Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2024, 21:23
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe
-
Size
406KB
-
MD5
37bbed81fc35bf98cd3cf874119b9604
-
SHA1
9fbc0c9af3393a2c67083291112fb624e535b460
-
SHA256
fc086c346144e6cf4415a81a7e9cbccdb50f820d8440df8e4460b9627b1f52eb
-
SHA512
1b8cbc0018204113caca12a05fb2d6e491174411e9561935ecc4ca69bd1e00f7710966d3c7975b64c6dfb0535c7ecb67fef0bccaaa874845fc26430ed70af903
-
SSDEEP
6144:5Izfx0tsmxGjd9suGjZIDhAJSbnVrw8/LppZ2oqIqOEhspJ:UfqOwGTlWuN0Qrw62obqap
Malware Config
Signatures
-
Expiro family
-
Expiro payload 5 IoCs
resource yara_rule behavioral2/memory/4376-0-0x0000000000E1A000-0x0000000000EAD000-memory.dmp family_expiro1 behavioral2/memory/4376-1-0x0000000000DB0000-0x0000000000EAD000-memory.dmp family_expiro1 behavioral2/memory/4376-2-0x0000000000E1A000-0x0000000000EAD000-memory.dmp family_expiro1 behavioral2/memory/4376-4-0x0000000000DB0000-0x0000000000EAD000-memory.dmp family_expiro1 behavioral2/memory/4376-5-0x0000000000DB0000-0x0000000000EAD000-memory.dmp family_expiro1 -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 8 IoCs
pid Process 524 alg.exe 3960 DiagnosticsHub.StandardCollector.Service.exe 2888 fxssvc.exe 2844 elevation_service.exe 2320 elevation_service.exe 3760 maintenanceservice.exe 2640 msdtc.exe 4896 msiexec.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\S-1-5-21-3227495264-2217614367-4027411560-1000 alg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\S-1-5-21-3227495264-2217614367-4027411560-1000\EnableNotifications = "0" alg.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 42 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\S: JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened (read-only) \??\E: alg.exe File opened (read-only) \??\H: alg.exe File opened (read-only) \??\I: alg.exe File opened (read-only) \??\K: alg.exe File opened (read-only) \??\Q: alg.exe File opened (read-only) \??\U: alg.exe File opened (read-only) \??\Q: JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened (read-only) \??\V: JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened (read-only) \??\X: JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened (read-only) \??\Z: JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened (read-only) \??\J: alg.exe File opened (read-only) \??\T: alg.exe File opened (read-only) \??\G: JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened (read-only) \??\Y: JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened (read-only) \??\O: alg.exe File opened (read-only) \??\M: JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened (read-only) \??\R: alg.exe File opened (read-only) \??\X: alg.exe File opened (read-only) \??\E: JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened (read-only) \??\H: JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened (read-only) \??\J: JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened (read-only) \??\P: JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened (read-only) \??\M: alg.exe File opened (read-only) \??\N: JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened (read-only) \??\R: JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened (read-only) \??\W: JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened (read-only) \??\G: alg.exe File opened (read-only) \??\L: JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened (read-only) \??\T: JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened (read-only) \??\L: alg.exe File opened (read-only) \??\N: alg.exe File opened (read-only) \??\P: alg.exe File opened (read-only) \??\S: alg.exe File opened (read-only) \??\Z: alg.exe File opened (read-only) \??\I: JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened (read-only) \??\U: JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened (read-only) \??\V: alg.exe File opened (read-only) \??\W: alg.exe File opened (read-only) \??\Y: alg.exe File opened (read-only) \??\K: JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened (read-only) \??\O: JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification \??\c:\windows\system32\Appvclient.exe alg.exe File opened for modification \??