Analysis
-
max time kernel
150s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-01-2025 09:42
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe
-
Size
406KB
-
MD5
c4e91c65f60a9a8b330485609f718c75
-
SHA1
adf44e30844dc2cf0c9135811451e8f4ee234d2f
-
SHA256
622d11aa1788672b5e591214187ca9a389d86411138842944fe79291b357cc95
-
SHA512
0a397c36336eeb828096692ba1a722e2d4b27d3002d03531e251dfd4e0648751b22ca06070fe18ebd226b3d16f35fb57eae1f15a53c86e466f1ad3fbbeb07e82
-
SSDEEP
6144:lIzfx0tsmxGjd9suGj4IDhAJSbnVrw8/LppZ2oqIqOEhspJ:4fqOwGTlWLN0Qrw62obqap
Malware Config
Signatures
-
Expiro family
-
Expiro payload 5 IoCs
resource yara_rule behavioral2/memory/1056-0-0x0000000000BCA000-0x0000000000C5D000-memory.dmp family_expiro1 behavioral2/memory/1056-1-0x0000000000B60000-0x0000000000C5D000-memory.dmp family_expiro1 behavioral2/memory/1056-2-0x0000000000BCA000-0x0000000000C5D000-memory.dmp family_expiro1 behavioral2/memory/1056-4-0x0000000000B60000-0x0000000000C5D000-memory.dmp family_expiro1 behavioral2/memory/1056-5-0x0000000000B60000-0x0000000000C5D000-memory.dmp family_expiro1 -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 8 IoCs
pid Process 3544 alg.exe 5096 DiagnosticsHub.StandardCollector.Service.exe 4564 fxssvc.exe 1924 elevation_service.exe 3376 elevation_service.exe 3496 maintenanceservice.exe 4732 msdtc.exe 436 msiexec.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\S-1-5-21-2045521122-590294423-3465680274-1000 alg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\S-1-5-21-2045521122-590294423-3465680274-1000\EnableNotifications = "0" alg.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 42 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened (read-only) \??\H: alg.exe File opened (read-only) \??\W: alg.exe File opened (read-only) \??\S: JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened (read-only) \??\O: alg.exe File opened (read-only) \??\P: alg.exe File opened (read-only) \??\U: JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened (read-only) \??\I: JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened (read-only) \??\T: JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened (read-only) \??\J: alg.exe File opened (read-only) \??\K: alg.exe File opened (read-only) \??\Q: alg.exe File opened (read-only) \??\Z: alg.exe File opened (read-only) \??\H: JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened (read-only) \??\O: JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened (read-only) \??\X: JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened (read-only) \??\Y: JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened (read-only) \??\G: alg.exe File opened (read-only) \??\I: alg.exe File opened (read-only) \??\T: alg.exe File opened (read-only) \??\L: JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened (read-only) \??\M: JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened (read-only) \??\P: JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened (read-only) \??\G: JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened (read-only) \??\J: JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened (read-only) \??\K: JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened (read-only) \??\U: alg.exe File opened (read-only) \??\V: alg.exe File opened (read-only) \??\X: alg.exe File opened (read-only) \??\E: JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened (read-only) \??\N: JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened (read-only) \??\E: alg.exe File opened (read-only) \??\N: alg.exe File opened (read-only) \??\R: alg.exe File opened (read-only) \??\V: JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened (read-only) \??\Z: JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened (read-only) \??\Y: alg.exe File opened (read-only) \??\Q: JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened (read-only) \??\R: JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened (read-only) \??\L: alg.exe File opened (read-only) \??\M: alg.exe File opened (read-only) \??\S: alg.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created \??