Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-01-2025 05:00
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe
-
Size
155KB
-
MD5
62ce8428d80fbef08b1c6356afe2d067
-
SHA1
bdc9d3fc8e8d89d551ffc5640133f3bbe6390e4e
-
SHA256
5a43af1d5fb9b918e141c63a1feca4e8c8d12eba6ac5df639c3733f8c8cb49db
-
SHA512
8d16b6b094ab8b9374f45b06d5fcf730bef3d37faf2e3d5cd122311e8e5292a43b89bd2f6763ef352b4dc36b5b77bc7f6cc03ba9e33f29f9ce17c2b0a9b06b9d
-
SSDEEP
3072:zr8WDrCAGRXr7F3QE5GfijJKcOfolfyIx0hijJKcOfolfyIx00:PuB7JZ2ijJKcFlfyIKijJKcFlfyIJ
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\Host-process Windows (Rundll32.exe) = "C:\\Users\\Admin\\AppData\\Roaming\\System32\\rundll32.exe" jaffacakes118_62ce8428d80fbef08b1c6356afe2d067.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\Service Host Process for Windows = "C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe" jaffacakes118_62ce8428d80fbef08b1c6356afe2d067.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List csrss.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\Host-process Windows (Rundll32.exe) = "c:\\users\\admin\\appdata\\roaming\\csrss.exe" csrss.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List jaffacakes118_62ce8428d80fbef08b1c6356afe2d067.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile jaffacakes118_62ce8428d80fbef08b1c6356afe2d067.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications jaffacakes118_62ce8428d80fbef08b1c6356afe2d067.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\Client Server Runtime Process = "C:\\Users\\Admin\\AppData\\Roaming\\csrss.exe" jaffacakes118_62ce8428d80fbef08b1c6356afe2d067.exe -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe -
Executes dropped EXE 4 IoCs
pid Process 3924 JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe 1284 jaffacakes118_62ce8428d80fbef08b1c6356afe2d067.exe 536 csrss.exe 1184 csrss.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Service Host Process for Windows = "C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe" jaffacakes118_62ce8428d80fbef08b1c6356afe2d067.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Service Host Process for Windows = "C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe" jaffacakes118_62ce8428d80fbef08b1c6356afe2d067.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Host-process Windows (Rundll32.exe) = "c:\\users\\admin\\appdata\\roaming\\csrss.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Host-process Windows (Rundll32.exe) = "c:\\users\\admin\\appdata\\roaming\\csrss.exe" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Process = "C:\\Users\\Admin\\AppData\\Roaming\\csrss.exe" jaffacakes118_62ce8428d80fbef08b1c6356afe2d067.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Process = "C:\\Users\\Admin\\AppData\\Roaming\\csrss.exe" jaffacakes118_62ce8428d80fbef08b1c6356afe2d067.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Host-process Windows (Rundll32.exe) = "C:\\Users\\Admin\\AppData\\Roaming\\System32\\rundll32.exe" jaffacakes118_62ce8428d80fbef08b1c6356afe2d067.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Host-process Windows (Rundll32.exe) = "C:\\Users\\Admin\\AppData\\Roaming\\System32\\rundll32.exe" jaffacakes118_62ce8428d80fbef08b1c6356afe2d067.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3924 set thread context of 1284 3924 JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe 83 PID 536 set thread context of 1184 536 csrss.exe 85 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~4.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~1.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~2.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOF5E2~1.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~3\PACKAG~1\{D87AE~1\WINDOW~1.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GO664E~1.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MIA062~1.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~3.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~4.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOBD5D~1.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MI9C33~1.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jaffacakes118_62ce8428d80fbef08b1c6356afe2d067.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csrss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csrss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe -
