346ad58256ee782d75b3059fb6a056
SHA5124c3c1bf440db5d714f90f504ee02b100e348dc245dfcbb76f53c255c9eab715e539c45cb41a3d086f052e98d18d03a06391a5d0e6de6eb18b337c5c27cd9c7a4
-
Filesize
410KB
MD5ceaa810cc57c1e96c395c0cf44ef6c83
SHA1e7fb25421e37d761582e797c8feef70fd67cc8c0
SHA256c24aace48c676aff3d8e5ca6753099f9490d1fa3bade4bf35a8307a66f6643c7
SHA512464fb1679667525c68efc79547d56fbe63ae75bc095636a8c00890c571b30d6e152267da821cf1e66866ddd8e07f705c8442b353e27ab46da198ac878f348329
-
Filesize
672KB
MD5c464bd9d3f4f4af97d3dd2eb393dfa16
SHA18b071a467081ac2257d7a16e1824b306aceeb940
SHA256642f56f05db75ed3ec4eff9fda75a92e8c6fec611c3a445024992cf3aa26b0b9
SHA512b42140ea8b86066943f7e234df74486cb8428951ad74439491c1f9a5d3d1b18c2f40fde0787223a9d485a039701d189fa022222aaba8aad640b7b15eed89f7c8
-
Filesize
4.5MB
MD5d97381637dec9ee5421703b07b739857
SHA160a5c52c49bcf4cef7e3d7528a771e3e2723eaae
SHA2568dd363453ea2c15ec89d8d9a09c582819827579255b88786a17277cb8a98c5a9
SHA5125a2c54769cbef4b40fb5f01e016db5f424d30b479675af4d037390395e54fac9837aa57638346bb742b50bc781adf133ece95706d035eb0136af3e467c25d664
-
Filesize
738KB
MD5f8fdcd1ff5d3a55722f293e3b8a6fe47
SHA107f80055c3fcd184f3ec32597fc31582b112283b
SHA256ee13cb5275abe3a2f5ed1bdf64433258bb6fafe14340fdacb791ab47ad2f6ff5
SHA5122992589d9c9b3bd3020a2e9c844a5080ca3df230b40153a326338c9474c20de4f77d40b716a67817fe686ad7d293d352d41c433822cbce95ee15d75b7300d22c
-
Filesize
23.8MB
MD5cb3f65bbdb81276b878cddcbc8a357ee
SHA140874b5ad84c3249866cd442c06a4cff65fd7d34
SHA2568f777d48eff4d76dcacbb1b28d14cda54a0188fcb0950f35c94ebfcceec1b5de
SHA5129df35b176f6dcaaaf61585db1a2d6de4c81aade25db09add6d2b8ed336e02fd6b5a3d90f633b914fbece5052e952fc7ea1af01c445affe3834103be901c57b28
-
Filesize
2.5MB
MD5bae75bc63885b3bb7a4ad13ed8533788
SHA1ecea93896525ab69f32dab87f63a67f2448a3306
SHA2568bcddfde66ac6517f8e605ea5d1e3b35d9169354109c9cca00db280e2dd637ab
SHA5120766427af035743da567203eee98945bb15a2a03b91525c3c327b579dcff889922172dd08c402f11b3a935796563df2177d8eada5c5d129b61e34ac3b685914d
-
Filesize
637KB
MD5640eb183d489f21ef293c6e44ac34370
SHA10111e29d6bb1a68760ba86b0e9a14a7a999b9559
SHA2563e176836ee83e54de2664cd6ec29c95f5cb6deb35b6a551d8aa1b8e2eaef4f9f
SHA5125c63468ad7be56fbda974691f37e1c129095678f6c87081b420eff3e7a98d02c78f30e572f4602dddeb9c861fabf4c4d245b3a1f5e6bf40d17f8e76a451a0e3f
-
Filesize
2.0MB
MD5c724e4b7282242f986fc7c3676822ed7
SHA1b39e0393ec9b53a1f4c61d3ad43b177203eb8da2
SHA2568e42ed888257f851a283c3b0a00213ffbe29e843a23ebbbb81b054a632bb0144
SHA51276bf81e6ff896ab38438da0eab707a84ce835fed2b25a1f15f14d8816d22c52c6beb9e2d145899a9c7b44ca51909984732efb55e088d27f23f187629e07074fb
-
Filesize
625KB
MD504076eaa8ce7ad669b3a4b4265f0f12b
