Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
12/05/2024, 13:24
Static task
static1
Behavioral task
behavioral1
Sample
3a53c78fe9cd7f38f85258a17b37fe6e_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3a53c78fe9cd7f38f85258a17b37fe6e_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
KtlVtDDtCbxIugvgm.ps1
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
KtlVtDDtCbxIugvgm.ps1
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
KtlVtDDtCbxIugvgma5.exe
Resource
win7-20240419-en
Behavioral task
behavioral6
Sample
KtlVtDDtCbxIugvgma5.exe
Resource
win10v2004-20240226-en
General
-
Target
3a53c78fe9cd7f38f85258a17b37fe6e_JaffaCakes118.exe
-
Size
249KB
-
MD5
3a53c78fe9cd7f38f85258a17b37fe6e
-
SHA1
76f035dcaffc9087a2a959d0419d8653f6b29b39
-
SHA256
fea3f30556e99bb327e2584018334b8b5ba8d74ae25710626b9d58cf0666e41c
-
SHA512
b14c483b7ca03d15cc0f430914a865463ab69e6b16cc783a69525e5ebaf3fc9c7451c6ee8473fe169c84fc6d05a5e1023b1c3590d9339abbc09dd1fb2999baf1
-
SSDEEP
3072:pYbZ4Hwie5tR7c6ZGU05sHbf4bQl4F8jU8NRFJUuj4Il/ZbEyGvp0welfONmQTiA:pY8ipnMi4Vu734ID6hKlWVi3iE/jQCnw
Malware Config
Extracted
lokibot
http://107.175.150.73/~giftioz/.hokbi/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2232 KtlVtDDtCbxIugvgma5.exe 2520 KtlVtDDtCbxIugvgma5.exe 1560 KtlVtDDtCbxIugvgma5.exe 1932 KtlVtDDtCbxIugvgma5.exe -
Loads dropped DLL 6 IoCs
pid Process 1668 3a53c78fe9cd7f38f85258a17b37fe6e_JaffaCakes118.exe 1668 3a53c78fe9cd7f38f85258a17b37fe6e_JaffaCakes118.exe 2232 KtlVtDDtCbxIugvgma5.exe 828 WerFault.exe 828 WerFault.exe 828 WerFault.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook RegAsm.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2232 set thread context of 2608 2232 KtlVtDDtCbxIugvgma5.exe 35 PID 2520 set thread context of 760 2520 KtlVtDDtCbxIugvgma5.exe 43 PID 1560 set thread context of 2240 1560 KtlVtDDtCbxIugvgma5.exe 51 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 828 1932 WerFault.exe 52 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2232 KtlVtDDtCbxIugvgma5.exe 2232 KtlVtDDtCbxIugvgma5.exe 2232 KtlVtDDtCbxIugvgma5.exe 2232 KtlVtDDtCbxIugvgma5.exe 2232 KtlVtDDtCbxIugvgma5.exe 2232 KtlVtDDtCbxIugvgma5.exe 2232 KtlVtDDtCbxIugvgma5.exe 2232 KtlVtDDtCbxIugvgma5.exe 2232 KtlVtDDtCbxIugvgma5.exe 2232 KtlVtDDtCbxIugvgma5.exe 2232 KtlVtDDtCbxIugvgma5.exe 2232 KtlVtDDtCbxIugvgma5.exe 2232 KtlVtDDtCbxIugvgma5.exe 2232 KtlVtDDtCbxIugvgma5.exe 2232 KtlVtDDtCbxIugvgma5.exe 2232 KtlVtDDtCbxIugvgma5.exe 2232 KtlVtDDtCbxIugvgma5.exe 2232 KtlVtDDtCbxIugvgma5.exe 2232 KtlVtDDtCbxIugvgma5.exe 2232 KtlVtDDtCbxIugvgma5.exe 2232 KtlVtDDtCbxIugvgma5.exe 2232 KtlVtDDtCbxIugvgma5.exe 2232 KtlVtDDtCbxIugvgma5.exe 2232 KtlVtDDtCbxIugvgma5.exe 2232 KtlVtDDtCbxIugvgma5.exe 2232 KtlVtDDtCbxIugvgma5.exe 2232 KtlVtDDtCbxIugvgma5.exe 2232 KtlVtDDtCbxIugvgma5.exe 