Analysis
-
max time kernel
150s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
14/04/2025, 21:39
General
-
Target
JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe
-
Size
334KB
-
MD5
b8f1709e529291a5b34e66c74b353037
-
SHA1
7feb9dd4474cff5b44f83b72177bef00766ddcbd
-
SHA256
c476a825ffb5af6afc47516447a8012cdd042dd83a0e14c32646f644cac5741b
-
SHA512
6b1a2bb6199d4bbef57f5794b031fbfce4609aaf5b9dbf2e1fc6575c8ac34aa5c23cf3c2930e5935e8970c66eaeb586a028d24d7730931964ca8e23698041866
-
SSDEEP
6144:n/G0N63UDko8uszQAzrUnYkxezUT9inFj9PShCpDiTxu3g9yLzwHIKz6:/x6Nusyn3okGFj59gK8l6
Malware Config
Extracted
cybergate
v1.01.0
mike
bellika.zapto.org:5150
CyberGate1
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
winupdate
-
install_file
winupdate.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
121212
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Cybergate family
-
Adds policy Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Key created \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run winupdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run winupdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run winupdate.exe Key created \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run winupdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run winupdate.exe Key created \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run winupdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run winupdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Key created \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run winupdate.exe Key created \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run winupdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Key created \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run winupdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\winupdate\\winupdate.exe" JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run winupdate.exe Key created \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run winupdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Key created \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run winupdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run winupdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Key created \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run winupdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run winupdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Key created \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run winupdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Key created \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run winupdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run winupdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\winupdate\\winupdate.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe Key created \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run winupdate.exe Key created \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run winupdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Key created \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\winupdate\\winupdate.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Key created \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Key created \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run explorer.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 62 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{VL33HW6V-4J04-87S3-40Q8-6R4ACL00W7AD} winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{VL33HW6V-4J04-87S3-40Q8-6R4ACL00W7AD}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe Restart" winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{VL33HW6V-4J04-87S3-40Q8-6R4ACL00W7AD}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe Restart" winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{VL33HW6V-4J04-87S3-40Q8-6R4ACL00W7AD}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe Restart" winupdate.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{VL33HW6V-4J04-87S3-40Q8-6R4ACL00W7AD} winupdate.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{VL33HW6V-4J04-87S3-40Q8-6R4ACL00W7AD} winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{VL33HW6V-4J04-87S3-40Q8-6R4ACL00W7AD}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe Restart" winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{VL33HW6V-4J04-87S3-40Q8-6R4ACL00W7AD}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe Restart" winupdate.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{VL33HW6V-4J04-87S3-40Q8-6R4ACL00W7AD} winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{VL33HW6V-4J04-87S3-40Q8-6R4ACL00W7AD}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe Restart" winupdate.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{VL33HW6V-4J04-87S3-40Q8-6R4ACL00W7AD} winupdate.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{VL33HW6V-4J04-87S3-40Q8-6R4ACL00W7AD} winupdate.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{VL33HW6V-4J04-87S3-40Q8-6R4ACL00W7AD} winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{VL33HW6V-4J04-87S3-40Q8-6R4ACL00W7AD}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe Restart" winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{VL33HW6V-4J04-87S3-40Q8-6R4ACL00W7AD}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe Restart" winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{VL33HW6V-4J04-87S3-40Q8-6R4ACL00W7AD}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe Restart" winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{VL33HW6V-4J04-87S3-40Q8-6R4ACL00W7AD}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe Restart" winupdate.