Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-05-2024 15:45
Static task
static1
Behavioral task
behavioral1
Sample
2fdafb254cd0b250ce4d2330cfe10d1a_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2fdafb254cd0b250ce4d2330cfe10d1a_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
2fdafb254cd0b250ce4d2330cfe10d1a_JaffaCakes118.exe
-
Size
1.9MB
-
MD5
2fdafb254cd0b250ce4d2330cfe10d1a
-
SHA1
73fbf34a64f560f236fea960ba7055e211f168f9
-
SHA256
7883a94c3bd1af3f49dd72ff193742c26a849d54ff25cd91a9b78553b0e8d7bf
-
SHA512
3cd78a0b6864d377350b17f8cdbdd72a3bd5879aa6007690077b560efe53f64bfbfaef14c906c16a15bf6f0a6915c9834a6cd6ed1665e848f39588e195520901
-
SSDEEP
49152:W84BBskoGYvcxD8Bvj1j65e6t1UbvIyQ+dp7m4:W8kBnoGfKBpAeeUbgf+Xi
Malware Config
Signatures
-
Luminosity 2 IoCs
Luminosity is a RAT family that was on sale, while claiming to be a system administration utility.
description ioc pid Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Client Monitor = "cmd /c \"start \"Client Monitor\" \"C:\\Program Files (x86)\\Client\\client.exe\"" REG.exe 2000 schtasks.exe -
Executes dropped EXE 2 IoCs
pid Process 2532 Tskmgr.exe 2572 svhost.exe -
Loads dropped DLL 5 IoCs
pid Process 1664 2fdafb254cd0b250ce4d2330cfe10d1a_JaffaCakes118.exe 1664 2fdafb254cd0b250ce4d2330cfe10d1a_JaffaCakes118.exe 2532 Tskmgr.exe 1664 2fdafb254cd0b250ce4d2330cfe10d1a_JaffaCakes118.exe 2572 svhost.exe -
Adds Run key to start application 2 TTPs 22 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Client Monitor = "cmd /c \"start \"Client Monitor\" \"C:\\Program Files (x86)\\Client\\client.exe\"" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Client Monitor = "cmd /c \"start \"Client Monitor\" \"C:\\Program Files (x86)\\Client\\client.exe\"" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Client Monitor = "cmd /c \"start \"Client Monitor\" \"C:\\Program Files (x86)\\Client\\client.exe\"" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Client Monitor = "cmd /c \"start \"Client Monitor\" \"C:\\Program Files (x86)\\Client\\client.exe\"" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Client Monitor = "cmd /c \"start \"Client Monitor\" \"C:\\Program Files (x86)\\Client\\client.exe\"" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Client Monitor = "cmd /c \"start \"Client Monitor\" \"C:\\Program Files (x86)\\Client\\client.exe\"" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Client Monitor = "cmd /c \"start \"Client Monitor\" \"C:\\Program Files (x86)\\Client\\client.exe\"" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Client Monitor = "cmd /c \"start \"Client Monitor\" \"C:\\Program Files (x86)\\Client\\client.exe\"" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Client Monitor = "cmd /c \"start \"Client Monitor\" \"C:\\Program Files (x86)\\Client\\client.exe\"" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Client Monitor = "cmd /c \"start \"Client Monitor\" \"C:\\Program Files (x86)\\Client\\client.exe\"" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Client Monitor = "cmd /c \"start \"Client Monitor\" \"C:\\Program Files (x86)\\Client\\client.exe\"" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Client Monitor = "cmd /c \"start \"Client Monitor\" \"C:\\Program Files (x86)\\Client\\client.exe\"" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Client Monitor = "cmd /c \"start \"Client Monitor\" \"C:\\Program