2232 KtlVtDDtCbxIugvgma5.exe 2232 KtlVtDDtCbxIugvgma5.exe 2232 KtlVtDDtCbxIugvgma5.exe 2232 KtlVtDDtCbxIugvgma5.exe 2232 KtlVtDDtCbxIugvgma5.exe 2232 KtlVtDDtCbxIugvgma5.exe 2232 KtlVtDDtCbxIugvgma5.exe 2232 KtlVtDDtCbxIugvgma5.exe 2232 KtlVtDDtCbxIugvgma5.exe 2232 KtlVtDDtCbxIugvgma5.exe 2232 KtlVtDDtCbxIugvgma5.exe 2232 KtlVtDDtCbxIugvgma5.exe 2232 KtlVtDDtCbxIugvgma5.exe 2232 KtlVtDDtCbxIugvgma5.exe 2232 KtlVtDDtCbxIugvgma5.exe 2232 KtlVtDDtCbxIugvgma5.exe 2232 KtlVtDDtCbxIugvgma5.exe 2232 KtlVtDDtCbxIugvgma5.exe 2232 KtlVtDDtCbxIugvgma5.exe 2232 KtlVtDDtCbxIugvgma5.exe 2232 KtlVtDDtCbxIugvgma5.exe 2232 KtlVtDDtCbxIugvgma5.exe 2232 KtlVtDDtCbxIugvgma5.exe 2232 KtlVtDDtCbxIugvgma5.exe 2232 KtlVtDDtCbxIugvgma5.exe 2232 KtlVtDDtCbxIugvgma5.exe 2232 KtlVtDDtCbxIugvgma5.exe 2232 KtlVtDDtCbxIugvgma5.exe 2232 KtlVtDDtCbxIugvgma5.exe 2232 KtlVtDDtCbxIugvgma5.exe 2232 KtlVtDDtCbxIugvgma5.exe 2232 KtlVtDDtCbxIugvgma5.exe 2232 KtlVtDDtCbxIugvgma5.exe 2232 KtlVtDDtCbxIugvgma5.exe 2232 KtlVtDDtCbxIugvgma5.exe 2232 KtlVtDDtCbxIugvgma5.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 2232 KtlVtDDtCbxIugvgma5.exe 2520 KtlVtDDtCbxIugvgma5.exe 1560 KtlVtDDtCbxIugvgma5.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2232 KtlVtDDtCbxIugvgma5.exe Token: SeDebugPrivilege 2520 KtlVtDDtCbxIugvgma5.exe Token: SeDebugPrivilege 2608 RegAsm.exe Token: SeDebugPrivilege 1560 KtlVtDDtCbxIugvgma5.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1668 wrote to memory of 2232 1668 3a53c78fe9cd7f38f85258a17b37fe6e_JaffaCakes118.exe 28 PID 1668 wrote to memory of 2232 1668 3a53c78fe9cd7f38f85258a17b37fe6e_JaffaCakes118.exe 28 PID 1668 wrote to memory of 2232 1668 3a53c78fe9cd7f38f85258a17b37fe6e_JaffaCakes118.exe 28 PID 1668 wrote to memory of 2232 1668 3a53c78fe9cd7f38f85258a17b37fe6e_JaffaCakes118.exe 28 PID 2232 wrote to memory of 2572 2232 KtlVtDDtCbxIugvgma5.exe 29 PID 2232 wrote to memory of 2572 2232 KtlVtDDtCbxIugvgma5.exe 29 PID 2232 wrote to memory of 2572 2232 KtlVtDDtCbxIugvgma5.exe 29 PID 2232 wrote to memory of 2572 2232 KtlVtDDtCbxIugvgma5.exe 29 PID 2572 wrote to memory of 2832 2572 csc.exe 31 PID 2572 wrote to memory of 2832 2572 csc.exe 31 PID 2572 wrote to memory of 2832 2572 csc.exe 31 PID 2572 wrote to memory of 2832 2572 csc.exe 31 PID 2232 wrote to memory of 3060 2232 KtlVtDDtCbxIugvgma5.exe 32 PID 2232 wrote to memory of 3060 2232 KtlVtDDtCbxIugvgma5.exe 32 PID 2232 wrote to memory of 3060 2232 KtlVtDDtCbxIugvgma5.exe 32 PID 2232 wrote to memory of 3060 2232 KtlVtDDtCbxIugvgma5.exe 32 PID 3060 wrote to memory of 2624 3060 csc.exe 34 PID 3060 wrote to memory of 2624 3060 csc.exe 34 PID 3060 wrote to memory of 2624 3060 csc.exe 34 PID 3060 wrote to memory of 2624 3060 csc.exe 34 PID 2232 wrote to memory of 2608 2232 KtlVtDDtCbxIugvgma5.exe 35 