Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01-07-2024 10:57
Static task
static1
Behavioral task
behavioral1
Sample
1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe
-
Size
7.2MB
-
MD5
1b07681e664e306e849cfac378fd5c36
-
SHA1
18c2aa65af42a6c17826e65b2d11e7a8da15555b
-
SHA256
edc505c4629a550f9356a06ce7f24bfffca9a39b0dd98da8234b1366b1ec5520
-
SHA512
e38280a95ea0979c54d4832ece66ab7841dc8f8489c5e7a72846e4f733ed60ba8121d0b3ee6dc711936cec54d12c267d1d25923e7bddc97785b57d531d73e97e
-
SSDEEP
196608:BuezwW++1nerHAOdMF69hTmo/7H4gsQ6hAady5q0V+amY:9zw5+crHALF69hTmO7DsVEqVax
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 5 IoCs
Processes:
resource yara_rule behavioral2/memory/2524-6-0x0000000000400000-0x000000000042C000-memory.dmp modiloader_stage2 behavioral2/memory/2524-7-0x0000000000400000-0x000000000042C000-memory.dmp modiloader_stage2 behavioral2/memory/2524-8-0x0000000000400000-0x000000000042C000-memory.dmp modiloader_stage2 behavioral2/memory/2524-5-0x0000000000400000-0x000000000042C000-memory.dmp modiloader_stage2 behavioral2/memory/2524-48-0x0000000000400000-0x000000000042C000-memory.dmp modiloader_stage2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe -
Executes dropped EXE 8 IoCs
Processes:
server.exeUpdater.exeserver.exeUpdater.exeserver.exeserver.exeUpdater.exeUpdater.exepid process 436 server.exe 1648 Updater.exe 4600 server.exe 2176 Updater.exe 1952 server.exe 4716 server.exe 4564 Updater.exe 3332 Updater.exe -
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid process 3448 regsvr32.exe -
Processes:
resource yara_rule behavioral2/memory/4464-124-0x0000000010740000-0x00000000107C2000-memory.dmp upx behavioral2/memory/4464-129-0x0000000002080000-0x000000000208D000-memory.dmp upx behavioral2/memory/4464-133-0x0000000002090000-0x000000000209D000-memory.dmp upx behavioral2/memory/4464-140-0x00000000020A0000-0x00000000020AD000-memory.dmp upx behavioral2/memory/4464-144-0x00000000020B0000-0x00000000020BD000-memory.dmp upx behavioral2/memory/4464-148-0x00000000020C0000-0x00000000020CD000-memory.dmp upx behavioral2/memory/4464-159-0x00000000023E0000-0x00000000023ED000-memory.dmp upx behavioral2/memory/4464-174-0x00000000023F0000-0x00000000023FD000-memory.dmp upx -
Drops file in System32 directory 6 IoCs
Processes:
1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exeserver.exedescription ioc process File created C:\Windows\SysWOW64\server.exe 1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\server.exe 1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\mswinsck.ocx 1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe File created C:\Windows\SysWOW64\Updater.exe 1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Updater.exe 1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe File created C:\Windows\SysWOW64\server.exe server.exe -
Suspicious use of SetThreadContext 10 IoCs
Processes:
1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exeserver.exeUpdater.exedescription pid process target process PID 3172 set thread context of 876 3172 1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe 1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe PID 3172 set thread context of 2524 3172 1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe 1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe PID 3172 set thread context of 1364 3172 1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe 1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe PID 3172 set thread context of 1728 3172 1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe 1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe PID 436 set thread context of 4600 436 server.exe server.exe PID 1648 set thread context of 2176 1648 Updater.exe WerFault.exe PID 436 set thread context of 1952 436 server.exe server.exe PID 436 set thread context of 4716 436 server.exe server.exe PID 1648 set thread context of 4564 1648 Updater.exe server.exe PID 1648 set thread context of 3332 1648 Updater.exe server.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 23 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1836 1364 WerFault.exe 1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe 1536 4716 WerFault.exe server.exe 1424 3332 WerFault.exe Updater.exe 636 3560 WerFault.exe 3096 4896 WerFault.exe server.exe 1604 4360 WerFault.exe Updater.exe 512 3748 WerFault.exe server.exe 4588 2412 WerFault.exe Updater.exe 436 1764 WerFault.exe server.exe 3504 4544 WerFault.exe Updater.exe 2544 3736 WerFault.exe Updater.exe 1876 3848 WerFault.exe server.exe 3324 3332 WerFault.exe server.exe 2664 3660 WerFault.exe Updater.exe 4528 4080 WerFault.exe Updater.exe 3932 1636 WerFault.exe server.exe 4588 3748 WerFault.exe server.exe 1568 4092 WerFault.exe server.exe 1108 3860 WerFault.exe server.exe 4432 5016 WerFault.exe server.exe 2948 2660 WerFault.exe server.exe 4216 1104 WerFault.exe Updater.exe 908 4720 WerFault.exe server.exe -
