Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-01-2025 21:41
Static task
static1
General
-
Target
JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe
-
Size
816KB
-
MD5
3bfece7f4ce0035fd1899738f0ce1252
-
SHA1
c5a03e834a05c00960147c372d25ec13acbf6c8f
-
SHA256
9f746b051f80eed711b36e6f6b3d2f9eaf8c70443772adc60ced7d75333150e8
-
SHA512
ff5f9c90854488c4da6d7a17e4ce6fe8d5d2129673448e1914ca689f0db80ce150b0471f5d1062332261c52e906e6386ea0d85cace3bd290fd35e2493ea2c195
-
SSDEEP
24576:cJW2KjJ4Td3kJnbsPhnzqkHluVwFdBmkiO7Sq:cInJ4Td3mbsPhnekHlmwF6G
Malware Config
Signatures
-
Expiro family
-
Expiro payload 10 IoCs
resource yara_rule behavioral1/memory/5040-0-0x00000000004CF000-0x0000000000562000-memory.dmp family_expiro1 behavioral1/memory/5040-1-0x0000000000400000-0x0000000000562000-memory.dmp family_expiro1 behavioral1/memory/5040-2-0x0000000000400000-0x0000000000562000-memory.dmp family_expiro1 behavioral1/memory/5040-4-0x0000000000400000-0x0000000000562000-memory.dmp family_expiro1 behavioral1/memory/5040-25-0x00000000004CF000-0x0000000000562000-memory.dmp family_expiro1 behavioral1/memory/5040-26-0x0000000000400000-0x0000000000562000-memory.dmp family_expiro1 behavioral1/memory/5040-27-0x0000000000400000-0x0000000000562000-memory.dmp family_expiro1 behavioral1/memory/5040-28-0x0000000000400000-0x0000000000562000-memory.dmp family_expiro1 behavioral1/memory/5040-30-0x0000000000400000-0x0000000000562000-memory.dmp family_expiro1 behavioral1/memory/5040-39-0x0000000000400000-0x0000000000562000-memory.dmp family_expiro1 -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 8 IoCs
pid Process 3756 alg.exe 1456 DiagnosticsHub.StandardCollector.Service.exe 2432 fxssvc.exe 4924 elevation_service.exe 1196 elevation_service.exe 3928 maintenanceservice.exe 3408 msdtc.exe 2980 msiexec.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\S-1-5-21-3442511616-637977696-3186306149-1000 alg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\S-1-5-21-3442511616-637977696-3186306149-1000\EnableNotifications = "0" alg.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 42 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: alg.exe File opened (read-only) \??\X: JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened (read-only) \??\H: alg.exe File opened (read-only) \??\L: JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened (read-only) \??\O: JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened (read-only) \??\S: JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened (read-only) \??\Z: JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened (read-only) \??\S: alg.exe File opened (read-only) \??\V: alg.exe File opened (read-only) \??\Y: alg.exe File opened (read-only) \??\P: JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened (read-only) \??\R: JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened (read-only) \??\U: JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened (read-only) \??\M: alg.exe File opened (read-only) \??\T: JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened (read-only) \??\V: JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened (read-only) \??\H: JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened (read-only) \??\L: alg.exe File opened (read-only) \??\T: alg.exe File opened (read-only) \??\Z: alg.exe File opened (read-only) \??\G: JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened (read-only) \??\I: JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened (read-only) \??\K: JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened (read-only) \??\W: JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened (read-only) \??\E: alg.exe File opened (read-only) \??\J: alg.exe File opened (read-only) \??\N: alg.exe File opened (read-only) \??\P: alg.exe File opened (read-only) \??\R: alg.exe File opened (read-only) \??\X: alg.exe File opened (read-only) \??\J: JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened (read-only) \??\N: JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened (read-only) \??\G: alg.exe File opened (read-only) \??\Q: alg.exe File opened (read-only) \??\U: alg.exe File opened (read-only) \??\W: alg.exe File opened (read-only) \??\E: JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened (read-only) \??\Y: JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened (read-only) \??