Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-01-2025 19:49
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe
-
Size
678KB
-
MD5
d0da8135857c0fcf60dfe3876e78540e
-
SHA1
f3b45ff87192b2b2a9566e8555fe8cc7f388793d
-
SHA256
edd9591cdee85a13fd3da4a1b9220b87c7c1ec1be671bb6764591f0ccb950d6d
-
SHA512
268ea94b928b70f74b49a7f405ee7f00c181e37538ea128757c26836bdc9d8766e256f26415c51f2c35e5b2408ab48c6d181eb19c4665794f71648a5f8f368dd
-
SSDEEP
12288:TIdZTfS73Xv/D80qhuiCUE1dcFHhY5aIAEir8FbsPbT:TfLiCVGFBY0I2We
Malware Config
Signatures
-
Disables taskbar notifications via registry modification
-
Executes dropped EXE 8 IoCs
pid Process 4224 alg.exe 1972 DiagnosticsHub.StandardCollector.Service.exe 4776 fxssvc.exe 884 elevation_service.exe 4580 elevation_service.exe 932 maintenanceservice.exe 3716 msdtc.exe 4644 msiexec.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\S-1-5-21-940901362-3608833189-1915618603-1000 alg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\S-1-5-21-940901362-3608833189-1915618603-1000\EnableNotifications = "0" alg.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 42 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File opened (read-only) \??\T: alg.exe File opened (read-only) \??\Z: alg.exe File opened (read-only) \??\G: JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File opened (read-only) \??\J: JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File opened (read-only) \??\T: JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File opened (read-only) \??\V: JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File opened (read-only) \??\K: alg.exe File opened (read-only) \??\O: alg.exe File opened (read-only) \??\S: alg.exe File opened (read-only) \??\O: JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File opened (read-only) \??\U: JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File opened (read-only) \??\J: alg.exe File opened (read-only) \??\P: alg.exe File opened (read-only) \??\P: JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File opened (read-only) \??\R: JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File opened (read-only) \??\I: JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File opened (read-only) \??\W: JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File opened (read-only) \??\M: alg.exe File opened (read-only) \??\N: alg.exe File opened (read-only) \??\R: alg.exe File opened (read-only) \??\U: alg.exe File opened (read-only) \??\E: JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File opened (read-only) \??\H: JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File opened (read-only) \??\Y: JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File opened (read-only) \??\M: JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File opened (read-only) \??\N: JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File opened (read-only) \??\X: JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File opened (read-only) \??\E: alg.exe File opened (read-only) \??\I: alg.exe File opened (read-only) \??\L: alg.exe File opened (read-only) \??\K: JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File opened (read-only) \??\V: alg.exe File opened (read-only) \??\W: alg.exe File opened (read-only) \??\L: JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File opened (read-only) \??\S: JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File opened (read-only) \??\G: alg.exe File opened (read-only) \??\H: alg.exe File opened (read-only) \??\Q: alg.exe File opened (read-only) \??\X: alg.exe File opened (read-only) \??\Y: alg.exe File opened (read-only) \??\Q: JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification \??\c:\windows\system32\msdtc.exe alg.exe File opened for modification \??\c:\windows\system32\Agentservice.exe alg.exe File opened for modification C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File created C:\Windows\System32\WindowsPowerShell\v1.0\jjcdnmok.tmp JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File opened for modification \??\c:\windows\system32\Appvclient.exe JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File created \??\c:\windows\system32\diagsvcs\oljmdelf.tmp JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File opened for modification \??\c:\windows\system32\svchost.exe JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File created \??\c:\windows\system32\perceptionsimulation\cpgdooid.tmp JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File opened for modification \??\c:\windows\syswow64\perfhost.exe JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File opened for modification \??\c:\windows\system32\wbengine.exe JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File created \??