Files (x86)\\Client\\client.exe\"" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Client Monitor = "cmd /c \"start \"Client Monitor\" \"C:\\Program Files (x86)\\Client\\client.exe\"" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Client Monitor = "cmd /c \"start \"Client Monitor\" \"C:\\Program Files (x86)\\Client\\client.exe\"" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Client Monitor = "cmd /c \"start \"Client Monitor\" \"C:\\Program Files (x86)\\Client\\client.exe\"" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Client Monitor = "cmd /c \"start \"Client Monitor\" \"C:\\Program Files (x86)\\Client\\client.exe\"" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Client Monitor = "cmd /c \"start \"Client Monitor\" \"C:\\Program Files (x86)\\Client\\client.exe\"" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Client Monitor = "cmd /c \"start \"Client Monitor\" \"C:\\Program Files (x86)\\Client\\client.exe\"" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Client Monitor = "cmd /c \"start \"Client Monitor\" \"C:\\Program Files (x86)\\Client\\client.exe\"" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Client Monitor = "cmd /c \"start \"Client Monitor\" \"C:\\Program Files (x86)\\Client\\client.exe\"" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Client Monitor = "cmd /c \"start \"Client Monitor\" \"C:\\Program Files (x86)\\Client\\client.exe\"" REG.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1664 set thread context of 2572 1664 2fdafb254cd0b250ce4d2330cfe10d1a_JaffaCakes118.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2000 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1664 2fdafb254cd0b250ce4d2330cfe10d1a_JaffaCakes118.exe 1664 2fdafb254cd0b250ce4d2330cfe10d1a_JaffaCakes118.exe 2532 Tskmgr.exe 2532 Tskmgr.exe 2532 Tskmgr.exe 2532 Tskmgr.exe 2572 svhost.exe 2532 Tskmgr.exe 2532 Tskmgr.exe 2532 Tskmgr.exe 2532 Tskmgr.exe 2532 Tskmgr.exe 2532 Tskmgr.exe 2532 Tskmgr.exe 2532 Tskmgr.exe 2532 Tskmgr.exe 2532 Tskmgr.exe 2532 Tskmgr.exe 2532 Tskmgr.exe 2532 Tskmgr.exe 2532 Tskmgr.exe 2532 Tskmgr.exe 2532 Tskmgr.exe 2532 Tskmgr.exe 2532 Tskmgr.exe 2532 Tskmgr.exe 2532 Tskmgr.exe 2532 Tskmgr.exe 2532 Tskmgr.exe 2532 Tskmgr.exe 2532 Tskmgr.exe 2532 Tskmgr.exe 2532 Tskmgr.exe 2532 Tskmgr.exe 2532 Tskmgr.exe 2532 Tskmgr.exe 2532 Tskmgr.exe 2000 schtasks.exe 2532 Tskmgr.exe 2532 Tskmgr.exe 2532 Tskmgr.exe 2532 Tskmgr.exe 2532 Tskmgr.exe 2532 Tskmgr.exe 2532 Tskmgr.exe 2532 Tskmgr.exe 2532 Tskmgr.exe 2532 Tskmgr.exe 2532 Tskmgr.exe 2532 Tskmgr.exe 2532 Tskmgr.exe 2532 Tskmgr.exe 2532 Tskmgr.exe 2532 Tskmgr.exe 2532 Tskmgr.exe 2532 Tskmgr.exe 2532 Tskmgr.exe 2532 Tskmgr.exe 2532 Tskmgr.exe 2532 Tskmgr.exe 2532 Tskmgr.exe 2532 Tskmgr.exe 2532 Tskmgr.exe 2532 Tskmgr.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1664 2fdafb254cd0b250ce4d2330cfe10d1a_JaffaCakes118.exe Token: SeDebugPrivilege 2532 Tskmgr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2532 Tskmgr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1664 wrote to memory of 2532 1664 2fdafb254cd0b250ce4d2330cfe10d1a_JaffaCakes118.exe 28 PID 1664 wrote to memory of 2532 1664 2fdafb254cd0b250ce4d2330cfe10d1a_JaffaCakes118.exe 28 PID 1664 wrote to memory of 2532 1664 2fdafb254cd0b250ce4d2330cfe10d1a_JaffaCakes118.exe 28 PID 1664 wrote to memory of 2532 1664 2fdafb254cd0b250ce4d2330cfe10d1a_JaffaCakes118.exe 