Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04/01/2025, 05:23 UTC
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe
-
Size
780KB
-
MD5
77dee8b1b368b860d694420325d37ddf
-
SHA1
4056aa8fdcc535d39201429caef1364aac338bdf
-
SHA256
f47ca6f4ac15343f6f087d6dcdda8729b403f65004c2a14944fa0a3ca839f79d
-
SHA512
9325721e1482f544785dfceeeb61c37faedd406e40fc6d3ac8d2830499d805c20dcc93e7225f83ea3de831dba881ca06ea4f1d5befe4be0968be90af906e856c
-
SSDEEP
12288:JJ7THB9DS/Eg8KWWBnUdtoThEkQOSxpqLlWanPk0xlASzSwtuAFIrH4W:bz/D/6BxmkDspqLlTnTxj5WrH4W
Malware Config
Signatures
-
Expiro family
-
Expiro payload 2 IoCs
resource yara_rule behavioral2/memory/996-2-0x0000000001000000-0x0000000001283000-memory.dmp family_expiro1 behavioral2/memory/996-643-0x0000000001000000-0x0000000001283000-memory.dmp family_expiro1 -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 5 IoCs
pid Process 4720 elevation_service.exe 4788 elevation_service.exe 2020 maintenanceservice.exe 1888 OSE.EXE 1960 ssh-agent.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\S-1-5-21-4050598569-1597076380-177084960-1000 elevation_service.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\S-1-5-21-4050598569-1597076380-177084960-1000\EnableNotifications = "0" elevation_service.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\mdgkfajodaliacghnafobjnclblcfmlm\1.0_0\manifest.json JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe -
Enumerates connected drives 3 TTPs 42 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\U: JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened (read-only) \??\E: JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened (read-only) \??\J: JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened (read-only) \??\T: JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened (read-only) \??\N: elevation_service.exe File opened (read-only) \??\U: elevation_service.exe File opened (read-only) \??\W: elevation_service.exe File opened (read-only) \??\I: JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened (read-only) \??\W: JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened (read-only) \??\G: elevation_service.exe File opened (read-only) \??\X: JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened (read-only) \??\Z: JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened (read-only) \??\K: elevation_service.exe File opened (read-only) \??\L: elevation_service.exe File opened (read-only) \??\P: elevation_service.exe File opened (read-only) \??\H: JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened (read-only) \??\K: JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened (read-only) \??\S: JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened (read-only) \??\R: elevation_service.exe File opened (read-only) \??\X: elevation_service.exe File opened (read-only) \??\H: elevation_service.exe File opened (read-only) \??\G: JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened (read-only) \??\M: JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened (read-only) \??\Q: JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened (read-only) \??\M: elevation_service.exe File opened (read-only) \??\V: elevation_service.exe File opened (read-only) \??\L: JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened (read-only) \??\N: JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened (read-only) \??\Y: JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened (read-only) \??\S: elevation_service.exe File opened (read-only) \??\T: elevation_service.exe File opened (read-only) \??\Z: elevation_service.exe File opened (read-only) \??\P: JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened (read-only) \??\R: JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened (read-only) \??\O: elevation_service.exe File opened (read-only) \??\O: JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened (read-only) \??\I: elevation_service.exe File opened (read-only) \??\Q: elevation_service.exe File opened (read-only) \??\Y: elevation_service.exe File opened (read-only) \??\V: JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened (read-only) \??\E: elevation_service.exe File opened (read-only) \??\J: elevation_service.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification \??\c:\windows\SysWOW64\vssvc.exe JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened for modification \??