Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
20-02-2025 05:27
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exe
Resource
win7-20250207-en
General
-
Target
JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exe
-
Size
668KB
-
MD5
09e80c7246e970032b1c8fb0fcd9ded4
-
SHA1
534012a13b5e523128a2acee591aff057cf2d798
-
SHA256
7981d1d59a3d2328fa24c378de5ded0f1605764e58910fe9c82a91d544c381aa
-
SHA512
a7ba8fec81432e77c4e381dba1482e9c45519a8d39f3fc445896a9b75d2cb073b57bcda2e6aaa804138a20564791d48920b65a586b59356ab4934900a623bb63
-
SSDEEP
12288:AOqBS5JJ/+EkGz1lr3nxGteN4r3t8UOGz624SitfLmygYkvOW:hCSYE7z193Rit8UJ62BmhgVvOW
Malware Config
Extracted
xtremerat
sweetma198.no-ip.info
Signatures
-
Detect XtremeRAT payload 16 IoCs
resource yara_rule behavioral2/memory/5532-1-0x0000000000C80000-0x0000000000CE9000-memory.dmp family_xtremerat behavioral2/memory/5532-7-0x0000000000C80000-0x0000000000CE9000-memory.dmp family_xtremerat behavioral2/memory/5532-9-0x0000000000C80000-0x0000000000CE9000-memory.dmp family_xtremerat behavioral2/memory/5532-6-0x0000000000C80000-0x0000000000CE9000-memory.dmp family_xtremerat behavioral2/memory/5532-5-0x0000000000C80000-0x0000000000CE9000-memory.dmp family_xtremerat behavioral2/memory/5532-10-0x0000000000C80000-0x0000000000CE9000-memory.dmp family_xtremerat behavioral2/memory/5532-12-0x0000000000C80000-0x0000000000CE9000-memory.dmp family_xtremerat behavioral2/memory/5532-3-0x0000000000C80000-0x0000000000CE9000-memory.dmp family_xtremerat behavioral2/memory/5532-0-0x0000000000C80000-0x0000000000CE9000-memory.dmp family_xtremerat behavioral2/memory/2312-19-0x0000000000C80000-0x0000000000CE9000-memory.dmp family_xtremerat behavioral2/memory/3088-21-0x0000000000C80000-0x0000000000CE9000-memory.dmp family_xtremerat behavioral2/memory/5532-22-0x0000000000C80000-0x0000000000CE9000-memory.dmp family_xtremerat behavioral2/memory/3088-24-0x0000000000C80000-0x0000000000CE9000-memory.dmp family_xtremerat behavioral2/memory/3088-30-0x0000000000C80000-0x0000000000CE9000-memory.dmp family_xtremerat behavioral2/memory/3088-35-0x0000000000C80000-0x0000000000CE9000-memory.dmp family_xtremerat behavioral2/memory/6124-49-0x0000000000C80000-0x0000000000CE9000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 12 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{4DDUGML7-QPQ1-BGG4-6XGH-278WSMJ2O3QT} JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4DDUGML7-QPQ1-BGG4-6XGH-278WSMJ2O3QT}\StubPath = "C:\\Windows\\Microsoft\\svchos.exe restart" svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{4DDUGML7-QPQ1-BGG4-6XGH-278WSMJ2O3QT} svchos.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4DDUGML7-QPQ1-BGG4-6XGH-278WSMJ2O3QT}\StubPath = "C:\\Windows\\Microsoft\\svchos.exe restart" svchos.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4DDUGML7-QPQ1-BGG4-6XGH-278WSMJ2O3QT}\StubPath = "C:\\Windows\\Microsoft\\svchos.exe restart" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4DDUGML7-QPQ1-BGG4-6XGH-278WSMJ2O3QT}\StubPath = "C:\\Windows\\Microsoft\\svchos.exe restart" svchos.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4DDUGML7-QPQ1-BGG4-6XGH-278WSMJ2O3QT}\StubPath = "C:\\Windows\\Microsoft\\svchos.exe restart" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4DDUGML7-QPQ1-BGG4-6XGH-278WSMJ2O3QT}\StubPath = "C:\\Windows\\Microsoft\\svchos.exe restart" JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{4DDUGML7-QPQ1-BGG4-6XGH-278WSMJ2O3QT} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{4DDUGML7-QPQ1-BGG4-6XGH-278WSMJ2O3QT} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{4DDUGML7-QPQ1-BGG4-6XGH-278WSMJ2O3QT} svchos.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{4DDUGML7-QPQ1-BGG4-6XGH-278WSMJ2O3QT} svchost.exe -
Executes dropped EXE 10 IoCs
pid Process 6116 svchos.exe 2264 svchos.exe 6124 svchos.exe 1452 svchos.exe 5232 svchos.exe 5392 svchos.exe 5760 svchos.exe 3592 svchos.exe 1488 svchos.exe 5680 svchos.exe -
