Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 01:43
Static task
static1
Behavioral task
behavioral1
Sample
69540daefb0ea01e92b38ea03e71b776_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
69540daefb0ea01e92b38ea03e71b776_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
69540daefb0ea01e92b38ea03e71b776_JaffaCakes118.exe
-
Size
512KB
-
MD5
69540daefb0ea01e92b38ea03e71b776
-
SHA1
959603423d0c879bd5d38f1bf8c6a1766f9cd24e
-
SHA256
1d067e4923586baf244a48748ab6062c0e2b9db368f004819a3bda2274a272ed
-
SHA512
571405401bb1450d426b6552236cd0876556a29278869fd01d7db8d69fad5469a55b41c4d3fe96dcfbe9a9fdeb939669026db2718f922ef44f4c50b9c59d1897
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6o:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm53
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
gmkyvrfpnj.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" gmkyvrfpnj.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
gmkyvrfpnj.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" gmkyvrfpnj.exe -
Processes:
gmkyvrfpnj.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" gmkyvrfpnj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" gmkyvrfpnj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" gmkyvrfpnj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" gmkyvrfpnj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" gmkyvrfpnj.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
gmkyvrfpnj.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" gmkyvrfpnj.exe -
Modifies Installed Components in the registry 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Executes dropped EXE 5 IoCs
Processes:
gmkyvrfpnj.exezfrlkozlddfknmk.exehbqchuze.exeaysgrflsojnxp.exehbqchuze.exepid process 2096 gmkyvrfpnj.exe 2980 zfrlkozlddfknmk.exe 2688 hbqchuze.exe 2840 aysgrflsojnxp.exe 2508 hbqchuze.exe -
Loads dropped DLL 5 IoCs
Processes:
69540daefb0ea01e92b38ea03e71b776_JaffaCakes118.exegmkyvrfpnj.exepid process 1600 69540daefb0ea01e92b38ea03e71b776_JaffaCakes118.exe 1600 69540daefb0ea01e92b38ea03e71b776_JaffaCakes118.exe 1600 69540daefb0ea01e92b38ea03e71b776_JaffaCakes118.exe 1600 69540daefb0ea01e92b38ea03e71b776_JaffaCakes118.exe 2096 gmkyvrfpnj.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
gmkyvrfpnj.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" gmkyvrfpnj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" gmkyvrfpnj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" gmkyvrfpnj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirstRunDisabled = "1" gmkyvrfpnj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" gmkyvrfpnj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" gmkyvrfpnj.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
zfrlkozlddfknmk.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "aysgrflsojnxp.exe" zfrlkozlddfknmk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\lupdkieo = "gmkyvrfpnj.exe" zfrlkozlddfknmk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\bvhoiiex = "zfrlkozlddfknmk.exe" zfrlkozlddfknmk.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