\c:\windows\system32\jhhocpho.tmp JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File created \??\c:\windows\SysWOW64\pjdbcdog.tmp JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened for modification C:\Windows\system32\MSDtc\MSDTC.LOG msdtc.exe File opened for modification \??\c:\windows\system32\msiexec.exe JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File created \??\c:\windows\system32\dfnakdbn.tmp JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File created \??\c:\windows\system32\openssh\ddgjnckn.tmp JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File created \??\c:\windows\system32\bbjbknkk.tmp JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File created \??\c:\windows\system32\pakbhnio.tmp JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened for modification \??\c:\windows\system32\msdtc.exe alg.exe File opened for modification \??\c:\windows\system32\msiexec.exe alg.exe File created \??\c:\windows\system32\cgljoipi.tmp JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened for modification \??\c:\windows\system32\WindowsPowerShell\v1.0\powershell.exe JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened for modification \??\c:\windows\system32\alg.exe JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened for modification \??\c:\windows\SysWOW64\lsass.exe JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened for modification \??\c:\windows\SysWOW64\perfhost.exe JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened for modification \??\c:\windows\SysWOW64\sgrmbroker.exe JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened for modification \??\c:\windows\system32\svchost.exe JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened for modification \??\c:\windows\SysWOW64\sensordataservice.exe JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened for modification \??\c:\windows\SysWOW64\wbem\wmiApsrv.exe JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened for modification \??\c:\windows\system32\locator.exe alg.exe File opened for modification \??\c:\windows\system32\spectrum.exe alg.exe File opened for modification \??\c:\windows\SysWOW64\msiexec.exe JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened for modification \??\c:\windows\system32\sgrmbroker.exe JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened for modification \??\c:\windows\SysWOW64\spectrum.exe JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File created \??\c:\windows\SysWOW64\fplfkkjn.tmp JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened for modification \??\c:\windows\SysWOW64\msdtc.exe JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened for modification \??\c:\windows\system32\vssvc.exe alg.exe File created \??\c:\windows\system32\cfaolead.tmp JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File created \??\c:\windows\system32\wbem\pgnchcme.tmp JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened for modification \??\c:\windows\system32\openssh\ssh-agent.exe alg.exe File opened for modification \??\c:\windows\system32\tieringengineservice.exe alg.exe File opened for modification \??\c:\windows\system32\spectrum.exe JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened for modification \??\c:\windows\SysWOW64\Agentservice.exe JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File created \??\c:\windows\system32\cmennlpp.tmp JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened for modification \??\c:\windows\system32\vds.exe JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened for modification \??\c:\windows\SysWOW64\Appvclient.exe JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File created \??\c:\windows\system32\diagsvcs\hcdbfimd.tmp JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened for modification \??\c:\windows\system32\svchost.exe alg.exe File opened for modification \??\c:\windows\system32\dllhost.exe alg.exe File opened for modification \??\c:\windows\system32\fxssvc.exe alg.exe File opened for modification \??\c:\windows\system32\perceptionsimulation\perceptionsimulationservice.exe alg.exe File created \??