PID 2232 wrote to memory of 2608 2232 KtlVtDDtCbxIugvgma5.exe 35 PID 2232 wrote to memory of 2608 2232 KtlVtDDtCbxIugvgma5.exe 35 PID 2232 wrote to memory of 2608 2232 KtlVtDDtCbxIugvgma5.exe 35 PID 2232 wrote to memory of 2608 2232 KtlVtDDtCbxIugvgma5.exe 35 PID 2232 wrote to memory of 2608 2232 KtlVtDDtCbxIugvgma5.exe 35 PID 2232 wrote to memory of 2608 2232 KtlVtDDtCbxIugvgma5.exe 35 PID 2232 wrote to memory of 2608 2232 KtlVtDDtCbxIugvgma5.exe 35 PID 2232 wrote to memory of 2520 2232 KtlVtDDtCbxIugvgma5.exe 36 PID 2232 wrote to memory of 2520 2232 KtlVtDDtCbxIugvgma5.exe 36 PID 2232 wrote to memory of 2520 2232 KtlVtDDtCbxIugvgma5.exe 36 PID 2232 wrote to memory of 2520 2232 KtlVtDDtCbxIugvgma5.exe 36 PID 2520 wrote to memory of 2932 2520 KtlVtDDtCbxIugvgma5.exe 37 PID 2520 wrote to memory of 2932 2520 KtlVtDDtCbxIugvgma5.exe 37 PID 2520 wrote to memory of 2932 2520 KtlVtDDtCbxIugvgma5.exe 37 PID 2520 wrote to memory of 2932 2520 KtlVtDDtCbxIugvgma5.exe 37 PID 2932 wrote to memory of 2696 2932 csc.exe 39 PID 2932 wrote to memory of 2696 2932 csc.exe 39 PID 2932 wrote to memory of 2696 2932 csc.exe 39 PID 2932 wrote to memory of 2696 2932 csc.exe 39 PID 2520 wrote to memory of 2776 2520 KtlVtDDtCbxIugvgma5.exe 40 PID 2520 wrote to memory of 2776 2520 KtlVtDDtCbxIugvgma5.exe 40 PID 2520 wrote to memory of 2776 2520 KtlVtDDtCbxIugvgma5.exe 40 PID 2520 wrote to memory of 2776 2520 KtlVtDDtCbxIugvgma5.exe 40 PID 2776 wrote to memory of 308 2776 csc.exe 42 PID 2776 wrote to memory of 308 2776 csc.exe 42 PID 2776 wrote to memory of 308 2776 csc.exe 42 PID 2776 wrote to memory of 308 2776 csc.exe 42 PID 2520 wrote to memory of 760 2520 KtlVtDDtCbxIugvgma5.exe 43 PID 2520 wrote to memory of 760 2520 KtlVtDDtCbxIugvgma5.exe 43 PID 2520 wrote to memory of 760 2520 KtlVtDDtCbxIugvgma5.exe 43 PID 2520 wrote to memory of 760 2520 KtlVtDDtCbxIugvgma5.exe 43 PID 2520 wrote to memory of 760 2520 KtlVtDDtCbxIugvgma5.exe 43 PID 2520 wrote to memory of 760 2520 KtlVtDDtCbxIugvgma5.exe 43 PID 2520 wrote to memory of 760 2520 KtlVtDDtCbxIugvgma5.exe 43 PID 2520 wrote to memory of 760 2520 KtlVtDDtCbxIugvgma5.exe 43 PID 2520 wrote to memory of 1560 2520 KtlVtDDtCbxIugvgma5.exe 44 PID 2520 wrote to memory of 1560 2520 KtlVtDDtCbxIugvgma5.exe 44 PID 2520 wrote to memory of 1560 2520 KtlVtDDtCbxIugvgma5.exe 44 PID 2520 wrote to memory of 1560 2520 KtlVtDDtCbxIugvgma5.exe 44 PID 1560 wrote to memory of 1016 1560 KtlVtDDtCbxIugvgma5.exe 45 PID 1560 wrote to memory of 1016 1560 KtlVtDDtCbxIugvgma5.exe 45 PID 1560 wrote to memory of 1016 1560 KtlVtDDtCbxIugvgma5.exe 45 PID 1560 wrote to memory of 1016 1560 KtlVtDDtCbxIugvgma5.exe 45 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook RegAsm.