Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/03/2025, 02:01
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_4a770dde0fd86a16a9984f1335b8fea9.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_4a770dde0fd86a16a9984f1335b8fea9.exe
-
Size
697KB
-
MD5
4a770dde0fd86a16a9984f1335b8fea9
-
SHA1
b47ba302c433899fed43ce1ceb5027cb9b29f186
-
SHA256
0d2db5cb4c04597e03c50d2377c7b197e2267d4017c2e6f6e867011ce7db05c0
-
SHA512
955bee68f1e1f85148d398e094595baf86f83270fbe7898682147fd7a7bae305f574c7f31988585e66b3e0d0b87e9434a87f4cf6995a9d1d4608c1b6ca52c389
-
SSDEEP
12288:200IxznWSKPoJCfv/YiHHBs2wvRMPa9gQa+3/yRh4cSAC7ITAKBGDAW5SFsNT:RbWyUPYqh8l9gg3isNKcJ5/NT
Malware Config
Signatures
-
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral1/files/0x000800000001211a-10.dat family_gh0strat behavioral1/memory/2836-79-0x0000000000400000-0x0000000000426000-memory.dmp family_gh0strat -
Gh0strat family
-
Executes dropped EXE 3 IoCs
pid Process 2836 417.exe 2088 DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe 2400 svchost.exe 2025342111.exe -
Loads dropped DLL 1 IoCs
pid Process 2088 DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\:\Program Files\Common Files\svchost.exe 2025342111.exe = "C:\\Program Files\\Common Files\\svchost.exe 2025342111.exe" 417.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\qdisp.dll DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 417.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe 2025342111.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_4a770dde0fd86a16a9984f1335b8fea9.exe -
Kills process with taskkill 2 IoCs
pid Process 2188 taskkill.exe 1064 taskkill.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8B167D60-8605-11D0-ABCB-00A0C90FFFC0}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMRoutine.1\ = "QMRoutine Class" DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMRoutine\CurVer\ = "QMDispatch.QMRoutine.1" DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C07DB6A3-34FC-4084-BE2E-76BB9203B049}\Programmable DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6081CD7D-B4FB-4DED-BDA7-EBF8C23DC127}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSScriptControl.ScriptControl.1\ = "ScriptControl Object" DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{70841C6F-067D-11D0-95D8-00A02463AB28}\TypeLib DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8B167D60-8605-11D0-ABCB-00A0C90FFFC0}\TypeLib\ = "{0E59F1D2-1FBE-11D0-8FF2-00A0D10038BC}" DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMVBSRoutine\CLSID DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{241D7F03-9232-4024-8373-149860BE27C0}\TypeLib DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMVBSRoutine.1\CLSID\ = "{241D7F03-9232-4024-8373-149860BE27C0}" DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0E59F1D5-1FBE-11D0-8FF2-00A0D10038BC}\Implemented Categories DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{70841C71-067D-11D0-95D8-00A02463AB28}\TypeLib\Version = "1.0" DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{70841C78-067D-11D0-95D8-00A02463AB28}\TypeLib\Version = "1.0" DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMRoutine.1 DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6081CD7D-B4FB-4DED-BDA7-EBF8C23DC127}\TypeLib\ = "{5FD5723F-D6F6-4F31-A7D0-318E72D28E80}" DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBEB87A4-E151-4054-AB45-A6E094C5334B}\ProgID DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C07DB6A3-34FC-4084-BE2E-76BB9203B049}\InprocServer32\ = "C:\\Windows\\SysWow64\\qdisp.dll" DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSScriptControl.ScriptControl\CLSID DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0E59F1D5-1FBE-11D0-8FF2-00A0D10038BC}\Implemented Categories\{40FC6ED5-2438-11CF-A3DB-080036F12502} DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{70841C73-067D-11D0-95D8-00A02463AB28}\TypeLib DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0E59F1D3-1FBE-11D0-8FF2-00A0D10038BC}\TypeLib\Version = "1.0" DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMVBSRoutine.1\CLSID DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0E59F1D5-1FBE-11D0-8FF2-00A0D10038BC}\MiscStatus\1 DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{70841C6F-067D-11D0-95D8-00A02463AB28}\TypeLib\ = "{0E59F1D2-1FBE-11D0-8FF2-00A0D10038BC}" DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ScriptControl\CurVer\ = "MSScriptControl.ScriptControl.1" DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMRoutine.1\CLSID\ = "{C07DB6A3-34FC-4084-BE2E-76BB9203B049}" DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E6AD2DF7-46DC-417F-AE61-D433C510416D}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6081CD7D-B4FB-4DED-BDA7-EBF8C23DC127} DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSScriptControl.ScriptControl DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0E59F1D3-1FBE-11D0-8FF2-00A0D10038BC}\ProxyStubClsid32 DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBEB87A4-E151-4054-AB45-A6E094C5334B}\ = "QMDispatch.QMFunction" DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBEB87A4-E151-4054-AB45-A6E094C5334B}\LocalServer32\ = "C:\\DNF~1.EXE" DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSScriptControl.ScriptControl\CurVer DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{70841C6F-067D-11D0-95D8-00A02463AB28} DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8B167D60-8605-11D0-ABCB-00A0C90FFFC0} DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{241D7F03-9232-4024-8373-149860BE27C0}\VersionIndependentProgID\ = "QMDispatch.QMVBSRoutine" DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{241D7F03-9232-4024-8373-149860BE27C0}\InprocServer32\ThreadingModel = "Apartment" DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{6081CD7D-B4FB-4DED-BDA7-EBF8C23DC127}\TypeLib\Version = "1.0" DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0E59F1D5-1FBE-11D0-8FF2-00A0D10038BC}\ToolboxBitmap32 DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{70841C6F-067D-11D0-95D8-00A02463AB28}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{241D7F03-9232-4024-8373-149860BE27C0}\TypeLib\ = "{5FD5723F-D6F6-4F31-A7D0-318E72D28E80}" DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E6AD2DF7-46DC-417F-AE61-D433C510416D}\ = "IQMRoutine" DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0E59F1D5-1FBE-11D0-8FF2-00A0D10038BC}\InprocServer32 DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{70841C70-067D-11D0-95D8-00A02463AB28}\ProxyStubClsid32 DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{70841C70-067D-11D0-95D8-00A02463AB28}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{70841C78-067D-11D0-95D8-00A02463AB28}\ProxyStubClsid32 DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{241D7F03-9232-4024-8373-149860BE27C0}\InprocServer32 DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{5FD5723F-D6F6-4F31-A7D0-318E72D28E80}\1.0\0\win32\ = "C:\\Windows\\SysWow64\\qdisp.dll" DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0E59F1D5-1FBE-11D0-8FF2-00A0D10038BC}\Programmable DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{241D7F03-9232-4024-8373-149860BE27C0}\InprocServer32\ = "C:\\Windows\\SysWow64\\qdisp.dll" DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E6AD2DF7-46DC-417F-AE61-D433C510416D}\TypeLib\Version = "1.0" DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{6081CD7D-B4FB-4DED-BDA7-EBF8C23DC127}\ProxyStubClsid32 DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{70841C71-067D-11D0-95D8-00A02463AB28} DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C07DB6A3-34FC-4084-BE2E-76BB9203B049}\VersionIndependentProgID DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C07DB6A3-34FC-4084-BE2E-76BB9203B049}\TypeLib\ = "{5FD5723F-D6F6-4F31-A7D0-318E72D28E80}" DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{5FD5723F-D6F6-4F31-A7D0-318E72D28E80}\1.0\ = "QMDispatch 1.0 Type Library" DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E6AD2DF7-46DC-417F-AE61-D433C510416D}\TypeLib DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{6081CD7D-B4FB-4DED-BDA7-EBF8C23DC127} DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBEB87A4-E151-4054-AB45-A6E094C5334B}\InprocHandler32 DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{70841C73-067D-11D0-95D8-00A02463AB28} DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMRoutine\CLSID DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E6AD2DF7-46DC-417F-AE61-D433C510416D}\ProxyStubClsid32 DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E6AD2DF7-46DC-417F-AE61-D433C510416D}\TypeLib DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1064 taskkill.exe Token: SeDebugPrivilege 2188 taskkill.