hbqchuze.exehbqchuze.exegmkyvrfpnj.exedescription ioc process File opened (read-only) \??\w: hbqchuze.exe File opened (read-only) \??\i: hbqchuze.exe File opened (read-only) \??\j: hbqchuze.exe File opened (read-only) \??\l: hbqchuze.exe File opened (read-only) \??\p: hbqchuze.exe File opened (read-only) \??\v: hbqchuze.exe File opened (read-only) \??\q: gmkyvrfpnj.exe File opened (read-only) \??\t: gmkyvrfpnj.exe File opened (read-only) \??\m: hbqchuze.exe File opened (read-only) \??\y: hbqchuze.exe File opened (read-only) \??\l: gmkyvrfpnj.exe File opened (read-only) \??\i: hbqchuze.exe File opened (read-only) \??\b: hbqchuze.exe File opened (read-only) \??\e: hbqchuze.exe File opened (read-only) \??\r: hbqchuze.exe File opened (read-only) \??\k: hbqchuze.exe File opened (read-only) \??\x: hbqchuze.exe File opened (read-only) \??\j: gmkyvrfpnj.exe File opened (read-only) \??\t: hbqchuze.exe File opened (read-only) \??\j: hbqchuze.exe File opened (read-only) \??\n: hbqchuze.exe File opened (read-only) \??\p: hbqchuze.exe File opened (read-only) \??\g: hbqchuze.exe File opened (read-only) \??\q: hbqchuze.exe File opened (read-only) \??\s: hbqchuze.exe File opened (read-only) \??\m: gmkyvrfpnj.exe File opened (read-only) \??\v: gmkyvrfpnj.exe File opened (read-only) \??\x: hbqchuze.exe File opened (read-only) \??\u: hbqchuze.exe File opened (read-only) \??\y: hbqchuze.exe File opened (read-only) \??\p: gmkyvrfpnj.exe File opened (read-only) \??\q: hbqchuze.exe File opened (read-only) \??\s: gmkyvrfpnj.exe File opened (read-only) \??\k: hbqchuze.exe File opened (read-only) \??\w: hbqchuze.exe File opened (read-only) \??\z: hbqchuze.exe File opened (read-only) \??\l: hbqchuze.exe File opened (read-only) \??\r: hbqchuze.exe File opened (read-only) \??\o: gmkyvrfpnj.exe File opened (read-only) \??\u: hbqchuze.exe File opened (read-only) \??\b: gmkyvrfpnj.exe File opened (read-only) \??\g: gmkyvrfpnj.exe File opened (read-only) \??\n: gmkyvrfpnj.exe File opened (read-only) \??\r: gmkyvrfpnj.exe File opened (read-only) \??\h: hbqchuze.exe File opened (read-only) \??\s: hbqchuze.exe File opened (read-only) \??\v: hbqchuze.exe File opened (read-only) \??\n: hbqchuze.exe File opened (read-only) \??\y: gmkyvrfpnj.exe File opened (read-only) \??\a: hbqchuze.exe File opened (read-only) \??\t: hbqchuze.exe File opened (read-only) \??\i: gmkyvrfpnj.exe File opened (read-only) \??\z: gmkyvrfpnj.exe File opened (read-only) \??\o: hbqchuze.exe File opened (read-only) \??\z: hbqchuze.exe File opened (read-only) \??\a: hbqchuze.exe File opened (read-only) \??\e: hbqchuze.exe File opened (read-only) \??\h: hbqchuze.exe File opened (read-only) \??\e: gmkyvrfpnj.exe File opened (read-only) \??\k: gmkyvrfpnj.exe File opened (read-only) \??\x: gmkyvrfpnj.exe File opened (read-only) \??\a: gmkyvrfpnj.exe File opened (read-only) \??\w: gmkyvrfpnj.exe File opened (read-only) \??\b: hbqchuze.exe -
Modifies WinLogon 2 TTPs 2 IoCs
Processes:
gmkyvrfpnj.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" gmkyvrfpnj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" gmkyvrfpnj.exe -
AutoIT Executable 6 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral1/memory/1600-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe C:\Windows\SysWOW64\zfrlkozlddfknmk.exe autoit_exe \Windows\SysWOW64\gmkyvrfpnj.exe autoit_exe \Windows\SysWOW64\hbqchuze.exe autoit_exe \Windows\SysWOW64\aysgrflsojnxp.exe autoit_exe C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe autoit_exe -
Drops file in System32 directory 9 IoCs
Processes:
