Analysis
-
max time kernel
135s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-01-2025 11:23
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe
-
Size
2.1MB
-
MD5
a0b0432294ebbc84d306993e2e7ea91c
-
SHA1
217f15f8048cb52b529bcad20c687422c9a29add
-
SHA256
1eb180ad160549d0754076d4230617fdcb22666e1708a0b8d37c8886a9f554f3
-
SHA512
1dc1884893156b400f5c9aa0c7a922ca6a06758771f70a560c82f2b3078ae2fde9b21b797236e4d7dcd3db866d3afee18b6acee3124224c5b0aca8376afced61
-
SSDEEP
49152:0Whc2Iyefi4Cvv5mGb9dPaBq9MuAp3JwMLerDclJyA:9Qq6gz95Ap3JBeAJyA
Malware Config
Extracted
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\eTbd_HOW_TO_DECRYPT.txt
hive
http://hiveleakdbtnp76ulyhi52eag6c6tyc3xw7ez7iqy6wc34gd2nekazyd.onion/
http://hivecust6vhekztbqgdnkks64ucehqacge3dij3gyrrpdp57zoq3ooqd.onion/
Signatures
-
Deletes Windows Defender Definitions 2 TTPs 1 IoCs
Uses mpcmdrun utility to delete all AV definitions.
pid Process 1596 MpCmdRun.exe -
Hive
A ransomware written in Golang first seen in June 2021.
-
Hive family
-
description ioc Process Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\Start = "4" reg.exe -
Clears Windows event logs 1 TTPs 3 IoCs
pid Process 1648 wevtutil.exe 2192 wevtutil.exe 3064 wevtutil.exe -
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 872 bcdedit.exe 1972 bcdedit.exe -
Deletes itself 1 IoCs
pid Process 1704 cmd.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
pid Process 2820 powershell.exe 2872 powershell.exe -
Modifies Security services 2 TTPs 6 IoCs
Modifies the startup behavior of a security service.
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SecurityHealthService\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SecurityHealthService\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WdBoot\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WdFilter\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WdNisDrv\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WdNisSvc\Start = "4" reg.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0227419.JPG.gsz5oww25R-1zFOr4PUyrlZ7AQ1n4IxDZssgNCgzjwT_Pg8ZU7Q06R00.rwbwj JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE00726_.WMF.gsz5oww25R-1zFOr4PUyrlZ7AQ1n4IxDZssgNCgzjwT_y6l68crrB2w0.rwbwj JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Thatch.xml.gsz5oww25R-1zFOr4PUyrlZ7AQ1n4IxDZssgNCgzjwT_qOM5noMxmHw0.rwbwj JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\1033\OLAPPTR.FAE.gsz5oww25R-1zFOr4PUyrlZ7AQ1n4IxDZssgNCgzjwT_5k3_x2xqo0g0.rwbwj JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_black_moon-waxing-crescent.png JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-progress-ui_zh_CN.jar.gsz5oww25R-1zFOr4PUyrlZ7AQ1n4IxDZssgNCgzjwT_6X98JgSjnBk0.rwbwj JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\gadget.xml JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD00234_.WMF.gsz5oww25R-1zFOr4PUyrlZ7AQ1n4IxDZssgNCgzjwT_n48CuedQ9Cc0.rwbwj JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0195254.WMF.gsz5oww25R-1zFOr4PUyrlZ7AQ1n4IxDZssgNCgzjwT_1ynb7JnZ2zA0.rwbwj JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE02263_.WMF.gsz5oww25R-1zFOr4PUyrlZ7AQ1n4IxDZssgNCgzjwT_s-y2TCPdt240.rwbwj JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\bg_Country.gif.gsz5oww25R-1zFOr4PUyrlZ7AQ1n4IxDZssgNCgzjwT_WhI_Q_I676A0.rwbwj JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe File created C:\Program Files\VideoLAN\VLC\locale\wa\LC_MESSAGES\eTbd_HOW_TO_DECRYPT.txt JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-masterfs_ja.jar.gsz5oww25R-1zFOr4PUyrlZ7AQ1n4IxDZssgNCgzjwT_Wr3YLubZCvQ0.rwbwj JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BL00923_.WMF.gsz5oww25R-1zFOr4PUyrlZ7AQ1n4IxDZssgNCgzjwT_dUG_U2Zj4a00.rwbwj JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD15277_.GIF.gsz5oww25R-1zFOr4PUyrlZ7AQ1n4IxDZssgNCgzjwT_W4P4SQkRP_s0.rwbwj JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\InkWatson.exe.mui JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD14693_.GIF.gsz5oww25R-1zFOr4PUyrlZ7AQ1n4IxDZssgNCgzjwT_8v7oZpe7zBA0.rwbwj JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE01160_.WMF.gsz5oww25R-1zFOr4PUyrlZ7AQ1n4IxDZssgNCgzjwT_E5KBtzWVyJY0.rwbwj JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Bibliography\Author2String.XSL.gsz5oww25R-1zFOr4PUyrlZ7AQ1n4IxDZssgNCgzjwT_2FpftGdvKqk0.rwbwj JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\GREETING.XML.gsz5oww25R-1zFOr4PUyrlZ7AQ1n4IxDZssgNCgzjwT_KVQ1H6ZqY1Y0.rwbwj JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_black_hail.png JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0185778.WMF.gsz5oww25R-1zFOr4PUyrlZ7AQ1n4IxDZssgNCgzjwT_RbRJPQOK3jE0.rwbwj JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\e4_default_winxp_blu.css.gsz5oww25R-1zFOr4PUyrlZ7AQ1n4IxDZssgNCgzjwT_liDJ_kZsWqs0.rwbwj JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\images\combo-hover-left.png JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0382948.JPG.gsz5oww25R-1zFOr4PUyrlZ7AQ1n4IxDZssgNCgzjwT_KYPO-OEJGJY0.rwbwj JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Effects\Median.eftx.gsz5oww25R-1zFOr4PUyrlZ7AQ1n4IxDZssgNCgzjwT_9y6F8xxybPA0.rwbwj JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Earthy.css.gsz5oww25R-1zFOr4PUyrlZ7AQ1n4IxDZssgNCgzjwT_2dsYy7hgXf00.rwbwj JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\BrightYellow\HEADER.GIF.gsz5oww25R-1zFOr4PUyrlZ7AQ1n4IxDZssgNCgzjwT_ZlFSQlAA_uw0.rwbwj JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\symbase.xml JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\Simferopol.gsz5oww25R-1zFOr4PUyrlZ7AQ1n4IxDZssgNCgzjwT_xQcf-hdaU8g0.rwbwj JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\css\currency.css JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\VDK10.CMP.gsz5oww25R-1zFOr4PUyrlZ7AQ1n4IxDZssgNCgzjwT_4qN_h3eqqno0.rwbwj JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE05665_.WMF.gsz5oww25R-1zFOr4PUyrlZ7AQ1n4IxDZssgNCgzjwT_VHNtjn-ZM2s0.rwbwj JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe File opened for modification C:\Program Files (x86)\Common Files\System\Ole DB\en-US\msdaorar.dll.mui JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\CASCADE\THMBNAIL.PNG.gsz5oww25R-1zFOr4PUyrlZ7AQ1n4IxDZssgNCgzjwT_uTZ4p8BTTxE0.rwbwj JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA00388_.WMF.gsz5oww25R-1zFOr4PUyrlZ7AQ1n4IxDZssgNCgzjwT_Gub8JiH3rww0.rwbwj JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\WB01296_.GIF.gsz5oww25R-1zFOr4PUyrlZ7AQ1n4IxDZssgNCgzjwT_kFGx72CU6as0.rwbwj JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe File created C:\Program Files\Microsoft Games\Multiplayer\Spades\fr-FR\eTbd_HOW_TO_DECRYPT.txt JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\Calendar\eTbd_HOW_TO_DECRYPT.txt JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\open_original_form.gif.gsz5oww25R-1zFOr4PUyrlZ7AQ1n4IxDZssgNCgzjwT_CGSMR7WBZT00.rwbwj JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\can129.hsp.gsz5oww25R-1zFOr4PUyrlZ7AQ1n4IxDZssgNCgzjwT_VjATtinvANs0.rwbwj JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Module.xml.gsz5oww25R-1zFOr4PUyrlZ7AQ1n4IxDZssgNCgzjwT_oavvo6AGjdI0.rwbwj JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe File created C:\Program Files\VideoLAN\VLC\locale\nb\LC_MESSAGES\eTbd_HOW_TO_DECRYPT.txt JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\SportsMainToScenesBackground.wmv JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\rectangle_glass_Thumbnail.bmp JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\OLMAIL.FAE.gsz5oww25R-1zFOr4PUyrlZ7AQ1n4IxDZssgNCgzjwT_Gi0IlE62uic0.rwbwj JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\LAUNCH.GIF.gsz5oww25R-1zFOr4PUyrlZ7AQ1n4IxDZssgNCgzjwT_bOE1ENHANLc0.rwbwj JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\images\cronometer_dot.png JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0187819.WMF.gsz5oww25R-1zFOr4PUyrlZ7AQ1n4IxDZssgNCgzjwT_cx4H2HhNtxc0.rwbwj JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD14529_.GIF.gsz5oww25R-1zFOr4PUyrlZ7AQ1n4IxDZssgNCgzjwT_Yc1IWyrAfNU0.rwbwj JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\css\settings.css JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\WATER\THMBNAIL.PNG.gsz5oww25R-1zFOr4PUyrlZ7AQ1n4IxDZssgNCgzjwT_8AhceS-viR40.rwbwj JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PROOF\MSSP7ES.dub.gsz5oww25R-1zFOr4PUyrlZ7AQ1n4IxDZssgNCgzjwT_kTwOm5mvpNY0.rwbwj JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGMARQ.DPV.gsz5oww25R-1zFOr4PUyrlZ7AQ1n4IxDZssgNCgzjwT_VrPC0vHqiOE0.rwbwj JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\eTbd_HOW_TO_DECRYPT.txt JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyScenesBackground_PAL.wmv JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-modules-keyring-fallback.xml.gsz5oww25R-1zFOr4PUyrlZ7AQ1n4IxDZssgNCgzjwT_TbPmycddfB80.rwbwj JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\feature.xml.gsz5oww25R-1zFOr4PUyrlZ7AQ1n4IxDZssgNCgzjwT_5tcmDqLHqzM0.rwbwj JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\de-DE\bckgzm.exe.mui.gsz5oww25R-1zFOr4PUyrlZ7AQ1n4IxDZssgNCgzjwT_q0bV7gwQfTY0.rwbwj JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\GRPHFLT\CGMIMP32.FNT.gsz5oww25R-1zFOr4PUyrlZ7AQ1n4IxDZssgNCgzjwT_MZ2M3rua2wA0.rwbwj JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\ESEN\WT61ES.LEX.gsz5oww25R-1zFOr4PUyrlZ7AQ1n4IxDZssgNCgzjwT_rtaxK6r7XFw0.rwbwj JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107364.WMF.gsz5oww25R-1zFOr4PUyrlZ7AQ1n4IxDZssgNCgzjwT_NDwvnkHiN1Y0.rwbwj JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\rtf_alignright.gif.gsz5oww25R-1zFOr4PUyrlZ7AQ1n4IxDZssgNCgzjwT_my92SSOWwug0.rwbwj JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe File opened for modification C:\Program Files\DVD Maker\en-US\WMM2CLIP.dll.mui JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe -
Launches sc.exe 8 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1976 sc.exe 2420 sc.exe 1988 sc.exe 1784 sc.exe 2212 sc.exe 376 sc.exe 1576 sc.exe 2624 sc.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1704 cmd.exe 864 PING.EXE -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2364 vssadmin.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2520 notepad.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 864 PING.EXE -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2820 powershell.exe 2872 powershell.exe 2316 JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeSecurityPrivilege 1648 wevtutil.exe Token: SeBackupPrivilege 1648 wevtutil.exe Token: SeSecurityPrivilege 2192 wevtutil.exe Token: SeBackupPrivilege 2192 wevtutil.exe Token: SeSecurityPrivilege 3064 wevtutil.exe Token: SeBackupPrivilege 3064 wevtutil.exe Token: SeIncreaseQuotaPrivilege 2500 wmic.exe Token: SeSecurityPrivilege 2500 wmic.exe Token: SeTakeOwnershipPrivilege 2500 wmic.exe Token: SeLoadDriverPrivilege 2500 wmic.exe Token: SeSystemProfilePrivilege 2500 wmic.exe Token: SeSystemtimePrivilege 2500 wmic.exe Token: SeProfSingleProcessPrivilege 2500 wmic.exe Token: SeIncBasePriorityPrivilege 2500 wmic.exe Token: SeCreatePagefilePrivilege 2500 wmic.exe Token: SeBackupPrivilege 2500 wmic.exe Token: SeRestorePrivilege 2500 wmic.exe Token: SeShutdownPrivilege 2500 wmic.exe Token: SeDebugPrivilege 2500 wmic.exe Token: SeSystemEnvironmentPrivilege 2500 wmic.exe Token: SeRemoteShutdownPrivilege 2500 wmic.exe Token: SeUndockPrivilege 2500 wmic.exe Token: SeManageVolumePrivilege 2500 wmic.exe Token: 33 2500 wmic.exe Token: 34 2500 wmic.exe Token: 35 2500 wmic.exe Token: SeIncreaseQuotaPrivilege 972 wmic.exe Token: SeSecurityPrivilege 972 wmic.exe Token: SeTakeOwnershipPrivilege 972 wmic.exe Token: SeLoadDriverPrivilege 972 wmic.exe Token: SeSystemProfilePrivilege 972 wmic.exe Token: SeSystemtimePrivilege 972 wmic.exe Token: SeProfSingleProcessPrivilege 972 wmic.exe Token: SeIncBasePriorityPrivilege 972 wmic.exe Token: SeCreatePagefilePrivilege 972 wmic.exe Token: SeBackupPrivilege 972 wmic.exe Token: SeRestorePrivilege 972 wmic.exe Token: SeShutdownPrivilege 972 wmic.exe Token: SeDebugPrivilege 972 wmic.exe Token: SeSystemEnvironmentPrivilege 972 wmic.exe Token: SeRemoteShutdownPrivilege 972 wmic.exe Token: SeUndockPrivilege 972 wmic.exe Token: SeManageVolumePrivilege 972 wmic.exe Token: 33 972 wmic.exe Token: 34 972 wmic.exe Token: 35 972 wmic.exe Token: SeIncreaseQuotaPrivilege 972 wmic.exe Token: SeSecurityPrivilege 972 wmic.exe Token: SeTakeOwnershipPrivilege 972 wmic.exe Token: SeLoadDriverPrivilege 972 wmic.exe Token: SeSystemProfilePrivilege 972 wmic.exe Token: SeSystemtimePrivilege 972 wmic.exe Token: SeProfSingleProcessPrivilege 972 wmic.exe Token: SeIncBasePriorityPrivilege 972 wmic.exe Token: SeCreatePagefilePrivilege 972 wmic.exe Token: SeBackupPrivilege 972 wmic.exe Token: SeRestorePrivilege 972 wmic.exe Token: SeShutdownPrivilege 972 wmic.exe Token: SeDebugPrivilege 972 wmic.exe Token: SeSystemEnvironmentPrivilege 972 wmic.exe Token: SeRemoteShutdownPrivilege 972 wmic.exe Token: SeUndockPrivilege 972 wmic.exe Token: SeManageVolumePrivilege 972 wmic.exe Token: 33 972 wmic.