Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-01-2025 19:58
Static task
static1
General
-
Target
JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe
-
Size
622KB
-
MD5
d0fce1bdfa2ce50c34bdefaaddde99a6
-
SHA1
2706984b9d962685430c3cf109fe013f70221873
-
SHA256
1d937f5a9dc0653c669444397cf781de6dce294a408ef73eb9c35f8295d47a14
-
SHA512
a19108e668dca821490c7ace94c7e04f1b24ac4799a177f879edf0253bece825a7eab19b9ff7230db44abe25c2bb1224c6b57d1d74f7120bb462929c6e894b57
-
SSDEEP
12288:PbDVP4WA10Gp+Cd4jNOGiiVhNTrRjJx0L311B9mPDB7IiNvp:DRwWA10Gp+lii7NTNjglk9FN
Malware Config
Signatures
-
Expiro family
-
Expiro payload 5 IoCs
resource yara_rule behavioral1/memory/4460-0-0x00000000004BC000-0x000000000054F000-memory.dmp family_expiro1 behavioral1/memory/4460-1-0x0000000000400000-0x000000000054F000-memory.dmp family_expiro1 behavioral1/memory/4460-3-0x0000000000400000-0x000000000054F000-memory.dmp family_expiro1 behavioral1/memory/4460-48-0x00000000004BC000-0x000000000054F000-memory.dmp family_expiro1 behavioral1/memory/4460-56-0x0000000000400000-0x000000000054F000-memory.dmp family_expiro1 -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 8 IoCs
pid Process 3628 alg.exe 820 DiagnosticsHub.StandardCollector.Service.exe 3968 fxssvc.exe 3240 elevation_service.exe 696 elevation_service.exe 4904 maintenanceservice.exe 1404 msdtc.exe 960 msiexec.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\S-1-5-21-2878641211-696417878-3864914810-1000 alg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\S-1-5-21-2878641211-696417878-3864914810-1000\EnableNotifications = "0" alg.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 42 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: alg.exe File opened (read-only) \??\N: alg.exe File opened (read-only) \??\H: JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened (read-only) \??\K: JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened (read-only) \??\P: alg.exe File opened (read-only) \??\S: alg.exe File opened (read-only) \??\M: JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened (read-only) \??\T: JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened (read-only) \??\Y: JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened (read-only) \??\H: alg.exe File opened (read-only) \??\U: alg.exe File opened (read-only) \??\N: JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened (read-only) \??\Q: JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened (read-only) \??\M: alg.exe File opened (read-only) \??\O: alg.exe File opened (read-only) \??\W: alg.exe File opened (read-only) \??\X: JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened (read-only) \??\L: alg.exe File opened (read-only) \??\Q: alg.exe File opened (read-only) \??\X: alg.exe File opened (read-only) \??\E: JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened (read-only) \??\I: JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened (read-only) \??\G: alg.exe File opened (read-only) \??\T: alg.exe File opened (read-only) \??\G: JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened (read-only) \??\J: JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened (read-only) \??\V: JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened (read-only) \??\Z: JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened (read-only) \??\E: alg.exe File opened (read-only) \??\I: alg.exe File opened (read-only) \??\Y: alg.exe File opened (read-only) \??\Z: alg.exe File opened (read-only) \??\O: JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened (read-only) \??\W: JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened (read-only) \??\S: JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened (read-only) \??\U: JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened (read-only) \??\K: alg.exe File opened (read-only) \??\R: alg.exe File opened (read-only) \??\V: alg.exe File opened (read-only) \??\L: JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened (read-only) \??\P: JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened (read-only) \??\R: JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification \??\c:\windows\system32\svchost.exe JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File created \??\c:\windows\system32\homkkohh.tmp JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened for modification \??\c:\windows\SysWOW64\dllhost.exe JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened for modification \??\c:\windows\system32\snmptrap.exe alg.exe File opened for modification \??\c:\windows\SysWOW64\openssh\ssh-agent.exe JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened for modification \??\c:\windows\system32\openssh\ssh-agent.exe JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened for modification \??\c:\windows\system32\tieringengineservice.exe JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened for modification \??\c:\windows\SysWOW64\svchost.exe JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File created \??\c:\windows\system32\qmnodpal.tmp JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened for modification \??\c:\windows\system32\dllhost.exe alg.exe File created \??\c:\windows\system32\egocddeq.tmp JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened for modification \??\c:\windows\SysWOW64\searchindexer.exe JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File created \??\c:\windows\system32\WindowsPowerShell\v1.0\oinibbjn.tmp JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened for modification \??\c:\windows\system32\msdtc.exe JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened for modification \??\c:\windows\SysWOW64\lsass.exe JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened for modification \??\c:\windows\system32\Appvclient.exe alg.exe File opened for modification \??\c:\windows\system32\tieringengineservice.exe alg.exe File created \??\c:\windows\system32\perceptionsimulation\khjedmlf.tmp JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened for modification \??\c:\windows\SysWOW64\sensordataservice.exe JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File created \??\c:\windows\system32\eeikqjao.tmp JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened for modification \??\c:\windows\system32\snmptrap.exe JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File created \??\c:\windows\system32\qclhglfb.tmp JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File created \??\c:\windows\system32\ogijmhqh.tmp JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened for modification \??\c:\windows\SysWOW64\perceptionsimulation\perceptionsimulationservice.exe JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened for modification \??\c:\windows\SysWOW64\sgrmbroker.exe JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened for modification \??\c:\windows\system32\sgrmbroker.exe JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened for modification \??\c:\windows\SysWOW64\Appvclient.exe JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened for modification \??\c:\windows\system32\svchost.exe alg.exe File opened for modification \??\c:\windows\SysWOW64\vssvc.exe JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened for modification \??\c:\windows\system32\lsass.exe JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened for modification \??\c:\windows\system32\fxssvc.exe JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened for modification \??\c:\windows\system32\perceptionsimulation\perceptionsimulationservice.exe alg.exe File opened for modification \??\c:\windows\system32\locator.exe JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File created \??\c:\windows\system32\ppholjim.tmp JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened for modification \??\c:\windows\SysWOW64\spectrum.exe JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened for modification \??\c:\windows\SysWOW64\wbem\wmiApsrv.exe JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened for modification \??\c:\windows\system32\sensordataservice.exe alg.exe File opened for modification C:\Windows\system32\MSDtc\MSDTC.LOG msdtc.exe File opened for modification \??\c:\windows\SysWOW64\perfhost.exe JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened for modification \??