\O: alg.exe File opened (read-only) \??\M: JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened (read-only) \??\Q: JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened (read-only) \??\I: alg.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification \??\c:\windows\system32\msdtc.exe JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened for modification \??\c:\windows\SysWOW64\spectrum.exe JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened for modification \??\c:\windows\system32\vssvc.exe JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\nqjpkaon.tmp JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened for modification \??\c:\windows\system32\svchost.exe JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened for modification \??\c:\windows\system32\lsass.exe alg.exe File opened for modification \??\c:\windows\system32\msiexec.exe alg.exe File opened for modification \??\c:\windows\system32\Agentservice.exe alg.exe File opened for modification \??\c:\windows\system32\locator.exe JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened for modification \??\c:\windows\SysWOW64\sgrmbroker.exe JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File created \??\c:\windows\system32\hilkkeoh.tmp JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened for modification \??\c:\windows\system32\alg.exe JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened for modification \??\c:\windows\SysWOW64\lsass.exe JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened for modification \??\c:\windows\system32\svchost.exe alg.exe File opened for modification \??\c:\windows\system32\spectrum.exe alg.exe File opened for modification \??\c:\windows\SysWOW64\Appvclient.exe JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened for modification \??\c:\windows\system32\Appvclient.exe JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened for modification \??\c:\windows\system32\dllhost.exe alg.exe File opened for modification \??\c:\windows\SysWOW64\perceptionsimulation\perceptionsimulationservice.exe JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened for modification \??\c:\windows\SysWOW64\perfhost.exe JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File created \??\c:\windows\system32\bopboiaj.tmp JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened for modification \??\c:\windows\system32\searchindexer.exe JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened for modification \??\c:\windows\system32\fxssvc.exe JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened for modification \??\c:\windows\system32\locator.exe alg.exe File opened for modification \??\c:\windows\system32\wbem\wmiApsrv.exe alg.exe File opened for modification \??\c:\windows\system32\msiexec.exe JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened for modification \??\c:\windows\SysWOW64\locator.exe JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File created \??\c:\windows\system32\gildqjof.tmp JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened for modification \??\c:\windows\system32\openssh\ssh-agent.exe JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened for modification \??\c:\windows\system32\wbengine.exe JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened for modification \??\c:\windows\syswow64\perfhost.exe alg.exe File opened for modification \??\c:\windows\system32\sensordataservice.exe alg.exe File opened for modification \??\c:\windows\SysWOW64\msdtc.exe JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File created \??\c:\windows\system32\neabiced.tmp JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened for modification \??\c:\windows\system32\wbem\wmiApsrv.exe JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened for modification \??\c:\windows\system32\fxssvc.exe alg.exe File opened for modification \??\c:\windows\system32\openssh\ssh-agent.exe alg.exe File created \??\c:\windows\system32\perceptionsimulation\laangbio.tmp JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File created \??\c:\windows\system32\hbigfnag.tmp JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened for modification \??\c:\windows\SysWOW64\svchost.exe JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened for modification \??