\c:\windows\system32\wbengine.exe JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened for modification \??\c:\windows\SysWOW64\diagsvcs\diagnosticshub.standardcollector.service.exe JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File created \??\c:\windows\system32\nmfjgkge.tmp JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened for modification \??\c:\windows\system32\snmptrap.exe JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened for modification \??\c:\windows\SysWOW64\Agentservice.exe JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened for modification \??\c:\windows\system32\wbem\wmiApsrv.exe elevation_service.exe File opened for modification \??\c:\windows\system32\alg.exe JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened for modification \??\c:\windows\SysWOW64\dllhost.exe JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened for modification \??\c:\windows\system32\msiexec.exe JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened for modification \??\c:\windows\system32\wbengine.exe elevation_service.exe File opened for modification \??\c:\windows\SysWOW64\sgrmbroker.exe JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened for modification \??\c:\windows\system32\tieringengineservice.exe JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File created \??\c:\windows\system32\icfbcmdp.tmp JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened for modification \??\c:\windows\system32\diagsvcs\diagnosticshub.standardcollector.service.exe elevation_service.exe File opened for modification \??\c:\windows\system32\lsass.exe JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened for modification \??\c:\windows\system32\perceptionsimulation\perceptionsimulationservice.exe JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened for modification \??\c:\windows\system32\sensordataservice.exe elevation_service.exe File opened for modification \??\c:\windows\system32\sgrmbroker.exe elevation_service.exe File opened for modification \??\c:\windows\system32\vssvc.exe elevation_service.exe File opened for modification \??\c:\windows\system32\svchost.exe JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File created \??\c:\windows\system32\aonelanl.tmp JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened for modification \??\c:\windows\system32\spectrum.exe JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened for modification \??\c:\windows\system32\fxssvc.exe elevation_service.exe File created \??\c:\windows\system32\WindowsPowerShell\v1.0\pipnldhh.tmp JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened for modification \??\c:\windows\system32\alg.exe elevation_service.exe File opened for modification \??\c:\windows\system32\perceptionsimulation\perceptionsimulationservice.exe elevation_service.exe File opened for modification \??\c:\windows\SysWOW64\alg.exe JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened for modification \??\c:\windows\SysWOW64\lsass.exe JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened for modification \??\c:\windows\system32\Agentservice.exe JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\defnmccb.tmp JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened for modification \??\c:\windows\system32\snmptrap.exe elevation_service.exe File opened for modification \??\c:\windows\SysWOW64\locator.exe JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened for modification \??\c:\windows\SysWOW64\sensordataservice.exe JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened for modification \??\c:\windows\system32\WindowsPowerShell\v1.0\powershell.exe JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened for modification \??\c:\windows\system32\msdtc.exe elevation_service.exe File opened for modification \??\c:\windows\system32\spectrum.exe elevation_service.exe File opened for modification \??\c:\windows\SysWOW64\svchost.exe JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened for modification \??\c:\windows\system32\Appvclient.exe JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened for modification \??\c:\windows\system32\sgrmbroker.exe JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened for modification \??\c:\windows\system32\lsass.exe elevation_service.exe File opened for modification \??\c:\windows\system32\searchindexer.exe elevation_service.exe File opened for modification \??\c:\windows\SysWOW64\perfhost.exe JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened for modification \??