Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-01-2025 02:46
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe
-
Size
792KB
-
MD5
04ca64e87e716190461fa9b3a48d1584
-
SHA1
ade167ae18bccff1afc1e3a89f8c851535d5a30b
-
SHA256
19ab4d81c19c298a1b357f3120dcde0b54b2ad1d322651cdcc0e152dedad29b8
-
SHA512
d0e7bda0996f9427779cb18ab831c54a142e5648981d58b138149de2385ec7f5a07cd41ea1b5ac2a5233a068c89c7add14bbd555264122f32940fc565c39df76
-
SSDEEP
24576:IlX+d7OQkpz2zGnOBzw9eONZnAUjA3VBl8d:IlXiOPzfOBzAeONZnBQk
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe" JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe" JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 62 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5T558W1X-742F-IUAH-AKOC-CQWR14R5M1J8} JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5T558W1X-742F-IUAH-AKOC-CQWR14R5M1J8}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Restart" JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5T558W1X-742F-IUAH-AKOC-CQWR14R5M1J8} JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5T558W1X-742F-IUAH-AKOC-CQWR14R5M1J8} JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5T558W1X-742F-IUAH-AKOC-CQWR14R5M1J8} JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5T558W1X-742F-IUAH-AKOC-CQWR14R5M1J8}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Restart" JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5T558W1X-742F-IUAH-AKOC-CQWR14R5M1J8} JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5T558W1X-742F-IUAH-AKOC-CQWR14R5M1J8}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Restart" JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5T558W1X-742F-IUAH-AKOC-CQWR14R5M1J8} JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5T558W1X-742F-IUAH-AKOC-CQWR14R5M1J8} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5T558W1X-742F-IUAH-AKOC-CQWR14R5M1J8}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5T558W1X-742F-IUAH-AKOC-CQWR14R5M1J8}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Restart" JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5T558W1X-742F-IUAH-AKOC-CQWR14R5M1J8}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Restart" JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5T558W1X-742F-IUAH-AKOC-CQWR14R5M1J8}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Restart" JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5T558W1X-742F-IUAH-AKOC-CQWR14R5M1J8} JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5T558W1X-742F-IUAH-AKOC-CQWR14R5M1J8}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Restart" JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5T558W1X-742F-IUAH-AKOC-CQWR14R5M1J8} JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5T558W1X-742F-IUAH-AKOC-CQWR14R5M1J8} JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5T558W1X-742F-IUAH-AKOC-CQWR14R5M1J8} JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5T558W1X-742F-IUAH-AKOC-CQWR14R5M1J8} JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5T558W1X-742F-IUAH-AKOC-CQWR14R5M1J8}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Restart" JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5T558W1X-742F-IUAH-AKOC-CQWR14R5M1J8} JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5T558W1X-742F-IUAH-AKOC-CQWR14R5M1J8}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Restart" JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5T558W1X-742F-IUAH-AKOC-CQWR14R5M1J8}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Restart" JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5T558W1X-742F-IUAH-AKOC-CQWR14R5M1J8} JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5T558W1X-742F-IUAH-AKOC-CQWR14R5M1J8} JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5T558W1X-742F-IUAH-AKOC-CQWR14R5M1J8} JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5T558W1X-742F-IUAH-AKOC-CQWR14R5M1J8}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Restart" JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5T558W1X-742F-IUAH-AKOC-CQWR14R5M1J8} JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5T558W1X-742F-IUAH-AKOC-CQWR14R5M1J8}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Restart" JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5T558W1X-742F-IUAH-AKOC-CQWR14R5M1J8}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Restart" JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5T558W1X-742F-IUAH-AKOC-CQWR14R5M1J8} JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5T558W1X-742F-IUAH-AKOC-CQWR14R5M1J8} JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5T558W1X-742F-IUAH-AKOC-CQWR14R5M1J8}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Restart" JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5T558W1X-742F-IUAH-AKOC-CQWR14R5M1J8}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Restart" JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5T558W1X-742F-IUAH-AKOC-CQWR14R5M1J8}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Restart" JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5T558W1X-742F-IUAH-AKOC-CQWR14R5M1J8}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Restart" JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5T558W1X-742F-IUAH-AKOC-CQWR14R5M1J8} JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5T558W1X-742F-IUAH-AKOC-CQWR14R5M1J8} JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5T558W1X-742F-IUAH-AKOC-CQWR14R5M1J8}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Restart" JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5T558W1X-742F-IUAH-AKOC-CQWR14R5M1J8} JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5T558W1X-742F-IUAH-AKOC-CQWR14R5M1J8}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Restart" JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5T558W1X-742F-IUAH-AKOC-CQWR14R5M1J8} JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5T558W1X-742F-IUAH-AKOC-CQWR14R5M1J8}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Restart" JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5T558W1X-742F-IUAH-AKOC-CQWR14R5M1J8} JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5T558W1X-742F-IUAH-AKOC-CQWR14R5M1J8} JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5T558W1X-742F-IUAH-AKOC-CQWR14R5M1J8}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Restart" JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5T558W1X-742F-IUAH-AKOC-CQWR14R5M1J8} JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5T558W1X-742F-IUAH-AKOC-CQWR14R5M1J8} JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5T558W1X-742F-IUAH-AKOC-CQWR14R5M1J8} JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5T558W1X-742F-IUAH-AKOC-CQWR14R5M1J8}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Restart" JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5T558W1X-742F-IUAH-AKOC-CQWR14R5M1J8}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Restart" JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5T558W1X-742F-IUAH-AKOC-CQWR14R5M1J8}