Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02/01/2025, 21:42
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe
Resource
win7-20241023-en
General
-
Target
JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe
-
Size
584KB
-
MD5
68641faa6786e4429d6f3517860018f0
-
SHA1
8770001b28aa426b7b3f49e73c70f4159ef296c6
-
SHA256
8787dfcc098108ad52bb166b5864833d076ee0bffe6d24b28095d064970d92dd
-
SHA512
5bb7c5fe328340cb2b4cdbf00fbc6194b70331100b37aa53dcb8e0d57a5cd89d60f30aaf086aafcbc43725e689f43d9da37885c61aacd3a1af6f6a0e8f99fb4f
-
SSDEEP
12288:XzaDEFEc/v92S5iiF3Kmi6Fa/fVeLyzXS6tcZHz4qg:GAFEev9vzZKkF1LyuucZHz4qg
Malware Config
Signatures
-
Expiro family
-
Expiro payload 1 IoCs
resource yara_rule behavioral2/memory/4240-2-0x0000000001000000-0x0000000001251000-memory.dmp family_expiro1 -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 6 IoCs
pid Process 4528 elevation_service.exe 4268 elevation_service.exe 3176 maintenanceservice.exe 1468 OSE.EXE 1492 ssh-agent.exe 1912 TrustedInstaller.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\S-1-5-21-3442511616-637977696-3186306149-1000 elevation_service.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\S-1-5-21-3442511616-637977696-3186306149-1000\EnableNotifications = "0" elevation_service.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\mdgkfajodaliacghnafobjnclblcfmlm\1.0_0\manifest.json JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe -
Enumerates connected drives 3 TTPs 42 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened (read-only) \??\R: JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened (read-only) \??\N: JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened (read-only) \??\U: JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened (read-only) \??\E: elevation_service.exe File opened (read-only) \??\G: elevation_service.exe File opened (read-only) \??\T: elevation_service.exe File opened (read-only) \??\J: JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened (read-only) \??\L: JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened (read-only) \??\Z: JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened (read-only) \??\N: elevation_service.exe File opened (read-only) \??\O: elevation_service.exe File opened (read-only) \??\K: elevation_service.exe File opened (read-only) \??\H: JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened (read-only) \??\K: JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened (read-only) \??\W: JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened (read-only) \??\I: elevation_service.exe File opened (read-only) \??\J: elevation_service.exe File opened (read-only) \??\H: elevation_service.exe File opened (read-only) \??\P: elevation_service.exe File opened (read-only) \??\Q: elevation_service.exe File opened (read-only) \??\M: JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened (read-only) \??\O: JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened (read-only) \??\T: JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened (read-only) \??\V: JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened (read-only) \??\Y: JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened (read-only) \??\R: elevation_service.exe File opened (read-only) \??\S: elevation_service.exe File opened (read-only) \??\V: elevation_service.exe File opened (read-only) \??\Y: elevation_service.exe File opened (read-only) \??\S: JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened (read-only) \??\U: elevation_service.exe File opened (read-only) \??\Z: elevation_service.exe File opened (read-only) \??\M: elevation_service.exe File opened (read-only) \??\W: elevation_service.exe File opened (read-only) \??\E: JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened (read-only) \??\G: JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened (read-only) \??\I: JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened (read-only) \??\X: JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened (read-only) \??\L: elevation_service.exe File opened (read-only) \??\Q: JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened (read-only) \??\X: elevation_service.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification \??\c:\windows\SysWOW64\searchindexer.exe JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened for modification \??\c:\windows\system32\vssvc.exe elevation_service.exe File opened for modification \??