\c:\windows\system32\spectrum.exe JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened for modification \??\c:\windows\system32\wbengine.exe JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File created \??\c:\windows\system32\gliojagc.tmp JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File created \??\c:\windows\system32\diagsvcs\ofaegdep.tmp JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened for modification \??\c:\windows\system32\locator.exe alg.exe File opened for modification \??\c:\windows\system32\openssh\ssh-agent.exe alg.exe File opened for modification \??\c:\windows\SysWOW64\msdtc.exe JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened for modification \??\c:\windows\system32\vds.exe alg.exe File opened for modification \??\c:\windows\system32\wbengine.exe alg.exe File opened for modification \??\c:\windows\system32\searchindexer.exe alg.exe File opened for modification \??\c:\windows\system32\WindowsPowerShell\v1.0\powershell.exe JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened for modification \??\c:\windows\system32\vssvc.exe alg.exe File opened for modification \??\c:\windows\SysWOW64\snmptrap.exe JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened for modification \??\c:\windows\SysWOW64\tieringengineservice.exe JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened for modification \??\c:\windows\system32\Agentservice.exe JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened for modification \??\c:\windows\system32\vssvc.exe JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened for modification \??\c:\windows\system32\wbem\wmiApsrv.exe JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File created \??\c:\windows\system32\wbem\lflifipl.tmp JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened for modification \??\c:\windows\system32\Appvclient.exe JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened for modification \??\c:\windows\syswow64\perfhost.exe alg.exe File created \??\c:\windows\SysWOW64\mmcpljbm.tmp JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened for modification \??\c:\windows\SysWOW64\locator.exe JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File created \??\c:\windows\SysWOW64\cmdheqpo.tmp JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened for modification \??\c:\windows\SysWOW64\alg.exe JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaw.exe JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File created C:\Program Files\Common Files\microsoft shared\ink\olemadei.tmp JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\idlj.exe JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File created C:\Program Files\Common Files\microsoft shared\ink\kgacdccg.tmp JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\pijgofaf.tmp JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java-rmi.exe JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaws.exe JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File created \??\c:\program files (x86)\mozilla maintenance service\nhifpeah.tmp JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe alg.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\createdump.exe JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened for modification C:\Program Files\Internet Explorer\ExtExport.exe JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File created C:\Program Files\Java\jdk-1.8\bin\lgamkbac.tmp JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File created C:\Program Files\Java\jdk-1.8\bin\ibkjjmkl.tmp JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened for modification \??\c:\program files (x86)\google\update\googleupdate.exe alg.exe File opened for modification \??\c:\program files\windows media player\wmpnetwk.exe JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\extcheck.exe JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javac.exe JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jarsigner.exe JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\lhbjhkab.tmp JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened for modification C:\Program Files\Internet Explorer\ieinstal.exe JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File created C:\Program Files\Java\jdk-1.8\bin\pppjqpbi.tmp JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java.exe JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened for modification \??