Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-01-2025 05:47
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe
-
Size
959KB
-
MD5
4964e20c78ec9af68bac8a4684fa1b86
-
SHA1
ce11c2a1775b1fc300bdf5caae2fd3e3a654dab1
-
SHA256
b98b4a58ffc62e2300baa88e627c709a0b8a2eaecfecabe9f93a6b3db4902b23
-
SHA512
9a284ba56e8e1a226179e88a49ff7e9a5b361bbc845aed4beb38e2aca81d7313270d2f9a75760106a0043aba83aabd3c33be18bb1ac2756e03f2a641988748f7
-
SSDEEP
24576:vPfAPgUYrPXPWeB7S53PW6DmIUVPulHTb9OLf:vXAqrP/WH5/WUmIUVWVTb9OL
Malware Config
Signatures
-
Disables taskbar notifications via registry modification
-
Executes dropped EXE 9 IoCs
pid Process 892 alg.exe 3944 DiagnosticsHub.StandardCollector.Service.exe 536 fxssvc.exe 2404 elevation_service.exe 1780 elevation_service.exe 3604 maintenanceservice.exe 4828 msdtc.exe 1996 msiexec.exe 924 TrustedInstaller.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\S-1-5-21-3350944739-639801879-157714471-1000 alg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\S-1-5-21-3350944739-639801879-157714471-1000\EnableNotifications = "0" alg.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 42 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: alg.exe File opened (read-only) \??\O: alg.exe File opened (read-only) \??\Q: alg.exe File opened (read-only) \??\Z: alg.exe File opened (read-only) \??\G: JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened (read-only) \??\J: JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened (read-only) \??\L: JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened (read-only) \??\N: JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened (read-only) \??\Q: JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened (read-only) \??\M: alg.exe File opened (read-only) \??\W: alg.exe File opened (read-only) \??\X: alg.exe File opened (read-only) \??\W: JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened (read-only) \??\Z: JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened (read-only) \??\I: alg.exe File opened (read-only) \??\S: alg.exe File opened (read-only) \??\T: alg.exe File opened (read-only) \??\Y: alg.exe File opened (read-only) \??\I: JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened (read-only) \??\R: JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened (read-only) \??\V: JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened (read-only) \??\E: alg.exe File opened (read-only) \??\P: alg.exe File opened (read-only) \??\U: alg.exe File opened (read-only) \??\V: alg.exe File opened (read-only) \??\K: JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened (read-only) \??\L: alg.exe File opened (read-only) \??\P: JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened (read-only) \??\T: JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened (read-only) \??\K: alg.exe File opened (read-only) \??\N: alg.exe File opened (read-only) \??\O: JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened (read-only) \??\X: JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened (read-only) \??\G: alg.exe File opened (read-only) \??\Y: JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened (read-only) \??\H: alg.exe File opened (read-only) \??\R: alg.exe File opened (read-only) \??\E: JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened (read-only) \??\H: JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened (read-only) \??\M: JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened (read-only) \??\S: JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened (read-only) \??\U: JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification \??\c:\windows\syswow64\perfhost.exe JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened for modification \??\c:\windows\system32\snmptrap.exe JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File created \??\c:\windows\system32\openssh\ejojiioc.tmp JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened for modification \??\c:\windows\system32\Agentservice.exe JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened for modification \??\c:\windows\system32\lsass.exe JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened for modification \??