69540daefb0ea01e92b38ea03e71b776_JaffaCakes118.exegmkyvrfpnj.exedescription ioc process File created C:\Windows\SysWOW64\gmkyvrfpnj.exe 69540daefb0ea01e92b38ea03e71b776_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\zfrlkozlddfknmk.exe 69540daefb0ea01e92b38ea03e71b776_JaffaCakes118.exe File created C:\Windows\SysWOW64\hbqchuze.exe 69540daefb0ea01e92b38ea03e71b776_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\aysgrflsojnxp.exe 69540daefb0ea01e92b38ea03e71b776_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\gmkyvrfpnj.exe 69540daefb0ea01e92b38ea03e71b776_JaffaCakes118.exe File created C:\Windows\SysWOW64\zfrlkozlddfknmk.exe 69540daefb0ea01e92b38ea03e71b776_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\hbqchuze.exe 69540daefb0ea01e92b38ea03e71b776_JaffaCakes118.exe File created C:\Windows\SysWOW64\aysgrflsojnxp.exe 69540daefb0ea01e92b38ea03e71b776_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll gmkyvrfpnj.exe -
Drops file in Program Files directory 14 IoCs
Processes:
hbqchuze.exehbqchuze.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal hbqchuze.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe hbqchuze.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe hbqchuze.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe hbqchuze.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe hbqchuze.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe hbqchuze.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe hbqchuze.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe hbqchuze.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal hbqchuze.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal hbqchuze.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe hbqchuze.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe hbqchuze.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal hbqchuze.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe hbqchuze.exe -
Drops file in Windows directory 4 IoCs
Processes:
69540daefb0ea01e92b38ea03e71b776_JaffaCakes118.exeWINWORD.EXEdescription ioc process File opened for modification C:\Windows\mydoc.rtf 69540daefb0ea01e92b38ea03e71b776_JaffaCakes118.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Office loads VBA resources, possible macro or embedded object present
-
Processes:
WINWORD.EXEdescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE -
Modifies registry class 64 IoCs
Processes:
WINWORD.EXEgmkyvrfpnj.exe69540daefb0ea01e92b38ea03e71b776_JaffaCakes118.exeexplorer.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon\ = "\"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" gmkyvrfpnj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597} WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 69540daefb0ea01e92b38ea03e71b776_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6BBFFAC9FE16F195837B3B3781EA39E4B08B02F043150332E1BF42ED08A1" 69540daefb0ea01e92b38ea03e71b776_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" /p %1" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat gmkyvrfpnj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc gmkyvrfpnj.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\mhtmlfile WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "33442C0C9C2282566D4377D270202DDE7D8064AA" 69540daefb0ea01e92b38ea03e71b776_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2FC3B12844EF399A53BDB9D7339FD7B8" 69540daefb0ea01e92b38ea03e71b776_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ThreadingModel = "Apartment" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14 WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
