Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-01-2025 17:42
Behavioral task
behavioral1
Sample
JaffaCakes118_42295816978b4c1162f604b8cc98e211.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_42295816978b4c1162f604b8cc98e211.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_42295816978b4c1162f604b8cc98e211.exe
-
Size
841KB
-
MD5
42295816978b4c1162f604b8cc98e211
-
SHA1
c63183321b3ef906b62569d901b6fc61530b42c2
-
SHA256
77305518a1b2d8a76f3adaf7959dc850b5ed90ded43792ad26fb23d725505abd
-
SHA512
6c28c638883f72e672c1796d243a77b80ff1be1d392b58fb236f8351ed002101f7066064d00ec6c127781e835eadad133cd4b11a0032df227ce5d7ee9aabb91f
-
SSDEEP
24576:Y1ckXnJDH7oH1haz/5qgxuLh62tLqazx5QwLzyUSSykQ59aIkPTr:Y1v3Jz8H1hU/5qgQ62Bqad5g0yksxkrr
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" miGRu6Gcu2.exe Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ktruuy.exe -
Modiloader family
-
ModiLoader Second Stage 9 IoCs
resource yara_rule behavioral2/memory/1084-6-0x0000000000400000-0x0000000000419000-memory.dmp modiloader_stage2 behavioral2/memory/2968-9-0x0000000000400000-0x000000000051D000-memory.dmp modiloader_stage2 behavioral2/memory/2968-7-0x0000000000400000-0x000000000051D000-memory.dmp modiloader_stage2 behavioral2/files/0x0007000000023cc0-23.dat modiloader_stage2 behavioral2/memory/428-50-0x0000000000400000-0x0000000000418000-memory.dmp modiloader_stage2 behavioral2/files/0x0007000000023cc2-53.dat modiloader_stage2 behavioral2/memory/2752-58-0x0000000000400000-0x0000000000418000-memory.dmp modiloader_stage2 behavioral2/memory/2968-69-0x0000000000400000-0x000000000051D000-memory.dmp modiloader_stage2 behavioral2/memory/2968-92-0x0000000000400000-0x000000000051D000-memory.dmp modiloader_stage2 -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation miGRu6Gcu2.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation JaffaCakes118_42295816978b4c1162f604b8cc98e211.exe -
Executes dropped EXE 9 IoCs
pid Process 4980 miGRu6Gcu2.exe 428 alhost.exe 2080 ktruuy.exe 4920 alhost.exe 2752 blhost.exe 3860 blhost.exe 1500 clhost.exe 3780 dlhost.exe 4852 elhost.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ktruuy = "C:\\Users\\Admin\\ktruuy.exe /p" ktruuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ktruuy = "C:\\Users\\Admin\\ktruuy.exe /m" ktruuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ktruuy = "C:\\Users\\Admin\\ktruuy.exe /r" miGRu6Gcu2.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ktruuy = "C:\\Users\\Admin\\ktruuy.exe /B" ktruuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ktruuy = "C:\\Users\\Admin\\ktruuy.exe /a" ktruuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ktruuy = "C:\\Users\\Admin\\ktruuy.exe /K" ktruuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ktruuy = "C:\\Users\\Admin\\ktruuy.exe /F" ktruuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ktruuy = "C:\\Users\\Admin\\ktruuy.exe /g" ktruuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ktruuy = "C:\\Users\\Admin\\ktruuy.exe /T" ktruuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ktruuy = "C:\\Users\\Admin\\ktruuy.exe /O" ktruuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ktruuy = "C:\\Users\\Admin\\ktruuy.exe /U" ktruuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ktruuy = "C:\\Users\\Admin\\ktruuy.exe /E" ktruuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ktruuy = "C:\\Users\\Admin\\ktruuy.exe /o" ktruuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ktruuy = "C:\\Users\\Admin\\ktruuy.exe /f" ktruuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ktruuy = "C:\\Users\\Admin\\ktruuy.exe /q" ktruuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ktruuy = "C:\\Users\\Admin\\ktruuy.exe /W" ktruuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ktruuy = "C:\\Users\\Admin\\ktruuy.exe /j" ktruuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ktruuy = "C:\\Users\\Admin\\ktruuy.exe /s" ktruuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ktruuy = "C:\\Users\\Admin\\ktruuy.exe /S" ktruuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ktruuy = "C:\\Users\\Admin\\ktruuy.exe /J" ktruuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ktruuy = "C:\\Users\\Admin\\ktruuy.exe /r" ktruuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ktruuy = "C:\\Users\\Admin\\ktruuy.exe /x" ktruuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ktruuy = "C:\\Users\\Admin\\ktruuy.exe /I" ktruuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ktruuy = "C:\\Users\\Admin\\ktruuy.exe /c" ktruuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ktruuy = "C:\\Users\\Admin\\ktruuy.exe /G" ktruuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ktruuy = "C:\\Users\\Admin\\ktruuy.exe /L" ktruuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ktruuy = "C:\\Users\\Admin\\ktruuy.exe /Z" ktruuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ktruuy = "C:\\Users\\Admin\\ktruuy.exe /w" ktruuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ktruuy = "C:\\Users\\Admin\\ktruuy.exe /R" ktruuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ktruuy = "C:\\Users\\Admin\\ktruuy.exe /h" ktruuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ktruuy = "C:\\Users\\Admin\\ktruuy.exe /z" ktruuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ktruuy = "C:\\Users\\Admin\\ktruuy.exe /N" ktruuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ktruuy = "C:\\Users\\Admin\\ktruuy.exe /b" ktruuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ktruuy = "C:\\Users\\Admin\\ktruuy.exe /l" ktruuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ktruuy = "C:\\Users\\Admin\\ktruuy.exe /X" ktruuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ktruuy = "C:\\Users\\Admin\\ktruuy.exe /e" ktruuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ktruuy = "C:\\Users\\Admin\\ktruuy.exe /Q" ktruuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ktruuy = "C:\\Users\\Admin\\ktruuy.exe /y" ktruuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ktruuy = "C:\\Users\\Admin\\ktruuy.exe /V" ktruuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ktruuy = "C:\\Users\\Admin\\ktruuy.exe /v" ktruuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ktruuy = "C:\\Users\\Admin\\ktruuy.exe /u" ktruuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ktruuy = "C:\\Users\\Admin\\ktruuy.exe /d" ktruuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ktruuy = "C:\\Users\\Admin\\ktruuy.exe /k" ktruuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ktruuy = "C:\\Users\\Admin\\ktruuy.exe /t" ktruuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ktruuy = "C:\\Users\\Admin\\ktruuy.exe /M" ktruuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ktruuy = "C:\\Users\\Admin\\ktruuy.exe /P" ktruuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ktruuy = "C:\\Users\\Admin\\ktruuy.exe /n" ktruuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ktruuy = "C:\\Users\\Admin\\ktruuy.exe /i" ktruuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ktruuy = "C:\\Users\\Admin\\ktruuy.exe /C" ktruuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ktruuy = "C:\\Users\\Admin\\ktruuy.exe /D" ktruuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ktruuy = "C:\\Users\\Admin\\ktruuy.exe /Y" ktruuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ktruuy = "C:\\Users\\Admin\\ktruuy.exe /A" ktruuy.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 alhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum blhost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 blhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum alhost.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 4116 tasklist.exe 4052 tasklist.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1084 set thread context of 2968 1084 JaffaCakes118_42295816978b4c1162f604b8cc98e211.exe 83 PID 428 set thread context of 4920 428 alhost.exe 92 PID 2752 set thread context of 3860 2752 blhost.exe 98 PID 3780 set thread context of 1456 3780 dlhost.exe 111 -