\c:\windows\system32\lsass.exe alg.exe File opened for modification \??\c:\windows\system32\Agentservice.exe alg.exe File opened for modification \??\c:\windows\SysWOW64\lsass.exe JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened for modification \??\c:\windows\system32\Appvclient.exe JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened for modification \??\c:\windows\SysWOW64\dllhost.exe JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened for modification \??\c:\windows\system32\msdtc.exe JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened for modification \??\c:\windows\SysWOW64\snmptrap.exe JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened for modification \??\c:\windows\SysWOW64\vssvc.exe JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened for modification \??\c:\windows\SysWOW64\wbengine.exe JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened for modification \??\c:\windows\system32\wbem\wmiApsrv.exe JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened for modification \??\c:\windows\SysWOW64\svchost.exe JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened for modification \??\c:\windows\system32\msiexec.exe alg.exe File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened for modification \??\c:\windows\SysWOW64\fxssvc.exe JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened for modification \??\c:\windows\system32\svchost.exe alg.exe File opened for modification \??\c:\windows\system32\locator.exe alg.exe File opened for modification \??\c:\windows\system32\searchindexer.exe alg.exe File opened for modification \??\c:\windows\system32\spectrum.exe JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened for modification \??\c:\windows\SysWOW64\vds.exe JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened for modification \??\c:\windows\SysWOW64\alg.exe JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened for modification \??\c:\windows\system32\vds.exe alg.exe File opened for modification \??\c:\windows\SysWOW64\locator.exe JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened for modification \??\c:\windows\SysWOW64\spectrum.exe JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened for modification \??\c:\windows\system32\tieringengineservice.exe JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened for modification \??\c:\windows\system32\vssvc.exe JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened for modification \??\c:\windows\system32\wbengine.exe JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened for modification \??\c:\windows\SysWOW64\searchindexer.exe JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File created \??\c:\windows\system32\diagsvcs\nogghoeg.tmp JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened for modification \??\c:\windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened for modification \??\c:\windows\SysWOW64\msdtc.exe JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened for modification \??\c:\windows\SysWOW64\sgrmbroker.exe JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File created \??\c:\windows\system32\chcgeajk.tmp JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File created \??\c:\windows\system32\dldbajjf.tmp JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened for modification \??\c:\windows\system32\dllhost.exe JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File created \??\c:\windows\system32\mheigfnf.tmp JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened for modification \??\c:\windows\system32\wbem\wmiApsrv.exe alg.exe File opened for modification \??\c:\windows\SysWOW64\msiexec.exe JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened for modification \??\c:\windows\system32\locator.exe JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\cmgnbmba.tmp JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened for modification \??\c:\windows\system32\svchost.exe JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened for modification \??\c:\windows\system32\lsass.exe JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File created \??