\c:\windows\SysWOW64\dllhost.exe JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened for modification \??\c:\windows\system32\dllhost.exe JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened for modification \??\c:\windows\system32\lsass.exe JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened for modification \??\c:\windows\SysWOW64\vds.exe JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File created \??\c:\windows\system32\WindowsPowerShell\v1.0\aoihdghm.tmp JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened for modification \??\c:\windows\system32\sensordataservice.exe JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File created \??\c:\windows\system32\jbofngai.tmp JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File created \??\c:\windows\system32\bkkenlpe.tmp JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File created \??\c:\windows\system32\wbem\bglokhhq.tmp JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened for modification \??\c:\windows\SysWOW64\alg.exe JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File created \??\c:\windows\system32\gkkkkkee.tmp JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened for modification \??\c:\windows\system32\msdtc.exe alg.exe File opened for modification \??\c:\windows\SysWOW64\snmptrap.exe JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File created \??\c:\windows\SysWOW64\maehfakh.tmp JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened for modification \??\c:\windows\system32\snmptrap.exe alg.exe File created \??\c:\windows\system32\hgkjjofo.tmp JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File created \??\c:\windows\system32\diagsvcs\dddhhohq.tmp JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened for modification \??\c:\windows\SysWOW64\fxssvc.exe JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened for modification \??\c:\windows\system32\snmptrap.exe JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File created \??\c:\windows\system32\mnlhebbg.tmp JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened for modification \??\c:\windows\system32\searchindexer.exe alg.exe File created \??\c:\windows\SysWOW64\hhbmddca.tmp JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File created \??\c:\windows\system32\fpcmheag.tmp JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened for modification \??\c:\windows\system32\perceptionsimulation\perceptionsimulationservice.exe alg.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe alg.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\lhbjhkab.tmp JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened for modification C:\Program Files\Internet Explorer\iediagcmd.exe JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File created C:\Program Files\Java\jdk-1.8\bin\onbaidqf.tmp JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File created C:\Program Files\7-Zip\jgpijieg.tmp JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File created C:\Program Files\Common Files\microsoft shared\MSInfo\jfjkgccl.tmp JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe alg.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\occlljkq.tmp JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe alg.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\chrome_pwa_launcher.exe JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File created \??\c:\program files (x86)\mozilla maintenance service\nlbcccph.tmp alg.exe File opened for modification \??\c:\program files\windows media player\wmpnetwk.exe alg.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\cedpmnkl.tmp JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened for modification C:\Program Files\Internet Explorer\ieinstal.exe JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\extcheck.exe JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File created C:\Program Files\Internet Explorer\hfoijjjp.tmp JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File created C:\Program Files\Java\jdk-1.8\bin\ekchdkjb.tmp JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File created C:\Program Files\Java\jdk-1.8\bin\dakeokhg.tmp JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened for modification \??\c:\program files (x86)\mozilla maintenance service\maintenanceservice.exe JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened for modification C:\Program Files\7-Zip\7z.