Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-01-2025 11:21
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe
Resource
win7-20240729-en
General
-
Target
JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe
-
Size
406KB
-
MD5
209d63407414998cc52db23fa8471fe7
-
SHA1
f06e068ae256f9dfcd3926958d9964d61f8cec2d
-
SHA256
99826ece45610fbe772e96c3978a4a120da6ad8138af4d56b26f0b5746cc8d53
-
SHA512
e900064b2f40ee03070f921104a87bfd06fddfd52866c64053c26b5ec51f20417dccf82cc4482c5168f7d58c34094e054e88017d25db458a00763c4f10563b9b
-
SSDEEP
6144:/Izfx0tsmxGjd9suGj0IDhAJSbnVrw8/LppZ2oqIqOEhspJ:+fqOwGTlWnN0Qrw62obqap
Malware Config
Signatures
-
Expiro family
-
Expiro payload 5 IoCs
resource yara_rule behavioral2/memory/1100-0-0x00000000009CA000-0x0000000000A5D000-memory.dmp family_expiro1 behavioral2/memory/1100-1-0x0000000000960000-0x0000000000A5D000-memory.dmp family_expiro1 behavioral2/memory/1100-2-0x00000000009CA000-0x0000000000A5D000-memory.dmp family_expiro1 behavioral2/memory/1100-4-0x0000000000960000-0x0000000000A5D000-memory.dmp family_expiro1 behavioral2/memory/1100-5-0x0000000000960000-0x0000000000A5D000-memory.dmp family_expiro1 -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 8 IoCs
pid Process 3108 alg.exe 1512 DiagnosticsHub.StandardCollector.Service.exe 1000 fxssvc.exe 992 elevation_service.exe 632 elevation_service.exe 2240 maintenanceservice.exe 1532 msdtc.exe 3096 msiexec.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\S-1-5-21-1045960512-3948844814-3059691613-1000 alg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\S-1-5-21-1045960512-3948844814-3059691613-1000\EnableNotifications = "0" alg.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 42 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\N: alg.exe File opened (read-only) \??\T: alg.exe File opened (read-only) \??\U: alg.exe File opened (read-only) \??\S: JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened (read-only) \??\G: alg.exe File opened (read-only) \??\H: alg.exe File opened (read-only) \??\E: JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened (read-only) \??\N: JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened (read-only) \??\W: JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened (read-only) \??\E: alg.exe File opened (read-only) \??\K: alg.exe File opened (read-only) \??\L: alg.exe File opened (read-only) \??\Q: alg.exe File opened (read-only) \??\R: alg.exe File opened (read-only) \??\V: alg.exe File opened (read-only) \??\Y: alg.exe File opened (read-only) \??\J: JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened (read-only) \??\R: JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened (read-only) \??\V: JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened (read-only) \??\Z: JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened (read-only) \??\X: alg.exe File opened (read-only) \??\Z: alg.exe File opened (read-only) \??\M: JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened (read-only) \??\Y: JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened (read-only) \??\O: alg.exe File opened (read-only) \??\I: JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened (read-only) \??\T: JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened (read-only) \??\I: alg.exe File opened (read-only) \??\J: alg.exe File opened (read-only) \??\P: alg.exe File opened (read-only) \??\O: JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened (read-only) \??\Q: JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened (read-only) \??\M: alg.exe File opened (read-only) \??\S: alg.exe File opened (read-only) \??\W: alg.exe File opened (read-only) \??\G: JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened (read-only) \??\U: JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened (read-only) \??\X: JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened (read-only) \??\H: JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened (read-only) \??\K: JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened (read-only) \??\L: JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened (read-only) \??