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Restart" JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5T558W1X-742F-IUAH-AKOC-CQWR14R5M1J8}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Restart" JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5T558W1X-742F-IUAH-AKOC-CQWR14R5M1J8} JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5T558W1X-742F-IUAH-AKOC-CQWR14R5M1J8}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Restart" JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5T558W1X-742F-IUAH-AKOC-CQWR14R5M1J8}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Restart" JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5T558W1X-742F-IUAH-AKOC-CQWR14R5M1J8}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Restart" JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5T558W1X-742F-IUAH-AKOC-CQWR14R5M1J8} JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5T558W1X-742F-IUAH-AKOC-CQWR14R5M1J8} JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5T558W1X-742F-IUAH-AKOC-CQWR14R5M1J8}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Restart" JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5T558W1X-742F-IUAH-AKOC-CQWR14R5M1J8}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Restart" JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe" JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe" JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe -
Drops file in System32 directory 60 IoCs
description ioc Process File created \??\c:\windows\SysWOW64\microsoft\java.exe JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe File opened for modification \??\c:\windows\SysWOW64\microsoft\java.exe JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe File opened for modification \??\c:\windows\SysWOW64\microsoft\java.exe JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe File opened for modification \??\c:\windows\SysWOW64\microsoft\java.exe JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe File created \??\c:\windows\SysWOW64\microsoft\java.exe JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe File created \??\c:\windows\SysWOW64\microsoft\java.exe JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe File created \??\c:\windows\SysWOW64\microsoft\java.exe JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe File opened for modification \??\c:\windows\SysWOW64\microsoft\java.exe JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe File opened for modification \??\c:\windows\SysWOW64\microsoft\java.exe JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe File created \??\c:\windows\SysWOW64\microsoft\java.exe JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe File opened for modification \??\c:\windows\SysWOW64\microsoft\java.exe JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe File created \??\c:\windows\SysWOW64\microsoft\java.exe JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe File created \??\c:\windows\SysWOW64\microsoft\java.exe JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe File created \??\c:\windows\SysWOW64\microsoft\java.exe JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe File created \??\c:\windows\SysWOW64\microsoft\java.exe JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe File opened for modification \??\c:\windows\SysWOW64\microsoft\java.exe JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe File created \??\c:\windows\SysWOW64\microsoft\java.exe JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe File created \??\c:\windows\SysWOW64\microsoft\java.exe JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe File opened for modification \??\c:\windows\SysWOW64\microsoft\java.exe JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe File created \??\c:\windows\SysWOW64\microsoft\java.exe JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe File opened for modification \??\c:\windows\SysWOW64\microsoft\java.exe JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe File opened for modification \??\c:\windows\SysWOW64\microsoft\java.exe JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe File created \??\c:\windows\SysWOW64\microsoft\java.exe JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe File created \??\c:\windows\SysWOW64\microsoft\java.exe JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe File created \??\c:\windows\SysWOW64\microsoft\java.exe JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe File opened for modification \??\c:\windows\SysWOW64\microsoft\java.exe JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe File created \??\c:\windows\SysWOW64\microsoft\java.exe JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe File opened for modification \??\c:\windows\SysWOW64\microsoft\java.exe JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe File opened for modification \??\c:\windows\SysWOW64\microsoft\java.exe JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe File created \??\c:\windows\SysWOW64\microsoft\java.exe JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe File created \??\c:\windows\SysWOW64\microsoft\java.exe JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe File opened for modification \??\c:\windows\SysWOW64\microsoft\java.exe JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe File created \??\c:\windows\SysWOW64\microsoft\java.exe JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe File created \??\c:\windows\SysWOW64\microsoft\java.exe JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe File created \??\c:\windows\SysWOW64\microsoft\java.exe JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe File opened for modification \??\c:\windows\SysWOW64\microsoft\java.exe JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe File opened for modification \??\c:\windows\SysWOW64\microsoft\java.exe JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe File opened for modification \??\c:\windows\SysWOW64\microsoft\java.exe JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe File opened for modification \??\c:\windows\SysWOW64\microsoft\java.exe JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe File opened for modification \??\c:\windows\SysWOW64\microsoft\java.exe JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe File opened for modification \??\c:\windows\SysWOW64\microsoft\java.exe JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe File created \??\c:\windows\SysWOW64\microsoft\java.exe JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe File opened for modification \??\c:\windows\SysWOW64\microsoft\java.exe JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe File opened for modification \??\c:\windows\SysWOW64\microsoft\java.exe JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe File created \??\c:\windows\SysWOW64\microsoft\java.exe JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe File created \??