Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10/03/2025, 04:15
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe
-
Size
232KB
-
MD5
5d020f63e6132f6cc5d648c1320b35fd
-
SHA1
ab94a4264221665fcd4838a5025f39bdd3983ab6
-
SHA256
9218caaf75357ca9de019d2992d1cfa4434f7fc5b5a31c6d1994246cc1260acd
-
SHA512
d8e1ff5a43a465127e40576e94e07634732cd53d876642474d42949aa358de9b37b554ae5828b8f6e6c30fb17c7dfdcec2528a2d2781bbaea782c7560c84f9e5
-
SSDEEP
3072:uFizYn1ySqkABILn38irWzR0wvJB0vDSZF9fqwRlpfK/88CjaIIPjW5niFx5qWY:qQFq8oe+wvL0vqKwRHK6+ImjF
Malware Config
Signatures
-
Blackshades
Blackshades is a remote access trojan with various capabilities.
-
Blackshades family
-
Blackshades payload 19 IoCs
resource yara_rule behavioral1/memory/2296-44-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral1/memory/2296-45-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral1/memory/2296-42-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral1/memory/2296-38-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral1/memory/2296-37-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral1/memory/2296-46-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral1/memory/2296-51-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral1/memory/2296-52-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral1/memory/2296-54-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral1/memory/2296-56-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral1/memory/2296-57-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral1/memory/2296-58-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral1/memory/2296-60-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral1/memory/2296-61-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral1/memory/2296-62-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral1/memory/2296-66-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral1/memory/2296-68-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral1/memory/2296-69-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral1/memory/2296-70-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades -
Modifies firewall policy service 3 TTPs 8 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\WinDefender.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\WinDefender.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\svchost.exe = "C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\Windows Defender = "C:\\Users\\Admin\\AppData\\Local\\Temp\\WinDefender.exe" svchost.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Active Setup\Installed Components\{6BC8DD1A-C63F-FC4D-BDEF-1E0BBFD98D31}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\Temp\\WinDefender.exe" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6BC8DD1A-C63F-FC4D-BDEF-1E0BBFD98D31} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6BC8DD1A-C63F-FC4D-BDEF-1E0BBFD98D31}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\Temp\\WinDefender.exe" svchost.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\SOFTWARE\Microsoft\Active Setup\Installed Components\{6BC8DD1A-C63F-FC4D-BDEF-1E0BBFD98D31} svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2296 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Defender = "C:\\Users\\Admin\\AppData\\Local\\Temp\\WinDefender.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Defender = "C:\\Users\\Admin\\AppData\\Local\\Temp\\WinDefender.exe" svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 264 set thread context of 2296 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 35 -
resource yara_rule behavioral1/memory/2296-33-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2296-44-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2296-45-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2296-42-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2296-38-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2296-37-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2296-36-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2296-27-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2296-29-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2296-46-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2296-51-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2296-52-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