\c:\windows\system32\snmptrap.exe alg.exe File opened for modification \??\c:\windows\system32\msiexec.exe alg.exe File opened for modification \??\c:\windows\system32\vssvc.exe JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened for modification \??\c:\windows\system32\sgrmbroker.exe alg.exe File opened for modification \??\c:\windows\system32\alg.exe JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File created \??\c:\windows\system32\ldphlegg.tmp JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened for modification \??\c:\windows\system32\fxssvc.exe alg.exe File opened for modification \??\c:\windows\system32\wbengine.exe alg.exe File opened for modification \??\c:\windows\system32\locator.exe JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened for modification \??\c:\windows\system32\sensordataservice.exe JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened for modification \??\c:\windows\system32\tieringengineservice.exe JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File created C:\Windows\System32\WindowsPowerShell\v1.0\dibnpmeg.tmp JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File created \??\c:\windows\system32\jmkofgij.tmp JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened for modification \??\c:\windows\system32\Appvclient.exe alg.exe File opened for modification \??\c:\windows\system32\msiexec.exe JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened for modification \??\c:\windows\system32\Agentservice.exe alg.exe File opened for modification \??\c:\windows\system32\vssvc.exe alg.exe File created \??\c:\windows\system32\perceptionsimulation\eoqlnkiq.tmp JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File created \??\c:\windows\system32\cpnjfeip.tmp JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File created \??\c:\windows\system32\opkdigcn.tmp JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File created \??\c:\windows\system32\diagsvcs\fjobmcmd.tmp JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File created \??\c:\windows\system32\fajgdinb.tmp JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File created \??\c:\windows\system32\ohadbplo.tmp JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened for modification \??\c:\windows\system32\vds.exe JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened for modification \??\c:\windows\system32\wbem\wmiApsrv.exe JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File created \??\c:\windows\system32\wbem\fclijieo.tmp JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened for modification \??\c:\windows\system32\Appvclient.exe JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened for modification \??\c:\windows\system32\diagsvcs\diagnosticshub.standardcollector.service.exe JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened for modification \??\c:\windows\system32\openssh\ssh-agent.exe JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened for modification \??\c:\windows\system32\wbengine.exe JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened for modification \??\c:\windows\system32\svchost.exe alg.exe File opened for modification C:\Windows\system32\MSDtc\MSDTC.LOG msdtc.exe File opened for modification \??\c:\windows\system32\dllhost.exe alg.exe File created \??\c:\windows\system32\ihaacgih.tmp JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File created \??\c:\windows\system32\bcqbbalh.tmp JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened for modification \??\c:\windows\system32\dllhost.exe JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File created \??\c:\windows\system32\ijfehcge.tmp JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened for modification \??\c:\windows\syswow64\perfhost.exe alg.exe File opened for modification \??\c:\windows\system32\wbem\wmiApsrv.exe alg.exe File created \??\c:\windows\system32\lgjjbdka.tmp JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened for modification \??\c:\windows\system32\spectrum.exe JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File created \??