\c:\windows\SysWOW64\microsoft\java.exe JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe File opened for modification \??\c:\windows\SysWOW64\microsoft\java.exe JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe File opened for modification \??\c:\windows\SysWOW64\microsoft\java.exe JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe File created \??\c:\windows\SysWOW64\microsoft\java.exe JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe File created \??\c:\windows\SysWOW64\microsoft\java.exe JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe File created \??\c:\windows\SysWOW64\microsoft\java.exe JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe File opened for modification \??\c:\windows\SysWOW64\microsoft\java.exe JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe File opened for modification \??\c:\windows\SysWOW64\microsoft\java.exe JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe File created \??\c:\windows\SysWOW64\microsoft\java.exe JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe File opened for modification \??\c:\windows\SysWOW64\microsoft\java.exe JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe File opened for modification \??\c:\windows\SysWOW64\microsoft\java.exe JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe File created \??\c:\windows\SysWOW64\microsoft\java.exe JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe File opened for modification \??\c:\windows\SysWOW64\microsoft\java.exe JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe File created \??\c:\windows\SysWOW64\microsoft\java.exe JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe File opened for modification \??\c:\windows\SysWOW64\microsoft\java.exe JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe -
resource yara_rule behavioral2/memory/452-12-0x0000000024010000-0x0000000024072000-memory.dmp upx behavioral2/memory/452-73-0x0000000024080000-0x00000000240E2000-memory.dmp upx behavioral2/memory/2372-76-0x0000000024080000-0x00000000240E2000-memory.dmp upx -
Program crash 59 IoCs
pid pid_target Process procid_target 3620 452 WerFault.exe 81 4532 452 WerFault.exe 81 4028 3020 WerFault.exe 88 4764 3020 WerFault.exe 88 4100 4480 WerFault.exe 93 5040 4480 WerFault.exe 93 3028 2456 WerFault.exe 102 3520 2456 WerFault.exe 102 1168 4252 WerFault.exe 110 4368 4252 WerFault.exe 110 2592 536 WerFault.exe 115 4460 536 WerFault.exe 115 3572 1180 WerFault.exe 122 2252 1180 WerFault.exe 122 1984 3452 WerFault.exe 127 3680 3452 WerFault.exe 127 2904 3488 WerFault.exe 132 4328 3488 WerFault.exe 132 620 2960 WerFault.exe 137 4652 2960 WerFault.exe 137 4528 4044 WerFault.exe 142 2144 4044 WerFault.exe 142 3260 376 WerFault.exe 147 3108 376 WerFault.exe 147 4416 3124 WerFault.exe 152 1924 3124 WerFault.exe 152 2232 1168 WerFault.exe 157 2052 1168 WerFault.exe 157 1600 264 WerFault.exe 162 4312 264 WerFault.exe 162 2292 2828 WerFault.exe 167 3512 2828 WerFault.exe 167 3732 4852 WerFault.exe 172 1304 4852 WerFault.exe 172 1408 820 WerFault.exe 177 3672 820 WerFault.exe 177 2640 3620 WerFault.exe 182 5068 3620 WerFault.exe 182 1844 3284 WerFault.exe 187 988 3284 WerFault.exe 187 2968 3992 WerFault.exe 192 2144 3992 WerFault.exe 192 3260 3476 WerFault.exe 197 3560 3476 WerFault.exe 197 4924 5048 WerFault.exe 202 2396 5048 WerFault.exe 202 1000 1924 WerFault.exe 207 5004 1924 WerFault.exe 207 1168 4240 WerFault.exe 212 4972 4240 WerFault.exe 212 4440 4316 WerFault.exe 217 4752 4316 WerFault.exe 217 1400 3308 WerFault.exe 222 1244 3308 WerFault.exe 222 3528 4780 WerFault.exe 227 2892 4780 WerFault.exe 227 3720 1408 WerFault.exe 232 1476 1408 WerFault.exe 232 1228 764 WerFault.exe 237 -
System Location Discovery: System Language Discovery 1 TTPs 31 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 452 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 452 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 452 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 452 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 3020 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 3020 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 3020 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 3020 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 4480 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 4480 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 4480 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 4480 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 2456 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 2456 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 2456 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 2456 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 4252 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 4252 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 4252 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 4252 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 536 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 536 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 536 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 536 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 1180 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 1180 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 1180 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 1180 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 3452 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 3452 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 3452 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 3452 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 3488 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 3488 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 3488 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 3488 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 2960 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 2960 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 2960 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 2960 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 4044 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 4044 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 4044 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 4044 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 376 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 376 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 376 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 376 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 3124 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 3124 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 3124 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 3124 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 1168 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 1168 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 1168 