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Windows\\Microsoft\\svchos.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\skypa = "C:\\Windows\\Microsoft\\svchos.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Windows\\Microsoft\\svchos.exe" svchos.exe Set value (str) \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\skypa = "C:\\Windows\\Microsoft\\svchos.exe" JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exe Set value (str) \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\skypa = "C:\\Windows\\Microsoft\\svchos.exe" svchos.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Windows\\Microsoft\\svchos.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\skypa = "C:\\Windows\\Microsoft\\svchos.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Windows\\Microsoft\\svchos.exe" JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Windows\\Microsoft\\svchos.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\skypa = "C:\\Windows\\Microsoft\\svchos.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Windows\\Microsoft\\svchos.exe" svchos.exe Set value (str) \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\skypa = "C:\\Windows\\Microsoft\\svchos.exe" svchos.exe -
Suspicious use of SetThreadContext 8 IoCs
description pid Process procid_target PID 888 set thread context of 5532 888 JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exe 89 PID 6116 set thread context of 6124 6116 svchos.exe 96 PID 6124 set thread context of 2096 6124 svchos.exe 97 PID 2264 set thread context of 1452 2264 svchos.exe 100 PID 5232 set thread context of 5760 5232 svchos.exe 105 PID 5760 set thread context of 1504 5760 svchos.exe 107 PID 5392 set thread context of 1488 5392 svchos.exe 108 PID 3592 set thread context of 5680 3592 svchos.exe 109 -
resource yara_rule behavioral2/memory/2096-54-0x0000000001610000-0x0000000001712000-memory.dmp upx behavioral2/memory/2096-56-0x0000000001610000-0x0000000001712000-memory.dmp upx behavioral2/memory/2096-55-0x0000000001610000-0x0000000001712000-memory.dmp upx behavioral2/memory/2096-58-0x0000000001610000-0x0000000001712000-memory.dmp upx behavioral2/memory/2096-59-0x0000000001610000-0x0000000001712000-memory.dmp upx behavioral2/memory/2096-60-0x0000000001610000-0x0000000001712000-memory.dmp upx behavioral2/memory/2096-61-0x0000000001610000-0x0000000001712000-memory.dmp upx behavioral2/memory/2096-62-0x0000000001610000-0x0000000001712000-memory.dmp upx behavioral2/memory/2096-64-0x0000000001610000-0x0000000001712000-memory.dmp upx behavioral2/memory/2096-65-0x0000000001610000-0x0000000001712000-memory.dmp upx behavioral2/memory/2096-68-0x0000000001610000-0x0000000001712000-memory.dmp upx behavioral2/memory/2096-83-0x0000000001610000-0x0000000001712000-memory.dmp upx -
Drops file in Windows directory 7 IoCs
description ioc Process File opened for modification C:\Windows\Microsoft\ JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exe File opened for modification C:\Windows\Microsoft\svchos.exe svchos.exe File opened for modification C:\Windows\Microsoft\ svchos.exe File opened for modification C:\Windows\Microsoft\svchos.exe svchos.exe File opened for modification C:\Windows\Microsoft\ svchos.exe File opened for modification C:\Windows\Microsoft\svchos.exe JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exe File created C:\Windows\Microsoft\svchos.exe JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchos.exe -
Checks SCSI registry key(s) 3 TTPs 16 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 svchost.exe -
Modifies registry class 31 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" svchost.exe Set value (data) \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 svchost.exe Set value (data) \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ svchost.exe Key created \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell svchost.exe Key created \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU svchost.exe Set value (data) \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 svchost.exe Set value (data) \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff svchost.exe Key created \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags svchost.exe Key created \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 svchost.exe Key created \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 svchost.exe Key created \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 svchost.exe Key created \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ svchost.exe Set value (data) \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff svchost.exe Set value (data) \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 