\c:\windows\system32\epfkijfp.tmp JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File opened for modification \??\c:\windows\system32\wbem\wmiApsrv.exe alg.exe File opened for modification \??\c:\windows\system32\vds.exe JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File created \??\c:\windows\system32\fnlmkeae.tmp JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File opened for modification \??\c:\windows\system32\sgrmbroker.exe JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File created \??\c:\windows\system32\jiikomfp.tmp JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File opened for modification \??\c:\windows\system32\vssvc.exe JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File opened for modification \??\c:\windows\system32\sgrmbroker.exe alg.exe File created \??\c:\windows\system32\fgqaieeh.tmp JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File opened for modification \??\c:\windows\system32\spectrum.exe alg.exe File opened for modification \??\c:\windows\system32\openssh\ssh-agent.exe JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File created \??\c:\windows\system32\jahaiedi.tmp JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File opened for modification \??\c:\windows\system32\alg.exe JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File opened for modification C:\Windows\system32\MSDtc\MSDTC.LOG msdtc.exe File opened for modification \??\c:\windows\system32\snmptrap.exe JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File created \??\c:\windows\system32\knkhomhd.tmp JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File opened for modification \??\c:\windows\system32\diagsvcs\diagnosticshub.standardcollector.service.exe JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File opened for modification \??\c:\windows\system32\fxssvc.exe JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File opened for modification \??\c:\windows\system32\vssvc.exe alg.exe File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File created \??\c:\windows\system32\mjlimell.tmp JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File opened for modification \??\c:\windows\system32\perceptionsimulation\perceptionsimulationservice.exe alg.exe File opened for modification \??\c:\windows\system32\locator.exe alg.exe File created \??\c:\windows\syswow64\ifbiphfb.tmp JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File opened for modification \??\c:\windows\system32\tieringengineservice.exe JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File created \??\c:\windows\system32\kjmfhfem.tmp JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File opened for modification \??\c:\windows\system32\fxssvc.exe alg.exe File opened for modification \??\c:\windows\system32\spectrum.exe JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File created \??\c:\windows\system32\bibcklel.tmp JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File opened for modification \??\c:\windows\system32\msdtc.exe JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File opened for modification \??\c:\windows\system32\perceptionsimulation\perceptionsimulationservice.exe JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File opened for modification \??\c:\windows\system32\sensordataservice.exe alg.exe File created \??\c:\windows\system32\jmkbiljj.tmp JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File opened for modification \??\c:\windows\system32\Agentservice.exe JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File created \??\c:\windows\system32\injomlbn.tmp JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File opened for modification \??\c:\windows\syswow64\perfhost.exe alg.exe File opened for modification \??\c:\windows\system32\lsass.exe alg.exe File opened for modification \??\c:\windows\system32\msiexec.exe alg.exe File opened for modification \??\c:\windows\system32\wbengine.exe alg.exe File opened for modification \??\c:\windows\system32\searchindexer.exe alg.exe File created \??\c:\windows\system32\pbcjndfn.tmp JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File created \??\c:\windows\system32\mhihfndn.tmp JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File opened for modification \??\c:\windows\system32\svchost.exe alg.exe File opened for modification \??\c:\windows\system32\dllhost.exe alg.exe File created \??\c:\windows\system32\openssh\aeejdoim.tmp JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File opened for modification \??\c:\windows\system32\locator.exe JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File opened for modification \??