Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 15:45
Static task
static1
Behavioral task
behavioral1
Sample
2fdafb254cd0b250ce4d2330cfe10d1a_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2fdafb254cd0b250ce4d2330cfe10d1a_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
2fdafb254cd0b250ce4d2330cfe10d1a_JaffaCakes118.exe
-
Size
1.9MB
-
MD5
2fdafb254cd0b250ce4d2330cfe10d1a
-
SHA1
73fbf34a64f560f236fea960ba7055e211f168f9
-
SHA256
7883a94c3bd1af3f49dd72ff193742c26a849d54ff25cd91a9b78553b0e8d7bf
-
SHA512
3cd78a0b6864d377350b17f8cdbdd72a3bd5879aa6007690077b560efe53f64bfbfaef14c906c16a15bf6f0a6915c9834a6cd6ed1665e848f39588e195520901
-
SSDEEP
49152:W84BBskoGYvcxD8Bvj1j65e6t1UbvIyQ+dp7m4:W8kBnoGfKBpAeeUbgf+Xi
Malware Config
Signatures
-
Luminosity 2 IoCs
Luminosity is a RAT family that was on sale, while claiming to be a system administration utility.
description ioc pid Process File opened for modification C:\Windows\assembly 2fdafb254cd0b250ce4d2330cfe10d1a_JaffaCakes118.exe 3420 schtasks.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 2fdafb254cd0b250ce4d2330cfe10d1a_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 5060 Tskmgr.exe 4444 svhost.exe -
Adds Run key to start application 2 TTPs 23 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Client Monitor = "cmd /c \"start \"Client Monitor\" \"C:\\Program Files (x86)\\Client\\client.exe\"" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Client Monitor = "cmd /c \"start \"Client Monitor\" \"C:\\Program Files (x86)\\Client\\client.exe\"" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Client Monitor = "cmd /c \"start \"Client Monitor\" \"C:\\Program Files (x86)\\Client\\client.exe\"" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Client Monitor = "cmd /c \"start \"Client Monitor\" \"C:\\Program Files (x86)\\Client\\client.exe\"" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Client Monitor = "cmd /c \"start \"Client Monitor\" \"C:\\Program Files (x86)\\Client\\client.exe\"" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Client Monitor = "cmd /c \"start \"Client Monitor\" \"C:\\Program Files (x86)\\Client\\client.exe\"" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Client Monitor = "cmd /c \"start \"Client Monitor\" \"C:\\Program Files (x86)\\Client\\client.exe\"" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Client Monitor = "cmd /c \"start \"Client Monitor\" \"C:\\Program Files (x86)\\Client\\client.exe\"" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Client Monitor = "cmd /c \"start \"Client Monitor\" \"C:\\Program Files (x86)\\Client\\client.exe\"" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Client Monitor = "cmd /c \"start \"Client Monitor\" \"C:\\Program Files (x86)\\Client\\client.exe\"" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Client Monitor = "cmd /c \"start \"Client Monitor\" \"C:\\Program Files (x86)\\Client\\client.exe\"" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Client Monitor = "cmd /c \"start \"Client Monitor\" \"C:\\Program Files (x86)\\Client\\client.exe\"" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Client Monitor = "cmd /c \"start \"Client Monitor\" \"C:\\Program Files (x86)\\Client\\client.exe\"" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Client Monitor = "cmd /c \"start \"Client Monitor\" \"C:\\Program Files (x86)\\Client\\client.exe\"" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Client Monitor = "cmd /c \"start \"Client Monitor\" \"C:\\Program Files (x86)\\Client\\client.exe\"" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Client Monitor = "cmd /c \"start \"Client Monitor\" \"C:\\Program Files (x86)\\Client\\client.exe\"" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Client Monitor = "cmd /c \"start \"Client Monitor\" \"C:\\Program Files (x86)\\Client\\client.exe\"" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Client Monitor = "cmd /c \"start \"Client Monitor\" \"C:\\Program Files (x86)\\Client\\client.exe\"" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Client Monitor = "cmd /c \"start \"Client Monitor\" \"C:\\Program Files (x86)\\Client\\client.exe\"" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Client Monitor = "cmd /c \"start \"Client Monitor\" \"C:\\Program Files (x86)\\Client\\client.exe\"" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Client Monitor = "cmd /c \"start \"Client Monitor\" \"C:\\Program Files (x86)\\Client\\client.exe\"" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Client Monitor = "cmd /c \"start \"Client Monitor\" \"C:\\Program Files (x86)\\Client\\client.exe\"" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Client Monitor = "cmd /c \"start \"Client Monitor\" \"C:\\Program Files (x86)\\Client\\client.exe\"" REG.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini 2fdafb254cd0b250ce4d2330cfe10d1a_JaffaCakes118.exe File opened for modification C:\Windows\assembly\Desktop.ini 2fdafb254cd0b250ce4d2330cfe10d1a_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2292 set thread context of 4444 2292 2fdafb254cd0b250ce4d2330cfe10d1a_JaffaCakes118.exe 92 -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\assembly 2fdafb254cd0b250ce4d2330cfe10d1a_JaffaCakes118.exe File created C:\Windows\assembly\Desktop.ini 2fdafb254cd0b250ce4d2330cfe10d1a_JaffaCakes118.exe File opened for modification C:\Windows\assembly\Desktop.ini 2fdafb254cd0b250ce4d2330cfe10d1a_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3420 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2292 2fdafb254cd0b250ce4d2330cfe10d1a_JaffaCakes118.exe 2292 2fdafb254cd0b250ce4d2330cfe10d1a_JaffaCakes118.exe 5060 Tskmgr.exe 5060 Tskmgr.exe 5060 Tskmgr.exe 5060 Tskmgr.exe 5060 Tskmgr.exe 5060 Tskmgr.exe 5060 Tskmgr.exe 5060 Tskmgr.exe 5060 Tskmgr.exe 5060 Tskmgr.exe 5060 Tskmgr.exe 5060 Tskmgr.exe 5060 Tskmgr.exe 5060 Tskmgr.exe 5060 Tskmgr.exe 5060 Tskmgr.exe 4444 svhost.exe 4444 svhost.exe 5060 Tskmgr.exe 5060 Tskmgr.exe 5060 Tskmgr.exe 5060 Tskmgr.exe 5060 Tskmgr.exe 5060 Tskmgr.exe 5060 Tskmgr.exe 5060 Tskmgr.exe 5060 Tskmgr.exe 5060 Tskmgr.exe 5060 Tskmgr.exe 5060 Tskmgr.exe 5060 Tskmgr.exe 5060 Tskmgr.exe 5060 Tskmgr.exe 5060 Tskmgr.exe 5060 Tskmgr.exe 5060 Tskmgr.exe 5060 Tskmgr.exe 5060 Tskmgr.exe 5060 Tskmgr.exe 5060 Tskmgr.exe 5060 Tskmgr.exe 5060 Tskmgr.exe 5060 Tskmgr.exe 5060 Tskmgr.exe 5060 Tskmgr.exe 5060 Tskmgr.exe 5060 Tskmgr.exe 5060 Tskmgr.exe 5060 Tskmgr.exe 5060 Tskmgr.exe 5060 Tskmgr.exe 5060 Tskmgr.exe 3420 schtasks.exe 3420 schtasks.exe 5060 Tskmgr.exe 5060 Tskmgr.exe 5060 Tskmgr.exe 5060 Tskmgr.exe 5060 Tskmgr.exe 5060 Tskmgr.exe 5060 Tskmgr.exe 5060 Tskmgr.