\c:\windows\SysWOW64\alg.exe JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened for modification \??\c:\windows\system32\lsass.exe JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File created \??\c:\windows\SysWOW64\dochpoci.tmp JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened for modification \??\c:\windows\system32\dllhost.exe elevation_service.exe File opened for modification \??\c:\windows\syswow64\perfhost.exe elevation_service.exe File opened for modification \??\c:\windows\SysWOW64\Appvclient.exe JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened for modification \??\c:\windows\SysWOW64\wbengine.exe JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened for modification \??\c:\windows\SysWOW64\Agentservice.exe JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened for modification \??\c:\windows\SysWOW64\diagsvcs\diagnosticshub.standardcollector.service.exe JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened for modification \??\c:\windows\SysWOW64\lsass.exe JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened for modification \??\c:\windows\system32\tieringengineservice.exe JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File created \??\c:\windows\system32\oqhckeao.tmp JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File created \??\c:\windows\system32\enimbjde.tmp JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened for modification \??\c:\windows\SysWOW64\vssvc.exe JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened for modification \??\c:\windows\system32\WindowsPowerShell\v1.0\powershell.exe JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened for modification \??\c:\windows\system32\sgrmbroker.exe elevation_service.exe File opened for modification \??\c:\windows\system32\fxssvc.exe JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File created \??\c:\windows\system32\gmhkpped.tmp JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened for modification \??\c:\windows\SysWOW64\sensordataservice.exe JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened for modification \??\c:\windows\system32\alg.exe elevation_service.exe File opened for modification \??\c:\windows\system32\locator.exe elevation_service.exe File opened for modification \??\c:\windows\system32\Agentservice.exe elevation_service.exe File opened for modification \??\c:\windows\system32\Appvclient.exe JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened for modification \??\c:\windows\SysWOW64\tieringengineservice.exe JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened for modification \??\c:\windows\SysWOW64\vds.exe JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened for modification \??\c:\windows\system32\fxssvc.exe elevation_service.exe File opened for modification \??\c:\windows\system32\spectrum.exe elevation_service.exe File opened for modification \??\c:\windows\SysWOW64\sgrmbroker.exe JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened for modification \??\c:\windows\SysWOW64\snmptrap.exe JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\ooikgkpg.tmp JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened for modification \??\c:\windows\system32\openssh\ssh-agent.exe JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened for modification \??\c:\windows\system32\snmptrap.exe elevation_service.exe File opened for modification \??\c:\windows\system32\sgrmbroker.exe JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened for modification \??\c:\windows\SysWOW64\spectrum.exe JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened for modification \??\c:\windows\system32\svchost.exe elevation_service.exe File opened for modification \??\c:\windows\system32\wbem\wmiApsrv.exe elevation_service.exe File opened for modification \??\c:\windows\system32\dllhost.exe JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened for modification \??\c:\windows\system32\diagsvcs\diagnosticshub.standardcollector.service.exe JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened for modification \??\c:\windows\system32\msiexec.exe JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File created \??\c:\windows\system32\mjjpdpdf.tmp JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened for modification \??\c:\windows\system32\wbem\wmiApsrv.exe JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened for modification \??\c:\windows\system32\msdtc.exe elevation_service.exe File opened for modification \??