Modifies registry class 64 IoCs
Processes:
regsvr32.exe1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\ProgID\ = "MSWinsock.Winsock.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Implemented Categories regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Control regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\0\win32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\ = "{248DD890-BB45-11CF-9ABC-0080C7E7B78D}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\ = "DMSWinsockControlEvents" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock.1\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\ToolboxBitmap32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\FLAGS\ = "2" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\ = "IMSWinsockControl" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\VersionIndependentProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Version\ = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Implemented Categories\{40FC6ED4-2438-11CF-A3DB-080036F12502} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\InprocServer32\ = "C:\\Windows\\SysWow64\\mswinsck.ocx" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD897-BB45-11CF-9ABC-0080C7E7B78D} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\FLAGS regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Version regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\ = "{248DD890-BB45-11CF-9ABC-0080C7E7B78D}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\MiscStatus\1\ = "132497" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock\CurVer\ = "MSWinsock.Winsock.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Implemented Categories\{0DE86A52-2BAA-11CF-A229-00AA003D7352} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\MiscStatus regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\MiscStatus\1 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\0\win32\ = "C:\\Windows\\SysWow64\\mswinsck.ocx" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock\CLSID\ = "{248DD896-BB45-11CF-9ABC-0080C7E7B78D}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock.1 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD897-BB45-11CF-9ABC-0080C7E7B78D}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock\ = "Microsoft WinSock Control, version 6.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\ = "Microsoft WinSock Control, version 6.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock.1\CLSID\ = "{248DD896-BB45-11CF-9ABC-0080C7E7B78D}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\HELPDIR\ regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Implemented Categories\{0DE86A57-2BAA-11CF-A229-00AA003D7352} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\ = "DMSWinsockControlEvents" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD897-BB45-11CF-9ABC-0080C7E7B78D} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD897-BB45-11CF-9ABC-0080C7E7B78D}\ = "Winsock General Property Page Object" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\ = "{248DD890-BB45-11CF-9ABC-0080C7E7B78D}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\ToolboxBitmap32\ = "C:\\Windows\\SysWow64\\mswinsck.ocx, 1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock.1\ = "Microsoft WinSock Control, version 6.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Programmable regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
server.exepid process 1952 server.exe 1952 server.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exepid process 1728 1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 59 IoCs
Processes:
