Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24-05-2024 11:49
Static task
static1
Behavioral task
behavioral1
Sample
6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe
-
Size
512KB
-
MD5
6e680ddbbcf07f65e472b75485ce2514
-
SHA1
b8d87c2bad765ee6644af76ce608e7451940681d
-
SHA256
911ece796811f0d61fc4bb7215de3139ed351813e7777d5dd469a85778589a3b
-
SHA512
a76a6e2c40f89dfd0e32ffc9367295f22e515c716889a7c8dd2faf3717fcf83d249d7d53d5ed5c19a323d799fdce17a4bde1a704419ae2fbf604b79d0ee777a4
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6c:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5x
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
rtsuklntlg.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" rtsuklntlg.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
rtsuklntlg.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" rtsuklntlg.exe -
Processes:
rtsuklntlg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" rtsuklntlg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" rtsuklntlg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" rtsuklntlg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" rtsuklntlg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" rtsuklntlg.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
rtsuklntlg.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" rtsuklntlg.exe -
Executes dropped EXE 5 IoCs
Processes:
rtsuklntlg.exeldghalwxamjgrpw.exerkrrqpra.exejzyirvncsswdy.exerkrrqpra.exepid process 2656 rtsuklntlg.exe 2680 ldghalwxamjgrpw.exe 2640 rkrrqpra.exe 2420 jzyirvncsswdy.exe 2404 rkrrqpra.exe -
Loads dropped DLL 5 IoCs
Processes:
6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exertsuklntlg.exepid process 2156 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe 2156 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe 2156 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe 2156 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe 2656 rtsuklntlg.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
rtsuklntlg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" rtsuklntlg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" rtsuklntlg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" rtsuklntlg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" rtsuklntlg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" rtsuklntlg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirstRunDisabled = "1" rtsuklntlg.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
ldghalwxamjgrpw.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ajsefxid = "rtsuklntlg.exe" ldghalwxamjgrpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\rtszpvdf = "ldghalwxamjgrpw.exe" ldghalwxamjgrpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "jzyirvncsswdy.exe" ldghalwxamjgrpw.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
rkrrqpra.exertsuklntlg.exerkrrqpra.exedescription ioc process File opened (read-only) \??\u: rkrrqpra.exe File opened (read-only) \??\h: rtsuklntlg.exe File opened (read-only) \??\s: rkrrqpra.exe File opened (read-only) \??\j: rkrrqpra.exe File opened (read-only) \??\r: rtsuklntlg.exe File opened (read-only) \??\r: rkrrqpra.exe File opened (read-only) \??\m: rkrrqpra.exe File opened (read-only) \??\l: rtsuklntlg.exe File opened (read-only) \??\s: rtsuklntlg.exe File opened (read-only) \??\u: rkrrqpra.exe File opened (read-only) \??\w: rtsuklntlg.exe File opened (read-only) \??\b: rkrrqpra.exe File opened (read-only) \??\v: rkrrqpra.exe File opened (read-only) \??\i: rtsuklntlg.exe File opened (read-only) \??\j: rtsuklntlg.exe File opened (read-only) \??\v: rtsuklntlg.exe File opened (read-only) \??\q: rkrrqpra.exe File opened (read-only) \??\s: rkrrqpra.exe File opened (read-only) \??\a: rtsuklntlg.exe File opened (read-only) \??\e: rtsuklntlg.exe File opened (read-only) \??\o: rkrrqpra.exe File opened (read-only) \??\i: rkrrqpra.exe File opened (read-only) \??