Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
22/02/2025, 23:01
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe
-
Size
179KB
-
MD5
1cd1f4b22943ca619c0133f92e5b00ed
-
SHA1
3a0f7f6dd599aea2c3646d75fa3cda585add3092
-
SHA256
cc48f61cb0aeeb15e87d9543acff36ff98a33c33ad3af884e15f00f7690bfb87
-
SHA512
e42a0096c4359473e40a24e52a4afbace80b1a7652102577872e20e6b289d7f18a7bdcfa7fce6b120b474a717927a04d65fa13b4cd71a1d6606ab46d38b42b55
-
SSDEEP
3072:LiqHuRsodQz11vcnJk2VTfir99iN0JZWeUVl+c:PORsXzbvMJ/Y9ieUVF
Malware Config
Signatures
-
Blackshades
Blackshades is a remote access trojan with various capabilities.
-
Blackshades family
-
Blackshades payload 12 IoCs
resource yara_rule behavioral1/memory/2608-24-0x0000000000400000-0x000000000045D000-memory.dmp family_blackshades behavioral1/memory/2608-23-0x0000000000400000-0x000000000045D000-memory.dmp family_blackshades behavioral1/memory/2608-30-0x0000000000400000-0x000000000045D000-memory.dmp family_blackshades behavioral1/memory/2608-31-0x0000000000400000-0x000000000045D000-memory.dmp family_blackshades behavioral1/memory/2608-33-0x0000000000400000-0x000000000045D000-memory.dmp family_blackshades behavioral1/memory/2608-34-0x0000000000400000-0x000000000045D000-memory.dmp family_blackshades behavioral1/memory/2608-35-0x0000000000400000-0x000000000045D000-memory.dmp family_blackshades behavioral1/memory/2608-37-0x0000000000400000-0x000000000045D000-memory.dmp family_blackshades behavioral1/memory/2608-38-0x0000000000400000-0x000000000045D000-memory.dmp family_blackshades behavioral1/memory/2608-39-0x0000000000400000-0x000000000045D000-memory.dmp family_blackshades behavioral1/memory/2608-42-0x0000000000400000-0x000000000045D000-memory.dmp family_blackshades behavioral1/memory/2608-43-0x0000000000400000-0x000000000045D000-memory.dmp family_blackshades -
Modifies firewall policy service 3 TTPs 8 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\server.exe = "C:\\Users\\Admin\\AppData\\Roaming\\server.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2628 set thread context of 1548 2628 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe 30 PID 1548 set thread context of 2608 1548 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe 31 -
resource yara_rule behavioral1/memory/2608-24-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/2608-23-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/2608-20-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/2608-18-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/2608-15-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/2608-12-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/2608-11-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/2608-30-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/2608-31-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/2608-33-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/2608-34-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/2608-35-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/2608-37-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/2608-38-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/2608-39-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/2608-42-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/2608-43-0x0000000000400000-0x000000000045D000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 2800 reg.exe 2684 reg.exe 2872 reg.exe 2928 reg.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: 1 2608 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe Token: SeCreateTokenPrivilege 2608 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe Token: SeAssignPrimaryTokenPrivilege 2608 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe Token: SeLockMemoryPrivilege 2608 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe Token: SeIncreaseQuotaPrivilege 2608 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe Token: SeMachineAccountPrivilege 2608 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe Token: SeTcbPrivilege 2608 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe Token: SeSecurityPrivilege 2608 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe Token: SeTakeOwnershipPrivilege 2608 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe Token: SeLoadDriverPrivilege 2608 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe Token: SeSystemProfilePrivilege 2608 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe Token: SeSystemtimePrivilege 2608 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe Token: SeProfSingleProcessPrivilege 2608 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe Token: SeIncBasePriorityPrivilege 2608 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe Token: SeCreatePagefilePrivilege 2608 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe Token: SeCreatePermanentPrivilege 2608 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe Token: SeBackupPrivilege 2608 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe Token: SeRestorePrivilege 2608 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe Token: SeShutdownPrivilege 2608 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe Token: SeDebugPrivilege 2608 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe Token: SeAuditPrivilege 2608 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe Token: SeSystemEnvironmentPrivilege 2608 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe Token: SeChangeNotifyPrivilege 2608 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe Token: SeRemoteShutdownPrivilege 2608 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe Token: SeUndockPrivilege 2608 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe Token: SeSyncAgentPrivilege 2608 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe Token: SeEnableDelegationPrivilege 2608 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe Token: SeManageVolumePrivilege 2608 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe Token: SeImpersonatePrivilege 2608 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe Token: SeCreateGlobalPrivilege 2608 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe Token: 31 2608 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe Token: 32 2608 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe Token: 33 2608 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe Token: 34 2608 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe Token: 35 2608 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2628 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe 1548 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe 2608 