resource yara_rule behavioral2/memory/2968-0-0x0000000000400000-0x000000000051D000-memory.dmp upx behavioral2/memory/2968-4-0x0000000000400000-0x000000000051D000-memory.dmp upx behavioral2/memory/2968-9-0x0000000000400000-0x000000000051D000-memory.dmp upx behavioral2/memory/2968-5-0x0000000000400000-0x000000000051D000-memory.dmp upx behavioral2/memory/2968-1-0x0000000000400000-0x000000000051D000-memory.dmp upx behavioral2/memory/2968-7-0x0000000000400000-0x000000000051D000-memory.dmp upx behavioral2/memory/3860-54-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3860-55-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3860-60-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3860-61-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2968-69-0x0000000000400000-0x000000000051D000-memory.dmp upx behavioral2/memory/3860-72-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2968-92-0x0000000000400000-0x000000000051D000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1564 1500 WerFault.exe 99 -
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language elhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language miGRu6Gcu2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ktruuy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language blhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language clhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dlhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_42295816978b4c1162f604b8cc98e211.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_42295816978b4c1162f604b8cc98e211.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language alhost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4980 miGRu6Gcu2.exe 4980 miGRu6Gcu2.exe 4980 miGRu6Gcu2.exe 4980 miGRu6Gcu2.exe 4920 alhost.exe 4920 alhost.exe 4920 alhost.exe 4920 alhost.exe 4920 alhost.exe 4920 alhost.exe 2080 ktruuy.exe 2080 ktruuy.exe 2080 ktruuy.exe 2080 ktruuy.exe 2080 ktruuy.exe 2080 ktruuy.exe 3860 blhost.exe 3860 blhost.exe 2080 ktruuy.exe 2080 ktruuy.exe 2080 ktruuy.exe 2080 ktruuy.exe 2080 ktruuy.exe 2080 ktruuy.exe 2080 ktruuy.exe 2080 ktruuy.exe 2080 ktruuy.exe 2080 ktruuy.exe 4920 alhost.exe 4920 alhost.exe 4920 alhost.exe 4920 alhost.exe 2080 ktruuy.exe 2080 ktruuy.exe 2080 ktruuy.exe 2080 ktruuy.exe 2080 ktruuy.exe 2080 ktruuy.exe 2080 ktruuy.exe 2080 ktruuy.exe 2080 ktruuy.exe 2080 ktruuy.exe 2080 ktruuy.exe 2080 ktruuy.exe 2080 ktruuy.exe 2080 ktruuy.exe 4920 alhost.exe 4920 alhost.exe 4920 alhost.exe 4920 alhost.exe 2080 ktruuy.exe 2080 ktruuy.exe 2080 ktruuy.exe 2080 ktruuy.exe 2080 ktruuy.exe 2080 ktruuy.exe 2080 ktruuy.exe 2080 ktruuy.exe 2080 ktruuy.exe 2080 ktruuy.exe 2080 ktruuy.exe 2080 ktruuy.exe 2080 ktruuy.exe 2080 ktruuy.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4116 tasklist.exe Token: SeDebugPrivilege 3780 dlhost.exe Token: SeDebugPrivilege 4052 tasklist.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2968 JaffaCakes118_42295816978b4c1162f604b8cc98e211.exe 4980 miGRu6Gcu2.exe 2080 ktruuy.exe 4852 elhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1084 wrote to memory of 2968 1084 JaffaCakes118_42295816978b4c1162f604b8cc98e211.exe 83 PID 1084 wrote to memory of 2968 1084 JaffaCakes118_42295816978b4c1162f604b8cc98e211.exe 83 PID 1084 wrote to memory of 2968 1084 JaffaCakes118_42295816978b4c1162f604b8cc98e211.exe 83 PID 1084 wrote to memory of 2968 1084 JaffaCakes118_42295816978b4c1162f604b8cc98e211.exe 83 PID 1084 wrote to memory of 2968 1084 JaffaCakes118_42295816978b4c1162f604b8cc98e211.exe 83 PID 1084 wrote to memory of 2968 1084 JaffaCakes118_42295816978b4c1162f604b8cc98e211.exe 83 PID 1084 wrote to memory of 2968 1084 JaffaCakes118_42295816978b4c1162f604b8cc98e211.exe 83 PID 1084 wrote to memory of 2968 