\y: rkrrqpra.exe File opened (read-only) \??\p: rtsuklntlg.exe File opened (read-only) \??\t: rtsuklntlg.exe File opened (read-only) \??\a: rkrrqpra.exe File opened (read-only) \??\q: rtsuklntlg.exe File opened (read-only) \??\o: rkrrqpra.exe File opened (read-only) \??\q: rkrrqpra.exe File opened (read-only) \??\l: rkrrqpra.exe File opened (read-only) \??\t: rkrrqpra.exe File opened (read-only) \??\e: rkrrqpra.exe File opened (read-only) \??\h: rkrrqpra.exe File opened (read-only) \??\m: rkrrqpra.exe File opened (read-only) \??\z: rkrrqpra.exe File opened (read-only) \??\y: rtsuklntlg.exe File opened (read-only) \??\p: rkrrqpra.exe File opened (read-only) \??\b: rkrrqpra.exe File opened (read-only) \??\p: rkrrqpra.exe File opened (read-only) \??\v: rkrrqpra.exe File opened (read-only) \??\b: rtsuklntlg.exe File opened (read-only) \??\g: rtsuklntlg.exe File opened (read-only) \??\x: rtsuklntlg.exe File opened (read-only) \??\y: rkrrqpra.exe File opened (read-only) \??\w: rkrrqpra.exe File opened (read-only) \??\n: rkrrqpra.exe File opened (read-only) \??\n: rtsuklntlg.exe File opened (read-only) \??\g: rkrrqpra.exe File opened (read-only) \??\j: rkrrqpra.exe File opened (read-only) \??\g: rkrrqpra.exe File opened (read-only) \??\i: rkrrqpra.exe File opened (read-only) \??\k: rkrrqpra.exe File opened (read-only) \??\t: rkrrqpra.exe File opened (read-only) \??\z: rkrrqpra.exe File opened (read-only) \??\k: rkrrqpra.exe File opened (read-only) \??\k: rtsuklntlg.exe File opened (read-only) \??\o: rtsuklntlg.exe File opened (read-only) \??\x: rkrrqpra.exe File opened (read-only) \??\h: rkrrqpra.exe File opened (read-only) \??\x: rkrrqpra.exe File opened (read-only) \??\z: rtsuklntlg.exe File opened (read-only) \??\r: rkrrqpra.exe File opened (read-only) \??\e: rkrrqpra.exe File opened (read-only) \??\u: rtsuklntlg.exe -
Modifies WinLogon 2 TTPs 2 IoCs
Processes:
rtsuklntlg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" rtsuklntlg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" rtsuklntlg.exe -
AutoIT Executable 7 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral1/memory/2156-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe C:\Windows\SysWOW64\rkrrqpra.exe autoit_exe \Windows\SysWOW64\rtsuklntlg.exe autoit_exe C:\Windows\SysWOW64\ldghalwxamjgrpw.exe autoit_exe C:\Windows\SysWOW64\jzyirvncsswdy.exe autoit_exe \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe autoit_exe C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe autoit_exe -
Drops file in System32 directory 9 IoCs
Processes:
6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exertsuklntlg.exedescription ioc process File created C:\Windows\SysWOW64\rtsuklntlg.exe 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\rtsuklntlg.exe 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ldghalwxamjgrpw.exe 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe File created C:\Windows\SysWOW64\rkrrqpra.exe 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\rkrrqpra.exe 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe File created C:\Windows\SysWOW64\ldghalwxamjgrpw.exe 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe File created C:\Windows\SysWOW64\jzyirvncsswdy.exe 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\jzyirvncsswdy.exe 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll rtsuklntlg.exe -
Drops file in Program Files directory 14 IoCs
Processes:
rkrrqpra.exerkrrqpra.exedescription ioc process File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe rkrrqpra.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal rkrrqpra.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe rkrrqpra.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal rkrrqpra.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe rkrrqpra.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal rkrrqpra.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe rkrrqpra.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe rkrrqpra.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe rkrrqpra.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe rkrrqpra.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe rkrrqpra.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe rkrrqpra.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe rkrrqpra.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal rkrrqpra.exe -