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2844 2316 JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe 30 PID 2316 wrote to memory of 2844 2316 JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe 30 PID 2316 wrote to memory of 2844 2316 JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe 30 PID 2844 wrote to memory of 2876 2844 net.exe 32 PID 2844 wrote to memory of 2876 2844 net.exe 32 PID 2844 wrote to memory of 2876 2844 net.exe 32 PID 2316 wrote to memory of 3008 2316 JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe 33 PID 2316 wrote to memory of 3008 2316 JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe 33 PID 2316 wrote to memory of 3008 2316 JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe 33 PID 3008 wrote to memory of 2704 3008 net.exe 35 PID 3008 wrote to memory of 2704 3008 net.exe 35 PID 3008 wrote to memory of 2704 3008 net.exe 35 PID 2316 wrote to memory of 2148 2316 JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe 36 PID 2316 wrote to memory of 2148 2316 JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe 36 PID 2316 wrote to memory of 2148 2316 JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe 36 PID 2148 wrote to memory of 1224 2148 net.exe 38 PID 2148 wrote to memory of 1224 2148 net.exe 38 PID 2148 wrote to memory of 1224 2148 net.exe 38 PID 2316 wrote to memory of 2856 2316 JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe 39 PID 2316 wrote to memory of 2856 2316 JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe 39 PID 2316 wrote to memory of 2856 2316 JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe 39 PID 2856 wrote to memory of 2740 2856 net.exe 41 PID 2856 wrote to memory of 2740 2856 net.exe 41 PID 2856 wrote to memory of 2740 2856 net.exe 41 PID 2316 wrote to memory of 2612 2316 JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe 42 PID 2316 wrote to memory of 2612 2316 JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe 42 PID 2316 wrote to memory of 2612 2316 JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe 42 PID 2612 wrote to memory of 2888 2612 net.exe 44 PID 2612 wrote to memory of 2888 2612 net.exe 44 PID 2612 wrote to memory of 2888 2612 net.exe 44 PID 2316 wrote to memory of 2680 2316 JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe 45 PID 2316 wrote to memory of 2680 2316 JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe 45 PID 2316 wrote to memory of 2680 2316 JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe 45 PID 2680 wrote to memory of 2744 2680 net.exe 47 PID 2680 wrote to memory of 2744 2680 net.exe 47 PID 2680 wrote to memory of 2744 2680 net.exe 47 PID 2316 wrote to memory of 2752 2316 JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe 48 PID 2316 wrote to memory of 2752 2316 JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe 48 PID 2316 wrote to memory of 2752 2316 JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe 48 PID 2752 wrote to memory of 2864 2752 net.exe 50 PID 2752 wrote to memory of 2864 2752 net.exe 50 PID 2752 wrote to memory of 2864 2752 net.exe 50 PID 2316 wrote to memory of 2576 2316 JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe 51 PID 2316 wrote to memory of 2576 2316 JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe 51 PID 2316 wrote to memory of 2576 2316 JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe 51 PID 2576 wrote to memory of 2596 2576 net.exe 53 PID 2576 wrote to memory of 2596 2576 net.exe 53 PID 2576 wrote to memory of 2596 2576 net.exe 53 PID 2316 wrote to memory of 2624 2316 JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe 54 PID 2316 wrote to memory of 2624 2316 JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe 54 PID 2316 wrote to memory of 2624 2316 JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe 54 PID 2316 wrote to memory of 1976 2316 JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe 56 PID 2316 wrote to memory of 1976 2316 JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe 56 PID 2316 wrote to memory of 1976 2316 JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe 56 PID 2316 wrote to memory of 2420 2316 JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe 58 PID 2316 wrote to memory of 2420 2316 JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe 58 PID 2316 wrote to memory of 2420 2316 JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe 58 PID 2316 wrote to memory of 1988 2316 JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe 60 PID 2316 wrote to memory of 1988 2316 JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe 60 PID 2316 wrote to memory of 1988 2316 JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe 60 PID 2316 wrote to memory of 1784 2316 JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe 62 PID 2316 wrote to memory of 1784 2316 JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe 62 PID 2316 wrote to memory of 1784 2316 JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe 62 PID 2316 wrote to memory of 2212 2316 JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe 64 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\system32\net.exenet.exe stop "NetMsmqActivator" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "NetMsmqActivator" /y3⤵PID:2876
-
-
-
C:\Windows\system32\net.exenet.exe stop "SamSs" /y2⤵
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SamSs" /y3⤵PID:2704
-
-
-
C:\Windows\system32\net.exenet.exe stop "SDRSVC" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SDRSVC" /y3⤵PID:1224
-
-
-
C:\Windows\system32\net.exenet.exe stop "SstpSvc" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SstpSvc" /y3⤵PID:2740
-
-
-
C:\Windows\system32\net.exenet.exe stop "UI0Detect" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "UI0Detect" /y3⤵PID:2888
-
-
-
C:\Windows\system32\net.exenet.exe stop "VSS" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "VSS" /y3⤵PID:2744
-
-
-
C:\Windows\system32\net.exenet.exe stop "wbengine" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "wbengine" /y3⤵PID:2864
-
-
-
C:\Windows\system32\net.exenet.exe stop "WebClient" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "WebClient" /y3⤵PID:2596
-
-
-
C:\Windows\system32\sc.exesc.exe config "NetMsmqActivator" start= disabled2⤵
- Launches sc.exe
PID:2624
-
-
C:\Windows\system32\sc.exesc.exe config "SamSs" start= disabled2⤵
- Launches sc.exe
PID:1976
-
-
C:\Windows\system32\sc.exesc.exe config "SDRSVC" start= disabled2⤵
- Launches sc.exe
PID:2420
-
-
C:\Windows\system32\sc.exesc.exe config "SstpSvc" start= disabled2⤵
- Launches sc.exe
PID:1988
-
-
C:\Windows\system32\sc.exesc.exe config "UI0Detect" start= disabled2⤵
- Launches sc.exe
PID:1784
-
-
C:\Windows\system32\sc.exesc.exe config "VSS" start= disabled2⤵
- Launches sc.exe
PID:2212
-
-
C:\Windows\system32\sc.exesc.exe config "wbengine" start= disabled2⤵
- Launches sc.exe
PID:376
-
-
C:\Windows\system32\sc.exesc.exe config "WebClient" start= disabled2⤵
- Launches sc.exe
PID:1576
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
PID:2488
-
-
C:\Windows\system32\reg.exereg.exe delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f2⤵PID:660
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f2⤵PID:2544
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f2⤵PID:2648
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f2⤵PID:2800
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:2912
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:1656
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:2564
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:2756
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:2904
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f2⤵PID:2304
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f2⤵PID:3068
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f2⤵PID:2400
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "0" /f2⤵PID:2396
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵PID:1644
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵PID:1152
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable2⤵PID:1984
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable2⤵PID:2244
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable2⤵PID:3020
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable2⤵PID:2448
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable2⤵PID:580