\P: JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification \??\c:\windows\SysWOW64\vds.exe JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened for modification \??\c:\windows\SysWOW64\searchindexer.exe JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File created \??\c:\windows\system32\lcehpdnm.tmp JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File created \??\c:\windows\SysWOW64\mimplcmn.tmp JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened for modification \??\c:\windows\system32\msdtc.exe alg.exe File opened for modification \??\c:\windows\system32\searchindexer.exe alg.exe File opened for modification \??\c:\windows\system32\msiexec.exe JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened for modification \??\c:\windows\system32\svchost.exe JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened for modification \??\c:\windows\syswow64\perfhost.exe alg.exe File created \??\c:\windows\system32\iigccbpa.tmp JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File created \??\c:\windows\system32\dnnqidak.tmp JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened for modification \??\c:\windows\system32\searchindexer.exe JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened for modification \??\c:\windows\SysWOW64\diagsvcs\diagnosticshub.standardcollector.service.exe JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened for modification C:\Windows\system32\MSDtc\MSDTC.LOG msdtc.exe File created \??\c:\windows\system32\ooqdjffh.tmp JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened for modification \??\c:\windows\system32\snmptrap.exe JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened for modification \??\c:\windows\SysWOW64\openssh\ssh-agent.exe JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File created \??\c:\windows\SysWOW64\lkbhilqh.tmp JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened for modification \??\c:\windows\system32\wbem\wmiApsrv.exe JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened for modification \??\c:\windows\SysWOW64\Appvclient.exe JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened for modification \??\c:\windows\system32\perceptionsimulation\perceptionsimulationservice.exe alg.exe File opened for modification \??\c:\windows\system32\Agentservice.exe alg.exe File opened for modification \??\c:\windows\system32\vssvc.exe alg.exe File opened for modification \??\c:\windows\system32\perceptionsimulation\perceptionsimulationservice.exe JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File created \??\c:\windows\system32\WindowsPowerShell\v1.0\nfhlbgqk.tmp JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened for modification \??\c:\windows\system32\vds.exe JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File created \??\c:\windows\system32\aiegfcop.tmp JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened for modification \??\c:\windows\system32\dllhost.exe alg.exe File opened for modification \??\c:\windows\system32\snmptrap.exe alg.exe File opened for modification \??\c:\windows\SysWOW64\msiexec.exe JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened for modification \??\c:\windows\system32\locator.exe JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File created \??\c:\windows\system32\pghajoig.tmp JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\cdjhocal.tmp JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened for modification \??\c:\windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened for modification \??\c:\windows\system32\WindowsPowerShell\v1.0\powershell.exe JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened for modification \??\c:\windows\SysWOW64\fxssvc.exe JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened for modification \??\c:\windows\system32\svchost.exe alg.exe File opened for modification \??\c:\windows\system32\sensordataservice.exe alg.exe File opened for modification \??\c:\windows\SysWOW64\locator.exe JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File created \??