Analysis
-
max time kernel
147s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18-04-2024 00:38
Static task
static1
Behavioral task
behavioral1
Sample
f6ebb390486658cba3b8b3f7b4babd9e_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f6ebb390486658cba3b8b3f7b4babd9e_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f6ebb390486658cba3b8b3f7b4babd9e_JaffaCakes118.exe
-
Size
200KB
-
MD5
f6ebb390486658cba3b8b3f7b4babd9e
-
SHA1
a5a30a39a4250d0d313ed160e46a38e4d6ea3636
-
SHA256
70a89265d7af1531e4466558c5f19c3095a66892316f4b2c5d2d4275d1b3a949
-
SHA512
bd7603b78a8bd550b4a616d13b3637bb132d1307e0d82c6fff207a1a5eaf8195b0eb236de2a8190916ddd4bbf0d729cd2cecb89f67cdab0d2dd401f11ca19517
-
SSDEEP
3072:Kcv78rdMCuJNkQIbRiHfpGJ007ZBgM8gxHy+gXKq+Fnwpd3qLsRRlYm99M:KZVup2khY007Zl5v7pFnwrqOci9M
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x0007000000014b12-60.dat acprotect -
Executes dropped EXE 2 IoCs
pid Process 2448 1.exe 2424 windex.exe -
Loads dropped DLL 8 IoCs
pid Process 2636 f6ebb390486658cba3b8b3f7b4babd9e_JaffaCakes118.exe 2636 f6ebb390486658cba3b8b3f7b4babd9e_JaffaCakes118.exe 2636 f6ebb390486658cba3b8b3f7b4babd9e_JaffaCakes118.exe 2448 1.exe 2448 1.exe 2424 windex.exe 1892 regsvr32.exe 2424 windex.exe -
resource yara_rule behavioral1/memory/2448-37-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/files/0x000c00000001444f-34.dat upx behavioral1/memory/2448-52-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2424-62-0x0000000010000000-0x0000000010014000-memory.dmp upx behavioral1/files/0x0007000000014b12-60.dat upx behavioral1/memory/2424-69-0x0000000010000000-0x0000000010014000-memory.dmp upx behavioral1/memory/2424-68-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2424-70-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2424-72-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2424-73-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2424-75-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2424-77-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2424-79-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2424-81-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2424-83-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2424-85-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2424-87-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2424-89-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2424-91-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2424-93-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2424-95-0x0000000000400000-0x0000000000458000-memory.dmp upx -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Xhb789nyA = "\"C:\\Program Files (x86)\\windex.exe\"" windex.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\2lTT2JBza = "\"C:\\Program Files (x86)\\windex.exe\"" windex.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\zk21i5r8 = "\"C:\\Program Files (x86)\\windex.exe\"" 1.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\2lTT2JBza = "\"C:\\Program Files (x86)\\windex.exe\"" 1.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\zlib.dll windex.exe File opened for modification C:\Windows\SysWOW64\mswinsck.ocx windex.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2972 set thread context of 2636 2972 f6ebb390486658cba3b8b3f7b4babd9e_JaffaCakes118.exe 29 -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\windex.exe 1.exe File created C:\Program Files (x86)\windex.exe 1.exe File opened for modification C:\Program Files (x86)\windex.exe windex.