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{VL33HW6V-4J04-87S3-40Q8-6R4ACL00W7AD} winupdate.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{VL33HW6V-4J04-87S3-40Q8-6R4ACL00W7AD} winupdate.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{VL33HW6V-4J04-87S3-40Q8-6R4ACL00W7AD} winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{VL33HW6V-4J04-87S3-40Q8-6R4ACL00W7AD}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe Restart" winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{VL33HW6V-4J04-87S3-40Q8-6R4ACL00W7AD}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe Restart" winupdate.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{VL33HW6V-4J04-87S3-40Q8-6R4ACL00W7AD} winupdate.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{VL33HW6V-4J04-87S3-40Q8-6R4ACL00W7AD} winupdate.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{VL33HW6V-4J04-87S3-40Q8-6R4ACL00W7AD} winupdate.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{VL33HW6V-4J04-87S3-40Q8-6R4ACL00W7AD} winupdate.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{VL33HW6V-4J04-87S3-40Q8-6R4ACL00W7AD} winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{VL33HW6V-4J04-87S3-40Q8-6R4ACL00W7AD}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe Restart" winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{VL33HW6V-4J04-87S3-40Q8-6R4ACL00W7AD}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe Restart" winupdate.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{VL33HW6V-4J04-87S3-40Q8-6R4ACL00W7AD} winupdate.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{VL33HW6V-4J04-87S3-40Q8-6R4ACL00W7AD} winupdate.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{VL33HW6V-4J04-87S3-40Q8-6R4ACL00W7AD} winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{VL33HW6V-4J04-87S3-40Q8-6R4ACL00W7AD}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe Restart" winupdate.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{VL33HW6V-4J04-87S3-40Q8-6R4ACL00W7AD} winupdate.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{VL33HW6V-4J04-87S3-40Q8-6R4ACL00W7AD} winupdate.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{VL33HW6V-4J04-87S3-40Q8-6R4ACL00W7AD} winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{VL33HW6V-4J04-87S3-40Q8-6R4ACL00W7AD}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe Restart" winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{VL33HW6V-4J04-87S3-40Q8-6R4ACL00W7AD}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe Restart" winupdate.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{VL33HW6V-4J04-87S3-40Q8-6R4ACL00W7AD} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{VL33HW6V-4J04-87S3-40Q8-6R4ACL00W7AD}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe Restart" winupdate.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{VL33HW6V-4J04-87S3-40Q8-6R4ACL00W7AD} winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{VL33HW6V-4J04-87S3-40Q8-6R4ACL00W7AD}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe Restart" winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{VL33HW6V-4J04-87S3-40Q8-6R4ACL00W7AD}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe Restart" winupdate.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{VL33HW6V-4J04-87S3-40Q8-6R4ACL00W7AD} winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{VL33HW6V-4J04-87S3-40Q8-6R4ACL00W7AD}\StubPath = "C:\\Windows\\system32\\winupdate\\winupdate.exe" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{VL33HW6V-4J04-87S3-40Q8-6R4ACL00W7AD} winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{VL33HW6V-4J04-87S3-40Q8-6R4ACL00W7AD}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe Restart" winupdate.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{VL33HW6V-4J04-87S3-40Q8-6R4ACL00W7AD} winupdate.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{VL33HW6V-4J04-87S3-40Q8-6R4ACL00W7AD} winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{VL33HW6V-4J04-87S3-40Q8-6R4ACL00W7AD}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe Restart" winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{VL33HW6V-4J04-87S3-40Q8-6R4ACL00W7AD}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe Restart" winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{VL33HW6V-4J04-87S3-40Q8-6R4ACL00W7AD}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe Restart" winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{VL33HW6V-4J04-87S3-40Q8-6R4ACL00W7AD}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe Restart" winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{VL33HW6V-4J04-87S3-40Q8-6R4ACL00W7AD}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe Restart" winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{VL33HW6V-4J04-87S3-40Q8-6R4ACL00W7AD}\StubPath = "C:\\Windows\\system32\\winupdate\\winupdate.exe Restart" JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{VL33HW6V-4J04-87S3-40Q8-6R4ACL00W7AD}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe Restart" winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{VL33HW6V-4J04-87S3-40Q8-6R4ACL00W7AD}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe Restart" winupdate.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{VL33HW6V-4J04-87S3-40Q8-6R4ACL00W7AD} JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{VL33HW6V-4J04-87S3-40Q8-6R4ACL00W7AD} winupdate.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{VL33HW6V-4J04-87S3-40Q8-6R4ACL00W7AD} winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{VL33HW6V-4J04-87S3-40Q8-6R4ACL00W7AD}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe Restart" winupdate.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{VL33HW6V-4J04-87S3-40Q8-6R4ACL00W7AD} winupdate.exe -