WINWORD.EXEpid process 2592 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
69540daefb0ea01e92b38ea03e71b776_JaffaCakes118.exegmkyvrfpnj.exezfrlkozlddfknmk.exehbqchuze.exeaysgrflsojnxp.exehbqchuze.exepid process 1600 69540daefb0ea01e92b38ea03e71b776_JaffaCakes118.exe 1600 69540daefb0ea01e92b38ea03e71b776_JaffaCakes118.exe 1600 69540daefb0ea01e92b38ea03e71b776_JaffaCakes118.exe 1600 69540daefb0ea01e92b38ea03e71b776_JaffaCakes118.exe 1600 69540daefb0ea01e92b38ea03e71b776_JaffaCakes118.exe 1600 69540daefb0ea01e92b38ea03e71b776_JaffaCakes118.exe 1600 69540daefb0ea01e92b38ea03e71b776_JaffaCakes118.exe 1600 69540daefb0ea01e92b38ea03e71b776_JaffaCakes118.exe 2096 gmkyvrfpnj.exe 2096 gmkyvrfpnj.exe 2096 gmkyvrfpnj.exe 2096 gmkyvrfpnj.exe 2096 gmkyvrfpnj.exe 2980 zfrlkozlddfknmk.exe 2980 zfrlkozlddfknmk.exe 2980 zfrlkozlddfknmk.exe 2980 zfrlkozlddfknmk.exe 2980 zfrlkozlddfknmk.exe 2688 hbqchuze.exe 2688 hbqchuze.exe 2688 hbqchuze.exe 2688 hbqchuze.exe 2840 aysgrflsojnxp.exe 2840 aysgrflsojnxp.exe 2840 aysgrflsojnxp.exe 2840 aysgrflsojnxp.exe 2840 aysgrflsojnxp.exe 2840 aysgrflsojnxp.exe 2508 hbqchuze.exe 2508 hbqchuze.exe 2508 hbqchuze.exe 2508 hbqchuze.exe 2980 zfrlkozlddfknmk.exe 2840 aysgrflsojnxp.exe 2840 aysgrflsojnxp.exe 2980 zfrlkozlddfknmk.exe 2980 zfrlkozlddfknmk.exe 2840 aysgrflsojnxp.exe 2840 aysgrflsojnxp.exe 2980 zfrlkozlddfknmk.exe 2840 aysgrflsojnxp.exe 2840 aysgrflsojnxp.exe 2980 zfrlkozlddfknmk.exe 2840 aysgrflsojnxp.exe 2840 aysgrflsojnxp.exe 2980 zfrlkozlddfknmk.exe 2840 aysgrflsojnxp.exe 2840 aysgrflsojnxp.exe 2980 zfrlkozlddfknmk.exe 2840 aysgrflsojnxp.exe 2840 aysgrflsojnxp.exe 2980 zfrlkozlddfknmk.exe 2840 aysgrflsojnxp.exe 2840 aysgrflsojnxp.exe 2980 zfrlkozlddfknmk.exe 2840 aysgrflsojnxp.exe 2840 aysgrflsojnxp.exe 2980 zfrlkozlddfknmk.exe 2840 aysgrflsojnxp.exe 2840 aysgrflsojnxp.exe 2980 zfrlkozlddfknmk.exe 2840 aysgrflsojnxp.exe 2840 aysgrflsojnxp.exe 2980 zfrlkozlddfknmk.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
Processes:
explorer.exedescription pid process Token: SeShutdownPrivilege 1992 explorer.exe Token: SeShutdownPrivilege 1992 explorer.exe Token: SeShutdownPrivilege 1992 explorer.exe Token: SeShutdownPrivilege 1992 explorer.exe Token: SeShutdownPrivilege 1992 explorer.exe Token: SeShutdownPrivilege 1992 explorer.exe Token: SeShutdownPrivilege 1992 explorer.exe Token: SeShutdownPrivilege 1992 explorer.exe Token: SeShutdownPrivilege 1992 explorer.exe Token: SeShutdownPrivilege 1992 explorer.exe Token: SeShutdownPrivilege 1992 explorer.exe Token: SeShutdownPrivilege 1992 explorer.exe -
Suspicious use of FindShellTrayWindow 47 IoCs
Processes:
69540daefb0ea01e92b38ea03e71b776_JaffaCakes118.exegmkyvrfpnj.exezfrlkozlddfknmk.exeaysgrflsojnxp.exehbqchuze.exehbqchuze.exeexplorer.exepid process 1600 69540daefb0ea01e92b38ea03e71b776_JaffaCakes118.exe 1600 69540daefb0ea01e92b38ea03e71b776_JaffaCakes118.exe 1600 69540daefb0ea01e92b38ea03e71b776_JaffaCakes118.exe 2096 gmkyvrfpnj.exe 2096 gmkyvrfpnj.exe 2096 gmkyvrfpnj.exe 2980 zfrlkozlddfknmk.exe 2980 zfrlkozlddfknmk.exe 2980 zfrlkozlddfknmk.exe 2840 aysgrflsojnxp.exe 2840 aysgrflsojnxp.exe 2840 aysgrflsojnxp.exe 2688 hbqchuze.exe 2688 hbqchuze.exe 2688 hbqchuze.exe 2508 hbqchuze.exe 2508 hbqchuze.exe 2508 hbqchuze.exe 1992 explorer.exe 1992 explorer.exe 1992 explorer.exe 1992 explorer.exe 1992 explorer.exe 1992 explorer.exe 1992 explorer.exe 1992 explorer.exe 1992 explorer.exe 1992 explorer.exe 1992 explorer.exe 1992 explorer.exe 1992 explorer.exe 1992 explorer.exe 1992 explorer.exe 1992 explorer.exe 1992 explorer.exe 1992 explorer.exe 1992 explorer.exe 1992 explorer.exe 1992 explorer.exe 1992 explorer.exe 1992 explorer.exe 1992 explorer.exe 1992 explorer.exe 1992 explorer.exe 1992 explorer.exe 1992 explorer.exe 1992 explorer.exe -