1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exeserver.exeUpdater.exedescription pid process target process PID 3172 wrote to memory of 876 3172 1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe 1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe PID 3172 wrote to memory of 876 3172 1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe 1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe PID 3172 wrote to memory of 876 3172 1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe 1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe PID 3172 wrote to memory of 876 3172 1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe 1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe PID 3172 wrote to memory of 876 3172 1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe 1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe PID 3172 wrote to memory of 2524 3172 1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe 1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe PID 3172 wrote to memory of 2524 3172 1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe 1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe PID 3172 wrote to memory of 2524 3172 1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe 1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe PID 3172 wrote to memory of 2524 3172 1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe 1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe PID 3172 wrote to memory of 2524 3172 1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe 1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe PID 3172 wrote to memory of 1364 3172 1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe 1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe PID 3172 wrote to memory of 1364 3172 1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe 1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe PID 3172 wrote to memory of 1364 3172 1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe 1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe PID 3172 wrote to memory of 1364 3172 1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe 1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe PID 3172 wrote to memory of 1364 3172 1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe 1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe PID 2524 wrote to memory of 436 2524 1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe WerFault.exe PID 2524 wrote to memory of 436 2524 1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe WerFault.exe PID 2524 wrote to memory of 436 2524 1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe WerFault.exe PID 3172 wrote to memory of 1728 3172 1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe 1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe PID 3172 wrote to memory of 1728 3172 1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe 1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe PID 3172 wrote to memory of 1728 3172 1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe 1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe PID 3172 wrote to memory of 1728 3172 1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe 1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe PID 3172 wrote to memory of 1728 3172 1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe 1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe PID 1728 wrote to memory of 3448 1728 1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe regsvr32.exe PID 1728 wrote to memory of 3448 1728 1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe regsvr32.exe PID 1728 wrote to memory of 3448 1728 1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe regsvr32.exe PID 1728 wrote to memory of 1648 1728 1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe server.exe PID 1728 wrote to memory of 1648 1728 1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe server.exe PID 1728 wrote to memory of 1648 1728 1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe server.exe PID 436 wrote to memory of 4600 436 server.exe server.exe PID 436 wrote to memory of 4600 436 server.exe server.exe PID 436 wrote to memory of 4600 436 server.exe server.exe PID 436 wrote to memory of 4600 436 server.exe server.exe PID 436 wrote to memory of 4600 436 server.exe server.exe PID 1648 wrote to memory of 2176 1648 Updater.exe WerFault.exe PID 1648 wrote to memory of 2176 1648 Updater.exe WerFault.exe PID 1648 wrote to memory of 2176 1648 Updater.exe WerFault.exe PID 1648 wrote to memory of 2176 1648 Updater.exe WerFault.exe PID 1648 wrote to memory of 2176 1648 Updater.exe WerFault.exe PID 436 wrote to memory of 1952 436 server.exe server.exe PID 436 wrote to memory of 1952 436 server.exe server.exe PID 436 wrote to memory of 1952 436 