Executes dropped EXE 29 IoCs
pid Process 4680 winupdate.exe 4172 winupdate.exe 5220 winupdate.exe 1944 winupdate.exe 4072 winupdate.exe 2488 winupdate.exe 5648 winupdate.exe 5264 winupdate.exe 5332 winupdate.exe 1232 winupdate.exe 3584 winupdate.exe 5904 winupdate.exe 4104 winupdate.exe 4956 winupdate.exe 644 winupdate.exe 5772 winupdate.exe 4988 winupdate.exe 5712 winupdate.exe 5804 winupdate.exe 3412 winupdate.exe 3968 winupdate.exe 1060 winupdate.exe 1888 winupdate.exe 8 winupdate.exe 400 winupdate.exe 3312 winupdate.exe 4800 winupdate.exe 1884 winupdate.exe 5576 winupdate.exe -
Adds Run key to start application 2 TTPs 62 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\winupdate\\winupdate.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\winupdate\\winupdate.exe" JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\winupdate\\winupdate.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\winupdate\\winupdate.exe" JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\winupdate\\winupdate.exe" winupdate.exe -
Drops file in System32 directory 60 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\winupdate\winupdate.exe winupdate.exe File created C:\Windows\SysWOW64\winupdate\winupdate.exe winupdate.exe File opened for modification C:\Windows\SysWOW64\winupdate\winupdate.exe winupdate.exe File opened for modification C:\Windows\SysWOW64\winupdate\winupdate.exe winupdate.exe File opened for modification C:\Windows\SysWOW64\winupdate\winupdate.exe winupdate.exe File created C:\Windows\SysWOW64\winupdate\winupdate.exe winupdate.exe File created C:\Windows\SysWOW64\winupdate\winupdate.exe winupdate.exe File opened for modification C:\Windows\SysWOW64\winupdate\winupdate.exe winupdate.exe File opened for modification C:\Windows\SysWOW64\winupdate\winupdate.exe winupdate.exe File created C:\Windows\SysWOW64\winupdate\winupdate.exe JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe File created C:\Windows\SysWOW64\winupdate\winupdate.exe winupdate.exe File opened for modification C:\Windows\SysWOW64\winupdate\winupdate.exe winupdate.exe File opened for modification C:\Windows\SysWOW64\winupdate\winupdate.exe winupdate.exe File opened for modification C:\Windows\SysWOW64\winupdate\winupdate.exe winupdate.exe File created C:\Windows\SysWOW64\winupdate\winupdate.exe winupdate.exe File created C:\Windows\SysWOW64\winupdate\winupdate.exe winupdate.exe File opened for modification C:\Windows\SysWOW64\winupdate\winupdate.exe winupdate.exe File created C:\Windows\SysWOW64\winupdate\winupdate.exe winupdate.exe File opened for modification C:\Windows\SysWOW64\winupdate\winupdate.exe winupdate.exe File opened for modification C:\Windows\SysWOW64\winupdate\winupdate.exe winupdate.exe File opened for modification C:\Windows\SysWOW64\winupdate\winupdate.exe winupdate.exe File opened for modification C:\Windows\SysWOW64\winupdate\winupdate.exe winupdate.exe File opened for modification C:\Windows\SysWOW64\winupdate\winupdate.exe winupdate.exe File created C:\Windows\SysWOW64\winupdate\winupdate.exe winupdate.exe File opened for modification C:\Windows\SysWOW64\winupdate\winupdate.exe winupdate.exe File created C:\Windows\SysWOW64\winupdate\winupdate.exe winupdate.exe File opened for modification C:\Windows\SysWOW64\winupdate\winupdate.exe winupdate.exe File opened for modification C:\Windows\SysWOW64\winupdate\winupdate.exe winupdate.exe File created C:\Windows\SysWOW64\winupdate\winupdate.exe winupdate.exe File created C:\Windows\SysWOW64\winupdate\winupdate.exe winupdate.exe File created C:\Windows\SysWOW64\winupdate\winupdate.exe winupdate.exe File opened for modification C:\Windows\SysWOW64\winupdate\winupdate.exe winupdate.exe File opened for modification C:\Windows\SysWOW64\winupdate\winupdate.exe winupdate.exe File opened for modification C:\Windows\SysWOW64\winupdate\winupdate.exe winupdate.exe File opened for modification C:\Windows\SysWOW64\winupdate\winupdate.exe winupdate.exe File created C:\Windows\SysWOW64\winupdate\winupdate.exe winupdate.exe File created C:\Windows\SysWOW64\winupdate\winupdate.exe winupdate.exe File created C:\Windows\SysWOW64\winupdate\winupdate.exe winupdate.exe File created C:\Windows\SysWOW64\winupdate\winupdate.exe winupdate.exe File created C:\Windows\SysWOW64\winupdate\winupdate.exe winupdate.exe File opened for modification C:\Windows\SysWOW64\winupdate\winupdate.exe winupdate.exe File created C:\Windows\SysWOW64\winupdate\winupdate.exe winupdate.exe File created C:\Windows\SysWOW64\winupdate\winupdate.exe winupdate.exe File created C:\Windows\SysWOW64\winupdate\winupdate.exe winupdate.exe File