\c:\windows\system32\perceptionsimulation\perceptionsimulationservice.exe JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened for modification \??\c:\windows\system32\spectrum.exe JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened for modification \??\c:\windows\SysWOW64\wbem\wmiApsrv.exe JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened for modification \??\c:\windows\system32\svchost.exe JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened for modification \??\c:\windows\SysWOW64\dllhost.exe JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File created \??\c:\windows\system32\fkgglnpp.tmp JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened for modification \??\c:\windows\SysWOW64\perceptionsimulation\perceptionsimulationservice.exe JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened for modification \??\c:\windows\SysWOW64\perfhost.exe JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened for modification \??\c:\windows\system32\sensordataservice.exe JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File created \??\c:\windows\system32\openssh\kaokobga.tmp JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened for modification \??\c:\windows\system32\vds.exe JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened for modification \??\c:\windows\system32\alg.exe JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened for modification \??\c:\windows\SysWOW64\msdtc.exe JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File created \??\c:\windows\system32\ehafanej.tmp JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened for modification \??\c:\windows\system32\tieringengineservice.exe elevation_service.exe File opened for modification \??\c:\windows\system32\vssvc.exe JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened for modification \??\c:\windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened for modification \??\c:\windows\system32\msiexec.exe elevation_service.exe File opened for modification \??\c:\windows\SysWOW64\locator.exe JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk-1.8\bin\wsimport.exe JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\pnqggbpc.tmp JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\aqlckbbn.tmp JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jabswitch.exe JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\kinit.exe JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File created \??\c:\program files (x86)\microsoft\edge\Application\92.0.902.67\ajanbpan.tmp JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File created C:\Program Files\Java\jdk-1.8\bin\bklbclai.tmp JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File created C:\Program Files\Java\jdk-1.8\bin\fcbnjplg.tmp JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened for modification C:\Program Files\Microsoft Office\root\Client\AppVLP.exe JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\dklkkafp.tmp JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File created C:\Program Files\Common Files\microsoft shared\OFFICE16\akaajeom.tmp JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File created C:\Program Files\Java\jdk-1.8\bin\ofbhkgdg.tmp JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\servertool.exe JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javaw.exe JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\knqknjlo.tmp JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File created C:\Program Files\Java\jdk-1.8\bin\feqkbkgm.tmp JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javap.exe JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\keytool.exe JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File created C:\Program Files\Java\jdk-1.8\bin\dimdeidf.tmp JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File created C:\Program Files\Java\jre-1.8\bin\kjlepkii.tmp JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File created C:\Program Files\7-Zip\pijiegfa.tmp JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ShapeCollector.exe JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\createdump.exe JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\createdump.exe JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javac.exe JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\klist.exe JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\kggjdgjn.tmp JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File created C:\Program Files\Java\jre-1.8\bin\fcmpdicp.tmp JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File created \??