server.exe server.exe PID 436 wrote to memory of 1952 436 server.exe server.exe PID 436 wrote to memory of 1952 436 server.exe server.exe PID 436 wrote to memory of 4716 436 server.exe server.exe PID 436 wrote to memory of 4716 436 server.exe server.exe PID 436 wrote to memory of 4716 436 server.exe server.exe PID 436 wrote to memory of 4716 436 server.exe server.exe PID 436 wrote to memory of 4716 436 server.exe server.exe PID 1648 wrote to memory of 4564 1648 Updater.exe server.exe PID 1648 wrote to memory of 4564 1648 Updater.exe server.exe PID 1648 wrote to memory of 4564 1648 Updater.exe server.exe PID 1648 wrote to memory of 4564 1648 Updater.exe server.exe PID 1648 wrote to memory of 4564 1648 Updater.exe server.exe PID 1648 wrote to memory of 3332 1648 Updater.exe server.exe PID 1648 wrote to memory of 3332 1648 Updater.exe server.exe PID 1648 wrote to memory of 3332 1648 Updater.exe server.exe PID 1648 wrote to memory of 3332 1648 Updater.exe server.exe PID 1648 wrote to memory of 3332 1648 Updater.exe server.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe2⤵
-
C:\Users\Admin\AppData\Local\Temp\1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe2⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" \melt "C:\Users\Admin\AppData\Local\Temp\1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\server.exeC:\Windows\SysWOW64\server.exe4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\server.exeC:\Windows\SysWOW64\server.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Roaming\server.exe"C:\Users\Admin\AppData\Roaming\server.exe" \melt "C:\Windows\SysWOW64\server.exe"5⤵
-
C:\Users\Admin\AppData\Roaming\server.exeC:\Users\Admin\AppData\Roaming\server.exe6⤵
-
C:\Users\Admin\AppData\Roaming\server.exeC:\Users\Admin\AppData\Roaming\server.exe6⤵
-
C:\Users\Admin\AppData\Roaming\server.exe"C:\Users\Admin\AppData\Roaming\server.exe" \melt "C:\Users\Admin\AppData\Roaming\server.exe"7⤵
-
C:\Users\Admin\AppData\Roaming\server.exeC:\Users\Admin\AppData\Roaming\server.exe8⤵
-
C:\Users\Admin\AppData\Roaming\server.exeC:\Users\Admin\AppData\Roaming\server.exe8⤵
-
C:\Users\Admin\AppData\Roaming\server.exe"C:\Users\Admin\AppData\Roaming\server.exe" \melt "C:\Users\Admin\AppData\Roaming\server.exe"9⤵
-
C:\Users\Admin\AppData\Roaming\server.exeC:\Users\Admin\AppData\Roaming\server.exe10⤵
-
C:\Users\Admin\AppData\Roaming\server.exeC:\Users\Admin\AppData\Roaming\server.exe10⤵
-
C:\Users\Admin\AppData\Roaming\server.exe"C:\Users\Admin\AppData\Roaming\server.exe" \melt "C:\Users\Admin\AppData\Roaming\server.exe"11⤵
-
C:\Users\Admin\AppData\Roaming\server.exeC:\Users\Admin\AppData\Roaming\server.exe12⤵
-
C:\Users\Admin\AppData\Roaming\server.exeC:\Users\Admin\AppData\Roaming\server.exe10⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5016 -s 46011⤵
- Program crash
-
C:\Users\Admin\AppData\Roaming\server.exeC:\Users\Admin\AppData\Roaming\server.exe10⤵
-
C:\Users\Admin\AppData\Roaming\server.exeC:\Users\Admin\AppData\Roaming\server.exe8⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1764 -s 4609⤵
- Program crash
-
C:\Users\Admin\AppData\Roaming\server.exeC:\Users\Admin\AppData\Roaming\server.exe8⤵
-
C:\Windows\SysWOW64\Updater.exeC:\Windows\system32\Updater.exe9⤵
-
C:\Windows\SysWOW64\Updater.exeC:\Windows\SysWOW64\Updater.exe10⤵
-
C:\Windows\SysWOW64\Updater.exeC:\Windows\SysWOW64\Updater.exe10⤵
-
C:\Users\Admin\AppData\Roaming\server.exe"C:\Users\Admin\AppData\Roaming\server.exe" \melt "C:\Windows\SysWOW64\Updater.exe"11⤵
-
C:\Users\Admin\AppData\Roaming\server.exeC:\Users\Admin\AppData\Roaming\server.exe12⤵
-
C:\Users\Admin\AppData\Roaming\server.exeC:\Users\Admin\AppData\Roaming\server.exe12⤵
-
C:\Users\Admin\AppData\Roaming\server.exe"C:\Users\Admin\AppData\Roaming\server.exe" \melt "C:\Users\Admin\AppData\Roaming\server.exe"13⤵
-
C:\Users\Admin\AppData\Roaming\server.exeC:\Users\Admin\AppData\Roaming\server.exe12⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2660 -s 46013⤵
- Program crash
-
C:\Users\Admin\AppData\Roaming\server.exeC:\Users\Admin\AppData\Roaming\server.exe12⤵
-
C:\Windows\SysWOW64\Updater.exeC:\Windows\SysWOW64\Updater.exe10⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 46011⤵
- Program crash
-
C:\Windows\SysWOW64\Updater.exeC:\Windows\SysWOW64\Updater.exe10⤵
-
C:\Windows\SysWOW64\Updater.exeC:\Windows\system32\Updater.exe11⤵
-
C:\Windows\SysWOW64\Updater.exeC:\Windows\SysWOW64\Updater.exe12⤵
-