\c:\windows\system32\perceptionsimulation\ddhgalgb.tmp JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File created \??\c:\windows\system32\ollomlom.tmp JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened for modification \??\c:\windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File created \??\c:\windows\system32\WindowsPowerShell\v1.0\ehakmfeq.tmp JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File created \??\c:\windows\SysWOW64\ijcjphaf.tmp JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened for modification \??\c:\windows\system32\vds.exe alg.exe File opened for modification \??\c:\windows\system32\sensordataservice.exe JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File created \??\c:\windows\system32\qoebfead.tmp JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened for modification \??\c:\windows\system32\snmptrap.exe JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened for modification \??\c:\windows\SysWOW64\tieringengineservice.exe JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened for modification \??\c:\windows\system32\vssvc.exe JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened for modification \??\c:\windows\system32\Appvclient.exe alg.exe File opened for modification \??\c:\windows\syswow64\perfhost.exe alg.exe File opened for modification \??\c:\windows\system32\searchindexer.exe alg.exe File created \??\c:\windows\system32\omnnjkgm.tmp JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened for modification \??\c:\windows\SysWOW64\openssh\ssh-agent.exe JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened for modification \??\c:\windows\system32\searchindexer.exe JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened for modification \??\c:\windows\SysWOW64\vssvc.exe JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened for modification \??\c:\windows\system32\sensordataservice.exe alg.exe File opened for modification \??\c:\windows\system32\snmptrap.exe alg.exe File created \??\c:\windows\SysWOW64\hohhfmna.tmp JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened for modification \??\c:\windows\SysWOW64\perceptionsimulation\perceptionsimulationservice.exe JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened for modification \??\c:\windows\system32\perceptionsimulation\perceptionsimulationservice.exe JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\7zFM.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe alg.exe File created C:\Program Files\7-Zip\jgpijieg.tmp JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened for modification C:\Program Files\7-Zip\7zG.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\kihlpche.tmp JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened for modification C:\Program Files\Internet Explorer\iediagcmd.exe JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\extcheck.exe JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\mgecidfd.tmp JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java-rmi.exe JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File created C:\Program Files\Common Files\microsoft shared\ink\nnbpngba.tmp JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File created C:\Program Files\Internet Explorer\hfoijjjp.tmp JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File created C:\Program Files\Java\jdk-1.8\bin\knkmmeba.tmp JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ShapeCollector.exe JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened for modification C:\Program Files\7-Zip\7z.exe alg.exe File created C:\Program Files\Java\jdk-1.8\bin\cobmhpje.tmp JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe alg.exe File created \??\c:\program files\google\chrome\Application\123.0.6312.123\fpjkbmja.tmp JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened for modification \??\c:\program files (x86)\mozilla maintenance service\maintenanceservice.exe alg.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\jmofaklb.tmp JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened for modification \??