opened for modification C:\Windows\SysWOW64\winupdate\winupdate.exe winupdate.exe File created C:\Windows\SysWOW64\winupdate\winupdate.exe winupdate.exe File created C:\Windows\SysWOW64\winupdate\winupdate.exe winupdate.exe File created C:\Windows\SysWOW64\winupdate\winupdate.exe winupdate.exe File created C:\Windows\SysWOW64\winupdate\winupdate.exe winupdate.exe File opened for modification C:\Windows\SysWOW64\winupdate\winupdate.exe winupdate.exe File opened for modification C:\Windows\SysWOW64\winupdate\winupdate.exe winupdate.exe File opened for modification C:\Windows\SysWOW64\winupdate\winupdate.exe winupdate.exe File created C:\Windows\SysWOW64\winupdate\winupdate.exe winupdate.exe File opened for modification C:\Windows\SysWOW64\winupdate\winupdate.exe winupdate.exe File created C:\Windows\SysWOW64\winupdate\winupdate.exe winupdate.exe File created C:\Windows\SysWOW64\winupdate\winupdate.exe winupdate.exe File opened for modification C:\Windows\SysWOW64\winupdate\winupdate.exe JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe File created C:\Windows\SysWOW64\winupdate\winupdate.exe winupdate.exe File created C:\Windows\SysWOW64\winupdate\winupdate.exe winupdate.exe File opened for modification C:\Windows\SysWOW64\winupdate\winupdate.exe winupdate.exe -
resource yara_rule behavioral1/memory/3576-0-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/3576-4-0x0000000024010000-0x0000000024070000-memory.dmp upx behavioral1/memory/3576-7-0x0000000024070000-0x00000000240D0000-memory.dmp upx behavioral1/memory/3576-24-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/3576-65-0x0000000024070000-0x00000000240D0000-memory.dmp upx behavioral1/memory/116-70-0x0000000024070000-0x00000000240D0000-memory.dmp upx behavioral1/files/0x000b000000024128-72.dat upx behavioral1/memory/116-76-0x0000000024070000-0x00000000240D0000-memory.dmp upx behavioral1/memory/4172-78-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/5220-85-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/4680-84-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/4172-91-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/5220-97-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/1944-103-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/4072-108-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/5648-110-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2488-115-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/5648-122-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/1232-129-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/5264-128-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/5332-135-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/1232-140-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/3584-146-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/5904-152-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/4956-154-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/644-161-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/4104-160-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/4956-167-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/644-172-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/5772-178-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/4988-185-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/5804-186-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/5712-192-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/3412-193-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/3968-200-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/5804-199-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/3412-206-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/1888-210-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/3968-209-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/8-214-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/1060-213-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/1888-217-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/8-220-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/3312-221-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/400-224-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/4800-225-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/1884-229-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/3312-228-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/5576-233-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/4800-232-0x0000000000400000-0x0000000000455000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 4680 winupdate.exe 4680 winupdate.exe 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 4680 winupdate.exe 4680 winupdate.exe 4680 winupdate.exe 4680 winupdate.