Suspicious use of SendNotifyMessage 34 IoCs
Processes:
69540daefb0ea01e92b38ea03e71b776_JaffaCakes118.exegmkyvrfpnj.exezfrlkozlddfknmk.exeaysgrflsojnxp.exehbqchuze.exeexplorer.exepid process 1600 69540daefb0ea01e92b38ea03e71b776_JaffaCakes118.exe 1600 69540daefb0ea01e92b38ea03e71b776_JaffaCakes118.exe 1600 69540daefb0ea01e92b38ea03e71b776_JaffaCakes118.exe 2096 gmkyvrfpnj.exe 2096 gmkyvrfpnj.exe 2096 gmkyvrfpnj.exe 2980 zfrlkozlddfknmk.exe 2980 zfrlkozlddfknmk.exe 2980 zfrlkozlddfknmk.exe 2840 aysgrflsojnxp.exe 2840 aysgrflsojnxp.exe 2840 aysgrflsojnxp.exe 2688 hbqchuze.exe 2688 hbqchuze.exe 2688 hbqchuze.exe 1992 explorer.exe 1992 explorer.exe 1992 explorer.exe 1992 explorer.exe 1992 explorer.exe 1992 explorer.exe 1992 explorer.exe 1992 explorer.exe 1992 explorer.exe 1992 explorer.exe 1992 explorer.exe 1992 explorer.exe 1992 explorer.exe 1992 explorer.exe 1992 explorer.exe 1992 explorer.exe 1992 explorer.exe 1992 explorer.exe 1992 explorer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
WINWORD.EXEpid process 2592 WINWORD.EXE 2592 WINWORD.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
69540daefb0ea01e92b38ea03e71b776_JaffaCakes118.exegmkyvrfpnj.exeWINWORD.EXEdescription pid process target process PID 1600 wrote to memory of 2096 1600 69540daefb0ea01e92b38ea03e71b776_JaffaCakes118.exe gmkyvrfpnj.exe PID 1600 wrote to memory of 2096 1600 69540daefb0ea01e92b38ea03e71b776_JaffaCakes118.exe gmkyvrfpnj.exe PID 1600 wrote to memory of 2096 1600 69540daefb0ea01e92b38ea03e71b776_JaffaCakes118.exe gmkyvrfpnj.exe PID 1600 wrote to memory of 2096 1600 69540daefb0ea01e92b38ea03e71b776_JaffaCakes118.exe gmkyvrfpnj.exe PID 1600 wrote to memory of 2980 1600 69540daefb0ea01e92b38ea03e71b776_JaffaCakes118.exe zfrlkozlddfknmk.exe PID 1600 wrote to memory of 2980 1600 69540daefb0ea01e92b38ea03e71b776_JaffaCakes118.exe zfrlkozlddfknmk.exe PID 1600 wrote to memory of 2980 1600 69540daefb0ea01e92b38ea03e71b776_JaffaCakes118.exe zfrlkozlddfknmk.exe PID 1600 wrote to memory of 2980 1600 69540daefb0ea01e92b38ea03e71b776_JaffaCakes118.exe zfrlkozlddfknmk.exe PID 1600 wrote to memory of 2688 1600 69540daefb0ea01e92b38ea03e71b776_JaffaCakes118.exe hbqchuze.exe PID 1600 wrote to memory of 2688 1600 69540daefb0ea01e92b38ea03e71b776_JaffaCakes118.exe hbqchuze.exe PID 1600 wrote to memory of 2688 1600 69540daefb0ea01e92b38ea03e71b776_JaffaCakes118.exe hbqchuze.exe PID 1600 wrote to memory of 2688 1600 69540daefb0ea01e92b38ea03e71b776_JaffaCakes118.exe hbqchuze.exe PID 1600 wrote to memory of 2840 1600 69540daefb0ea01e92b38ea03e71b776_JaffaCakes118.exe aysgrflsojnxp.exe PID 1600 wrote to memory of 2840 1600 69540daefb0ea01e92b38ea03e71b776_JaffaCakes118.exe aysgrflsojnxp.exe PID 1600 wrote to memory of 2840 1600 69540daefb0ea01e92b38ea03e71b776_JaffaCakes118.exe aysgrflsojnxp.exe PID 1600 wrote to memory of 2840 1600 69540daefb0ea01e92b38ea03e71b776_JaffaCakes118.exe aysgrflsojnxp.exe PID 2096 wrote to memory of 2508 2096 gmkyvrfpnj.exe hbqchuze.exe PID 2096 wrote to