\c:\program files\windows media player\jcbcajbj.tmp JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened for modification \??\c:\program files\windows media player\wmpnetwk.exe elevation_service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\java-rmi.exe JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\Integrator.exe JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File created C:\Program Files\Google\Chrome\Application\onnmbqjl.tmp JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\fjkphpcb.tmp JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe elevation_service.exe File created C:\Program Files\Java\jdk-1.8\bin\jeoonppk.tmp JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\oocjcpii.tmp JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File created C:\Program Files\Java\jre-1.8\bin\phlkpdah.tmp JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\nimidobm.tmp JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\pack200.exe JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.NetFX45.exe JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File created C:\Program Files\Java\jre-1.8\bin\abgnmddd.tmp JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File created C:\Program Files\Java\jdk-1.8\bin\qqlagjep.tmp JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\java.exe JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\Addons\OneDriveSetup.exe JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened for modification \??\c:\program files\windows media player\wmpnetwk.exe JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jmap.exe JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\odadaonc.tmp JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jcmd.exe JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File created C:\Program Files\Java\jdk-1.8\bin\ooclgjlk.tmp JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File created C:\Program Files\Java\jre-1.8\bin\coghakai.tmp JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened for modification C:\Program Files\7-Zip\7zG.exe JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File created C:\Program Files\Java\jdk-1.8\bin\kfefgkli.tmp JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File created C:\Program Files\Java\jdk-1.8\bin\ckillgah.tmp JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstatd.exe JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\unpack200.exe JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\chrmstp.exe JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File created C:\Program Files\Java\jdk-1.8\bin\jmdchbdj.tmp JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File created C:\Program Files\Java\jdk-1.8\bin\chlmfebj.tmp JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\wpf\presentationfontcache.exe JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened for modification \??\c:\windows\servicing\trustedinstaller.exe JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\wpf\presentationfontcache.exe elevation_service.exe File opened for modification \??\c:\windows\servicing\trustedinstaller.exe elevation_service.exe File created C:\Windows\Logs\CBS\CBS.log TrustedInstaller.exe File opened for modification C:\Windows\Logs\CBS\CBS.log TrustedInstaller.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe -
Suspicious behavior: EnumeratesProcesses 44 IoCs
pid Process 4528 elevation_service.exe 4528 elevation_service.exe 4528 elevation_service.exe 4528 elevation_service.exe 4528 elevation_service.exe 4528 elevation_service.exe 4528 elevation_service.exe 4528 elevation_service.exe 4528 elevation_service.exe 4528 elevation_service.exe 4528 elevation_service.exe 4528 elevation_service.exe 4528 elevation_service.exe 4528 elevation_service.exe 4528 elevation_service.exe 4528 elevation_service.exe 4528 elevation_service.exe 4528 elevation_service.exe 4528 elevation_service.exe 4528 elevation_service.exe 4528 elevation_service.exe 4528 elevation_service.exe 4528 elevation_service.exe 4528 elevation_service.exe 4528 elevation_service.exe 4528 elevation_service.exe 4528 elevation_service.exe 4528 elevation_service.exe 4528 elevation_service.exe 4528 elevation_service.exe 4528 elevation_service.exe 4528 elevation_service.exe 4528 elevation_service.exe 4528 elevation_service.exe 4528 elevation_service.exe 4528 elevation_service.exe 4528 elevation_service.exe 4528 elevation_service.exe 4528 elevation_service.exe 4528 elevation_service.exe 4528 elevation_service.exe 4528 elevation_service.exe 4528 elevation_service.exe 4528 elevation_service.