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ShapeCollector.exe JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\mip.exe JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File created C:\Program Files\Common Files\microsoft shared\ink\hhfjjgab.tmp JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jabswitch.exe JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File created C:\Program Files\Java\jdk-1.8\bin\cobmhpje.tmp JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File created C:\Program Files\7-Zip\gkooamha.tmp JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe alg.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\hlepeenn.tmp JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\createdump.exe JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\miqfjfol.tmp JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened for modification \??\c:\program files\google\chrome\Application\123.0.6312.123\elevation_service.exe JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened for modification \??\c:\program files\google\chrome\Application\123.0.6312.123\elevation_service.exe alg.exe File opened for modification C:\Program Files\7-Zip\7zG.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\TabTip.exe JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\createdump.exe JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File created C:\Program Files\Internet Explorer\dendjgfp.tmp JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened for modification \??\c:\program files (x86)\google\update\googleupdate.exe alg.exe File opened for modification \??\c:\program files\common files\microsoft shared\source engine\ose.exe JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\mnmjadqg.tmp JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File created C:\Program Files\7-Zip\nccafaqk.tmp JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File created C:\Program Files\Google\Chrome\Application\elidehmc.tmp JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File created C:\Program Files\Common Files\microsoft shared\OFFICE16\pgildlkb.tmp JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File created C:\Program Files\Common Files\microsoft shared\VSTO\10.0\jkgaipki.tmp JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\createdump.exe JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\clmaedbq.tmp JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\pdpngieg.tmp JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened for modification C:\Program Files\7-Zip\7z.exe JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File created C:\Program Files\Common Files\microsoft shared\ink\nnbpngba.tmp JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\mgecidfd.tmp JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File created C:\Program Files\Common Files\microsoft shared\ink\kgacdccg.tmp JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe alg.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\jmofaklb.tmp JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File created C:\Program Files\Internet Explorer\kjkookie.tmp JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File created \??\c:\program files\google\chrome\Application\123.0.6312.123\pfbdggfh.tmp JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened for modification \??\c:\program files\common files\microsoft shared\source engine\ose.exe alg.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jar.exe JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File created C:\Program Files\Java\jdk-1.8\bin\jipjcfed.tmp JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\wpf\presentationfontcache.exe JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\wpf\presentationfontcache.exe alg.exe File opened for modification C:\Windows\DtcInstall.log msdtc.exe File opened for modification \??