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2292 2fdafb254cd0b250ce4d2330cfe10d1a_JaffaCakes118.exe Token: SeDebugPrivilege 5060 Tskmgr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5060 Tskmgr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2292 wrote to memory of 5060 2292 2fdafb254cd0b250ce4d2330cfe10d1a_JaffaCakes118.exe 88 PID 2292 wrote to memory of 5060 2292 2fdafb254cd0b250ce4d2330cfe10d1a_JaffaCakes118.exe 88 PID 2292 wrote to memory of 5060 2292 2fdafb254cd0b250ce4d2330cfe10d1a_JaffaCakes118.exe 88 PID 2292 wrote to memory of 468 2292 2fdafb254cd0b250ce4d2330cfe10d1a_JaffaCakes118.exe 89 PID 2292 wrote to memory of 468 2292 2fdafb254cd0b250ce4d2330cfe10d1a_JaffaCakes118.exe 89 PID 2292 wrote to memory of 468 2292 2fdafb254cd0b250ce4d2330cfe10d1a_JaffaCakes118.exe 89 PID 468 wrote to memory of 4452 468 cmd.exe 91 PID 468 wrote to memory of 4452 468 cmd.exe 91 PID 468 wrote to memory of 4452 468 cmd.exe 91 PID 2292 wrote to memory of 4444 2292 2fdafb254cd0b250ce4d2330cfe10d1a_JaffaCakes118.exe 92 PID 2292 wrote to memory of 4444 2292 2fdafb254cd0b250ce4d2330cfe10d1a_JaffaCakes118.exe 92 PID 2292 wrote to memory of 4444 2292 2fdafb254cd0b250ce4d2330cfe10d1a_JaffaCakes118.exe 92 PID 2292 wrote to memory of 4444 2292 2fdafb254cd0b250ce4d2330cfe10d1a_JaffaCakes118.exe 92 PID 2292 wrote to memory of 4444 2292 2fdafb254cd0b250ce4d2330cfe10d1a_JaffaCakes118.exe 92 PID 2292 wrote to memory of 4444 2292 2fdafb254cd0b250ce4d2330cfe10d1a_JaffaCakes118.exe 92 PID 2292 wrote to memory of 4444 2292 2fdafb254cd0b250ce4d2330cfe10d1a_JaffaCakes118.exe 92 PID 2292 wrote to memory of 4444 2292 2fdafb254cd0b250ce4d2330cfe10d1a_JaffaCakes118.exe 92 PID 5060 wrote to memory of 4964 5060 Tskmgr.exe 93 PID 5060 wrote to memory of 4964 5060 Tskmgr.exe 93 PID 5060 wrote to memory of 4964 5060 Tskmgr.exe 93 PID 5060 wrote to memory of 4444 5060 Tskmgr.exe 92 PID 5060 wrote to memory of 4444 5060 Tskmgr.exe 92 PID 5060 wrote to memory of 4444 5060 Tskmgr.exe 92 PID 5060 wrote to memory of 4444 5060 Tskmgr.exe 92 PID 5060 wrote to memory of 4444 5060 Tskmgr.exe 92 PID 5060 wrote to memory of 3420 5060 Tskmgr.exe 98 PID 5060 wrote to memory of 3420 5060 Tskmgr.exe 98 PID 5060 wrote to memory of 3420 5060 Tskmgr.exe 98 PID 5060 wrote to memory of 4616 5060 Tskmgr.exe 100 PID 5060 wrote to memory of 4616 5060 Tskmgr.exe 100 PID 5060 wrote to memory of 4616 5060 Tskmgr.exe 100 PID 5060 wrote to memory of 3420 5060 Tskmgr.exe 98 PID 5060 wrote to memory of 3420 5060 Tskmgr.exe 98 PID 5060 wrote to memory of 3420 5060 Tskmgr.exe 98 PID 5060 wrote to memory of 3420 5060 Tskmgr.exe 98 PID 5060 wrote to memory of 3420 5060 Tskmgr.exe 98 PID 5060 wrote to memory of 1868 5060 Tskmgr.exe 102 PID 5060 wrote to memory of 1868 5060 Tskmgr.exe 102 PID 5060 wrote to memory of 1868 5060 Tskmgr.exe 102 PID 5060 wrote to memory of 4640 5060 Tskmgr.exe 104 PID 5060 wrote to memory of 4640 5060 Tskmgr.exe 104 PID 5060 wrote to memory of 4640 5060 Tskmgr.exe 104 PID 5060 wrote to memory of 4628 5060 Tskmgr.exe 106 PID 5060 wrote to memory of 4628 5060 Tskmgr.exe 106 PID 5060 wrote to memory of 4628 5060 Tskmgr.exe 106 PID 5060 wrote to memory of 4384 5060 Tskmgr.exe 108 PID 5060 wrote to memory of 4384 5060 Tskmgr.exe 108 PID 5060 wrote to memory of 4384 5060 Tskmgr.exe 108 PID 5060 wrote to memory of 3488 5060 Tskmgr.exe 110 PID 5060 wrote to memory of 3488 5060 Tskmgr.exe 110 PID 5060 wrote to memory of 3488 5060 Tskmgr.exe 110 PID 5060 wrote to memory of 4260 5060 Tskmgr.exe 112 PID 5060 wrote to memory of 4260 5060 Tskmgr.exe 112 PID 5060 wrote to memory of 4260 5060 Tskmgr.exe 112 PID 5060 wrote to memory of 824 5060 Tskmgr.exe 114 PID 5060 wrote to memory of 824 5060 Tskmgr.exe 114 PID 5060 wrote to memory of 824 5060 Tskmgr.exe 114 PID 5060 wrote to memory of 4596 5060 Tskmgr.exe 116 PID 5060 wrote to memory of 4596 5060 Tskmgr.exe 116 PID 5060 wrote to memory of 4596 5060 Tskmgr.exe 116 PID 5060 wrote to memory of 1464 5060 Tskmgr.exe 118 PID 5060 wrote to memory of 1464 5060 Tskmgr.exe 118 PID 5060 wrote to memory of 1464 5060 Tskmgr.exe 118 PID 5060 wrote to memory of 1548 5060 Tskmgr.exe 120
