Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/01/2025, 23:20
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_084dc5d64c729ed673a9cd5bf7cd8ad5.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_084dc5d64c729ed673a9cd5bf7cd8ad5.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_084dc5d64c729ed673a9cd5bf7cd8ad5.exe
-
Size
608KB
-
MD5
084dc5d64c729ed673a9cd5bf7cd8ad5
-
SHA1
4f529f9624faf190b646c4db0f1f50031ff8b2fc
-
SHA256
2ec6e368fc0d001c20d0e64a24bac26dfdfea0a96d15b417d06f726c969aa034
-
SHA512
e7ea902f13d3c9108dbf96c7dc29c0ad67c8fdca96abcec4ff5557b4206fb2a83bd6ad8557ed0f24dbfb60345693452e29e7634486e4eb113abb51286118c26a
-
SSDEEP
12288:+BYDZJr1E+3JcdrXxE3Vq4Vcim38bJ6vKDn5gcPUbjC:+qF6+ydroLrJ6vKVgkUb
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 4 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral1/memory/2540-124-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/908-126-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/2540-239-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot behavioral1/memory/3048-241-0x0000000000400000-0x000000000046A000-memory.dmp family_cycbot -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" 3nua.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" aUY5E15SY8.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" voexee.exe -
Pony family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Deletes itself 1 IoCs
pid Process 1940 cmd.exe -
Executes dropped EXE 12 IoCs
pid Process 2360 aUY5E15SY8.exe 484 voexee.exe 2808 2nua.exe 2836 2nua.exe 2768 2nua.exe 2684 2nua.exe 1572 2nua.exe 1484 2nua.exe 2540 3nua.exe 908 3nua.exe 3048 3nua.exe 1820 7B38.tmp -
Loads dropped DLL 10 IoCs
pid Process 604 JaffaCakes118_084dc5d64c729ed673a9cd5bf7cd8ad5.exe 604 JaffaCakes118_084dc5d64c729ed673a9cd5bf7cd8ad5.exe 2360 aUY5E15SY8.exe 2360 aUY5E15SY8.exe 604 JaffaCakes118_084dc5d64c729ed673a9cd5bf7cd8ad5.exe 604 JaffaCakes118_084dc5d64c729ed673a9cd5bf7cd8ad5.exe 604 JaffaCakes118_084dc5d64c729ed673a9cd5bf7cd8ad5.exe 604 JaffaCakes118_084dc5d64c729ed673a9cd5bf7cd8ad5.exe 2540 3nua.exe 2540 3nua.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 53 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\voexee = "C:\\Users\\Admin\\voexee.exe /E" aUY5E15SY8.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\voexee = "C:\\Users\\Admin\\voexee.exe /X" voexee.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\voexee = "C:\\Users\\Admin\\voexee.exe /f" voexee.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\voexee = "C:\\Users\\Admin\\voexee.exe /N" voexee.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\voexee = "C:\\Users\\Admin\\voexee.exe /R" voexee.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\voexee = "C:\\Users\\Admin\\voexee.exe /B" voexee.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\voexee = "C:\\Users\\Admin\\voexee.exe /A" voexee.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\voexee = "C:\\Users\\Admin\\voexee.exe /U" voexee.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\voexee = "C:\\Users\\Admin\\voexee.exe /d" voexee.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\voexee = "C:\\Users\\Admin\\voexee.exe /y" voexee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\A92.exe = "C:\\Program Files (x86)\\LP\\3CD9\\A92.exe" 3nua.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\voexee = "C:\\Users\\Admin\\voexee.exe /O" voexee.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\voexee = "C:\\Users\\Admin\\voexee.exe /i" voexee.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\voexee = "C:\\Users\\Admin\\voexee.exe /j" voexee.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\voexee = "C:\\Users\\Admin\\voexee.exe /r" voexee.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\voexee = "C:\\Users\\Admin\\voexee.exe /k" voexee.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\voexee = "C:\\Users\\Admin\\voexee.exe /S" voexee.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\voexee = "C:\\Users\\Admin\\voexee.exe /b" voexee.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\voexee = "C:\\Users\\Admin\\voexee.exe /q" voexee.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\voexee = "C:\\Users\\Admin\\voexee.exe /a" voexee.