memory of 2508 2096 gmkyvrfpnj.exe hbqchuze.exe PID 2096 wrote to memory of 2508 2096 gmkyvrfpnj.exe hbqchuze.exe PID 2096 wrote to memory of 2508 2096 gmkyvrfpnj.exe hbqchuze.exe PID 1600 wrote to memory of 2592 1600 69540daefb0ea01e92b38ea03e71b776_JaffaCakes118.exe WINWORD.EXE PID 1600 wrote to memory of 2592 1600 69540daefb0ea01e92b38ea03e71b776_JaffaCakes118.exe WINWORD.EXE PID 1600 wrote to memory of 2592 1600 69540daefb0ea01e92b38ea03e71b776_JaffaCakes118.exe WINWORD.EXE PID 1600 wrote to memory of 2592 1600 69540daefb0ea01e92b38ea03e71b776_JaffaCakes118.exe WINWORD.EXE PID 2592 wrote to memory of 2012 2592 WINWORD.EXE splwow64.exe PID 2592 wrote to memory of 2012 2592 WINWORD.EXE splwow64.exe PID 2592 wrote to memory of 2012 2592 WINWORD.EXE splwow64.exe PID 2592 wrote to memory of 2012 2592 WINWORD.EXE splwow64.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\69540daefb0ea01e92b38ea03e71b776_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\69540daefb0ea01e92b38ea03e71b776_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\SysWOW64\gmkyvrfpnj.exegmkyvrfpnj.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\SysWOW64\hbqchuze.exeC:\Windows\system32\hbqchuze.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:2508 -
C:\Windows\SysWOW64\zfrlkozlddfknmk.exezfrlkozlddfknmk.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2980 -
C:\Windows\SysWOW64\hbqchuze.exehbqchuze.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2688 -
C:\Windows\SysWOW64\aysgrflsojnxp.exeaysgrflsojnxp.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2840 -
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"2⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:2012
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1992
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
8Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD511a6a1dff19e7aa14f5142ceb422754c
SHA1156c4f6790242382ed0b9f7a8b8b4b466a472c58
SHA2568990e3cb08077f3e9b4ef85969b05806aa1a552a125ac28348d43d2fdedcf4c6
SHA5122ff8268b4b4bd4bb00338ac5100e8270b8d60ad55df1017338fd2a09b03a30cee0f6a623dca5b871a276824f3dcfade6b6c63720b872be7b7f43eaeb1fd5b081
-
Filesize
512KB
MD5d1a2f554c9b1f5743c407f289e9aa9f1
SHA1cb2dc564c5e49f69b2d13d811ee73348a578c860
SHA2566d150d9e9245a5272fcfc8b8a454975a3b0ebe4f33067613cee3829c95f005aa
SHA512cda59cd06708bf762f1534b3b900586a4cd697ea93a39375f16f7dcc0f026a9e019f6e0247ff82646ed4a40902d1af5a030679ea7060924213d4b0c949ff68a5
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
512KB
MD55da555190c60dbf2037d972505dc2ac3
SHA1b669af89870db0292ae936baa3768b7eb926c3f8
SHA2568fedcdae9c11797b4f786b0473e582968ab51a25390195b83f9c30b37b8ee9db
SHA5120acaa8da06722e9f65a28b6c1af75b5189a67bf0a8e4b3e13e295982496178c24c88ba12d322e048cc374c69878c9be73a412848c8a8561a5ba5849285c76750
-
Filesize
512KB
MD50c4c47d4508f13a608556898b4696eea
SHA157bfc17d4f96f0204e05acdcc4fa41010acec85a
SHA25622687d1c73f1cf13c13b460b2bfc57405a72bc001f7b51e432e46745077e92f9
SHA512f5fb41ca9af55782e31280b2d5426f6670e131376e28f6473fc04b452e3cfcac31cb9ef9c248c5c26c169918f1e46b0628810b2ca43454fcda22f1d447c02048
-
Filesize
512KB
MD5c81953ef6b01bab425e92cb0ef2ef2e0
SHA12d3265bf0916b97e04cefb2e365b532e4177f93f
SHA256c0a406f84c341ad87e973d3d1be619b62c4c2ad9b30f1edc3c320a272e1b05e3
SHA512291999f49edc69dc75708a65041f638a93376550eba8d22a83b21734d6a12da377ea8e77851fc77060169292e115841b2210e969490311df6a7544b5d6db9143