Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
21/04/2024, 01:12
Static task
static1
Behavioral task
behavioral1
Sample
fe14a797ee2da3e0e76a2b3cde735b18_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fe14a797ee2da3e0e76a2b3cde735b18_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fe14a797ee2da3e0e76a2b3cde735b18_JaffaCakes118.exe
-
Size
200KB
-
MD5
fe14a797ee2da3e0e76a2b3cde735b18
-
SHA1
e9b385b2c864fe50a75f364f753f844ddd70e361
-
SHA256
78646802e181208923071b27d398a4df4ad371050bc777db67c905fcc900569f
-
SHA512
13721918e86c5b7cd9d97f36e59ddde3c42baad85c882e244e04c566460218d8e266f92ea8525733654b044fbddc67e18d2ed4f7e229ae67ba3b3f09b844aa27
-
SSDEEP
3072:HbZMzFaDEKrEgQKfQ2OOOFOWhwO2OOOOOrOOOOhOOOOO3OOOF/7OOOOOMOsOOOi1:
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" jeuaceb.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\Control Panel\International\Geo\Nation fe14a797ee2da3e0e76a2b3cde735b18_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2180 jeuaceb.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuaceb = "C:\\Users\\Admin\\jeuaceb.exe /n" jeuaceb.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuaceb = "C:\\Users\\Admin\\jeuaceb.exe /r" jeuaceb.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuaceb = "C:\\Users\\Admin\\jeuaceb.exe /L" jeuaceb.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuaceb = "C:\\Users\\Admin\\jeuaceb.exe /A" jeuaceb.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuaceb = "C:\\Users\\Admin\\jeuaceb.exe /H" jeuaceb.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuaceb = "C:\\Users\\Admin\\jeuaceb.exe /X" jeuaceb.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuaceb = "C:\\Users\\Admin\\jeuaceb.exe /z" jeuaceb.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuaceb = "C:\\Users\\Admin\\jeuaceb.exe /C" jeuaceb.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuaceb = "C:\\Users\\Admin\\jeuaceb.exe /V" jeuaceb.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuaceb = "C:\\Users\\Admin\\jeuaceb.exe /y" jeuaceb.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuaceb = "C:\\Users\\Admin\\jeuaceb.exe /B" jeuaceb.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuaceb = "C:\\Users\\Admin\\jeuaceb.exe /Z" jeuaceb.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuaceb = "C:\\Users\\Admin\\jeuaceb.exe /M" jeuaceb.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuaceb = "C:\\Users\\Admin\\jeuaceb.exe /g" jeuaceb.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuaceb = "C:\\Users\\Admin\\jeuaceb.exe /O" jeuaceb.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuaceb = "C:\\Users\\Admin\\jeuaceb.exe /u" jeuaceb.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuaceb = "C:\\Users\\Admin\\jeuaceb.exe /l" jeuaceb.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuaceb = "C:\\Users\\Admin\\jeuaceb.exe /s" jeuaceb.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuaceb = "C:\\Users\\Admin\\jeuaceb.exe /F" jeuaceb.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuaceb = "C:\\Users\\Admin\\jeuaceb.exe /S" jeuaceb.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuaceb = "C:\\Users\\Admin\\jeuaceb.exe /p" jeuaceb.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuaceb = "C:\\Users\\Admin\\jeuaceb.exe /D" jeuaceb.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuaceb = "C:\\Users\\Admin\\jeuaceb.exe /h" jeuaceb.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuaceb = "C:\\Users\\Admin\\jeuaceb.exe /m" jeuaceb.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuaceb = "C:\\Users\\Admin\\jeuaceb.exe /d" jeuaceb.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuaceb = "C:\\Users\\Admin\\jeuaceb.exe /a" jeuaceb.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuaceb = "C:\\Users\\Admin\\jeuaceb.exe /P" jeuaceb.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuaceb = "C:\\Users\\Admin\\jeuaceb.exe /i" jeuaceb.