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\voexee = "C:\\Users\\Admin\\voexee.exe /I" voexee.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\voexee = "C:\\Users\\Admin\\voexee.exe /l" voexee.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\voexee = "C:\\Users\\Admin\\voexee.exe /o" voexee.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\voexee = "C:\\Users\\Admin\\voexee.exe /G" voexee.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\voexee = "C:\\Users\\Admin\\voexee.exe /h" voexee.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\voexee = "C:\\Users\\Admin\\voexee.exe /T" voexee.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\voexee = "C:\\Users\\Admin\\voexee.exe /Z" voexee.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\voexee = "C:\\Users\\Admin\\voexee.exe /M" voexee.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\voexee = "C:\\Users\\Admin\\voexee.exe /x" voexee.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\voexee = "C:\\Users\\Admin\\voexee.exe /s" voexee.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\voexee = "C:\\Users\\Admin\\voexee.exe /z" voexee.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\voexee = "C:\\Users\\Admin\\voexee.exe /K" voexee.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\voexee = "C:\\Users\\Admin\\voexee.exe /Q" voexee.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\voexee = "C:\\Users\\Admin\\voexee.exe /t" voexee.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\voexee = "C:\\Users\\Admin\\voexee.exe /V" voexee.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\voexee = "C:\\Users\\Admin\\voexee.exe /m" voexee.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\voexee = "C:\\Users\\Admin\\voexee.exe /H" voexee.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\voexee = "C:\\Users\\Admin\\voexee.exe /v" voexee.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\voexee = "C:\\Users\\Admin\\voexee.exe /n" voexee.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\voexee = "C:\\Users\\Admin\\voexee.exe /J" voexee.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\voexee = "C:\\Users\\Admin\\voexee.exe /D" voexee.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\voexee = "C:\\Users\\Admin\\voexee.exe /E" voexee.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\voexee = "C:\\Users\\Admin\\voexee.exe /c" voexee.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\voexee = "C:\\Users\\Admin\\voexee.exe /F" voexee.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\voexee = "C:\\Users\\Admin\\voexee.exe /p" voexee.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\voexee = "C:\\Users\\Admin\\voexee.exe /W" voexee.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\voexee = "C:\\Users\\Admin\\voexee.exe /P" voexee.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\voexee = "C:\\Users\\Admin\\voexee.exe /C" voexee.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\voexee = "C:\\Users\\Admin\\voexee.exe /L" voexee.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\voexee = "C:\\Users\\Admin\\voexee.exe /Y" voexee.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\voexee = "C:\\Users\\Admin\\voexee.exe /g" voexee.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\voexee = "C:\\Users\\Admin\\voexee.exe /e" voexee.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\voexee = "C:\\Users\\Admin\\voexee.exe /u" voexee.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 2nua.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 2nua.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 2nua.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 2nua.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 2948 tasklist.exe 1316 tasklist.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 2808 set thread context of 2836 2808 2nua.exe 38 PID 2808 set thread context of 2768 2808 2nua.exe 39 PID 2808 set thread context of 2684 2808 2nua.exe 40 PID 2808 set thread context of 1572 2808 2nua.exe 41 PID 2808 set thread context of 1484 2808 2nua.exe 42 -