\c:\program files\google\chrome\Application\123.0.6312.123\elevation_service.exe JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\mnmjadqg.tmp JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\jmofaklb.tmp JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javadoc.exe JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File created C:\Program Files\Java\jdk-1.8\bin\ifpcoece.tmp JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File created C:\Program Files\Common Files\microsoft shared\ink\nnbpngba.tmp JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File created C:\Program Files\Java\jdk-1.8\bin\imamgieo.tmp JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File created C:\Program Files\Common Files\microsoft shared\MSInfo\jfjkgccl.tmp JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\hlepeenn.tmp JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File created C:\Program Files\Internet Explorer\dendjgfp.tmp JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened for modification C:\Program Files\7-Zip\7z.exe JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened for modification C:\Program Files\7-Zip\7zG.exe JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened for modification \??\c:\program files (x86)\mozilla maintenance service\maintenanceservice.exe JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File created C:\Program Files\Java\jdk-1.8\bin\jipjcfed.tmp JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File created C:\Program Files\Java\jdk-1.8\bin\papfoeie.tmp JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened for modification \??\c:\program files\common files\microsoft shared\source engine\ose.exe JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File created C:\Program Files\7-Zip\nccafaqk.tmp JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File created C:\Program Files\Java\jdk-1.8\bin\cobmhpje.tmp JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened for modification \??\c:\program files\common files\microsoft shared\source engine\ose.exe alg.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\chrome_pwa_launcher.exe JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File created C:\Program Files\Internet Explorer\hfoijjjp.tmp JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File created C:\Program Files\Common Files\microsoft shared\VSTO\10.0\jkgaipki.tmp JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jar.exe JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File created C:\Program Files\7-Zip\gkooamha.tmp JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\mip.exe JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\createdump.exe JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\notification_helper.exe JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File created C:\Program Files\Java\jdk-1.8\bin\iilmmhmc.tmp JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe alg.exe File created C:\Program Files\dotnet\ddnfppgh.tmp JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification \??\c:\windows\servicing\trustedinstaller.exe alg.exe File opened for modification C:\Windows\DtcInstall.log msdtc.exe File opened for modification \??\c:\windows\servicing\trustedinstaller.exe JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\wpf\presentationfontcache.exe JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\wpf\presentationfontcache.exe alg.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1133 = "Print" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1130 = "Microsoft Modem Device Provider" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1134 = "Microsoft Routing Extension" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1131 = "Route through e-mail" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1132 = "Store in a folder" fxssvc.exe -
Suspicious behavior: EnumeratesProcesses 44 IoCs