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\InprocServer32\ = "C:\\Windows\\SysWow64\\mswinsck.ocx" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock.1 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\VersionIndependentProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Implemented Categories regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\MiscStatus regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\ = "IMSWinsockControl" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\0\win32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\ = "{248DD890-BB45-11CF-9ABC-0080C7E7B78D}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock\CLSID\ = "{248DD896-BB45-11CF-9ABC-0080C7E7B78D}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock\CurVer regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\ProgID\ = "MSWinsock.Winsock.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\ = "Microsoft WinSock Control, version 6.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Version regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Implemented Categories\{0DE86A57-2BAA-11CF-A229-00AA003D7352} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\0\win32\ = "C:\\Windows\\SysWow64\\mswinsck.ocx" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\HELPDIR\ regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Programmable regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\ToolboxBitmap32\ = "C:\\Windows\\SysWow64\\mswinsck.ocx, 1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock\ = "Microsoft WinSock Control, version 6.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\ = "{248DD890-BB45-11CF-9ABC-0080C7E7B78D}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock.1\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Version\ = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Control regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD897-BB45-11CF-9ABC-0080C7E7B78D} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\ = "Microsoft Winsock Control 6.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\FLAGS\ = "2" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\ = "{248DD890-BB45-11CF-9ABC-0080C7E7B78D}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\ = "{248DD890-BB45-11CF-9ABC-0080C7E7B78D}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\VersionIndependentProgID\ = "MSWinsock.Winsock" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD897-BB45-11CF-9ABC-0080C7E7B78D} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD897-BB45-11CF-9ABC-0080C7E7B78D}\ = "Winsock General Property Page Object" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\FLAGS regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock\CurVer\ = "MSWinsock.Winsock.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock.1\ = "Microsoft WinSock Control, version 6.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\ = "DMSWinsockControlEvents" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD897-BB45-11CF-9ABC-0080C7E7B78D}\InprocServer32\ = "C:\\Windows\\SysWow64\\mswinsck.ocx" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\ = "IMSWinsockControl" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Implemented Categories\{0DE86A53-2BAA-11CF-A229-00AA003D7352} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD897-BB45-11CF-9ABC-0080C7E7B78D}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Implemented Categories\{40FC6ED5-2438-11CF-A3DB-080036F12502} regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2448 1.exe 2448 1.exe 2448 1.exe 2448 1.exe 2448 1.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2972 f6ebb390486658cba3b8b3f7b4babd9e_JaffaCakes118.exe 2636 f6ebb390486658cba3b8b3f7b4babd9e_JaffaCakes118.exe 2448 1.exe 2424 windex.exe 2424 windex.