\c:\windows\servicing\trustedinstaller.exe JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1132 = "Store in a folder" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1133 = "Print" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1130 = "Microsoft Modem Device Provider" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1134 = "Microsoft Routing Extension" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1131 = "Route through e-mail" fxssvc.exe -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 5040 JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe 5040 JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe 3756 alg.exe 3756 alg.exe 3756 alg.exe 3756 alg.exe 3756 alg.exe 3756 alg.exe 3756 alg.exe 3756 alg.exe 3756 alg.exe 3756 alg.exe 3756 alg.exe 3756 alg.exe 3756 alg.exe 3756 alg.exe 3756 alg.exe 3756 alg.exe 3756 alg.exe 3756 alg.exe 3756 alg.exe 3756 alg.exe 3756 alg.exe 3756 alg.exe 3756 alg.exe 3756 alg.exe 3756 alg.exe 3756 alg.exe 3756 alg.exe 3756 alg.exe 3756 alg.exe 3756 alg.exe 3756 alg.exe 3756 alg.exe 3756 alg.exe 3756 alg.exe 3756 alg.exe 3756 alg.exe 3756 alg.exe 3756 alg.exe 3756 alg.exe 3756 alg.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 652 Process not Found 652 Process not Found -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 5040 JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe Token: SeTakeOwnershipPrivilege 5040 JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe Token: SeAuditPrivilege 2432 fxssvc.exe Token: SeTakeOwnershipPrivilege 3756 alg.exe Token: SeSecurityPrivilege 2980 msiexec.exe -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer alg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" alg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3bfece7f4ce0035fd1899738f0ce1252.exe"1⤵
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5040
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:3756
-
C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeC:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe1⤵
- Executes dropped EXE
PID:1456
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:5020
-
C:\Windows\system32\fxssvc.exeC:\Windows\system32\fxssvc.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2432
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵
- Executes dropped EXE
PID:4924
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"1⤵
- Executes dropped EXE
PID:1196
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
PID:3928
-
C:\Windows\System32\msdtc.exeC:\Windows\System32\msdtc.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3408
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2980
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5c2f5b16e76deb39fa5a8447e59de0a29
SHA1d9bf8dab49aad16c63a44ab4386224ffeecbe2ef
SHA256755ee6f1195dbc678896c8b712c6fa2f657a2858fccee9e256dbf57a880db50e
SHA512c3a020eac5c7a3f7b73345dc529ff6f8846f3b7305280162ea88b8964e0f5a93ca189e8c274e1be04a9514d694facd21f2928d4fe7f0a6214baa63efe9bee1dd
-
Filesize
621KB
MD5e7e92057fd910bb5e97527d745ce5cb4
SHA1a4c80b76f961bdec71194d616c834bd41f7a019d
SHA256fc993f22dab3139d74eae461bef02f2a505d65702b3ec29bfbc87439c18fb760
SHA512d73c1da740d4d99c4ea49bbb9a8b0ef330702b62bf6f7f887872dabf35adfa433fdabf6a69566d3aa335cc73c361e5e9e6247b1a41c9f77549f2578e9829dbe3
-
Filesize
940KB
MD5646e97a25a2ccfdd53fe2519a6190ea8
SHA1255c9994ad40a86ce1da48db4fb7b6caf35eba7a
SHA2568a12fd46e780e2a95a56b29332615ab6f20e89bf0118b7bcad3e7109f02e6363
SHA5125b0406819f7e1391912480940d9fcd9f8b342ebf8160db5bd170bfc9147f43bed6f40e6115fd938122da21c1f3824e9b7a00f0e3a66bece20af5c2fb87e97773
-
Filesize
1.3MB
MD59106d01298d73e02cd7ccf74d873e5af
SHA137cb099b28d156b61023131f17f22cdc11c99595
SHA2569f7212ab70202936a3d684e650ec08bd71312285bbd23172082bdbcfd09aa54a
SHA512ce5bfbb0cf33fe74f3ed2b7814c7cff0a97149948e5d970b24e20e8f307ae1c7c48cb53580594e1f41ee849a49130ba58fbee8951f5df3501a0c342ca2606d4e
-
Filesize
1.1MB
MD5cbeb85030cec65decc45f7c9460e3421
SHA13c65bda1cf43dc0b76ec28efe700ee8f7dcecb44
SHA256f68972db887813d4a82735f58d24bb91872428d34d1cab78e11a2d3da507e824
SHA5124b97ea5f3b6ff22345b6a18855af2dd5a80b5fec67e134de8bbe96bc478367f2566b6b8c66f91914f8923931c7b0d7336c5963dbbb83a60360622ef42cfc518c
-
Filesize
410KB
MD52d63d5a31f68c965782f6159a63e815f
SHA11e93b10815f6f1bc8a9b195beabe61af9fca1813
SHA25668279fac8c635938f320586e1c602897f2e6d5c65697661b3842fa2e32bfcaec
SHA512a05918d9ae8e578099f2ae950650096929364c1b2b759094c1eb814417fac313e239c53d850a7596e055423c9ab94fe8bab6f39fc7f97eed2907427d9bbe771d
-
Filesize
672KB
MD52db392fee4bb3332e1528b04c09da368
SHA17ab95e6a038a4fb7f426b2ee2f26b7ed6a52ab9b
SHA2564658823ee43795627fba1c11aa0fa3ec331ad3a6f4c2dbeaef305e7ba34583fc
SHA5128a00ebf48907124574ad1b37292c4ddbb8221cf5bb0091197f19c5a71fa7ba094d44b0e600d692c0ee2f440cf7c81cd3d1bc90c394b2eaacc40966d060b8a310