1084 JaffaCakes118_42295816978b4c1162f604b8cc98e211.exe 83 PID 2968 wrote to memory of 4980 2968 JaffaCakes118_42295816978b4c1162f604b8cc98e211.exe 84 PID 2968 wrote to memory of 4980 2968 JaffaCakes118_42295816978b4c1162f604b8cc98e211.exe 84 PID 2968 wrote to memory of 4980 2968 JaffaCakes118_42295816978b4c1162f604b8cc98e211.exe 84 PID 2968 wrote to memory of 428 2968 JaffaCakes118_42295816978b4c1162f604b8cc98e211.exe 85 PID 2968 wrote to memory of 428 2968 JaffaCakes118_42295816978b4c1162f604b8cc98e211.exe 85 PID 2968 wrote to memory of 428 2968 JaffaCakes118_42295816978b4c1162f604b8cc98e211.exe 85 PID 4980 wrote to memory of 2080 4980 miGRu6Gcu2.exe 86 PID 4980 wrote to memory of 2080 4980 miGRu6Gcu2.exe 86 PID 4980 wrote to memory of 2080 4980 miGRu6Gcu2.exe 86 PID 4980 wrote to memory of 3876 4980 miGRu6Gcu2.exe 87 PID 4980 wrote to memory of 3876 4980 miGRu6Gcu2.exe 87 PID 4980 wrote to memory of 3876 4980 miGRu6Gcu2.exe 87 PID 3876 wrote to memory of 4116 3876 cmd.exe 89 PID 3876 wrote to memory of 4116 3876 cmd.exe 89 PID 3876 wrote to memory of 4116 3876 cmd.exe 89 PID 428 wrote to memory of 4920 428 alhost.exe 92 PID 428 wrote to memory of 4920 428 alhost.exe 92 PID 428 wrote to memory of 4920 428 alhost.exe 92 PID 428 wrote to memory of 4920 428 alhost.exe 92 PID 428 wrote to memory of 4920 428 alhost.exe 92 PID 428 wrote to memory of 4920 428 alhost.exe 92 PID 428 wrote to memory of 4920 428 alhost.exe 92 PID 428 wrote to memory of 4920 428 alhost.exe 92 PID 428 wrote to memory of 4920 428 alhost.exe 92 PID 2968 wrote to memory of 2752 2968 JaffaCakes118_42295816978b4c1162f604b8cc98e211.exe 95 PID 2968 wrote to memory of 2752 2968 JaffaCakes118_42295816978b4c1162f604b8cc98e211.exe 95 PID 2968 wrote to memory of 2752 2968 JaffaCakes118_42295816978b4c1162f604b8cc98e211.exe 95 PID 2752 wrote to memory of 3860 2752 blhost.exe 98 PID 2752 wrote to memory of 3860 2752 blhost.exe 98 PID 2752 wrote to memory of 3860 2752 blhost.exe 98 PID 2752 wrote to memory of 3860 2752 blhost.exe 98 PID 2752 wrote to memory of 3860 2752 blhost.exe 98 PID 2752 wrote to memory of 3860 2752 blhost.exe 98 PID 2752 wrote to memory of 3860 2752 blhost.exe 98 PID 2752 wrote to memory of 3860 2752 blhost.exe 98 PID 2968 wrote to memory of 1500 2968 JaffaCakes118_42295816978b4c1162f604b8cc98e211.exe 99 PID 2968 wrote to memory of 1500 2968 JaffaCakes118_42295816978b4c1162f604b8cc98e211.exe 99 PID 2968 wrote to memory of 1500 2968 JaffaCakes118_42295816978b4c1162f604b8cc98e211.exe 99 PID 2968 wrote to memory of 3780 2968 JaffaCakes118_42295816978b4c1162f604b8cc98e211.exe 104 PID 2968 wrote to memory of 3780 2968 JaffaCakes118_42295816978b4c1162f604b8cc98e211.exe 104 PID 2968 wrote to memory of 3780 2968 JaffaCakes118_42295816978b4c1162f604b8cc98e211.exe 104 PID 3780 wrote to memory of 1456 3780 dlhost.exe 111 PID 3780 wrote to memory of 1456 3780 dlhost.exe 111 PID 3780 wrote to memory of 1456 3780 dlhost.exe 111 PID 3780 wrote to memory of 1456 3780 dlhost.exe 111 PID 2968 wrote to memory of 4852 2968 JaffaCakes118_42295816978b4c1162f604b8cc98e211.exe 113 PID 2968 wrote to memory of 4852 2968 JaffaCakes118_42295816978b4c1162f604b8cc98e211.exe 113 PID 2968 wrote to memory of 4852 2968 JaffaCakes118_42295816978b4c1162f604b8cc98e211.exe 113 PID 2968 wrote to memory of 4400 2968 JaffaCakes118_42295816978b4c1162f604b8cc98e211.exe 117 PID 2968 wrote to memory of 4400 2968 JaffaCakes118_42295816978b4c1162f604b8cc98e211.exe 117 PID 2968 wrote to memory of 4400 2968 JaffaCakes118_42295816978b4c1162f604b8cc98e211.exe 117 PID 4400 wrote to memory of 4052 4400 cmd.exe 119 PID 4400 wrote to memory of 4052 4400 cmd.exe 119 PID 4400 wrote to memory of 4052 4400 cmd.exe 119 PID 2080 wrote to memory of 4052 2080 ktruuy.exe 119 PID 2080 wrote to memory of 4052 2080 ktruuy.exe 119