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook RegAsm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a53c78fe9cd7f38f85258a17b37fe6e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3a53c78fe9cd7f38f85258a17b37fe6e_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Roaming\KtlVtDDtCbxIugvgma5.exeC:\Users\Admin\AppData\Roaming\KtlVtDDtCbxIugvgma5.exe 12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\5nc3j3qf\5nc3j3qf.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES1FB1.tmp" "c:\Users\Admin\AppData\Local\Temp\5nc3j3qf\CSC2B0C508CD074DB397F32433A2F434DA.TMP"4⤵PID:2832
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\seuj3ddp\seuj3ddp.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES203D.tmp" "c:\Users\Admin\AppData\Local\Temp\seuj3ddp\CSC2CB33DB5E2E648088DAB1C3BFD521BF.TMP"4⤵PID:2624
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:2608
-
-
C:\Users\Admin\AppData\Roaming\KtlVtDDtCbxIugvgma5.exe"C:\Users\Admin\AppData\Roaming\KtlVtDDtCbxIugvgma5.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\effkm3ow\effkm3ow.cmdline"4⤵
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES21E2.tmp" "c:\Users\Admin\AppData\Local\Temp\effkm3ow\CSC27C4948C5F30476EB4D7E76315D4515A.TMP"5⤵PID:2696
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\i5jsqwwe\i5jsqwwe.cmdline"4⤵
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES226F.tmp" "c:\Users\Admin\AppData\Local\Temp\i5jsqwwe\CSC17926E05B5B444538E348DA950B4DBC7.TMP"5⤵PID:308
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵PID:760
-
-
C:\Users\Admin\AppData\Roaming\KtlVtDDtCbxIugvgma5.exe"C:\Users\Admin\AppData\Roaming\KtlVtDDtCbxIugvgma5.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\4nteny5v\4nteny5v.cmdline"5⤵PID:1016
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES250E.tmp" "c:\Users\Admin\AppData\Local\Temp\4nteny5v\CSCFD43FFDFC6B9444C941F564496D3EB3.TMP"6⤵PID:1244
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\dqm54drx\dqm54drx.cmdline"5⤵PID:1208
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES259A.tmp" "c:\Users\Admin\AppData\Local\Temp\dqm54drx\CSC2C7DB58B37F94AC49141D05D63B180BA.TMP"6⤵PID:2948
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"5⤵PID:2240
-
-
C:\Users\Admin\AppData\Roaming\KtlVtDDtCbxIugvgma5.exe"C:\Users\Admin\AppData\Roaming\KtlVtDDtCbxIugvgma5.exe"5⤵
- Executes dropped EXE
PID:1932 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\2s3pdyia\2s3pdyia.cmdline"6⤵PID:688
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES2701.tmp" "c:\Users\Admin\AppData\Local\Temp\2s3pdyia\CSCA30B775561A94B9882F5CC911F1AE1A.TMP"7⤵PID:1048
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\hkr54hbv\hkr54hbv.cmdline"6⤵PID:2796
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES2858.tmp" "c:\Users\Admin\AppData\Local\Temp\hkr54hbv\CSC79F738E4220948D788C41C6EA73D960.TMP"7⤵PID:800