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3576 wrote to memory of 3416 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 56 PID 3576 wrote to memory of 3416 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 56 PID 3576 wrote to memory of 3416 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 56 PID 3576 wrote to memory of 3416 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 56 PID 3576 wrote to memory of 3416 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 56 PID 3576 wrote to memory of 3416 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 56 PID 3576 wrote to memory of 3416 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 56 PID 3576 wrote to memory of 3416 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 56 PID 3576 wrote to memory of 3416 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 56 PID 3576 wrote to memory of 3416 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 56 PID 3576 wrote to memory of 3416 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 56 PID 3576 wrote to memory of 3416 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 56 PID 3576 wrote to memory of 3416 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 56 PID 3576 wrote to memory of 3416 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 56 PID 3576 wrote to memory of 3416 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 56 PID 3576 wrote to memory of 3416 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 56 PID 3576 wrote to memory of 3416 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 56 PID 3576 wrote to memory of 3416 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 56 PID 3576 wrote to memory of 3416 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 56 PID 3576 wrote to memory of 3416 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 56 PID 3576 wrote to memory of 3416 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 56 PID 3576 wrote to memory of 3416 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 56 PID 3576 wrote to memory of 3416 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 56 PID 3576 wrote to memory of 3416 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 56 PID 3576 wrote to memory of 3416 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 56 PID 3576 wrote to memory of 3416 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 56 PID 3576 wrote to memory of 3416 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 56 PID 3576 wrote to memory of 3416 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 56 PID 3576 wrote to memory of 3416 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 56 PID 3576 wrote to memory of 3416 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 56 PID 3576 wrote to memory of 3416 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 56 PID 3576 wrote to memory of 3416 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 56 PID 3576 wrote to memory of 3416 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 56 PID 3576 wrote to memory of 3416 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 56 PID 3576 wrote to memory of 3416 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 56 PID 3576 wrote to memory of 3416 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 56 PID 3576 wrote to memory of 3416 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 56 PID 3576 wrote to memory of 3416 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 56 PID 3576 wrote to memory of 3416 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 56 PID 3576 wrote to memory of 3416 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 56 PID 3576 wrote to memory of 3416 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 56 PID 3576 wrote to memory of 3416 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 56 PID 3576 wrote to memory of 3416 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 56 PID 3576 wrote to memory of 3416 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 56 PID 3576 wrote to memory of 3416 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 56 PID 3576 wrote to memory of 3416 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 56 PID 3576 wrote to memory of 3416 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 56 PID 3576 wrote to memory of 3416 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 56 PID 3576 wrote to memory of 3416 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 56 PID 3576 wrote to memory of 3416 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 56 PID 3576 wrote to memory of 3416 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 56 PID 3576 wrote to memory of 3416 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 56 PID 3576 wrote to memory of 3416 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 56 PID 3576 wrote to memory of 3416 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 56 PID 3576 wrote to memory of 3416 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 56 PID 3576 wrote to memory of 3416 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 56 PID 3576 wrote to memory of 3416 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 56 PID 3576 wrote to memory of 3416 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 56 PID 3576 wrote to memory of 3416 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 56 PID 3576 wrote to memory of 3416 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 56 PID 3576 wrote to memory of 3416 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 56 PID 3576 wrote to memory of 3416 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 56 PID 3576 wrote to memory of 3416 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 56 PID 3576 wrote to memory of 3416 3576 JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3416
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b8f1709e529291a5b34e66c74b353037.exe"2⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:116 -