\c:\windows\SysWOW64\wbem\wmiApsrv.exe JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened for modification \??\c:\windows\system32\wbem\wmiApsrv.exe JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened for modification \??\c:\windows\system32\msiexec.exe elevation_service.exe File opened for modification \??\c:\windows\SysWOW64\Appvclient.exe JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened for modification \??\c:\windows\system32\openssh\ssh-agent.exe JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened for modification \??\c:\windows\SysWOW64\tieringengineservice.exe JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened for modification \??\c:\windows\system32\dllhost.exe elevation_service.exe File created \??\c:\windows\system32\gmndaago.tmp JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened for modification \??\c:\windows\system32\dllhost.exe JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened for modification \??\c:\windows\system32\fxssvc.exe JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File created \??\c:\windows\system32\omagnonp.tmp JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened for modification \??\c:\windows\system32\locator.exe JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened for modification \??\c:\windows\system32\tieringengineservice.exe elevation_service.exe File opened for modification \??\c:\windows\SysWOW64\fxssvc.exe JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened for modification \??\c:\windows\system32\sensordataservice.exe JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened for modification \??\c:\windows\SysWOW64\searchindexer.exe JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened for modification \??\c:\windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened for modification \??\c:\windows\system32\locator.exe elevation_service.exe File opened for modification \??\c:\windows\SysWOW64\msdtc.exe JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened for modification \??\c:\windows\system32\msdtc.exe JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\dotnet\gakpqfhp.tmp JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javapackager.exe JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\fjkphpcb.tmp JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javah.exe JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\djgnqiea.tmp JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jdeps.exe JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\keytool.exe JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\serialver.exe JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\java.exe JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\nimidobm.tmp JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File created C:\Program Files\Java\jdk-1.8\bin\jbcghalc.tmp JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File created \??\c:\program files\windows media player\olceokok.tmp JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstatd.exe JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jjs.exe JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File created C:\Program Files\Java\jdk-1.8\bin\qcogljfn.tmp JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe elevation_service.exe File created C:\Program Files\Java\jdk-1.8\bin\feqkbkgm.tmp JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File created C:\Program Files\Java\jdk-1.8\bin\acdacdcn.tmp JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File created C:\Program Files\Java\jdk-1.8\bin\ookbgdam.tmp JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File created C:\Program Files\Java\jdk-1.8\bin\aneiiahc.tmp JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ShapeCollector.exe JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javaw.exe JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened for modification C:\Program Files\7-Zip\7z.exe JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jdb.exe JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jjs.exe JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\wsgen.exe JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\pnqggbpc.tmp JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe elevation_service.exe File created C:\Program Files\Java\jdk-1.8\bin\bklbclai.tmp JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\native2ascii.exe JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File created C:\Program Files\Java\jdk-1.8\bin\elmcbqaa.tmp JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\bmmoojdm.tmp JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaw.exe JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javaws.exe JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File created \??