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 1168 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 264 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 264 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 264 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 264 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 2828 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 2828 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 2828 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 2828 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 452 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 452 wrote to memory of 3412 452 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 55 PID 452 wrote to memory of 3412 452 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 55 PID 452 wrote to memory of 3412 452 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 55 PID 452 wrote to memory of 3412 452 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 55 PID 452 wrote to memory of 3412 452 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 55 PID 452 wrote to memory of 3412 452 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 55 PID 452 wrote to memory of 3412 452 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 55 PID 452 wrote to memory of 3412 452 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 55 PID 452 wrote to memory of 3412 452 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 55 PID 452 wrote to memory of 3412 452 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 55 PID 452 wrote to memory of 3412 452 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 55 PID 452 wrote to memory of 3412 452 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 55 PID 452 wrote to memory of 3412 452 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 55 PID 452 wrote to memory of 3412 452 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 55 PID 452 wrote to memory of 3412 452 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 55 PID 452 wrote to memory of 3412 452 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 55 PID 452 wrote to memory of 3412 452 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 55 PID 452 wrote to memory of 3412 452 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 55 PID 452 wrote to memory of 3412 452 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 55 PID 452 wrote to memory of 3412 452 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 55 PID 452 wrote to memory of 3412 452 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 55 PID 452 wrote to memory of 3412 452 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 55 PID 452 wrote to memory of 3412 452 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 55 PID 452 wrote to memory of 3412 452 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 55 PID 452 wrote to memory of 3412 452 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 55 PID 452 wrote to memory of 3412 452 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 55 PID 452 wrote to memory of 3412 452 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 55 PID 452 wrote to memory of 3412 452 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 55 PID 452 wrote to memory of 3412 452 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 55 PID 452 wrote to memory of 3412 452 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 55 PID 452 wrote to memory of 3412 452 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 55 PID 452 wrote to memory of 3412 452 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 55 PID 452 wrote to memory of 3412 452 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 55 PID 452 wrote to memory of 3412 452 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 55 PID 452 wrote to memory of 3412 452 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 55 PID 452 wrote to memory of 3412 452 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 55 PID 452 wrote to memory of 3412 452 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 55 PID 452 wrote to memory of 3412 452 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 55 PID 452 wrote to memory of 3412 452 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 55 PID 452 wrote to memory of 3412 452 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 55 PID 452 wrote to memory of 3412 452 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 55 PID 452 wrote to memory of 3412 452 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 55 PID 452 wrote to memory of 3412 452 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 55 PID 452 wrote to memory of 3412 452 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 55 PID 452 wrote to memory of 3412 452 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 55 PID 452 wrote to memory of 3412 452 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 55 PID 452 wrote to memory of 3412 452 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 55 PID 452 wrote to memory of 3412 452 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 55 PID 452 wrote to memory of 3412 452 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 55 PID 452 wrote to memory of 3412 452 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 55 PID 452 wrote to memory of 3412 452 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 55 PID 452 wrote to memory of 3412 452 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 55 PID 452 wrote to memory of 3412 452 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 55 PID 452 wrote to memory of 3412 452 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 55 PID 452 wrote to memory of 3412 452 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 55 PID 452 wrote to memory of 3412 452 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 55 PID 452 wrote to memory of 3412 452 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 55 PID 452 wrote to memory of 3412 452 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 55 PID 452 wrote to memory of 3412 452 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 55 PID 452 wrote to memory of 3412 452 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 55 PID 452 wrote to memory of 3412 452 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 55 PID 452 wrote to memory of 3412 452 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 55 PID 452 wrote to memory of 3412 452 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 55 PID 452 wrote to memory of 3412 452 JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe 55
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3412
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe"2⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- System Location Discovery: System Language Discovery
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe"4⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3020 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3020 -s 5605⤵