C:\Windows\SysWOW64\Updater.exeC:\Windows\SysWOW64\Updater.exe12⤵
-
C:\Users\Admin\AppData\Roaming\server.exe"C:\Users\Admin\AppData\Roaming\server.exe" \melt "C:\Windows\SysWOW64\Updater.exe"13⤵
-
C:\Windows\SysWOW64\Updater.exeC:\Windows\SysWOW64\Updater.exe12⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1104 -s 46413⤵
- Program crash
-
C:\Windows\SysWOW64\Updater.exeC:\Windows\SysWOW64\Updater.exe12⤵
-
C:\Windows\SysWOW64\Updater.exeC:\Windows\system32\Updater.exe13⤵
-
C:\Users\Admin\AppData\Roaming\server.exeC:\Users\Admin\AppData\Roaming\server.exe8⤵
-
C:\Users\Admin\AppData\Roaming\server.exeC:\Users\Admin\AppData\Roaming\server.exe6⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4896 -s 4607⤵
- Program crash
-
C:\Users\Admin\AppData\Roaming\server.exeC:\Users\Admin\AppData\Roaming\server.exe6⤵
-
C:\Windows\SysWOW64\Updater.exeC:\Windows\system32\Updater.exe7⤵
-
C:\Windows\SysWOW64\Updater.exeC:\Windows\SysWOW64\Updater.exe8⤵
-
C:\Windows\SysWOW64\Updater.exeC:\Windows\SysWOW64\Updater.exe8⤵
-
C:\Users\Admin\AppData\Roaming\server.exe"C:\Users\Admin\AppData\Roaming\server.exe" \melt "C:\Windows\SysWOW64\Updater.exe"9⤵
-
C:\Users\Admin\AppData\Roaming\server.exeC:\Users\Admin\AppData\Roaming\server.exe10⤵
-
C:\Users\Admin\AppData\Roaming\server.exeC:\Users\Admin\AppData\Roaming\server.exe10⤵
-
C:\Users\Admin\AppData\Roaming\server.exe"C:\Users\Admin\AppData\Roaming\server.exe" \melt "C:\Users\Admin\AppData\Roaming\server.exe"11⤵
-
C:\Users\Admin\AppData\Roaming\server.exeC:\Users\Admin\AppData\Roaming\server.exe12⤵
-
C:\Users\Admin\AppData\Roaming\server.exeC:\Users\Admin\AppData\Roaming\server.exe10⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4092 -s 46011⤵
- Program crash
-
C:\Users\Admin\AppData\Roaming\server.exeC:\Users\Admin\AppData\Roaming\server.exe10⤵
-
C:\Windows\SysWOW64\Updater.exeC:\Windows\SysWOW64\Updater.exe8⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3736 -s 4609⤵
- Program crash
-
C:\Windows\SysWOW64\Updater.exeC:\Windows\SysWOW64\Updater.exe8⤵
-
C:\Windows\SysWOW64\Updater.exeC:\Windows\system32\Updater.exe9⤵
-
C:\Windows\SysWOW64\Updater.exeC:\Windows\SysWOW64\Updater.exe10⤵
-
C:\Windows\SysWOW64\Updater.exeC:\Windows\SysWOW64\Updater.exe10⤵
-
C:\Users\Admin\AppData\Roaming\server.exe"C:\Users\Admin\AppData\Roaming\server.exe" \melt "C:\Windows\SysWOW64\Updater.exe"11⤵
-
C:\Users\Admin\AppData\Roaming\server.exeC:\Users\Admin\AppData\Roaming\server.exe12⤵
-
C:\Users\Admin\AppData\Roaming\server.exeC:\Users\Admin\AppData\Roaming\server.exe12⤵
-
C:\Users\Admin\AppData\Roaming\server.exe"C:\Users\Admin\AppData\Roaming\server.exe" \melt "C:\Users\Admin\AppData\Roaming\server.exe"13⤵
-
C:\Users\Admin\AppData\Roaming\server.exeC:\Users\Admin\AppData\Roaming\server.exe12⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4720 -s 46013⤵
- Program crash
-
C:\Users\Admin\AppData\Roaming\server.exeC:\Users\Admin\AppData\Roaming\server.exe12⤵
-
C:\Windows\SysWOW64\Updater.exeC:\Windows\SysWOW64\Updater.exe10⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3660 -s 46011⤵
- Program crash
-
C:\Windows\SysWOW64\Updater.exeC:\Windows\SysWOW64\Updater.exe10⤵
-
C:\Windows\SysWOW64\Updater.exeC:\Windows\SysWOW64\Updater.exe8⤵
-
C:\Users\Admin\AppData\Roaming\server.exeC:\Users\Admin\AppData\Roaming\server.exe6⤵
-
C:\Windows\SysWOW64\server.exeC:\Windows\SysWOW64\server.exe4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4716 -s 4605⤵
- Program crash
-
C:\Windows\SysWOW64\server.exeC:\Windows\SysWOW64\server.exe4⤵
-
C:\Windows\SysWOW64\Updater.exeC:\Windows\system32\Updater.exe5⤵
-
C:\Windows\SysWOW64\Updater.exeC:\Windows\SysWOW64\Updater.exe6⤵
-
C:\Windows\SysWOW64\Updater.exeC:\Windows\SysWOW64\Updater.exe6⤵
-
C:\Users\Admin\AppData\Roaming\server.exe"C:\Users\Admin\AppData\Roaming\server.exe" \melt "C:\Windows\SysWOW64\Updater.exe"7⤵
-
C:\Users\Admin\AppData\Roaming\server.exeC:\Users\Admin\AppData\Roaming\server.exe8⤵
-
C:\Users\Admin\AppData\Roaming\server.exeC:\Users\Admin\AppData\Roaming\server.exe8⤵
-
C:\Users\Admin\AppData\Roaming\server.exe"C:\Users\Admin\AppData\Roaming\server.exe" \melt "C:\Users\Admin\AppData\Roaming\server.exe"9⤵
-
C:\Users\Admin\AppData\Roaming\server.exeC:\Users\Admin\AppData\Roaming\server.exe10⤵
-
C:\Users\Admin\AppData\Roaming\server.exeC:\Users\Admin\AppData\Roaming\server.exe10⤵
-
C:\Users\Admin\AppData\Roaming\server.exe"C:\Users\Admin\AppData\Roaming\server.exe" \melt "C:\Users\Admin\AppData\Roaming\server.exe"11⤵
-