\c:\windows\system32\jhmmlmhb.tmp JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened for modification \??\c:\windows\system32\sensordataservice.exe alg.exe File created \??\c:\windows\system32\fhanqipa.tmp JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File created \??\c:\windows\system32\opeabfjd.tmp JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened for modification \??\c:\windows\system32\perceptionsimulation\perceptionsimulationservice.exe JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened for modification \??\c:\windows\SysWOW64\perfhost.exe JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File created \??\c:\windows\system32\gkpggkog.tmp JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File created \??\c:\windows\system32\lcdgpinf.tmp JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened for modification \??\c:\windows\SysWOW64\Agentservice.exe JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened for modification \??\c:\windows\SysWOW64\sensordataservice.exe JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened for modification \??\c:\windows\SysWOW64\tieringengineservice.exe JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened for modification \??\c:\windows\system32\WindowsPowerShell\v1.0\powershell.exe JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File created \??\c:\windows\system32\WindowsPowerShell\v1.0\omppjohf.tmp JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened for modification \??\c:\windows\system32\spectrum.exe alg.exe File created \??\c:\windows\system32\dnpkjmed.tmp JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened for modification \??\c:\windows\SysWOW64\openssh\ssh-agent.exe JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened for modification \??\c:\windows\system32\openssh\ssh-agent.exe JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File created \??\c:\windows\system32\pdnkcoaf.tmp JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened for modification \??\c:\windows\system32\vds.exe JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened for modification \??\c:\windows\SysWOW64\wbem\wmiApsrv.exe JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened for modification \??\c:\windows\system32\msiexec.exe JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened for modification \??\c:\windows\SysWOW64\perceptionsimulation\perceptionsimulationservice.exe JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened for modification C:\Program Files\dotnet\dotnet.exe JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File created C:\Program Files\Java\jdk-1.8\bin\pppjqpbi.tmp JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened for modification \??\c:\program files\google\chrome\Application\123.0.6312.123\elevation_service.exe JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\hlepeenn.tmp JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File created C:\Program Files\Java\jdk-1.8\bin\onbaidqf.tmp JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe alg.exe File opened for modification C:\Program Files\Internet Explorer\ieinstal.exe JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File created C:\Program Files\Internet Explorer\kjkookie.tmp JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File created C:\Program Files\Java\jdk-1.8\bin\dddilmae.tmp JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File created \??\c:\program files\windows media player\fpjfeqkb.tmp JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\TabTip.exe JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File created C:\Program Files\Common Files\microsoft shared\MSInfo\jfjkgccl.tmp JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jabswitch.exe JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File created C:\Program Files\7-Zip\gkooamha.tmp JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe alg.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\lhbjhkab.tmp JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\LICLUA.EXE JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ShapeCollector.exe JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\createdump.exe JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File created \??