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1932 -s 74086⤵
- Loads dropped DLL
- Program crash
PID:828
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
368KB
MD56123b625105d677dd24c2e9a61a6173a
SHA131676e0a20f836ad19622f9188e3fb0366651e17
SHA256440eca2d619fc45c7d4e8259b570c58b83432506eb5388efcf01e3fa7996d0d5
SHA512c646cc30592732cb49a39efa17f3f61ffe6499ef700b64d82e4072dd7c410a751d1bf32b64beb7e683d2e3de07a98a8768bc62b958a6a1cb4088ed8b63a12409
-
Filesize
368KB
MD5b0aa0439eaf797190fab7cd10de691b6
SHA19749ba276a888130cb714bca8ee5f57a0977ce31
SHA2562233f26d633d9f2d12e72ce523372cde42bb7ccf07e0ccbeccd882c29a70d2a8
SHA5125468a38559491d51c189811208fd3a4f7ab9b0cb326dcbe5d4043441b135a0c68d9e2a2076edef081dedf2727bc4dc7cf82f75c043b07bee36faa9da6bedc671
-
Filesize
368KB
MD5de60076571b95b2d078d19d9b61e327c
SHA184cc3a8a72bbf6199bc996c90d85de5b812b5ae7
SHA2562bcd5336ff377efa5e319c1b6093bd0bf194dfb2fb7da89121873c7e79f30db4
SHA5121b80b5349f8f13dedbd59136db1054638cfffcd4f78748d16cce0817d58a9491658eefb98c5da10670eb2c34d70bd96d373e47b195bf10ac6b6386be33e94031
-
Filesize
1KB
MD53fc4c8d205f681d481751d0a53c49b4c
SHA15cb0e7e684b5831e3fc4debc638f2bffd1eb93f0
SHA2561c2109b6ee1a4f34450dd03985cd0ce1e7db2db2099183236a5fd6e6e9a37a12
SHA512900f939ad743e27128a9e8ac991636dc38955b1d63d290b9a6ee822eff7a74fbdd3da5edac86f8d80e15c94c5ef345aad6774e02f97274cff5d8e46c335f2966
-
Filesize
1KB
MD5e359bf7982aafc59dd4280ce7df28f80
SHA1f1f9bd3fc161463644e868ccb907303b9479c848
SHA256a4850f32895a4903bc4861a98fe7265f5dfc182b698da556d4f5cc1087ebe261
SHA5127d4f1bab436fcaeceb77dea6d5434e20257007ed54529854e3c2927c4f1158892e111a96033d7f2981c8940ab6130e4a809e69cccf6e894ece351048bae09a10
-
Filesize
1KB
MD549fe5dc928d6f2a40a5bab1d1861107f
SHA113933a1885a9638c5c833f37f15060bf85da2b14
SHA2568a0f963b9093bb978aa7bcf42416a906c1593c343d157d601c95d607f97b8449
SHA512eb83c3fee50e64621879c13f0eae104bd35bfd14d0fad109146fc909daa5379fc4103aff20eafb63c05e5cc4ce6b68baa379b09ff7b8ef605d44e1998f39ca22
-
Filesize
1KB
MD51a746affc50455aebeac682213ab339b
SHA1b4f54fe443170a4fc1ecebc09dbc13352eb71fe5
SHA25608d0e9d0c3a53ee412d68cd8063d159c282ec6cb3dcd3d01be9117c5177d6a41
SHA51294bd105dd5590b2ab9d4de834427cab7c7887f91dd3249ea30221e84ea0a1ea5cc04dbe685dc8e7a4a611a5de74d27805d8c10ab57d5de24bdeeeea7ab2a7407
-
Filesize
1KB
MD5eac907d7663ebcf3cc6d84f7cf373088
SHA173c74d96f42040ede8b68630fa0517e952222b4a
SHA256e19d82eecb9a794e167b599cc1a047f4be97a32c86c5ecd18614ceabfc2bd526
SHA5126c37ad4be14c76162920efd8b5fe14258e0947019240af50d12a656a05392c97f33d9f2417b81c02595fd006432b3ac0b608fb820dd23a651f14de0bf8f1ed2a
-
Filesize
1KB
MD51db0b5635623a7b581a1ba66cd2955d1
SHA112e7f6c27b31c5ddb1a1a404f6632db3a6614aec
SHA2564c2a413937266d59866ad45f95e2b52893b184a7a23a10eb3fd3252e2c7e25d6
SHA512e72838421b1b4d4d20800c3c4ada2f56e17731dd4a09f42b383fc9e0f48c350c66de827f14467b94f891d3adf90d864eda309dbe7d52d7c92b77d9c2728f892f