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2088 DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2088 DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 2088 DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe 2088 DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe 2088 DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe 2088 DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe 2088 DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe 2088 DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe 2088 DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe 2088 DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe 2088 DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 2908 wrote to memory of 2836 2908 JaffaCakes118_4a770dde0fd86a16a9984f1335b8fea9.exe 28 PID 2908 wrote to memory of 2836 2908 JaffaCakes118_4a770dde0fd86a16a9984f1335b8fea9.exe 28 PID 2908 wrote to memory of 2836 2908 JaffaCakes118_4a770dde0fd86a16a9984f1335b8fea9.exe 28 PID 2908 wrote to memory of 2836 2908 JaffaCakes118_4a770dde0fd86a16a9984f1335b8fea9.exe 28 PID 2908 wrote to memory of 2836 2908 JaffaCakes118_4a770dde0fd86a16a9984f1335b8fea9.exe 28 PID 2908 wrote to memory of 2836 2908 JaffaCakes118_4a770dde0fd86a16a9984f1335b8fea9.exe 28 PID 2908 wrote to memory of 2836 2908 JaffaCakes118_4a770dde0fd86a16a9984f1335b8fea9.exe 28 PID 2908 wrote to memory of 2088 2908 JaffaCakes118_4a770dde0fd86a16a9984f1335b8fea9.exe 29 PID 2908 wrote to memory of 2088 2908 JaffaCakes118_4a770dde0fd86a16a9984f1335b8fea9.exe 29 PID 2908 wrote to memory of 2088 2908 JaffaCakes118_4a770dde0fd86a16a9984f1335b8fea9.exe 29 PID 2908 wrote to memory of 2088 2908 JaffaCakes118_4a770dde0fd86a16a9984f1335b8fea9.exe 29 PID 2908 wrote to memory of 2088 2908 JaffaCakes118_4a770dde0fd86a16a9984f1335b8fea9.exe 29 PID 2908 wrote to memory of 2088 2908 JaffaCakes118_4a770dde0fd86a16a9984f1335b8fea9.exe 29 PID 2908 wrote to memory of 2088 2908 JaffaCakes118_4a770dde0fd86a16a9984f1335b8fea9.exe 29 PID 2836 wrote to memory of 2188 2836 417.exe 30 PID 2836 wrote to memory of 2188 2836 417.exe 30 PID 2836 wrote to memory of 2188 2836 417.exe 30 PID 2836 wrote to memory of 2188 2836 417.exe 30 PID 2836 wrote to memory of 2188 2836 417.exe 30 PID 2836 wrote to memory of 2188 2836 417.exe 30 PID 2836 wrote to memory of 2188 2836 417.exe 30 PID 2836 wrote to memory of 2400 2836 417.exe 31 PID 2836 wrote to memory of 2400 2836 417.exe 31 PID 2836 wrote to memory of 2400 2836 417.exe 31 PID 2836 wrote to memory of 2400 2836 417.exe 31 PID 2836 wrote to memory of 2400 2836 417.exe 31 PID 2836 wrote to memory of 2400 2836 417.exe 31 PID 2836 wrote to memory of 2400 2836 417.exe 31 PID 2400 wrote to memory of 1064 2400 svchost.exe 2025342111.exe 33 PID 2400 wrote to memory of 1064 2400 svchost.exe 2025342111.exe 33 PID 2400 wrote to memory of 1064 2400 svchost.exe 2025342111.exe 33 PID 2400 wrote to memory of 1064 2400 svchost.exe 2025342111.exe 33 PID 2400 wrote to memory of 1064 2400 svchost.exe 2025342111.exe 33 PID 2400 wrote to memory of 1064 2400 svchost.exe 2025342111.exe 33 PID 2400 wrote to memory of 1064 2400 svchost.exe 2025342111.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4a770dde0fd86a16a9984f1335b8fea9.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4a770dde0fd86a16a9984f1335b8fea9.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\417.exe"C:\417.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Ksafetray.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2188
-
-
C:\Program Files\Common Files\svchost.exe 2025342111.exe"C:\Program Files\Common Files\svchost.exe 2025342111.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Ksafetray.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1064
-
-
-
-
C:\DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe"C:\DNF·è¿ñÉÌÈËÎÞÏÞ°æ.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2088
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD53d450a76a28c68d79ee9bfb4627e0f1f
SHA1e2d05f8ffce5a2acd2739a4b53b7ae733d0b6aa0
SHA256fe3fb7eee0fd4b39d0ccfeff69b14a444b4af0902942fa0189b6f0110b04f9e8
SHA512955a24c561a97d62aae57df9c21dcae4b1b671fbc9841f0d858cdbd0c929a5f512d11ffa5769ff6d0b5b5f92d5305009d20e6f2cb9ced7913c33b0e68e971934
-
Filesize
1.6MB
MD5bd292d82dca64fe401460e0af03becc6
SHA1af2f1ab798b21a60e0c1cc8cc3dfef2e08c226ff
SHA25631978be6ed4930d394f39052f3b8cfa83b74908c26c099c27e3f6a90fe432032
SHA512f4e1666cb23f4da028567f47a22ac48174efda25b966c315e73a6f614effdab8ceeda02b4c77797eb470849c8af87f8bf4fdca1c7a0be273c69fb2cb0d5350fe
-
Filesize
340B
MD5fc7a7e12527b8b09b464afc4281feaf5
SHA183a3e3210444016e21f63d67afc8ec3a87f80930
SHA25643e0644c269a062e798f35eeaaa6095c2a7d471a87eef7bf22e8448da6dffa88
SHA512bf0b7fcb805cd31c92729e475c9c34eac6d2f65a98eea5dd8c809d846746cf10e22e0f9d331e1f57fb5dcbc7db2e943d8964ccde766d086b038638d24e89ebf6
-
Filesize
53KB
MD5099838813910ccf33d31db9ba56ce4b5
SHA17dd60cf1c8a8cadd04d93b766131626726c34a89
SHA2561d05de2bfd0991c8bd9fa1544e432ee801756993986b0e90fa242c42a79307f5
SHA512da6bb0124a617e3329c33d15bed3e9a5a6c246662f0f01795784ac141f90573e5d61115eb96a5be04e5d8fc9d671032e78f333f515d33ec783a90a0732baeb16