\c:\windows\system32\oihpclce.tmp JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened for modification \??\c:\windows\SysWOW64\Agentservice.exe JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File created \??\c:\windows\system32\adlfjeip.tmp JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File created \??\c:\windows\SysWOW64\jgjiolke.tmp JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File created \??\c:\windows\system32\cfbfjjhj.tmp JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened for modification \??\c:\windows\system32\msiexec.exe alg.exe File opened for modification \??\c:\windows\SysWOW64\msdtc.exe JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened for modification \??\c:\windows\system32\tieringengineservice.exe alg.exe File opened for modification \??\c:\windows\SysWOW64\sgrmbroker.exe JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened for modification \??\c:\windows\system32\diagsvcs\diagnosticshub.standardcollector.service.exe JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File created \??\c:\windows\system32\diagsvcs\palhepac.tmp JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened for modification \??\c:\windows\system32\openssh\ssh-agent.exe alg.exe File created \??\c:\windows\system32\pmkffjip.tmp JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File created \??\c:\windows\system32\perceptionsimulation\amdokqle.tmp JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File created \??\c:\windows\system32\wbem\kkkedibb.tmp JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened for modification \??\c:\windows\SysWOW64\alg.exe JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened for modification \??\c:\windows\system32\Appvclient.exe JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File created \??\c:\windows\system32\kfjkqlal.tmp JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened for modification \??\c:\windows\SysWOW64\tieringengineservice.exe JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened for modification \??\c:\windows\system32\vssvc.exe JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened for modification \??\c:\windows\SysWOW64\vssvc.exe JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened for modification \??\c:\windows\system32\wbengine.exe JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened for modification \??\c:\windows\system32\lsass.exe alg.exe File opened for modification \??\c:\windows\system32\sgrmbroker.exe alg.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk-1.8\bin\java-rmi.exe JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File created \??\c:\program files\common files\microsoft shared\source engine\fbfokaha.tmp alg.exe File created C:\Program Files\7-Zip\nccafaqk.tmp JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File created C:\Program Files\7-Zip\gkooamha.tmp JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\mnmjadqg.tmp JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File created C:\Program Files\Common Files\microsoft shared\ink\olemadei.tmp JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened for modification \??\c:\program files (x86)\google\update\googleupdate.exe JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\occlljkq.tmp JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\TabTip.exe JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File created C:\Program Files\Common Files\microsoft shared\MSInfo\jfjkgccl.tmp JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File created C:\Program Files\Internet Explorer\kjkookie.tmp JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File created \??\c:\program files (x86)\mozilla maintenance service\pjdojmbf.tmp JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\LICLUA.EXE JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\extcheck.exe JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened for modification \??\c:\program files\common files\microsoft shared\source engine\ose.exe alg.exe File created \??