resource yara_rule behavioral1/memory/2768-51-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2768-50-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2768-49-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2768-47-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2768-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2768-42-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1572-69-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral1/memory/1572-72-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral1/memory/1572-67-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral1/memory/1572-83-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral1/memory/1572-81-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral1/memory/1484-91-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral1/memory/1484-90-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral1/memory/1484-87-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral1/memory/1484-77-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral1/memory/1484-75-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral1/memory/1484-96-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral1/memory/2768-108-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1572-120-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral1/memory/2540-124-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/908-126-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2540-239-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/3048-241-0x0000000000400000-0x000000000046A000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\LP\3CD9\A92.exe 3nua.exe File opened for modification C:\Program Files (x86)\LP\3CD9\7B38.tmp 3nua.exe File created C:\Program Files (x86)\LP\3CD9\A92.exe 3nua.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2nua.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2nua.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3nua.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3nua.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2nua.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3nua.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_084dc5d64c729ed673a9cd5bf7cd8ad5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aUY5E15SY8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language voexee.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2nua.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7B38.tmp -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2360 aUY5E15SY8.exe 2360 aUY5E15SY8.exe 2768 2nua.exe 2684 2nua.exe 484 voexee.exe 2768 2nua.exe 484 voexee.exe 484 voexee.exe 484 voexee.exe 484 voexee.exe 2540 3nua.exe 2540 3nua.exe 2540 3nua.exe 2540 3nua.exe 2540 3nua.exe 2540 3nua.exe 484 voexee.exe 484 voexee.exe 484 voexee.exe 484 voexee.exe 484 voexee.exe 484 voexee.exe 484 voexee.exe 484 voexee.exe 484 voexee.exe 484 voexee.exe 484 voexee.exe 484 voexee.exe 484 voexee.exe 484 voexee.exe 484 voexee.exe 484 voexee.exe 484 voexee.exe 484 voexee.exe 484 voexee.exe 484 voexee.exe 484 voexee.exe 484 voexee.exe 484 voexee.exe 484 voexee.exe 484 voexee.exe 484 voexee.exe 484 voexee.exe 484 voexee.exe 484 voexee.exe 484 voexee.exe 2540 3nua.exe 2540 3nua.exe 2540 3nua.exe 2540 3nua.exe 2540 3nua.exe 2540 3nua.exe 2540 3nua.exe 2540 3nua.exe 484 voexee.exe 484 voexee.exe 484 voexee.exe 484 voexee.exe 484 voexee.exe 484 voexee.exe 484 voexee.exe 484 voexee.exe 484 voexee.exe 484 voexee.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1612 explorer.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeDebugPrivilege 2948 tasklist.exe Token: SeRestorePrivilege 3012 msiexec.exe Token: SeTakeOwnershipPrivilege 3012 msiexec.exe Token: SeSecurityPrivilege 3012 msiexec.exe Token: SeDebugPrivilege 1316 tasklist.exe Token: SeShutdownPrivilege 1612 explorer.exe Token: SeShutdownPrivilege 1612 explorer.exe Token: SeShutdownPrivilege 1612 explorer.exe Token: SeShutdownPrivilege 1612 explorer.exe Token: SeShutdownPrivilege 1612 explorer.exe Token: SeShutdownPrivilege 1612 explorer.exe Token: SeShutdownPrivilege 1612 explorer.exe Token: SeShutdownPrivilege 1612 explorer.exe Token: SeShutdownPrivilege 1612 explorer.exe Token: SeShutdownPrivilege 1612 explorer.exe Token: SeShutdownPrivilege 1612 explorer.exe Token: SeShutdownPrivilege 1612 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 604 JaffaCakes118_084dc5d64c729ed673a9cd5bf7cd8ad5.exe 2360 aUY5E15SY8.exe 484 voexee.exe 2808 2nua.exe 1572 2nua.exe 1484 2nua.