\c:\windows\system32\ebcgahfg.tmp JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened for modification \??\c:\windows\system32\svchost.exe JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened for modification \??\c:\windows\system32\lsass.exe alg.exe File created \??\c:\windows\system32\gaojoljf.tmp JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\mlmdmhdm.tmp JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened for modification \??\c:\windows\system32\perceptionsimulation\perceptionsimulationservice.exe JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File created \??\c:\windows\system32\anjbejqj.tmp JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened for modification C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened for modification \??\c:\windows\system32\msdtc.exe alg.exe File opened for modification \??\c:\windows\system32\openssh\ssh-agent.exe alg.exe File opened for modification \??\c:\windows\system32\searchindexer.exe JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened for modification \??\c:\windows\system32\tieringengineservice.exe alg.exe File created \??\c:\windows\syswow64\mibqicok.tmp JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened for modification \??\c:\windows\system32\spectrum.exe alg.exe File created \??\c:\windows\system32\llepkjfh.tmp JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened for modification \??\c:\windows\system32\perceptionsimulation\perceptionsimulationservice.exe alg.exe File opened for modification \??\c:\windows\system32\locator.exe alg.exe File opened for modification \??\c:\windows\system32\searchindexer.exe alg.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\7-Zip\jgpijieg.tmp JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File created C:\Program Files\Common Files\microsoft shared\VSTO\10.0\jkgaipki.tmp JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\clmaedbq.tmp JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File created C:\Program Files\Internet Explorer\dendjgfp.tmp JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File created C:\Program Files\Java\jdk-1.8\bin\pppjqpbi.tmp JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File created C:\Program Files\Java\jdk-1.8\bin\knkmmeba.tmp JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javac.exe JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javap.exe JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File created \??\c:\program files\common files\microsoft shared\source engine\bjjfajgg.tmp alg.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\qndpgeoq.tmp JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened for modification C:\Program Files\7-Zip\7z.exe alg.exe File created C:\Program Files\Common Files\microsoft shared\ink\kgacdccg.tmp JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\chrome_pwa_launcher.exe JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javah.exe JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\occlljkq.tmp JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\miqfjfol.tmp JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java-rmi.exe JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened for modification \??\c:\program files\google\chrome\Application\123.0.6312.123\elevation_service.exe alg.exe File created C:\Program Files\dotnet\ddnfppgh.tmp JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javadoc.exe JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File created C:\Program Files\Java\jdk-1.8\bin\iilmmhmc.tmp JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\lhbjhkab.tmp JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened for modification \??