-
Filesize
1KB
MD5d6a46f3f273d366ab57d38bc2264200b
SHA1d1529d593bc4ae46ebff85d58246e84ee0077003
SHA2562e4eb9aa719f4b67c285be5a2848c6dd094785cc3fab8257e12b8e7ec1b2d60a
SHA51282662f0b06e1903683640b12b15bb9c49c67cf5fd3498388933e0f6786aed1b0edfabb7b05c1fc527c1183230041ce105904090b0210a36fed97607c1151c7de
-
Filesize
1KB
MD585a41c253b0495d1b469396015896290
SHA16950e49be34f8346eec693b01dacce2b6f0a78bc
SHA256bc4ed4a715b691a8b9f227b50b9ab93ac9737527e79dda095bd30fb18a510570
SHA5124de301a8af8150dc6b9b6a7ca3f0b0ea04d62cf75315f6dc9b22f5c5aff2957a812f1ac180e7332c8556eddaa6c795c15ea7c25b76fe610db70dfa69b36b8d1c
-
Filesize
368KB
MD51dcf3e945c2a36124e6dcb4a421b9fc2
SHA1d921fc1bd832c21ffec70c706880f735213191ad
SHA2563e31a80cb26dea97556106a631386b3dd2e72502efb6b5e4d7633d6356943445
SHA512d82b690c73312aab7c6fd9ebe7cc6a6c408c510e01ae760851965ff923930c1a3fb9ee42da0cf7f2a3b4236f347560e017d938fd5d7555596ef9efb943a084aa
-
Filesize
368KB
MD5870272dae4148e31822eedc03422c6e0
SHA1e9e23b8e9e12479842a6836ea00927228d07130b
SHA256fc9c401f2ce184e0dd6c351778cd7273ea2260a0a5c5419163efd7041a8098cc
SHA512c50f11f9bca07fb70ecc21f349d3011c4798a5e05a0fd2a67a6b6de23c9cd7d299a9bc827b1f73cc7ce22a8603ceaf970e8c705e02687a30120bbd7b21226f00
-
Filesize
368KB
MD5bd2b436d61f11007b6245838bdb9f842
SHA1c64565ce79dfe6c2e8542514e6bb19bc82f53428
SHA256beb9ce29659f4e35761997909bcee6544dac59e33183c5a991dbef9b30a40195
SHA5120f8b44ee81f9ba08abda6faec97038cfd9b1df1573f8d6127a84d3cbe1c8a33acdb15972e2d0da66f22e6f5834af4873a8744f74318bc4a47073913ed2b59fb9
-
Filesize
368KB
MD583f8f5b1c3d58652fe942cf85a5a3492
SHA1d9e02ed9798913bec43fefea4309ad794989edf9
SHA256247fd53b7431b256a1e50584c2de084a308596639f06bef8a060654b3f4a9817
SHA5121e020b5cfa4324431c9bf3c8b9c6790a60d8667cb3904a7fe04d8faf2e630bd5b37e100e363174d9a54300819f44a87dbd22b7e57cf22ff7030dd60d63969c82
-
Filesize
368KB
MD58bd2843d6d9ac8a798f5dd491e5f4336
SHA12bf60a3973d4e36dd4a595791e5d2cba463214f2
SHA2562521f3bd1759dd0e7e9b5124bd0c419cc910b6b5dfae6029011e93113210a319
SHA512a1d52739a8cb8bf62023071b3bb203bb9226f317d9c5446b86cb0063fd4e031fdd6c0d3150d8f805326e78b89517c7f519bded3257f6da2819d46a0194c42b1b
-
Filesize
548KB
MD5759df20fc9033fe2ce3af881567a0829
SHA1d0fc50a7b88b54a573b5ffdfaba36c380da5f222
SHA256dd52fa10a43e5082981ecf90523d3f308fbdffea66844148e96a547ad133c8e7
SHA51260381d28369bbcb9f08396abd5cbcff336758e546223086d93e76b77c478cf200dfbed77e8120406fb589abb304e8fb466be7d0e06e579e9f4ec6fc67560fdc9
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-268080393-3149932598-1824759070-1000\0f5007522459c86e95ffcc62f32308f1_84f733b4-eea8-4063-a7fc-81d3a2fcb37c
Filesize46B
MD5d898504a722bff1524134c6ab6a5eaa5
SHA1e0fdc90c2ca2a0219c99d2758e68c18875a3e11e
SHA256878f32f76b159494f5a39f9321616c6068cdb82e88df89bcc739bbc1ea78e1f9