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 604 wrote to memory of 2360 604 JaffaCakes118_084dc5d64c729ed673a9cd5bf7cd8ad5.exe 31 PID 604 wrote to memory of 2360 604 JaffaCakes118_084dc5d64c729ed673a9cd5bf7cd8ad5.exe 31 PID 604 wrote to memory of 2360 604 JaffaCakes118_084dc5d64c729ed673a9cd5bf7cd8ad5.exe 31 PID 604 wrote to memory of 2360 604 JaffaCakes118_084dc5d64c729ed673a9cd5bf7cd8ad5.exe 31 PID 2360 wrote to memory of 484 2360 aUY5E15SY8.exe 32 PID 2360 wrote to memory of 484 2360 aUY5E15SY8.exe 32 PID 2360 wrote to memory of 484 2360 aUY5E15SY8.exe 32 PID 2360 wrote to memory of 484 2360 aUY5E15SY8.exe 32 PID 2360 wrote to memory of 2260 2360 aUY5E15SY8.exe 33 PID 2360 wrote to memory of 2260 2360 aUY5E15SY8.exe 33 PID 2360 wrote to memory of 2260 2360 aUY5E15SY8.exe 33 PID 2360 wrote to memory of 2260 2360 aUY5E15SY8.exe 33 PID 2260 wrote to memory of 2948 2260 cmd.exe 35 PID 2260 wrote to memory of 2948 2260 cmd.exe 35 PID 2260 wrote to memory of 2948 2260 cmd.exe 35 PID 2260 wrote to memory of 2948 2260 cmd.exe 35 PID 604 wrote to memory of 2808 604 JaffaCakes118_084dc5d64c729ed673a9cd5bf7cd8ad5.exe 37 PID 604 wrote to memory of 2808 604 JaffaCakes118_084dc5d64c729ed673a9cd5bf7cd8ad5.exe 37 PID 604 wrote to memory of 2808 604 JaffaCakes118_084dc5d64c729ed673a9cd5bf7cd8ad5.exe 37 PID 604 wrote to memory of 2808 604 JaffaCakes118_084dc5d64c729ed673a9cd5bf7cd8ad5.exe 37 PID 2808 wrote to memory of 2836 2808 2nua.exe 38 PID 2808 wrote to memory of 2836 2808 2nua.exe 38 PID 2808 wrote to memory of 2836 2808 2nua.exe 38 PID 2808 wrote to memory of 2836 2808 2nua.exe 38 PID 2808 wrote to memory of 2836 2808 2nua.exe 38 PID 2808 wrote to memory of 2768 2808 2nua.exe 39 PID 2808 wrote to memory of 2768 2808 2nua.exe 39 PID 2808 wrote to memory of 2768 2808 2nua.exe 39 PID 2808 wrote to memory of 2768 2808 2nua.exe 39 PID 2808 wrote to memory of 2768 2808 2nua.exe 39 PID 2808 wrote to memory of 2768 2808 2nua.exe 39 PID 2808 wrote to memory of 2768 2808 2nua.exe 39 PID 2808 wrote to memory of 2768 2808 2nua.exe 39 PID 2808 wrote to memory of 2684 2808 2nua.exe 40 PID 2808 wrote to memory of 2684 2808 2nua.exe 40 PID 2808 wrote to memory of 2684 2808 2nua.exe 40 PID 2808 wrote to memory of 2684 2808 2nua.exe 40 PID 2808 wrote to memory of 2684 2808 2nua.exe 40 PID 2808 wrote to memory of 2684 2808 2nua.exe 40 PID 2808 wrote to memory of 2684 2808 2nua.exe 40 PID 2808 wrote to memory of 2684 2808 2nua.exe 40 PID 2808 wrote to memory of 2684 2808 2nua.exe 40 PID 2808 wrote to memory of 2684 2808 2nua.exe 40 PID 2808 wrote to memory of 1572 2808 2nua.exe 41 PID 2808 wrote to memory of 1572 2808 2nua.exe 41 PID 2808 wrote to memory of 1572 2808 2nua.exe 41 PID 2808 wrote to memory of 1572 2808 2nua.exe 41 PID 2808 wrote to memory of 1572 2808 2nua.exe 41 PID 2808 wrote to memory of 1572 2808 2nua.exe 41 PID 2808 wrote to memory of 1572 2808 2nua.exe 41 PID 2808 wrote to memory of 1572 2808 2nua.exe 41 PID 2808 wrote to memory of 1484 2808 2nua.exe 42 PID 2808 wrote to memory of 1484 2808 2nua.exe 42 PID 2808 wrote to memory of 1484 2808 2nua.exe 42 PID 2808 wrote to memory of 1484 2808 2nua.exe 42 PID 2808 wrote to memory of 1484 2808 2nua.exe 42 PID 2808 wrote to memory of 1484 2808 2nua.exe 42 PID 2808 wrote to memory of 1484 2808 2nua.exe 42 PID 2808 wrote to memory of 1484 2808 2nua.exe 42 PID 604 wrote to memory of 2540 604 JaffaCakes118_084dc5d64c729ed673a9cd5bf7cd8ad5.exe 43 PID 604 wrote to memory of 2540 604 JaffaCakes118_084dc5d64c729ed673a9cd5bf7cd8ad5.exe 43 PID 604 wrote to memory of 2540 604 JaffaCakes118_084dc5d64c729ed673a9cd5bf7cd8ad5.exe 43 PID 604 wrote to memory of 2540 604 JaffaCakes118_084dc5d64c729ed673a9cd5bf7cd8ad5.exe 43 PID 604 wrote to memory of 1940 604 JaffaCakes118_084dc5d64c729ed673a9cd5bf7cd8ad5.exe 46 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 3nua.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" 3nua.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_084dc5d64c729ed673a9cd5bf7cd8ad5.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_084dc5d64c729ed673a9cd5bf7cd8ad5.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:604 -