\c:\program files\windows media player\koimjjee.tmp JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File created C:\Program Files\7-Zip\jgpijieg.tmp JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\idlj.exe JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\notification_helper.exe JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened for modification C:\Program Files\Internet Explorer\iediagcmd.exe JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File created C:\Program Files\Java\jdk-1.8\bin\jipjcfed.tmp JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe alg.exe File created C:\Program Files\Java\jdk-1.8\bin\onbaidqf.tmp JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javah.exe JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened for modification C:\Program Files\7-Zip\7zG.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe alg.exe File opened for modification C:\Program Files\Internet Explorer\ielowutil.exe JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe alg.exe File created C:\Program Files\Java\jdk-1.8\bin\iilmmhmc.tmp JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javap.exe JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened for modification \??\c:\program files\google\chrome\Application\123.0.6312.123\elevation_service.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File created C:\Program Files\Java\jdk-1.8\bin\lgamkbac.tmp JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\kihlpche.tmp JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\chrome_pwa_launcher.exe JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\obkakffi.tmp JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened for modification C:\Program Files\Internet Explorer\ExtExport.exe JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File created C:\Program Files\Java\jdk-1.8\bin\dddilmae.tmp JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\pijgofaf.tmp JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\clmaedbq.tmp JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jar.exe JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened for modification \??\c:\program files (x86)\mozilla maintenance service\maintenanceservice.exe alg.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened for modification \??\c:\program files (x86)\mozilla maintenance service\maintenanceservice.exe JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File created C:\Program Files\dotnet\ddnfppgh.tmp JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File created C:\Program Files\Common Files\microsoft shared\VSTO\10.0\jkgaipki.tmp JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javac.exe JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened for modification \??\c:\program files (x86)\google\update\googleupdate.exe alg.exe File opened for modification C:\Program Files\7-Zip\7zG.exe JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\lhbjhkab.tmp JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File created C:\Program Files\Java\jdk-1.8\bin\cobmhpje.tmp JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javafxpackager.exe JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File created C:\Program Files\Java\jdk-1.8\bin\mngianin.tmp JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\wpf\presentationfontcache.exe JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\wpf\presentationfontcache.exe alg.exe File opened for modification C:\Windows\DtcInstall.log msdtc.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1131 = "Route through e-mail" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1132 = "Store in a folder" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1133 = "Print" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1130 = "Microsoft Modem Device Provider" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1134 = "Microsoft Routing Extension" fxssvc.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 40 IoCs