Drops file in Windows directory 5 IoCs
Processes:
WINWORD.EXE6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exedescription ioc process File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE File opened for modification C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\mydoc.rtf 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Office loads VBA resources, possible macro or embedded object present
-
Processes:
WINWORD.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE -
Modifies registry class 64 IoCs
Processes:
WINWORD.EXE6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exertsuklntlg.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\ShellEx WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\ = "&Edit" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" rtsuklntlg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" /p %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6AB9FAB0F96AF191830E3B36819C3E99B08E02F94362033EE2CC459909D4" 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E7F06BC6FF6721DDD209D1A68A099111" 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" /p %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" rtsuklntlg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg rtsuklntlg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" rtsuklntlg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7EFBFC8D4F2985189041D6217DE2BDEEE631584466406343D69D" 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "1939C77514E1DBB1B9BB7FE2EDE534CF" 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh rtsuklntlg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597} WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\ = "&Open" WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
WINWORD.EXEpid process 2936 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exeldghalwxamjgrpw.exertsuklntlg.exejzyirvncsswdy.exerkrrqpra.exerkrrqpra.exepid process 2156 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe 2156 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe 2156 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe 2156 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe 2156 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe 2156 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe 2156 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe 2680 ldghalwxamjgrpw.exe 2680 ldghalwxamjgrpw.exe 2680 ldghalwxamjgrpw.exe 2680 ldghalwxamjgrpw.exe 2680 ldghalwxamjgrpw.exe 2656 rtsuklntlg.exe 2656 rtsuklntlg.exe 2656 rtsuklntlg.exe 2656 rtsuklntlg.exe 2656 rtsuklntlg.exe 2156 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe 2420 jzyirvncsswdy.exe 2420 jzyirvncsswdy.exe 2420 jzyirvncsswdy.exe 2420 jzyirvncsswdy.exe 2420 jzyirvncsswdy.exe 2420 jzyirvncsswdy.exe 2680 ldghalwxamjgrpw.exe 2640 rkrrqpra.exe 2640 rkrrqpra.exe 2640 rkrrqpra.exe 2640 rkrrqpra.exe 2404 rkrrqpra.exe 2404 rkrrqpra.exe 2404 rkrrqpra.exe 2404 rkrrqpra.exe 2680 ldghalwxamjgrpw.exe 2420 jzyirvncsswdy.exe 2420 jzyirvncsswdy.exe 2680 ldghalwxamjgrpw.exe 2420 jzyirvncsswdy.exe 2420 jzyirvncsswdy.exe 2680 ldghalwxamjgrpw.exe 2420 jzyirvncsswdy.exe 2420 jzyirvncsswdy.exe 2680 ldghalwxamjgrpw.exe 2420 jzyirvncsswdy.exe 2420 jzyirvncsswdy.exe 2680 ldghalwxamjgrpw.exe 2420 jzyirvncsswdy.exe 2420 jzyirvncsswdy.exe 2680 ldghalwxamjgrpw.exe 2420 jzyirvncsswdy.exe 2420 jzyirvncsswdy.exe 2680 ldghalwxamjgrpw.exe 2420 jzyirvncsswdy.exe 2420 jzyirvncsswdy.exe 2680 ldghalwxamjgrpw.exe 2420 jzyirvncsswdy.exe 2420 jzyirvncsswdy.exe 2680 ldghalwxamjgrpw.exe 2420 jzyirvncsswdy.exe 2420 jzyirvncsswdy.exe 2680 ldghalwxamjgrpw.exe 2420 jzyirvncsswdy.exe 2420 jzyirvncsswdy.exe 2680 ldghalwxamjgrpw.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