- Program crash
PID:4028
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3020 -s 6005⤵
- Program crash
PID:4764
-
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe"4⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4480 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4480 -s 5645⤵
- Program crash
PID:4100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4480 -s 6045⤵
- Program crash
PID:5040
-
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe"4⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2456 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2456 -s 5605⤵
- Program crash
PID:3028
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2456 -s 6005⤵
- Program crash
PID:3520
-
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe"4⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4252 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4252 -s 5605⤵
- Program crash
PID:1168
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4252 -s 5685⤵
- Program crash
PID:4368
-
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe"4⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:536 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 536 -s 5645⤵
- Program crash
PID:2592
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 536 -s 6005⤵
- Program crash
PID:4460
-
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe"4⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1180 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1180 -s 5605⤵
- Program crash
PID:3572
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1180 -s 5805⤵
- Program crash
PID:2252
-
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe"4⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3452 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3452 -s 5645⤵
- Program crash
PID:1984
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3452 -s 5725⤵
- Program crash
PID:3680
-
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe"4⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3488 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3488 -s 5605⤵
- Program crash
PID:2904
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3488 -s 5685⤵
- Program crash
PID:4328
-
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe"4⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2960 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2960 -s 5605⤵
- Program crash
PID:620
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2960 -s 5805⤵
- Program crash
PID:4652
-
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe"4⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4044 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4044 -s 5645⤵
- Program crash
PID:4528
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4044 -s 5805⤵
- Program crash
PID:2144
-
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe"4⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:376 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 376 -s 5605⤵
- Program crash
PID:3260
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 376 -s 5685⤵
- Program crash
PID:3108
-
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe"4⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3124 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3124 -s 5605⤵
- Program crash
PID:4416
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3124 -s 5805⤵
- Program crash
PID:1924
-
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe"4⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1168 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1168 -s 5605⤵
- Program crash
PID:2232
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1168 -s 5685⤵
- Program crash
PID:2052
-
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe"4⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:264 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 264 -s 5605⤵
- Program crash
PID:1600
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 264 -s 6005⤵
- Program crash
PID:4312
-
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe"4⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2828 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2828 -s 5605⤵
- Program crash
PID:2292
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2828 -s 5685⤵
- Program crash
PID:3512
-
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe"4⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4852 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4852 -s 5605⤵
- Program crash
PID:3732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4852 -s 6005⤵
- Program crash
PID:1304
-
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe"4⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:820 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 820 -s 5645⤵
- Program crash
PID:1408
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 820 -s 6045⤵
- Program crash
PID:3672
-
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe"4⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3620 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3620 -s 5605⤵
- Program crash
PID:2640
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3620 -s 5805⤵
- Program crash
PID:5068
-
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe"4⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3284 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3284 -s 5605⤵
- Program crash
PID:1844
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3284 -s 5685⤵
- Program crash
PID:988
-
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe"4⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3992 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3992 -s 5645⤵
- Program crash
PID:2968
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3992 -s 6005⤵
- Program crash
PID:2144
-
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe"4⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3476 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3476 -s 5605⤵
- Program crash
PID:3260
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3476 -s 6005⤵
- Program crash
PID:3560
-
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe"4⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:5048 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5048 -s 5605⤵
- Program crash
PID:4924
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5048 -s 6005⤵
- Program crash
PID:2396
-
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe"4⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1924 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1924 -s 5605⤵
- Program crash
PID:1000
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1924 -s 6005⤵
- Program crash
PID:5004
-
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe"4⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4240 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4240 -s 5605⤵