\c:\program files\windows media player\wmpnetwk.exe JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\mip.exe JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\createdump.exe JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened for modification C:\Program Files\Internet Explorer\ExtExport.exe JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File created C:\Program Files\Internet Explorer\hfoijjjp.tmp JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\TabTip.exe JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\createdump.exe JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\obkakffi.tmp JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File created C:\Program Files\Java\jdk-1.8\bin\cobmhpje.tmp JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java.exe JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File created C:\Program Files\Java\jdk-1.8\bin\ifpcoece.tmp JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened for modification \??\c:\program files (x86)\microsoft\edge\Application\92.0.902.67\elevation_service.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\jmofaklb.tmp JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaw.exe JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe alg.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\pijgofaf.tmp JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened for modification \??\c:\program files (x86)\mozilla maintenance service\maintenanceservice.exe JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe alg.exe File created C:\Program Files\Google\Chrome\Application\elidehmc.tmp JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened for modification C:\Program Files\Internet Explorer\ieinstal.exe JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File created C:\Program Files\Java\jdk-1.8\bin\onbaidqf.tmp JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File created C:\Program Files\Common Files\microsoft shared\ink\hhfjjgab.tmp JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe alg.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened for modification \??\c:\program files (x86)\google\update\googleupdate.exe JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened for modification C:\Program Files\dotnet\dotnet.exe JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File created \??\c:\program files\windows media player\okqmkjco.tmp JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File created C:\Program Files\Common Files\microsoft shared\ink\olemadei.tmp JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\idlj.exe JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File created \??\c:\program files (x86)\mozilla maintenance service\jhihokda.tmp JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened for modification \??\c:\program files\common files\microsoft shared\source engine\ose.exe alg.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\chrmstp.exe JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File created C:\Program Files\7-Zip\gkooamha.tmp JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File created C:\Program Files\Common Files\microsoft shared\MSInfo\jfjkgccl.tmp JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe -
Drops file in Windows directory 8 IoCs
description ioc Process File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\wpf\presentationfontcache.exe alg.exe File opened for modification C:\Windows\DtcInstall.log msdtc.exe File opened for modification \??\c:\windows\servicing\trustedinstaller.exe alg.exe File opened for modification \??\c:\windows\servicing\trustedinstaller.exe JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File created \??\c:\windows\servicing\eknnmdek.tmp JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe File created C:\Windows\Logs\CBS\CBS.log TrustedInstaller.exe File opened for modification C:\Windows\Logs\CBS\CBS.log TrustedInstaller.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\wpf\presentationfontcache.exe JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1130 = "Microsoft Modem Device Provider" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1134 = "Microsoft Routing Extension" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1131 = "Route through e-mail" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1132 = "Store in a folder" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1133 = "Print" fxssvc.exe -
Suspicious behavior: EnumeratesProcesses 40 IoCs