C:\Users\Admin\AppData\Roaming\server.exeC:\Users\Admin\AppData\Roaming\server.exe12⤵
-
C:\Users\Admin\AppData\Roaming\server.exeC:\Users\Admin\AppData\Roaming\server.exe12⤵
-
C:\Users\Admin\AppData\Roaming\server.exeC:\Users\Admin\AppData\Roaming\server.exe10⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3748 -s 46011⤵
- Program crash
-
C:\Users\Admin\AppData\Roaming\server.exeC:\Users\Admin\AppData\Roaming\server.exe10⤵
-
C:\Users\Admin\AppData\Roaming\server.exeC:\Users\Admin\AppData\Roaming\server.exe8⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3848 -s 4609⤵
- Program crash
-
C:\Users\Admin\AppData\Roaming\server.exeC:\Users\Admin\AppData\Roaming\server.exe8⤵
-
C:\Users\Admin\AppData\Roaming\server.exeC:\Users\Admin\AppData\Roaming\server.exe8⤵
-
C:\Windows\SysWOW64\Updater.exeC:\Windows\SysWOW64\Updater.exe6⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4360 -s 4647⤵
- Program crash
-
C:\Windows\SysWOW64\Updater.exeC:\Windows\SysWOW64\Updater.exe6⤵
-
C:\Windows\SysWOW64\Updater.exeC:\Windows\system32\Updater.exe7⤵
-
C:\Windows\SysWOW64\Updater.exeC:\Windows\SysWOW64\Updater.exe8⤵
-
C:\Windows\SysWOW64\Updater.exeC:\Windows\SysWOW64\Updater.exe8⤵
-
C:\Users\Admin\AppData\Roaming\server.exe"C:\Users\Admin\AppData\Roaming\server.exe" \melt "C:\Windows\SysWOW64\Updater.exe"9⤵
-
C:\Users\Admin\AppData\Roaming\server.exeC:\Users\Admin\AppData\Roaming\server.exe10⤵
-
C:\Users\Admin\AppData\Roaming\server.exeC:\Users\Admin\AppData\Roaming\server.exe10⤵
-
C:\Users\Admin\AppData\Roaming\server.exe"C:\Users\Admin\AppData\Roaming\server.exe" \melt "C:\Users\Admin\AppData\Roaming\server.exe"11⤵
-
C:\Users\Admin\AppData\Roaming\server.exeC:\Users\Admin\AppData\Roaming\server.exe12⤵
-
C:\Users\Admin\AppData\Roaming\server.exeC:\Users\Admin\AppData\Roaming\server.exe10⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1636 -s 46011⤵
- Program crash
-
C:\Users\Admin\AppData\Roaming\server.exeC:\Users\Admin\AppData\Roaming\server.exe10⤵
-
C:\Windows\SysWOW64\Updater.exeC:\Windows\system32\Updater.exe11⤵
-
C:\Windows\SysWOW64\Updater.exeC:\Windows\SysWOW64\Updater.exe12⤵
-
C:\Windows\SysWOW64\Updater.exeC:\Windows\SysWOW64\Updater.exe8⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4544 -s 4609⤵
- Program crash
-
C:\Windows\SysWOW64\Updater.exeC:\Windows\SysWOW64\Updater.exe8⤵
-
C:\Windows\SysWOW64\Updater.exeC:\Windows\SysWOW64\Updater.exe8⤵
-
C:\Windows\SysWOW64\Updater.exeC:\Windows\SysWOW64\Updater.exe6⤵
-
C:\Windows\SysWOW64\server.exeC:\Windows\SysWOW64\server.exe4⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
-
C:\Windows\SysWOW64\server.exeC:\Windows\SysWOW64\server.exe5⤵
-
C:\Users\Admin\AppData\Local\Temp\1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1364 -s 4603⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe2⤵
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Windows\system32\mswinsck.ocx"3⤵
- Loads dropped DLL
- Modifies registry class
-
C:\Windows\SysWOW64\Updater.exeC:\Windows\system32\Updater.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Updater.exeC:\Windows\SysWOW64\Updater.exe4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Updater.exeC:\Windows\SysWOW64\Updater.exe4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\server.exe"C:\Users\Admin\AppData\Roaming\server.exe" \melt "C:\Windows\SysWOW64\Updater.exe"5⤵
-
C:\Users\Admin\AppData\Roaming\server.exeC:\Users\Admin\AppData\Roaming\server.exe6⤵
-
C:\Users\Admin\AppData\Roaming\server.exeC:\Users\Admin\AppData\Roaming\server.exe6⤵
-
C:\Users\Admin\AppData\Roaming\server.exe"C:\Users\Admin\AppData\Roaming\server.exe" \melt "C:\Users\Admin\AppData\Roaming\server.exe"7⤵
-
C:\Users\Admin\AppData\Roaming\server.exeC:\Users\Admin\AppData\Roaming\server.exe8⤵
-
C:\Users\Admin\AppData\Roaming\server.exeC:\Users\Admin\AppData\Roaming\server.exe8⤵
-
C:\Users\Admin\AppData\Roaming\server.exe"C:\Users\Admin\AppData\Roaming\server.exe" \melt "C:\Users\Admin\AppData\Roaming\server.exe"9⤵
-
C:\Users\Admin\AppData\Roaming\server.exeC:\Users\Admin\AppData\Roaming\server.exe10⤵
-
C:\Users\Admin\AppData\Roaming\server.exeC:\Users\Admin\AppData\Roaming\server.exe10⤵
-
C:\Users\Admin\AppData\Roaming\server.exe"C:\Users\Admin\AppData\Roaming\server.exe" \melt "C:\Users\Admin\AppData\Roaming\server.exe"11⤵
-
C:\Users\Admin\AppData\Roaming\server.exeC:\Users\Admin\AppData\Roaming\server.exe12⤵
-
C:\Users\Admin\AppData\Roaming\server.exeC:\Users\Admin\AppData\Roaming\server.exe10⤵