pid Process 3108 alg.exe 3108 alg.exe 3108 alg.exe 3108 alg.exe 3108 alg.exe 3108 alg.exe 3108 alg.exe 3108 alg.exe 3108 alg.exe 3108 alg.exe 3108 alg.exe 3108 alg.exe 3108 alg.exe 3108 alg.exe 3108 alg.exe 3108 alg.exe 3108 alg.exe 3108 alg.exe 3108 alg.exe 3108 alg.exe 3108 alg.exe 3108 alg.exe 3108 alg.exe 3108 alg.exe 3108 alg.exe 3108 alg.exe 3108 alg.exe 3108 alg.exe 3108 alg.exe 3108 alg.exe 3108 alg.exe 3108 alg.exe 3108 alg.exe 3108 alg.exe 3108 alg.exe 3108 alg.exe 3108 alg.exe 3108 alg.exe 3108 alg.exe 3108 alg.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 660 Process not Found 660 Process not Found -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 1100 JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe Token: SeAuditPrivilege 1000 fxssvc.exe Token: SeTakeOwnershipPrivilege 3108 alg.exe Token: SeSecurityPrivilege 3096 msiexec.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1216 OpenWith.exe -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" alg.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer alg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_209d63407414998cc52db23fa8471fe7.exe"1⤵
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1100
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1216
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:3108
-
C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeC:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe1⤵
- Executes dropped EXE
PID:1512
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:4072
-
C:\Windows\system32\fxssvc.exeC:\Windows\system32\fxssvc.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1000
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵
- Executes dropped EXE
PID:992
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"1⤵
- Executes dropped EXE
PID:632
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
PID:2240
-
C:\Windows\System32\msdtc.exeC:\Windows\System32\msdtc.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:1532
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3096
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD54881a0897ce80f9b754e21fb16e4efc9
SHA142d4189921eab9a23e91189f33f0c02270e998bf
SHA25636dd90c751a243a3bfe9feaac545e7605e9023c35d15707eb255c0f469e03286
SHA512e15829e7e6ee31412b769e499568753fa2498437ea8da8ff15d9118a37994b1f935ad2319e3d396653614aadfc6a17e76b5d9a699581401356049292b12f54c4
-
Filesize
621KB
MD55641c5c793c906c9673deedd11e56ad3
SHA194ac4fff9ca78a62b56c537429824f5dc8f902ac
SHA2569edadb2a828982eb522847bfbadf53388cf1cbdf5c15aeae0e52dac99aed9672
SHA5123075a752c233d6bb8f876464962922e13713f96db40ffd7a60e1dd6017619004f9efc989b1d920c59eb78af6551867643595e2357213fa25d3e3d95b5c5babca
-
Filesize
940KB
MD5249ed26fba43c9d5a05574f4527a688f
SHA1f3675f32e7838fc07f2a88a20d59df035a71657f
SHA256d9d3fb2962c96c2ebac991a66f4f7da1dfc3d450b8f02ddee39739ccd65849a6
SHA512e3acc07969956aa3d7fcc84ee2f934ff32019450323731711689eb700fa1477b354548905c12a57fd1626fc8ea3fe988bd65284dacf3297b8f16af585826b0bb
-
Filesize
1.3MB
MD5c0e480a130eab6ad6556f356c4929e05
SHA101f542d41d67d334383eb56fb39cdeae0545616a
SHA256b46e865e35869019bf35a60179fcaa3cb1036b1df4b37d6837dc4647d3990454
SHA512fa967d1a6151a198fa2d4183c6ef95d1bc825a33d6e28fe21bbb4828df339839679cde18a1b14b0739736c0e6e2fa1893402e7ef01e1bfed28678514470b112b
-
Filesize
1.1MB
MD58727816fefcf5190d6437f6717c76357
SHA1c9aace28d72bab655217a8eb6253818bba5f4476
SHA256515306218fb778df5659f4e63ee9b1b4538292275a12d6c08d5b9c7ef5c8db26
SHA5124b67b820cd8c10070817647bbd9e2d7dbc38c3bbce73d119e77aef78a6db74aff6bb51aa212affaafea812ecc2368139df000da993bcba5575e74cbede790c84
-
Filesize
410KB
MD52c130eca935a234c5826cf4d0d8b56b1
SHA182dcb3c789fe3f4eaf14cd6a170f27134c235c02
SHA25693a63d297ee45ae9825574e37f2a30205de89bc59375526d92d70d0332c9fbc9
SHA5123788a5c54f1f131df0212fd4ed2d260489b7dcd2d252cae88cdd900b028815604e662b7e0af1354c62ee111a64b4d9152772c669bc96d051309ebdb1c27a25a6
-
Filesize
672KB
MD5d6a68ed89b2ff6a8486a861869fc0dff
SHA1eafd6dafb68bc80310dace8dd44f3dd64610965b
SHA2565b777bcdeb0140669892a3ae1b8b39b4838d6f07fea138ef5df708c2b90556d2
SHA5122906361cbb798daef9aeee10952c1197cb66874f249cab1ca5b44df1a435cfffe558137a49b5b76888e394bbb2cbf6018ce813b6d3301b5748e0b8d66c937569
-
Filesize
4.5MB
MD55a579e6d45161075cda0bd04598ffe9d
SHA15de0801be7f6708913796a4b94a2173e25803a33
SHA25623bf5982a516150d0a66a700e97aceea03683d574387f485c0d12e2a9ee70293