pid Process 892 alg.exe 892 alg.exe 892 alg.exe 892 alg.exe 892 alg.exe 892 alg.exe 892 alg.exe 892 alg.exe 892 alg.exe 892 alg.exe 892 alg.exe 892 alg.exe 892 alg.exe 892 alg.exe 892 alg.exe 892 alg.exe 892 alg.exe 892 alg.exe 892 alg.exe 892 alg.exe 892 alg.exe 892 alg.exe 892 alg.exe 892 alg.exe 892 alg.exe 892 alg.exe 892 alg.exe 892 alg.exe 892 alg.exe 892 alg.exe 892 alg.exe 892 alg.exe 892 alg.exe 892 alg.exe 892 alg.exe 892 alg.exe 892 alg.exe 892 alg.exe 892 alg.exe 892 alg.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 648 Process not Found 648 Process not Found -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 1364 JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe Token: SeAuditPrivilege 536 fxssvc.exe Token: SeTakeOwnershipPrivilege 892 alg.exe Token: SeSecurityPrivilege 1996 msiexec.exe -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer alg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" alg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4964e20c78ec9af68bac8a4684fa1b86.exe"1⤵
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1364
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:892
-
C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeC:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe1⤵
- Executes dropped EXE
PID:3944
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:1036
-
C:\Windows\system32\fxssvc.exeC:\Windows\system32\fxssvc.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:536
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵
- Executes dropped EXE
PID:2404
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"1⤵
- Executes dropped EXE
PID:1780
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
PID:3604
-
C:\Windows\System32\msdtc.exeC:\Windows\System32\msdtc.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:4828
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1996
-
C:\Windows\servicing\TrustedInstaller.exeC:\Windows\servicing\TrustedInstaller.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:924
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5aae541f66f8d7cfba778118461db1c2f
SHA155a1ea360843a3fa734a6528ea584beef3b0b9ec
SHA2563a5312c3ed20e743f26d29cb33486f88037160e8f905f87cad957e21879bdfe2
SHA51231e5f2343140fc6c6dc989b82200f6c77621d83eb4bac0db56996a6bba697c29e0aadb478c6a687e616b702ac443aa3cdd995bf694d08a5d1cd2a140b2401a34
-
Filesize
621KB
MD56eb5c3b327142ffd8658c55162116561
SHA1f0218c95c61d34b1cc6e5592e87012965afedbd2
SHA256b1c3fd523157c49594235a18962b744fe8e3f4cc2234f3b359b6891090a67ec3
SHA5128a81de3ced99918542b19133ba6a5f1d425d1392212b8a00f42d4e9d5a7dfe0c2be92cb7a44fb4211c34af51379d671418efb88202ae61ff67d6a45f24a11581
-
Filesize
940KB
MD56ccaf6110363badae2e65aea9d36857b
SHA1e302e8d257e48b5aef25bc140090484dca684cd7
SHA2561487b2e229eb776d88e6b6e53f187e3dabb299819895dae6b93277897460f976
SHA51271a71809a78a804a24681a0dab19db732d2fd636bcec5d65d26996b2a82959cb3dfc44b97e9aeedc4aa8d8825757032c7f1f33a63b6708537e08d82c5d5bcefc
-
Filesize
1.3MB
MD58c0a85296ac879a406a9ddeb1737013c
SHA18dd0abf3b100744c0226ebcec5e4c7cc3a2560ab
SHA256fc40271942719eec4a5a2603eba2430e72c15d76a73b45636579d0b4dd0e2963
SHA512ebf941f864d5978565a363ecf23462f0ea747b7d5b7be6c86b25fcfdb5076677918fba2f48f74b361a2a24105806d3c9723b3c93d2be1fdd46921cd0f2c1373d
-
Filesize
1.1MB
MD5f90aab78c63f7af86d51b8021b68dcec
SHA10792ec85079ce8d92a14e808c569a5dd350e2b3a
SHA2565d7f1932d4a790e45078b71ee64354bd2adfed399262c08a0a9bf5943158f4af
SHA512c26bc995a680ff4d9fe15d37c128d5d0671b1757f443d8fcaabd7a0bc6514cf2e60af34a6ebfd08baa54e592d9ab741e050863cb04d633ac0a39ffcbe339652f
-
Filesize
410KB
MD5f66ebc15ef94582ef3d8cd0fba4eaca3
SHA1a8ff1098c01b8279870c7663f86e7f709a122cae
SHA2560b8f9a72413675dec4abf3d946644a0f768db386f11615903e8bc3bf1866a314
SHA512f2d4af61311b189d32f4e932f161d8a35c3c7804db8e4d112910661524f61fd75cfa72c25e115da6d56ae5370758fe24473f36443c9620aca6cd4fa69215a0f4
-
Filesize
672KB
MD5b568caa36e5947581a9720dae971afe7
SHA1b104cc36db5b4db1b7f9c2edbcddb140282f061d
SHA256b123e061a2c9d9c3a7722d1181a86f3e699c15ce5fe269a67b873234865844a2
SHA51259f3281a052a63e4e633020d9db14122788aacb26249a4b43d639aa45d93be40cd98ef00e24be20642a08943464755e5de1ce0e7b038305fe51cb360cbfdc1ea
-
Filesize
4.5MB
MD52ef251de30742387ee54d99215e7c0d8
SHA1703850acb2f39380b69fa8312b994c12cb3d32fc