Processes:
6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exeldghalwxamjgrpw.exertsuklntlg.exejzyirvncsswdy.exerkrrqpra.exerkrrqpra.exepid process 2156 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe 2156 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe 2156 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe 2680 ldghalwxamjgrpw.exe 2656 rtsuklntlg.exe 2680 ldghalwxamjgrpw.exe 2680 ldghalwxamjgrpw.exe 2656 rtsuklntlg.exe 2656 rtsuklntlg.exe 2420 jzyirvncsswdy.exe 2420 jzyirvncsswdy.exe 2420 jzyirvncsswdy.exe 2640 rkrrqpra.exe 2640 rkrrqpra.exe 2640 rkrrqpra.exe 2404 rkrrqpra.exe 2404 rkrrqpra.exe 2404 rkrrqpra.exe -
Suspicious use of SendNotifyMessage 18 IoCs
Processes:
6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exeldghalwxamjgrpw.exertsuklntlg.exejzyirvncsswdy.exerkrrqpra.exerkrrqpra.exepid process 2156 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe 2156 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe 2156 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe 2680 ldghalwxamjgrpw.exe 2656 rtsuklntlg.exe 2680 ldghalwxamjgrpw.exe 2680 ldghalwxamjgrpw.exe 2656 rtsuklntlg.exe 2656 rtsuklntlg.exe 2420 jzyirvncsswdy.exe 2420 jzyirvncsswdy.exe 2420 jzyirvncsswdy.exe 2640 rkrrqpra.exe 2640 rkrrqpra.exe 2640 rkrrqpra.exe 2404 rkrrqpra.exe 2404 rkrrqpra.exe 2404 rkrrqpra.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
WINWORD.EXEpid process 2936 WINWORD.EXE 2936 WINWORD.EXE -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exeldghalwxamjgrpw.exertsuklntlg.exeWINWORD.EXEdescription pid process target process PID 2156 wrote to memory of 2656 2156 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe rtsuklntlg.exe PID 2156 wrote to memory of 2656 2156 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe rtsuklntlg.exe PID 2156 wrote to memory of 2656 2156 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe rtsuklntlg.exe PID 2156 wrote to memory of 2656 2156 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe rtsuklntlg.exe PID 2156 wrote to memory of 2680 2156 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe ldghalwxamjgrpw.exe PID 2156 wrote to memory of 2680 2156 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe ldghalwxamjgrpw.exe PID 2156 wrote to memory of 2680 2156 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe ldghalwxamjgrpw.exe PID 2156 wrote to memory of 2680 2156 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe ldghalwxamjgrpw.exe PID 2156 wrote to memory of 2640 2156 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe rkrrqpra.exe PID 2156 wrote to memory of 2640 2156 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe rkrrqpra.exe PID 2156 wrote to memory of 2640 2156 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe rkrrqpra.exe PID 2156 wrote to memory of 2640 2156 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe rkrrqpra.exe PID 2680 wrote to memory of 2548 2680 ldghalwxamjgrpw.exe cmd.exe PID 2680 wrote to memory of 2548 2680 ldghalwxamjgrpw.exe cmd.exe PID 2680 wrote to memory of 2548 2680 ldghalwxamjgrpw.exe cmd.exe PID 2680 wrote to memory of 2548 2680 ldghalwxamjgrpw.exe cmd.exe PID 2156 wrote to memory of 2420 2156 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe jzyirvncsswdy.exe PID 2156 wrote to memory of 2420 2156 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe jzyirvncsswdy.exe PID 2156 wrote to memory of 2420 2156 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe jzyirvncsswdy.exe PID 2156 wrote to memory of 2420 2156 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe jzyirvncsswdy.exe PID 2656 wrote to memory of 2404 2656 rtsuklntlg.exe rkrrqpra.exe PID 