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 652 Process not Found 652 Process not Found -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 4240 JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe Token: SeTakeOwnershipPrivilege 4528 elevation_service.exe -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer elevation_service.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" elevation_service.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_68641faa6786e4429d6f3517860018f0.exe"1⤵
- Drops Chrome extension
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4240
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:4528
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"1⤵
- Executes dropped EXE
PID:4268
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
PID:3176
-
\??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
PID:1468
-
C:\Windows\System32\OpenSSH\ssh-agent.exeC:\Windows\System32\OpenSSH\ssh-agent.exe1⤵
- Executes dropped EXE
PID:1492
-
C:\Windows\servicing\TrustedInstaller.exeC:\Windows\servicing\TrustedInstaller.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1912
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD58c0397c5d558bf440915a080af714d19
SHA13bcbe161e671b2e7dc75620fed3745e902f14d38
SHA256cd6ce2c81ef4acc54edf41e4cc80fe254326b451a3290ad6743b40906f96ebea
SHA51281c16118c2bd85bda1758330b3270afda79027b69c4847a89a2c1141cda53bcfa6a455e5da53fdfd70eb11623faeb8ecbda5aae0e977b8f0a9fe89fb1c8a8562
-
Filesize
781KB
MD515eba2e4705c6d0322caf7da730a80d5
SHA1db94526e38579b80495dabc3e4a17a7bb0e974f3
SHA256bb1955069c9660b0546789bbd4221df5b30ef731ed71b84d89139208eeb8ef80
SHA51241a064c732313dbdd6a027c659d38f0c29b3ca13f3db20aeb71d7fab1bb0f58f9e3ed53a50cb0ac8857a1dd0cdb9a734edded136081b15c939a4fb1633e630fd
-
Filesize
1.1MB
MD5d13e4a541ac77e408a9a3861bcbff37b
SHA1080acaf31eed8f32665c5035c91de9c611a1d013
SHA256a4bbd0a6690a229963bb5d43529f2db5fcef22cf0151da3b93ec94003c62d98e
SHA512f028e35ff30c1f3bf540a54162583494495d1bb0792feadf20170555ae230db1edae96f0d89a1c040c008d2cc3830209ea912791e38142283632d3d7f60054e6
-
Filesize
1.5MB
MD5fde5e58d2cca82f4651562cb46c8512b
SHA1b47d01c716448215240991a3a3018b22de970980
SHA256e0464d7ebee35c2a80b5a12571de6b2fa1af1d3880173a0ecfd4a64de11b477b
SHA512a14dd3c760e9bca3349325ace6ce6287518bfd48d393341444dd56f8be13d5420f93f1f03960a87c0b8058958ea7c68d0123586e83214c2e4fff53da63cbdc2c
-
Filesize
1.2MB
MD50204812d98b526af8d1fec845a4c514f
SHA1d1052f4eff59a8ddff88c39ad714b7e71233af97
SHA2563c40d700a594f4d087a2f55c1b0bf5125761e667570128f28b26dc981a48f348
SHA512a02ab25a97704709505ebd71eea11b3ef3d1f306a59c2f291f31551a053f1301cbe59afb228066a9f7cbccae08e8fb5ef64b8f4e988d690e04c6dd9be8eeedb2
-
Filesize
832KB
MD5e9ad9808c6db457df3a9c990883c4fe2
SHA1dfcf1f0b8d408fc91b2f709cc0acf12bbec887ad
SHA256d36e88e84c55b1ca68025e28ee0768ecc52fca158e70e7709b55bd9e91ed37be
SHA5125c839c0c4c0f2e9a7de5f395c7d3db09d7559c3784f8591a9915fe4c3699c91bea36591823da64b6399a5dcd266ff4111b9cfb50569b0d983bbcdfaa32f4b942
-
Filesize
4.6MB
MD503d5ac613310e45c4cf6e3d576993216
SHA1e7496593e5b213d8fdefbd8223483e7159879282
SHA256d117a898bcc6d7c9f8684eaf4244b5d998949a5c4551961f4837f9bfe18f8232
SHA512a669084aa64430e4b545453cb0b06dcbaf1526e7b562242289390bc440c0412c7b72ba501055965cd32ec40c43b56144cce3f2c25f7497e24b96e8cb3de5a236
-
Filesize
898KB
MD5efc23d61681184c3c4129f1ee2bc82d5
SHA1a49f2bb635fc8865378026329838c9b11cccd812
SHA256dc713bd4ee2edf2d2d6155302c49def8922fc2d69df046b6be70101028dfeb70
SHA5126624187fb1e318e39d702c354cb7468815d3df0692f16b5b934d7d239ac73f682c017ec2d83793d99d9012f0a3f3447741309ca07fb316db914e68c1e6b35370
-
Filesize
24.0MB
MD58440e2cc5379337b3cc160a2d90ec877
SHA1b802becc092381e86000fc3672f553dbe1afd211
SHA25687e802747f2cd1d323b96306ae3935677fd3a50cf2b9cf8a6dfe39beefe3436e
SHA5122f886eb59edc3f8e4473044dbecd63319e14362167df3bfe01246e60bbebfb49472f8a43cb4d1fb80e6760c29e6521d6f370846673b09c69d504a0b358cfdc97
-
Filesize
2.7MB
MD54ac9c66b5b5a0c4d3d6001ad1009f633
SHA1395a80e7289f0661f57ebd62dd01c3332165004e
SHA256a19851923a7d7eea221f3fa3eee5d297f4aba8dcd492ae273c4ca970be93415c
SHA512459c4445bf18c72f2a1de968e0228be5c63cb3e28888f2dfa5367d32f03980e17e4f569e8c2c8be534ae395183085efbd8cc61f4bbf9a9f15cb7b2c49f511dc5
-
Filesize
797KB
MD5fc9e65833f1ec287701d1281f68d8655