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe 2608 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe 2608 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2628 wrote to memory of 1548 2628 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe 30 PID 2628 wrote to memory of 1548 2628 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe 30 PID 2628 wrote to memory of 1548 2628 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe 30 PID 2628 wrote to memory of 1548 2628 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe 30 PID 2628 wrote to memory of 1548 2628 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe 30 PID 2628 wrote to memory of 1548 2628 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe 30 PID 2628 wrote to memory of 1548 2628 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe 30 PID 2628 wrote to memory of 1548 2628 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe 30 PID 2628 wrote to memory of 1548 2628 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe 30 PID 2628 wrote to memory of 1548 2628 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe 30 PID 2628 wrote to memory of 1548 2628 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe 30 PID 2628 wrote to memory of 1548 2628 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe 30 PID 1548 wrote to memory of 2608 1548 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe 31 PID 1548 wrote to memory of 2608 1548 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe 31 PID 1548 wrote to memory of 2608 1548 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe 31 PID 1548 wrote to memory of 2608 1548 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe 31 PID 1548 wrote to memory of 2608 1548 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe 31 PID 1548 wrote to memory of 2608 1548 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe 31 PID 1548 wrote to memory of 2608 1548 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe 31 PID 1548 wrote to memory of 2608 1548 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe 31 PID 1548 wrote to memory of 2608 1548 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe 31 PID 1548 wrote to memory of 2608 1548 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe 31 PID 1548 wrote to memory of 2608 1548 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe 31 PID 2608 wrote to memory of 2416 2608 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe 32 PID 2608 wrote to memory of 2416 2608 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe 32 PID 2608 wrote to memory of 2416 2608 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe 32 PID 2608 wrote to memory of 2416 2608 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe 32 PID 2608 wrote to memory of 2416 2608 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe 32 PID 2608 wrote to memory of 2416 2608 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe 32 PID 2608 wrote to memory of 2416 2608 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe 32 PID 2608 wrote to memory of 2784 2608 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe 33 PID 2608 wrote to memory of 2784 2608 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe 33 PID 2608 wrote to memory of 2784 2608 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe 33 PID 2608 wrote to memory of 2784 2608 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe 33 PID 2608 wrote to memory of 2784 2608 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe 33 PID 2608 wrote to memory of 2784 2608 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe 33 PID 2608 wrote to memory of 2784 2608 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe 33 PID 2608 wrote to memory of 2820 2608 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe 35 PID 2608 wrote to memory of 2820 2608 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe 35 PID 2608 wrote to memory of 2820 2608 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe 35 PID 2608 wrote to memory of 2820 2608 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe 35 PID 2608 wrote to memory of 2820 2608 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe 35 PID 2608 wrote to memory of 2820 2608 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe 35 PID 2608 wrote to memory of 2820 2608 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe 35 PID 2608 wrote to memory of 2836 2608 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe 36 PID 2608 wrote to memory of 2836 2608 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe 36 PID 2608 wrote to memory of 2836 2608 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe 36 PID 2608 wrote to memory of 2836 2608 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe 36 PID 2608 wrote to memory of 2836 2608 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe 36 PID 2608 wrote to memory of 2836 2608 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe 36 PID 2608 wrote to memory of 2836 2608 JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe 36 PID 2836 wrote to memory of 2800 2836 cmd.exe 41 PID 2836 wrote to memory of 2800 2836 cmd.exe 41 PID 2836 wrote to memory of 2800 2836 cmd.exe 41 PID 2836 wrote to memory of 2800 2836 cmd.exe 41 PID 2836 wrote to memory of 2800 2836 cmd.exe 41 PID 2836 wrote to memory of 2800 2836 cmd.exe 41 PID 2836 wrote to memory of 2800 2836 cmd.exe 41 PID 2784 wrote to memory of 2872 2784 cmd.exe 40 PID 2784 wrote to memory of 2872 2784 cmd.exe 40 PID 2784 wrote to memory of 2872 2784 cmd.exe 40 PID 2784 wrote to memory of 2872 2784 cmd.exe 40 PID 2784 wrote to memory of 2872 2784 cmd.exe 40 PID 2784 wrote to memory of 2872 2784 cmd.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- System Location Discovery: System Language Discovery
PID:2416 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2928
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe:*:Enabled:Windows Messanger" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1cd1f4b22943ca619c0133f92e5b00ed.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2872
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- System Location Discovery: System Language Discovery
PID:2820 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2684
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\server.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\server.exe:*:Enabled:Windows Messanger" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\server.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\server.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2800
-
-
-
-