\c:\program files\google\chrome\Application\123.0.6312.123\mhpggeij.tmp JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javac.exe JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\dklkkafp.tmp JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe elevation_service.exe File created C:\Program Files\Java\jdk-1.8\bin\qqlagjep.tmp JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\rmid.exe JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\knjpmnmh.tmp JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\klonohhl.tmp JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened for modification C:\Program Files\Internet Explorer\iediagcmd.exe JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jconsole.exe JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\createdump.exe JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File created C:\Program Files\Java\jdk-1.8\bin\mekilqcj.tmp JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened for modification \??\c:\program files\windows media player\wmpnetwk.exe JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\nklemblo.tmp JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened for modification C:\Program Files\7-Zip\7zG.exe elevation_service.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jps.exe JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File created C:\Program Files\Java\jdk-1.8\bin\ooclgjlk.tmp JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened for modification \??\c:\program files (x86)\mozilla maintenance service\maintenanceservice.exe JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\gmoggjie.tmp JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\dliebeel.tmp JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\tnameserv.exe JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification \??\c:\windows\servicing\trustedinstaller.exe JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\wpf\presentationfontcache.exe elevation_service.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\wpf\presentationfontcache.exe JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe -
Suspicious behavior: EnumeratesProcesses 44 IoCs
pid Process 4720 elevation_service.exe 4720 elevation_service.exe 4720 elevation_service.exe 4720 elevation_service.exe 4720 elevation_service.exe 4720 elevation_service.exe 4720 elevation_service.exe 4720 elevation_service.exe 4720 elevation_service.exe 4720 elevation_service.exe 4720 elevation_service.exe 4720 elevation_service.exe 4720 elevation_service.exe 4720 elevation_service.exe 4720 elevation_service.exe 4720 elevation_service.exe 4720 elevation_service.exe 4720 elevation_service.exe 4720 elevation_service.exe 4720 elevation_service.exe 4720 elevation_service.exe 4720 elevation_service.exe 4720 elevation_service.exe 4720 elevation_service.exe 4720 elevation_service.exe 4720 elevation_service.exe 4720 elevation_service.exe 4720 elevation_service.exe 4720 elevation_service.exe 4720 elevation_service.exe 4720 elevation_service.exe 4720 elevation_service.exe 4720 elevation_service.exe 4720 elevation_service.exe 4720 elevation_service.exe 4720 elevation_service.exe 4720 elevation_service.exe 4720 elevation_service.exe 4720 elevation_service.exe 4720 elevation_service.exe 4720 elevation_service.exe 4720 elevation_service.exe 4720 elevation_service.exe 4720 elevation_service.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 668 Process not Found 668 Process not Found -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 996 JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe Token: SeTakeOwnershipPrivilege 4720 elevation_service.exe -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer elevation_service.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" elevation_service.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_77dee8b1b368b860d694420325d37ddf.exe"1⤵
- Drops Chrome extension
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:996
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:4720