\c:\program files\common files\microsoft shared\source engine\ose.exe JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File created C:\Program Files\Common Files\microsoft shared\ink\olemadei.tmp JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe alg.exe File created C:\Program Files\Java\jdk-1.8\bin\onbaidqf.tmp JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File created \??\c:\program files (x86)\mozilla maintenance service\afageene.tmp JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\createdump.exe JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened for modification \??\c:\program files\windows media player\wmpnetwk.exe JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File created C:\Program Files\Common Files\microsoft shared\VSTO\10.0\jkgaipki.tmp JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File created C:\Program Files\dotnet\ddnfppgh.tmp JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File created C:\Program Files\Google\Chrome\Application\elidehmc.tmp JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jar.exe JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened for modification C:\Program Files\Internet Explorer\ielowutil.exe JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\appletviewer.exe JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\idlj.exe JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\bpbhdnpm.tmp JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\mnmjadqg.tmp JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\createdump.exe JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\obkakffi.tmp JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened for modification \??\c:\program files\google\chrome\Application\123.0.6312.123\elevation_service.exe alg.exe File opened for modification C:\Program Files\7-Zip\7z.exe JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File created C:\Program Files\Java\jdk-1.8\bin\pppjqpbi.tmp JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File created C:\Program Files\Java\jdk-1.8\bin\jipjcfed.tmp JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File created C:\Program Files\Java\jdk-1.8\bin\ldcnmoao.tmp JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javadoc.exe JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened for modification \??\c:\program files\common files\microsoft shared\source engine\ose.exe alg.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\cedpmnkl.tmp JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File created C:\Program Files\Common Files\microsoft shared\ink\hhfjjgab.tmp JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File created C:\Program Files\Common Files\microsoft shared\OFFICE16\pgildlkb.tmp JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jabswitch.exe JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened for modification \??\c:\program files (x86)\google\update\googleupdate.exe JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened for modification \??\c:\program files (x86)\google\update\googleupdate.exe alg.exe File opened for modification C:\Program Files\7-Zip\7zG.exe JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\servicing\trustedinstaller.exe JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\wpf\presentationfontcache.exe JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\wpf\presentationfontcache.exe alg.exe File opened for modification C:\Windows\DtcInstall.log msdtc.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1131 = "Route through e-mail" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1132 = "Store in a folder" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1133 = "Print" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1130 = "Microsoft Modem Device Provider" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1134 = "Microsoft Routing Extension" fxssvc.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 40 IoCs