14002e803accbfb42cdb4c42b0297fe99a87c6410000 svchost.exe Set value (data) \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff svchost.exe Key created \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell svchost.exe Key created \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell svchost.exe Key created \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ svchost.exe Key created \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000_Classes\Local Settings svchost.exe Set value (data) \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots svchost.exe Set value (data) \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff svchost.exe Set value (data) \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 svchost.exe Key created \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 svchost.exe Key created \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 svchost.exe Key created \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" svchost.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2096 svchost.exe 2096 svchost.exe 1504 svchost.exe 1504 svchost.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 3088 svchost.exe 2096 svchost.exe 2096 svchost.exe 1504 svchost.exe 1504 svchost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 888 wrote to memory of 5532 888 JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exe 89 PID 888 wrote to memory of 5532 888 JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exe 89 PID 888 wrote to memory of 5532 888 JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exe 89 PID 888 wrote to memory of 5532 888 JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exe 89 PID 888 wrote to memory of 5532 888 JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exe 89 PID 888 wrote to memory of 5532 888 JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exe 89 PID 888 wrote to memory of 5532 888 JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exe 89 PID 888 wrote to memory of 5532 888 JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exe 89 PID 888 wrote to memory of 5532 888 JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exe 89 PID 888 wrote to memory of 5532 888 JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exe 89 PID 888 wrote to memory of 5532 888 JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exe 89 PID 888 wrote to memory of 5532 888 JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exe 89 PID 888 wrote to memory of 5532 888 JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exe 89 PID 5532 wrote to memory of 2312 5532 JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exe 90 PID 5532 wrote to memory of 2312 5532 JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exe 90 PID 5532 wrote to memory of 2312 5532 JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exe 90 PID 5532 wrote to memory of 2312 5532 JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exe 90 PID 5532 wrote to memory of 2384 5532 JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exe 91 PID 5532 wrote to memory of 2384 5532 JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exe 91 PID 5532 wrote to memory of 2384 5532 JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exe 91 PID 5532 wrote to memory of 1960 5532 JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exe 92 PID 5532 wrote to memory of 1960 5532 JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exe 92 PID 5532 wrote to memory of 1960 5532 JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exe 92 PID 5532 wrote to memory of 3088 5532 JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exe 93 PID 5532 wrote to memory of 3088 5532 JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exe 93 PID 5532 wrote to memory of 3088 5532 JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exe 93 PID 5532 wrote to memory of 3088 5532 JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exe 93 PID 3088 wrote to memory of 6116 3088 svchost.exe 94 PID 3088 wrote to memory of 6116 3088 svchost.exe 94 PID 3088 wrote to memory of 6116 3088 svchost.exe 94 PID 2312 wrote to memory of 2264 2312 svchost.exe 95 PID 2312 wrote to memory of 2264 2312 svchost.exe 95 PID 2312 wrote to memory of 2264 2312 svchost.exe 95 PID 6116 wrote to memory of 6124 6116 svchos.exe 96 PID 6116 