2296-54-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2296-56-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2296-57-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2296-58-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2296-60-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2296-61-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2296-62-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2296-66-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2296-68-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2296-69-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2296-70-0x0000000000400000-0x000000000045C000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 1728 reg.exe 2664 reg.exe 2024 reg.exe 2360 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe -
Suspicious use of AdjustPrivilegeToken 37 IoCs
description pid Process Token: SeDebugPrivilege 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe Token: 1 2296 svchost.exe Token: SeCreateTokenPrivilege 2296 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2296 svchost.exe Token: SeLockMemoryPrivilege 2296 svchost.exe Token: SeIncreaseQuotaPrivilege 2296 svchost.exe Token: SeMachineAccountPrivilege 2296 svchost.exe Token: SeTcbPrivilege 2296 svchost.exe Token: SeSecurityPrivilege 2296 svchost.exe Token: SeTakeOwnershipPrivilege 2296 svchost.exe Token: SeLoadDriverPrivilege 2296 svchost.exe Token: SeSystemProfilePrivilege 2296 svchost.exe Token: SeSystemtimePrivilege 2296 svchost.exe Token: SeProfSingleProcessPrivilege 2296 svchost.exe Token: SeIncBasePriorityPrivilege 2296 svchost.exe Token: SeCreatePagefilePrivilege 2296 svchost.exe Token: SeCreatePermanentPrivilege 2296 svchost.exe Token: SeBackupPrivilege 2296 svchost.exe Token: SeRestorePrivilege 2296 svchost.exe Token: SeShutdownPrivilege 2296 svchost.exe Token: SeDebugPrivilege 2296 svchost.exe Token: SeAuditPrivilege 2296 svchost.exe Token: SeSystemEnvironmentPrivilege 2296 svchost.exe Token: SeChangeNotifyPrivilege 2296 svchost.exe Token: SeRemoteShutdownPrivilege 2296 svchost.exe Token: SeUndockPrivilege 2296 svchost.exe Token: SeSyncAgentPrivilege 2296 svchost.exe Token: SeEnableDelegationPrivilege 2296 svchost.exe Token: SeManageVolumePrivilege 2296 svchost.exe Token: SeImpersonatePrivilege 2296 svchost.exe Token: SeCreateGlobalPrivilege 2296 svchost.exe Token: 31 2296 svchost.exe Token: 32 2296 svchost.exe Token: 33 2296 svchost.exe Token: 34 2296 svchost.exe Token: 35 2296 svchost.exe Token: SeDebugPrivilege 2296 svchost.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2296 svchost.exe 2296 svchost.exe 2296 svchost.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 264 wrote to memory of 2936 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 32 PID 264 wrote to memory of 2936 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 32 PID 264 wrote to memory of 2936 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 32 PID 264 wrote to memory of 2936 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 32 PID 2936 wrote to memory of 2096 2936 csc.exe 34 PID 2936 wrote to memory of 2096 2936 csc.exe 34 PID 2936 wrote to memory of 2096 2936 csc.exe 34 PID 2936 wrote to memory of 2096 2936 csc.exe 34 PID 264 wrote to memory of 2296 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 35 PID 264 wrote to memory of 2296 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 35 PID 264 wrote to memory of 2296 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 35 PID 264 wrote to memory of 2296 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 35 PID 264 wrote to memory of 2296 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 35 PID 264 wrote to memory of 2296 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 35 PID 264 wrote to memory of 2296 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 35 PID 264 wrote to memory of 2296 264 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 35 PID 2296 wrote to memory of 2720 2296 svchost.exe 36 PID 2296 wrote to memory of 2720 2296 svchost.exe 36 PID 2296 wrote to memory of 2720 2296 svchost.exe 36 PID 2296 wrote to memory of 2720 2296 svchost.exe 36 PID 2296 wrote to memory of 2604 2296 svchost.exe 37 PID 2296 wrote to memory of 2604 2296 svchost.exe 37 PID 2296 wrote to memory of 