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuaceb = "C:\\Users\\Admin\\jeuaceb.exe /I" jeuaceb.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuaceb = "C:\\Users\\Admin\\jeuaceb.exe /G" jeuaceb.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuaceb = "C:\\Users\\Admin\\jeuaceb.exe /q" jeuaceb.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuaceb = "C:\\Users\\Admin\\jeuaceb.exe /Y" jeuaceb.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuaceb = "C:\\Users\\Admin\\jeuaceb.exe /j" jeuaceb.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuaceb = "C:\\Users\\Admin\\jeuaceb.exe /v" jeuaceb.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuaceb = "C:\\Users\\Admin\\jeuaceb.exe /f" jeuaceb.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuaceb = "C:\\Users\\Admin\\jeuaceb.exe /J" jeuaceb.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuaceb = "C:\\Users\\Admin\\jeuaceb.exe /Q" jeuaceb.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuaceb = "C:\\Users\\Admin\\jeuaceb.exe /w" jeuaceb.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuaceb = "C:\\Users\\Admin\\jeuaceb.exe /c" jeuaceb.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuaceb = "C:\\Users\\Admin\\jeuaceb.exe /E" jeuaceb.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuaceb = "C:\\Users\\Admin\\jeuaceb.exe /e" jeuaceb.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuaceb = "C:\\Users\\Admin\\jeuaceb.exe /K" jeuaceb.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuaceb = "C:\\Users\\Admin\\jeuaceb.exe /b" jeuaceb.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuaceb = "C:\\Users\\Admin\\jeuaceb.exe /t" jeuaceb.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuaceb = "C:\\Users\\Admin\\jeuaceb.exe /W" jeuaceb.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuaceb = "C:\\Users\\Admin\\jeuaceb.exe /R" jeuaceb.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuaceb = "C:\\Users\\Admin\\jeuaceb.exe /U" jeuaceb.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuaceb = "C:\\Users\\Admin\\jeuaceb.exe /x" jeuaceb.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuaceb = "C:\\Users\\Admin\\jeuaceb.exe /T" jeuaceb.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuaceb = "C:\\Users\\Admin\\jeuaceb.exe /o" jeuaceb.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuaceb = "C:\\Users\\Admin\\jeuaceb.exe /N" jeuaceb.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jeuaceb = "C:\\Users\\Admin\\jeuaceb.exe /k" jeuaceb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2180 jeuaceb.exe 2180 jeuaceb.exe 2180 jeuaceb.exe 2180 jeuaceb.exe 2180 jeuaceb.exe 2180 jeuaceb.exe 2180 jeuaceb.exe 2180 jeuaceb.exe 2180 jeuaceb.exe 2180 jeuaceb.exe 2180 jeuaceb.exe 2180 jeuaceb.exe 2180 jeuaceb.exe 2180 jeuaceb.exe 2180 jeuaceb.exe 2180 jeuaceb.exe 2180 jeuaceb.exe 2180 jeuaceb.exe 2180 jeuaceb.exe 2180 jeuaceb.exe 2180 jeuaceb.exe 2180 jeuaceb.exe 2180 jeuaceb.exe 2180 jeuaceb.exe 2180 jeuaceb.exe 2180 jeuaceb.exe 2180 jeuaceb.exe 2180 jeuaceb.exe 2180 jeuaceb.exe 2180 jeuaceb.exe 2180 jeuaceb.exe 2180 jeuaceb.exe 2180 jeuaceb.exe 2180 jeuaceb.exe 2180 jeuaceb.exe 2180 jeuaceb.exe 2180 jeuaceb.exe 2180 jeuaceb.exe 2180 jeuaceb.exe 2180 jeuaceb.exe 2180 jeuaceb.exe 2180 jeuaceb.exe 2180 jeuaceb.exe 2180 jeuaceb.exe 2180 jeuaceb.exe 2180 jeuaceb.exe 2180 jeuaceb.exe 2180 jeuaceb.exe 2180 jeuaceb.exe 2180 jeuaceb.exe 2180 jeuaceb.exe 2180 jeuaceb.exe 2180 jeuaceb.exe 2180 jeuaceb.exe 2180 jeuaceb.exe 2180 jeuaceb.exe 2180 jeuaceb.exe 2180 jeuaceb.exe 2180 jeuaceb.exe 2180 jeuaceb.exe 2180 jeuaceb.exe 2180 jeuaceb.exe 2180 jeuaceb.exe 2180 jeuaceb.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1668 fe14a797ee2da3e0e76a2b3cde735b18_JaffaCakes118.exe 2180 jeuaceb.