SHA51226a4398bffb0c0aef9a6ec53cd3367a2d0abf2f70097f711bbbf1e9e32fd9f1a72121691bb6a39eeb55d596edd527934e541b4defb3b1426b1d1a6429804dc61
-
Filesize
302B
MD5493129b404d2e824254f493a0518a1e2
SHA17cf1acc3b9b5576d85fd9a7ba142779407cdc429
SHA256b735165e1306a19992d775f81011eebdf60a6d82033b1f9ac9418ee8ccf07e1e
SHA512b2b3c0cbe5bcf46522782da14389b3586da80281c6f802333fbd9b6a0ed20e4e689aad3a99006537ee411acf56624a62283c61792441731b469d135241811913
-
Filesize
652B
MD591a52a04084be455b30ff341ffa73d9d
SHA10f03f2e8821f3f4b3e0d367f26258b2b991179eb
SHA256855db96e76959e82e660b71e76f9eb0690d960c930cd54a81b3bf7bab2b29526
SHA5123ce4bbde7cdcebdac772c8e26b0f473e30fbe27a84ee1c6cf0ff314f36b702e1518122ddb94f4421c3ab70efc0849f11a2b92870cbc8dc5664c932fe4aa7a8f1
-
Filesize
302B
MD5239eee37191a04458509f0d78fa94255
SHA1398c26747a098dd1fde63f0280459c3ac9f29e93
SHA256801a278034427f4879c3e6cc7ccaf800de2e3c7956caba167b7052a84f4fce54
SHA5126726b1471d6b6af4e353f0bc0b540376bd3e43fe461ae47ce0b8e6b43f5c23ae67572567495b74aacdb20a8a15cd6ec329cdead802cb0e3f7aadd172f9727f57
-
Filesize
652B
MD5a579fd9c7fd2453d9629c5e9ac69c947
SHA1da79384458dab3f6dd133dac119d41496ba3d331
SHA25608aae64684e580c9e41bbd3739c71b58bf4edc5b7ddae4e90b89711c217c1207
SHA512aa0d0276d5de35f3777993945a3e50b886672fe500cc5be5398634e2f43f40d0d8fee4134b7659d699cbfab21aabc4fa73608c1e42e5b247da5d7330e61d0a11
-
Filesize
548KB
MD5e58500c185aa3db747092f20e836c157
SHA1dccc26b1bc025eee0000a735f971ac3aba8d063b
SHA25690d35cc16bb2207477339b07702bea2817978321538dbdd6cf066aa6d628690b
SHA5121dbdbf25f960395b95c8061c587856a09ed40307971a5b98c0fada88103ef6740f768862160457d21c8666dd0995b6e37dbb5e95d873f78f1419f3ca6744a4a0
-
Filesize
302B
MD525dbdaee025338a1cf7a727175946c5e
SHA13db6b85ac4e9791d5a927db7fe81b778502da8b5
SHA25673442e9bc127e62958c1e76c18a8d6fe4f1d8f37e4eba9e2c44776f17e12ca7a
SHA51228798990d79c9281495438821bd289e5235301a6b09157cf7dd866b8397b6af8c096cdde2036081e581d9f82fc05b3409a7d712c90549fd30e4f61d3d6fd9031
-
Filesize
652B
MD5acbe50bdbc0f382fd145ce2f5cc9fde6
SHA1072cd895d040faffd38277b0a3e4cebff38d3f74
SHA2565fcd976e8cf667499d053663ee240928b40fb62f38636cb7d7e73a66e55cd343
SHA512c1329d8cf2707cd51b347e45cdfbe801dcf8849e2af339ac916c758559a775e688b96c4e5c3f0060ba3cc8247ec8bcb5df3b5d1d70512f798c7368f265026f53
-
Filesize
652B
MD5437888e67a69086266f97f5c5a22edc2
SHA1b6c80a8a867200ba1001c51031ef96931bb42bdc
SHA256309bf61f6ef0d31b02e0305da77b94d15ccef9353c209212cae310ab57ac8931
SHA51229acdcf0761fe6305d9f1090335b91486f0f6b5c7b49bdf7792b5c0cc4d000b5807d8a5af4f53b633413baf93f16163ae74d6cd07438e78b3f95ed56590a7a7d
-
Filesize
302B
MD55f70190ccaef4890627c6457fcc7f743
SHA162aaab6afae2c06616fa4ffadf6ff8db32dc7021
SHA25644ae55bce53d0287aeaa373982b8dc8e5c8c7d5bd3cd042fc573a727ebebcbec