-
C:\Users\Admin\AppData\Roaming\server.exeC:\Users\Admin\AppData\Roaming\server.exe10⤵
-
C:\Users\Admin\AppData\Roaming\server.exeC:\Users\Admin\AppData\Roaming\server.exe8⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3332 -s 4609⤵
- Program crash
-
C:\Users\Admin\AppData\Roaming\server.exeC:\Users\Admin\AppData\Roaming\server.exe8⤵
-
C:\Users\Admin\AppData\Roaming\server.exeC:\Users\Admin\AppData\Roaming\server.exe8⤵
-
C:\Users\Admin\AppData\Roaming\server.exeC:\Users\Admin\AppData\Roaming\server.exe6⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3748 -s 4607⤵
- Program crash
-
C:\Users\Admin\AppData\Roaming\server.exeC:\Users\Admin\AppData\Roaming\server.exe6⤵
-
C:\Users\Admin\AppData\Roaming\server.exeC:\Users\Admin\AppData\Roaming\server.exe6⤵
-
C:\Windows\SysWOW64\Updater.exeC:\Windows\SysWOW64\Updater.exe4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3332 -s 4605⤵
- Program crash
-
C:\Windows\SysWOW64\Updater.exeC:\Windows\SysWOW64\Updater.exe4⤵
-
C:\Windows\SysWOW64\Updater.exeC:\Windows\system32\Updater.exe5⤵
-
C:\Windows\SysWOW64\Updater.exeC:\Windows\SysWOW64\Updater.exe6⤵
-
C:\Windows\SysWOW64\Updater.exeC:\Windows\SysWOW64\Updater.exe6⤵
-
C:\Users\Admin\AppData\Roaming\server.exe"C:\Users\Admin\AppData\Roaming\server.exe" \melt "C:\Windows\SysWOW64\Updater.exe"7⤵
-
C:\Users\Admin\AppData\Roaming\server.exeC:\Users\Admin\AppData\Roaming\server.exe8⤵
-
C:\Users\Admin\AppData\Roaming\server.exeC:\Users\Admin\AppData\Roaming\server.exe8⤵
-
C:\Users\Admin\AppData\Roaming\server.exe"C:\Users\Admin\AppData\Roaming\server.exe" \melt "C:\Users\Admin\AppData\Roaming\server.exe"9⤵
-
C:\Users\Admin\AppData\Roaming\server.exeC:\Users\Admin\AppData\Roaming\server.exe10⤵
-
C:\Users\Admin\AppData\Roaming\server.exeC:\Users\Admin\AppData\Roaming\server.exe10⤵
-
C:\Users\Admin\AppData\Roaming\server.exe"C:\Users\Admin\AppData\Roaming\server.exe" \melt "C:\Users\Admin\AppData\Roaming\server.exe"11⤵
-
C:\Users\Admin\AppData\Roaming\server.exeC:\Users\Admin\AppData\Roaming\server.exe12⤵
-
C:\Users\Admin\AppData\Roaming\server.exeC:\Users\Admin\AppData\Roaming\server.exe10⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3860 -s 46411⤵
- Program crash
-
C:\Users\Admin\AppData\Roaming\server.exeC:\Users\Admin\AppData\Roaming\server.exe10⤵
-
C:\Users\Admin\AppData\Roaming\server.exeC:\Users\Admin\AppData\Roaming\server.exe8⤵
-
C:\Users\Admin\AppData\Roaming\server.exeC:\Users\Admin\AppData\Roaming\server.exe8⤵
-
C:\Users\Admin\AppData\Roaming\server.exeC:\Users\Admin\AppData\Roaming\server.exe8⤵
-
C:\Windows\SysWOW64\Updater.exeC:\Windows\SysWOW64\Updater.exe6⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2412 -s 4687⤵
- Program crash
-
C:\Windows\SysWOW64\Updater.exeC:\Windows\SysWOW64\Updater.exe6⤵
-
C:\Windows\SysWOW64\Updater.exeC:\Windows\SysWOW64\Updater.exe6⤵
-
C:\Windows\SysWOW64\Updater.exeC:\Windows\SysWOW64\Updater.exe4⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
-
C:\Windows\SysWOW64\Updater.exeC:\Windows\SysWOW64\Updater.exe5⤵
-
C:\Users\Admin\AppData\Local\Temp\1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\1b07681e664e306e849cfac378fd5c36_JaffaCakes118.exe2⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
-
C:\Users\Admin\AppData\Roaming\SpywareCease_Setup.exe"C:\Users\Admin\AppData\Roaming\SpywareCease_Setup.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\is-IG2E1.tmp\SpywareCease_Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-IG2E1.tmp\SpywareCease_Setup.tmp" /SL5="$701D2,5942796,78848,C:\Users\Admin\AppData\Roaming\SpywareCease_Setup.exe"3⤵
-
C:\Users\Admin\AppData\Roaming\steal.exe"C:\Users\Admin\AppData\Roaming\steal.exe"2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3560 -s 10003⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 1364 -ip 13641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 4716 -ip 47161⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3332 -ip 33321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3560 -ip 35601⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4896 -ip 48961⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4360 -ip 43601⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 200 -p 3748 -ip 37481⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2412 -ip 24121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 1764 -ip 17641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3848 -ip 