pid Process 3544 alg.exe 3544 alg.exe 3544 alg.exe 3544 alg.exe 3544 alg.exe 3544 alg.exe 3544 alg.exe 3544 alg.exe 3544 alg.exe 3544 alg.exe 3544 alg.exe 3544 alg.exe 3544 alg.exe 3544 alg.exe 3544 alg.exe 3544 alg.exe 3544 alg.exe 3544 alg.exe 3544 alg.exe 3544 alg.exe 3544 alg.exe 3544 alg.exe 3544 alg.exe 3544 alg.exe 3544 alg.exe 3544 alg.exe 3544 alg.exe 3544 alg.exe 3544 alg.exe 3544 alg.exe 3544 alg.exe 3544 alg.exe 3544 alg.exe 3544 alg.exe 3544 alg.exe 3544 alg.exe 3544 alg.exe 3544 alg.exe 3544 alg.exe 3544 alg.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 660 Process not Found 660 Process not Found -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 1056 JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe Token: SeAuditPrivilege 4564 fxssvc.exe Token: SeTakeOwnershipPrivilege 3544 alg.exe Token: SeSecurityPrivilege 436 msiexec.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4340 OpenWith.exe -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer alg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" alg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c4e91c65f60a9a8b330485609f718c75.exe"1⤵
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1056
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4340
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:3544
-
C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeC:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe1⤵
- Executes dropped EXE
PID:5096
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:452
-
C:\Windows\system32\fxssvc.exeC:\Windows\system32\fxssvc.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4564
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵
- Executes dropped EXE
PID:1924
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"1⤵
- Executes dropped EXE
PID:3376
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
PID:3496
-
C:\Windows\System32\msdtc.exeC:\Windows\System32\msdtc.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:4732
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:436
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD56cbc1789d38a3b96307cc0cc5116dca4
SHA165549b24619e5fc12308f972c465a3039a0fcaf6
SHA2567af7b7a30e809f4d4dc2db03609e248f7f5e552cca246c7e657b7eeda8e1423f
SHA512c58e1202155c2be41d116eb1ec8179b9a210c5f8cc72765498c2256bb43ee5212d119a92a18fc95efc853b9ad97941a05ea665b895ed8954867734c0b81431cf
-
Filesize
621KB
MD570acb95024e588b2d755bec3ee51d8c6
SHA1498b1e96ef143d5177f743a0320a464a5f87c7f9
SHA256108142e68b3fcaee6fd9e8575923e0938b54467f7179e115a701617699a2e490
SHA51205d3f5858e361291ca431f33a29abccdb6ab0facfd454da0a12974580cf716e1a59370c8c49b7ec4592f2ba3b29e8132de556539b40c976b5a799b74d0c1ccb5
-
Filesize
940KB
MD526c9724e53e87cdefab3a2d7cd678bd4
SHA1e8da311e4bdaa8add981de4af055ba38a83ccad3
SHA256a54ef347421dbf03b293c36f76c465fc1a389ddf32ea76ff20d7465637164723
SHA51286a7bff1180570f344b87b41fa31af66dbe9db54bb92a6bdf65a7d4869adf577b56a55c01e3a4111fbe566be1be5c0bafaf0d579f0d4d57cdabcd4084cdbdfd7
-
Filesize
1.3MB
MD557421c4e5e3cb2eee88cf23f80d7afcd
SHA185cffc8676f95f3f0c8215bcfac06281063ff75d
SHA2564157931364851c6e9368f71505d794bd15ace71d549d887160cb9900539c2027
SHA512c05351e5d12d12b417109ea363c74f8b4992af76693170e887ca29e60f53dadcc198f3ca78b860c5face6881de2712f310b41e99ea1b7b3b2edfdea7ceca4153
-
Filesize
1.1MB
MD5b173b2cf498f1f06cd20c03db20d27ad
SHA10e12afb7868d1b541a286a683ad671c021a121b4
SHA2562fed87ffd0f6025c60d082796b626b533d89f6900cb633d5a7b3265c3cbbf806
SHA5124c79a866ca54104fb1f366f9e4197713c2bb7961dd6db728bf1cfb970e38f3e66a69e5f1a15bd43cd5c46927826f52cd14f3cfe2a216fc07d230d40b0887b158
-
Filesize
410KB
MD52eaa1680a67dfe3ac23e5288446b428b
SHA10cdabc9b00730f4744e02593ec03da007f5d8296
SHA256483130fb8e6356202ac151366a13e71ac4ad0aa78d86c0c33869ec0472a4b933
SHA5124af9fa831e5ef00613c500bc679492cad77e98baac5bb83046cbf3a56223514751d7c6c0dd3d5a5fd76a4c19d522e4b9145f02f891b122f63f7f8da19adb9fa6
-
Filesize
672KB
MD5b42a73e7e320f2382189e016620de80c
SHA1a7c8f83f4893e714da660417a68a697b14999b26
SHA25695d77078d2783a1a096171e7bc05abc6301b9e7c7eff8bc0a3c770102a536654
SHA5127f54b32c9af281d315adf56a7080c16f065cd927d06a1b38ecbe872e7523dd948f544ee6e205d7505162634a8a441bf0aed6dd1d57af27f7d616904b5544c878
-
Filesize
4.5MB
MD5e047691fd4429c9d89571d57e1c0b29a
SHA15dd5837fee145b09201aa5be8eb8a14d43add661