SHA51256cbf9939acb4ec940db99dbf09fc65314a4375b847dbe7eae7aa3bb3e7e3bc05e80eac263d97e9e2a6d62be11cec603950bc504d5af5a41abad513c0575ae9a
-
Filesize
738KB
MD57df11867809c5da7314c88dda724504d
SHA11e0f0351148294521842f56843d2af557368d860
SHA25650052711ace369357d8e18cf5660d2fbcc4039cd4cc8781b004a05ced0351ab3
SHA51220806e22c2ca0ce1449ffef5e9a37cbf4a61d13e4f9de477d4aa56533f3ff00587c28c9a9ae0a0c6318d27f8d9e1ae937d9c21c11f628a10336892495f4c54c6
-
Filesize
23.8MB
MD5ba198f8c749a2a51a262f75e2c628ed4
SHA1b703f14d5fae655d68677b49d5d6e81cda5932c9
SHA2562d44042ae48b9fcda945cf47249ffa980d72bc4a51ae74f0a3599533c976781c
SHA5123e103b56cff481ded1fbf3cae2b51841af8a53fdc968ac46c39bb6e14231d5a00e8cf51f137e529f84a605db544ac33090d341f910a94bd3af92e73153f5a10c
-
Filesize
2.5MB
MD5b7497ef97dec1640067eb0e0f0dc230f
SHA16e01b739f0450fb60bad82e3838fa7f605627f04
SHA256504064d3acedbf1d974c886945b481fcd2ec2c9e16ad26cfcb6f7cd5824f2e0d
SHA512a10fbef1fbf687923c6bd09f02ac80f64b5357c72ad302ae49f5e46c51811e50704c26e158838628a51226ebe131aa4bec3616a3f7e8f34b8b045acfad38e345
-
Filesize
637KB
MD52d19008720c20daba2635aea0eb561e6
SHA11a4382545d5e460c6e721f2b54a9d5cd9e050c49
SHA2560ca1320c659ad49deb96f8e35565747b39fb6e9044194541d31c2dc516b2ec11
SHA512d3d5ee96135f7e57d64a5b67080287e450bafa8fb885efe433eff9729266dc3f5c8085fb5f923c8149f30f47603b652fa9229a78b3499de4a751185f763e803f
-
Filesize
2.0MB
MD51df827ccb267256393ad83da3cd188a5
SHA1a83e282be3895da639dff01d6ebaa3559436fd41
SHA256f00f6b061f4de6b9438a8d570d4365afee81ab31f8317eba7fe6c003bceafbd6
SHA512937acc13268bbb2840f57e10b7a8899a5597cb04de37ee43cecfdfabdd899596cea416683075c47ec907ad9df9e6043b40462ad1405b343f08e87544b24b9d86
-
Filesize
625KB
MD55716ce3e94e49edc9a9764eefd95fd38
SHA11eb6acbc58fba298e66b497224294ca363fdce11
SHA2569aa7765bed5929652b45fad1f8b54508e4bab0cccf8ba01a7f0cd4e14546d49f
SHA512ef5bd1a2e023ad0aa59eabe86f26cefe9039afd926d38de4bad4b0d05eb1609bd7852592c05fd1662eb9f9554b552f373995d222339d480ee456e9ec9ce8c361
-
Filesize
818KB
MD517b2a8e245e10aa94d9e7ac042f219c3
SHA1e25300d0fafe0560ac153acf3ab35047d183c9f9
SHA256995c023c45b18b39bc9759f1309109e457bf9536643a02e47bb5d82c75075e19
SHA512e7cd3a6f313e6068e4c6b7459a4444904964561ff4dd7fdc7725b112ab497fc495570984423e3005e0991db75c409eab891ace97eedfc3e86bb9635bb5c553ba
-
Filesize
487KB
MD5817d722c6b179de53795945aa14b7b36
SHA1e35386006c4f36711c742d6012a8bb8ce5390197
SHA2564fcd540de75eecc222e41d02dee835940115e7b716f8f44b7c93bff02bab8931
SHA512899987590d165131d15e78f816a876d4883acf930aaf0f39a3dd523712706ccca19e7bc4fc5ba9b60d24a8333d0b4d2b033102dcc55e93dd0d7b93058e874206
-
Filesize
1.0MB
MD5c7bd78f6c512ce9ed50da199b05503b5
SHA11d6400cb37d388072c29183c9677f8cade785c68
SHA2568de742be71629c9f7bd9ec40ae9f56ad5c7c073e274b8d521ede63664999b65c
SHA512ced8627468af5b892ccc22322b97640c986f943f266666b71d959fb3cf065fc653ed46c3b4a6a75c71b79ddbe6fd1b29548c305bcfdd864e041204b8f59620bc
-
Filesize
489KB
MD5a78d88988603075f7d38635f7a02d0f9
SHA1821f2cf0accdb018b514aa955cc0e5b0ab9dc788
SHA2569b76a3ed15eac2bab212e1310199d9a5ded047d56faa5a1514a2d59965c85600
SHA512b9915a64879e4ccec8d4098137a2c14d5c78c944e56bf418e8e6c2545556699d778a21df98c66e1864e1cafee02a35affed489183a98b00b7325ba402bfedfff
-
Filesize
540KB
MD534ef54fa1cc4566d0e74b7e8cd3ec76a
SHA1d7211da4f4ed93d66016d8e22fbed6b28d53fc3b
SHA2567c29756f625ad58b46c67f0e5f12d9049ad1857ec460567e68beb177bdccdb5a
SHA51206c2e456d321a477a34f6d533d76d94cbff3fd2d3418bca96f221cd30abe526401107099134e21ae4c6522a06957c8807660743cf71651b81cbb8a1724cb387c
-
Filesize
463KB
MD5a971c960620c8d8310c852bfddf5b4b8
SHA1b7815e7b0abd65ecc187bf0c1bb2a20a1363d1c7
SHA256db73be80fd472a2f180957297e1093813f669bfd54683b791978cf59a92104cd
SHA5126da80e6d25fa9d3aee3418d23c77b6291f1e9cec5853b9ffaa07f2dc14479fc7b7ce970519f576e05a82ae92ebe4a42f9d5c88904470c5f84fa5124701e4d1c8
-
Filesize
1.1MB
MD5a969fdcb85e1501032255c841f151a7d
SHA1b2c46d3460dfbc428ea9308a61987f1799396b52
SHA256c0cac4082c4832292b7af6592d277d912be81abec4df536b7a8563045662bc97
SHA512521854ae2b3a8dce87520fe13ae4be93b9bfd3c06cfe801eb2d54abee20689aaef147d80fee85d80b59533e0e9ef7160fa1b737113d5d0d2825ed99bb99cff26