\c:\program files (x86)\microsoft\edge\Application\92.0.902.67\kidimkcp.tmp JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened for modification \??\c:\program files\windows media player\wmpnetwk.exe alg.exe File opened for modification \??\c:\program files\windows media player\wmpnetwk.exe JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java-rmi.exe JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened for modification \??\c:\program files (x86)\microsoft\edge\Application\92.0.902.67\elevation_service.exe JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\chrmstp.exe JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jar.exe JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened for modification C:\Program Files\Internet Explorer\iediagcmd.exe JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File created C:\Program Files\Java\jdk-1.8\bin\ekchdkjb.tmp JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File created C:\Program Files\Common Files\microsoft shared\ink\kgacdccg.tmp JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File created C:\Program Files\Common Files\microsoft shared\ink\nnbpngba.tmp JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\createdump.exe JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened for modification \??\c:\program files (x86)\google\update\googleupdate.exe JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\extcheck.exe JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File created C:\Program Files\7-Zip\nccafaqk.tmp JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\cedpmnkl.tmp JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\createdump.exe JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened for modification C:\Program Files\7-Zip\7zG.exe alg.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\notification_helper.exe JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File created \??\c:\program files\google\chrome\Application\123.0.6312.123\pmhgiglh.tmp JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened for modification \??\c:\program files\common files\microsoft shared\source engine\ose.exe alg.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File created C:\Program Files\Java\jdk-1.8\bin\ldcnmoao.tmp JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\mnmjadqg.tmp JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javac.exe JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened for modification \??\c:\program files (x86)\google\update\googleupdate.exe alg.exe File opened for modification C:\Program Files\7-Zip\7z.exe JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\pijgofaf.tmp JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe alg.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\obkakffi.tmp JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\miqfjfol.tmp JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe alg.exe File opened for modification C:\Program Files\Internet Explorer\ielowutil.exe JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File created C:\Program Files\Internet Explorer\hfoijjjp.tmp JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\wpf\presentationfontcache.exe JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\wpf\presentationfontcache.exe alg.exe File opened for modification \??\c:\windows\servicing\trustedinstaller.exe alg.exe File opened for modification C:\Windows\DtcInstall.log msdtc.exe File opened for modification \??\c:\windows\servicing\trustedinstaller.exe JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1131 = "Route through e-mail" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1132 = "Store in a folder" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1133 = "Print" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1130 = "Microsoft Modem Device Provider" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1134 = "Microsoft Routing Extension" fxssvc.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 40 IoCs