\c:\windows\system32\sensordataservice.exe JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File created \??\c:\windows\system32\hqqehfci.tmp JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File opened for modification \??\c:\windows\system32\wbem\wmiApsrv.exe JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File opened for modification \??\c:\windows\system32\Appvclient.exe alg.exe File opened for modification \??\c:\windows\system32\msiexec.exe JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File opened for modification \??\c:\windows\system32\searchindexer.exe JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File created \??\c:\windows\system32\hfaedlnh.tmp JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\fgcgogpp.tmp JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\7z.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File created C:\Program Files\Common Files\microsoft shared\ink\kgacdccg.tmp JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe alg.exe File opened for modification \??\c:\program files\google\chrome\Application\123.0.6312.123\elevation_service.exe JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\ijdphpih.tmp JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\mip.exe JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\TabTip.exe JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File created \??\c:\program files (x86)\microsoft\edge\Application\92.0.902.67\obakkdca.tmp JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File created C:\Program Files\7-Zip\gkooamha.tmp JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\mgecidfd.tmp JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File created \??\c:\program files\google\chrome\Application\123.0.6312.123\dicomlcf.tmp JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\hlepeenn.tmp JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\occlljkq.tmp JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File opened for modification C:\Program Files\7-Zip\7zG.exe alg.exe File created C:\Program Files\Common Files\microsoft shared\OFFICE16\pgildlkb.tmp JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe alg.exe File opened for modification C:\Program Files\7-Zip\7zG.exe JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\LICLUA.EXE JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe alg.exe File created \??\c:\program files (x86)\mozilla maintenance service\hkdcdoae.tmp JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File opened for modification \??\c:\program files (x86)\mozilla maintenance service\maintenanceservice.exe alg.exe File created \??\c:\program files\common files\microsoft shared\source engine\jdadcieg.tmp alg.exe File opened for modification C:\Program Files\7-Zip\7z.exe JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File created C:\Program Files\Common Files\microsoft shared\VSTO\10.0\jkgaipki.tmp JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File opened for modification \??\c:\program files\google\chrome\Application\123.0.6312.123\elevation_service.exe alg.exe File opened for modification \??\c:\program files (x86)\google\update\googleupdate.exe alg.exe File opened for modification \??\c:\program files\windows media player\wmpnetwk.exe JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File opened for modification \??\c:\program files\windows media player\wmpnetwk.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ShapeCollector.exe JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe alg.exe File created C:\Program Files\7-Zip\lncjookl.tmp JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe alg.exe File opened for modification \??\c:\program files (x86)\google\update\googleupdate.exe JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File opened for modification \??\c:\program files (x86)\microsoft\edge\Application\92.0.902.67\elevation_service.exe JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File created C:\Program Files\7-Zip\jgpijieg.tmp JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File created C:\Program Files\Common Files\microsoft shared\ink\hhfjjgab.tmp JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\cedpmnkl.tmp JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe alg.exe File opened for modification \??\c:\program files (x86)\microsoft\edge\Application\92.0.902.67\elevation_service.exe alg.exe File opened for modification \??\c:\program files\common files\microsoft shared\source engine\ose.exe alg.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File opened for modification \??\c:\program files\common files\microsoft shared\source engine\ose.exe JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\mnmjadqg.tmp JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File opened for modification \??