C:\Windows\SysWOW64\winupdate\winupdate.exe"C:\Windows\system32\winupdate\winupdate.exe"4⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4680
-
-
C:\Windows\SysWOW64\winupdate\winupdate.exe"C:\Windows\system32\winupdate\winupdate.exe"4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:4172
-
-
C:\Windows\SysWOW64\winupdate\winupdate.exe"C:\Windows\system32\winupdate\winupdate.exe"4⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:5220
-
-
C:\Windows\SysWOW64\winupdate\winupdate.exe"C:\Windows\system32\winupdate\winupdate.exe"4⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:1944
-
-
C:\Windows\SysWOW64\winupdate\winupdate.exe"C:\Windows\system32\winupdate\winupdate.exe"4⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:4072
-
-
C:\Windows\SysWOW64\winupdate\winupdate.exe"C:\Windows\system32\winupdate\winupdate.exe"4⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:2488
-
-
C:\Windows\SysWOW64\winupdate\winupdate.exe"C:\Windows\system32\winupdate\winupdate.exe"4⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:5648
-
-
C:\Windows\SysWOW64\winupdate\winupdate.exe"C:\Windows\system32\winupdate\winupdate.exe"4⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:5264
-
-
C:\Windows\SysWOW64\winupdate\winupdate.exe"C:\Windows\system32\winupdate\winupdate.exe"4⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:5332
-
-
C:\Windows\SysWOW64\winupdate\winupdate.exe"C:\Windows\system32\winupdate\winupdate.exe"4⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:1232
-
-
C:\Windows\SysWOW64\winupdate\winupdate.exe"C:\Windows\system32\winupdate\winupdate.exe"4⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:3584
-
-
C:\Windows\SysWOW64\winupdate\winupdate.exe"C:\Windows\system32\winupdate\winupdate.exe"4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:5904
-
-
C:\Windows\SysWOW64\winupdate\winupdate.exe"C:\Windows\system32\winupdate\winupdate.exe"4⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:4104
-
-
C:\Windows\SysWOW64\winupdate\winupdate.exe"C:\Windows\system32\winupdate\winupdate.exe"4⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:4956
-
-
C:\Windows\SysWOW64\winupdate\winupdate.exe"C:\Windows\system32\winupdate\winupdate.exe"4⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:644
-
-
C:\Windows\SysWOW64\winupdate\winupdate.exe"C:\Windows\system32\winupdate\winupdate.exe"4⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:5772
-
-
C:\Windows\SysWOW64\winupdate\winupdate.exe"C:\Windows\system32\winupdate\winupdate.exe"4⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:4988
-
-
C:\Windows\SysWOW64\winupdate\winupdate.exe"C:\Windows\system32\winupdate\winupdate.exe"4⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:5712
-
-
C:\Windows\SysWOW64\winupdate\winupdate.exe"C:\Windows\system32\winupdate\winupdate.exe"4⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:5804
-
-
C:\Windows\SysWOW64\winupdate\winupdate.exe"C:\Windows\system32\winupdate\winupdate.exe"4⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:3412
-
-
C:\Windows\SysWOW64\winupdate\winupdate.exe"C:\Windows\system32\winupdate\winupdate.exe"4⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:3968
-
-
C:\Windows\SysWOW64\winupdate\winupdate.exe"C:\Windows\system32\winupdate\winupdate.exe"4⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:1060
-
-
C:\Windows\SysWOW64\winupdate\winupdate.exe"C:\Windows\system32\winupdate\winupdate.exe"4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:1888
-
-
C:\Windows\SysWOW64\winupdate\winupdate.exe"C:\Windows\system32\winupdate\winupdate.exe"4⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:8
-
-
C:\Windows\SysWOW64\winupdate\winupdate.exe"C:\Windows\system32\winupdate\winupdate.exe"4⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:400
-
-
C:\Windows\SysWOW64\winupdate\winupdate.exe"C:\Windows\system32\winupdate\winupdate.exe"4⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:3312
-
-
C:\Windows\SysWOW64\winupdate\winupdate.exe"C:\Windows\system32\winupdate\winupdate.exe"4⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:4800
-
-
C:\Windows\SysWOW64\winupdate\winupdate.exe"C:\Windows\system32\winupdate\winupdate.exe"4⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:1884
-
-
C:\Windows\SysWOW64\winupdate\winupdate.exe"C:\Windows\system32\winupdate\winupdate.exe"4⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:5576
-
-
-
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
227KB
MD54be5ec41fafa9b7de3922371ea266dfc
SHA1de2f8ae97bbf7a21a354dfc6cab6cc3d42d19bd6
SHA256bf8b50006d05eb9356fee44011a7328db2fd2e6df54cd7acd4fa185d9dd6aede
SHA5126f82465ff67055dd27864f1c0461a5862ff0702fbddc0f4c224612994340f9d14fd8a624f633ae7f22a554107a04744d94ec6c1ef017d224068f35f2d605bd36
-
Filesize
227KB
MD5301c32b0f078b0264b9a9ae6529ddbeb
SHA11b85720cd4603929e0cb71489a08133ae049cbf5
SHA25622bbd9cbeee8533c01b154acdb250ec28de04c2289e9af79776c3c28a41f681b
SHA5123045284cfe1f66127c63d522d32e9170d38bf836000c110d7dc6927bdefc1fc22c44a91f434c953b20040e987e2d596a2270598d04451cdca2186cc5675a82a4
-
Filesize
334KB
MD5b8f1709e529291a5b34e66c74b353037
SHA17feb9dd4474cff5b44f83b72177bef00766ddcbd
SHA256c476a825ffb5af6afc47516447a8012cdd042dd83a0e14c32646f644cac5741b
SHA5126b1a2bb6199d4bbef57f5794b031fbfce4609aaf5b9dbf2e1fc6575c8ac34aa5c23cf3c2930e5935e8970c66eaeb586a028d24d7730931964ca8e23698041866