-
-
C:\Windows\system32\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "Windows Defender" /f2⤵PID:876
-
-
C:\Windows\system32\reg.exereg.exe delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows Defender" /f2⤵PID:708
-
-
C:\Windows\system32\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefender" /f2⤵PID:1816
-
-
C:\Windows\system32\reg.exereg.exe delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f2⤵PID:2296
-
-
C:\Windows\system32\reg.exereg.exe delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f2⤵PID:1884
-
-
C:\Windows\system32\reg.exereg.exe delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f2⤵PID:1220
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
PID:1324
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
PID:352
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
PID:1092
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
PID:2160
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies security service
PID:1376
-
-
C:\Windows\system32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
PID:748
-
-
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet2⤵
- Interacts with shadow copies
PID:2364
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl system2⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:1648
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl security2⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:2192
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl application2⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:3064
-
-
C:\Windows\System32\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2500
-
-
C:\Windows\System32\Wbem\wmic.exewmic.exe shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:972
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {default} bootstatuspolicy ignoreallfailures2⤵
- Modifies boot configuration data using bcdedit
PID:872
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {default} recoveryenabled no2⤵
- Modifies boot configuration data using bcdedit
PID:1972
-
-
C:\Windows\system32\cmd.execmd.exe /c "C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All2⤵PID:2492
-
C:\Program Files\Windows Defender\MpCmdRun.exe"C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All3⤵
- Deletes Windows Defender Definitions
PID:1596
-
-
-
C:\Windows\system32\cmd.execmd.exe /c powershell Set-MpPreference -DisableIOAVProtection $true2⤵PID:1716
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIOAVProtection $true3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2820
-
-
-
C:\Windows\system32\cmd.execmd.exe /c powershell Set-MpPreference -DisableRealtimeMonitoring $true2⤵PID:2832
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableRealtimeMonitoring $true3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2872
-
-
-
C:\Windows\system32\notepad.exenotepad.exe C:\eTbd_HOW_TO_DECRYPT.txt2⤵
- Opens file in notepad (likely ransom note)
PID:2520
-
-
C:\Windows\system32\cmd.execmd.exe /D /C ping.exe -n 5 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a0b0432294ebbc84d306993e2e7ea91c.exe"2⤵
- Deletes itself
- System Network Configuration Discovery: Internet Connection Discovery
PID:1704 -
C:\Windows\system32\PING.EXEping.exe -n 5 127.0.0.13⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:864
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
1System Services
1Service Execution
1Windows Management Instrumentation
1Defense Evasion
Direct Volume Access
1Impair Defenses
3Disable or Modify Tools
1Indicator Removal
3Clear Windows Event Logs
1File Deletion
2Modify Registry
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD59215e2ac5b68b7ecb9ec8699d7c4c16a
SHA1dc23bb7faf774d90b36e8d8c090c6b70663728c1
SHA256a4544cf7d82ea7f78472ecfe937dc0a54d808e62f4a16b96f71538064e6c1820
SHA512b2367fe5221486c004167d30ac7c89a47f9ddfdd9307b9a066955526177911429bfd57425aae96ceced7822a64888c9b3eb0c1caf87a0e5723de3450b07de70f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5778b515fafd45adf3cadfd0a8f348856
SHA12bf161b43d9b3e4c95a51465925d6f195913132e
SHA256a92d506ed03e59adf70181a2f0fcd5586731dc9397689ce596806be362098b87
SHA512839b83bc899df359a901326c99a57daf2641892cb8e21ec3f82187ebd42ff31615a0f0d4982ae1c3ede1f0048ee778826299480bca3049cdf4bd4cbdf09dd125