28 PID 1664 wrote to memory of 2532 1664 2fdafb254cd0b250ce4d2330cfe10d1a_JaffaCakes118.exe 28 PID 1664 wrote to memory of 2532 1664 2fdafb254cd0b250ce4d2330cfe10d1a_JaffaCakes118.exe 28 PID 1664 wrote to memory of 2532 1664 2fdafb254cd0b250ce4d2330cfe10d1a_JaffaCakes118.exe 28 PID 1664 wrote to memory of 2612 1664 2fdafb254cd0b250ce4d2330cfe10d1a_JaffaCakes118.exe 29 PID 1664 wrote to memory of 2612 1664 2fdafb254cd0b250ce4d2330cfe10d1a_JaffaCakes118.exe 29 PID 1664 wrote to memory of 2612 1664 2fdafb254cd0b250ce4d2330cfe10d1a_JaffaCakes118.exe 29 PID 1664 wrote to memory of 2612 1664 2fdafb254cd0b250ce4d2330cfe10d1a_JaffaCakes118.exe 29 PID 1664 wrote to memory of 2612 1664 2fdafb254cd0b250ce4d2330cfe10d1a_JaffaCakes118.exe 29 PID 1664 wrote to memory of 2612 1664 2fdafb254cd0b250ce4d2330cfe10d1a_JaffaCakes118.exe 29 PID 1664 wrote to memory of 2612 1664 2fdafb254cd0b250ce4d2330cfe10d1a_JaffaCakes118.exe 29 PID 2612 wrote to memory of 2456 2612 cmd.exe 31 PID 2612 wrote to memory of 2456 2612 cmd.exe 31 PID 2612 wrote to memory of 2456 2612 cmd.exe 31 PID 2612 wrote to memory of 2456 2612 cmd.exe 31 PID 2612 wrote to memory of 2456 2612 cmd.exe 31 PID 2612 wrote to memory of 2456 2612 cmd.exe 31 PID 2612 wrote to memory of 2456 2612 cmd.exe 31 PID 1664 wrote to memory of 2572 1664 2fdafb254cd0b250ce4d2330cfe10d1a_JaffaCakes118.exe 32 PID 1664 wrote to memory of 2572 1664 2fdafb254cd0b250ce4d2330cfe10d1a_JaffaCakes118.exe 32 PID 1664 wrote to memory of 2572 1664 2fdafb254cd0b250ce4d2330cfe10d1a_JaffaCakes118.exe 32 PID 1664 wrote to memory of 2572 1664 2fdafb254cd0b250ce4d2330cfe10d1a_JaffaCakes118.exe 32 PID 1664 wrote to memory of 2572 1664 2fdafb254cd0b250ce4d2330cfe10d1a_JaffaCakes118.exe 32 PID 1664 wrote to memory of 2572 1664 2fdafb254cd0b250ce4d2330cfe10d1a_JaffaCakes118.exe 32 PID 1664 wrote to memory of 2572 1664 2fdafb254cd0b250ce4d2330cfe10d1a_JaffaCakes118.exe 32 PID 1664 wrote to memory of 2572 1664 2fdafb254cd0b250ce4d2330cfe10d1a_JaffaCakes118.exe 32 PID 1664 wrote to memory of 2572 1664 2fdafb254cd0b250ce4d2330cfe10d1a_JaffaCakes118.exe 32 PID 1664 wrote to memory of 2572 1664 2fdafb254cd0b250ce4d2330cfe10d1a_JaffaCakes118.exe 32 PID 1664 wrote to memory of 2572 1664 2fdafb254cd0b250ce4d2330cfe10d1a_JaffaCakes118.exe 32 PID 1664 wrote to memory of 2572 1664 2fdafb254cd0b250ce4d2330cfe10d1a_JaffaCakes118.exe 32 PID 2532 wrote to memory of 2424 2532 Tskmgr.exe 33 PID 2532 wrote to memory of 2424 2532 Tskmgr.exe 33 PID 2532 wrote to memory of 2424 2532 Tskmgr.exe 33 PID 2532 wrote to memory of 2424 2532 Tskmgr.exe 33 PID 2532 wrote to memory of 2424 2532 Tskmgr.exe 33 PID 2532 wrote to memory of 2424 2532 Tskmgr.exe 33 PID 2532 wrote to memory of 2424 2532 Tskmgr.exe 33 PID 2532 wrote to memory of 2572 2532 Tskmgr.exe 32 PID 2532 wrote to memory of 2572 2532 Tskmgr.exe 32 PID 2532 wrote to memory of 2572 2532 Tskmgr.exe 32 PID 2532 wrote to memory of 2572 2532 Tskmgr.exe 32 PID 2532 wrote to memory of 2572 2532 Tskmgr.exe 32 PID 2532 wrote to memory of 2000 2532 Tskmgr.exe 37 PID 2532 wrote to memory of 2000 2532 Tskmgr.exe 37 PID 2532 wrote to memory of 2000 2532 Tskmgr.exe 37 PID 2532 wrote to memory of 2000 2532 Tskmgr.exe 37 PID 2532 wrote to memory of 2000 2532 Tskmgr.exe 37 PID 2532 wrote to memory of 2000 2532 Tskmgr.exe 37 PID 2532 wrote to memory of 2000 2532 Tskmgr.exe 37 PID 2532 wrote to memory of 