C:\Users\Admin\aUY5E15SY8.exeC:\Users\Admin\aUY5E15SY8.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\voexee.exe"C:\Users\Admin\voexee.exe"3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:484
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del aUY5E15SY8.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2948
-
-
-
-
C:\Users\Admin\2nua.exeC:\Users\Admin\2nua.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\2nua.exe"C:\Users\Admin\2nua.exe"3⤵
- Executes dropped EXE
PID:2836
-
-
C:\Users\Admin\2nua.exe"C:\Users\Admin\2nua.exe"3⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
PID:2768
-
-
C:\Users\Admin\2nua.exe"C:\Users\Admin\2nua.exe"3⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2684
-
-
C:\Users\Admin\2nua.exe"C:\Users\Admin\2nua.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1572
-
-
C:\Users\Admin\2nua.exe"C:\Users\Admin\2nua.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1484
-
-
-
C:\Users\Admin\3nua.exeC:\Users\Admin\3nua.exe2⤵
- Modifies security service
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- System policy modification
PID:2540 -
C:\Users\Admin\3nua.exeC:\Users\Admin\3nua.exe startC:\Users\Admin\AppData\Roaming\92871\8D33C.exe%C:\Users\Admin\AppData\Roaming\928713⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:908
-
-
C:\Users\Admin\3nua.exeC:\Users\Admin\3nua.exe startC:\Program Files (x86)\71B64\lvvm.exe%C:\Program Files (x86)\71B643⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3048
-
-
C:\Program Files (x86)\LP\3CD9\7B38.tmp"C:\Program Files (x86)\LP\3CD9\7B38.tmp"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1820
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del JaffaCakes118_084dc5d64c729ed673a9cd5bf7cd8ad5.exe2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1940 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1316
-
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3012
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1612
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
5Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
600B
MD52a93a26667ac1999cc33256ee6f2f945
SHA12b10bd2f22e7f49f24f9eb102c36b3a3a3afb21b
SHA2569f8b9127d8e9dbb35f418645b736ce1a87a413b26824bb8964d2f750db68eb7b
SHA51219e8419dffa7f805862973a09eb1dada71da21f52bb492e627b0f08dc7821ef5094e9042ff23c71b540a3297e3929f1f2da384328587db3158c7080a817e1d85
-
Filesize
996B
MD5e1520f48cf5e1d4106043e54fb1f5b4e
SHA19cf7f4fe8b6be10d649958f2eff386355aadf247
SHA2563153ab1eca1b6c02291c3087453e91b1018f5b2150cddd65e805cfd2c272abfb
SHA51228df2272836c00730f20f55e041c68352998702ebdd4b668996dfd40b048572737357fdba3ec8bd3e0154993fe51e1e371a37d654058ac56649275fb700b17c0
-
Filesize
97KB
MD529c0a1942c5efa556fcf06cdb27e6b43
SHA11f4897b7091c159f7402237f093dd66419ef801b
SHA2564f5a26e02022c8e480e3bba16fdbe3c9e19f95ccfded922fdb911403ef1ae0c4
SHA51254389f2ec50d6447f89b15268f4daa3b9a6a0f7c0609648754eaeb6bd6e159c800f1f29f759bd56f42ab6249b246a95081d1e0e9fdd43e56ff2104a7ce458168
-
Filesize
224KB
MD5b64185be04a7c3882871c07358450544
SHA16dd00c5f29490e210639ac155e732f7c33e746af
SHA256c7968bba96e5bc1c47dd24c4b61763eb9d227e89bb259add8ac010711a875f0d
SHA512604aa723229eddd5225c13d64993966d9a79f0e34aa6b31bb8cfc00e1765319886eaefff276222831e6c5a82cf50634f04a9d59c141329b07a632fc586e4ed21
-
Filesize
273KB
MD50fcecac14065f03c4f83bf5ae6ac415b
SHA1f71aa4708e16a2a3bf15e2a99cc0ce609b08769b
SHA25679f4527215b4a213f69cf618440202131afa6eb61d2bc6046b718dd4b4ddb787
SHA51249195c9f00c434228dd76151042dc03f7f87b77438734861face0f4ec40391649ed784aaf82b756113a55d55126c9b18c27e44d0c47ca75564ea079eed161003
-
Filesize
208KB
MD5380575fdf47f22e24cc214c89f098f9d
SHA15d5584fab3dc5267ffacfd4c331555f4f7703fb6
SHA25604fc572ba5e2e941d3510ed1504cc04490c7f5ff3ec651e6c8ffd6645ef2e0c9
SHA51270ce73ac9a14224c608e1ab60e21dd8bbd5ebcc8c75bb670c0861c8fc4a478965d39a450d32907ff90baa3a8a2fc9e50a9cc8d7385a330b373d3c9854cc8e7e2
-
Filesize
208KB
MD5c3080015f7d8b274a92b70f405ac2721
SHA1ccbb1d1aae982836994041d1d6bd2d9738474f94
SHA256394433a11ce359a56c74c3b833fe430d0f82b32f6c23fa752895d9597e0cd18b
SHA512cf85aa2c2131f10f42a0354916452ae53e6d22a95903223ebc9add927460145d8fe0ff69de16590469c23bf6e616330ade77faa6a325c4c3163b255b118b2f3c