pid Process 524 alg.exe 524 alg.exe 524 alg.exe 524 alg.exe 524 alg.exe 524 alg.exe 524 alg.exe 524 alg.exe 524 alg.exe 524 alg.exe 524 alg.exe 524 alg.exe 524 alg.exe 524 alg.exe 524 alg.exe 524 alg.exe 524 alg.exe 524 alg.exe 524 alg.exe 524 alg.exe 524 alg.exe 524 alg.exe 524 alg.exe 524 alg.exe 524 alg.exe 524 alg.exe 524 alg.exe 524 alg.exe 524 alg.exe 524 alg.exe 524 alg.exe 524 alg.exe 524 alg.exe 524 alg.exe 524 alg.exe 524 alg.exe 524 alg.exe 524 alg.exe 524 alg.exe 524 alg.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 664 Process not Found 664 Process not Found -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 4376 JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe Token: SeAuditPrivilege 2888 fxssvc.exe Token: SeTakeOwnershipPrivilege 524 alg.exe Token: SeSecurityPrivilege 4896 msiexec.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3588 OpenWith.exe -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer alg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" alg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_37bbed81fc35bf98cd3cf874119b9604.exe"1⤵
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4376
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3588
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:524
-
C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeC:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe1⤵
- Executes dropped EXE
PID:3960
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:5096
-
C:\Windows\system32\fxssvc.exeC:\Windows\system32\fxssvc.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2888
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵
- Executes dropped EXE
PID:2844
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"1⤵
- Executes dropped EXE
PID:2320
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
PID:3760
-
C:\Windows\System32\msdtc.exeC:\Windows\System32\msdtc.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2640
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4896
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5c0f7a48c956a970f541f60ae58a32c0f
SHA128ece167756efd213ac92421ea191fd2e173c59c
SHA256c711bc98792db8d483e7e93468f3908ba6dc57bd065ea4a78fd7d89c6247f61b
SHA5124fb79dc6f65d1dd5faf30426f47901f5d048a4abb9da37d7a6f87f2583dea425d48ffb8c20df105e0c4aa2c709dad6579d799d09dabe762b586ac14694ec6c0e
-
Filesize
621KB
MD50a8c761b173bb542c688007ed61eeab8
SHA1814c142ec1dd0619228c904b0bb4c62c7d503ac8
SHA2569fbc696d2ca01b12a9a0850f72b53691b81025a7feabfb39df1f31ce9f1bd995
SHA5122c33a4fc1e17ce708ddd70b3c5cac975916990f31b5d68d4d7be47d64cf4feea02945052df1720ff24c717ca7a4d51aee5045a08cada4d14beff49ca0aad0b07
-
Filesize
940KB
MD57399c24d8e44bf37df5ce599007ccb79
SHA1aa8932fe59c7bef1b243e2ee9d29b4091c396e63
SHA2560c71c55879f246ecb1384314f2aaff6d4424709b492e5a12eac33a7acea05c08
SHA512e4a5689d3d65a8bdedcdad0615f4705e86d5bc03e3b25af1ba1495c4600cdd4af79d4104f12c9f0d57ba3f03eb7ad713f5c1a460cd57eee651f0541eefe1088a
-
Filesize
1.3MB
MD5ec8dd481b3f8900c7750176c1082c926
SHA11d6a1ee913ca221ba655303277cabdf4c4e5807d
SHA2568854d70aa23bafc39ed7ec3c567abb13e818ae86fc2de842fc21c179d99eb282
SHA512ddda3320b4a9d9bc289084485aed661ddd02cff498091e5879831159f5ca59c8c55fb96c7393b2eaaeabc6281c14a0edf951a9c10648a4dca5b4ad192839fb7c
-
Filesize
1.1MB
MD56e56ed29d88154cacdb22c18656a4368
SHA181ddd85992e09cb4a4dd8f429b7e808d5929d807
SHA25664004a5557dbc7d956053f087189e5aab41325cea7b57cbd25146e79a52c1790
SHA5121a2fc763051f56544fe2a84a7ec328ee64b0e64b87837f7bdf4d8d931478f95361a693f2e9cf594c11c3b8cfd982fbcc41dfd43db8fd26b0eb98ba5067746b94
-
Filesize
410KB
MD546dfa9d2dd57426ecdc0f7127de9fd43
SHA133976bdcfd52b36b12477da2ede2fc740b33de8a
SHA25637b8e57d841031d909096187614319bfed9fd03fddc1bbe1a34ab6148d4855ee
SHA51206e673cc444eb27fba4679a3f8396ba60b75481f6b02e246a7fdd14041f4dcc718733e95ebb4657ed87dfa4816d13eea328686d4122df03a50d46d8209f82477
-
Filesize
672KB
MD5950110e7a32132108a711a0820c3d24c
SHA1c9551f0a2e9b7b150657c00fc11bedce27151084
SHA256346f2820e6887db7e2c7262e7bac942bcfa3552a962a22717be1c15b496ec3ca
SHA51208fbe5aabbae593bfc3f030c51d6318a7c8047afd1bc6bd57e29ec2450f38da71cac062effd2bf79dc974994b346d50c214782d1c956cbf710903c145baf94ac
-
Filesize
4.5MB
MD53f999d052c4af799e5f52e587a83182b
SHA11c906fe51d93f78604505211ef1f9f0448e20bc9