\c:\program files (x86)\mozilla maintenance service\maintenanceservice.exe JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe alg.exe File created C:\Program Files\Common Files\microsoft shared\ink\nnbpngba.tmp JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File created C:\Program Files\Common Files\microsoft shared\MSInfo\jfjkgccl.tmp JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe alg.exe File created \??\c:\program files\windows media player\apbchdlo.tmp JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File created C:\Program Files\7-Zip\nccafaqk.tmp JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\wpf\presentationfontcache.exe JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\wpf\presentationfontcache.exe alg.exe File opened for modification C:\Windows\DtcInstall.log msdtc.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1131 = "Route through e-mail" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1132 = "Store in a folder" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1133 = "Print" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1130 = "Microsoft Modem Device Provider" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1134 = "Microsoft Routing Extension" fxssvc.exe -
Suspicious behavior: EnumeratesProcesses 40 IoCs
pid Process 4224 alg.exe 4224 alg.exe 4224 alg.exe 4224 alg.exe 4224 alg.exe 4224 alg.exe 4224 alg.exe 4224 alg.exe 4224 alg.exe 4224 alg.exe 4224 alg.exe 4224 alg.exe 4224 alg.exe 4224 alg.exe 4224 alg.exe 4224 alg.exe 4224 alg.exe 4224 alg.exe 4224 alg.exe 4224 alg.exe 4224 alg.exe 4224 alg.exe 4224 alg.exe 4224 alg.exe 4224 alg.exe 4224 alg.exe 4224 alg.exe 4224 alg.exe 4224 alg.exe 4224 alg.exe 4224 alg.exe 4224 alg.exe 4224 alg.exe 4224 alg.exe 4224 alg.exe 4224 alg.exe 4224 alg.exe 4224 alg.exe 4224 alg.exe 4224 alg.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 652 Process not Found 652 Process not Found -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 4284 JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe Token: SeAuditPrivilege 4776 fxssvc.exe Token: SeTakeOwnershipPrivilege 4224 alg.exe Token: SeSecurityPrivilege 4644 msiexec.exe -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer alg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" alg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_d0da8135857c0fcf60dfe3876e78540e.exe"1⤵
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:4284
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:4224
-
C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeC:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe1⤵
- Executes dropped EXE
PID:1972
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:1856
-
C:\Windows\system32\fxssvc.exeC:\Windows\system32\fxssvc.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4776
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵
- Executes dropped EXE
PID:884
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"1⤵
- Executes dropped EXE
PID:4580
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
PID:932
-
C:\Windows\System32\msdtc.exeC:\Windows\System32\msdtc.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:3716
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4644
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD56be19edffcdde55ae9fe823a209a3efb
SHA1752c72add18bb412004f7dbb9b0cca54eb089d3a
SHA2564adf0dc2d364fff2665f9ccabb9e44b6f471fa7db58d7edd814a5d32ec06f86b
SHA5127e8f5767ff95a59dc4a345f3610d46dbdf7adf4e55318d0ab0f399f5e141dfc587b7d529cb191b1e1f0b808ac20dfead32ac9e73a84a06caad563d000fc66941
-
Filesize
621KB
MD530d78638ebd506823da5b40d4f452386
SHA1fb69554ef8ffc8403b9145cea5b9d0b69757a14b
SHA256a5e4ca4570900ea8baab59f8da3f2f42a4857ed8c93a9e0b95c36cb52e87466f
SHA512e8313966a9a1cae9596d7242f7164d0c5037db71a8925bed6dbea7570f5436ef9c3786bf7b02e6ab48a127f1cdc188d1aafffb0ecd82851cf755d65f5b9b37f0
-
Filesize
940KB
MD54e4a31ff8587999149e3a5c1cf1b3fd0
SHA1dc859ffed20448eb45b9cb11af00abd41700f083
SHA2563ef3e9a968f8d08c0d8d398cf324c5eae4ab1b04e691dfd7ab25c83598833424
SHA51206edf08c7b7dd38c65075ebedbefd1cb8318a080e97c9e164745814d55d2e1f8d564c29d7a2b0688dde6c84683a73c909dbd091c593a2bb6a78cbcebd222958d
-
Filesize
1.3MB
MD5cc307d18133eaec1a9b46e202c866d07
SHA1def536c0a9750b6e1debc5b3d823a660bb2495a6
SHA25629e65a220b41469c57b1a891135aaceab73c0ff185e83642bedfd851641ea160
SHA5120f1d34994740f6a7e8ccbf2596bbc13e0e74e4e370925a5c4bd83be9b58ddc7778b14832550fdc0c95400d00cf9167136ae7417093a5dd912eed2b252e568fa8
-
Filesize
1.1MB
MD52b148841f5c66a0dcd101a7ee69a75a2
SHA154f230ae0df12aa732728e28fe9b97b3a8625e3f
SHA256bc4a5f07e0b00b3ab44ba5c86b23dd9668603eaa3819ce7420518215706e4329
