Analysis
-
max time kernel
146s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
02-01-2025 05:00
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe
-
Size
155KB
-
MD5
62ce8428d80fbef08b1c6356afe2d067
-
SHA1
bdc9d3fc8e8d89d551ffc5640133f3bbe6390e4e
-
SHA256
5a43af1d5fb9b918e141c63a1feca4e8c8d12eba6ac5df639c3733f8c8cb49db
-
SHA512
8d16b6b094ab8b9374f45b06d5fcf730bef3d37faf2e3d5cd122311e8e5292a43b89bd2f6763ef352b4dc36b5b77bc7f6cc03ba9e33f29f9ce17c2b0a9b06b9d
-
SSDEEP
3072:zr8WDrCAGRXr7F3QE5GfijJKcOfolfyIx0hijJKcOfolfyIx00:PuB7JZ2ijJKcFlfyIKijJKcFlfyIJ
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List jaffacakes118_62ce8428d80fbef08b1c6356afe2d067.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\Client Server Runtime Process = "C:\\Users\\Admin\\AppData\\Roaming\\csrss.exe" jaffacakes118_62ce8428d80fbef08b1c6356afe2d067.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\Host-process Windows (Rundll32.exe) = "C:\\Users\\Admin\\AppData\\Roaming\\System32\\rundll32.exe" jaffacakes118_62ce8428d80fbef08b1c6356afe2d067.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\Service Host Process for Windows = "C:\\Users\\Admin\\AppData\\Roaming\\System32\\svchost.exe" jaffacakes118_62ce8428d80fbef08b1c6356afe2d067.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List csrss.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\Host-process Windows (Rundll32.exe) = "c:\\users\\admin\\appdata\\roaming\\csrss.exe" csrss.exe -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Executes dropped EXE 4 IoCs
pid Process 2424 JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe 2024 jaffacakes118_62ce8428d80fbef08b1c6356afe2d067.exe 2940 csrss.exe 2548 csrss.exe -
Loads dropped DLL 9 IoCs
pid Process 1128 JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe 1128 JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe 2424 JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe 2024 jaffacakes118_62ce8428d80fbef08b1c6356afe2d067.exe 2024 jaffacakes118_62ce8428d80fbef08b1c6356afe2d067.exe 1128 JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe 1128 JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe 1128 JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe 1128 JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\Host-process Windows (Rundll32.exe) = "C:\\Users\\Admin\\AppData\\Roaming\\System32\\rundll32.exe" jaffacakes118_62ce8428d80fbef08b1c6356afe2d067.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Host-process Windows (Rundll32.exe) = "C:\\Users\\Admin\\AppData\\Roaming\\System32\\rundll32.exe" jaffacakes118_62ce8428d80fbef08b1c6356afe2d067.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\Service Host Process for Windows = "C:\\Users\\Admin\\AppData\\Roaming\\System32\\svchost.exe" jaffacakes118_62ce8428d80fbef08b1c6356afe2d067.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Service Host Process for Windows = "C:\\Users\\Admin\\AppData\\Roaming\\System32\\svchost.exe" jaffacakes118_62ce8428d80fbef08b1c6356afe2d067.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\Host-process Windows (Rundll32.exe) = "c:\\users\\admin\\appdata\\roaming\\csrss.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Host-process Windows (Rundll32.exe) = "c:\\users\\admin\\appdata\\roaming\\csrss.exe" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Process = "C:\\Users\\Admin\\AppData\\Roaming\\csrss.exe" jaffacakes118_62ce8428d80fbef08b1c6356afe2d067.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Process = "C:\\Users\\Admin\\AppData\\Roaming\\csrss.exe" jaffacakes118_62ce8428d80fbef08b1c6356afe2d067.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2424 set thread context of 2024 2424 JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe 31 PID 2940 set thread context of 2548 2940 csrss.exe 33 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\COMMON~1\ADOBEA~1\Versions\1.0\ADOBEA~1.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\IECONT~1.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\INFOPATH.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTEM.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WINWORD.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\WI54FB~1\WMPDMC.exe JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ACROBR~1.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\Oarpmany.exe JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~3.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~2.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~1.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\PPTICO.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\SETUPF~1\{AC76B~1\Setup.exe JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\FLTLDR.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\TextConv\WksConv\Wkconv.exe JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CLVIEW.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\POWERPNT.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\WINDOW~1\WinMail.exe JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\Eula.exe JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DWTRIG20.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\1033\ONELEV.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORE.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WORDICON.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\WINDOW~1\wab.exe JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\SOURCE~1\OSE.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\misc.exe JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORDB.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpconfig.exe JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CNFNOT32.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GRAPH.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\NAMECO~1.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\XLICONS.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOICONS.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOHTMED.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\WINDOW~4\ImagingDevices.exe JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Resource\Icons\SC_REA~1.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOXMLED.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GO664E~1.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\OIS.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\VPREVIEW.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\WINDOW~2\ACCESS~1\wordpad.exe JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\ODeploy.exe JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTE.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmlaunch.exe JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBE_~1.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\ink\mip.exe JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOBD5D~1.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOUC.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSQRY32.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jaffacakes118_62ce8428d80fbef08b1c6356afe2d067.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csrss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csrss.exe -
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 1128 wrote to memory of 2424 1128 JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe 30 PID 1128 wrote to memory of 2424 1128 JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe 30 PID 1128 wrote to memory of 2424 1128 JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe 30 PID 1128 wrote to memory of 2424 1128 JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe 30 PID 2424 wrote to memory of 2024 2424 JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe 31 PID 2424 wrote to memory of 2024 2424 JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe 31 PID 2424 wrote to memory of 2024 2424 JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe 31 PID 2424 wrote to memory of 2024 2424 JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe 31 PID 2424 wrote to memory of 2024 2424 JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe 31 PID 2424 wrote to memory of 2024 2424 JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe 31 PID 2424 wrote to memory of 2024 2424 JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe 31 PID 2424 wrote to memory of 2024 2424 JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe 31 PID 2424 wrote to memory of 2024 2424 JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe 31 PID 2024 wrote to memory of 2940 2024 jaffacakes118_62ce8428d80fbef08b1c6356afe2d067.exe 32 PID 2024 wrote to memory of 2940 2024 jaffacakes118_62ce8428d80fbef08b1c6356afe2d067.exe 32 PID 2024 wrote to memory of 2940 2024 jaffacakes118_62ce8428d80fbef08b1c6356afe2d067.exe 32 PID 2024 wrote to memory of 2940 2024 jaffacakes118_62ce8428d80fbef08b1c6356afe2d067.exe 32 PID 2940 wrote to memory of 2548 2940 csrss.exe 33 PID 2940 wrote to memory of 2548 2940 csrss.exe 33 PID 2940 wrote to memory of 2548 2940 csrss.exe 33 PID 2940 wrote to memory of 2548 2940 csrss.exe 33 PID 2940 wrote to memory of 2548 2940 csrss.exe 33 PID 2940 wrote to memory of 2548 2940 csrss.exe 33 PID 2940 wrote to memory of 2548 2940 csrss.exe 33 PID 2940 wrote to memory of 2548 2940 csrss.exe 33 PID 2940 wrote to memory of 2548 2940 csrss.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Users\Admin\AppData\Local\Temp\3582-490\JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2424 -
\??\c:\users\admin\appdata\local\temp\3582-490\jaffacakes118_62ce8428d80fbef08b1c6356afe2d067.exe"c:\users\admin\appdata\local\temp\3582-490\jaffacakes118_62ce8428d80fbef08b1c6356afe2d067.exe"3⤵
- Modifies firewall policy service
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Roaming\csrss.exeC:\Users\Admin\AppData\Roaming\csrss.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2940 -
\??\c:\users\admin\appdata\roaming\csrss.exe"c:\users\admin\appdata\roaming\csrss.exe"5⤵
- Modifies firewall policy service
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2548
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Change Default File Association
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
859KB
MD5754309b7b83050a50768236ee966224f
SHA110ed7efc2e594417ddeb00a42deb8fd9f804ed53
SHA256acd32dd903e5464b0ecd153fb3f71da520d2e59a63d4c355d9c1874c919d04e6
SHA512e5aaddf62c08c8fcc1ae3f29df220c5c730a2efa96dd18685ee19f5a9d66c4735bb4416c4828033661990604669ed345415ef2dc096ec75e1ab378dd804b1614
-
Filesize
252KB
MD59e2b9928c89a9d0da1d3e8f4bd96afa7
SHA1ec66cda99f44b62470c6930e5afda061579cde35
SHA2568899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043
SHA5122ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156
-
Filesize
115KB
MD58e4412de16452c623452b2b334bb4c56
SHA1b974012e54b4df32c6871dadf2f983cf899ed49a
SHA256804bebde1c7c36b342e3628091702eb46a6512ef33e40e85a501da518e122bda
SHA51259b407dd66f2bd3f223f11d5b32aa45b2bf8ccb63fe81f2a5bcddb0818e269499c79384798cd4806353dc28d616aa85556459bd8974e65e142232b65b5620611