- Program crash
PID:1168
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4240 -s 5685⤵
- Program crash
PID:4972
-
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe"4⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4316 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4316 -s 5605⤵
- Program crash
PID:4440
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4316 -s 6045⤵
- Program crash
PID:4752
-
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe"4⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3308 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3308 -s 5605⤵
- Program crash
PID:1400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3308 -s 5685⤵
- Program crash
PID:1244
-
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe"4⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4780 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4780 -s 5605⤵
- Program crash
PID:3528
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4780 -s 6005⤵
- Program crash
PID:2892
-
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe"4⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1408 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1408 -s 5605⤵
- Program crash
PID:3720
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1408 -s 5805⤵
- Program crash
PID:1476
-
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_04ca64e87e716190461fa9b3a48d1584.exe"4⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:764 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 764 -s 5605⤵
- Program crash
PID:1228
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 452 -s 6923⤵
- Program crash
PID:3620
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 452 -s 7123⤵
- Program crash
PID:4532
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 452 -ip 4521⤵PID:3216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 452 -ip 4521⤵PID:2872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3020 -ip 30201⤵PID:1680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3020 -ip 30201⤵PID:3888
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4480 -ip 44801⤵PID:2968
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4480 -ip 44801⤵PID:376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2456 -ip 24561⤵PID:3560
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 2456 -ip 24561⤵PID:1776
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4252 -ip 42521⤵PID:1860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 4252 -ip 42521⤵PID:1544
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 536 -ip 5361⤵PID:2088
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 536 -ip 5361⤵PID:4324
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 1180 -ip 11801⤵PID:4448
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 1180 -ip 11801⤵PID:1400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 3452 -ip 34521⤵PID:3188
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 3452 -ip 34521⤵PID:1524
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 688 -p 3488 -ip 34881⤵PID:3620
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 696 -p 3488 -ip 34881⤵PID:4532
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 700 -p 2960 -ip 29601⤵PID:4828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 716 -p 2960 -ip 29601⤵PID:1844
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 4044 -ip 40441⤵PID:1812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 780 -p 4044 -ip 40441⤵PID:4964
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 800 -p 376 -ip 3761⤵PID:4756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 724 -p 376 -ip 3761⤵PID:544
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 752 -p 3124 -ip 31241⤵PID:2248
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 736 -p 3124 -ip 31241⤵PID:4516
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 780 -p 1168 -ip 11681⤵PID:3652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 740 -p 1168 -ip 11681⤵PID:736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 752 -p 264 -ip 2641⤵PID:3304
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 744 -p 264 -ip 2641⤵PID:4792
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 680 -p 2828 -ip 28281⤵PID:4460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 744 -p 2828 -ip 28281⤵PID:4520
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 692 -p 4852 -ip 48521⤵PID:5080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 752 -p 4852 -ip 48521⤵PID:4720
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 820 -ip 8201⤵PID:3188
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 752 -p 820 -ip 8201⤵PID:2724
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 728 -p 3620 -ip 36201⤵PID:4204
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 704 -p 3620 -ip 36201⤵PID:4748
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 716 -p 3284 -ip 32841⤵PID:3156
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 3284 -ip 32841⤵PID:1980
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 672 -p 3992 -ip 39921⤵PID:2912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 3992 -ip 39921⤵PID:4100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 3476 -ip 34761⤵PID:3428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 664 -p 3476 -ip 34761⤵PID:1576
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 700 -p 5048 -ip 50481⤵PID:5072
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 684 -p 5048 -ip 50481⤵PID:2992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 684 -p 1924 -ip 19241⤵PID:1048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1924 -ip 19241⤵PID:1544
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 736 -p 4240 -ip 42401⤵PID:1556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 712 -p 4240 -ip 42401⤵PID:4092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 704 -p 4316 -ip 43161⤵PID:536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 684 -p 4316 -ip 43161⤵PID:3120
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 728 -p 3308 -ip 33081⤵PID:5080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 728 -p 3308 -ip 33081⤵PID:4220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 660 -p 4780 -ip 47801⤵PID:208
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 4780 -ip 47801⤵PID:2008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1408 -ip 14081⤵PID:2168
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 788 -p 1408 -ip 14081⤵PID:3216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 736 -p 764 -ip 7641⤵PID:1920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 692 -p 764 -ip 7641⤵PID:3964
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD53166d3639b2877f88b0b49f21cc4c5ec
SHA119a0685c219c5e572c2c46924c2a7bc76b6827cd
SHA256d7cec4ed87eae10aeeac9f6149f7911f16bc55da3e38dcba23ac6813b4cd7483
SHA5123e8a4557bd010ab8d09b5f0c0fef129f030bca3d05b652ebe9dea3848c493b342b6faf752b9343c9a4b920550c7da221fff15df61402724af606e121296b91ed