pid Process 3628 alg.exe 3628 alg.exe 3628 alg.exe 3628 alg.exe 3628 alg.exe 3628 alg.exe 3628 alg.exe 3628 alg.exe 3628 alg.exe 3628 alg.exe 3628 alg.exe 3628 alg.exe 3628 alg.exe 3628 alg.exe 3628 alg.exe 3628 alg.exe 3628 alg.exe 3628 alg.exe 3628 alg.exe 3628 alg.exe 3628 alg.exe 3628 alg.exe 3628 alg.exe 3628 alg.exe 3628 alg.exe 3628 alg.exe 3628 alg.exe 3628 alg.exe 3628 alg.exe 3628 alg.exe 3628 alg.exe 3628 alg.exe 3628 alg.exe 3628 alg.exe 3628 alg.exe 3628 alg.exe 3628 alg.exe 3628 alg.exe 3628 alg.exe 3628 alg.exe 3628 alg.exe 3628 alg.exe 3628 alg.exe 3628 alg.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 656 Process not Found 656 Process not Found -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 4460 JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe Token: SeAuditPrivilege 3968 fxssvc.exe Token: SeTakeOwnershipPrivilege 3628 alg.exe Token: SeSecurityPrivilege 960 msiexec.exe -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer alg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" alg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_d0fce1bdfa2ce50c34bdefaaddde99a6.exe"1⤵
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4460
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:3628
-
C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeC:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe1⤵
- Executes dropped EXE
PID:820
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:1096
-
C:\Windows\system32\fxssvc.exeC:\Windows\system32\fxssvc.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3968
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵
- Executes dropped EXE
PID:3240
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"1⤵
- Executes dropped EXE
PID:696
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
PID:4904
-
C:\Windows\System32\msdtc.exeC:\Windows\System32\msdtc.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:1404
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:960
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5674c822c7265b44ac19b66b46f799bd6
SHA1ee5c7eb3ed99a39e890e59c4be8190f64251b275
SHA256512b3b3ec84f5bf3fd0188f553a40a426b9fdc288e81a0509648c7c6f1f43c48
SHA5122d3827aebe2cb41a28d619a868eb277f791d3dd7700fc48e280f59ab1bc1bb4586a31f607059175f968a7a59431e0b0ccf023ee3673c29dca9b582053bcada79
-
Filesize
940KB
MD5c39d6fa51f92dfa9f3a29c26f4238f23
SHA18c9d110e571917590684b2af2902718e2fac7391
SHA2560daef9fee9dc2082d6bf8c9ae71c9696cb0cf283cc030df027fb0ada84172493
SHA512dbbc248279107c167d8f01baade97371853040a7f202e927a0ca91ac1ecda0bb2e4cd18e402661f58b55a3583674981cf6044b3532911d189f35bcb778aad67a
-
Filesize
1.3MB
MD5e9dfe26918eaed504955cc65e0559c60
SHA1bee9d7f3d418e708b28a7788976384404636d0e3
SHA2565eb5019c9a3bac10215b489045a587ba440828f38e101af3bc1fb88833fb8003
SHA512af20c78dd79f4508083fbffb4cf824bafef2b78545f7c32963a2c34a7ee270215b27e161733c47f63da9bc79d030c326503334f39a1788d55c581f0b336fb056
-
Filesize
1.1MB
MD5d97523d169eb64e09fbcd03b612208d0
SHA1f8bbfcecf61455704f95f74632a86f252fb74ee0
SHA2564a02b15425f07cdfb2a58bf729f898fec4589ee86421c31e86bde59a811840ea
SHA512c2fcf957cf11d43fb79ba0ebd95ff7f95470dda2f344016aa4455ca139e6e6f40e4a4108e140f6f8e4dd3220ce671431597e858c8b09a0613e8d79f36882ff59
-
Filesize
410KB
MD544ace5bce4d5adfe06216c301a3cc3e3
SHA1b077fdefd313350d46aed9c56b18320b23f7554e
SHA25643750a6c14382726b3a53a41a10393522e8b242a32fe4941529eefb9c92d5fd9
SHA51200d3f68c16f855953706d16951590299d7ee552953004358523f7c903f5dcdedf8ef84356ea41f6ceafed586032a31fc0f678deb744f1951dfbddc77dafd4318
-
Filesize
672KB
MD5b1d224893df5bfa83d3a3d2c36c366f7
SHA1de283483914a3b896b4aae114624050697513834
SHA2567615c01e403cc5eb5fcc6efa0a0af57a2fc859cc2231a211694d39a500fb7f4b
SHA51203855f4ff2224e19c0a7cfe86ab0127d816f31b7334af7d3a1fb314a758f8974f33bfde4a7bd7539bb7ccd4e06977ec76faea35264fe844eb0ea2ae556379e04
-
Filesize
4.5MB
MD531dab587bda0831635bf9d43bafb8264
SHA179ffa76d30b3949c2af7e7d8fb054ce348422b79
SHA256ef48126a50794dd30feda260d0eaf77b75f4632bb6fac7fd1e04d4d952baa3ca
SHA512b2b70c514d71effb5472b60f88237da4c37495190559deec08719def8fce5c4f0683de470bc7af3282dbdd6afdeaa9c87855c9af79303954d78d47dd789f49ad
-
Filesize
738KB
MD537f089794291de85da3efe6c7bc59aa6