2656 wrote to memory of 2404 2656 rtsuklntlg.exe rkrrqpra.exe PID 2656 wrote to memory of 2404 2656 rtsuklntlg.exe rkrrqpra.exe PID 2656 wrote to memory of 2404 2656 rtsuklntlg.exe rkrrqpra.exe PID 2156 wrote to memory of 2936 2156 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe WINWORD.EXE PID 2156 wrote to memory of 2936 2156 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe WINWORD.EXE PID 2156 wrote to memory of 2936 2156 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe WINWORD.EXE PID 2156 wrote to memory of 2936 2156 6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe WINWORD.EXE PID 2936 wrote to memory of 540 2936 WINWORD.EXE splwow64.exe PID 2936 wrote to memory of 540 2936 WINWORD.EXE splwow64.exe PID 2936 wrote to memory of 540 2936 WINWORD.EXE splwow64.exe PID 2936 wrote to memory of 540 2936 WINWORD.EXE splwow64.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6e680ddbbcf07f65e472b75485ce2514_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\SysWOW64\rtsuklntlg.exertsuklntlg.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\rkrrqpra.exeC:\Windows\system32\rkrrqpra.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2404 -
C:\Windows\SysWOW64\ldghalwxamjgrpw.exeldghalwxamjgrpw.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\cmd.execmd.exe /c jzyirvncsswdy.exe3⤵PID:2548
-
C:\Windows\SysWOW64\rkrrqpra.exerkrrqpra.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2640 -
C:\Windows\SysWOW64\jzyirvncsswdy.exejzyirvncsswdy.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2420 -
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"2⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:540
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
7Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD5f1cdb57817a57a7757e26688d9ca0124
SHA12ecdd8282ebb862f575f88c171bc0f594f021f04
SHA2565eebd3bdf84cc2137b999800cfd00cd93635c45a1c98a6219c5f578feba5d753
SHA512154f13af13ea5d8de6f91a1bac1c64ff06948b8ef36d293a80cace7189712ab518475bc24949e1f8be24f849fc1a883791ed5dcffda8c093c194e50b51e8f5f8
-
Filesize
20KB
MD570c708d0eba8857ab229dde9b8ec8120
SHA1e264cbc2e7fa8092451a062eda0a929d4526d7b5
SHA2561adc4f6928a254e0805c3efb419336d397038175acc6baeecb5945d2010c2b1e
SHA51239c2e9b81c301a6371b6690b47fd4fd2ff5bdaa4bc9b22362042a9b8b22e1055a9cac42d5084b8b97002793a8e603133711b6629362e082c1c1140d0901aeb09
-
Filesize
512KB
MD534a8ea8d43d92f4c7717bf0af8ba4006
SHA1d43ad8f533c8631998ce279e94bc8fc5c8d0f78d
SHA256f09e065710f5454d1307f90035c72a9d271a7020df96d0e6e9ed4d9bffc1c168
SHA512946c232f23db46ebe486912b0e591c5c5289ac5d8f760c866962732c59374136dffe1b020bb1bd9c63db7893da95a00aa3411a4e2d62bc8fa4fe0a10359c836b
-
Filesize
512KB
MD5c57f74e194bc9715ae9d2b944438ed16
SHA1f6a896372c5213e985521d1c92b85f59c40a0292
SHA25623a46245958fcf005b1c3b3eff8727b3b888e0cf0593fcb4a7a247c211765785
SHA512b6852b3242e59d47a3fd75b8d354643eca1de114dcc147690dcea40b45b80695ce203abd476c99690d19fc62db33a5bbba25981edc6ab81019d2fe24de9dbc8c
-
Filesize
512KB
MD551180e1dbd94dca8f07a38f5ef46613c
SHA1b3b444e278fd9d264692e96bd6a5a3aec83a6606
SHA2563adb68fb53b9045b70f913e26f5ad23b42bacf0da8b6f2320f71e34c12a1334c
SHA5126d8cad594c42067d6a5ad7fe9ecb1fb6eef597c92f7678645425f7bca6098d82a61a036e14d1df876855cd70c685e6f2dc4fddd1420f968214129dc5c3789422
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
512KB
MD5041701232b4c6073d5ab036a6bf2f94a
SHA16e4748d4aa5d915315399140cf735264489db9d3
SHA2563c0a24ef3e57e220c33023defdd4fa3d8de5c99bf225d963540fea6fceb8bae0
SHA5120633031793a1bc364a37e86c2b7fb544b1c2883fcec39b5356a7195c31b65111a3960aeb2127b644984c8154a8d36629ced91addeb0241cdeb87aa1d64671b3d
-
Filesize
512KB
MD5d01b9c809c53b20a1aff05c00e2fb153
SHA1b7144c2dea8ef7c6fc9a70f2d493aa25a926e623
SHA2560f666d99fa8dbcd416c3f4b2f0a17ef0ac257aab75c14170bfda8ef2070ea5b7
SHA5123107e7a98bcf88b375ac1a66cb934f6e0da766b880d9502c3bfa7c3e92822363ab417f4d1c7c579fdaa8671735c23e15d780d4b9be8442ec69b349c36bbb13d2