SHA15927e358637c0eb0e0872cf009b5b20dbf3ec425
SHA2564cfd9a66719c23e921d35d40144d129d5a27e51d9817014376f736abb47104e1
SHA512b072163be11825c8a87dcdc5f28615879bf91d777485fa94cdd7fb517b32880b78057e0e9964d1c9bf0aa9ba864838da2a5ec158a80c2adbc3a4992d04eba196
-
Filesize
818KB
MD5c01631047bbf65cbee389e65d07ca4ce
SHA1eb32f11ed4db759af856dcd160424284c1c694f2
SHA256b0dba40a05becfdb9377fb2d342065522a4f529a8db79da24bfc49f909259291
SHA5124288c56d684ec6106b7b8c62dcc5850dfcc789f1413ca4945679c186b5afd50da6d5ffdd6f668315d58c7ab99956f3d99e3b0fac953277c240051fb8d1d8e429
-
Filesize
487KB
MD5b9050924c4132eb027dc1cbb8cf95680
SHA1c29b035ade17339db5906def3b5dbdcfd424085c
SHA25681991aa81fe810e2c197184d363d89c48f012267f46da3689947ca2b8701aa12
SHA5124e82108b1c857a32c3a04ed8e6242f2cfec5d53d086076582711ac37ff6e96a96c6a07c71ce39914055bb09ef5bdbfa18d5c348b816ee1826cf85f1428004133
-
Filesize
1.0MB
MD5e5567bbb604f46f1c9217ba91acc24b0
SHA1a11e9bfda7d4e6aa17393bc3f134cb35f9618b9c
SHA256bc3fcedf67868e5a15fecb79bd1c912b2e67561969bf9513bb681bff251a76fd
SHA5128ac59973c201f431c7481c3a8eb3fac93cf3dacd98762aded99b00c6754e9ccd93a141c669593f2584f209d9791eb844c2be4933727ad33949f83e73e6e2e873
-
Filesize
489KB
MD599fd8a5df7a1b58de23a663d6d0ad58f
SHA1849d8303a46a37b5a1ab3432b11fdbfa62da7beb
SHA256eff351f276a696e953be047f1c5a842f2bf68555855393a44a41e597a9503d94
SHA5121fe0956e72905beafdee2ef2d2755312378880449338aeb0e14f06db1ee7957513fe1ec2e2e01f3ba74ef6825e212a074ecb91f7797362134f7e38df19474eff
-
Filesize
540KB
MD5deff835a0702662fe05d0296f77926af
SHA11c88221b54414e76ecdfc4b3ae67f04730b9d63c
SHA256d16448d9899ca9d499be78b60001d653a999a55b5f152e91ccec1cbc0b8f20ea
SHA5126dca2cfbe8a088d6ad543489ee8773b6c9fc73361bdfb5039cbd523611e064543de170c5b370d4e4ba0fd5a94b083480a8a72598b218e3e5da710125634b380c
-
Filesize
463KB
MD52ad235c20bab26a19ea6348c767bc87d
SHA14bdf4896d832f16207fb514179ca381ef6e0618f
SHA256802a99397ca2b9054285f7220c4d81e79048a8119b09df932167030f1a4e80ea
SHA51265c66e0132583f47c42d10329cd805a7175ef14984048ea71cce6eede87070b2c355e196961e8e2a6847ad46220400d68b151c91d9db01564ac5be62f046421f
-
Filesize
193KB
MD5805418acd5280e97074bdadca4d95195
SHA1a69e4f03d775a7a0cc5ed2d5569cbfbb4d31d2d6
SHA25673684e31ad4afe3fdc525b51ccaacc14d402c92db9c42e3fcbfe1e65524b1c01
SHA512630a255950c0ae0983ae907d20326adea36ce262c7784428a0811b04726849c929bc9cea338a89e77447a6cec30b0889694158327c002566d3cf5be2bb88e4de
-
Filesize
1.1MB
MD53be1853cad54cdb056db2c6f2794e63b
SHA1a842ec1c02c9f896f92ea8b4e9c2c20cd8605d99
SHA2569a968c0eec6c7f3727a47a9336ee66ffcb1a112a741d33a26fd8a41b349c1602
SHA5120f0e485441d0104ccb812ce7d6436f1ee2f884d25acb7a72955321332ece5b24b661f7b2d7ef65a2411a0fe1436512df1b6953d1c3e7f454d0172da655fb7d5a