2604 2296 svchost.exe 37 PID 2296 wrote to memory of 2604 2296 svchost.exe 37 PID 2296 wrote to memory of 2600 2296 svchost.exe 38 PID 2296 wrote to memory of 2600 2296 svchost.exe 38 PID 2296 wrote to memory of 2600 2296 svchost.exe 38 PID 2296 wrote to memory of 2600 2296 svchost.exe 38 PID 2296 wrote to memory of 2620 2296 svchost.exe 39 PID 2296 wrote to memory of 2620 2296 svchost.exe 39 PID 2296 wrote to memory of 2620 2296 svchost.exe 39 PID 2296 wrote to memory of 2620 2296 svchost.exe 39 PID 2604 wrote to memory of 2024 2604 cmd.exe 44 PID 2604 wrote to memory of 2024 2604 cmd.exe 44 PID 2604 wrote to memory of 2024 2604 cmd.exe 44 PID 2604 wrote to memory of 2024 2604 cmd.exe 44 PID 2620 wrote to memory of 1728 2620 cmd.exe 46 PID 2620 wrote to memory of 1728 2620 cmd.exe 46 PID 2620 wrote to memory of 1728 2620 cmd.exe 46 PID 2620 wrote to memory of 1728 2620 cmd.exe 46 PID 2600 wrote to memory of 2664 2600 cmd.exe 47 PID 2600 wrote to memory of 2664 2600 cmd.exe 47 PID 2600 wrote to memory of 2664 2600 cmd.exe 47 PID 2600 wrote to memory of 2664 2600 cmd.exe 47 PID 2720 wrote to memory of 2360 2720 cmd.exe 45 PID 2720 wrote to memory of 2360 2720 cmd.exe 45 PID 2720 wrote to memory of 2360 2720 cmd.exe 45 PID 2720 wrote to memory of 2360 2720 cmd.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:264 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ji8tzeag.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD02C.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCD02B.tmp"3⤵
- System Location Discovery: System Language Discovery
PID:2096
-
-
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2360
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\svchost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\svchost.exe:*:Enabled:Windows Messanger" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\svchost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\svchost.exe:*:Enabled:Windows Messanger" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2024
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2664
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\WinDefender.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\WinDefender.exe:*:Enabled:Windows Messanger" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\WinDefender.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\WinDefender.exe:*:Enabled:Windows Messanger" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1728
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5057fee693f9f55bb491e8510a6ef11c1
SHA1780ab33317b811db5e0741609e4b2281773bfd40
SHA256983e5cb3c1a3b2cbf017d51997e84a1840a1befc3afb701ffb08ce0bdb7302b9
SHA51263778cf18f45efe4fa6b6361883d5ed021c273b51a5a15d9b0c8f9ed149e4c9f0c477bccb3e28f95b9915e28b89e673671e35842c7998b3fc521343aa41c08f1
-
Filesize
5KB
MD528a84b8d6fdfdf1170b4e4f6071e36d8
SHA1f7f3d633fafbca70354603dc84b6fb9306744ab6
SHA25622648a2705f93315b0114d71642e5aaca6ebc0e753c64043547364f111dbc107
SHA512003e98b11d19dd191fa9988d094efebe6875744be9302718d63e3ede8eabc87743e74955d35f5a3961629a731f2f2954a8038495b71fde30f703c7e8b32fc74c
-
Filesize
652B
MD56b49c3cb69895f54909c9431c871c9b4
SHA1c526e2050d0fedbbf5e539e877090f029be6d1f3
SHA256619adb71368ed40099999f7c36eba0134a867f7b013491c177ded65e2320e1ec
SHA5124e29fd8d7a11aafe450f2091a5e41a171285582c7674b98d6d86f35bb9b7015addb482a36a45bc2827081eeed58eea21c28d0f7c06df6168c5283f3149076039
-
Filesize
4KB
MD52216d197bc442e875016eba15c07a937
SHA137528e21ea3271b85d276c6bd003e6c60c81545d
SHA2562e9e3da7bfa1334706550bb4d6269bf3e64cbbc09fa349af52eb22f32aebb4af
SHA5127d7bdc3bf83ac0a29e917ead899dcaa1b47ee2660f405fe4883ca2a2546f7924265e1d75a2ea02c0e34fac4d2bb82bbaaa88d06c240afad4e9fd49337cd04d3f
-
Filesize
206B
MD5582a4f57db804877096ea51b130254e4
SHA1cd2ca36ed918fffe1387c87b21159cde8184a9b1
SHA256567d83eb8d5ce0d033e1671d399ed8d478418850cabf1f48157dbf11d12ed4ec
SHA51248daa5863e6b01c499a6510a536ba0ab98ac614f2378abd12da19e1f71008f034897aacede18b538766aee5d1aea63cf76d98cbc151c51cef81e606039e0e946
-
Filesize
12KB
MD5bb5b2961567e68995464801d3bb2a964
SHA15d82ae2b8d24208418bfb09cbb3074c056e790dc
SHA256a2d3d892c68a84208a9887cb34ecae820e59c4aa25c22db5c23379df344df004
SHA512050550640a7bf2b65b3cd537f252b64465ec451555ff1831a9d799922e8c3382e83a52bc46015c5ed1ac79ebb233616f72aa8ed72f01e8be578ca383a304ff7a