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"1⤵
- Executes dropped EXE
PID:4788
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
PID:2020
-
\??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
PID:1888
-
C:\Windows\System32\OpenSSH\ssh-agent.exeC:\Windows\System32\OpenSSH\ssh-agent.exe1⤵
- Executes dropped EXE
PID:1960
Network
-
Remote address:8.8.8.8:53Request13.86.106.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request182.129.81.91.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request73.31.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request156.33.209.4.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request104.219.191.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request200.163.202.172.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request15.164.165.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request172.210.232.199.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request21.236.111.52.in-addr.arpaIN PTRResponse
-
71 B 157 B 1 1
DNS Request
13.86.106.20.in-addr.arpa
-
72 B 147 B 1 1
DNS Request
182.129.81.91.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
73.31.126.40.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
156.33.209.4.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
104.219.191.52.in-addr.arpa
-
74 B 160 B 1 1
DNS Request
200.163.202.172.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
15.164.165.52.in-addr.arpa
-
74 B 128 B 1 1
DNS Request
172.210.232.199.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
21.236.111.52.in-addr.arpa
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD563173a2d44156724779ac5c374a5249a
SHA1aaac9cb71f386e8b2d5c1f4be4cab641e466dead
SHA256eb70059c00bbb7d14c60148ec3b5306630f363cd04cba93a43925612161fd7ab
SHA512cc4a89eabe326901ece376d37c103a76f96749c486cf9f2851af11fb274b34e2a6bbbf22586eda455c1e7b11b970464323b376638b0ce553441ec2acbf1cf309
-
Filesize
781KB
MD5116c68f8fcc1e080fbd0ec5b4d622652
SHA1ba3035a0b4ea1dab6e967d49082439b625ca303e
SHA25685e16304f05767c701ac3aadc9059e8a0d280ca1095f60a30aa9272dfc372fac
SHA5126742658c1392a553cc6e5e07b9d3ea133313a4557c9f9471092d67d11bec43473dc4d913a7dd395e3593061e3bfada8796e8f2f8ee4a0ba267d00f6e525c7023
-
Filesize
1.1MB
MD51b59a7a5efdf1d5f24015a5f13367156
SHA16ca75da490e98f89d6e3e05444ac4f4dc9bb2741
SHA25604594af625f601103aab5055bfb93b0499a84988df054a70e5cd7c34efd1586c
SHA512f5ee20a46693b07706642661ddd4e371871b555cf51f139f2a44bcd4963d42b038c911dab3dbc4f02084e5431b8f218b9f7abf638434f87ecb8d58136f8d5064
-
Filesize
1.5MB
MD5ee2d85959d54d054c02f8d79182ba833
SHA13425f571e6fc05073365a6b6a222fa5379a51361
SHA256a072d00dfa57de14bb9c26c867853d178799a9da77f1176183982f565a7a477b
SHA5120f28a4a4e934bfcfc92150e57dd6ac78fbf8d73640ae8b7d738db2b1f4dcfc375fcf15e163e9d81e574200ef8852b1f7a73946700dcc2068c84d6ad934004255
-
Filesize
1.2MB
MD5dce33b6cef626928baffa36c2e24a4fd
SHA169064fde03bb96d9456b878f57f3c9fe6efacc89
SHA2567321eeb8ea352058d5c9409c5f3553ee16ca7689b6265a92d36f0c488f85e536
SHA512570999b8d5c8f6438766894e0edec0616cd7cca1313d28fee53cd3a638f2682b72f15e85c2b2026fb9b0334c4cc6f79378a0ed163ed66bcf66a7801537427d98
-
Filesize
832KB
MD5b80c0f29f7e5e865caaffab1424dfdb8
SHA1a6d541141aa9e52f712ec6a3800741781ecbf8e8
SHA25689ed52ac46f0eea3b4205dd88c86fd6084a4b5b4eb57004d18138dae4743ab95
SHA5124813982e00df9a2f535e379ecddb9e68b5d971a74e7b1cba2fc584a24be4a1e0909f4d549384b3f62a82061625531fbf6a904386a45bb29c5d9f7bb0a40397d8
-
Filesize
4.6MB
MD525614371d469f719fe0f2f4c7f4f9655
SHA1a62909cae767dffb2710e0eb3370d4f9da7dccd1
SHA256a966e643e6e25e8fd1e1a05205c399839a63f910a84228896868857696b2aed8
SHA512ba7c29798633312aa80bc3d11101d6aba3fe6868c6ea4a7cdabdf6414e41daf5230f2dc00c14b87526317d4ec6d5705834c22847b6d94e835a6f9de6a3e966e4
-
Filesize
898KB
MD5be11ed09422c82c550800c50b8db7f9c
SHA1365b7f6150cf81acbe655e317e02a801e63e95f7
SHA2562dcce073cf6bc5f57f8e998414df6ba0d23713c31f1fd25dec323548b4046b6b
SHA51271ea07252a59d12e7f4a16a3b07ae52461dbbbf21498a3f5f85e6bfb7f25462930055451522c2d194c8e8273824a859bef65cd9f1868638ae462340911ed4e7f
-
Filesize
24.0MB
MD5028e126134a70424a5a9d5382d421f26
SHA1df6b857d24185da1f10705347671c0576b268629
SHA256f840e8929d615d8612b44a00027e17bd614d628879bbee39e845a7ac4c3609a4
SHA51266082c7868694d29eb8f907a92e9a19729f06b53eaaf157ea9a3c89b6a6e7cf56274c97c2af4f553e99f2c67fed77ecac9134810d5a1cfe3663526444f3c9c0b
-
Filesize
2.7MB
MD59e853a7df100fc2a83eb4456a7fb7efb
SHA1afa108d9648597aa3085fde384c1f8ff9996ec95