SHA512bfc325e552d6b2342efe21659f684ca0ede20300317a8a0eacacd83b1f53ec52ef3ce3caa8d7a9bdded316a57e2a80ece002fa9c0715000b5f972b6285a85494
-
Filesize
652B
MD57072b8ffb67b9eda97c547ef284b67e4
SHA1d2e2063ebf85b34d0a5e3d560f0e80c5ea1af0d4
SHA2565735e74188f11217a46032e09c554d7d83b3dfaa6bae24ade3616def3c5baf3e
SHA5120dff6e73b6eae0cbef24dae5f0bbdee1573d82a4e45ccdf7512fe203dcb37ab55e8bfd70f6127d5610db8cd7d88059955515eeeb855b8501de7f88d302577768
-
Filesize
302B
MD568f7b5d7c0ae22d7ed74a995620ce93d
SHA135710217f896657ae374ee92e6bf11f777f6c3d6
SHA2567d3fafccd0eeb3e925fffff2b3919a2ce9cf55c2f3f1d5ad3be8a1f3f42f118a
SHA512c58abe61d9d361d2935df4c270a3d2353ea0454b01343dd889eb436724660007a47c2b19577043b6bbfe15d4201ee32b04beafbadd75469f4695408879f4ed40
-
Filesize
652B
MD52ad199cb3f7a83f885eb2a4d2cebf700
SHA1c70bdd7a13e59a1c85c92f325d0289992a5c75bc
SHA256314f4a4b6e70704a1c3a18253434d9cfdd84b10a6cd3b2067f4d106cbebcb859
SHA512b27502c48c1553730c9f89754d90c09dc0d88361c78dcc2ae2e45f87b74c4e29b92da8d72cef40208bd52fb9df732845a9335c5a879b027cbc384b38552444f2
-
Filesize
302B
MD5ee9064fae493732f19a15f1a68490543
SHA15ea57c06f0806097b2764c8deedc5b6cfa89ed79
SHA2564b0bc03d6d8d6f0881cc7ea1329b2e16813d63a744e9081dc133e6be30c2095f
SHA51299ea252a6123e4050bf9bff42275fbaa96caecfe19ecf88ff314fe1a53d89675b75cf382458c58320dfde0f46cfb3be5efdd2a13758bcecfa544de59a0c51dec
-
Filesize
652B
MD5a193df8a265a630ec9b37b73777662f2
SHA1a9821bd62bd6ca2db240920aaf631b88d60bb3b8
SHA2565d261c99dfdf1d4b0c8c20a3161cb0f3edf530b3392f9987e8783dde6663281c
SHA51299afc3a427d4969f930ecaaf74e724e457403bdd3b910664e7d9b7767fedfce67c578d39c0fb3aef1827e63c4f158e2b6d2cc5a662991c8e0cf5613e5bdd9a7e
-
Filesize
302B
MD5aa42c9207ac816953f4ebca5886fa2d0
SHA1c4b74606ad302f2a8f24a202b3673a1104dd3fae
SHA2567f726c9773aa38f095cbf72c4810dbce38b3a52e499ce7f66922b76c83919f55
SHA51237d1c9fdd25b6b3ad04b8776d6869364dbf1403aea42221727dea90716bf3d62257dfc22c0ea7f1b12a91e8fdde2a3af548bc8f3e56e4b5a5ed715937717b33e
-
Filesize
652B
MD54368f3ebd1f92b94a93c6128558c7384
SHA14a976277a3bbaef46c5c632bb91a6a8abb2b8f76
SHA2567230ad95f79084f24ba956590ffe9a1d7e71883ce248c84bc55b55b240cd2f99
SHA512cc3019d02490c20f8d1ca4d0abf9e1718bdf436e507b024fe1df96f5a4d6af19d42a12483623c761ab7841c3a7f39c254bc5669d5e049124e09ca71497a9cb96
-
Filesize
302B
MD53cf84ab60562f642ad79a313335f0443
SHA14936ceb78cca3af51ae77559ff4b9f691c71eac5
SHA256f09cf6ae9972d7d0d8a055e629e9dff392b4442addd7c63b15975226622aba44
SHA512431506cb4eca7f6c9b9c9492937c9c3168832f7823aa51527856c9f7f8815ae88bb08763d3d92bad2c267586d26ce1d266efeda1930583ea4929545524147710
-
Filesize
101KB
MD5fa27c746271b2c2e1e73b86a0a77b914
SHA14808bce9aa26cc07389480724b460f25512bb568
SHA25600d716359a25f1e2b3aed74c005d10fc93365bf34607eabb58cafbb6b294eaa1
SHA512e06911497ae6708076bb87b2fe4413858344bd6de67f52df3d7447768b39b8d8be42063ba899cebea26c778e466ef66f8ce7076e53863a1c5d6b93cda5843209