Processes
-
C:\Users\Admin\AppData\Local\Temp\2fdafb254cd0b250ce4d2330cfe10d1a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2fdafb254cd0b250ce4d2330cfe10d1a_JaffaCakes118.exe"1⤵
- Luminosity
- Checks computer location settings
- Drops desktop.ini file(s)
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\Tskmgr.exe"C:\Users\Admin\AppData\Local\Temp\Tskmgr.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Client Monitor" /d "cmd /c """start """Client Monitor""" """C:\Program Files (x86)\Client\client.exe"""" /f /reg:643⤵
- Adds Run key to start application
PID:4964
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /NP /sc onlogon /tn "Client Monitor" /rl highest /tr "'C:\Program Files (x86)\Client\client.exe' /startup" /f3⤵
- Luminosity
- Creates scheduled task(s)
- Suspicious behavior: EnumeratesProcesses
PID:3420
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Client Monitor" /d "cmd /c """start """Client Monitor""" """C:\Program Files (x86)\Client\client.exe"""" /f /reg:643⤵
- Adds Run key to start application
PID:4616
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Client Monitor" /d "cmd /c """start """Client Monitor""" """C:\Program Files (x86)\Client\client.exe"""" /f /reg:643⤵
- Adds Run key to start application
PID:1868
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Client Monitor" /d "cmd /c """start """Client Monitor""" """C:\Program Files (x86)\Client\client.exe"""" /f /reg:643⤵
- Adds Run key to start application
PID:4640
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Client Monitor" /d "cmd /c """start """Client Monitor""" """C:\Program Files (x86)\Client\client.exe"""" /f /reg:643⤵
- Adds Run key to start application
PID:4628
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Client Monitor" /d "cmd /c """start """Client Monitor""" """C:\Program Files (x86)\Client\client.exe"""" /f /reg:643⤵
- Adds Run key to start application
PID:4384
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Client Monitor" /d "cmd /c """start """Client Monitor""" """C:\Program Files (x86)\Client\client.exe"""" /f /reg:643⤵
- Adds Run key to start application
PID:3488
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Client Monitor" /d "cmd /c """start """Client Monitor""" """C:\Program Files (x86)\Client\client.exe"""" /f /reg:643⤵
- Adds Run key to start application
PID:4260
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Client Monitor" /d "cmd /c """start """Client Monitor""" """C:\Program Files (x86)\Client\client.exe"""" /f /reg:643⤵
- Adds Run key to start application
PID:824
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Client Monitor" /d "cmd /c """start """Client Monitor""" """C:\Program Files (x86)\Client\client.exe"""" /f /reg:643⤵
- Adds Run key to start application
PID:4596
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Client Monitor" /d "cmd /c """start """Client Monitor""" """C:\Program Files (x86)\Client\client.exe"""" /f /reg:643⤵
- Adds Run key to start application
PID:1464