38481⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3736 -ip 37361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4544 -ip 45441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 3332 -ip 33321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 2936 -ip 29361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3660 -ip 36601⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4080 -ip 40801⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 1636 -ip 16361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3748 -ip 37481⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 4092 -ip 40921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 5016 -ip 50161⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 5000 -ip 50001⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 3860 -ip 38601⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 2660 -ip 26601⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4720 -ip 47201⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 1104 -ip 11041⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\is-IG2E1.tmp\SpywareCease_Setup.tmpFilesize
694KB
MD524bc6f2072e1806252dddbdffb5e0520
SHA16a3a4146f4981d141ab6ae4665ef41ed8e611364
SHA25698f59e925888ce7a96d638c67ba884f374d7ecf2c8a2a62b36c5f9f718e2b812
SHA512f605603e87a29af7ec020f231b8a9f09b87e3e763701e9602ea27a442db3ab8457e864482ee1aebc80f50f0a81f67c18d3ff260723a7967f4e946b76daa361d0
-
C:\Users\Admin\AppData\Roaming\SpywareCease_Setup.exeFilesize
5.9MB
MD5c4c214bb68de61f34e0a67c299512cdc
SHA1521f4c321036275d5e6a870c13a301de6abb8d3b
SHA2567c81b04ec8d4b25ff58c565d82fe044ce0afb0fe2f2cff2594e3fbf68bed429a
SHA5121ca6a8bc112cc95d30e2aeed60c39dcc74239f45cd270c3844784b8b72e9cfe38f4d6e8fb2bdc86c85b1fd42f36e2ba43b1e779ceeebd6e00702e3f0da7203eb
-
C:\Users\Admin\AppData\Roaming\steal.exeFilesize
417KB
MD58d3c3a966d27dd1008875c5f61400fdd
SHA13b1c247c7d7e178ac12b4ad0ec45015493efa5ac
SHA256bbff7fcd84a4dcb6a961824d053fda22a555637bcdbc4a7846da6832509f223e
SHA51261f5863768a6b2f8121876186bb880ca0775e699bec6da2f7af6bda97d1dd83f707e2fce0f5e0e239bc35d66d5fdda7a153ea9342d0436ca75781cdd50a363f6
-
C:\Windows\SysWOW64\mswinsck.ocxFilesize
105KB
MD59484c04258830aa3c2f2a70eb041414c
SHA1b242a4fb0e9dcf14cb51dc36027baff9a79cb823
SHA256bf7e47c16d7e1c0e88534f4ef95e09d0fd821ed1a06b0d95a389b35364b63ff5
SHA5129d0e9f0d88594746ba41ea4a61a53498619eda596e12d8ec37d01cfe8ceb08be13e3727c83d630a6d9e6d03066f62444bb94ea5a0d2ed9d21a270e612db532a0
-
C:\Windows\SysWOW64\server.exeFilesize
7.2MB
MD51b07681e664e306e849cfac378fd5c36
SHA118c2aa65af42a6c17826e65b2d11e7a8da15555b
SHA256edc505c4629a550f9356a06ce7f24bfffca9a39b0dd98da8234b1366b1ec5520
SHA512e38280a95ea0979c54d4832ece66ab7841dc8f8489c5e7a72846e4f733ed60ba8121d0b3ee6dc711936cec54d12c267d1d25923e7bddc97785b57d531d73e97e
-
memory/876-2-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/876-0-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/876-4-0x0000000000020000-0x0000000000031000-memory.dmpFilesize
68KB
-
memory/876-3-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/1364-11-0x0000000000400000-0x0000000000403000-memory.dmpFilesize
12KB
-
memory/1364-9-0x0000000000400000-0x0000000000403000-memory.dmpFilesize
12KB
-
memory/1728-46-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/1728-47-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/2524-5-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB
-
memory/2524-48-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB
-
memory/2524-6-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB
-
memory/2524-7-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB
-
memory/2524-8-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB
-
memory/4464-140-0x00000000020A0000-0x00000000020AD000-memory.dmpFilesize
52KB
-
memory/4464-133-0x0000000002090000-0x000000000209D000-memory.dmpFilesize
52KB
-
memory/4464-129-0x0000000002080000-0x000000000208D000-memory.dmpFilesize
52KB
-
memory/4464-144-0x00000000020B0000-0x00000000020BD000-memory.dmpFilesize
52KB
-
memory/4464-148-0x00000000020C0000-0x00000000020CD000-memory.dmpFilesize
52KB
-
memory/4464-159-0x00000000023E0000-0x00000000023ED000-memory.dmpFilesize
52KB
-
memory/4464-124-0x0000000010740000-0x00000000107C2000-memory.dmpFilesize
520KB
-
memory/4464-120-0x0000000000400000-0x0000000000471000-memory.dmpFilesize
452KB
-
memory/4464-118-0x0000000000400000-0x0000000000471000-memory.dmpFilesize
452KB
-
memory/4464-174-0x00000000023F0000-0x00000000023FD000-memory.dmpFilesize
52KB