SHA256c1f58047f8490b7209ebf8dccf383ad380aff8a6775bf14f0eb9dfc14f39dfba
SHA5121bcf5839c0fd5ece7866b4b0404168f1fe1c2644d349e9a40ac693d8cb51bac1c4522c2a3d949b333afe0c6850f296b7ebe5d787f0fd717754000aa38a10737f
-
Filesize
738KB
MD5fdfc4a1320310719ca5335e58c5972ed
SHA15d0765964c3a0433efcbe40cb3ae9682922f9f6a
SHA2568036a74a98ed099389fc7682c11fac41171d17bdb7d0f16cac2e12585bd846ed
SHA512a62370c0f68f144a8eff429c4cd308c346f3901e8a41c96a78b301acf8af40b5bfd5813e0bc1f3b2ecbe817bab42db1e72d2f977638f5e17896d3f61f634e67d
-
Filesize
23.8MB
MD537576d0f8af3e7f93e8b5db968306b75
SHA13d6fb60acb99c5dc76ef480bfe9097899bad3b4e
SHA256ca8111ba79f9f5c65bab25c82c14020985bee40bda97cd6789ffce24ee532185
SHA51211eddffc3cb8fb45b34c660a2c0ea9247ae6ba87051df589aedb854a91910b82cdf3da2bb8177e89e48e925c9871e4bad0419102fbc3f65b82f942126b825b62
-
Filesize
2.5MB
MD5a21750f4b43b346d322d7fde343aefe2
SHA1f47a6263ac0ee670b6e2293675fa4aff5070c53e
SHA256147e9cab3f0c3c60d40cd0bef7792b20e9e3edc9520678dfcdb87364ac9c99d1
SHA5127e195356e0f0a751c42dff719a7ae87069eb71d9ec6199808d61dd71dab1955e22145d1f5d253a5968ae524909209b3f977820a06df3883c0a5ba5fb3b1d31f3
-
Filesize
637KB
MD5c3c01c7aded8e3d803465eb505f7ad46
SHA16710fd217607ba4f07f6064008da1b9b781a93f6
SHA256ac9905c9b4f3920932af310e63e2ed7fa73d28ff24237295ee6555e4e574a258
SHA512d3ac339d17188f3e04bbcde45c824de03fca4c6f17be45ede3e5cc6e0af0caf0f07ed75cb6e42f023de87fcf3dc2aaf5fcfdd3cef7f8dbe6647c5846afdc2afa
-
Filesize
2.0MB
MD555e60e4dab3a026ff15d8a33fc67f564
SHA13009af023d76739de13550d8482ef86924e3ddfc
SHA2564cebff1d8aafa86beabf08f041dcba746576a64d9071ba1ef6779febe1e0f2fc
SHA5122d424a47037df23f69310579d7f802f6e8c8082ccb628d3e71b69a81ea637a7b6d52e2d3290c9831a97039b37a910f25f051732f12315de8d4c0d2130096028e
-
Filesize
678KB
MD5665b8afd15ec230f839660dc8c4d0490
SHA1d1c9491bb0c918ab729be40bcec48e37cf28313f
SHA25611295a5864428628160c4527828a7295d90e7342f642fd9f71c5d508f1a5811c
SHA51278f8664ca5718a86707db474fd7da17cb2bfa1e83e836387f3efbb086919f7f89fb96343cc04214a46f754298a0d1eca221680561fcc7c62ba99e306e451bb83
-
Filesize
487KB
MD5f4a774c2b09f9394029beec25906d5dd
SHA170cf6ddfeebc665d3d7bef13da8b8d9b329ecdbf
SHA2563bd91f4d8e3577a3ccf2f2f69407608291acdb3c643fde0e0e441fde50574fba
SHA5126465f17f0b4bb40b6fc9074a022b6ad5d7e50f20a13faa0ab817fbd23606a433176b134a2adbd6c0a0930590a8a49d9bd2b4297793b5600e2c75bee03c2ae5a7
-
Filesize
1.0MB
MD5ebb79fc214377ee8df4bd6e999b396c4
SHA149ad9600c40918ee58d3c575c14d02e6cc73c163
SHA256b26ecc08740f3bbc0accad7e4845452d2c130ae32b2a7feca970977c8aafcdb7
SHA512609290737bcae7c07d6a292802ba6ee84e437e8e66f91984d72c479e9f19e44dc3c60b4e595243113047af6f68aaf63c2ef96704d1922898c734a2732a4c6690
-
Filesize
489KB
MD52481ef5f972d2b0b657d59f6d3ae7e89
SHA1a416a0c94e30401da2bf8699f32a7ccecfda3845
SHA2569bf41d8bba76f1a8d09eda1be6c41b6308cd9e3e0c55e5a5fc40e6deeb48181b
SHA512e5d41cfe52f55bb9ece18efb8667fd721bdd91f48b74247acad2661ec3f9e2d63c4995a789bf5e9b4ba34ee6ab00fb0d77c44cc0c39e4c7f397b6e9838ebb1cd
-
Filesize
540KB
MD5b0067341b2bebad0b0b35319d128e5b9
SHA1cc829983715596985c01281c4187a0a9979eeda6
SHA256e042652443bd97e44c97194629104a1649c5958846a36ad01f8d2f035cf1f41f
SHA512d8510d827c6c5d91ade6afc7598aa001ba8a54ea826f9850106e93fbee330da5ca5f66a0b746b5cfcd4ac0ee7c44bc0949f6c3532efb32e22074809013f5e592
-
Filesize
193KB
MD5805418acd5280e97074bdadca4d95195
SHA1a69e4f03d775a7a0cc5ed2d5569cbfbb4d31d2d6
SHA25673684e31ad4afe3fdc525b51ccaacc14d402c92db9c42e3fcbfe1e65524b1c01
SHA512630a255950c0ae0983ae907d20326adea36ce262c7784428a0811b04726849c929bc9cea338a89e77447a6cec30b0889694158327c002566d3cf5be2bb88e4de
-
Filesize
463KB
MD50a8050ed359429fde4c49b2ba66dd780
SHA16b15475632e6de552fb036fbd04f84491aed60fb
SHA2561bfc8b7ff145053c0c8418858728d950310cb9d865b06af3403936e34064da00
SHA512dc40c4a56da7ec86c1128ca6973c88da175e1af603935da82164b41c2dc267d77b32735814cdbcb0fcf5b417ed018489d5fa8def4ff955e5ab0d03a2a5d7e77c
-
Filesize
1.1MB
MD5cab600eb2b610ab79b2b90f62b874662
SHA1ac00db8e20b1e7bf38e4660aa15e1e77ab97ddf5
SHA2565f7b7fe795605e7ef11a995e90b48e81411a9f3748f82addfd21a8c9158a2585
SHA5123b8900889bd476997d593c89e808f471083676732476449c57494ee6a0deeadd00375584cf1bdba1134a894ea88d657752bccc622c4ba390d6cb3709741b9679