Analysis
-
max time kernel
147s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
11/02/2025, 13:29
Behavioral task
behavioral1
Sample
JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe
Resource
win10v2004-20250207-en
General
-
Target
JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe
-
Size
648KB
-
MD5
e6cd7bdd24c526d3733386d487c719ce
-
SHA1
0c8db99f96c22049315fed06c04157bd27da0fda
-
SHA256
e3705d92d0e12299d80c9fab89aee41514cea272865f72bacf1512b9f3b3f8b3
-
SHA512
8c4b8e182b6caead03e1e70313650b605dbdb3bce52ddacd9d492676d618e5f1a72793b132771443393456b923f427ad5c23e33b3559757dd6bd25654caab68e
-
SSDEEP
12288:cMJfF0jXXTSPr+NYh2YENE/Qh6FkaMPWw5FisXolO:hF0jXOVtQoF+PnFis5
Malware Config
Signatures
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 8 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\Server.exe restart" Server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\Server.exe restart" Server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\Server.exe restart" JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\Server.exe" svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} Server.exe -
Executes dropped EXE 17 IoCs
pid Process 12224 Server.exe 13004 Server.exe 13064 Server.exe 13128 Server.exe 13188 Server.exe 8868 Server.exe 10668 Server.exe 9424 Server.exe 9636 Server.exe 10184 Server.exe 1624 Server.exe 6212 Server.exe 3656 Server.exe 10752 Server.exe 10152 Server.exe 5136 Server.exe 10232 Server.exe -
Identifies Wine through registry keys 2 TTPs 11 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine Server.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine Server.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine Server.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine Server.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine Server.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine Server.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine Server.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine Server.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine Server.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine Server.exe -
Loads dropped DLL 9 IoCs
pid Process 12016 JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe 12016 JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe 12088 svchost.exe 12088 svchost.exe 12088 svchost.exe 12088 svchost.exe 12088 svchost.exe 12088 svchost.exe 12088 svchost.exe -
resource yara_rule behavioral1/memory/1996-0-0x0000000000400000-0x0000000000541000-memory.dmp themida behavioral1/memory/1996-2-0x0000000000400000-0x0000000000541000-memory.dmp themida behavioral1/memory/1996-66506-0x0000000000400000-0x0000000000541000-memory.dmp themida behavioral1/memory/1996-66508-0x0000000000400000-0x0000000000541000-memory.dmp themida behavioral1/memory/1996-66519-0x0000000000400000-0x0000000000541000-memory.dmp themida behavioral1/files/0x0008000000019326-66545.dat themida behavioral1/memory/12016-66548-0x0000000002A10000-0x0000000002B51000-memory.dmp themida behavioral1/memory/12224-66550-0x0000000000400000-0x0000000000541000-memory.dmp themida behavioral1/memory/12224-132969-0x0000000000400000-0x0000000000541000-memory.dmp themida behavioral1/memory/13188-132995-0x0000000000400000-0x0000000000541000-memory.dmp themida behavioral1/memory/8868-134139-0x0000000000400000-0x0000000000541000-memory.dmp themida behavioral1/memory/8868-199422-0x0000000000400000-0x0000000000541000-memory.dmp themida behavioral1/memory/13188-181787-0x0000000000400000-0x0000000000541000-memory.dmp themida behavioral1/memory/13188-199427-0x0000000000400000-0x0000000000541000-memory.dmp themida behavioral1/memory/9636-199431-0x0000000000400000-0x0000000000541000-memory.dmp themida behavioral1/memory/9424-204463-0x0000000000400000-0x0000000000541000-memory.dmp themida behavioral1/memory/9636-205395-0x0000000000400000-0x0000000000541000-memory.dmp themida behavioral1/memory/6212-211915-0x0000000000400000-0x0000000000541000-memory.dmp themida behavioral1/memory/9636-425437-0x0000000000400000-0x0000000000541000-memory.dmp themida behavioral1/files/0x0008000000019326-427409.dat themida -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\Server.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\Server.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\Server.exe" Server.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\Server.exe" Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\Server.exe" Server.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\Server.exe" Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\Server.exe" JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\Server.exe" JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
pid Process 1996 JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe 12224 Server.exe 13188 Server.exe 8868 Server.exe 9636 Server.exe 9424 Server.exe 6212 Server.exe 3656 Server.exe 10752 Server.exe 10152 Server.exe 5136 Server.exe -
Suspicious use of SetThreadContext 10 IoCs
description pid Process procid_target PID 1996 set thread context of 11920 1996 JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe 29 PID 11920 set thread context of 11984 11920 JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe 30 PID 11984 set thread context of 12016 11984 JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe 31 PID 12224 set thread context of 13004 12224 Server.exe 42 PID 13004 set thread context of 13064 13004 Server.exe 43 PID 13064 set thread context of 13128 13064 Server.exe 44 PID 13188 set thread context of 10668 13188 Server.exe 55 PID 10668 set thread context of 10184 10668 Server.exe 58 PID 10184 set thread context of 1624 10184 Server.exe 59 PID 9636 set thread context of 10232 9636 Server.exe 73 -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\InstallDir\Server.exe Server.exe File opened for modification C:\Windows\InstallDir\Server.exe Server.exe File opened for modification C:\Windows\InstallDir\Server.exe JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe File created C:\Windows\InstallDir\Server.exe JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe -
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 1996 JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe 12224 Server.exe 13188 Server.exe 8868 Server.exe 8868 Server.exe 9636 Server.exe 9424 Server.exe 6212 Server.exe 6212 Server.exe 6212 Server.exe 6212 Server.exe 6212 Server.exe 6212 Server.exe 6212 Server.exe 6212 Server.exe 6212 Server.exe 6212 Server.exe 6212 Server.exe 6212 Server.exe 3656 Server.exe 10752 Server.exe 10152 Server.exe 10152 Server.exe 10152 Server.exe 5136 Server.exe 5136 Server.exe 5136 Server.exe 5136 Server.exe 5136 Server.exe 5136 Server.exe 5136 Server.exe 5136 Server.exe 5136 Server.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 11920 JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe 11984 JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe 13004 Server.exe 13064 Server.exe 10668 Server.exe 10184 Server.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1996 wrote to memory of 11920 1996 JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe 29 PID 1996 wrote to memory of 11920 1996 JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe 29 PID 1996 wrote to memory of 11920 1996 JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe 29 PID 1996 wrote to memory of 11920 1996 JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe 29 PID 1996 wrote to memory of 11920 1996 JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe 29 PID 1996 wrote to memory of 11920 1996 JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe 29 PID 1996 wrote to memory of 11920 1996 JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe 29 PID 1996 wrote to memory of 11920 1996 JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe 29 PID 11920 wrote to memory of 11984 11920 JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe 30 PID 11920 wrote to memory of 11984 11920 JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe 30 PID 11920 wrote to memory of 11984 11920 JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe 30 PID 11920 wrote to memory of 11984 11920 JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe 30 PID 11920 wrote to memory of 11984 11920 JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe 30 PID 11920 wrote to memory of 11984 11920 JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe 30 PID 11920 wrote to memory of 11984 11920 JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe 30 PID 11920 wrote to memory of 11984 11920 JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe 30 PID 11920 wrote to memory of 11984 11920 JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe 30 PID 11984 wrote to memory of 12016 11984 JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe 31 PID 11984 wrote to memory of 12016 11984 JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe 31 PID 11984 wrote to memory of 12016 11984 JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe 31 PID 11984 wrote to memory of 12016 11984 JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe 31 PID 11984 wrote to memory of 12016 11984 JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe 31 PID 11984 wrote to memory of 12016 11984 JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe 31 PID 11984 wrote to memory of 12016 11984 JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe 31 PID 11984 wrote to memory of 12016 11984 JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe 31 PID 12016 wrote to memory of 12088 12016 JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe 32 PID 12016 wrote to memory of 12088 12016 JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe 32 PID 12016 wrote to memory of 12088 12016 JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe 32 PID 12016 wrote to memory of 12088 12016 JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe 32 PID 12016 wrote to memory of 12088 12016 JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe 32 PID 12016 wrote to memory of 12112 12016 JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe 33 PID 12016 wrote to memory of 12112 12016 JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe 33 PID 12016 wrote to memory of 12112 12016 JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe 33 PID 12016 wrote to memory of 12112 12016 JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe 33 PID 12016 wrote to memory of 12112 12016 JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe 33 PID 12016 wrote to memory of 12132 12016 JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe 34 PID 12016 wrote to memory of 12132 12016 JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe 34 PID 12016 wrote to memory of 12132 12016 JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe 34 PID 12016 wrote to memory of 12132 12016 JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe 34 PID 12016 wrote to memory of 12132 12016 JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe 34 PID 12016 wrote to memory of 12140 12016 JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe 35 PID 12016 wrote to memory of 12140 12016 JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe 35 PID 12016 wrote to memory of 12140 12016 JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe 35 PID 12016 wrote to memory of 12140 12016 JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe 35 PID 12016 wrote to memory of 12140 12016 JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe 35 PID 12016 wrote to memory of 12172 12016 JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe 36 PID 12016 wrote to memory of 12172 12016 JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe 36 PID 12016 wrote to memory of 12172 12016 JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe 36 PID 12016 wrote to memory of 12172 12016 JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe 36 PID 12016 wrote to memory of 12172 12016 JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe 36 PID 12016 wrote to memory of 12180 12016 JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe 37 PID 12016 wrote to memory of 12180 12016 JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe 37 PID 12016 wrote to memory of 12180 12016 JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe 37 PID 12016 wrote to memory of 12180 12016 JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe 37 PID 12016 wrote to memory of 12180 12016 JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe 37 PID 12016 wrote to memory of 12192 12016 JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe 38 PID 12016 wrote to memory of 12192 12016 JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe 38 PID 12016 wrote to memory of 12192 12016 JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe 38 PID 12016 wrote to memory of 12192 12016 JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe 38 PID 12016 wrote to memory of 12192 12016 JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe 38 PID 12016 wrote to memory of 12200 12016 JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe 39 PID 12016 wrote to memory of 12200 12016 JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe 39 PID 12016 wrote to memory of 12200 12016 JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe 39 PID 12016 wrote to memory of 12200 12016 JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe"1⤵
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:11920 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:11984 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e6cd7bdd24c526d3733386d487c719ce.exe
- Boot or Logon Autostart Execution: Active Setup
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:12016 -
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:12088 -
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"6⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:13188 -
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:10668 -
C:\Windows\InstallDir\Server.exe
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:10184 -
C:\Windows\InstallDir\Server.exe
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1624 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵PID:10704
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵PID:7020
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵PID:10560
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵PID:2352
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵PID:5948
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵PID:12244
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵PID:9812
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵PID:13988
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"10⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:10152
-
-
-
-
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"6⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:8868
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"6⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:9424
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"6⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6212
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"6⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3656
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"6⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:10752
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"6⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5136
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"6⤵PID:5424
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"6⤵PID:12628
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:12112
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:12132
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:12140
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:12172
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:12180
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:12192
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:12200
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:12212
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"5⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:12224 -
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:13004 -
C:\Windows\InstallDir\Server.exe
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:13064 -
C:\Windows\InstallDir\Server.exe
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:13128 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"9⤵PID:13212
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"9⤵PID:12272
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"9⤵PID:1540
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"9⤵PID:2404
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"9⤵PID:8792
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"9⤵PID:11740
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"9⤵PID:9300
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"9⤵PID:10836
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"9⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:9636 -
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:10232 -
C:\Windows\InstallDir\Server.exePID:1076
-
C:\Windows\InstallDir\Server.exePID:16880
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"13⤵PID:15596
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD50265462e00bea626883413f2ec2c5efc
SHA1fdc8991c43b9ac9b2457604aa7de2e4118349dbf
SHA256e1fa4eeca889b6816b8e9052e174454f4ed0046899738239a801c340aac8b9bf
SHA512cfbfc2b5221107dca736c27164d959746f08c8abbbf68c365af1681f92d2c3957cc7c634a23d0c36338d7f0c2fe9679fff2f6ac819df0ceb33a3827a3ab481d7
-
Filesize
64KB
MD51049f72edc112044d4bb41c9bd27aae2
SHA1024afa5dea751028b88ef0c54b92e19ec1215bcc
SHA256b76a74d5270498644310cf3eaf56d15522082553b2878dfff676f82349bffe52
SHA5124e5038e2af239f0f36fe8ee2bc2eb56662088f31d6ea759a0ac20a2f966efbebb1803fd2fa16270ca6c83b7d6d650846455f26a2ae61654883077fd1b54fc915
-
Filesize
648KB
MD5e6cd7bdd24c526d3733386d487c719ce
SHA10c8db99f96c22049315fed06c04157bd27da0fda
SHA256e3705d92d0e12299d80c9fab89aee41514cea272865f72bacf1512b9f3b3f8b3
SHA5128c4b8e182b6caead03e1e70313650b605dbdb3bce52ddacd9d492676d618e5f1a72793b132771443393456b923f427ad5c23e33b3559757dd6bd25654caab68e