SHA25615c4eff3fd7bbe4e7d1ee10d29364d36c11b33118d35c1fdbab2d2e12fb36e0a
SHA512ddbf527d9a704ff3603e01be5d2afe97d51ac6d37939f9fac57b594efaad3d0a1cf28ff47f03f75c9a69a56cb238c3ffe80fcc41cc61bbf272f8a63cad8ba955
-
Filesize
738KB
MD5a4b8b318a6bcfa7b4c47401f1e37f31c
SHA1ce78ebb6ead0d3a074a539e7babb612dd587cd1d
SHA256c4728302f0c259d7200e99d3210928b5eef391f5fba41d42eedca151f9265bab
SHA512d6cab7b3c9b533a85dddb75a69069f2ef99bd2b512f8e1f5c098153589fa55e49c3b839e163341446c58c94739bfa2ebfe69e66be64987af946d04098f623052
-
Filesize
23.8MB
MD522fdd6a8bca7f2c39a3b71e8adf6b0ac
SHA1e62236c6f70bd055cbd4754da7ddeb29055d5050
SHA2565c00d51cac84c97bc365400ad4d5230a91c2f338843fcf9ac76321903b77f0ec
SHA5124bca27e4d40ec6031f9082ad29911d61bc9c1fcc7cb59adcadf6d3eaff7377bf5194706f5388eb5aff64e7ff4f1b2ab90e74ec1e7608876a14912ff01b5a04a3
-
Filesize
2.5MB
MD54f29aaa40ece29bbdaeed239505d1aa5
SHA1856dceb77ce4ebefaff96196209f38b85cd91099
SHA256c940240a4d7c67d9d4eb83d29ab4ddf57be04398b3ea07f6b0b1a927a4f7280e
SHA51202a0e1f53bf9cbbaa78af1135f58a71c5301b810c0bab9486dbafe923739afb6a130083d296d14f69a7db3c891b0b21d1d7f0264015b04d5a551f712e5492bd0
-
Filesize
637KB
MD540d9f8f48bd2f6a4ad31441988210cd4
SHA1ac1073625ac2b13f07c836b9dc34bce3951a9b7e
SHA256558e69ea71262c2ec46963e94c909fc443659474074ae046c2cac954a67f23ec
SHA512cd37f4a31b7aad60728f420f6f9b2138d0c3c8cbbac7f9363bc0e24c3a1ee8feaf375ef42a0328ad563dd4306bc81f8009e968d36d3c9a727b3ce618e13fae51
-
Filesize
2.0MB
MD598bd49946138184341029f2269f01896
SHA1bfdd369d0e8360d1ebfd4fb7045878ab6999b7d0
SHA256db9997d52b5bef7355cfe582f78766a0065ad008034ff59c7f58b3bb18837fd1
SHA5127b367660498bee63332164b9a21d84b6d2590958c4d1a253f68069f42654eff4b77d8f2a82ace21aea0cd5bfc7375e21d38cb635a1a6f4b6d81cd695999d0d59
-
Filesize
625KB
MD51bf86bead8581751cd249f5f1559feeb
SHA1b3037f6d4a729b32e9062b442cb6c5828c4eb212
SHA256aad61e709007eeadd16ecb27a5fa494998e3d42f108a4f873fbc10ebb550c040
SHA512fb83191db6806a3029d6fab03b6b111522c9bb963387f7b7979dd53a49a433e055f41e013efaa558d7382cf6d895f77129687f8be6068470ba57fc09b75c9450
-
Filesize
818KB
MD5c5c84f1fd532af5265964f84dc7de0c2
SHA1709b50c54d07446eff2440c028d86324cd20e209
SHA25622d8c85e30ef3f1da15e1c18085139b3c58514e1fd0a7a29efe006b3104dc1c3
SHA512be0cadb60e466c9b39aaea8dcbd43521f71f4a9568914ccf7888a293a529c7c3170aec4f1da068893a555cf4b3ab65b86c69fcb69942116d2e9847f0184c5831
-
Filesize
487KB
MD5b606725b2539b3a96fd82c7c49b04085
SHA13efd7b95eef9214071fd5fdde23700b330223888
SHA2565ac4d2df2a25bff43c9dfcc7089722040c26390c6804515ef7300791cb71b3aa
SHA51264b170bc1313df7f457023c55537b3cf4246c78d16f9b7dcc1412ff64c10b34945f97625e6ddf8da8e8cc3ac7f1e25fe01634b8c8ec3a18cd6d365a28d7cb73e
-
Filesize
1.0MB
MD509bff3e5e8121e07e2198a62e8dea921
SHA1b94f8c014f273bae269fbcb6d77326ad3779a0e0
SHA25661094614fecef4920f6e4c63f41f232ca61f144ecfa8b511a34a7d1099c3d2eb
SHA512182dc6f181118c76fbdd3532a7e7ff6050210a0e66effa44878095cb466b144d0289ec7d163b19e352eb9ac6a72f352d2dd9bed8dcfa88128e40aa4963e1ab06
-
Filesize
489KB
MD5e7687a97e1299afc97328b9575c7ed6d
SHA167e582d8aabd3bb7ed9b95526cdc2e2b663b41e3
SHA256ed501d51d8703501120f35f4a9c0608ac488025e7da49f6c20a8796216bdf321
SHA512bc6f3786198fa79b3071b15a0fb45b779649d27b3d13fe5c77b050c8b00138deef1aa8b2b118e7e6cf9bf6c87226c78dd26d065c760aa167b02fab592c180e68
-
Filesize
540KB
MD541a93abc4df5ec0afeaee59edf6ac27a
SHA137ac3077a2c5d6475932e13a12dc83b47f4db51f
SHA25675aa40be76e10b76c0f53fccc84da42bbcec7de29aab22836ac7ca49b3b67b9c
SHA512d8910bd4d4b2164b7868a76298e5f0a2666754b12fa57c4165609cd036ed87495534b0c003aae8de6999d4b3fba500ce3e19201c49a601a505b4655953396b6c
-
Filesize
463KB
MD5ab5863264dba5f11aeb3fb473290032d
SHA111d272d1d3a521d5541301c549b5080c50ce85dd
SHA2565c28c43c3a90bc4c0cd1f0b364c714ba0e58d9625b1863dffb7a2c85daaa1b5b
SHA51261526df885eacea739b9f83a8f22eb3606f8835377d26ef26c2bddc3b794c28cd0deeebf6b7a38781743c6adba90d7e51e3fab9d26fc43fb6579bd24d797e5a9
-
Filesize
1.1MB
MD520de44641529f608c9bb7936e89fb71d
SHA11ffac1419f41953a88049594bd5a919b6147f24c
SHA256f6087e79bb1dcddd20eaa83c1c048a49e3eb16f6a5664cab1da2da700198f1a0
SHA51252ebe46cad1b61d43da20df37ac171481536224e24570980befa7edfe3134258d82f2dfc01bcc23ac10d7c3a5bc9a3a4a98e57ba1d7c67e727fd2c5770f297a0