2000 2532 Tskmgr.exe 37 PID 2532 wrote to memory of 2000 2532 Tskmgr.exe 37 PID 2532 wrote to memory of 2000 2532 Tskmgr.exe 37 PID 2532 wrote to memory of 2000 2532 Tskmgr.exe 37 PID 2532 wrote to memory of 2000 2532 Tskmgr.exe 37 PID 2532 wrote to memory of 1824 2532 Tskmgr.exe 39 PID 2532 wrote to memory of 1824 2532 Tskmgr.exe 39 PID 2532 wrote to memory of 1824 2532 Tskmgr.exe 39 PID 2532 wrote to memory of 1824 2532 Tskmgr.exe 39 PID 2532 wrote to memory of 1824 2532 Tskmgr.exe 39 PID 2532 wrote to memory of 1824 2532 Tskmgr.exe 39 PID 2532 wrote to memory of 1824 2532 Tskmgr.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\2fdafb254cd0b250ce4d2330cfe10d1a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2fdafb254cd0b250ce4d2330cfe10d1a_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\Tskmgr.exe"C:\Users\Admin\AppData\Local\Temp\Tskmgr.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Client Monitor" /d "cmd /c """start """Client Monitor""" """C:\Program Files (x86)\Client\client.exe"""" /f /reg:643⤵
- Luminosity
- Adds Run key to start application
PID:2424
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /NP /sc onlogon /tn "Client Monitor" /rl highest /tr "'C:\Program Files (x86)\Client\client.exe' /startup" /f3⤵
- Luminosity
- Creates scheduled task(s)
- Suspicious behavior: EnumeratesProcesses
PID:2000
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Client Monitor" /d "cmd /c """start """Client Monitor""" """C:\Program Files (x86)\Client\client.exe"""" /f /reg:643⤵
- Adds Run key to start application
PID:1824
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Client Monitor" /d "cmd /c """start """Client Monitor""" """C:\Program Files (x86)\Client\client.exe"""" /f /reg:643⤵
- Adds Run key to start application
PID:1092
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Client Monitor" /d "cmd /c """start """Client Monitor""" """C:\Program Files (x86)\Client\client.exe"""" /f /reg:643⤵
- Adds Run key to start application
PID:932
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Client Monitor" /d "cmd /c """start """Client Monitor""" """C:\Program Files (x86)\Client\client.exe"""" /f /reg:643⤵
- Adds Run key to start application
PID:2260
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Client Monitor" /d "cmd /c """start """Client Monitor""" """C:\Program Files (x86)\Client\client.exe"""" /f /reg:643⤵
- Adds Run key to start application
PID:1256
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Client Monitor" /d "cmd /c """start """Client Monitor""" """C:\Program Files (x86)\Client\client.exe"""" /f /reg:643⤵
- Adds Run key to start application
PID:476
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Client Monitor" /d "cmd /c """start """Client Monitor""" """C:\Program Files (x86)\Client\client.exe"""" /f /reg:643⤵
- Adds Run key to start application
PID:2864
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Client Monitor" /d "cmd /c """start """Client Monitor""" """C:\Program Files (x86)\Client\client.exe"""" /f /reg:643⤵
- Adds Run key to start application
PID:2984
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Client Monitor" /d "cmd /c """start """Client Monitor""" """C:\Program Files (x86)\Client\client.exe"""" /f /reg:643⤵
- Adds Run key to start application
PID:2928
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Client Monitor" /d "cmd /c """start """Client Monitor""" """C:\Program Files (x86)\Client\client.exe"""" /f /reg:643⤵