SHA256ac16029e35a54e665b1fa55f4b28574bc85a7929a6540c4052b8f70d05eed117
SHA5122fb0fa6d6a34036b0150a511952170717e106adc3bf3b239af10b79fa4f7bd9fd29f35a971f4589265856cf6f63e742fac1777068dc40ab62d23300d652de252
-
Filesize
797KB
MD584b5155d8a3995f86dd9ca991b1c0eba
SHA1e4a4f23973c0c1076d5a5011e20389a77e0475f3
SHA25630296e78163da1c2fbe44f518b458e7286d68f573953bfcee5406d91c58bb3ca
SHA512defc0389b0651106bf030ed7991c76ecad44c4d143c12d199af75dfc8ed3250aa834c3c0a70f217a2c067b3fed934cadc0e80a5606d46d8d0d1b4856ec5ffcda
-
Filesize
4.6MB
MD5c1251c2752afd5e2d1af754416c95e03
SHA1efedb67f9f05c625482f3f7cb5714b1acd9ffa4f
SHA2560148a3143ad5d5ebd0b2e451f83a6216ceb47ca1f2db2eda5711186ee72450df
SHA5122ccd6c8caca74a5a47d469781bea4b1e9732a0852d01ce98c6e11043c946dbfd5a2356eacfac594b1a21c8c6d697dc68c34416467e0c6c0598212970d305a4ac
-
Filesize
2.1MB
MD5d26eb6953129c52ef078216fbf111f33
SHA1dcdf21f4f2f3218560119f43e4400fabd8b5d469
SHA2564a8731715af3b00ad31ffc28f0c1c6ad3fc21c9dd0ef21be3d6472f0dc56d897
SHA512f02e93a8b4d8f6ed8ed34c8335f452e640012ff6485c11a4fe09ab4a6961bf197aba7856205d2fe9d8db75ede14874ef541e12cfbe7a76f54ae2ca35ac40c181
-
Filesize
1.3MB
MD5627c6b091631c9e7df6537e00c7ce5a3
SHA10cc5b61e82c496af951fde60631df39d0e818f02
SHA256d277b8a9d9975427cf418fc3a904e411f60952dd9dcf1bc08d1f86518ac24769
SHA5129a23e631dcd4bfafa89e3e4b1cd716f1c25cb5b440b3964ccc8295368450b297ddaf42c6c0474a779bcfd13f5e06d71acba406561c314f76785d98a07e95e177
-
Filesize
978KB
MD550e5f8a4f848b914c6a6aaaaa2f5042c
SHA19623b4dd8ce98a6f3ab35ab98b5a35fd985fee2d
SHA2568147ac157eadee25af9f54ce84ce1393f4963da926ea8193b3d490d946d5116d
SHA512f2bc46553e4bd0f23e185165b2684cb2da60df169a29d4b2160872e3274fd5d59f7c1191911bb381b64a7009be9ed69b46da7f7b92afd52bbf4a9833b6dc3f15
-
Filesize
932KB
MD557e5a81fe0d525d4846cd13ad77611f5
SHA11ef18158863d4eda9955a4ecb414196e847b6ede
SHA2561af62869732cc4e95421c19124eba47e620d20f587b22d6bfca183ee0e2b322a
SHA512e4162e86d36cdac5d2aa784d89d29b844bbb4893e102ac252ee449d342e8c2b93a9a0283283b0b5a871fd470d0f38e756f0199c8c969d4fa7449177c4dd0b00b
-
Filesize
1.3MB
MD52496539304d607141eb59af8eb354e66
SHA14c947129f6369da8c266d141bf0ddd3c5ea20f4a
SHA256bae2e5a0ce95caff6fb3ba3289f4a6ffe14b388cb9dc740f00e2e64e9b6ed518
SHA512717296e2fdc64d82d8f0160729ee88198690e40a5e773f301cc809b0dcace9e589d5401cff40d80cb7e6eadbaa6c831edf80c2b4c4e7db1e295635d540ced5bc
-
Filesize
1.5MB
MD5c1755571968c533c632d9c168b0b91d6
SHA1eff78d6846d09b790d9e1c7d7a786356237f9560
SHA2561a9ea895f8de6f10f50356f76dea70f6696313a0e10ef64b4b6314b8e537da1d
SHA51275bdce21cfd3816ff0ca4ab9300f923c2a786106b5b1685e30216c01aa2faf0b9fa886bec01f161744a29d2aff4ec5093339c842ea1f53ca0ac1e6e8651be1a4
-
Filesize
1.7MB
MD528771967a0aa1fafddce022f9290eb3f
SHA14762586a2ca52824118b1431e999d21185c68392
SHA256d734bbf712bede11b47db31ff6bce74acdb802d12989df49733c4e9fd64b46e8
SHA5129413e4313953dff65a41238201b63490165bffebb4c3dd54064513a8ce59b75fbbe44883cd93b189393e4c401628834c547ded4c7eeb155eb34cbf81c89d00ea
-
Filesize
1.2MB
MD5929e4d520c3ed04e850f0c4d46312154
SHA1ad05e3650b8bb5c44e49549fbc5f9db8f58bedaa
SHA256c49ebf774ad96ac2074456b33f1704733ec6ab0a85046c74caac136252ce55d1
SHA51287bde229eda3acbbeb39e1a0c7ea5cb47842aec46db018c90d8ddd3c7b013e25b8d23e02221ff62ccdb1ff920d8c4c4ace18e5839a69cc9efaea36f2b63965ab
-
Filesize
700KB
MD5f72ef0df7604add3a6482f0435a4fece
SHA124f98da1647ea08bb6bcc4d431f404f7ce4f4d0b
SHA2561a345cf206c892d9b5a20de6df6cafab2b312cfeb014dc72c111b31bbfc86a3f
SHA5129262e4371e361343cda1654e8dab744a53864f15e45e330c4e954357190f264f13a52d7af41c58f49e6ecc61a1c9304bdfaaf88f15bffc809f1ae56820891d0b
-
Filesize
623KB
MD5d13ae95b887258e33ee2782b90ade178
SHA1f5949ee8c219d49959863233434c7cf9393ded2b
SHA2568e2b482e593c8006326101f5af18787cc3be9f1001a1793f9c3a837a2820660e
SHA512043c7abcbabbe7aa3cc8bfca6d9e32d7dbf0cf6fb120b3c2ccfc9001d4adc101c19f3b50c16d74ec6d05f8687cb20a9270007ca552a2f2f004170f8b35abd9c8
-
Filesize
572KB
MD512124ac7e8a9fb7e9bddbec89fc28da1
SHA1a89a41a6b86a8e596ebc2235e3a5c28802a557a5
SHA256b78897af52766c833207530460042a9f8aa7bb5e27d1aeeca0bcec73af984383
SHA512721bb94d31fb47e170d38f4b37fa6069d455e527369775d8f1bc633af106cdea57ccf484423b86dfe45ecb117590a5e4d595dd90b8e4a6597bbd8934839f56c4
-
Filesize
2.1MB
MD5ded229420e26e09b99e782dcac5e2e60
SHA15a782dcd01cf7884889bd4b96ca8c9cb9b57908e
SHA2567b8a36f4e3ac6bed50caff7534f81104dbefc02051d7f9e302fdbef53e7d29ba
SHA512eace6ce68e674c3f45bdf1bd3b03a112c8219a394fe71ddfa5d3daee5e470ff49e679490870a6a2ca2aa360c4a80a3502bbbc73bb2bdc11b48b0c050be2830a6