SHA256d767d9b68b0660d8c4f3af5d86b0d471855261501f6b50006447071dbc29eaa7
SHA512886227bc332c647582ddde2ee558ae09303fefa047d664688dd5a8cb0e041fb4e022862fc494694d373b56b3a75f9930608d22470fc5eda60a36cd841bb4e2cd
-
Filesize
738KB
MD540989293971aca95c61de272a8f913ec
SHA11e21595711ef99875a8bfd331866c655eef03f10
SHA256468b0309b3a16bdc5ae2df6956aa523b77d6264f52bade255b9eb330ca82caf2
SHA5123650999931345d72e64a7fd3867a762b3159da29783519f38b896c9c1af907db152afde8b07e7e125261fc1a987f1151339f38813ac24e9e2106a90c924225fa
-
Filesize
23.8MB
MD55ee03710522b4a920b75851c3bada2aa
SHA1011b72e86e160b8c08bec5ca0c825ff895b4ac02
SHA25676b16b9686f7033fc88278da16465a57da5b9564e44f0fafab63da82c24fe166
SHA512c2e5b9d5ea00973485ecfecc0c61f5c1de2dbf215275d33d99b60861f582f4eed667ff9895a69872210864bac9ab5fe8669b626c668a47b570c4d80deb0e89f6
-
Filesize
2.5MB
MD56726a3c3b93cc67677455294812dbd1c
SHA17fa8762d6d87025188e79159d76dcc4091ac1cb0
SHA256c3db17d6e3af93099862931f1796f7109f5e677ae0ef608c5de2a67963297b0d
SHA512862dd18d6a03ddc21e02ee28e923ffcdf1bf9a80fa106cec34e66acb539e9952dfe6ce00a94acc63a959a4c14910a1429ed5b6beb228b3aad0d566de525b7932
-
Filesize
637KB
MD5962782acf74e8d3756b9ea4c72f391d2
SHA1605c68f53864771e6e6f2c53f2217a663e9aad54
SHA25652eb9e7040f43063f90f77cb7920c63cca7981b6e6984526156283b02232b1bd
SHA512018be369e9be35919eda4d6fe0ed9ad3201cc26d30ee9d260eecba3fab87129bfc8d8bcfc4bd18e023f1a375d8cc00c4a4f148fdf0cefc66f5baf1a1b2510725
-
Filesize
2.0MB
MD5409da58aec89af9f31cbdcd96d59ffbb
SHA173041f164d60c697984808a1029332a13d9e998b
SHA2564d25507a2b057e038ae6c4a4ad49a299152a232dafa1faa81d2be4e6991591aa
SHA5127b318ad25156c0fce6b33514ed9c0c4dadc2d5d2dd7e8edf67491dd47b48bb9b179194aa0533040daadd6c8432aa0c4ff34b802e08ed4dd4d2c982315f401103
-
Filesize
625KB
MD510896980cf1b3ef79e99de86d9f32306
SHA193158d51c05fa9cec0549a5ca8bb724b5129b4c8
SHA25689489eab10b37f27b17349921e83d5bdc5e2a7ecf78e7a0243ea6b1f9de1987a
SHA512c3f73c2e6a23b94503eff1b5f6ba71442477fca3a5b2eba7f284a83c4f247972dd755971288fe89b5ad133d419e2d6cff51327c3d24cf1f964bf36dca656cc0c
-
Filesize
818KB
MD503bf743cc778d8277a416979cdd9ffb8
SHA10565c6c648e38286783a48001d65556529128a8b
SHA256d1b40dc592311e9a725f23d4d3a36ab49b17172d9f4a13e15b721c9d99b7525d
SHA512caf0f01a416126a8c1e83bc0eb8ca1f0e2809d7c30679fba1eabc1fcfc5d9d6868999c1ed97681fc18bae15e2936c1cd87d1f892fb9cc0a4f6ba4d38ed536132
-
Filesize
487KB
MD5f59ca32735b55647bdb5213b05e5d44d
SHA19d9a5fea79c3545d3c624ba5405f5f22e1ea2292
SHA2565ae1a89535d6b46cc51f56f41a0be6bf66a2bb26a58419ee5bc85877f58fb79b
SHA512ff659221f2393c41dfd501722561f9994b173ffb2d5d92e29856860785b7b2b67a1d51947a485662393f55ad7ad00d5801bcf692d7dbe513438a31cfbe1f7fdb
-
Filesize
1.0MB
MD5a5e55b2f567bb7a3ca3b5e83dc4a4702
SHA1e8a029bc3bd0a83923e5b24af232a0086ae17394
SHA256ebec5e79f6fc7f864086a8d061e94e4e37d5d4e51a5caac083fe453e9862293b
SHA5123ecbdd892d1887461232a38a3168af42451e6fa95f8f585c657688bfd3cf10ac9abdad6e6c418f918b39901e7936f0eb405d515a27879ae8ba164df7dc75c204
-
Filesize
489KB
MD51583487de3d3323932336efa4d6ad902
SHA1fb103f75a42b2715a1d78d6dcf113cd028cd22fd
SHA2567e54a09cce46b420faefe3005a27d5db0af492559e4c9fd2ae60f2c0c470caea
SHA512c76fd35268d48977909958a7a7a95aee498187490ed16473c004c1e5c70168c91f44f8427e15cb2e57d5d3b4ce7c0ed788fb6145ff7f1fce3e26104394bddee6
-
Filesize
540KB
MD53485b8b5bbf2a958e894f0734f000022
SHA11fed16926d960640718ce2f9e6130b0dc51e580c
SHA256e999a0a8023a0d43332f8f49ee603d69e7f8f452fc13cb864ff29fbbfac8d24f
SHA512e1c26939ccaf7ebd0c5a15688a08a45ebe3b75d6d41f47e542a7e666a746072b287f2a8c18c007f094e269aa1684b7d31a3aa109a9dbe2349495852744de52c3
-
Filesize
463KB
MD54646943b62ccadb9ee90c450c60eca53
SHA12c0f5f582f5209c745a9d9213d3ca85f294c1f21
SHA2563fd3cb68f605e37dc9ee50c4579e3c091fcee6f6356238ede9b12e3c2954166a
SHA512f8bd6df9ca72fa5ac6f67f6e16796dfa138774aa620fbd6ba08364f0006c6c62e7686e5fb896088d2f5a86f5a93e2e02fc34dc793c450628575de8e449589c68
-
Filesize
1.1MB
MD5345d22c6678930d44430c1d468a7f23f
SHA11ad4d88c7904b2c306a01cb758cbdb555a30a923
SHA25642e9788d817adfb17be68f3d9879e2550d89c11ce512060d8d74f82c3249a374
SHA51284841fd5a1498a582344a2d1c532a0dcc4460b4e293f2e3a923aaa031b9c7211a65bebacc6c726a29c3be09e99d59cb28b861aef1e2f3aeaf361f6d39c00d5b1