SHA1a0b2806f07120e47eaf4e09a038d698287be9324
SHA2567a90a71dd112afa260a6cd4f384787dc6957a7829e1217bbbc3c299f243c388a
SHA5122cfdc9d5d23104550412adee9926a3728cdce1c481f2855755a99f268f70015be1f13c8013705937c9320f1860ebd1e3360e9f8cdc5129888db801a88d960549
-
Filesize
4.6MB
MD56fd950b91927ee19ec1b9046e8c6313f
SHA168b8d35443e1e705ad7c894cc8d68113d3fccf39
SHA2569c073d2da26cb67865fb4b795adbc2eebe0032c805e0c207c685d03bd2b9c67b
SHA5126c58f7190cf521f04e8db80babf78ed942af7a47842dfe0d9ef8f4632650fad97dc372a0049b2561e39760f264b1a808406d3c29f63ff05659e50c77a4eb726a
-
Filesize
2.1MB
MD5158d9775734ae7b5f899cad7f6804add
SHA1248d1899db3d0633711822bbbe5ca4b7dc7ba44a
SHA256dc562fef44976bc926ea6b38abfa5840f7c37c45fd6798d7cdca05f4568dc5cc
SHA5127ab2299514e83b85efc373405de2805774b2c2e08829227d28c91de443de77cd0d08f9fc9923b1b05c483837a8fb6e348b821e915761a8058896618259bd9d89
-
Filesize
1.3MB
MD5e49511eedf72aeef8ae8daa92128ed5f
SHA1a4aa3d0323753c3fbbc7ac29ea91e2def14cedd6
SHA2567b366c895f66b4e85744d38d946a83ba04bd155136c8268811c9deae52894bbd
SHA512019b7a79a0d7d91365bc4abdb1c7783a68988be6370cb4de936c1940269372baaffbc2e61c94a4732868138453cab43961b53f516a2381449283ff9be2dc754d
-
Filesize
978KB
MD526efae41fdd5a0294be687c8e7c18ebe
SHA10ddff5d78aca4adc5359d36db1d37dc5aca21653
SHA256f9aa6b921e8eb9b9dcc9607f48e76e2d3f05aabc08b7093c3af07f91bd16f341
SHA512e9ed360e30478a883478eb66670bce82ebd13088a10570e17345cd7fcb9e70aeedb8985665ad1a21e495dab42d7327616a19eb503a4c33d9d8b4a855f00876e4
-
Filesize
932KB
MD51f501f4447a1eb931cbf0bff8c04f7a2
SHA116f4fae61c6ccb97ebb69ef1d3e3eb548e63a5bd
SHA256584412c4a4f6680b50e41c23f88c68b727afceb3d14613e9589ab0482a403784
SHA5123a7fca0a98c9dcda95115e512ae12ffc331a441754e8a98f3559f64f7f1b60279f033cda3d202d5a2d1c0a03e3a928c38ec2a275aa829ad2337f58d9518bfeba
-
Filesize
1.3MB
MD562059d8479329eabf104827599581d6b
SHA15b3751211930c18985049acaa6bd9bcb7abf5465
SHA2564b348cb911eed40a21c188194e87f6bac3e7e44ee7967f4004c894b0ccbfcf8e
SHA512787d77f335c064d9f83e6d3370afbf6d3241e935f355df17ce6fa6561c18f30f3823f915952735106de27ddccea7f3b987656d4c18f2ffeed6b60c949ef962d5
-
Filesize
193KB
MD5805418acd5280e97074bdadca4d95195
SHA1a69e4f03d775a7a0cc5ed2d5569cbfbb4d31d2d6
SHA25673684e31ad4afe3fdc525b51ccaacc14d402c92db9c42e3fcbfe1e65524b1c01
SHA512630a255950c0ae0983ae907d20326adea36ce262c7784428a0811b04726849c929bc9cea338a89e77447a6cec30b0889694158327c002566d3cf5be2bb88e4de
-
Filesize
1.5MB
MD593960a5b540d694950721edf41833426
SHA1c6f70ed33e854b6871a817fb31b68c00abab60f9
SHA2566adb9d36e9513b3054e6a31cc4c5f1b4925c9d9c355494db44886ef061b96957
SHA512c3c15122fc540c2471945c54cf1f242c2a5b7ef6f32f19c922b0a5df97a8ee3dd8cf8ba00c964693d90b7c9d8fbd994e070ed195c800c7b14b070fce677a7e88
-
Filesize
1.7MB
MD54b2d87ae587e6b8fa69558598deeac95
SHA1c65ca1ad5782aa10d67d4bb04c961a6712c27394
SHA256b1f53255b594f0a548f3b0a86bac0d2965075bca2ad940054b20e638afd590c9
SHA5126bfdafb2c8992e365260f740c5e3abcf0e80fc6b1132ae2133f312c506c34cabf4c7707ef2548f161e980db531436f486d2a2a318fb0711eff222d7b8f44b0b3
-
Filesize
1.2MB
MD5c165eb65befd49b8e268041bd3705083
SHA10efaccda17d5a6e961dd91fcd93d28848dd6e3b7
SHA2561505d340e51c943d3b5be508cd8510a8fd88a7bc151326bca858b4f914af2ece
SHA51296e017233c3ab8b44983a360e3ada639be3e1a69947fcb05c2f2e4a3660547dfadd0213c4ebcf2d59d7a2afe81be891f91a6a302def41799f5d4105d0838f218
-
Filesize
700KB
MD5b9c88b802912a4f88219efd80188e18f
SHA1030abc7a70772db4b980d15d23fe1b20facad2db
SHA2562eb2963e01c323d900f1eec64128c431b8b0a1ce0da84b02175cb42b71328b8a
SHA51217d463d78bc337cf96703bc221a3b1a149c09d4521341717b0dc0878e7b73587f1dc01d0b6abb77fa72288728d4f81e0d79389abfaa62a863bc57620c476732f
-
Filesize
623KB
MD5df6a1f4a65a187d35124250e1c255993
SHA14cbf5da577645b20a58466450aa5bbd22b54780b
SHA2564d2b92b8ed75a7b88b687b126cf80db1115e093d99fd51d33eb115ff2c350347
SHA5122975cc8dd9585629fdc391ab55b47c2ef52f0672c0a3ce7afce9f31fe776de126cc1f6a316ed7ba2aece0abe670c8981dfa26a559c37f9ed4d685d3b9a3102df
-
Filesize
572KB
MD5020b0a1947fbc0e739d6ded289e09ae3
SHA114fda93f04f3d40d51d018e6cb0d7bf46711e262
SHA25604bee69371a0e830b98d935ab1b2c4d3c6736186f7056f931c2fd45ed3da5ede
SHA512cd24e77fe1f7a89e38d6e90b7bf1cf76bc4e54bd5b0d6e4b79b7058c14d50640708dbb862ff04d21e8e343e2f17c7d3ef348554ecd63ad1fa0280a11757eddcf
-
Filesize
2.1MB
MD565a6a6ac37898bad4521ad4c7c9254c0
SHA15e1dc051835a75518f087febbd710ab468cde70a
SHA256e02c6e35659cb8ea065d3de5de6f3beb589894f6436c87c7755936d03da6a691
SHA5128c99e1772e4a271fb08cb7432ef5831887b9988a802465b9f5b0588aaf4311af10bc2ce17cbec87ee0f8a13718fa2b2fb38d8ebeb1ea293ac0815d4b6b4f4369