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2972 wrote to memory of 2636 2972 f6ebb390486658cba3b8b3f7b4babd9e_JaffaCakes118.exe 29 PID 2972 wrote to memory of 2636 2972 f6ebb390486658cba3b8b3f7b4babd9e_JaffaCakes118.exe 29 PID 2972 wrote to memory of 2636 2972 f6ebb390486658cba3b8b3f7b4babd9e_JaffaCakes118.exe 29 PID 2972 wrote to memory of 2636 2972 f6ebb390486658cba3b8b3f7b4babd9e_JaffaCakes118.exe 29 PID 2972 wrote to memory of 2636 2972 f6ebb390486658cba3b8b3f7b4babd9e_JaffaCakes118.exe 29 PID 2972 wrote to memory of 2636 2972 f6ebb390486658cba3b8b3f7b4babd9e_JaffaCakes118.exe 29 PID 2972 wrote to memory of 2636 2972 f6ebb390486658cba3b8b3f7b4babd9e_JaffaCakes118.exe 29 PID 2972 wrote to memory of 2636 2972 f6ebb390486658cba3b8b3f7b4babd9e_JaffaCakes118.exe 29 PID 2636 wrote to memory of 2720 2636 f6ebb390486658cba3b8b3f7b4babd9e_JaffaCakes118.exe 30 PID 2636 wrote to memory of 2720 2636 f6ebb390486658cba3b8b3f7b4babd9e_JaffaCakes118.exe 30 PID 2636 wrote to memory of 2720 2636 f6ebb390486658cba3b8b3f7b4babd9e_JaffaCakes118.exe 30 PID 2636 wrote to memory of 2720 2636 f6ebb390486658cba3b8b3f7b4babd9e_JaffaCakes118.exe 30 PID 2636 wrote to memory of 2448 2636 f6ebb390486658cba3b8b3f7b4babd9e_JaffaCakes118.exe 31 PID 2636 wrote to memory of 2448 2636 f6ebb390486658cba3b8b3f7b4babd9e_JaffaCakes118.exe 31 PID 2636 wrote to memory of 2448 2636 f6ebb390486658cba3b8b3f7b4babd9e_JaffaCakes118.exe 31 PID 2636 wrote to memory of 2448 2636 f6ebb390486658cba3b8b3f7b4babd9e_JaffaCakes118.exe 31 PID 2448 wrote to memory of 2424 2448 1.exe 32 PID 2448 wrote to memory of 2424 2448 1.exe 32 PID 2448 wrote to memory of 2424 2448 1.exe 32 PID 2448 wrote to memory of 2424 2448 1.exe 32 PID 2424 wrote to memory of 1892 2424 windex.exe 33 PID 2424 wrote to memory of 1892 2424 windex.exe 33 PID 2424 wrote to memory of 1892 2424 windex.exe 33 PID 2424 wrote to memory of 1892 2424 windex.exe 33 PID 2424 wrote to memory of 1892 2424 windex.exe 33 PID 2424 wrote to memory of 1892 2424 windex.exe 33 PID 2424 wrote to memory of 1892 2424 windex.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6ebb390486658cba3b8b3f7b4babd9e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f6ebb390486658cba3b8b3f7b4babd9e_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Users\Admin\AppData\Local\Temp\f6ebb390486658cba3b8b3f7b4babd9e_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f6ebb390486658cba3b8b3f7b4babd9e_JaffaCakes118.exe2⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" "C:\Users\Admin\AppData\Local\Temp\f6ebb390486658cba3b8b3f7b4babd9e_JaffaCakes118.exe"3⤵PID:2720
-
-
C:\Users\Admin\AppData\Roaming\1.exeC:\Users\Admin\AppData\Roaming\1.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Program Files (x86)\windex.exe"C:\Program Files (x86)\windex.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\Windows\system32\mswinsck.ocx"5⤵
- Loads dropped DLL
- Modifies registry class
PID:1892
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
150KB
MD58a1387ba854eebae1ee7639ce3500e97
SHA1fcbf3f18265f27afce33c196b42547a214b95cdb
SHA2565d1dca9c58b69ec17b1400b1a3ce5abec57a41ca0bc9ed95aefead48aab18811
SHA512bb9167ee52b8a2496f115e212629c59b91df9a0591f1c70204326c28f5f13443ff5ea64c55b76ced85513d295e9583261fb0a87f493fbdd83abe0362062e320c
-
Filesize
1.1MB
MD5e14ba6a9464bed1127c50214acaf0c1a
SHA13eeda63ac8209ffa2e1beeefdde6531e61f8dc4d
SHA256fd250c2054019c58dd71ac4469ee821b67dfa36a439091ad17969f6d4090da38
SHA51255a7ad5ea8617e8066b2854556e54e1688c70d80b6921eab3020a1bb6cc741320f5f0d63cf067864505877e010d69caa2a7bff890dd037da7efbc3e679ab9c26
-
Filesize
105KB
MD59484c04258830aa3c2f2a70eb041414c
SHA1b242a4fb0e9dcf14cb51dc36027baff9a79cb823
SHA256bf7e47c16d7e1c0e88534f4ef95e09d0fd821ed1a06b0d95a389b35364b63ff5
SHA5129d0e9f0d88594746ba41ea4a61a53498619eda596e12d8ec37d01cfe8ceb08be13e3727c83d630a6d9e6d03066f62444bb94ea5a0d2ed9d21a270e612db532a0
-
Filesize
27KB
MD5200d52d81e9b4b05fa58ce5fbe511dba
SHA1c0d809ee93816d87388ed4e7fd6fca93d70294d2
SHA256d4fe89dc2e7775f4ef0dfc70ed6999b8f09635326e05e08a274d464d1814c617
SHA5127b1df70d76855d65cf246051e7b9f7119720a695d41ace1eb00e45e93e6de80d083b953269166bdee7137dbd9f3e5681e36bb036f151cea383c10d82957f39c5