wrote to memory of 6124 6116 svchos.exe 96 PID 6116 wrote to memory of 6124 6116 svchos.exe 96 PID 6116 wrote to memory of 6124 6116 svchos.exe 96 PID 6116 wrote to memory of 6124 6116 svchos.exe 96 PID 6116 wrote to memory of 6124 6116 svchos.exe 96 PID 6116 wrote to memory of 6124 6116 svchos.exe 96 PID 6116 wrote to memory of 6124 6116 svchos.exe 96 PID 6116 wrote to memory of 6124 6116 svchos.exe 96 PID 6116 wrote to memory of 6124 6116 svchos.exe 96 PID 6116 wrote to memory of 6124 6116 svchos.exe 96 PID 6116 wrote to memory of 6124 6116 svchos.exe 96 PID 6116 wrote to memory of 6124 6116 svchos.exe 96 PID 6124 wrote to memory of 2096 6124 svchos.exe 97 PID 6124 wrote to memory of 2096 6124 svchos.exe 97 PID 6124 wrote to memory of 2096 6124 svchos.exe 97 PID 6124 wrote to memory of 2096 6124 svchos.exe 97 PID 6124 wrote to memory of 2096 6124 svchos.exe 97 PID 6124 wrote to memory of 2096 6124 svchos.exe 97 PID 6124 wrote to memory of 2096 6124 svchos.exe 97 PID 6124 wrote to memory of 2096 6124 svchos.exe 97 PID 2264 wrote to memory of 1452 2264 svchos.exe 100 PID 2264 wrote to memory of 1452 2264 svchos.exe 100 PID 2264 wrote to memory of 1452 2264 svchos.exe 100 PID 2264 wrote to memory of 1452 2264 svchos.exe 100 PID 2264 wrote to memory of 1452 2264 svchos.exe 100 PID 2264 wrote to memory of 1452 2264 svchos.exe 100 PID 2264 wrote to memory of 1452 2264 svchos.exe 100 PID 2264 wrote to memory of 1452 2264 svchos.exe 100 PID 2264 wrote to memory of 1452 2264 svchos.exe 100 PID 2264 wrote to memory of 1452 2264 svchos.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5532 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\Microsoft\svchos.exe"C:\Windows\Microsoft\svchos.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\Microsoft\svchos.exeC:\Windows\Microsoft\svchos.exe5⤵
- Executes dropped EXE
PID:1452
-
-
-
C:\Windows\Microsoft\svchos.exe"C:\Windows\Microsoft\svchos.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5232 -
C:\Windows\Microsoft\svchos.exeC:\Windows\Microsoft\svchos.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5760 -
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1504
-
-
-
-
C:\Windows\Microsoft\svchos.exe"C:\Windows\Microsoft\svchos.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5392 -
C:\Windows\Microsoft\svchos.exeC:\Windows\Microsoft\svchos.exe5⤵
- Executes dropped EXE
PID:1488
-
-
-
C:\Windows\Microsoft\svchos.exe"C:\Windows\Microsoft\svchos.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3592 -
C:\Windows\Microsoft\svchos.exeC:\Windows\Microsoft\svchos.exe5⤵
- Executes dropped EXE
PID:5680
-
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2384
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:1960
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\Windows\Microsoft\svchos.exe"C:\Windows\Microsoft\svchos.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:6116 -
C:\Windows\Microsoft\svchos.exeC:\Windows\Microsoft\svchos.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:6124 -
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2096
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD58a7b557c31a1ac886e87139aa67a1f4e
SHA17d2298ab9e1500a574771f8c9297bf8dea195ac0
SHA256bb1e8279f58939851194d9585bad475468190a422b02d592b96728f3e5bc488d
SHA51243cbc55882ebe45890fae0d6b8ed15f57daa9662d2697a36f926460ad8e529cbb9cf149e8a4bce6c1529e16fccc27935bd0dddab943f8e0ca15d8d27a7a984e1
-
Filesize
2B
MD584cad01fdb44ae58dbe6c3973dcd87f5
SHA14700b42849fb35be323774820bf1bc8019d26c80
SHA2568b1f194be530240c18bf0b1ee0d038e750fab8b24c6bd25c864297e5ebb41fa6
SHA5126e10d3ec4724c1aca9ff3f6a26292ba80065d18e8e9395f1474c0a298008f25e312e2f7024e7d10aab3264764e69a25553cc20afd23090f83921d20e42b989ab
-
Filesize
343KB
MD56426d400c96fb9ffef4eaa54f6647f4c
SHA170a37871aff432790b6adf7d3fc4eb929476e082
SHA25698bba0cf4c57ecd35b227f45e4aa6dd50ef7cfb1160235cc14687c96eb09fa3c
SHA5122c8b4d3ab066cbfca6cf0c8d89d5044152b5e3d7100249cbedd1c816e3a4a94efc8bc6b79c1dab4bdf96e3ce476d6caccf625cfbe0aff3bf5e7a29dfcfa948c5
-
Filesize
668KB
MD509e80c7246e970032b1c8fb0fcd9ded4
SHA1534012a13b5e523128a2acee591aff057cf2d798
SHA2567981d1d59a3d2328fa24c378de5ded0f1605764e58910fe9c82a91d544c381aa
SHA512a7ba8fec81432e77c4e381dba1482e9c45519a8d39f3fc445896a9b75d2cb073b57bcda2e6aaa804138a20564791d48920b65a586b59356ab4934900a623bb63