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 3248 wrote to memory of 3924 3248 JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe 82 PID 3248 wrote to memory of 3924 3248 JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe 82 PID 3248 wrote to memory of 3924 3248 JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe 82 PID 3924 wrote to memory of 1284 3924 JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe 83 PID 3924 wrote to memory of 1284 3924 JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe 83 PID 3924 wrote to memory of 1284 3924 JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe 83 PID 3924 wrote to memory of 1284 3924 JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe 83 PID 3924 wrote to memory of 1284 3924 JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe 83 PID 3924 wrote to memory of 1284 3924 JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe 83 PID 3924 wrote to memory of 1284 3924 JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe 83 PID 3924 wrote to memory of 1284 3924 JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe 83 PID 3924 wrote to memory of 1284 3924 JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe 83 PID 1284 wrote to memory of 536 1284 jaffacakes118_62ce8428d80fbef08b1c6356afe2d067.exe 84 PID 1284 wrote to memory of 536 1284 jaffacakes118_62ce8428d80fbef08b1c6356afe2d067.exe 84 PID 1284 wrote to memory of 536 1284 jaffacakes118_62ce8428d80fbef08b1c6356afe2d067.exe 84 PID 536 wrote to memory of 1184 536 csrss.exe 85 PID 536 wrote to memory of 1184 536 csrss.exe 85 PID 536 wrote to memory of 1184 536 csrss.exe 85 PID 536 wrote to memory of 1184 536 csrss.exe 85 PID 536 wrote to memory of 1184 536 csrss.exe 85 PID 536 wrote to memory of 1184 536 csrss.exe 85 PID 536 wrote to memory of 1184 536 csrss.exe 85 PID 536 wrote to memory of 1184 536 csrss.exe 85 PID 536 wrote to memory of 1184 536 csrss.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe"1⤵
- Checks computer location settings
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Users\Admin\AppData\Local\Temp\3582-490\JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\JaffaCakes118_62ce8428d80fbef08b1c6356afe2d067.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3924 -
\??\c:\users\admin\appdata\local\temp\3582-490\jaffacakes118_62ce8428d80fbef08b1c6356afe2d067.exe"c:\users\admin\appdata\local\temp\3582-490\jaffacakes118_62ce8428d80fbef08b1c6356afe2d067.exe"3⤵
- Modifies firewall policy service
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Users\Admin\AppData\Roaming\csrss.exeC:\Users\Admin\AppData\Roaming\csrss.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:536 -
\??\c:\users\admin\appdata\roaming\csrss.exe"c:\users\admin\appdata\roaming\csrss.exe"5⤵
- Modifies firewall policy service
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1184
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Change Default File Association
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.4MB
MD5d9e8a1fa55faebd36ed2342fedefbedd
SHA1c25cc7f0035488de9c5df0121a09b5100e1c28e9
SHA256bd7696911d75a9a35dfd125b24cb95003f1e9598592df47fa23a2568986a4a9a
SHA512134644c68bd04536e9ea0a5da6e334d36b1ce8012a061fa6dabd31f85c16a1ac9eee8c40fee3d55f25c4d4edf0672de8ce204e344c800361cbcff092c09d7a33
-
Filesize
115KB
MD58e4412de16452c623452b2b334bb4c56
SHA1b974012e54b4df32c6871dadf2f983cf899ed49a
SHA256804bebde1c7c36b342e3628091702eb46a6512ef33e40e85a501da518e122bda
SHA51259b407dd66f2bd3f223f11d5b32aa45b2bf8ccb63fe81f2a5bcddb0818e269499c79384798cd4806353dc28d616aa85556459bd8974e65e142232b65b5620611
-
Filesize
155KB
MD562ce8428d80fbef08b1c6356afe2d067
SHA1bdc9d3fc8e8d89d551ffc5640133f3bbe6390e4e
SHA2565a43af1d5fb9b918e141c63a1feca4e8c8d12eba6ac5df639c3733f8c8cb49db
SHA5128d16b6b094ab8b9374f45b06d5fcf730bef3d37faf2e3d5cd122311e8e5292a43b89bd2f6763ef352b4dc36b5b77bc7f6cc03ba9e33f29f9ce17c2b0a9b06b9d