SHA114ad1e42e85b5fdef862d47c421b8c4428d63661
SHA256aef49214fa5a914b25b3044db81e30bfded16bf47c2d9b5430132af53302bd2e
SHA5122fdda373230a3531d8f0e0820008d675b210245d1c07e724648be3c2ad92e1ca7a391e8b6c279259bb3bcf933af3b5f43589dc68fcddac7a2fdb84a7df667be2
-
Filesize
23.8MB
MD5e706269aa374daf3a3e5416060798a31
SHA16e392c40d034dfc7782c08228b08121acb8de112
SHA2569f525fc668cd5e5f264210252a4aaeaf0ae3f03cd1d887d76d7d7c703f44c11b
SHA512afa91ccafeffb1aaad5b758c67df1908ee59e0f88c523ef482af511589830c4d898dd9a1e0393e0d08191a631725c2f7772df1ade4ef1a70f4429b7bc080df00
-
Filesize
2.5MB
MD54e30397830fe694a21f1e75ca30e5d8b
SHA13f0edbcc4fe7ebd176dcd68ec2a0fba3085ecf12
SHA256a820f090b1f26438c2f902e886e56367403eded21a339ef037c40201239893b7
SHA512426f53f98aea711645262c31d4837807dc9e3125401b329d6ca24e160a0f8221194ee2c13a662b0a26f9fd5dff7f41762571aa1eada54094d80362f86c1e4451
-
Filesize
637KB
MD5df5f61ac09fca55fbfbbc0bbaaec50b7
SHA15229ab2211ca90939c45a746b0719dec90791596
SHA2560ca1d48de084144c7a021da88b5afcfb46d5af49091f4b7af90536385c04de3b
SHA5121a4a798720837b803f44b0cbaf47da8725007fa8d63c603855dafb116de397f63e730843c528ff12bbb141d32ee0e9576775ca9bbe4281732068dc3332221911
-
Filesize
2.0MB
MD5e277679c206c30ea39bf85c48494e5ab
SHA10ca6f4edffcc3d656004dab13ad88295d38e109d
SHA2569c27126ffa219ca7cb28ca995da898623e9d98a08ff94ae4f1bb6899d3024e57
SHA512557dda506ecd3c33b40eb3f327973edd6d38aa157db92c51b8a7e5b5212f8cb48d70c6628a714d5d2128794c7a0f21fef1ac5de82a2f3727170fd431d23d4d72
-
Filesize
625KB
MD5d5be5168f9e7022f9b59f494787267c6
SHA13c7d449aad69b6a01518a587c183cf4f5213886f
SHA256a1f39cffcb9cd5ad78c923bf14039b45e30f0aaa7a52a8b8b7d11b1f6169853d
SHA512e16d6a7913561c169babf4e58b9f4cedd75c47341bbe2deb6bb4bbc17b5eff2f38d268e21dc0a808edab9d77de8446c29ca36e079459df68e1011de8deacbc11
-
Filesize
818KB
MD55684dd8c2f2cf8fec094b81f7103036b
SHA109939b7a146c90175558595c9a31a6a3fe98c6af
SHA256276a22bc43c3aa0a93d163cbe5869785c14c6b6cee3dbc69b98407834ccb0dfc
SHA512ff89aa16ab4520e7bcfe52383a3e824a88eba587234de41d66442f3e98667cfe4acd62b2423f054c2d6db6dc8af138395918423bc8d82dc8a3733d1323128444
-
Filesize
487KB
MD54a4a8b27fcd5b425e88650e12bc8301d
SHA13ce4f264ddbb897aaebe60c14cbd9bf1d9a48355
SHA2568a163fbd1740de7f5a9285d43dd67e78f26b16b6fe8d7d446f8fe009027bd18b
SHA5121f7b8f1e70ae931aad17c6a651c63f067a717f5d0fd7d6cf52c8890bcf3a75c56b85b5cfb06907fb384943aa1b3a1c026f537cb1c4b55565a0ce5a49fa3d00dd
-
Filesize
1.0MB
MD5c852798fe07dbbf3bd6381d9d6d27658
SHA171bb97519ba922bf8749695a47e2158a846bbd20
SHA25604682da91cd2beb6147c0d8158afdd5b42d702c0eb006fdb7c6fe7fc05c058da
SHA512c90b4424ddf71ee892375e3c0b8363d6ee725edca2946359265654bdc87db0a070bbae3e64c826cad6b279b131258e3c8a61b13e0d628edbba28245be329ec98
-
Filesize
489KB
MD5d634bf1133451c977c6dc12fc17bb44a
SHA163af48b112c57ec990e167772eb83e4106e20736
SHA256e20da1c964b0d4e94c9d86214cb5f8da55c99cc74ec977f0a5fa187ef9612020
SHA5124a35deedd101f92e39a44ef4fbc94f0a0de3d34fa8d8c74ddb7eef92453b3bedf24bc2a2617f69555649d5d4bccebeed84bd751ee4f4c0b09b8896694cd41c75
-
Filesize
540KB
MD57c56f6c01ca9e7862b49ce05de9db5f9
SHA110849009b2731f9ebf198c945f53ca431943521d
SHA2562fe723440527f4e6109cd441e2f907982f7a2303e12367721824aba745b13de0
SHA512867d5e25ad9335c39d3f09dac01b9ac1c962d99f02de1401d0d79c981afc295167087b75242547b368316d135ba4aaad7248f7cf5e3c83b2d8e8268150538779
-
Filesize
463KB
MD5b9a3ede3e96468122cec6ebc8440bc18
SHA11fc66665d00eec282ee3ea14ca9e72aaa8b5352a
SHA256c7dc2a48949c4a434dc39e4bc4883de73e0e1a02191ad2a94f033da67aff5bf1
SHA51267994b1593e5c31002a07ecbd4afd65592e8db19f77ccf9801d989b19886808628ad78b39e1525eefaa85a9fa7e97224442d54177086b380f61e885319f4faf5
-
Filesize
621KB
MD597cd90ab932e3360b24370e59df9ee56
SHA1e4f05dffcacb8566077045fcbb3b4020a4b452e1
SHA256183ec576951afecb4ab5fcb76e0d271b0d401bd6a69773a3451b501e868ae5af
SHA51271305d7a4eb4d49c570d1f9325994bc63f1c6dd890c0b7e8a61bd813639cc3aad9e4cc48843e192067109720c2a2c75ad5ca57c9deba0930bc6e860c8737c5bc
-
Filesize
1.1MB
MD517787a2664e20688486076ff8f20ff44
SHA1d899fe4ce668b75564d729fd80723662933c4db3
SHA25649c85c875df6921c26dc83a20e182c8c50485c21a421f861b236bb8316e9772b
SHA5127a67c4d6614154ae3aa96f7e2cea8646da86d11c89ba71b86043cf2850a791fe12e15098dafdb67363ba2c8183418abb321663fc31f105c9b9f018efa35533af