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_42295816978b4c1162f604b8cc98e211.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_42295816978b4c1162f604b8cc98e211.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_42295816978b4c1162f604b8cc98e211.exeJaffaCakes118_42295816978b4c1162f604b8cc98e211.exe2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Users\Admin\miGRu6Gcu2.exeC:\Users\Admin\miGRu6Gcu2.exe3⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Users\Admin\ktruuy.exe"C:\Users\Admin\ktruuy.exe"4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2080
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del miGRu6Gcu2.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4116
-
-
-
-
C:\Users\Admin\alhost.exeC:\Users\Admin\alhost.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:428 -
C:\Users\Admin\alhost.exealhost.exe4⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
PID:4920
-
-
-
C:\Users\Admin\blhost.exeC:\Users\Admin\blhost.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Users\Admin\blhost.exeblhost.exe4⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
PID:3860
-
-
-
C:\Users\Admin\clhost.exeC:\Users\Admin\clhost.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1500 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1500 -s 3964⤵
- Program crash
PID:1564
-
-
-
C:\Users\Admin\dlhost.exeC:\Users\Admin\dlhost.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3780 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"4⤵PID:1456
-
-
-
C:\Users\Admin\elhost.exeC:\Users\Admin\elhost.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4852
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del JaffaCakes118_42295816978b4c1162f604b8cc98e211.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4052
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1500 -ip 15001⤵PID:3096
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD5ccee7bbbd52e9e3d551451e54f85489a
SHA17f72be25a00d4e667f17fa106bf024fac3eb9886
SHA25624d5bac9c9a2d7e77dc8f79ad7fe3333283028dbec964effd9020dd6473e3290
SHA5123e2fd0abfc61741698570a600aa4f845503410bc9bef9906dced2df27e5f38c7bb06eefb653a0e199eec88044725e2c0f0238253c73979fcceecb992e3b73af4
-
Filesize
126KB
MD5f9482a349a998f5c9cb842705e67fea7
SHA1196794ddf71cab834c7029dbf1c27009b06754b2
SHA2569e5b1531710c57fad4e07c5888db6823e6634384a5ebe9d7f40b54cb9a163b44
SHA51271ced1fbd460b833d1f422a80d5a27a893e18f7a6286cb61b1283a2c843f8fc77a68b30cba33fe988063f5db3893cb7fd8f677e023960b1999386c18389c9536
-
Filesize
283KB
MD578b038f42b4e2490672f9a35a42674b5
SHA1ca8972f311b9dab6aa917b65cfb9726447fb44f8
SHA25699125e2bff877025e5687aa5928061cc7da65a944afcd81a66f556bf5d48730d
SHA51213826dd7b9b1de6b08189c814487fcf6dd369059be8f70d5ba7ef6e9339a56be6f04a424e11238cc49a932e7d2988630c102109a861cb4adb5382f9e883ae515
-
Filesize
244KB
MD5682907092bb50419e5b28cf99466e124
SHA1622962a69e71cf4192f860be74249be205e9ce13
SHA2569e08b47ad6498e8f7173eb8a9e2ce2c4aaa36d0c69cfb3365ba76938d037f98e
SHA512cced9e3ec516c2e07182ecf012749b9b123bd70d6204d5f82afa4c0a8a8f110da8690c816e7c8d97f9a283e8e4961fbe0afa60badd4b57d21a8decfa1b527799
-
Filesize
32KB
MD500a9df0a178efb6f4f44aa392186c492
SHA1d3c3039ca41481525815bca5301d9d00f5725667
SHA256c505d1c76b1e886de65c6b7b171a9d56870a320532c7561f7f8b162920602b18
SHA512ae0cbce9119ec561a8084610a42f30f60ed29d6bde908dedb7394dbcd8cd24456c85a543b72aa797705130ccce851a348a5171baf1c8a2499ad599b345283a3f
-
Filesize
192KB
MD5996b307d96d72c863ff3660966cdebc7
SHA10628d6860a5025eef2994ea8cbb81f5da4ab02c0
SHA256450b878ec6c8e5ea913e0a171011083158dabd9b6c001b449bd9829bd58b2b2c
SHA512fc93532b7f53aa17eaeff5b8dd7037dd3fb0285b8f95c20a89019e2998e1f22e98cd487d0ff2f2977b8585a99c49686e9d6df0621f3402d3e9232a5ce7347383
-
Filesize
192KB
MD5869d4fbc9194f74e9815f487d245fcff
SHA166ac3d8d447558f6389e3a8e203c1b60634af873
SHA256b7bc5a05d5190e33bcf35bc06107881990caf3fd99643c50eb855ca8505d7113
SHA51257700b710c9c42ed07f1959c7a17d592a5bfafadb340eaec33d769a788cb5b84de7d84b4ff5b865df9fedd966d7dc8b5a2534811e1de52f488a31a5548d4d6ce