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Client Monitor" /d "cmd /c """start """Client Monitor""" """C:\Program Files (x86)\Client\client.exe"""" /f /reg:643⤵
- Adds Run key to start application
PID:1548
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Client Monitor" /d "cmd /c """start """Client Monitor""" """C:\Program Files (x86)\Client\client.exe"""" /f /reg:643⤵
- Adds Run key to start application
PID:2984
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Client Monitor" /d "cmd /c """start """Client Monitor""" """C:\Program Files (x86)\Client\client.exe"""" /f /reg:643⤵
- Adds Run key to start application
PID:4968
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Client Monitor" /d "cmd /c """start """Client Monitor""" """C:\Program Files (x86)\Client\client.exe"""" /f /reg:643⤵
- Adds Run key to start application
PID:4228
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Client Monitor" /d "cmd /c """start """Client Monitor""" """C:\Program Files (x86)\Client\client.exe"""" /f /reg:643⤵
- Adds Run key to start application
PID:2932
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Client Monitor" /d "cmd /c """start """Client Monitor""" """C:\Program Files (x86)\Client\client.exe"""" /f /reg:643⤵
- Adds Run key to start application
PID:2144
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Client Monitor" /d "cmd /c """start """Client Monitor""" """C:\Program Files (x86)\Client\client.exe"""" /f /reg:643⤵
- Adds Run key to start application
PID:2852
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Client Monitor" /d "cmd /c """start """Client Monitor""" """C:\Program Files (x86)\Client\client.exe"""" /f /reg:643⤵
- Adds Run key to start application
PID:1204
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Client Monitor" /d "cmd /c """start """Client Monitor""" """C:\Program Files (x86)\Client\client.exe"""" /f /reg:643⤵
- Adds Run key to start application
PID:2504
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Client Monitor" /d "cmd /c """start """Client Monitor""" """C:\Program Files (x86)\Client\client.exe"""" /f /reg:643⤵
- Adds Run key to start application
PID:3696
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Client Monitor" /d "cmd /c """start """Client Monitor""" """C:\Program Files (x86)\Client\client.exe"""" /f /reg:643⤵
- Adds Run key to start application
PID:4264
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Client Monitor" /d "cmd /c """start """Client Monitor""" """C:\Program Files (x86)\Client\client.exe"""" /f /reg:643⤵
- Adds Run key to start application
PID:3148
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\FolderN\Tskmgr.exe.lnk " /f3⤵PID:4452
-
-
-
C:\Users\Admin\AppData\Local\Temp\svhost.exe"C:\Users\Admin\AppData\Local\Temp\svhost.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4444
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
857KB
MD5bc6529f2a93dd5eb328963e0b41a855a
SHA10d3fe448baa8a886fd33541f17e893a8a550640f
SHA256b98c711a375f39574672d49fdb798e70dab73b56c5a605c2cfd55a82d8d1b528
SHA5124b50bc0de71bdbdbe76622d498d70b940e11a5c34b6d58b43765eacb2447d3106da3ac80f3a20e7eed67598bf9875cda9646694724b8fae6d91a7ed97b0bad73
-
Filesize
52KB
MD5a64daca3cfbcd039df3ec29d3eddd001
SHA1eee8b2573f71e8d5c3ee7e53af3e6772e090d0f3
SHA256403752009f29381d5e4036b8be94589c89188f9ce8ef5f86959eaaada019ed36
SHA512b6fe2d0ae3fcd4442579ecf10d498d61e0f042813c8fc4be8019da77d849cfcf0b168507139a1b5697227c272de9091788f8e03cf1ce13d5b5077568cfa6a479