SHA5125b507a0bd1862c115a9038a3c60b15c92966071848f30f13b129f297d607c9b3e500f730e44e5f719f5926bab450f6f2914138f479320f82cdef298d698cba3b
-
Filesize
410KB
MD5dc5e3428452ec0b473a175facdc0437e
SHA1711eb31654ead54384e428c2efa11c8fa2fcc359
SHA25650cd2b38a6306c561d9da5b86f85d6b7c4611a784ecd2f9daef1b0518e045e2f
SHA512f6eee2a89836b56321903a94d79355a878dbf9ba5b3668d5a8f66491c8333ba0875d333520672ac6b809cfe0595322541b6ad7115221105fa2993448344517e2
-
Filesize
672KB
MD5fdaf0d5600e3eb2c58a2228f18a6f5a4
SHA100ad7684a10786dddf2b69dcc83a68912da14974
SHA256f0171b533f463f636e09f991d9f35228ec485fbff308e66f67e26b616c9b6b7b
SHA5123beaba556836b748368befc744db6d2ddbba6fc94baf9f1f46063ba609b7179be96c9ee03f17d8fe8713902730fb142432b657b9624aaf0def97e72f7551f019
-
Filesize
4.5MB
MD59c7f0a2376509309aac0d28350a9750a
SHA18ef95933719d0d7ad5eccef844bd35c47544081e
SHA25660f77c2d0836e08cc0e8de1ad842f6817ce4fc8fdba8915a6e2c3b5183d2189f
SHA512c08ab5d006756f93edb3fae38810e17fdaf0aa4738acae00efe6941315b1c506db26b948118f1ad60949614058cf5ed905fb36634f4ac351e04912270cab8b2b
-
Filesize
738KB
MD5dac0d3b674d362e18c4a208ec605ab00
SHA1b825aa7a2e5bf486455b572124896e90328786b9
SHA256a7ceed649634ab4f0d1a5a0ce62b12c52cbbed2dd3b6101b0b9557caeb7e69d6
SHA51252681a1f1ca8b32a5204918755090f806c41776e9e9b72557eb53c985d70c5277f2a99ecc887a17bd63486196e4f331916a9e96b0564c923156f265dc5a150d0
-
Filesize
23.8MB
MD58d80f8f0b4a350f72dbdadd3999c3d45
SHA118c2acac26913d92943cbb6ae7e60931d4a594c5
SHA256de85322971d8197d942f2c706b3ea1e4a5875079358472a78b4efbb6e4c0e9e4
SHA512f32f23c67468bcb8cb5d9700f37462c508a399d8377274257ee6452e56d36174ffecab4423f265e8f51b28323fa4628293a30ea9378483e1892b704e337579db
-
Filesize
2.5MB
MD5b9b801a0e754ebc4f0f64a46e9eefe4f
SHA1d316ef7adaeb079238a5a59211fe979534131f72
SHA2560a8acbd3e2f0e5b742a363d9742c43bc2c23e2a5c04e8f1094d888b1319efbda
SHA512c26a9c31e0228c02cdb8a93285731d6a9949521f9c074cba9f86c0fb3c84248333092c4a91d389b873314abf8c1351ccf861b645bf16fd3866a7365435ec6925
-
Filesize
637KB
MD583ce2c612a82865a6f1b89a3d5eae2c6
SHA1fbe9c9c7ba16605cd77ca8b69ead5ecf5bcc31f1
SHA2564dfff88468bbb1b40700fe6592020fb6b55317d61404d85803b1bf06d439d3d1
SHA512df5c8cd7bc07a692064f4d6b34e39d09b8d87f2ef5b7605d5598399acc4d91c5fb73feb1e807a324810d2df5ea09ee58634cbe3c271cedc9c0c2a66fae05c3af
-
Filesize
2.0MB
MD55bd09320347aeee474554ce0903d7d53
SHA185023655c30c47afb928881dcde21c90a1700d91
SHA2560b88791e456cde8347e42ed4560f90e2cfaa9822298880c197308a9dd9635f45
SHA512e3569a428d1e4c4979967cf2a2f372a705ebb5a569e3429f50989bb3a0a1ebc389810d22507d3498a081329b471facf867547d5d9553d7d03a79983134134961
-
Filesize
678KB
MD57a7385b48b9e654fcb0bb1b62edda9c7
SHA1490898dcfc218656770de736182d2b451aa49805
SHA256d884c61cb716740b6cc341410accc6f642847cf9e0e0ee3231efc4c09105d141
SHA5124ce337b383c83a9099627b640bd915e8c0e0a5a826f56a6d7701a8d963815cbaa82ce0d22c901c43cfb43f2ff943ac3169530d8e32cb5680eb70c91d38b3dbf2
-
Filesize
487KB
MD55a5fa86b11a3381004ab53bdcc00fdb6
SHA1f42127202a87e258ee4b116b8dfcf9315cd6f8e9
SHA256b498131cfd128ac012aa5a1f26bfd9e1ec8002a28e88d06cae9db79d02c5b1e7
SHA5127c8ec62e1816cf5bc93c187876708710ecb40ccbd6545ec3aafe23e60b624524f3b49699aacd55e084c2af5d3ddfc63bb7572f10dce09633edea72ffb2402308
-
Filesize
1.0MB
MD552f903572adbd9fd5d00d1cd00f89333
SHA16189395d00c9a69e636b03e7e5055e6b69b443fe
SHA256b4a124918a857119b555f2c06f670c3a9dd9be51f49c539c358afda3c7ff50f5
SHA512c16de2ffc9cb3b3aed2eff93083cf4ec1010fbd5ce6eef6c51293dc2bbbdf5e92f4c0e24d6cbe8af4a416ac4e7b233dc65b28d9e3eeb48646709985fe0287fb0
-
Filesize
489KB
MD5c5500070d784662f98b6f8666e93af40
SHA1f50a22eb0488ff817f55888f6d52f57de1f659bc
SHA25678d5d8275255c5ed5e5b8b15e226e815bb63925e53185e4392c60eb8d6546bfc
SHA5126d3643337b35a85ba882996c04b872ea2dc4901eedb3898565c3d4ddbe7e7535cd4090dbb70dff9c0f0340f1586b14ac3675dad0a183155ff08210769ea66fff
-
Filesize
540KB
MD5f1bc886e9d53931a3aa09ac4a2f9affd
SHA1089447e633cd6afb44819e642248d48456ddef99
SHA2563a3c971749969a6cef67720fc409400c576df196c7dab5855eaadfdadb84b33d
SHA512babcb3f3adcf6b7a33363407cce72186d5306748f3256e83e9cceb7ad865a3e2d58c969d1e3416872d540d67d40e3521c820ec8a6f9d135d8054549694accd6d
-
Filesize
463KB
MD51f0b44a90373e850800aebe3e0bc25d3
SHA1025789b934a0fc8a2092851ad851723112d05025
SHA2568c258b03ace43d5bde38738e606c1b5fb9223e43b1c71203954f944695175060
SHA512b0c6098ecd86adce1417fc4a76ad85a0cadd9f6ff3ca53e46798aa67fcb5b582a645b47b7b222def4d30769731998aad14cc783ff0e864bddf09f2be6221d979
-
Filesize
1.1MB
MD5f1279af137d29b85058aaf6aa4600195
SHA11a574fd4fb86fa96bcdfa51c06b849580db4adfa
SHA2569ff5e1ae6cf2543669466b07176a7d797ae705b120359bf5bd532f3b0f01f163
SHA512b5fb98e64bec8e349afbe309fb2215f7383e7fec30c98a343f9edd803a500b6fb0fc4ad2ecd4144dc428f1608a241e513f24c9f0befa4d277c2951fc6852d758