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1668 wrote to memory of 2180 1668 fe14a797ee2da3e0e76a2b3cde735b18_JaffaCakes118.exe 89 PID 1668 wrote to memory of 2180 1668 fe14a797ee2da3e0e76a2b3cde735b18_JaffaCakes118.exe 89 PID 1668 wrote to memory of 2180 1668 fe14a797ee2da3e0e76a2b3cde735b18_JaffaCakes118.exe 89 PID 2180 wrote to memory of 1668 2180 jeuaceb.exe 87 PID 2180 wrote to memory of 1668 2180 jeuaceb.exe 87 PID 2180 wrote to memory of 1668 2180 jeuaceb.exe 87 PID 2180 wrote to memory of 1668 2180 jeuaceb.exe 87 PID 2180 wrote to memory of 1668 2180 jeuaceb.exe 87 PID 2180 wrote to memory of 1668 2180 jeuaceb.exe 87 PID 2180 wrote to memory of 1668 2180 jeuaceb.exe 87 PID 2180 wrote to memory of 1668 2180 jeuaceb.exe 87 PID 2180 wrote to memory of 1668 2180 jeuaceb.exe 87 PID 2180 wrote to memory of 1668 2180 jeuaceb.exe 87 PID 2180 wrote to memory of 1668 2180 jeuaceb.exe 87 PID 2180 wrote to memory of 1668 2180 jeuaceb.exe 87 PID 2180 wrote to memory of 1668 2180 jeuaceb.exe 87 PID 2180 wrote to memory of 1668 2180 jeuaceb.exe 87 PID 2180 wrote to memory of 1668 2180 jeuaceb.exe 87 PID 2180 wrote to memory of 1668 2180 jeuaceb.exe 87 PID 2180 wrote to memory of 1668 2180 jeuaceb.exe 87 PID 2180 wrote to memory of 1668 2180 jeuaceb.exe 87 PID 2180 wrote to memory of 1668 2180 jeuaceb.exe 87 PID 2180 wrote to memory of 1668 2180 jeuaceb.exe 87 PID 2180 wrote to memory of 1668 2180 jeuaceb.exe 87 PID 2180 wrote to memory of 1668 2180 jeuaceb.exe 87 PID 2180 wrote to memory of 1668 2180 jeuaceb.exe 87 PID 2180 wrote to memory of 1668 2180 jeuaceb.exe 87 PID 2180 wrote to memory of 1668 2180 jeuaceb.exe 87 PID 2180 wrote to memory of 1668 2180 jeuaceb.exe 87 PID 2180 wrote to memory of 1668 2180 jeuaceb.exe 87 PID 2180 wrote to memory of 1668 2180 jeuaceb.exe 87 PID 2180 wrote to memory of 1668 2180 jeuaceb.exe 87 PID 2180 wrote to memory of 1668 2180 jeuaceb.exe 87 PID 2180 wrote to memory of 1668 2180 jeuaceb.exe 87 PID 2180 wrote to memory of 1668 2180 jeuaceb.exe 87 PID 2180 wrote to memory of 1668 2180 jeuaceb.exe 87 PID 2180 wrote to memory of 1668 2180 jeuaceb.exe 87 PID 2180 wrote to memory of 1668 2180 jeuaceb.exe 87 PID 2180 wrote to memory of 1668 2180 jeuaceb.exe 87 PID 2180 wrote to memory of 1668 2180 jeuaceb.exe 87 PID 2180 wrote to memory of 1668 2180 jeuaceb.exe 87 PID 2180 wrote to memory of 1668 2180 jeuaceb.exe 87 PID 2180 wrote to memory of 1668 2180 jeuaceb.exe 87 PID 2180 wrote to memory of 1668 2180 jeuaceb.exe 87 PID 2180 wrote to memory of 1668 2180 jeuaceb.exe 87 PID 2180 wrote to memory of 1668 2180 jeuaceb.exe 87 PID 2180 wrote to memory of 1668 2180 jeuaceb.exe 87 PID 2180 wrote to memory of 1668 2180 jeuaceb.exe 87 PID 2180 wrote to memory of 1668 2180 jeuaceb.exe 87 PID 2180 wrote to memory of 1668 2180 jeuaceb.exe 87 PID 2180 wrote to memory of 1668 2180 jeuaceb.exe 87 PID 2180 wrote to memory of 1668 2180 jeuaceb.exe 87 PID 2180 wrote to memory of 1668 2180 jeuaceb.exe 87 PID 2180 wrote to memory of 1668 2180 jeuaceb.exe 87 PID 2180 wrote to memory of 1668 2180 jeuaceb.exe 87 PID 2180 wrote to memory of 1668 2180 jeuaceb.exe 87 PID 2180 wrote to memory of 1668 2180 jeuaceb.exe 87 PID 2180 wrote to memory of 1668 2180 jeuaceb.exe 87 PID 2180 wrote to memory of 1668 2180 jeuaceb.exe 87 PID 2180 wrote to memory of 1668 2180 jeuaceb.exe 87 PID 2180 wrote to memory of 1668 2180 jeuaceb.exe 87 PID 2180 wrote to memory of 1668 2180 jeuaceb.exe 87 PID 2180 wrote to memory of 1668 2180 jeuaceb.exe 87 PID 2180 wrote to memory of 1668 2180 jeuaceb.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe14a797ee2da3e0e76a2b3cde735b18_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fe14a797ee2da3e0e76a2b3cde735b18_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\jeuaceb.exe"C:\Users\Admin\jeuaceb.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2180
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
200KB
MD5c2e8282b19ebaf10710e8739cc427113
SHA10d55a29192d0aa4283f86ecf954262fb35efddf2
SHA256062145bf6a32b43490a7ab88592a49b6777f1ee34f9e695ec60cef607c415990
SHA5128c0de2edc96e3db02ab3789bda7c2aa0aef45e19faa080e495cf82c5e4a1003c8e0e72dc7c9924cdeb1499b54550f2d08542e84d6f17d335d5252fe96993e72f