- Adds Run key to start application
PID:2268
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Client Monitor" /d "cmd /c """start """Client Monitor""" """C:\Program Files (x86)\Client\client.exe"""" /f /reg:643⤵
- Adds Run key to start application
PID:1324
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Client Monitor" /d "cmd /c """start """Client Monitor""" """C:\Program Files (x86)\Client\client.exe"""" /f /reg:643⤵
- Adds Run key to start application
PID:1868
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Client Monitor" /d "cmd /c """start """Client Monitor""" """C:\Program Files (x86)\Client\client.exe"""" /f /reg:643⤵
- Adds Run key to start application
PID:1988
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Client Monitor" /d "cmd /c """start """Client Monitor""" """C:\Program Files (x86)\Client\client.exe"""" /f /reg:643⤵
- Adds Run key to start application
PID:368
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Client Monitor" /d "cmd /c """start """Client Monitor""" """C:\Program Files (x86)\Client\client.exe"""" /f /reg:643⤵
- Adds Run key to start application
PID:2696
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Client Monitor" /d "cmd /c """start """Client Monitor""" """C:\Program Files (x86)\Client\client.exe"""" /f /reg:643⤵
- Adds Run key to start application
PID:1484
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Client Monitor" /d "cmd /c """start """Client Monitor""" """C:\Program Files (x86)\Client\client.exe"""" /f /reg:643⤵
- Adds Run key to start application
PID:2124
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Client Monitor" /d "cmd /c """start """Client Monitor""" """C:\Program Files (x86)\Client\client.exe"""" /f /reg:643⤵
- Adds Run key to start application
PID:2100
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Client Monitor" /d "cmd /c """start """Client Monitor""" """C:\Program Files (x86)\Client\client.exe"""" /f /reg:643⤵
- Adds Run key to start application
PID:488
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Client Monitor" /d "cmd /c """start """Client Monitor""" """C:\Program Files (x86)\Client\client.exe"""" /f /reg:643⤵
- Adds Run key to start application
PID:2504
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Client Monitor" /d "cmd /c """start """Client Monitor""" """C:\Program Files (x86)\Client\client.exe"""" /f /reg:643⤵
- Adds Run key to start application
PID:2876
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\FolderN\Tskmgr.exe.lnk " /f3⤵PID:2456
-
-
-
C:\Users\Admin\AppData\Local\Temp\svhost.exe"C:\Users\Admin\AppData\Local\Temp\svhost.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2572
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
857KB
MD5bc6529f2a93dd5eb328963e0b41a855a
SHA10d3fe448baa8a886fd33541f17e893a8a550640f
SHA256b98c711a375f39574672d49fdb798e70dab73b56c5a605c2cfd55a82d8d1b528
SHA5124b50bc0de71bdbdbe76622d498d70b940e11a5c34b6d58b43765eacb2447d3106da3ac80f3a20e7eed67598bf9875cda9646694724b8fae6d91a7ed97b0bad73
-
Filesize
52KB
MD5278edbd499374bf73621f8c1f969d894
SHA1a81170af14747781c5f5f51bb1215893136f0bc0
SHA256c6999b9f79932c3b4f1c461a69d9dc8dc301d6a155abc33efe1b6e9e4a038391
SHA51293b0b5c3324bd2df83310f96d34c9176c94d2d676766599c1af33c98ba1efe63187056671f7c6f80c956e5bd0a725f108804021ad93326286bb9c3a96f6550b9