-
Filesize
4.5MB
MD5bc5c5e8ba32d0cd7b757ccd5cb1e858d
SHA1ac15b0caa04d36ca6db3fb04bf6952ea8fea810b
SHA256b1631cb88dc64eabbf0cef474b916966e261a6eb45fadc69d9159123cb36741d
SHA512535ff3a76ee84d5d0fe7edf8fd0f1ebe034d15804c46afbd38d2f4c3d2b7e2b4d70535c79a1cb4e598b488e4f0d4add1c94d188cb59143dcf8ac04d68c45b727
-
Filesize
738KB
MD59b95da6efd27ad9269593693ed8e465f
SHA19b9418528290e6126e519eafc5ae2772a105a455
SHA256ff32c90363f2835f934e76f8cbbe0f7d3081b076faf061dc43006dd4c346e4d9
SHA5129355f97fe2299d2f5c8e53884ffa89e5c73bc4bbd42f833131e08ffbb87eb73aa785153067217528573ba3d8de9ccee6820c1a070f51637101220f34d5fa86bc
-
Filesize
23.8MB
MD5ab91bbb01bab487884828b67f9fd85f7
SHA13e2ad333f72df6438ff63ac91f9801ee5f167f00
SHA256ec9c29cea191391b35673908774695632ee89d4acdf78c06e9888e0ad20b0d5f
SHA51267e8bf4fdc458e0fbcdd3e7f1690f746d8b0ccbb9d7af4b6a611fe144fd6f2b37f2f32a9ebee6aa03e8105b57449825c8121d551a2d51b24e12c4f76edc291c2
-
Filesize
2.5MB
MD526cac7c8331f595ec4f55e6b2158a605
SHA18e9164ba9c49b5c5584504c635faf2c6d933db16
SHA256a0ed346f67c817714dc6069d4beaccfc708b49dd8f60b638e246f5246347b668
SHA512faa9e2a4d159968279d9b9760fde1e56430b28dd7c612439e321589303f977c421ecff9d75d0131c0794c5397134b4f73e2875c7701ad1c87d22e2e0d2e60e9d
-
Filesize
2.0MB
MD542cf7907ab08b4773dbf6523efb99075
SHA1da3e7578fd8506319cfe341f2d7cd8598e9337dd
SHA256e3259127002de71c2e06cdf588fa92a5f3ff6393a3faf2343f341610dea46784
SHA5124fd64830df3a8027ab8e99d053a0c5ad90c79d84061b30834badc4a430daec3dfe07745ecffc00aa6d0aacd6a48f10ff572078a0561b3140e11eaf13db805d7f
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
625KB
MD546b677fef7d23f031cdda10336b45b53
SHA1a378559650ab1948b5fbabfe39c6749f9d8ff7fd
SHA256b89ca63d9e4faaf03ed3a48f5cb45b092de5f168aa7d8b5f59daf42663c05cb4
SHA512e9e780d97e36d2acf13813ad1f818616e75a3a8c4f33e941ae41f3899628df406553322cd14b3536c5563dd580c148e37b5851bd82138ddb38d330f74ccd4e4a
-
Filesize
818KB
MD50563b5309db4b0d1bbebd7b968a2bfca
SHA1efd5c8121f9c4f5f77443fb7a397b2326a174c00
SHA25602e47c4ffc2e3246496a10768f119de4b25e645395ec3d23f3dda614d9c0fc50
SHA51284ebcba9a59172175bfc3503a47ed5cf4eb55dc3adf60169c874ecd0359a1cad087347253aeb42dc839700ee41b29b9b4c17974c08a6d23e8eb67444eea355ab
-
Filesize
487KB
MD5ac62e4a80f7cbaa38938652ed1192250
SHA18cc31e7b8408a77669389fcbea6cc412a5836303
SHA25691c5a234104cd86acaf7215829cdc6a1db4d38cb8c2bef035f155ecce5abcb71
SHA5123f22867b18a1ed71826e094e81a5e0a8101d433e3bf5451fea66bc56791ea2ebef73224275eab03d887046aa8d897beffdfd9458cd240850d1270a7e2f50009c
-
Filesize
1.0MB
MD5ac2cebce67a3695f4987cacff7abc8f8
SHA10e18bb7ca4dab76d3ef1e644ecd61e5caf65d1d1
SHA256ecf2207bc3a58eef13dd7ce66e40d140d5d7be62f392f1566cc65f1b8f1fc2ce
SHA512012c9097718f9842c29a74ce276cc7860ba5669eafbf63a4e0bb38f3c6c656691748885133ea08251e0bb1c9caa0bedb0fb3b0c5485e2e7ba3348a63e547615d
-
Filesize
489KB
MD58af4fdab917fb28ddda641706c1021a2
SHA15e559486a06f862a85705e2d2a3c1b0e731a7431
SHA2560c3ea65fa7c77d753575b565e10abcf6dffab1e4775393caae1cdffdc9db6040
SHA512a3774e75bb9da0c69165a28ce38bb6bd646df02de37cdae39bf54656d96b5458be760e926d75c0ae7fc884efa928973940d68b0c0ba77625ade779815e2b6ef2
-
Filesize
540KB
MD5a5fc917efdc9c04b0e7216467d245b9a
SHA1defed0bc1fe1da0cd7f5571a3482c8466232e524
SHA2566fa641fad614b89d98b6b8dc6d436ff257ce7cd4699542132b749785894f4d50
SHA512842e92ffafa658872792fb01b6f317402c43a3bcd5c9a7fa63bb754cb3addaf887a889dda4dc92a7e7bcf9e7bad129be913e0eb922628603da024a44b177aff8
-
Filesize
463KB
MD5b13df1ae25cd584c4e3f62773fc7f6af
SHA1c568a67cf6b575815fdf39cc06b597c6909d2038
SHA25655542704d45b122e518fe13f2057ad0e500766844ecd4d51c9203300f3b8b902
SHA51210a7c12886fb40fec79db178082a4932692433b6aed46735ed967d9d42a8a8808f27ccec590a9c3711c0a4d69c770b744443108d67a8d7329f23dc5f1ae04826
-
Filesize
637KB
MD5a11b652ce9074b51996760a31b4a4c0a
SHA1267f445ce68f3ddcce800de35fb6c1d5985809c1
SHA2562fb421f6e168172e5260e7e29a94e52c8fdc4ab67398cd0eeba999b8369c6730
SHA512b59073888e84bde2633b73339d8464469c3e71dde64a0a12d176b2453f8dbdd9310f272da4812c4a490e445e1690a5771dbf41ae8870943713fe711be51ed0ba
-
Filesize
1.1MB
MD5d50eff6d795b89b2805da4e6161ff81e
SHA1ef64e7bbfe00e96c1956cc08053aa11296bbdebc
SHA256ada580292c16f7fcd452dbadd350e1dde36075efd4b628a55918848e08ce378e
SHA512f40c1199706b061f6f03062bc60414d901cc120f2904752fb436afb3a26faa00420c2b13bc79641414c3e0e551e74179ced823cdbc698c1f2baff137e9e27e29